Cellular Analysis for Legal Professionals Larry E. Daniel Digital Forensic Examiner and Cellular Analyst EnCE, DFCP, BCE, ACE, CTNS, AME
|
|
|
- Julie Gibbs
- 10 years ago
- Views:
Transcription
1 Cellular Analysis for Legal Professionals Larry E. Daniel Digital Forensic Examiner and Cellular Analyst EnCE, DFCP, BCE, ACE, CTNS, AME Copyright 2015, Guardian Digital Forensics
2 Cellular Telephone Easy to Understand Just a two way radio (Talks) Sends on one channel (Listens) Receives on another channel But does both all the time. Channel (frequency) 610 Channel (Frequency) 1560
3 For cell phone to make or receive a call, it needs two radio channels One channel to receive and on channel to transmit Each cellular company only has a limited number of channels to use. Cellular Telephone Easy to Understand Channel (frequency) 610 Channel (Frequency) 1560
4 The Cellular System Cell Towers
5
6 The Cellular System A Cell Site Antennas send and receive signals from cell phones The Base Station Transceiver Manages the tower and calls on the tower. Talks to the phone network via cables.
7 Cellular Tower Sectors Sector Layout and Azimuth Cell towers can have from0 to 6 sectors. Most common is three sectors.
8 3 1 2 Example of expected 3 sector cell tower radio coverage using prediction software Image Source:
9 Anatomy of the Cellular System Lots of cell sites are connected together to make up the cellular network. Groups of cell sites talk to Radio Network Controllers via cables.
10 The Cellular System In a Nutshell. Cell phones talk to towers. Everything else talks to the standard telephone network over telephone cables.
11 Cell coverage range is determined by customer needs. Each Cellular Site may have 200 Channels (100 calls). In rural areas with small populations this works fine.
12 As subscribers increase: Go Small to Serve More Customers Each Cellular Site may have 200 Channels (100 calls). Rather than have 1 big cell that serves 100 people, we have 7 cells, that serve 700 people. January 11,
13 January 11, January 11, This group of frequencies can be used again January 11, January 11, City Wide Coverage By repeating this pattern of 7 cell clusters, any size city can be fully covered by a cellular system by allowing frequencies to be used over and over again.
14 Example of expected 3 sector cell towers radio coverage using prediction software
15 CDMA Best Server Prediction Map using prediction software
16 GSM Best Server Prediction Map using prediction software
17 Registration Tower A Tower B On power up your phone tunes to a known frequency and starts to listen 4.1 Miles 1.3 Miles
18 January 11, 2007 Phone scans neighboring cells for best signal and will select a cell as needed for when a call connects. January 11, 2007 January 11, 2007
19 January 11, 2007 When a call connects the phone will stay on the selected tower until it needs to change to a new tower. (hand off) January 11, 2007 January 11, 2007
20 The Hook Up! Choosing a Tower Tower A Tower B Pick me! Pick me! How does the phone choose a tower?
21 Registration On power up the cell phone connects to the Best Signal Tower A 95dbm Tower B 85dbm 4.1 Miles 1.3 Miles The closest tower will normally have the best signal
22 Registration On power up the cell phone connects to the Best Signal Tower A 95dbm Tower B 85dbm 3.0 Miles 3.0 Miles When equally distant from both towers, the power output from the antennas may come into play.
23 Registration On power up the cell phone connects to the Best Signal Tower A 95dbm Tower B 85dbm 3.0 Miles 3.0 Miles I can t see you Tower A! When equally distant from both towers, clutter may be the deciding factor.
24 Registration On power up the cell phone connects to the Best Signal Tower A 95dbm Sorry, all channels are busy! Tower B 85dbm 3.0 Miles 3.0 Miles Channels must be available for the phone to use.
25 Operation The cell phone connects or hands off to the Best Signal as needed as it moves around. Tower A Tower B 95dbm 85dbm
26 As the cell phone moves around, it will change to a new cell tower as needed to maintain the call. This is called a hand off. Source : images.yourdictionary.com
27 Call Detail Records (CDRs) Legal Proof of a Service Provided A Technical Road Map of a Call A Financial Transaction Record Used to determine the cell tower used by a phone. Tower Locations are then plotted on a map.
28 Call Detail Records (CDRs) Network Element Name Mobile Directory Number Dialed Digit NumberCall Direction Seizure Dt Tm Seizure Duration First Serving Cell Site First Serving Cell Face Last Serving Cell Site Last Serving Cell Face Calling Party Number Richmond (434) /24/200911: Richmond (434) /24/200912: Richmond (434) /24/200913: Richmond (434) /24/200913: Chantilly (434) /25/20099: Chantilly (434) /25/200912: Chantilly (434) /25/200919: Chantilly (434) /25/200919: Chantilly (434) /25/200919: Chantilly (434) /25/200919: Chantilly (434) /25/200920: Chantilly (434) /25/200920: Chantilly (434) /25/200920: Chantilly (434) /25/200922: Richmond (434) /25/20097: Richmond (434) /25/20097: Richmond (434) /25/20099: Richmond (434) F 7/25/200911: Richmond (434) F 7/25/200911: Richmond (434) F 7/25/200911: Richmond (434) F 7/25/200911: Note the cell face numbers are 2,3,4.
29 Cell Site Listing Switch Name Cell Number E-911 Latitude Degrees (NAD83) E-911 Longitude Degrees (NAD83) Street Address City State Zip Code Sector Azimuth (deg) Richmond West Osbourne Rd. Farmville VA D1 50 Richmond West Osbourne Rd. Farmville VA D2 180 Richmond West Osbourne Rd. Farmville VA D3 290 Richmond Back Hampden-Sydney Rd. Prince Edward VA D1 60 Richmond Back Hampden-Sydney Rd. Prince Edward VA D2 180 Richmond Back Hampden-Sydney Rd. Prince Edward VA D3 300 Richmond Persimmon Tree Fork Rd. Farmville VA D1 20 Richmond Persimmon Tree Fork Rd. Farmville VA D1 20 Richmond Persimmon Tree Fork Rd. Farmville VA D2 140 Richmond Persimmon Tree Fork Rd. Farmville VA D3 260 Richmond Winterpock Rd. Midlothian VA D1 60 Richmond Winterpock Rd. Midlothian VA D2 180 Richmond Winterpock Rd. Midlothian VA D3 300 Richmond Genito Road Moseley VA D1 60 Richmond Genito Road Moseley VA D2 180 Richmond Genito Road Moseley VA D3 300 Richmond TREXLER RD Richmond VA D1 30 Richmond TREXLER RD Richmond VA D2 145 Richmond TREXLER RD Richmond VA D3 270 Richmond THREE CHOPT RD. Richmond VA D1 60 Richmond THREE CHOPT RD. Richmond VA D2 180 Richmond THREE CHOPT RD. Richmond VA D3 300 Richmond Midlothian Turnpike Richmond VA D1 50 Richmond Midlothian Turnpike Richmond VA D2 170 Richmond Midlothian Turnpike Richmond VA D3 290 Richmond Coalfield Road Midlothian VA D1 60 Richmond Coalfield Road Midlothian VA D2 180 Richmond Coalfield Road Midlothian VA D3 300 CHAN STORK RD FREDERICKSBURG VA D1 4 CHAN STORK RD FREDERICKSBURG VA D2 124 CHAN STORK RD FREDERICKSBURG VA D3 244 CHAN ST ROUTE 631 SUMMER DUCK VA D1 4 CHAN ST ROUTE 631 SUMMER DUCK VA D2 124 CHAN ST ROUTE 631 SUMMER DUCK VA D3 244 VA Fairmont Avenue Winchester VA D1 4 VA Fairmont Avenue Winchester VA D2 124 VA Fairmont Avenue Winchester VA D3 244 VA University Drive Winchester VA D1 4 VA University Drive Winchester VA D2 124 VA University Drive Winchester VA D3 244 VA Eddys Lane Winchester VA D1 70 VA Eddys Lane Winchester VA D2 190 VA Eddys Lane Winchester VA D3 310
30 Cell Towers Are Divided Into Sectors Some towers have no sectors and some have 2, 3, 4 or 6 sectors
31 How far can a cell phone be from a tower and still make or receive a phone call? Assuming a perfectly flat earth, with a very tall cell tower. And the cell tower must be at maximum legal allowable power. And no other cell towers in the area GSM (AT&T or T-Mobile) the maximum theoretical distance is 22 about miles. CDMA (Sprint, Verizon, etc.) the maximum theoretical distance is about 35 miles. What Limits the Distance? Terrain Ground clutter Proximity of other cell towers. (Signal Interference) Signal strength at the tower The cell phone being used
32 Tower locations can be plotted on a map using the information from tower lists. <.75 miles
33 How far can a cell phone be from a tower and still make or receive a phone call? The practical connection distance for a cell phone is determined by the distance and density of other cell towers in the area for that carrier.
34 How far can a cell phone be from a tower and still make or receive a phone call? The practical connection distance for a cell phone is determined by the distance and density of other cell towers in the area for that carrier.
35 Locating Phones The Methods Call Detail Records This is the most common type of location analysis perform for cell phones. Call detail records record the cell site that was used to connect a phone call, and in some cases, a text message. ATT (GSM) Provides the cell tower used for voice calls and text messages and data transmissions. Data transmission locations is considered unreliable and should not be plotted for the analysis of a cell phone s location. Sprint, Verizon, Metro PCS (CDMA) Provides the cell tower used for voice calls only. They send all text messages through gateways.
36 Locating Phones The Methods Call Detail Records Call detail records record the cell site that was used to connect a phone call, and in some cases, a text message. You cannot triangulate the location of a phone using call detail records. The cell tower and sector (side) of the tower used by a phone can be determined in most cases (Not for Cricket) At most you can determine the cell tower location and a general area where a phone could be, you cannot pinpoint a phone using call detail records.
37 Locating Phones The Methods Call Detail Records
38 Locating Phones The Methods Call Detail Records
39 Locating Phones The Methods Call Detail Records
40 Locating Phones The Methods Call Detail Records
41 Locating Phones The Methods Per Call Measurement Data or Reveal Records Sprint and Verizon Only PCMD is NOT a call detail record. Call detail records have been in use for many years and are widely accepted as being an accurate record of phone call activity. Per Call Measurement data is used for load balancing, to determine system health and optimizing the cellular system over time. It is not used as a method for locating cell phones. PCMD is a measurement of the distance of the phone from the tower using Round Trip Delay (RTD) The accuracy is affected by several factors: Multi Pathing Repeaters in the network A phone in a multiple hand off situation.
42 Locating Phones The Methods Per Call Measurement Data or Reveal Records Sprint and Verizon Only
43 Locating Phones The Methods Per Call Measurement Data or Reveal Records Sprint and Verizon Only
44 Locating Phones The Methods IMSI Catchers IMSI Catchers basically trick phones into either sharing information with them or by forcing a phone to connect to them. They can work because the encryption for 2G and 3G has been compromised for a long time. By bypassing the encryption, an IMSI catcher can trick a phone into making a connection without authenticating properly with the cellular network.
45 Locating Phones The Methods IMSI Catchers GSM (2G cell network) Identifiers IMEI: International Mobile Equipment Identifier Identifies a handset. Easily changed, illegal to do so. IMSI: International Mobile Subscriber Identifier Secret? Kind of. Identifies an account - stored in SIM (Subscriber Identification Module) card. TMSI: Temporary Mobile Subscriber Identifier Assigned by network to prevent IMSI transmission. Auth with IMSI, use TMSI from then on Unless, of course, the BTS asks for it.
46 Locating Phones The Methods IMSI Catchers Tricking GSM Phones We want to trick GSM phones into thinking that our fake base station is a genuine and better one Then he will handover to our base station Better Stronger signals. Will trigger handover Genuine Consistent with nearby base station information Nearby base station will provide handover candidate base stations and frequencies. Copy that information into our fake station.
47 Locating Phones The Methods Tricking GSM Phones IMSI Catchers 3G network has mended the vulnerability of GSM Users and base stations must authenticate each other However, we may selectively jam 3G phones When 3G network fails, phones will fall back to GSM mode
48 Locating Phones The Methods StringRay and Other IMSI catchers Can work in Active or Passive Mode Can intercept voice and text content. Can localize (locate) a cellular device. PASSIVE MODE: IMSI Catchers Simulates the behavior of a cell tower, but does not act as a cell tower. The activity of base station surveys allows extracting information on cell sites that includes identification numbers, signal strength, and signal coverage areas. StingRay operates as a mobile phone and collects signals sent by cell stations near the equipment
49 Locating Phones The Methods StringRay and Other IMSI catchers ACTIVE MODE IMSI Catchers StingRay equipment operating in active mode will force each cellular device in a predetermined area to disconnect from its legitimate service provider cell site and establish a new connection with the attacker s StingRay system. StingRay broadcasts a pilot signal that is stronger than the signals sent by legitimate cell sites operating in the same area, forcing connections from the cellular device in the area covered by the equipment.
50 Locating Phones The Methods StringRay and Other IMSI catchers ACTIVE MODE IMSI Catchers The principal operations made by the StingRay are: Data Extraction from cellular devices StingRay collects information that identifies a cellular device (i.e. IMSI, ESN) directly from it by using radio waves. Run Man In The Middle attacks to eavesdrop on Communications Content Writing metadata to the cellular device Denial of Service, preventing the cellular device user from placing a call or accessing data services. Forcing an increase in signal transmission power Forcing an abundance of signal transmissions Tracking and locating
51 Locating Phones The Methods IMSI Catchers
52 Locating Phones The Methods IMSI Catchers
53 Locating Phones The Methods Emergency 911 System Police can activate the E911 system to actively track a phone s location in near real time. Supposed to only occur in the case of an exigent circumstance. Threat to national security Immediate threat to a person or persons In reality, phone companies will start the system even without the proper paperwork. The phone companies charge for this service.
54 E-911 Location
55 E-911 Location E-911 System Consists of 2 Phases Phase 1 and Phase 2 Phase 2 is the best location Phase 2 is not always available
56 E-911 Location E-911 System Consists of 2 Phases Phase 1 requirement is: Calling Number Sector of a cell tower (hundreds of acres)
57 E-911 Location E-911 System Consists of 2 Phases Phase 2 requirement is: Calling Number GPS location with 150 feet accuracy. Must be manually updated by 911 operator to get best accuracy. This is called a bid.
58 58 Locating Phones The Methods Emergency 911 System
59 Correct Case Analysis Steps Perform an independent analysis of the telephony facts of the matter. Build a timeline Place calls along timeline Develop Map of towers for correct date of incident (Radio Frequency Plan aka Coverage Map) Show location and path of phones based on discovery Get original data sources AFTERanalysis of phones, THEN review incident in light of facts to form opinion, rather than unscientifically using cell phone evidence to fit the desired facts of the incident.
60 Key Takeaways The analysis is only as good as the analyst While this seems simple, it is very complex: Not just drawing towers on a map. Must understand the cellular system. Must understand the different carriers technology. Must be able to properly interpret call detail records. Must be able to explain in plain language to juries.
61 Questions? Contact Information: Web: Blog: Phone: Digital Forensics for Legal Professionals By Larry E. Daniel and Lars E. Daniel
Review of Cell Phone Technology
Review of Cell Phone Technology Types of Cell Technology - CDMA - GSM - iden - TDMA CDMA Code Division Multiple Access (CDMA) CDMA Code Division Multiple Access. In reality it is cdmaone (2G) or CDMA2000
GSM Research. Chair in Communication Systems Department of Applied Sciences University of Freiburg 2010
Chair in Communication Systems Department of Applied Sciences University of Freiburg 2010 Dennis Wehrle, Konrad Meier, Dirk von Suchodoletz, Klaus Rechert, Gerhard Schneider Overview 1. GSM Infrastructure
Cell Phone Tracking Evidence. An excerpt from the upcoming book: Cellular Location Evidence for Legal Professionals.
Cell Phone Tracking Evidence An excerpt from the upcoming book: Cellular Location Evidence for Legal Professionals. By Larry E. Daniel, EnCE, DFCP, ACE, BCE, CTNS Introduction: We live in a world today
SPYTEC 3000 The system for GSM communication monitoring
SPYTEC 3000 The system for GSM communication monitoring The SPYTEC 3000 system is intended for passive (if system encryption is absent of if A5.2 encryption is used) or semi-active (if A5.1 encryption
Work In Progress: Cell Phone Forensics for Search and Rescue. George Durkee, NPS
Work In Progress: Cell Phone Forensics for Search and Rescue George Durkee, NPS Can you communicate with subject? yes - Have him call 911 so we can get his locaiton. - Tell him to stay put. Call local
Basic Network Design
Frequency Reuse and Planning Cellular Technology enables mobile communication because they use of a complex two-way radio system between the mobile unit and the wireless network. It uses radio frequencies
GSM and UMTS security
2007 Levente Buttyán Why is security more of a concern in wireless? no inherent physical protection physical connections between devices are replaced by logical associations sending and receiving messages
GSM Risks and Countermeasures
GSM Risks and Countermeasures STI Group Discussion and Written Project Authors: Advisor: Johannes Ullrich Accepted: February 1, 2010 Abstract Recent research has shown that GSM encryption can be cracked
RADIUS. Brief brochure. Product Purpose
Product Purpose The Product is designed for searching, intercepting, registering and analyzing of communication sessions as well as service information circulating in cellular GSM networks without encryption
Wireless Phone GSM tracking. Denis Foo Kune, John Koelndorfer, Nick Hopper, Yongdae Kim
Wireless Phone GSM tracking Denis Foo Kune, John Koelndorfer, Nick Hopper, Yongdae Kim Can someone track your phone? GPS Need access to phone Cell network trilateration/triangulation Multiple base stations
The GSM and GPRS network T-110.300/301
The GSM and GPRS network T-110.300/301 History The successful analog 1:st generation mobile telephone systems proved that there is a market for mobile telephones ARP (AutoRadioPuhelin) in Finland NMT (Nordic
Department of Public Safety and Correctional Services. Non-Jamming Cell Phone Pilot Summary
Department of Public Safety and Correctional Services Non-Jamming Cell Phone Pilot Summary January 20, 2010 INTRODUCTION The Department s Cell Phone Pilot is a follow-up to the September 2009 Cell Phone
How To Get A Phone In The United States
Telephone Systems COMP476 Home Telephones Plain Old Telephone Service (POTS) provides a twisted pair connection from your phone to the central office. You own your home wiring and the telephone company
Telecommunications and the Information Age ET108B. Cell Phone Network
Telecommunications and the Information Age ET108B Cell Phone Network The Cellular Telephone Network Cellular Telephone Features Carrying Data Across the Cellular Network Satellite Telephone Service Cellular
GSM Databases. Virginia Location Area HLR Vienna Cell Virginia BSC. Virginia MSC VLR
Update ( Update Procedure) Network Mobiles Maryland Maryland Other Rockville Bethesda Maryland Mobile Mobile Cell Cell HLR Vienna Cell 12-Jun-14 22:48 (Page 1) This sequence diagram was generated with
Ch 2.3.3 GSM PENN. Magda El Zarki - Tcom 510 - Spring 98
Ch 2.3.3 GSM In the early 80 s the European community decided to work together to define a cellular system that would permit full roaming in all countries and give the network providers freedom to provide
Analysis of Methods for Mobile Device Tracking. David Nix Chief Scientific Advisor
Analysis of Methods for Mobile Device Tracking David Nix Chief Scientific Advisor October 2013 Table of Contents 1. Document Purpose and Scope 3 2. Overview 3 2.1 Mobile Device Penetration 3 2.2 Mobile
2 System introduction
2 System introduction Objectives After this chapter the student will: be able to describe the different nodes in a GSM network. be able to describe geographical subdivision of a GSM network. be able to
Mobile Communications
October 21, 2009 Agenda Topic 2: Case Study: The GSM Network 1 GSM System General Architecture 2 GSM Access network. 3 Traffic Models for the Air interface 4 Models for the BSS design. 5 UMTS and the path
Global System for Mobile Communication Technology
Global System for Mobile Communication Technology Mobile Device Investigations Program Technical Operations Division DHS - FLETC GSM Technology Global System for Mobile Communication or Groupe Special
MicroNet dual band IMSI and IMEI catcher
MicroNet dual band IMSI and IMEI catcher Datasheet Models: MNG-300-01 (GSM 900, 1800) MNG-300-02 (GSM 850, 1900) Document Nr OTK-012010 Date: 10-09-2012, revision B Table of contents 1. Acronyms and abbreviations
DOCUMENT REFERENCE: SQ312-002-EN. SAMKNOWS SMARTPHONE-BASED TESTING SamKnows App for Android White Paper. March 2014
DOCUMENT REFERENCE: SQ312-002-EN SAMKNOWS SMARTPHONE-BASED TESTING SamKnows App for Android White Paper March 2014 SAMKNOWS QUALITY CONTROLLED DOCUMENT. SQ REV LANG STATUS OWNER DATED 312 002 EN FINAL
ENGN4536 Mobile Communications
ENGN4536 Mobile Communications Dr Thushara Abhayapala Department of Engineering Faculty of Engineering & Information Technology Australian National University [email protected] http://www.webct.anu.edu.au
Wireless Cellular Networks: 1G and 2G
Wireless Cellular Networks: 1G and 2G Raj Jain Professor of Computer Science and Engineering Washington University in Saint Louis Saint Louis, MO 63130 Audio/Video recordings of this lecture are available
Location enhanced Call Center and IVR Services Technical Insights about Your Calling Customer s Location
Location enhanced Call Center and IVR Services Technical Insights about Your Calling Customer s Location Executive Summary Enterprise operations can save money and increase profits by enhancing service
WIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006
WIRELESS SECURITY Information Security in Systems & Networks Public Development Program Sanjay Goel University at Albany, SUNY Fall 2006 1 Wireless LAN Security Learning Objectives Students should be able
How To Understand Cellular Communications
Definition Cellular Communications A cellular mobile communications system uses a large number of low-power wireless transmitters to create cells the basic geographic service area of a wireless communications
ETNO Reflection Document on the Customs classification of Mobile Phones
ETNO Reflection Document on the Customs classification of Mobile Phones December 2008 Executive summary Mobile phones are covered by the Information Technology Agreement (ITA), but other Information and
Wireless Broadband Access
Wireless Broadband Access (Brought to you by RMRoberts.com) Mobile wireless broadband is a term used to describe wireless connections based on mobile phone technology. Broadband is an electronics term
How To Understand The Gsm And Mts Mobile Network Evolution
Mobile Network Evolution Part 1 GSM and UMTS GSM Cell layout Architecture Call setup Mobility management Security GPRS Architecture Protocols QoS EDGE UMTS Architecture Integrated Communication Systems
ODOT Surveyor s Conference
Introduction to This document describes the process that will enable you to access the ODOT servers and Microsoft Outlook (E-mail) when you are away from your office and not on the internet. The process
Wireless Mobile Telephony
Wireless Mobile Telephony The Ohio State University Columbus, OH 43210 [email protected] http://www.cis.ohio-state.edu/~durresi/ 1 Overview Why wireless mobile telephony? First Generation, Analog
9.1 Introduction. 9.2 Roaming
9 Location Updating Objectives After this chapter the student will: be able to define the concepts of roaming and location updating. be able to name the different types of location updating and why they
Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur
Module 5 Broadcast Communication Networks Lesson 9 Cellular Telephone Networks Specific Instructional Objectives At the end of this lesson, the student will be able to: Explain the operation of Cellular
Analysis of GSM Network for Different Transmission Powers
Analysis of GSM Network for Different Transmission Powers Mandeep Singh 1, Supreet Kaur 2 1,2 (Department of Electronics and Communication Engineering, Punjabi University, Patiala, India) Abstract: To
An Example of Mobile Forensics
An Example of Mobile Forensics Kelvin Hilton K319 kchilton@staffsacuk [email protected] www.soc.staffs.ac.uk/kch1 Objectives The sources of evidence The subscriber The mobile station The network
Environmental Monitoring: Guide to Selecting Wireless Communication Solutions
Environmental Monitoring: Guide to Selecting Wireless Communication Solutions By: Scott South Published in WaterWorld, January 2005 (Page 48) Rapidly growing demands for information and increased productivity
ACCESS CHARGE A fee charged subscribers or other telephone companies by a local exchange carrier for the use of its local exchange networks.
Glossary of Telecommunications Terms (Source: Federal Communications Commission) ACCESS CHARGE A fee charged subscribers or other telephone companies by a local exchange carrier for the use of its local
Global System for Mobile Communications (GSM)
Global System for Mobile Communications (GSM) Nguyen Thi Mai Trang LIP6/PHARE [email protected] UPMC/PUF - M2 Networks - PTEL 1 Outline Principles of cellular networks GSM architecture Security
How To Understand And Understand The Power Of A Cdma/Ds System
CDMA Technology : Pr. Dr. W. Skupin www.htwg-konstanz.de Pr. S. Flament www.greyc.fr/user/99 On line Course on CDMA Technology CDMA Technology : Introduction to Spread Spectrum Technology CDMA / DS : Principle
http://www.sprint.com/landings/airave/files/airave_access_point_faqs.pdf?intmkt=mkt:ms:20131 030:AIR:MSU:EEE:FAQs
http://www.sprint.com/landings/airave/files/airave_access_point_faqs.pdf?intmkt=mkt:ms:20131 030:AIR:MSU:EEE:FAQs Sprint AIRAVE FAQs What is the Sprint AIRAVE and how does it work? The Sprint AIRAVE is
Mobile Device Investigations Program (MDIP) A Brief History of Wireless Technology
Federal Law Enforcement Training Center Technical Operations Division Mobile Device Investigations Program (MDIP) A Brief History of Wireless Technology (b)(7)e (b)(6) Course Objective Describe the evolution
Defending mobile phones. Karsten Nohl, [email protected] Luca Melette, [email protected]
Defending mobile phones Karsten Nohl, [email protected] Luca Melette, [email protected] GSM networks provide the base for various attacks SS7 Phone Base station GSM backend network User database (HLR) Vulnerability
GSM Network and Services
GSM Network and Services Cellular networks GSM Network and Services 2G1723 Johan Montelius 1 The name of the game The number one priority for mobile/cellular networks is to implement full-duplex voice
HOW W I R E L E S S T E C H N O L O G Y WORKS
HOW WORKS OW ORKS WHAT S INSIDE Inside your wireless phone, there is a compact speaker, a microphone, a keyboard, a display screen, and a powerful circuit board with microprocessors that make each phone
SS7 & LTE Stack Attack
SS7 & LTE Stack Attack Ankit Gupta Black Hat USA 2013 [email protected] Introduction With the evolution of IP network, Telecom Industries are using it as their core mode of communication for their network
Mobile Communications TCS 455
Mobile Communications TCS 455 Dr. Prapun Suksompong [email protected] Lecture 26 1 Office Hours: BKD 3601-7 Tuesday 14:00-16:00 Thursday 9:30-11:30 Announcements Read the following from the SIIT online
Network Communications System. Redefining Intelligent Utility Communications
Network Communications System Redefining Intelligent Utility Communications Technology that takes you from today to tomorrow. FlexNet Technology you can trust FlexNet is a robust, high-powered solution
5.1 Overview of Wireless Card Activation and Configuration
encor! enetworks TM Version A.5, January 2013 2013 Encore Networks, Inc. All rights reserved. Activating a Wireless Card in a Cellular Carrier Network Wireless connections use radiofrequencies (RF) through
Cell Service and Wireless Remedies for Reception & Coverage. Panel Host Kathleen Austin Panel Participants Dan Leaf Gordon Mansfield Richard Sherwin
Cell Service and Wireless Remedies for Reception & Coverage Panel Host Kathleen Austin Panel Participants Dan Leaf Gordon Mansfield Richard Sherwin MDU attach rate is approximately 17% Why Is This Important?
DOCUMENT REFERENCE: SQ312-003-EN. SAMKNOWS SMARTPHONE-BASED TESTING SamKnows App for Android White Paper. May 2015
DOCUMENT REFERENCE: SQ312-003-EN SAMKNOWS SMARTPHONE-BASED TESTING SamKnows App for Android White Paper May 2015 SAMKNOWS QUALITY CONTROLLED DOCUMENT. SQ REV LANG STATUS OWNER DATED 312 003 EN FINAL JP
Mobile Phone Network Security
Mobile Phone Network Security Internet Security [1] VU Adrian Dabrowski, Markus Kammerstetter, Georg Merzdovnik, Stefan Riegler and Aljosha Judmayer [email protected] Mobile phone networks 1G
Location management Need Frequency Location updating
Lecture-16 Mobility Management Location management Need Frequency Location updating Fig 3.10 Location management in cellular network Mobility Management Paging messages Different paging schemes Transmission
Mobile Phone Security. Hoang Vo Billy Ngo
Mobile Phone Security Hoang Vo Billy Ngo Table of Content 1. Introduction Page 2 1.1 Analog Network Page 2 1.2 Digital Network Page 2 2. Security Protocols Page 4 2.1 Analog Page 4 2.2 Digital Page 5 3.
Cell Planning in GSM Mobile
Cell Planning in Mobile JALAL JAMAL HAMAD-AMEEN M.Sc, College of Engineering, Electrical Engineering Dept. Salahaddin University, Erbil, IRAQ E-mail : [email protected] Abstract: Cell planning
GSM v. CDMA: Technical Comparison of M2M Technologies
GSM v. CDMA: Technical Comparison of M2M Technologies Introduction Aeris provides network and data analytics services for Machine-to- Machine ( M2M ) and Internet of Things ( IoT ) applications using multiple
AIRAVE Frequently Asked Questions
AIRAVE Frequently Asked Questions 2008 Sprint - 1-2008 Sprint. Sprint and the logo are trademarks of Sprint. Other marks are the property of their respective owners. AIRAVE FAQs General 1. What do I need
Mobile Computing. Basic Call Calling terminal Network Called terminal 10/25/14. Public Switched Telephone Network - PSTN. CSE 40814/60814 Fall 2014
Mobile Computing CSE 40814/60814 Fall 2014 Public Switched Telephone Network - PSTN Transit switch Transit switch Long distance network Transit switch Local switch Outgoing call Incoming call Local switch
EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak
Path Loss Radio Wave Propagation The wireless radio channel puts fundamental limitations to the performance of wireless communications systems Radio channels are extremely random, and are not easily analyzed
TETRA Security for Poland
TETRA ASSOCIATION TETRA Security for Poland Brian Murgatroyd TETRA ASSOCIATION former Chairman Security and Fraud Prevention Group Warren Systems (SFPG) Independent Security Consultant [email protected]
1 Introduction to mobile telecommunications
1 Introduction to mobile telecommunications Mobile phones were first introduced in the early 1980s. In the succeeding years, the underlying technology has gone through three phases, known as generations.
communication over wireless link handling mobile user who changes point of attachment to network
Wireless Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers! computer nets: laptops, palmtops, PDAs, Internet-enabled phone promise anytime untethered Internet
Mobile phone localization based human search methods Marcin Jozefowicz, TOPR
Mobile phone localization based human search methods Marcin Jozefowicz, TOPR Andrzej Górka, TOPR IKAR - LAKE TAHOE 2014 Mobile phone localization based human search methods General information: Difficulties:
Mobile network security report: Poland
Mobile network security report: Poland GSM Map Project [email protected] Security Research Labs, Berlin February 2015 Abstract. Mobile networks differ widely in their protection capabilities against common
Monitoring mobile communication network, how does it work? How to prevent such thing about that?
Monitoring mobile communication network, how does it work? How to prevent such thing about that? 潘 維 亞 周 明 哲 劉 子 揚 (P78017058) (P48027049) (N96011156) 1 Contents How mobile communications work Why monitoring?
Chapters 1-21 Introduction to Wireless Communication Systems
Chapters 1-21 Introduction to Wireless Communication Systems Yimin Zhang, Ph.D. Department of Electrical & Computer Engineering Villanova University http://yiminzhang.com/ece8708 Yimin Zhang, Villanova
Verint GI2. Gi2 Features. 2010 Verint Systems Inc. All rights reserved.
Verint GI2 Gi2 Features 2010 Verint Systems Inc. All rights reserved. Channelyser Function The Channelyser allows the user to interrogate the local networks and display the Broadcast information. This
Security Alarm Systems
Security Alarm Systems Monitored alarm systems offer clients peace of mind as they activate on intrusion or tampering at the property and ensure any security alarm will have an appropriate response. However,
GSM Channels. Physical & Logical Channels. Traffic and Control Mutltiframing. Frame Structure
GSM Channels Physical & Logical Channels Traffic and Control Mutltiframing Frame Structure Engr. Mian Shahzad Iqbal Lecturer Department of Telecommunication Engineering Radio Interface The radio interface
Mobile Communications Chapter 4: Wireless Telecommunication Systems slides by Jochen Schiller with modifications by Emmanuel Agu
Mobile Communications Chapter 4: Wireless Telecommunication Systems slides by Jochen Schiller with modifications by Emmanuel Agu Market GSM Overview Services Sub-systems Components Prof. Dr.-Ing. Jochen
Chief Information Office Safety and Health
Chief Information Office Safety and Health United States Department of Agriculture Forest Service Technology & Development Program March 2010 6600/6700 1066 2320P MTDC Road Testing Cell Phone Amplifiers
Hello viewers, welcome to today s lecture on cellular telephone systems.
Data Communications Prof. A. Pal Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture minus 31 Cellular Telephone Systems Hello viewers, welcome to today s lecture
Chapter 2 Configuring Your Wireless Network and Security Settings
Chapter 2 Configuring Your Wireless Network and Security Settings This chapter describes how to configure the wireless features of your DG834N RangeMax TM NEXT Wireless ADSL2+ Modem Router. For a wireless
Development of Wireless Networks
Development of Wireless Networks Cellular Revolution In 1990 mobile phone users populate 11 million. By 2004 the figure will become 1 billion Phones are most obvious sign of the success of wireless technology.
Spectrum and Power Measurements Using the E6474A Wireless Network Optimization Platform
Application Note Spectrum and Power Measurements Using the E6474A Wireless Network Optimization Platform By: Richard Komar Introduction With the rapid development of wireless technologies, it has become
Commercial Motor Vehicle Safety and Security Systems Technology Wireless Mobile Communications
Commercial Motor Vehicle Safety and Security Systems Technology Wireless Mobile Communications Objective Satellite- and cellular-based mobile two-way communication tracking systems for commercial motor
Cellular Network Organization. Cellular Wireless Networks. Approaches to Cope with Increasing Capacity. Frequency Reuse
Cellular Network Organization Cellular Wireless Networks Use multiple low-power transmitters (100 W or less) Areas divided into cells Each served by its own antenna Served by base station consisting of
2G Network Sunset: What it Means and How it Affects You
2 Network Sunset: What it Means and How it Affects You A look at the future of cellular technology and what it means to the subprime automotive market Brought to you by: Executive Summary To begin, let
CELL PHONE TRACKING. Index. Purpose. Description. Relevance for Large Scale Events. Options. Technologies. Impacts. Integration potential
CELL PHONE TRACKING Index Purpose Description Relevance for Large Scale Events Options Technologies Impacts Integration potential Implementation Best Cases and Examples 1 of 10 Purpose Cell phone tracking
An Oracle White Paper December 2013. The Value of Diameter Signaling in Security and Interworking Between 3G and LTE Networks
An Oracle White Paper December 2013 The Value of Diameter Signaling in Security and Interworking Between 3G and LTE Networks Introduction Today s mobile networks are no longer limited to voice calls. With
CDMA Network Planning
CDMA Network Planning by AWE Communications GmbH www.awe-com.com Contents Motivation Overview Network Planning Module Air Interface Cell Load Interference Network Simulation Simulation Results by AWE Communications
Enabling Modern Telecommunications Services via Internet Protocol and Satellite Technology Presented to PTC'04, Honolulu, Hawaii, USA
CASE STUDY Enabling Modern Telecommunications Services via Internet Protocol and Satellite Technology Presented to PTC'04, Honolulu, Hawaii, USA Stephen Yablonski and Steven Spreizer Globecomm Systems,
GSM System Architecture
Intersystem Operation and Mobility Management David Tipper Associate Professor Graduate Program in Telecommunications and Networking University it of Pittsburgh Telcom 2700 Slides 6 http://www.tele.pitt.edu/tipper.html
Indian Journal of Advances in Computer & Information Engineering Volume.1 Number.1 January-June 2013, pp.1-5 @ Academic Research Journals.
Cellular System Rajat Chugh, Parag Jasoria, Tushar Arora, Nitin Ginotra and Vivek Anand V Semester, Department of Computer Science and Engineering, Dronacharya College of Engineering, Khentawas, Farukhnagar,
Analysis of the Network Performance of the Telecom Service. Providers in Mumbai and Delhi
Analysis of the Network Performance of the Telecom Service Background Providers in Mumbai and Delhi 1. TRAI is regularly monitoring the performance of Telecom Service Providers (TSP) against the benchmarks
CC5500 Interceptor HSS DEVELOPMENT INC. HSS Development Inc. 75S Broadway White Plains, NY 10601 www.secintel.com Tel: 914-304-4333 Fax: 914-368-9729
HSS DEVELOPMENT INC. CC5500 Interceptor HSS Development Inc. 75S Broadway White Plains, NY 10601 www.secintel.com Tel: 914-304-4333 Fax: 914-368-9729 Disclaimers: - All descriptions of HSS products and
GSM BASICS GSM HISTORY:
GSM BASICS GSM HISTORY: In 1982 the Nordic PTTs sent a proposal to CEPT (Conference of European Postal & telegraph Administration) to study and to improve digital cellular technology by forming a team
Wireless LANs vs. Wireless WANs
White Paper Wireless LANs vs. Wireless WANs White Paper 2130273 Revision 1.0 Date 2002 November 18 Subject Supported Products Comparing Wireless LANs and Wireless WANs Wireless data cards and modules,
CONNECTING THE WIRELESS TO THE WIRED NETWORK. By: Russ Schomber VP Network Services, Backhaul Services Group
CONNECTING THE WIRELESS TO THE WIRED NETWORK By: Russ Schomber VP Network Services, Backhaul Services Group Overview Todays Wireless Networks Cell Tower Density Nationally & Locally Typical Cell Tower
CHAPTER 1 1 INTRODUCTION
CHAPTER 1 1 INTRODUCTION 1.1 Wireless Networks Background 1.1.1 Evolution of Wireless Networks Figure 1.1 shows a general view of the evolution of wireless networks. It is well known that the first successful
ClearGain Tower Mounted Amplifiers A Deployment Guide for Wireless Carriers
A Deployment Guide for Wireless Carriers As mobile usage continues to increase, service providers are faced with the challenge of optimizing and expanding their wireless networks to provide new and existing
C Spire Indoor Cell Zone FAQs
C Spire Indoor Cell Zone FAQs General What is the C Spire Indoor Cell Zone? The Indoor Cell Zone enhances indoor coverage in your home or small office. It works like a miniature cell tower in your home
DITCH THE CELL: How the Government is using your client s cell phone against her
DITCH THE CELL: How the Government is using your client s cell phone against her How do cell phones operate? Cellular Network When a cell phone is in idle mode, it regularly communicates with cell towers
ACE IP Wireless Loop Alternatives Wireless Broadband Access Platforms. Russ Hamilton Director Technology May 2, 2008
IP Wireless Loop Alternatives Wireless Broadband Access Platforms Russ Hamilton Director Technology May 2, 2008 Agenda Is Wireless A True Broadband Option? 4G? LTE WiMax Femtocells Fixed Options Backhaul
Security in cellular-radio access networks
Security in cellular-radio access networks Ravishankar Borgaonkar, Oxford University 5G Security Workshop Stockholm, Sweden 11 May 2016 Outline Radio Access Network Layered Security Emerging low cost attacks
Introductory Concepts
Chapter 1 Introductory Concepts 1.1 Introduction Communication is one of the integral parts of science that has always been a focus point for exchanging information among parties at locations physically
