GSM phones -- call them unsafe, says security expert

December 27, 2011 by Nancy Owano, report

GSM logo. Image: Wikipedia.
( -- A German security expert has issued a warning that billions of mobile phone users who depend on GSM networks are vulnerable to having their personal mail hacked. He blames the problem on network operators that use outdated network security. Karsten Nohl, head of Germany's Security Research Labs, a Berlin-based consulting company, was readying his presentation of study findings for a security convention and highlighted his troubling study results.

Hackers can gain of a person’s phone and then send text messages, ordering up pay-for services, for example, which the victim then discovers in the form of surprise bills, or place calls.

With the stinging news of how reporters have intruded into people’s phone conversations and the latest security flap affecting Stratfor, his warning carried resonance this week.

Nohl said that he was able to intercept voice and text conversations by impersonating another user to listen to their voice mails or make calls or send text messages. Even more troubling was that he was able to pull this off using a seven-year-old Motorola cellphone and decryption software available free off the Internet.

Nohl was able to decipher the standard electronic exchange of information between phone and network. This is coded instruction/command-type information such as “Wait” or “I have a call for you.” Nohl said that most operators vary little from the standard setup procedure and therein is vulnerability.

He made educated guesses to decipher the algorithmic keys used by networks to encrypt transmissions. He said mobile telecom operators could resolve the security weaknesses by updating their software. (According to a report in The New York Times, much of digital technology used to secure cellphone call privacy was developed in the 1980s and 1990s.)

This type of attack could expose any cellphone using GSM technology. GSM digital networks are in use throughout the world. In the U.S., the GSM standard is used by AT&T and T-Mobile USA.

The study’s researchers reviewed 32 operators in 11 countries. These were Austria, Belgium, the Czech Republic, France, , Hungary, Italy, Morocco, Slovakia, Switzerland and Thailand. The operators were rated on how easily the researchers intercepted calls, tracked phones, or impersonated someone else’s device. Germany’s T-Mobile GSM network ranked the highest in providing security protection; the company has enhanced security measures in place.

Nohl’s company engages in technology projects at companies and governments focused on understanding technology risks According to his Research Labs, GSM telephony is the world’s most popular communication technology spanning most countries and connecting over four billion devices.

Explore further: GSM system about to be compromised

More information:

Related Stories

GSM system about to be compromised

December 8, 2009

( -- Research scientists in California and elsewhere are deliberately setting out to compromise the mobile phone system used by around three billion people. The system uses Global System for Mobile communications ...

Guide to breaking cell phone security revealed

December 30, 2009

(AP) -- A German security expert has raised the ire of the cell phone industry after he and a group of researchers posted online a how-to guide for cracking the encryption that keeps the calls of GSM-standard cell phone users ...

Researchers show how to use mobiles to spy on people

April 22, 2010

( -- Researchers have demonstrated how it is possible to use GSM (Global System for Mobile communications) data along with a few tools to track down a person’s mobile phone number and their location, and even ...

Dutch support for disaster zone phone software

April 13, 2011

Software developed by Flinders University’s Dr. Paul Gardner-Stephen which enables mobile phones to communicate during a disaster will be freely available to the public by the end of the year thanks to the support of ...

Recommended for you

NASA instruments image fireball over Bering Sea

March 22, 2019

On Dec. 18, 2018, a large "fireball—the term used for exceptionally bright meteors that are visible over a wide area—exploded about 16 miles (26 kilometers) above the Bering Sea. The explosion unleashed an estimated 173 ...

Paleontologists report world's biggest Tyrannosaurus rex

March 22, 2019

University of Alberta paleontologists have just reported the world's biggest Tyrannosaurus rex and the largest dinosaur skeleton ever found in Canada. The 13-metre-long T. rex, nicknamed "Scotty," lived in prehistoric Saskatchewan ...

Coffee-based colloids for direct solar absorption

March 22, 2019

Solar energy is one of the most promising resources to help reduce fossil fuel consumption and mitigate greenhouse gas emissions to power a sustainable future. Devices presently in use to convert solar energy into thermal ...

1 comment

Adjust slider to filter visible comments by rank

Display comments: newest first

3.3 / 5 (3) Dec 27, 2011
We are increasingly moving into the world of cloak-and-dagger, shoot-em-up, and James Bondian gadgets, for real. While it used to excite me at the movies, now I'm getting increasingly annoyed and bored.!

I really wish things like phone conversations and sms were protected (yes I know they cannot be protected from the government, but, please, at least from the nerd across the street).

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.