Log in ....Tribune

Monday, February 23, 2004
Feature

Cell security!
Amardeep Gupta

WIRELESS communications, which is the use of cordless and cellular phones, has grown by leaps and bounds in the past 10 years and become a booming $ 11 billion market. Unfortunately, it has also led to a huge security problem, since the radio signals transmitted and received by these devices can easily be intercepted, compromised and exploited. By 2004 there would be an estimated 1.5 billion cellphones around the world.

Vulnerability

Cellular phones are vulnerable to electronic eavesdropping, cellular spoofing and SMS jamming.

Electronic eavesdropping is listening to or recording a cellular call without the permission or knowledge of the calling or receiving parties. Eavesdroppers accomplish this feat by using radio frequency scanners and other equipment to find and listen to the frequencies used by the devices.

While communication privacy is a concern, it pales in front of cellular spoofing. Cellular spoofing (also known as cloning) is the process where a person provides false identification (about a cellular account) to the service provider with the intent to defraud. The earliest form of spoofing appeared several years ago in the mobile telephone industry. Eavesdroppers would scan the airwaves until they identified a mobile phone channel. They would then monitor the transmissions on these frequencies and wait for an account owner to request a call.

Not only electronic eavesdropping and cellular spoofing, mobile phones also face the risk of crashing through SMS overwhelming. The idea of sending SMS or ‘text message’ to crash a mobile phone seemed a remote possibility until late last year when a Dutch security researcher revealed that it could be done through a computer program, called sms_client which sent malformed SMS messages from an Internet-connected PC to a target device. The SMS follows a certain format, which when modified might cause a phone to freeze or shutdown.

It was revealed that a bug on the phone’s software caused the phone to freeze. The problem was solved when the SIM card of the affected phone was taken out and transferred to another phone that was bug-less.

Useful devices

A5/3: The GSM Association in October 2002 showed off a new security algorithm, known as A5/3 that provides users of GSM mobile phones with an even higher level of protection against eavesdropping than they have already. It ensures that even if a prospective attacker manages to pull a GSM phone call out of the radio waves, he will be unable to make sense of it.

Cellphone detector: The detector traces mobile phone and 2-way radio transmissions. It sounds an alarm followed by a voice message requesting the user to turn their communication device off immediately. Compact and lightweight, the device is portable or can be easily wall-mounted. For convenience, it can be powered by batteries or AC adapter. It detects mobile phones and two-way radio transmissions in the continuous frequency range of 400 MHz to 2000 MHz, including all major communication formats in use around the world like GSM, CDMA, TDMA, PCS and two-way radio handsets.

Cellphone jammer: It sends out a blocking signal to stop any cellphone within a certain range and at a certain frequency from transmitting and receiving. A jammer works by emitting a high-powered signal on the same frequency as a mobile phone. The US is the most popular market, besides Europe. The Indian product has a range between 20 feet and 1.3 km.

Cellbuster: When a signal is detected, for instance a person carrying a cellphone on him in standby mode, a user selectable alarm is sounded. It is a device that continuously scans for cellular phones. Once it detects that a cellphone is switched on (up to 90 feet away), it alerts the user that they must switch off their phone.