GSM phones -- call them unsafe, says security expert

Dec 27, 2011 by Nancy Owano report
GSM
GSM logo. Image: Wikipedia.

(PhysOrg.com) -- A German security expert has issued a warning that billions of mobile phone users who depend on GSM networks are vulnerable to having their personal mail hacked. He blames the problem on network operators that use outdated network security. Karsten Nohl, head of Germany's Security Research Labs, a Berlin-based consulting company, was readying his presentation of study findings for a security convention and highlighted his troubling study results.

Hackers can gain of a person’s phone and then send text messages, ordering up pay-for services, for example, which the victim then discovers in the form of surprise bills, or place calls.

With the stinging news of how reporters have intruded into people’s phone conversations and the latest security flap affecting Stratfor, his warning carried resonance this week.

Nohl said that he was able to intercept voice and text conversations by impersonating another user to listen to their voice mails or make calls or send text messages. Even more troubling was that he was able to pull this off using a seven-year-old Motorola cellphone and decryption software available free off the Internet.

Nohl was able to decipher the standard electronic exchange of information between phone and network. This is coded instruction/command-type information such as “Wait” or “I have a call for you.” Nohl said that most operators vary little from the standard setup procedure and therein is vulnerability.

He made educated guesses to decipher the algorithmic keys used by networks to encrypt transmissions. He said mobile telecom operators could resolve the security weaknesses by updating their software. (According to a report in The New York Times, much of digital technology used to secure cellphone call privacy was developed in the 1980s and 1990s.)

This type of attack could expose any cellphone using GSM technology. GSM digital networks are in use throughout the world. In the U.S., the GSM standard is used by AT&T and T-Mobile USA.

The study’s researchers reviewed 32 operators in 11 countries. These were Austria, Belgium, the Czech Republic, France, , Hungary, Italy, Morocco, Slovakia, Switzerland and Thailand. The operators were rated on how easily the researchers intercepted calls, tracked phones, or impersonated someone else’s device. Germany’s T-Mobile GSM network ranked the highest in providing security protection; the company has enhanced security measures in place.

Nohl’s company engages in technology projects at companies and governments focused on understanding technology risks According to his Research Labs, GSM telephony is the world’s most popular communication technology spanning most countries and connecting over four billion devices.

Explore further: 5G mobile networks will support an internet that's so good you can feel it

More information: srlabs.de/research/decrypting_gsm/

Related Stories

GSM system about to be compromised

Dec 08, 2009

(PhysOrg.com) -- Research scientists in California and elsewhere are deliberately setting out to compromise the mobile phone system used by around three billion people. The system uses Global System for Mobile ...

Guide to breaking cell phone security revealed

Dec 30, 2009

(AP) -- A German security expert has raised the ire of the cell phone industry after he and a group of researchers posted online a how-to guide for cracking the encryption that keeps the calls of GSM-standard cell phone users ...

Stop Big Brother listening in to your mobile phone conversation

Sep 27, 2004

A team of University of Surrey scientists led by Professor Ahmet Kondoz has developed new technology which will enable companies and organisations to ensure that their GSM mobile phone conversations are totally secure and confidential. Prev ...

Researchers show how to use mobiles to spy on people

Apr 22, 2010

(PhysOrg.com) -- Researchers have demonstrated how it is possible to use GSM (Global System for Mobile communications) data along with a few tools to track down a person’s mobile phone number and their location, ...

Dutch support for disaster zone phone software

Apr 13, 2011

Software developed by Flinders University’s Dr. Paul Gardner-Stephen which enables mobile phones to communicate during a disaster will be freely available to the public by the end of the year thanks to the support of ...

Recommended for you

New frontier in error-correcting codes

2 hours ago

Error-correcting codes are one of the glories of the information age: They're what guarantee the flawless transmission of digital information over the airwaves or through copper wire, even in the presence of the corrupting ...

The New York Times to cut 100 newsroom jobs

3 hours ago

The New York Times Co. says it is cutting about 100 newsroom jobs through buyouts and layoffs in an effort to trim costs and focus more on its digital efforts.

Minimally invasive surgery with hydraulic assistance

4 hours ago

Endoscopic surgery requires great manual dexterity on the part of the operating surgeon. Future endoscopic instruments equipped with a hydraulic control system will provide added support during minimally ...

User comments : 1

Adjust slider to filter visible comments by rank

Display comments: newest first

gwrede
3.3 / 5 (3) Dec 27, 2011
We are increasingly moving into the world of cloak-and-dagger, shoot-em-up, and James Bondian gadgets, for real. While it used to excite me at the movies, now I'm getting increasingly annoyed and bored.!

I really wish things like phone conversations and sms were protected (yes I know they cannot be protected from the government, but, please, at least from the nerd across the street).