About
Community
Bad Ideas
Drugs
Ego
Erotica
Fringe
Society
Technology
Phreak
Boxes, Old and New
Bugs and Taps
Cellular Phones
Introduction to Telecommunications
PBX's and Switches
Payphones
Phone Phun
VMB's, Pagers, E-Mail, and S&F Systems
register | bbs | search | rss | faq | about
meet up | add to del.icio.us | digg it

Info on Cellular Telephones


NOTICE: TO ALL CONCERNED Certain text files and messages contained on this site deal with activities and devices which would be in violation of various Federal, State, and local laws if actually carried out or constructed. The webmasters of this site do not advocate the breaking of any law. Our text files and message bases are for informational purposes only. We recommend that you contact your local law enforcement officials before undertaking any project based upon any information obtained from this or any other web site. We do not guarantee that any of the information contained on this system is correct, workable, or factual. We are not responsible for, nor do we assume any liability for, damages resulting from the use of any information on this site.

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=

Cellular Telephones
[Written By The High Evolutionary]

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=

I assume that most of us know many of the technical aspects of Cellular
Phreaking therefore this file is intended for general information as to how
these unique devices operate.

--------------------------------------------------------------

Cellular is likely to be successful because it provides dramatic
improvements over the historic automobile phones. For years, mobile
radio-telephone service was an extremely limited proposition. There were only
forty-four radio channels available, and a maximum of about thirty were
assigned to any one area. That meant if all thirty channels were occupied-one
conversation per channel-and you were the thirty-first mobile phone user who
wished to make a call, you would have to wait thirty minutes or more, even in a
city the size of New York. As you can imagine, mobile radio-telephone service
like that could not become very popular. Even with the limited number of
channels, long delays in making calls during busy periods, and often poor
quality transmission, there were big waiting lists for mobile service. But
with a fully equipped cellular radio-telephone system, it is possible to make
5000 times as many calls simultaneously in the same metropolitan area, opening
up the service to anyone that can pay the hefty prices.

That is because cellular radio-telephones systems are technically quite
different from traditional mobile telephones. First, the FCC (Federal
Communications Commission) has allocated far more channels to cellular, 666 in
all. Second, those 666 channels are broadcast from many different locations.
In the old mobile telephone systems, there was one powerful radio station with
a large antenna that served an entire city. In the new system, a geographical
area is honeycombed with many cells, hence the name 'Cellular'. Each cell has
its own low-powered radio transmitter and receiver. As a car with a cellular
telephone or a person carrying a portable moves from one cell to the next, the
call is transferred automatically. You're unlikely to notice when this
transfer takes place, even though your phone is suddenly switched to a
different radio station and to another channel while you are talking.

Because the cellular signal is low-powered, it doesn't go very far. This
permits the same channel you are talking on to be used for calls in other parts
of the same metropolitan area without interference. This would mean cellular
radio-telephone systems can serve a very large number of customers in an area
because there are more channels than before-and the larger number of channels
are reused.

Unlike local telephone service, which is provided by a monopoly, there is
competition in cellular. Two classes of companies are allowed to offer
cellular telephone service in every market. One cellular system can be owned
by a telephone company, the other by someone else. The two-company rule was
adopted by the FCC so that AT&T, which developed cellular, could not monopolize
the whole thing.

Cellular Telephones come in two basic versions, as car phones and portable
phones, with a briefcase hybrid. Car phones are by far the most common,
because they are much cheaper. But most believe that, ultimately, portables
will be the most popular. Washington Post Company president Richard Simmons,
whose company is a partner in several cellular systems, even predicts that by
the early 1990's "There will be phones roughly the size of a calculators that
you carry around in your pocket. They will cost no more than five hundred
dollars. They will emancipate people from the necessity of locating a phone to
make calls. The bad news is, you will never be able to get away from the phone,
and we'll call it progress."

Car telephones include a small transmitter-receiver unit that is usually
mounted in the trunk, an antenna and a control head that includes the handset.
In most cellular systems, the telephone touchpad is located on the handset.
Many domestic and foreign manufacturers make cellular car phones, but so far
only Motorola makes portables, the DYNA T-A-C 8000X and 8000S. Motorola's
portables look like a slightly enlarged, somewhat chunky telephone handset,
with a stubby antenna at one end.

Portables are less powerful than car units, so they can't be used with some
cellular systems. The portable's other limitation is battery life. A portable
can listen for calls for about eight hours, but it can only transmit for only
thirty minutes. After that time it must be charged for a minimum of an hour.

The following American cities have cellular telephone service or soon will
get it:

New York Denver
Los Angeles Seattle
Chicago Milwaukee
Philadelphia Tampa
Detroit Cincinnati
Boston Kansas City
San Francisco Buffalo
Washington Phoenix
Dallas San Jose
Houston Indianapolis
St. Louis New Orleans
Miami Portland
Pittsburgh Cleveland
San Diego Atlanta
Baltimore Minneapolis
--------------------------------------------------------------
%



THE ELECTRONIC SERIAL NUMBER: A CELLULAR 'SIEVE'?
'SPOOFERS' CAN DEFRAUD USERS AND CARRIERS

by Geoffrey S. Goodfellow, Robert N. Jesse, and Andrew H. Lamothe, Jr.

What's the greatest security problem with cellular phones? Is it privacy of
communications? No.

Although privacy is a concern, it will pale beside an even greater problem:
spoofing.

'Spoofing' is the process through which an agent (the 'spoofer') pretends to
be somebody he isn't by proffering false identification, usually with intent
to defraud. This deception, which cannot be protected against using the
current U.S. cellular standards, has the potential to create a serious
problem--unless the industry takes steps to correct some loopholes in the
present cellular standards.

Compared to spoofing, the common security concern of privacy is not so severe.
Most cellular subscribers would, at worst, be irked by having their
conversational privacy violated. A smaller number of users might actually
suffer business or personal harm if their confidential exchanges were
compromised. For them, voice encryption equipment is becoming increasingly
available if they are willing to pay the price for it.

Thus, even though technology is available now to prevent an interloper from
overhearing sensitive conversations, cellular systems cannot--at any
cost--prevent pirates from charging calls to any account. This predicament is
not new to the industry. Even though cellular provides a modern,
sophisticated quality mobile communications service, it is not fundamentally
much safer than older forms of mobile telephony.

History of Spoofing Vulnerability

The earliest form of mobile telephony, unsquelched manual Mobile Telephone
Service (MTS), was vulnerable to interception and eavesdropping. To place a
call, the user listened for a free channel. When he found one, he would key
his microphone to ask for service: 'Operator, this is Mobile 1234; may I
please have 555-7890.' The operator knew to submit a billing ticket for
account number 1234 to pay for the call. So did anybody else listening to the
channel--hence the potential for spoofing and fraud.

Squelched channel MTS hid the problem only slightly because users ordinarily
didn't overhear channels being used by other parties. Fraud was still easy
for those who turned off the squelch long enough to overhear account numbers.

Direct-dial mobile telephone services such as Improved Mobile Telephone
Service (IMTS) obscured the problem a bit more because subscriber
identification was made automatically rather than by spoken exchange between
caller and operator. Each time a user originated a call, the mobile telephone
transmitted its identification number to the serving base station using some
form of Audio Frequency Shift Keying (AFSK), which was not so easy for
eavesdroppers to understand.

Committing fraud under IMTS required modification of the mobile--restrapping
of jumpers in the radio unit, or operating magic keyboard combinations in
later units--to reprogram the unit to transmit an unauthorized identification
number. Some mobile control heads even had convenient thumb wheel switches
installed on them to facilitate easy and frequent ANI (Automatic Number
Identification) changes.

Cellular Evolution

Cellular has evolved considerably from these previous systems. Signaling
between mobile and base stations uses high-speed digital techniques and
involves many different types of digital messages. As before, the cellular
phone contains its own Mobile Identification Number (MIN), which is programmed
by the seller or service shop and can be changed when, for example, the phones
sold to a new user. In addition, the U.S. cellular standard incorporates a
second number, the 'Electronic Serial Number' (ESN), which is intended to
uniquely and permanently identify the mobile unit.

According to the Electronic Industries Association (EIA) Interim Standard
IS-3-B, Cellular System Mobile Station--Land Station Compatibility
Specification (July 1984), 'The serial number is a 32-bit binary number that
uniquely identifies a mobile station to any cellular system. It must be
factory-set and not readily alterable in the field. The circuitry that
provides the serial number must be isolated from fraudulent contact and
tampering. Attempts to change the serial number circuitry should render the
mobile station inoperative.'

The ESN was intended to solve two problems the industry observed with its
older systems.

First, the number of subscribers that older systems could support fell far
short of the demand in some areas, leading groups of users to share a single
mobile number (fraudulently) by setting several phones to send the same
identification. Carriers lost individual user accountability and their means
of predicting and controlling traffic on their systems.

Second, systems had no way of automatically detecting use of stolen equipment
because thieves could easily change the transmitted identification.

In theory, the required properties of the ESN allow cellular systems to check
to ensure that only the correctly registered unit uses a particular MIN, and
the ESNs of stolen units can be permanently denied service ('hot-listed').
This measure is an improvement over the older systems, but vulnerabilities
remain.

Ease of ESN Tampering

Although the concept of the unalterable ESN is laudable in theory, weaknesses
are apparent in practice. Many cellular phones are not constructed so that
'attempts to change the serial number circuitry renders the mobile station
inoperative.' We have personally witnessed the trivial swapping of one ESN
chip for another in a unit that functioned flawlessly after the switch was
made.

Where can ESN chips be obtained to perform such a swap? We know of one recent
case in the Washington, D.C. area in which an ESN was 'bought' from a local
service shop employee in exchange for one-half gram of cocaine. Making the
matter simpler, most manufacturers are using industry standard Read-Only
Memory (ROM) chips for their ESNs, which are easily bought and programmed or
copied.

Similarly, in the spirit of research, a west coast cellular carrier copied the
ESN from one manufacturer's unit to another one of the same type and
model--thus creating two units with the exact same identity.

The ESN Bulletin Board

For many phones, ESN chips are easy to obtain, program, and install. How does
a potential bootlegger know which numbers to use? Remember that to obtain
service from a system, a cellular unit must transmit a valid MIN (telephone
number) and (usually) the corresponding serial number stored in the cellular
switch's database.

With the right equipment, the ESN/MIN pair can be read right off the air
because the mobile transmits it each time it originates a call. Service shops
can capture this information using test gear that automatically receives and
decodes the reverse, or mobile-to-base, channels.

Service shops keep ESN/MIN records on file for units they have sold or
serviced, and the carriers also have these data on all of their subscribers.
Unscrupulous employees could compromise the security of their customers'
telephones.

In many ways, we predict that 'trade' in compromised ESN/MIN pairs will
resemble what currently transpires in the long distance telephone business
with AT&T credit card numbers and alternate long-distance carrier (such as
MCI, Sprint and Alltel) account codes. Code numbers are swapped among
friends, published on computer 'bulletin boards' and trafficked by career
criminal enterprises.

Users whose accounts are being defrauded might--or might not--eventually
notice higher-than-expected bills and be reassigned new numbers when they
complain to the carrier. Just as in the long distance business, however, this
number 'turnover' (deactivation) won't happen quickly enough to make abuse
unprofitable. Catching pirates in the act will be even tougher than it is in
the wireline telephone industry because of the inherent mobility of mobile
radio.

Automating Fraud

Computer hobbyists and electronics enthusiasts are clever people. Why should
a cellular service thief 'burn ROMs' and muck with hardware just to install
new IDs in his radio? No Herculean technology is required to 'hack' a phone
to allow ESN/MIN programming from a keyboard, much like the IMTS phone thumb
wheel switches described above.

Those not so technically inclined may be able to turn to mail-order
entrepreneurs who will offer modification kits for cellular fraud, much as
some now sell telephone toll fraud equipment and pay-TV decoders.

At least one manufacturer is already offering units with keyboard-programmable
MINs. While intended only for the convenience of dealers and service shops,
and thus not described in customer documentation, knowledgeable and/or
determined end users will likely learn the incantations required to operate
the feature. Of course this does not permit ESN modification, but easy MIN
reprogrammability alone creates a tremendous liability in today's roaming
environment.

The Rolls Royce of this iniquitous pastime might be a 'Cellular Cache-Box.' It
would monitor reverse setup channels and snarf ESN/MIN pairs off the air,
keeping a list in memory. Its owner could place calls as on any other
cellphone. The Cache-Box would automatically select an ESN/MIN pair from its
catalog, use it once and then discard it, thus distributing its fraud over
many accounts. Neither customer nor service provider is likely to detect the
abuse, much less catch the perpetrator.

As the history of the computer industry shows, it is not far-fetched to
predict explosive growth in telecommunications and cellular that will bring
equipment prices within reach of many experimenters. Already we have seen the
appearance of first-generation cellular phones on the used market, and new
units can be purchased for well under $1000 in many markets.

How High The Loss?

Subscribers who incur fraudulent charges on their bills certainly can't b
expected to pay them. How much will fraud cost the carrier? If the charge is
for home-system airtime only, the marginal cost to the carrier of providing
that service is not as high as if toll charges are involved. In the case of
toll charges, the carrier suffers a direct cash loss. The situation is at its
worst when the spoofer pretends to be a roaming user. Most inter-carrier
roaming agreements to date make the user's home carrier (real or spoofed)
responsible for charges, who would then be out hard cash for toll and airtime
charges.

We have not attempted to predict the dollar losses this chicanery might
generate because there isn't enough factual information information for anyone
to guess responsibly. Examination of current estimates of long-distance-toll
fraud should convince the skeptic.

Solutions

The problems we have described are basically of two types. First, the ESN
circuitry in most current mobiles is not tamper-resistant, much less
tamper-proof. Second and more importantly, the determined perpetrator has
complete access to all information necessary for spoofing by listening to the
radio emissions from valid mobiles because the identification information
(ESN/MIN) is not encrypted and remains the same with each transmission.

Manufacturers can mitigate the first problem by constructing mobiles that more
realistically conform to the EIA requirements quoted above. The second
problem is not beyond solution with current technology, either. Well-known
encryption techniques would allow mobiles to identify themselves to the
serving cellular system without transmitting the same digital bit stream each
time. Under this arrangement, an interloper receiving one transmission could
not just retransmit the same pattern and have it work a second time.

An ancillary benefit of encryption is that it would reasonably protect
communications intelligence--the digital portion of each transaction that
identifies who is calling whom when.

The drawback to any such solution is that it requires some re-engineering in
the Mobile-Land Station Compatibility Specification, and thus new software or
hardware for both mobiles and base stations. The complex logistics of
establishing a new standard, implementing it, and retrofitting as much of the
current hardware as possible certainly presents a tough obstacle, complicated
by the need to continue supporting the non-encrypted protocol during a
transition period, possibly forever.

The necessity of solving the problem will, however, become apparent. While we
presently know of no documented cases of cellular fraud, the vulnerability of
the current standards and experience with similar technologies lead us to
conclude that it is inevitable. Failure to take decisive steps promptly will
expose the industry to a far more expensive dilemma. XXX

Geoffrey S. Goodfellow is a member of the senior research staff in the
Computer Science Laboratory at SRI International, 333 Ravenswood Ave., Menlo
Park, CA 94025, 415/859-3098. He is a specialist in computer security and
networking technology and is an active participant in cellular industry
standardization activities. He has provided Congressional testimony on
telecommunications security and privacy issues and has co-authored a book on
the computer 'hacking' culture.

Robert N. Jesse (2221 Saint Paul St., Baltimore, MD 21218, 301/243-8133) is an
independent consultant with expertise in security and privacy, computer
operating systems, telecommunications and technology management. He is an
active participant in cellular standardization efforts. He was previously a
member of the senior staff at The Johns Hopkins University, after he obtained
his BES/EE from Johns Hopkins.

Andrew H. Lamothe, Jr. is executive vice-president of engineering at Cellular
Radio Corporation, 8619 Westwood Center Dr., Vienna, VA 22180, 703/893-2680.
He has played a leading role internationally in cellular technology
development. He was with Motorola for 10 years prior to joining American
TeleServices, where he designed and engineered the Baltimore/Washington market
trial system now operated by Cellular One.
--------

A later note indicates that one carrier may be losing something like $180K per
month....


 
To the best of our knowledge, the text on this page may be freely reproduced and distributed.
If you have any questions about this, please check out our Copyright Policy.

 

totse.com certificate signatures
 
 
About | Advertise | Bad Ideas | Community | Contact Us | Copyright Policy | Drugs | Ego | Erotica
FAQ | Fringe | Link to totse.com | Search | Society | Submissions | Technology
Hot Topics
Php
Withstanding an EMP
Good computer destroyer?
Wow, I never thought the navy would be so obvious.
Alternatives Internets to HTTP
Anti-Virus
a way to monitor someones AIM conversation
VERY simple question: browser history
 
Sponsored Links
 
Ads presented by the
AdBrite Ad Network

 

TSHIRT HELL T-SHIRTS