GSM 2
GSM 2
GSM 2
Prepared by:
Leen F. Arikat
Introduction
With GSM, systems for mobile communication
reached a global scale. In the western world, it
seems everyone has their own mobile phone, and
GSM has taken more and more of the market.
GSM allows users to roam seamlessly between
networks, and separate the user identity from the
phone equipment. In addition the GSM system
provides the functional basis for the 3rd generation
mobile system, UMTS.
Some GSM Facts
Nearly 1 billion subscribers worldwide
Estimated that worldwide mobile phone fraud will reach
$40 billion dollars
US Law enforcement agents have found that 80% of
drug dealers arrested in US using cloned mobile phones.
Ironically, Pablo Escobar the top Columbian drug dealer
was tracked down by monitoring his mobile phone
activity.
Two aspects relevant to a Forensic Analyst
Has the phone been used for a criminal act?
Can the phone be used to secure a conviction?
Some GSM Facts
The European Telecommunication Standards
Institute (ETSI) regulates the GSM standard
(all 4000 pages of it!).
Any equipment used on a GSM network has
to have approval by the ETSI.
All MS’s are independent from any network.
What are the components of a
GSM network?
Subscriber Equipment
IMSI
The data encryption key (Ki)
IMSI can be obtained;
5. Dials a number
6. Requests MS switch off encryption 7. Encrypts then passes on the call request
Spoofing BTS
Spoofing MS
GSM Security Operation
Cell Seizure:
Paraben Cell Seizure is a piece of
software that serves the main purpose of
collection and examining data pulled from
various types of cell phones.
Cell Seizure Tool
The main goal of Cell Seizure is to
organize and report various types of files.
Cell Seizure is able to generate
comprehensive HTML reports of acquired
data.
The software is able to retrieve
deleted files and check for file integrity.
Advantages of Cell Seizure
The network