AIDA ANALYSE IDENTIFY DETECT ALLOCATE GSM/UMTS

Size: px
Start display at page:

Download "AIDA ANALYSE IDENTIFY DETECT ALLOCATE GSM/UMTS"

Transcription

1 AIDA ANALYSE IDENTIFY DETECT ALLOCATE INTERCEPTION DEVICE IN GSM/UMTS NETWORK Pavel Bezpalec, Michal Kašík Department of telecommunication engineering Czech Technical University in Prague Access IT s.r.o. 1

2 Current situation GSM protocol is no longer safe, it is 25 years old GSM ciphers A5/1 a A5/2 are broken Development is rapid Namely in the telecommunications, safety of UMTS and LTE systems is on much higher level, than GSM ones GSM networks are mostly still operated in all areas covered by UMTS, the investments are still utilised and there are no plans to change things soon Dual phones using GSM/UMTS/LTE bandwith are very common The people are the same Nobody is really worrying about the radio bandwith used for a voice call

3 The principal questions Is the illegal GSM interception really a threat? Is it complicated to buy such interception device? Is it possible to protect yourself against such device? How? For how much?

4 The appearance of GSM interception devices in the Czech Republic Tomáš Almer, director of legal interception department of Czech Police We are facing the appearance of these devices in the Czech Republic ČT We are detecting the presence of illegal GSM interception devices during our legal interception operations. Our estimate is of at least twenty such devices and their occurrence is increasing ČT

5 Where to buy:

6 Where to buy:

7 How to protect ourselves Cipherlocking phones Your partner must use the same system but the protection is limited. Only Peer-to-Peer devices are safe. The cipherlocked services are vulnerable against DDoS attack Terrestrial lines Effective but these lines are not available everywhere and it is not easy to persuade people to stop using mobiles. The prophylactic scanning of the offices Ineffective in cases where the intruder is a hundred meters from your office Detection The only solution It enables the prey to become the hunter.

8 MAN IN THE MIDDLE The old method often used from the time of the invention of the telegraph The basic principle The intruder enters the communication as an active mediator This is possible generally in any network, which uses the verification only in direction user network Usually the only different parameter in such a mediated communication is the difference between the distance to the expected and the real end of the communication line. The basic low end cost device you can have for 3000 USD, the fully sophisticated one costs USD.

9 GSM network with no intruder

10 The intruder arrives in the area and identifies the target

11 The intruder commences interception

12 The supervising centre of the GSM operator does not see anything unusual GSoperatoroperator

13 AIDA arrives - scanning

14 Detection from the expected/measured distance

15 How the intruder forces the target s phone to leave the safe UMTS bandwidth? The intruder deploys a small jammer in the UMTS network The power transmitted is relatively small; the directional antenna is deployed. The target s phone will return to the GSM bandwidth automatically and the target will be unaware of this change

16 AIDA - the functionality The goal To create system, which will do 80% of the job for 20% of the price. Main functionality scanning of the GSM channels Processes 1. GSM bandwith local table This is created by scanning of all GSM channels and identification of all BTS occurence in the spectre (cell id, LAC, channel, MNC, MCC) 2. Time Advance parameter measurement on all active BTS 3. The comparison of the scanned data with expected table The expected local table from database is compared with obtained data Conflict detected Alert is sent via or sms In the case of the identification of the intruder it is possible to find its location approximately by TriAngulation

17 TriAngulation using Time Advance parameter

18 AIDA - interface

19 AIDA the scheme of the processes

20 Department of Telecommunications Engineering of Czech Technical University in Prague ( is one of major players of the Czech telecommunications environment. Access IT, s.r.o. ( is the producer of the device and the AIDA patent holder.

Femtocells : Inexpensive devices to test UMTS security

Femtocells : Inexpensive devices to test UMTS security .... Femtocells : Inexpensive devices to test UMTS security Kévin Redon, Ravishankar Borgaonkar Technische Universität Berlin, SecT kredon/ravii@sec.t-labs.tu-berlin.de Hackito Ergo Sum 2011, 8 April 2011

More information

Femtocell: Femtostep to the Holy Grail

Femtocell: Femtostep to the Holy Grail .... Femtocell: Femtostep to the Holy Grail Ravishankar Borgaonkar, Kévin Redon Technische Universität Berlin, SecT ravii/kredon@sec.t-labs.tu-berlin.de TROOPERS 2011, 30 March 2011 3G/UMTS femtocells

More information

Pegasus NetGuard Mobile Phone Counter Surveillance Systems

Pegasus NetGuard Mobile Phone Counter Surveillance Systems Pegasus NetGuard Mobile Phone Counter Surveillance Systems Hardware and software for Law Enforcement, Government & State Security Organisations Mobile phone interception detection Full spectral analysis

More information

CSFB and SMS over SGs Interface

CSFB and SMS over SGs Interface Circuit Switched Fallback (CSFB) provides an interim solution for enabling telephony and short message service (SMS) for LTE operators that do not plan to deploy IMS packet switched services at initial

More information

Cellular Phone Control System for Prisons and Corrective Services Facilities

Cellular Phone Control System for Prisons and Corrective Services Facilities Cellular Phone Control System for Prisons and Corrective Services Facilities ENGAGE CELLGUARD October 2011 Table of Contents 1 Introduction... 1 2 ENGAGE CELLGUARD Overview... 2 3 ENGAGE CELLGUARD Main

More information

LTE : The Future of Mobile Broadband Technology

LTE : The Future of Mobile Broadband Technology LTE : The Future of Mobile Broadband Technology Erick Setiawan tukangbajaksawah@gmail.com 1 Become a necessity today, where the wireless broadband technology needed to meet increasing expectations in terms

More information

Understanding IMSI Privacy!

Understanding IMSI Privacy! Understanding IMSI Privacy Ravishankar Borgaonkar TU Berlin Swapnil Udar Aalto University Email: darshak@sec.t-labs.tu-berlin.de Blackhat USA 2014, Las Vegas, 7 th August 2014 Overview Unresolved Privacy

More information

Hands-On Modern Mobile and Long Term Evolution LTE

Hands-On Modern Mobile and Long Term Evolution LTE Hands-On LTE Course Description With 3G mobile technologies already rolled out by over 200 operators in over 80 countries, standards bodies, manufacturers and operators are looking towards the next generation

More information

Cellular Mobile Systems and Services (TCOM1010) GSM Architecture

Cellular Mobile Systems and Services (TCOM1010) GSM Architecture GSM Architecture 1 GSM NETWORK INFRASTRUCTURE...2 2 NETWORK SWITCHING SUBSYSTEM (NSS)...3 2.1 Home Location Register...4 2.2 Mobile Switching Center and Visitor Location Register...4 2.3 Authentication

More information

IMSI/IMEI Catching & Localization System. (IMSI/IMEI Catcher + Direction Finder)

IMSI/IMEI Catching & Localization System. (IMSI/IMEI Catcher + Direction Finder) IMSI/IMEI Catching & Localization System (IMSI/IMEI Catcher + Direction Finder) About Us Our intelligent, integrated and highly mobile IMSI/IMEI Catching & Localization system is used for identifying the

More information

Security of Cellular Networks: Man-in-the Middle Attacks

Security of Cellular Networks: Man-in-the Middle Attacks Security of Cellular Networks: Man-in-the Middle Attacks Mario Čagalj University of Split 2013/2014. Security in the GSM system by Jeremy Quirke, 2004 Introduction Nowadays, mobile phones are used by 80-90%

More information

The WiMAX Technology

The WiMAX Technology Page 2 Oeconomics of Knowledge, Volume 2, Issue 2, 2Q 2010 The WiMAX Technology Felician ALECU, PhD, University Lecturer Department of Economic Informatics Academy of Economic Studies, Bucharest, Romania

More information

Delivery of Voice and Text Messages over LTE 13 年 5 月 27 日星期 一

Delivery of Voice and Text Messages over LTE 13 年 5 月 27 日星期 一 Delivery of Voice and Text Messages over LTE 1. The Market for Voice and SMS 2. Third Party Voice over IP 3. The IP Multimedia Subsystem 4. Circuit Switched Fallback 5. VoLGA LTE was designed as a data

More information

ON THE IMPACT OF GSM ENCRYPTION AND MAN-IN-THE-MIDDLE ATTACKS ON THE SECURITY OF INTEROPERATING GSM/UMTS NETWORKS

ON THE IMPACT OF GSM ENCRYPTION AND MAN-IN-THE-MIDDLE ATTACKS ON THE SECURITY OF INTEROPERATING GSM/UMTS NETWORKS ON THE IMPACT OF GSM ENCRYPTION AND MAN-IN-THE-MIDDLE ATTACKS ON THE SECURITY OF INTEROPERATING GSM/UMTS NETWORKS Ulrike Meyer, Susanne Wetzel Darmstadt University of Technology, Department of Computer

More information

WHITE PAPER 2019 AUTHENTICATOR WHITE PAPER

WHITE PAPER 2019 AUTHENTICATOR WHITE PAPER WHITE PAPER 2019 AUTHENTICATOR WHITE PAPER 1 The Background to the WIZZIT Authenticator THE EVOLUTION OF AUTHENTICATION At its most basic level, bank grade authentication is built around a simple concept

More information

Designing Authentication for Wireless Communication Security Protocol

Designing Authentication for Wireless Communication Security Protocol Designing Authentication for Wireless Communication Security Protocol Ms. Roshni Chandrawanshi, Prof. Ravi Mohan, Mr. Shiv Prakash Chandrawanshi Abstract Security is considered an important issue for mobile

More information

Cisco. Connected Defence

Cisco. Connected Defence Cisco Connected Defence Stronger Connections, Stronger Defence 03 Imagine a smart device for every soldier. Or one-click battlefield communications, push-of-a-button bandwidth control and total platform

More information

Market and regulatory overview in Albania

Market and regulatory overview in Albania 10th anniversary of the Regulatory Agency for Electronic Communications and Postal Services (RATEL) PIRO XHIXHO (Chairman of AKEP) Market and regulatory overview in Albania Beograd, Serbia, 23 April 2015

More information

Virtual Dispersive Networking Spread Spectrum IP

Virtual Dispersive Networking Spread Spectrum IP Virtual Dispersive Networking Spread Spectrum IP DSI Proprietary 1 DSI Proprietary 2 Problem Lies Outside of Existing Security: On the Internet Internet Routers Virus Software Phishing Software etc POLICY

More information

Nexus8610 Traffic Simulation System. Intersystem Handover Simulation. White Paper

Nexus8610 Traffic Simulation System. Intersystem Handover Simulation. White Paper Traffic Simulation System Intersystem Handover Simulation White Paper Notice Every effort has been made to ensure that the information in this document was accurate at the time of printing. However, the

More information

Cellular Communication

Cellular Communication Cellular Communication Cellular Communication Cellular communication is designed to provide communications between two moving units, or between one mobile unit and one stationary phone or land unit (PSTN).

More information

Mixed use of 2 and 3 digit MNCs. Main points from report prepared for the Swedish Post and Telecom Authority (PTS) Copenhagen 4 March 2014

Mixed use of 2 and 3 digit MNCs. Main points from report prepared for the Swedish Post and Telecom Authority (PTS) Copenhagen 4 March 2014 Main points from report prepared for the Swedish Post and Telecom Authority (PTS) Copenhagen 4 March 2014 Overview and scope Background Analysis Conclusions 2 Overview A study carried out by Cybercom for

More information

Trojans in SS7 - how they bypass all security measures

Trojans in SS7 - how they bypass all security measures Sergey Puzankov Trojans in SS7 - how they bypass all security measures ptsecurity.com SS7 in the 20 th century SCP STP STP SSP SCP SSP STP PSTN STP SSP SS7 (Signaling System #7): a set of telephony protocols

More information

GSM Hacking. Wireless Mobile Phone Communication 30 th January 2014 UNRESTRICTED EXTERNAL

GSM Hacking. Wireless Mobile Phone Communication 30 th January 2014 UNRESTRICTED EXTERNAL GSM Hacking Wireless Mobile Phone Communication 30 th January 2014 Labs.mwrinfosecurity.com MWR Labs 1 Labs.mwrinfosecurity.com MWR Labs Introduction to GSM June 2008 2.9 BILLION subscribers use GSM. Replaced

More information

ETSI TS V ( ) Technical Specification

ETSI TS V ( ) Technical Specification TS 148 071 V10.0.1 (2011-05) Technical Specification Digital cellular telecommunications system (Phase 2+); Location Services (LCS); Serving Mobile Location Centre - Base Station System (SMLC-BSS) interface;

More information

DSTI/ICCP/TISP(2000)6 COMMUNICATIONS OUTLOOK 2001

DSTI/ICCP/TISP(2000)6 COMMUNICATIONS OUTLOOK 2001 COMMUNICATIONS OUTLOOK 2001 Country: Czech Republic Date completed: 15.06.2000 TELECOMMUNICATIONS Market Structure and Regulatory Status (Questions 1-10) 1. Please provide details of the regulation of

More information

Border Surveillance Systems

Border Surveillance Systems Border Surveillance Systems Blighter scanning radar and sensor solutions GLOBAL GOVERNMENT > Product > Blighter Blighter Border Surveillance Radar A state-of-the art remote sensor that will detect intruders

More information

The Quest for Independence - Information Security Management Pyramid. Mikhail Utin, CISSP, PhD, Daniil Utin, MS and Rubos, Inc.

The Quest for Independence - Information Security Management Pyramid. Mikhail Utin, CISSP, PhD, Daniil Utin, MS and Rubos, Inc. 1 1. Introduction The Quest for Independence - Information Security Management Pyramid Mikhail Utin, CISSP, PhD, Daniil Utin, MS and Rubos, Inc. team The current state of global cybersecurity remains chaotic

More information

Technical Specifications

Technical Specifications Technical Specifications The Goods and Related Services shall comply with following Technical Specifications: 1. Introduction: TECHNICAL SPECIFICATIONS OF IMSI MONITOR/MOBILE TRACKER a. The IMSI MONITOR/MOBILE

More information

PROACTIVE APPROACH. INTELLIGENT CYBERSECURITY. ptsecurity.com

PROACTIVE APPROACH. INTELLIGENT CYBERSECURITY. ptsecurity.com PROACTIVE APPROACH. INTELLIGENT CYBERSECURITY ptsecurity.com WHO WE ARE Positive Technologies is a leading global provider of enter prise security solutions for vulnerability and compliance management,

More information

ECM PLUS TM Earthquake Crisis Management 2.1.

ECM PLUS TM Earthquake Crisis Management 2.1. ECM PLUS TM Earthquake Crisis Management 2.1 www.aratos.gr 1 The Added Value Aratos Technologies S.A. through the integrated system ECM- PLUS provides an effective solution for telecommunication in emergency.

More information

Delivery of Voice and Text Messages over LTE

Delivery of Voice and Text Messages over LTE Delivery of Voice and Text Messages over LTE 1. The Market for Voice and SMS 2. Third Party Voice over IP 3. The IP Multimedia Subsystem 4. Circuit Switched Fallback 5. VoLGA Two main approaches to the

More information

3GPP TS V ( )

3GPP TS V ( ) Technical Specification 3rd Generation Partnership Project; Technical Specification Group Core Network and Terminals; Evolved Packet System (EPS); Sv interface (MME to MSC, and SGSN to MSC) for SRVCC ()

More information

Quick Start M!DGE / MG102 Wireless Router 11/16/2011

Quick Start M!DGE / MG102 Wireless Router 11/16/2011 11/16/2011 1. Welcome Thank you for buying M!DGE / MG102 Wireless Router from RACOM. Please read this Quick Start Guide carefully since it contains important security notes (section 2) and compliance information

More information

ITU Arab Regional Workshop on Mobile Roaming: National & International Practices 27 to 29 of Oct, 2015 Sudan - Khartoum

ITU Arab Regional Workshop on Mobile Roaming: National & International Practices 27 to 29 of Oct, 2015 Sudan - Khartoum ITU Arab Regional Workshop on Mobile Roaming: National & International Practices 27 to 29 of Oct, 2015 Sudan - Khartoum Roaming Service in Sudan improvement & Challenges Zain, MTN & Sudani Content - Telecom

More information

Christopher Covert. Principal Product Manager Enterprise Solutions Group. Copyright 2016 Symantec Endpoint Protection Cloud

Christopher Covert. Principal Product Manager Enterprise Solutions Group. Copyright 2016 Symantec Endpoint Protection Cloud Christopher Covert Principal Product Manager Enterprise Solutions Group Copyright 2016 Symantec Endpoint Protection Cloud THE PROMISE OF CLOUD COMPUTING We re all moving from challenges like these Large

More information

Switching, Mobile Phones, Cable, Beginning Data Link Layer. CS158a Chris Pollett Feb 21, 2007.

Switching, Mobile Phones, Cable, Beginning Data Link Layer. CS158a Chris Pollett Feb 21, 2007. Switching, Mobile Phones, Cable, Beginning Data Link Layer CS158a Chris Pollett Feb 21, 2007. Outline Switching Mobile Phones Cable Start of Data Link Layer Switching We will now examine how the switching

More information

Orange Smart Cities. Smart Metering and Smart Grid : how can a telecom operator contribute? November

Orange Smart Cities. Smart Metering and Smart Grid : how can a telecom operator contribute? November Orange Smart Cities Smart Metering and Smart Grid : how can a telecom operator contribute? November 5 2012 Nathalie Leboucher Vice President Smart Cities Program Orange 1 the Orange Group in a nutshell

More information

Wireless Security Protocol Analysis and Design. Artoré & Bizollon : Wireless Security Protocol Analysis and Design

Wireless Security Protocol Analysis and Design. Artoré & Bizollon : Wireless Security Protocol Analysis and Design Protocol Analysis and Design 1 Networks 1. WIRELESS NETWORKS 2 Networks 1. WIRELESS NETWORKS 1.1 WiFi 802.11 3 Networks OSI Structure 4 Networks Infrastructure Networks BSS : Basic Set Service ESS : Extended

More information

LTE Network Global MME ID Management Database Configuration Mode Commands

LTE Network Global MME ID Management Database Configuration Mode Commands LTE Network Global MME ID Management Database Configuration Mode Commands The LTE Network Global MME ID Management Database Configuration Mode is used to create associations between PLMN IDs and MME group

More information

ETSI TS V4.3.0 ( )

ETSI TS V4.3.0 ( ) Technical Specification Digital cellular telecommunications system (Phase 2+); Location Services (LCS); Serving Mobile Location Centre - Base Station System (SMLC-BSS) interface; Layer 3 specification

More information

GLOBAL SYSTEM FOR MOBILE COMMUNICATION (2) ETI2511 Friday, 31 March 2017

GLOBAL SYSTEM FOR MOBILE COMMUNICATION (2) ETI2511 Friday, 31 March 2017 GLOBAL SYSTEM FOR MOBILE COMMUNICATION (2) ETI2511 Friday, 31 March 2017 1 SYLLABUS GSM General architecture and interfaces of cellular system and the PSTN and Internet networks: BTS, MSC, Internetworking,

More information

Cyber Security Technologies

Cyber Security Technologies 1 / Cyber Security Technologies International Seminar on Cyber Security: An Action to Establish the National Cyber Security Center Lisbon, 12 th September 2013 23 / Key highlights - Thales Group Thales

More information

Experimental Analysis of the Femtocell Location Verification Techniques

Experimental Analysis of the Femtocell Location Verification Techniques Experimental Analysis of the Femtocell Location Verification Techniques Ravishankar Borgaonkar, Kevin Redon and Jean-Pierre Seifert Security in Telecommunication Technical University Berlin and Deutsche

More information

GSM security country report: Estonia

GSM security country report: Estonia GSM security country report: Estonia GSM Map Project gsmmap@srlabs.de Security Research Labs, Berlin September 2014 Abstract. GSM networks differ widely in their protection capabilities against common

More information

ETSI TS V ( )

ETSI TS V ( ) TS 125 419 V10.2.0 (2012-04) Technical Specification Universal Mobile Telecommunications System (UMTS); UTRAN Iu-BC interface: Service Area Broadcast Protocol (SABP) (3GPP TS 25.419 version 10.2.0 Release

More information

Alcatel-Lucent 1357 ULIS

Alcatel-Lucent 1357 ULIS Unified Lawful Interception Suite The adds lawful interception functions to Alcatel-Lucent products, adapting their internal interfaces to the standard lawful interception interfaces of law enforcement

More information

We manage network capacity

We manage network capacity We manage network capacity LIMA NETWORK PROTECT ARCHITECTS IN SAFETY AND INTELLIGENCE Overload Protection. Make your network more resilient against disasters. Perimeter Control. Manage service availability

More information

Cellular Records Review and Analysis Part 4: T-Mobile

Cellular Records Review and Analysis Part 4: T-Mobile Cellular Records Review and Analysis Part 4: T-Mobile PATCtech Glenn K Bard, Chief Technology Officer Jim Alsup, Director PATCtech Scott Lucas, Instructor and Examiner Brian Sprinkle, Case Manager and

More information

10 Call Set-up. Objectives After this chapter the student will: be able to describe the activities in the network during a call set-up.

10 Call Set-up. Objectives After this chapter the student will: be able to describe the activities in the network during a call set-up. 10 Call Set-up Objectives After this chapter the student will: be able to describe the activities in the network during a call set-up. 10.1 INTRODUCTION... 2 10.2 CALL TO MS (MT)... 3 10.3 CALL FROM MS

More information

3GPP TS V ( )

3GPP TS V ( ) Technical Specification 3rd Generation Partnership Project; Technical Specification Group Radio Access Network; Evolved Universal Terrestrial Radio Access Network (E-UTRAN); General aspects and principles

More information

CDMA450 - a low frequency radio based broadband solution in Värmland

CDMA450 - a low frequency radio based broadband solution in Värmland CDMA450 - a low frequency radio based broadband solution 1. Purpose of this document: The purpose of this document is to describe a best-practice case from all municipalities regarding wireless broadband

More information

Paper on Handling Menace of International Grey Traffic

Paper on Handling Menace of International Grey Traffic Paper on Handling Menace of International Grey Traffic White Paper 01 of 2012 PiRRC In this paper discussion is only about the conventional international voice telephony requiring a license to bring in

More information

TRAFFIC CONTROL AND DATA FUSION

TRAFFIC CONTROL AND DATA FUSION TRAFFIC CONTROL AND DATA FUSION CROSS RS 4 and CROSS RS 4S CROSS PTC TRAFFIC LIGHT CONTROLLERS MAINTENANCE AND PROGRAMMING SOFTWARE FULL-FEATURED URBAN TRAFFIC MANAGEMENT CENTER Traffic Light Controllers

More information

2010 Online Banking Security Survey:

2010 Online Banking Security Survey: 2010 Online Banking Security Survey: ZeuS-Like Malware Rapidly Outpaces All Other Online Banking Threats PhoneFactor, Inc. 7301 West 129th Street Overland Park, KS 66213 1-877-No-Token / 1-877-668-6536

More information

Contents VULNERABILITIES OF MOBILE INTERNET (GPRS), 2014

Contents VULNERABILITIES OF MOBILE INTERNET (GPRS), 2014 VULNERABILITIES OF MOBILE INTERNET (GPRS) Dmitry Kurbatov Sergey Puzankov Pavel Novikov 2014 Contents 1. Introduction 2. Summary 3. Mobile network scheme 4. GTP protocol 5. Searching for mobile operator

More information

Business and Security Justification For IPv6 Only IoT Networks.

Business and Security Justification For IPv6 Only IoT Networks. Business and Security Justification For IPv6 Only IoT Networks www.disrupt6.com @JoeKlein Joe.Klein@Disrupt6.com IPV6 BUSINESS CASE Decrease OPEX/CAPEX, Increase Competiveness & Agility The business reality

More information

Performance Challenge of 3G over Satellite Methods for Increasing Revenue & Quality of Experience. February 2018

Performance Challenge of 3G over Satellite Methods for Increasing Revenue & Quality of Experience. February 2018 Performance Challenge of 3G over Satellite Methods for Increasing Revenue & Quality of Experience February 2018 Mobile telephony has been in existence for over 40 years. The first generation (1G) developed

More information

3G Wireless. from an Operator s Perspective. David T. Shimozawa Technology Development. Page 1. June 2001

3G Wireless. from an Operator s Perspective. David T. Shimozawa Technology Development. Page 1. June 2001 3G Wireless from an Operator s Perspective David T. Shimozawa Technology Development Page 1 Introduction Background CDMA Evolution Services and Market Issues Technology Issues Spectrum Issues Network Evolution

More information

Grenzen der Kryptographie

Grenzen der Kryptographie Microsoft Research Grenzen der Kryptographie Dieter Gollmann Microsoft Research 1 Summary Crypto does not solve security problems Crypto transforms security problems Typically, the new problems relate

More information

Creatively Calculated, Purposefully Made

Creatively Calculated, Purposefully Made Creatively Calculated, Purposefully Made Website Hosting and Maintenance Packages THIS IS FEVER ver. 1.5 September 2017 Life is really simple, but we insist on making it complicated. - Confucius Operating

More information

ETSI TS V ( )

ETSI TS V ( ) Technical Specification LTE; Evolved Universal Terrestrial Radio Access Network (E-UTRAN); General aspects and principles for interfaces supporting Multimedia Broadcast Multicast Service (MBMS) within

More information

UNIT-5. GSM System Operations (Traffic Cases) Registration, call setup, and location updating. Call setup. Interrogation phase

UNIT-5. GSM System Operations (Traffic Cases) Registration, call setup, and location updating. Call setup. Interrogation phase UNIT-5 GSM System Operations (Traffic Cases) Registration, call setup, and location updating Call setup Interrogation phase For the interrogation phase The initial address message comes outside the GSM

More information

Security and Compliance Powered by the Cloud. Ben Friedman / Strategic Accounts Director /

Security and Compliance Powered by the Cloud. Ben Friedman / Strategic Accounts Director / Security and Compliance Powered by the Cloud Ben Friedman / Strategic Accounts Director / bf@alertlogic.com Founded: 2002 Headquarters: Ownership: Houston, TX Privately Held Customers: 1,200 + Employees:

More information

Securing Industrial Control Systems

Securing Industrial Control Systems L OCKHEED MARTIN Whitepaper Securing Industrial Control Systems The Basics Abstract Critical infrastructure industries such as electrical power, oil and gas, chemical, and transportation face a daunting

More information

Wireless Backhaul Synchronization

Wireless Backhaul Synchronization Wireless Backhaul Synchronization Abstract This paper focuses on Next Generation Backhaul Networks Synchronization and the way it is implemented by Ceragon s high capacity, LTE Ready point to point microwave

More information

HOLISTIC COMMUNICATIONS SECURITY

HOLISTIC COMMUNICATIONS SECURITY HOLISTIC COMMUNICATIONS SECURITY BLACK TIGER COUNTERING CYBER TERRORISM HOLISTIC COMMUNICATIONS SOLUTION LACSMI is leading vendor in telecommunications since 1992 promoting set of security solutions worldwide

More information

Wireless Communication

Wireless Communication Wireless Communication Hwajung Lee Key Reference: Prof. Jong-Moon Chung s Lecture Notes at Yonsei University Wireless Communications Bluetooth Wi-Fi Mobile Communications LTE LTE-Advanced Mobile Communications

More information

Easy Activation Effortless web-based administration that can be activated in as little as one business day - no integration or migration necessary.

Easy Activation Effortless web-based administration that can be activated in as little as one business day - no integration or migration necessary. Security Solutions Our security suite protects against email spam, viruses, web-based threats and spyware while delivering disaster recovery, giving you peace of mind so you can focus on what matters most:

More information

BEST PRACTICES FOR IMPLEMENTING ACCESS CONTROL SYSTEMS

BEST PRACTICES FOR IMPLEMENTING ACCESS CONTROL SYSTEMS BEST PRACTICES FOR IMPLEMENTING ACCESS CONTROL SYSTEMS By Isaac McGuire East Carolina University ICTN 4040 Best Practices for Implementing Access Control Systems As a network administrator or information

More information

Securing SMS of a GSM Network Message Center Using Asymmetric Encryption Technique Algorithm.

Securing SMS of a GSM Network Message Center Using Asymmetric Encryption Technique Algorithm. Securing SMS of a GSM Network Message Center Using Asymmetric Encryption Technique Algorithm. Garba S. (1), Abdu-Aguye U.-F., Raubilu A.A., Ibrahim Y. Department of Electrical and Computer Engineering,

More information

Huawei Technologies

Huawei Technologies Huawei Technologies 2005.10 8 VOICE FROM OPERATORS T-Mobile Czech: convergence, aggregation and evolution Technology Director of T-Mobile Czech Republic, Frank Meywerk, met with WinWin and explained the

More information

Product Description. MS2372h-153 LTE USB Stick V100R001 HUAWEI TECHNOLOGIES CO., LTD. Issue 01. Date

Product Description. MS2372h-153 LTE USB Stick V100R001 HUAWEI TECHNOLOGIES CO., LTD. Issue 01. Date V100R001 Issue 01 Date 2017-6-9 HUAWEI TECHNOLOGIES CO., LTD. Huawei Technologies Co., Ltd. provides customers with comprehensive technical support and service. Please feel free to contact our local office

More information

White Paper for UC, Office & Contact Center Professionals. DECT Security

White Paper for UC, Office & Contact Center Professionals. DECT Security White Paper for UC, Office & Contact Center Professionals DECT Security TABLE OF CONTENTS Executive Summary 3 About DECT Technology 3 The DECT Security Chain 3 The Pairing Process 4 Other Security Measures

More information

Communication Networks 2 Signaling 2 (Mobile)

Communication Networks 2 Signaling 2 (Mobile) Communication Networks 2 Signaling 2 (Mobile) Gusztáv Adamis BME TMIT 2017 GSM signaling Signaling of GSM is based on the ISDN signaling systems SS7/DSS1 But, because of mobility, roaming, radio access

More information

FEMTOCELL WITH RELAYS TO ENHANCE THE MACROCELL BACKHAUL BANDWIDTH

FEMTOCELL WITH RELAYS TO ENHANCE THE MACROCELL BACKHAUL BANDWIDTH FEMTOCELL WITH RELAYS TO ENHANCE THE MACROCELL BACKHAUL BANDWIDTH, Abstract In the future of Mobile networks it is important to implement a Femtocell at homes and to improve the domestic network. Even

More information

N o W i r e s. N o W a i t i n g

N o W i r e s. N o W a i t i n g N o W i r e s N o W a i t i n g N E T W O R K S W I T H O U T W I R E S Sales: Computer Service Corp 644 Strander Blvd #11 Seattle, Wa 98188 (866) 7209-7771 Toll Free www.csc-service.com T h e B e s t

More information

Privacy through Pseudonymity in Mobile Telephony Systems

Privacy through Pseudonymity in Mobile Telephony Systems Privacy through Pseudonymity in Mobile Telephony Systems Myrto Arapinis 1 Loretta Mancini 2 Eike Ritter 2 Mark Ryan 2 1 School of Informatics, University of Edinburgh 2 School of Computer Science, University

More information

Port Facility Cyber Security

Port Facility Cyber Security International Port Security Program Port Facility Cyber Security Cyber Security Assessment MAR'01 1 Lesson Topics ISPS Code Requirement The Assessment Process ISPS Code Requirements What is the purpose

More information

Call Detail Records The Evidence 10/19/2017. Locating Cell Phones

Call Detail Records The Evidence 10/19/2017. Locating Cell Phones Cell Phone Location Evidence for Legal Professionals Larry Daniel DFCP, EnCE, ACE, AME, BCE, CTNS, CTA, CWA Locating Cell Phones Least Precise to Most Call Detail Records (Drive Testing) Google Location

More information

Please view notes for further information on later slides

Please view notes for further information on later slides Please view notes for further information on later slides 1 2 Mobile telecoms planning is driven primarily by coverage of population and secondarily by coverage of geographic area, often with reference

More information

User Module. File Uploader APPLICATION NOTE

User Module. File Uploader APPLICATION NOTE User Module File Uploader APPLICATION NOTE Used symbols Danger Information regarding user safety or potential damage to the router. Attention Problems that may arise in specific situations. Information

More information

Quick Start M!DGE / MG102 Wireless Router 6/13/2017

Quick Start M!DGE / MG102 Wireless Router 6/13/2017 6/13/2017 1. Welcome Thank you for buying M!DGE / MG102 Wireless Router from RACOM. Please read this Quick Start Guide carefully since it contains important security notes (section 2) and compliance information

More information

SEPTEMBER 2014 NATIONAL BROADBAND NETWORK AND SCHOOLS CONNECTIVITY

SEPTEMBER 2014 NATIONAL BROADBAND NETWORK AND SCHOOLS CONNECTIVITY SEPTEMBER 2014 NATIONAL BROADBAND NETWORK AND SCHOOLS CONNECTIVITY EXECUTIVE SUMMARY The objective of the National Broadband Network Company ( NBNCo ) is to provide genuine National Broadband Coverage

More information

Balena Van. furgonebalena.pp-investigazioni.it

Balena Van. furgonebalena.pp-investigazioni.it P & P INVESTIGAZIONI S.r.l. Our falls fully within the high-tech investigative as an indispensable tool and, above all, effective intelligence within public and private. Born from the department SIGMA,

More information

CPSC 467: Cryptography and Computer Security

CPSC 467: Cryptography and Computer Security CPSC 467: Cryptography and Computer Security Michael J. Fischer Lecture 24a December 2, 2013 CPSC 467, Lecture 24a 1/20 Secure Shell (SSH) Transport Layer Security (TLS) Digital Rights Management and Trusted

More information

PATCtech. Cellular Records Review and Analysis Part 1: AT&T

PATCtech. Cellular Records Review and Analysis Part 1: AT&T Cellular Records Review and Analysis Part 1: AT&T PATCtech Glenn K Bard, Chief Technology Officer Jim Alsup, Director PATC Scott Lucas, Instructor and Examiner Steve Dempsey, Instructor Kathy Enriquez,

More information

Threat patterns in GSM system. Basic threat patterns:

Threat patterns in GSM system. Basic threat patterns: Threat patterns in GSM system Usage of mobile devices in business simpli es, speeds up and optimizes business processes. However, it is necessary to understand that the more complicated the device is the

More information

TMCZ Discount Program by SC. For Social Club members and employees of ExxonMobil BSC Czechia s.r.o. Valid as of

TMCZ Discount Program by SC. For Social Club members and employees of ExxonMobil BSC Czechia s.r.o. Valid as of TMCZ Discount Program by SC For Social Club members and employees of ExxonMobil BSC Czechia s.r.o. Valid as of 1.1.2018 Who can take advantage of this Employee s Program? This offer is intended for private

More information

ETSI TS V (201

ETSI TS V (201 TS 122 034 V13.0.0 (201 16-02) TECHNICAL SPECIFICATION Digital cellular telecommunications system (Phase 2+); Universal Mobile Telecommunications System (UMTS); High Speed Circuit Switched Data (HSCSD);

More information

3GPP TS V8.9.0 ( )

3GPP TS V8.9.0 ( ) TS 23.122 V8.9.0 (2010-03) Technical Specification 3rd Generation Partnership Project; Technical Specification Group Core Network and Terminals; Non-Access-Stratum (NAS) functions related to Mobile Station

More information

IJSER. Virtualization Intrusion Detection System in Cloud Environment Ku.Rupali D. Wankhade. Department of Computer Science and Technology

IJSER. Virtualization Intrusion Detection System in Cloud Environment Ku.Rupali D. Wankhade. Department of Computer Science and Technology ISSN 2229-5518 321 Virtualization Intrusion Detection System in Cloud Environment Ku.Rupali D. Wankhade. Department of Computer Science and Technology Abstract - Nowadays all are working with cloud Environment(cloud

More information

Technology Disaster Recovery Plan updated 06/16/16

Technology Disaster Recovery Plan updated 06/16/16 Technology Disaster Recovery Plan updated 06/16/16 Overview In the case of natural or other disaster the district needs to be back in operation and functioning in all areas - business, security, education

More information

The leader in session border control. for trusted, first class interactive communications

The leader in session border control. for trusted, first class interactive communications The leader in session border control for trusted, first class interactive communications VoIP security at the carrier network edge Kevin Mitchell Director, Solutions Marketing kmitchell@acmepacket.com

More information

GSMK CryptoPhone PSTN/1i. User Manual

GSMK CryptoPhone PSTN/1i. User Manual GSMK CryptoPhone PSTN/1i User Manual A. Installation 1. Turn the key-operated switch on the left side of the device to its vertical position (labeled SECURE ) using one of the supplied keys. 2. Connect

More information

Your peace of mind. Our connected IoT Terminals. visit: vodafone.com/business

Your peace of mind. Our connected IoT Terminals. visit: vodafone.com/business Your peace of mind Our connected IoT Terminals visit: vodafone.com/business The best choice for Internet of Things (IoT) combine high-quality hardware with preconfigured IoT connectivity services, tested

More information

Thuraya Connecting Everyone Everywhere

Thuraya Connecting Everyone Everywhere Thuraya Connecting Everyone Everywhere www.thuraya.com Follow us on /thurayatelecom Satellite & LTE Hotspot Staying connected is a priority. It s at the heart of your social identity and self-expression.

More information

Mobile Security Fall 2013

Mobile Security Fall 2013 Mobile Security 14-829 Fall 2013 Patrick Tague Class #4 Telecom System Security General Vulnerabilities Service interruption vulnerabilities Due to increased capacity offered by high speed communication

More information

CYBER RESILIENCE & INCIDENT RESPONSE

CYBER RESILIENCE & INCIDENT RESPONSE CYBER RESILIENCE & INCIDENT RESPONSE www.nccgroup.trust Introduction The threat landscape has changed dramatically over the last decade. Once the biggest threats came from opportunist attacks and preventable

More information

List of indicators included in the World Telecommunication/ICT Indicators database, December 2017

List of indicators included in the World Telecommunication/ICT Indicators database, December 2017 List of indicators included in the World Telecommunication/ICT Indicators database, December 2017 Economy, Demography Average annual exchange rate per USD Households Percentage of the population in urban

More information