Mobile

Hacker shows how he can intercept cell phone calls with $1,500 device (video)

NOTE: GrowthBeat -- VentureBeat's provocative new marketing-tech event -- is next week! We've gathered the best and brightest to explore the data, apps, and science of successful marketing. Get the full scoop here, and grab your tickets while they last.

A security researcher showed in a live demo today how he can intercept cell phone calls on 80 percent of the world’s phones with just about $1,500 worth of equipment.

Chris Paget, who also showed yesterday how he can hack into radio frequency identification tags (RFID) from a distance, created a fake cell phone tower, or Global System for Mobile communications (GSM) base station. GSM is the protocol for 80 percent of the world’s phones and is used by T-Mobile and AT&T in the U.S. The demo was not, Paget said, a malicious attack in any way.

Military and intelligence agencies can intercept cell phone calls with their wiretapping technology. But Paget simply wanted to show how vulnerable the cell phone network is and how hackers could intercept calls for a small amount of money. He used a couple of large antennae (pictured with Paget) and a laptop with some other equipment.

“There’s a good chance you won’t even know about it when it happens,” Paget said during a talk at the Defcon security conference in Las Vegas. (See our roundup of all Black Hat and Defcon stories).

Paget’s system disables the encryption in the system, and the GSM network complies and never sends a warning message. Paget’s talk got some attention in advance because Federal Communications Commission authorities contacted him about his planned demonstration. They asked whether he would be violating wiretapping laws.

Paget consulted his legal help from the Electronic Frontier Foundation and decided to go forward with the live demo of cell phone call interception. He posted notices at the event saying he would be intercepting calls on the GSM network in the area during the talk. That gave him some legal protection.

In the demo, he turned on his interceptor and immediately had 15 people on his network. The interceptor he created could intercept phones in a small area covered by one cell site. Dozens more phones were intercepted in the course of the talk. He inserted a warning message saying that he was intercepting calls, and some phones displayed that they were on the Defcon 18 cell phone network during the interception. He could take over a give area by broadcasting a stronger signal that was available from AT&T or T-Mobile in that given area.

“It’s not particularly difficult to do,” he said.

Paget said that he could easily create a noise generator that could disrupt all calls in a given area. He chose not to do that demo, as it would have knocked out all cell phone coverage for most of Las Vegas, he said.

“I am not turning this on,” he said. “The thing about band jamming is there is no way to defend against it.”

Check out the video excerpt of Paget’s presentation:

0 comments

Trackbacks

  1. [...] et d’enregistrer toutes les conversations téléphoniques dans un rayon de dix mètres, en assemblant une antenne GSM à partir d’éléments achetés sur Internet. Une fois l’équipement pirate activé, [...]

  2. [...] et d’enregistrer toutes les conversations téléphoniques dans un rayon de dix mètres, en assemblant une antenne GSM à partir d’éléments achetés sur Internet. Une fois l’équipement pirate activé, [...]

  3. [...] well-known figure at the twin Black Hat and Defcon conferences in Las Vegas, having demonstrated a live interception of a cell phone call last year. In her talk this year, she said she hated the limitations of Microsoft’s operating [...]

  4. [...] well-known figure on the twin Black Hat and Defcon conferences in Las Vegas, having demonstrated a live interception of a mobile phone call last year. In her talk this year, she said she hated the constraints of Microsoft’s operating [...]

  5. [...] a identical tiwn Black Hat as well as Defcon conferences in Las Vegas, carrying demonstrated a live interception of a dungeon phone call last year. In her speak this year, she pronounced she hated a stipulations of Microsoft’s [...]

  6. [...] well-known figure at the twin Black Hat and Defcon conferences in Las Vegas, having demonstrated a live interception of a cell phone call last year. In her talk this year, she said she hated the limitations of Microsoft’s operating [...]

  7. [...] obvious figure during a twin Black Hat and Defcon conferences in Las Vegas, carrying demonstrated a live interception of a dungeon phone call final year. In her speak this year, she pronounced she hated a stipulations of Microsoft’s [...]

  8. [...] last year I remember an interesting presentation made by the researcher Chris Paget during Defcon security conference in Las Vegas. He have [...]

  9. [...] Hacker shows how he can intercept cell phone calls with $1500 …Jul 31, 2010 … A security researcher showed in a live demo today how he can intercept cell phone calls on 80 percent of the world’s phones with just about … [...]