Wireless Phone GSM tracking. Denis Foo Kune, John Koelndorfer, Nick Hopper, Yongdae Kim



Similar documents
Location Leaks on the GSM Air Interface

GSM Research. Chair in Communication Systems Department of Applied Sciences University of Freiburg 2010

CS Cellular and Mobile Network Security: GSM - In Detail

GSM Channels. Physical & Logical Channels. Traffic and Control Mutltiframing. Frame Structure

Ch GSM PENN. Magda El Zarki - Tcom Spring 98

communication over wireless link handling mobile user who changes point of attachment to network

CS Cellular and Mobile Network Security: CDMA/UMTS Air Interface

Global System for Mobile Communication Technology

RADIUS. Brief brochure. Product Purpose

Wireless Broadband Access

Mobile Security. Practical attacks using cheap equipment. Business France. Presented the 07/06/2016. For. By Sébastien Dudek

SPYTEC 3000 The system for GSM communication monitoring

Development of Wireless Networks

Defending mobile phones. Karsten Nohl, Luca Melette,

Analysis of Methods for Mobile Device Tracking. David Nix Chief Scientific Advisor

Attacking GSM Networks as a Script Kiddie Using Commodity Hardware and Software

9.1 Introduction. 9.2 Roaming

Mobile Communications

Cellular Analysis for Legal Professionals Larry E. Daniel Digital Forensic Examiner and Cellular Analyst EnCE, DFCP, BCE, ACE, CTNS, AME

Mobile Communications Chapter 4: Wireless Telecommunication Systems slides by Jochen Schiller with modifications by Emmanuel Agu

Using TEMS Pocket. Johan Montelius

Review of Cell Phone Technology

Monitoring mobile communication network, how does it work? How to prevent such thing about that?

GSM: PHYSICAL & LOGICAL CHANNELS

Global System for Mobile Communications (GSM)

GSM - Global System for Mobile Communications

How To Understand The Gsm And Mts Mobile Network Evolution

The GSM and GPRS network T /301

Chapter 6 Wireless and Mobile Networks

Lecture overview. History of cellular systems (1G) GSM introduction. Basic architecture of GSM system. Basic radio transmission parameters of GSM

GSM LOGICAL CHANNELS

Mobile Computing. Basic Call Calling terminal Network Called terminal 10/25/14. Public Switched Telephone Network - PSTN. CSE 40814/60814 Fall 2014

GSM and UMTS security

Frequency [MHz] ! " # $ %& &'( " Use top & bottom as additional guard. guard band. Giuseppe Bianchi DOWNLINK BS MS UPLINK MS BS

Theory and Practice. IT-Security: GSM Location System Syslog XP 3.7. Mobile Communication. December 18, GSM Location System Syslog XP 3.

ENGN4536 Mobile Communications

Chapters 1-21 Introduction to Wireless Communication Systems

How To Improve Data Speeds On A Mobile Phone In Australia

Let Me Answer That For You: Exploiting Broadcast Information in Cellular Networks

UMTS security. Helsinki University of Technology S Security of Communication Protocols

Global System for Mobile Communication (GSM)

3GPP Wireless Standard

How To Test Gsm Cell Phone Network On A Cell Phone

GSM System. Global System for Mobile Communications

Cellular Network Organization. Cellular Wireless Networks. Approaches to Cope with Increasing Capacity. Frequency Reuse

GSM BASICS GSM HISTORY:

GSM GPRS. Course requirements: Understanding Telecommunications book by Ericsson (Part D PLMN) + supporting material (= these slides)

Mobile Phone Security. Hoang Vo Billy Ngo

Security in cellular-radio access networks

Chapter 3 Cellular Networks. Wireless Network and Mobile Computing Professor: Dr. Patrick D. Cerna

LTE security and protocol exploits

GSM v. CDMA: Technical Comparison of M2M Technologies

Lecture 1. Introduction to Wireless Communications 1

2G/3G Mobile Communication Systems

WIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006

How To Make A Multi-User Communication Efficient

ECE/CS 372 introduction to computer networks. Lecture 13

GSM System Architecture

CS263: Wireless Communications and Sensor Networks

Over the PSTN... 2 Over Wireless Networks Network Architecture... 3

House intercoms attacks

M400gsm GSM Modem Datasheet

10. Wireless Networks

Unlicensed Mobile Access (UMA) Handover and Packet Data Performance Analysis

GSM Radio Part 1: Physical Channel Structure

This course has been retired. View the schedule of current <a href=

GSMPBX version 1.3 Datasheet

How To Understand And Understand The Power Of A Cdma/Ds System

Hacking. Aims. Naming, Acronyms, etc. Sources

EPL 657 Wireless Networks

Revision of Lecture Eighteen

Forensic Identification of GSM Mobile Phones

Environmental Monitoring: Guide to Selecting Wireless Communication Solutions

Product Description. HUAWEI E5330 Mobile WiFi V200R001 HUAWEI TECHNOLOGIES CO., LTD. Issue 03. Date

Wireless Technologies for the 450 MHz band

RESOURCE ALLOCATION FOR INTERACTIVE TRAFFIC CLASS OVER GPRS

Physical Layer. Communication Satellites. ECE 453 Introduction to Computer Networks. Lecture 3 Physical Layer II

FPGAs in Next Generation Wireless Networks

Mobile Phone Network Security

Smart Radio Monitor (SRM) Server Raw Data Format

In-Building Applications How to Differentiate Your Service

LTE450 Julian Bright, Senior Analyst LTE450 Global Seminar 2014 Copyright Ovum All rights reserved.

Mobile Communications TCS 455

Introductory Concepts

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur

Heterogeneous Networks: a Big Data Perspective

Alcatel-Lucent In-building Wireless Continuity Solution for Healthcare

Wireless Access of GSM

M2M and the PICtail Plus Daughter Board

Wireless Cellular Networks: 1G and 2G

Analysis of the Network Performance of the Telecom Service. Providers in Mumbai and Delhi

GSM Databases. Virginia Location Area HLR Vienna Cell Virginia BSC. Virginia MSC VLR

MicroNet dual band IMSI and IMEI catcher

Evaluating GSM A5/1 security on hopping channels

Transcription:

Wireless Phone GSM tracking Denis Foo Kune, John Koelndorfer, Nick Hopper, Yongdae Kim

Can someone track your phone? GPS Need access to phone Cell network trilateration/triangulation Multiple base stations measure the RSSI for a phone Estimate location from signal strength Need access to service provider database WiFi Trilateration works A laptop can measure signal strength of broadcast messages A commercially available WiFi card can listen to those messages Need to know IEEE MAC address

What about the cell towers? Large array of towers broadcasting messages Can those messages reveal a phone s location? Given a person s phone number can we locate the tower they are attached to in a GSM network? No collaboration from the service provider. No support from apps. No GPS, trilateration or WiFi GSM: dominant protocol worldwide Analysis of layer 2/3 messages only.

Cellular network timeline

GSM Today 4.2 Billion worldwide users in 2010 United Nations NTU estimate 5.3 Billion mobile users total Includes users on CDMA, UMTS, LTE. Dominant protocol outside of the US Still widely used worldwide (including US)

Recent works and attacks on GSM Security of GSM, Nohl 09, 10, 11 Breaking the A5/1 cipher (2009) Intercepting GSM call (2010) Impersonating a mobile station (2011) Flooding attack using the SMS protocol Traynor 05 SMS of death, Muliner 11 Location Based Services Application layer of smart platforms, Cheng 06, Kalnis 07 Location information from service provider Triangulation/trilateration, Caffery-Stuber 98 IP layer location information inference Might not work for large networks behind NATs, Krishnamurthi 04

Cellular network architecture Visitor Location Register Home Location Register GSM Air Interface PSTN Service Provider Core Network Mobile Station IMSI: International Mobile Subscriber Identity TMSI: Temporary Mobile Subscriber Identity

The GSM paging procedure Paging Request CCCH Channel Request RACH Immediate Assignment CCCH Paging Response SDCCH Setup and Data

Building the measurement platform Serial cable and reprogrammer cable ($30) OsmocomBB (free) Modified for US frequency bands T-Mobile G1 with custom Android Kernel ($100) Motorola C118 ($30)

OsmocomBB (Open Source Mobile Communication Baseband) http://bb.osmocom.org Open source software -- free GSM implementation Served as the base for our location leak attack o Allows us to see paging & immediate assignment messages on frequencies of our choosing Custom firmware handles OSI layer 1 on phone, layers 2 and 3 handled on laptop Targetted for European users.

Basic mods on OsmocomBB Mods based on Phil Hug and Silvain Munaut PCS protocol on the 1900 MHz band Frequencies in use in the U.S. SIM reader allows reading network information from SIM card Uplink sniffing Switch to uplink frequencies and wait for burst indication

Custom mods 100 lines of code changed to get Osmocom working Minimal changes from the attacker Other nice changes High resolution timestamp for output Following specific immediate assignments Sending uplink data to Wireshark for examination Heavy lifting with Perl scripts Scanning frequencies with directional antenna TMSI deanonymization

OsmocomBB live

The TMobile G1

Hacking the Android Kernel Great tool to measure the layout of cell towers Custom kernel driver, output to a serial device Intercept messages to / from the baseband chip in the kernel. Findings: Possible to intercept network traffic from OSI layer 3 and up Baseband chips controlled by Hayes AT commands. GSM extensions. 3GPP TS 27.007

Android Radio Interface Layer Our Kernel patch lives here We eavesdrop here

Hayes AT Commands revived ATDT phone number Calls that phone number Just like old school modems Tmobile G1 Baseband 62.33.20.08H with Qualcomm RTR6785 transceiver iphone 3G Baseband 06.15.00 with Infeneon transceiver. Any other interesting commands? AT+CSQ

The AT+CSQ return message Service provider (Tmobile) Tower frequency Signal strength "+CSQ: 13,99 0","dd", 31026,654-101,646-101,641-108,644-105,638-106,652-105,0,"31026","0a3fdc29", 1530,2,1,-93,0 TMSI

Other development boards (Sparkfun) Responds to AT commands from 3GPP TS 27.007

GSM paging channel observations T-Mobile LAC 747b AT&T LAC 7d11 Paging Requests IMSI 27,120 8,897 Paging Requests TMSI 257,159 84,526 Paging Requests Type 1 284,279 91,539 Paging Requests Type 2 1,635 26 Paging Requests Type 3 0 1 Observation period 24 hours 24 hours

Pages and human activity Pages/min 0 50 100 150 200 Peak in the afternoon Low traffic after midnight University campus Day of the week during the semester 01 12:00 02 00:00 02 12:00 03 00:00 Time/min, April 2011, CDT

Phone number-tmsi mapping PSTN dt PCH dt Time

No recovered TMSI PSTN dt PCH dt Time

Silent paging Delay between the call initiation and the paging request 3 seconds Median delay between call initiation and ring 6 seconds 2 4 6 8 10 Time/seconds 2 4 6 8 10 Time/seconds

Bounding the LAC LACs can be very large. T-Mobile LAC 747d: 100km 2 Used a wall-following algorithm, road permitting. Call to MS on NW corner. Observed paging request on SE corner.

The GSM paging procedure Paging Request CCCH Channel Request RACH Immediate Assignment CCCH Paging Response SDCCH Setup and Data

Same tower test Delay between the paging request and the immediate assignment message. same diff random 0 1 2 3 4 Time difference between paging and IA messages / seconds

Finding individual towers Find individual towers with a hill-climbing algorithm. Non-uniform RF attenuation. Overshoot by 50m to avoid local maximum.

Where is the phone likely to be?

Directional antenna Use existing OsmocomBB code to perform frequency scan Sort list of frequencies by RSSI Attempt to camp on each frequency Record which frequencies contain cells and in which direction the cell is located

Directional antenna experiments Goal: determine how far we can hear cell broadcast messages Method: from a clear vantage point, scan through frequencies at intervals of 15 degrees to map nearby cells Findings: we are able to map cells in a 200km 2 area

Coverage with one antenna Downtown Minneapolis Location of observer Yagi antenna 12dB gain Towers in this area are observable with a rooftop 12 db gain antenna John s new haircut

Following a walking person Goal: determine if location testing is feasible on a moving target Method: using a directional antenna and high vantage point, follow the procedures for finding a victim's TMSI Findings: following a walking person is feasible; following a moving vehicle would be difficult Hard to follow a vehicle with only 1 antenna.

Tracking users in motion Observer End Start

Defenses Page multiple areas. Less than 0.6% of paging requests are not type 1. Available bandwidth for additional pages. Human trajectories are predictable. Continuous time mixes. Switch TMSI at least once per page. phone/tmsi bitwise unlinkable. Prevent traffic analysis. Cover traffic. Add exponential delay to paging requests.

How do we prevent those attacks? Page multiple areas Make phone/tmsi bitwise unlinkable Prevent traffic analysis Cover traffic Change distribution of egress traffic

Paging multiple LACs Less than 0.6% of paging requests are not type 1 Available bandwidth for additional pages Human trajectories are very predictable Gonzales, Hidalgo, Barabasi 05

Applying known anonymity schemes Continuous time mixes applied to the paging channel Arrival rate follows a Poisson distribution Change departure rate to an exponential distribution Expected sender anonymity 4 3 2 1 0-1 -2-3 -4 10 msg/min 150 msg/min 0 2 4 6 8 10 12 Exponential delay parameter mu

Conclusion Systems with broadcast paging protocols could leak location information. Leaks observable with readily available equipment equipment, no (direct) help from the service provider. Proposed low cost fixes. Responsible disclosures. 3GPP, Nokia, AT&T research

Questions foo@cs.umn.edu http://www.cs.umn.edu/~foo