02.01.2021 Überwachung über Mobilfunknetze

400 Attacks per 100.000 User

Such a high “incidence value” should actually trigger strong reactions from the state power - but no, it is not about Corona but the monitoring of movement profiles of cell phones. At the remote Chaos Communication Congress (rC3), security researcher Cathal Mc Daid reported on the fight against secret surveillance.

He complains that the mobile network operators thought themselves safe for years. In the days of GSM and UMTS it was assumed that only “authorized companies” had the ability and the know-how to penetrate the networks. With the SS7 cellular protocol, any kind of abuse up to the interception of SMS and the rerouting of calls was possible.

The successor version of the SS7 protocol for 4G networks called Diameter was not much better either. It only got a little more secure with the introduction of AdaptiveMobile Security. This did not make attacks impossible, they just had to be carried out more skillfully.

The Simjacker attack only became known last year, and it actually does not interfere with the cell phone system: a specially prepared SMS could instruct a victim's cell phone to send its own location back to the attacker. And that happens without this being displayed anywhere on the mobile phone, because the SIM card processes and answers such inquiries on its own.

After it became known, the number of such attacks fell, but at one provider the security researcher still counted 400 attacks per 100,000 customers within a year. Before that, the number is said to have been even 1300 queries per 100,000 customers. This is a clear indication that this method has been used by “certain services” for continuous monitoring.

We would also suspect that there was also such an intention when programming this “feature” in the SIM cards. Such a code did not burn itself into the cards ...
In this context, we remind you of the efforts to define the Elliptic Curve Random Generator 2007 by the National Institute of Standards and Technology (NIST) as the standard for wireless encryption. ECRG has been used for encryption in mobile communications for many years and can be cracked in seconds!

Read more https://www.heise.de/news/rC3-Spionage-im-Mobilfunknetz-5001377.html
and https://streaming.media.ccc.de/rc3/relive/11511 Link leider inzwischen fehlerhaft, wer weiß den richtigen?


Category[21]: Unsere Themen in der Presse Short-Link to this page: a-fsa.de/e/3dz
Link to this page: https://www.aktion-freiheitstattangst.org/de/articles/7503-20210102-ueberwachung-ueber-mobilfunknetze.htm
Link with Tor: http://a6pdp5vmmw4zm5tifrc3qo2pyz7mvnk4zzimpesnckvzinubzmioddad.onion/de/articles/7503-20210102-ueberwachung-ueber-mobilfunknetze.htm
Tags: #rC3 #CCC #Mobilfunknetze #ECRG #GSM #UMTS #Smartphone #Handy #IMSI-Catcher #Lauschangriff #Überwachung #Vorratsdatenspeicherung #Videoüberwachung #Rasterfahndung #Datenbanken #Freizügigkeit #Unschuldsvermutung #Verhaltensänderung
Created: 2021-01-02 10:34:07


Kommentar abgeben

For further confidential communication, we recommend that you include a reference to a secure messenger, such as Session, Bitmessage, or similar, below the comment text.
To prevent the use of this form by spam robots, please enter the portrayed character set in the left picture below into the right field.

We in the Web2.0


Diaspora Mastodon Twitter Youtube Tumblr Flickr FsA Wikipedia Facebook Bitmessage FsA Song


Impressum  Privacy  Sitemap