The GSM Standard (An overview of its security)



Similar documents
Installation of a Red Hat 9.0 server with DNS services, emphasising security

How To Secure Your Small To Medium Size Microsoft Based Network: A Generic Case Study

Building an Incident Response Program To Suit Your Business

Interested in learning more about security? Securing the Broadband Network. Copyright SANS Institute Author Retains Full Rights

Security Awareness Training and Privacy

Interested in learning more about security? Centralized Backups. Copyright SANS Institute Author Retains Full Rights

Understanding and Implementing Microsoft Terminal Services & Citrix MetaFrame

Interested in learning more about security? The OSI Model: An Overview. Copyright SANS Institute Author Retains Full Rights

Introduction to Business Continuity Planning

Theory and Practice. IT-Security: GSM Location System Syslog XP 3.7. Mobile Communication. December 18, GSM Location System Syslog XP 3.

Security in the GSM Network

The GSM and GPRS network T /301

Global System for Mobile Communication Technology

International Journal of Computing and Business Research (IJCBR)

Six Ways to Reduce PCI DSS Audit Scope by Tokenizing Cardholder data

GSM and UMTS security

Mobile Phone Security. Hoang Vo Billy Ngo

Authentication and Secure Communication in GSM, GPRS, and UMTS Using Asymmetric Cryptography

!!! "# $ % & & # ' (! ) * +, -!!. / " 0! 1 (!!! ' &! & & & ' ( ' 3 ' Giuseppe Bianchi

Interested in learning more about security?

Interested in learning more about security? Microsoft Windows Security Patches. Copyright SANS Institute Author Retains Full Rights

Mobile Wireless Overview

Lecture overview. History of cellular systems (1G) GSM introduction. Basic architecture of GSM system. Basic radio transmission parameters of GSM

Distributed Scan Model for Enterprise-Wide Network Vulnerability Assessment

GSM Architecture Training Document

PM ASSIGNMENT. Security in Mobile Telephony and Voice over IP

Mobile Communications

Using an approximated One-Time Pad to Secure Short Messaging Service (SMS)

Introduction to the Microsoft Windows XP Firewall

An Example of Mobile Forensics

2G/3G Mobile Communication Systems

M E M O R A N D U M. Wireless Roaming Services for Emergency Medical Facilities

netforensics - A Security Information Management Solution

GSM Research. Chair in Communication Systems Department of Applied Sciences University of Freiburg 2010

2 System introduction

Mobile Communications Chapter 4: Wireless Telecommunication Systems slides by Jochen Schiller with modifications by Emmanuel Agu

UMTS security. Helsinki University of Technology S Security of Communication Protocols

IMSI Catcher. Daehyun Strobel. 13.Juli Seminararbeit Ruhr-Universität Bochum. Chair for Communication Security Prof. Dr.-Ing.

Mobile Office Security Requirements for the Mobile Office

Interested in learning more about security? What is Code Red Worm? Copyright SANS Institute Author Retains Full Rights

In this Lecture" Access method CDMA" Mobile and Sensor Systems Lecture 2: Mobile Medium Access Control Layer and Telecommunications

Authentication and Security in Mobile Phones

Wireless Mobile Telephony

Mobile network security report: Greece

Development of Wireless Networks

Interested in learning more about security? Why Bother About BIOS Security? Copyright SANS Institute Author Retains Full Rights

Security features include Authentication and encryption to protect data and prevent eavesdropping.

How To Understand The Gsm And Mts Mobile Network Evolution

Mobile Security. Practical attacks using cheap equipment. Business France. Presented the 07/06/2016. For. By Sébastien Dudek

Mobile network security report: Poland

Ch GSM PENN. Magda El Zarki - Tcom Spring 98

GSM Databases. Virginia Location Area HLR Vienna Cell Virginia BSC. Virginia MSC VLR

GSM security country report: Germany

GSM Risks and Countermeasures

Wireless Cellular Networks: 1G and 2G

GSM GPRS. Course requirements: Understanding Telecommunications book by Ericsson (Part D PLMN) + supporting material (= these slides)

dect provides high protection against unauthorized access

Global System for Mobile Communications (GSM)

Mobile network security report: Norway

GSM System Architecture

Wireless Telecommunication Systems GSM, GPRS, UMTS. GSM as basis of current systems Satellites and

What is telecommunication? electronic communications. service?

Mobile network security report: Germany

SIM Card Security. Sheng He Seminar Work. Chair for Communication Security Prof. Dr.-Ing. Christof Paar

What is telecommunication? electronic communications? What is telephony?

GSM security country report: USA

TETRA Security. TETRA MoU Association Association House South Park Road Macclesfield Sk11 6SH England

Mobile network security report: Belgium

EAP-SIM Authentication using Interlink Networks RAD-Series RADIUS Server

Chapter 3: WLAN-GPRS Integration for Next-Generation Mobile Data Networks

GSM BASICS GSM HISTORY:

Global System for Mobile Communication (GSM)

The Mechanisms and Effects of the Code Red Worm

WIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006

GSM - Global System for Mobile Communications

Network Security. Chapter 14. Security Aspects of Mobile Communications

Easy Steps to Cisco Extended Access List

ETSI ETR 278 TECHNICAL March 1996 REPORT

Mobile network security report: Netherlands

Cellular Networks: Background and Classical Vulnerabilities

-The equipment was limited to operate only within the boundaries of each country. -The market for each mo bile equipment was limited.

Mobile network security report: Poland

WHITE PAPER. August, Contacts: Christopher Wingert Mullaguru Naidu

SecureCom Mobile s mission is to help people keep their private communication private.

An Oracle White Paper December The Value of Diameter Signaling in Security and Interworking Between 3G and LTE Networks

International Journal for Research in Computer Science

Worldwide attacks on SS7 network

Encrypted SMS, an analysis of the theoretical necessities and implementation possibilities

Defending mobile phones. Karsten Nohl, Luca Melette,

GSM v. CDMA: Technical Comparison of M2M Technologies

GSM Security Claude Castelluccia INRIA

Mobile Application Part protocol implementation in OPNET

Cellphone Security. David Wagner U.C. Berkeley

Measuring the Optimal Transmission Power of GSM Cellular Network: A Case Study

9.1 Introduction. 9.2 Roaming

Wireless LANs vs. Wireless WANs

Cellular Network Organization

Wireless and Mobile Network Architecture

TS-3GB-S.R0103-0v1.0 Network Firewall Configuration and Control (NFCC) - Stage 1 Requirements

EP A1 (19) (11) EP A1 (12) EUROPEAN PATENT APPLICATION. (43) Date of publication: Bulletin 2006/26

Transcription:

Interested in learning more about security? SANS Institute InfoSec Reading Room This paper is from the SANS Institute Reading Room site. Reposting is not permitted without express written permission. The GSM Standard (An overview of its security) Global System for Mobile Communications (GSM) is the most popular mobile phone system in the world, accounting for 70% of the world's digital mobile phones. According to a press release by the GSM Association in May 2001, there are more than half a billion GSM mobile phones in use in over 168 countries today. The phenomenal success in mobile telecommunications is due in large to GSM. One of its key strength is its international roaming capability, giving consumers a seamless service in over 168 countries. Copyright SANS Institute Author Retains Full Rights

The GSM Standard (An overview of its security) Introduction Global System for Mobile Communications (GSM) is the most popular mobile phone system in the world, accounting for 70% of the world s digital mobile phones. According to a press release by the GSM Association in May 2001, there are more than half a billion GSM mobile phones in use in over 168 countries today. The phenomenal success in mobile telecommunications is due in large to GSM. One of its key strength is its international roaming capability, giving consumers a seamless service in over 168 countries. History Key fingerprint of GSM = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 In 1982, the European Conference of Post and Telecommunications Administrations (CEPT) formed a group called Group Spéciale Mobile (GSM) to develop a pan-european cellular system that would replace the many existing incompatible cellular systems already in place in Europe. In 1987, a milestone was achieved with the signing of the GSM Memorandum of Understanding (MoU) by GSM-operators-to-be, agreeing to implement cellular networks, based on the GSM specifications. While it was clear from the start that GSM would be a digital system, it was officially announced in 1987. GSM service started in 1991. In the same year, GSM was renamed to Global System for Mobile Communications from Group Spéciale Mobile. Although GSM was initially developed as a European digital communication standard to allow users to use their cellular devices seamlessly across Europe, it soon developed into a standard that would see unprecedented growth globally. Here in North America, the GSM standard is often referred to as PCS 1900 and elsewhere as DCS 1800. The number relates to the operating frequency of the system. Key features of GSM 1) International Roaming - single subscriber number worldwide 2) Superior speech quality - better than existing analog cellular technology 3) High level of security - user s information is safe and secure 4) Universal and Inexpensive Mobile handsets 5) Digital Convenience - talk time is doubled per battery life and digital networks can handle higher volume of calls at any one time that analog networks 6) New services - such as call waiting, call forwarding, Short Message Service (SMS), GSM Packet Radio Service (GPRS) Key 7) Digital fingerprint compatibility = AF19 FA27 - easily 2F94 interfaces 998D FDB5 with DE3D existing F8B5 digital 06E4 A169 networks 4E46 i.e. Integrated Services Digital Network (ISDN)

GSM Architecture Subscriber Identity Module Mobile Phone Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 Air Interface Mobile Station Mobile Station Base Transceiver Station Base Transceiver Station Figure 1: GSM Architecture 1 Every GSM mobile phone has a Subscriber Identity Module (SIM). The SIM provides the mobile phone with a unique identity through the use of the International Mobile Subscriber Identity (IMSI). The SIM is like a key, without which the mobile phone can t function. It is capable of storing personal phone numbers and short messages. It also stores security related information such as the A3 authentication algorithm, the A8 ciphering key generating algorithm, the authentication key (K I ) and IMSI. The mobile station stores the A5 ciphering algorithm. The SIM is removable, which allows users to travel abroad taking with them only their SIM card. They would need to inform their local provider, which countries they would be visiting, prior to their departure. At their destination, they can simply plug the SIM into a rental cellular phone and make use of the mobile unit. The SIM can be protected with a Personal Identification Number (PIN) chosen by the subscriber. The PIN is stored on the card and if entered incorrectly thrice, the card blocks itself. At this point, you ll have to contact your cellular provider who can unblocked your mobile phone, by entering an eight digit Personal Unblocking Key (PUK), which is also stored on the card. Base Station Subsystem (BSS) Base Station Controller Base Station Controller Base Station Subsystem Home Location Register Equipment Identity Register Visitor Location Register Mobile Services Switching Center Authentication Center Network Subsystem PSTN The role of the Base Station Subsystem (BSS) is to connect the user on a mobile phone with other landline or mobile users. The Base Transceiver Station (BTS) is in direct contact with the Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 1 Scourias, John "GSM - Global System For Mobile Communications - Figure 1. General architecture of a GSM network" (Static information on website) URL: http://www.smarthomeforum.com/gsm.shtml

mobile phones via the air interface and can be thought of as a complex radio modem. The Base Station Controller (BSC) is responsible for the control of the several BTS. It monitors each call and decides when to handover the call from one BTS to another, as well as manage radio frequencies allocated for the calls through the BTS. Network Subsystem (NSS) It is a complete exchange, capable of routing calls from a fixed network via the BSC and BTS to an individual mobile station. The Mobile Services Switching Center (MSC) interconnects the cellular network with the Public Switched Telephone Network (PSTN). The MSC also serves to co-ordinate setting up calls to and from GSM users. The Key Home fingerprint Location = AF19 Register FA27 (HLR) 2F94 stores 998D information FDB5 DE3D of F8B5 all subscribers 06E4 A169 belonging 4E46 to an area served by a MSC. It stores permanent data such as the IMSI, services subscribed by the user, subscriber s number from a public network, K I and some other temporary data. The HLR has to provide the MSC with all the necessary information when the call is coming from a public network. The Visitor Location Register (VLR) contains relevant information for all mobiles currently served by a MSC. The permanent data stored in the VLR is also stored in the HLR. In addition, it also stores the Temporary Mobile Subscriber Identity (TMSI), which is used for limited intervals to prevent the transmission of the IMSI via the air interface. (See section on GSM Security: Anonymity) The VLR has to support the MSC during call establishment and authentication when the call originates from a mobile station. The Equipment Identity Register (EIR) stores all the International Mobile Equipment Identities (IMEI) of mobile equipment and their rights on the network. The EIR maintains a white, gray and black list. Those on the white list are permitted on the network while those on the black list are blocked from the network. The gray list consists of faulty equipment that may pose a problem on the network but are still permitted to participate on the network. The IMEI reveals the serial number of the mobile station, manufacturer, type approval and country of production. The Authentication Center (AuC) is a protective database that houses the K I, the A3 authentication algorithm, the A5 ciphering algorithm and the A8 ciphering key generating algorithm. It is responsible for creating the sets of random numbers (RAND), Signed Response (SRES) and the Cipher key (K C ), though the created sets are stored in the HLR and VLR. GSM Security As all cellular communications are sent over the air interface, it is less secure than a wired network, as it opens the door to eavesdroppers with appropriate receivers. Several security functions were built into GSM to safeguard subscriber privacy. These include: Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 Authentication of the registered subscribers only Secure data transfer through the use of encryption Subscriber identity protection

Mobile phones are inoperable without a SIM Duplicate SIMs are not allowed on the network Securely stored K I Authentication The authentication procedure checks the validity of the subscriber s SIM card and then decides whether the mobile station is allowed on a particular network. The network authenticates the subscriber through the use of a challenge-response method. Firstly, a 128 bit random number (RAND) is transmitted to the mobile station over the air interface. The RAND is passed to the SIM card, where it is sent through the A3 authentication algorithm Key fingerprint together = with AF19 the FA27 K I. The 2F94 output 998D of FDB5 the A3 DE3D algorithm, F8B5 06E4 the signed A169 4E46 response (SRES) is transmitted via the air interface from the mobile station back to the network. On the network, the AuC compares its value of SRES with the value of SRES it has received from the mobile station. If the two values of SRES match, authentication is successful and the subscriber joins the network. The AuC actually doesn t store a copy of SRES but queries the HLR or the VLR for it, as needed. K I Anonymity A3 Mobile Station SIM Challenge RAND Response SRES Radio Interface Figure 2: Authentication in GSM 2 When a new GSM subscriber turns on his phone for the first time, its IMSI is transmitted to the AuC on the network. After which, a Temporary Mobile Subscriber Identity (TMSI) is assigned to the subscriber. The IMSI is rarely transmitted after this point unless it is absolutely necessary. This prevents a potential eavesdropper from identifying a GSM user by their IMSI. The user continues to use the same TMSI, depending on the how often, location updates occur. Every time a location update occurs, the network assigns a new TMSI to the mobile phone. The TMSI is stored Key along fingerprint with the = AF19 IMSI FA27 in the 2F94 network. 998D The FDB5 mobile DE3D station F8B5 uses 06E4 the A169 TMSI 4E46 to report to the? A3 Fixed Network K I 2 Brookson, Charles GSM (and PCN ) Security and Encryption - Figure 1. Encryption for GSM URL: http://www.brookson.com/gsm/gsmdoc.doc

network or during call initiation. Similarly, the network uses the TMSI, to communicate with the mobile station. The Visitor Location Register (VLR) performs the assignment, the administration and the update of the TMSI. When it is switched off, the mobile station stores the TMSI on the SIM card to make sure it is available when it is switched on again. Encryption and Decryption of Data GSM makes use of a ciphering key to protect both user data and signaling on the vulnerable air interface. Once the user is authenticated, the RAND (delivered from the network) together with the K I (from the SIM) is sent through the A8 ciphering key generating algorithm, to produce a ciphering key (K C ). The A8 algorithm is stored on the SIM card. The K C created by the A8 algorithm, Key fingerprint is then used = AF19 with FA27 the A5 2F94 ciphering 998D FDB5 algorithm DE3D to encipher F8B5 06E4 or decipher A169 4E46 the data. The A5 algorithm is implemented in the hardware of the mobile phone, as it has to encrypt and decrypt data on the fly. RAND K I GSM Algorithms K C A8 A5 Data Encrypted Figure3: Encrypting data using a ciphering key A consequence of international roaming is the exchange of information between providers in different countries. All countries have strict regulations against the export of encryption algorithms and thus GSM works around it. When a user tries to use his phone in say another country, the local networks request the HLR of the subscriber s home network for the RAND, SRES and K C which is sufficient for authentication and encrypting data. Thus the local network does not need to know anything about the A3 or A8 algorithms stored in the SIM. Authentication Algorithm A3 It is operator-dependent and is an operator option. The A3 algorithm is a one-way function. That means it is easy to compute the output parameter SRES by using the A3 algorithm but very complex to retrieve the input parameters (RAND and K I ) from the output parameter. Remember the key to GSM s security is keeping K I unknown. While it may sound odd that each operator may choose to use A3 independently, it was necessary to cover the case of international roaming. Ciphering Algorithm A5 Currently, there exists several implementations of this algorithm though Key the fingerprint most commonly = AF19 FA27 used 2F94 ones 998D are A5/0, FDB5 A5/1 DE3D and F8B5 A5/2. 06E4 The A169 reason 4E46 for the different implementations is due to export restrictions of encryption technologies. A5/1 is the strongest version and is used widely in Western Europe and America, while the A5/2 is commonly used in Asia. Countries under UN Sanctions and certain third world countries use the A5/0, which comes with no encryption.

Ciphering Key Generating Algorithm A8 It is operator-dependent. In most providers the A3 and A8 algorithms are combined into a single hash function known as COMP128. The COMP128 creates K C and SRES, in a single instance. Security by Obscurity Some argue that GSM is not as secure, as publicized. The GSM standard was created in secrecy and all of the algorithms used are not available to the public. Most security analysts believe any system that is not subject to the scrutiny of the world s best minds can t be as secure. In April 1998, the Smartcard Developer Association (SDA) together with two U.C. Berkeley researchers Key fingerprint claimed = to AF19 have FA27 cracked 2F94 the 998D COMP128 FDB5 DE3D algorithm F8B5 stored 06E4 A169 on the 4E46 SIM. By sending large number of challenges to the authorization module, they were able to deduce the K I within several hours. They also discovered that K C uses only 54 bits of the 64 bits. The remaining 10 bits are replaced by zeros, which makes the cipher key purposefully weaker. They feel this is due to government interference. A weaker ciphering key, could potentially allow governments to monitor conversations. The SDA did have the SIM in their physical presence when they cracked the algorithm. However they fear an over the air attack is not far fetched. Unfortunately, they are unable to confirm their suspicions, as the equipment required to carry out such an attack is illegal here in the US. The GSM Alliance responded to the incident, stating even if a SIM could be cloned it would serve no purpose, as the GSM network would only allow only one call from any phone number at any one time. GSM networks are also capable of detecting and shutting down duplicate SIM codes found on multiple phones. In August 1999, an American group of researchers claimed to have cracked the weaker A5/2 algorithm commonly used in Asia, using a single PC within seconds. In December 1999, two leading Israeli cryptographers claimed to have cracked the strong A5/1 algorithm responsible for encrypting conversations. They admit the version they cracked may not be the exact version used in GSM handsets, as GSM operators are allowed to make small modifications to the GSM algorithms. The researchers used a digital scanner and a high end PC to crack the code. Within two minutes of intercepting a call with a digital scanner, the researchers were able to listen to the conversation. Here in the US, digital scanners are illegal. The GSM Alliance of North America has claimed that none of its members use the A5/1 algorithm, opting for more recently developed algorithms. The ISAAC security research group claims it is technologically possible to build a fake base station for roughly $10,000. This allows a man-in-the-middle attack. Essentially, the fake base station Key can fingerprint flood the = real AF19 base FA27 station 2F94 and 998D force FDB5 a mobile DE3D station F8B5 to 06E4 connect A169 to 4E46 it. The base station could then inform the phone to use A5/0 (no encryption) and eavesdrop on the conversation.

An insider attack is another possible scenario. All communication between the Mobile Station and the Base Transceiver Station are encrypted. Beyond that point, all communications and signaling is generally transmitted in plain text within the provider s network. While a strong defense has been put upfront to deter hackers, the inner core is wide open. Live and Learn Since the inception of these attacks, the GSM body has been working to patch up the possible security holes. Over the past 12 months, there have been two significant results. Firstly, the compromised COMP128 hash function has been replaced with a patched COMP128-2 hash function. Secondly, a new A5/3 algorithm has also been agreed upon to replace the aging A5/2 algorithm. While they have chosen not to disclose any pertinent information regarding the currently Key fingerprint used algorithms, = AF19 they FA27 have 2F94 taken 998D a step FDB5 in DE3D the right F8B5 direction 06E4 A169 with GSM s 4E46 replacement, 3GPP. They have moved away from their security by obscurity ideology with 3GPP (3 rd Generation Partnership Project). All the algorithms being used in 3GPP are available to security researchers and scientists. Conclusion Despite the recent security breaches, GSM is by far more secure than previous analog cellular systems and continues to be the most secure public wireless standard in the world. References: Business Wire Press release "GSM Alliance Clarifies False & Misleading Reports of Digital Phone Cloning" (April 10, 1998) URL: http://jya.com/gsm042098.txt Savage, Annaliza "Cell-Phone Security Far From Airtight" (April 13, 1998) URL: http://www.wired.com/news/technology/0,1282,11630,00.html Press release "Smartcard Developer Association Clones Digital GSM Cellphones" (April 13, 1998) URL: http://www.isaac.cs.berkeley.edu/isaac/gsm-press.html Pesonen, Lauri "GSM Interception" (November 21, 1999) URL: http://www.dia.unisa.it/ads.dir/corso-security/www/corso-9900/a5/netsec/netsec.html McCullagh, Decian "Cell Phone Crypto Penetrated" (December 6, 1999) URL: http://www.wired.com/news/politics/0,1283,32900,00.html Goodwins, Rupert "Digital cellphone security broken" (December 7, 1999) URL: http://news.zdnet.co.uk/story/0,,s2075699,00.html Robinson, Key fingerprint Sara "Cell = phone AF19 FA27 flaw opens 2F94 security 998D FDB5 hole" DE3D (September F8B5 06E4 18, 2000) A169 4E46 http://news.zdnet.co.uk/story/0,,t269-s2081469,00.html

Robinson, Sara "Design flaw in mobile phone protocol opens security hole" (September 25, 2000) URL: http://www.zdnet.co.uk/itweek/analysis/2000/36/client/gsm Press release "GSM Mobiles Reach Half A Billion Landmark" (May 11, 2001) URL: http://www.gsm.org/news/press_2001/press_releases_18.html 3GPP/OP#6 Meeting ETSI position on A5/3 funding and ownership (October 9, 2001) URL: http://www.3gpp.org/ftp/op/op_06/docs/op6_10.pdf Webmaster GSM - Frequently Asked Questions (Static information on website) URL: http://www.gsm.org/technology/faq.html Webmaster Key fingerprint GSM Technology = AF19 FA27 (Static 2F94 998D information FDB5 on DE3D website) F8B5 06E4 A169 4E46 URL: http://www.mobileworld.org/gsm_about.html Scourias, John "GSM - Global System For Mobile Communications" (Static information on website) URL: http://www.smarthomeforum.com/gsm.shtml Brookson, Charles GSM (and PCN ) Security and Encryption (Static information on website) URL: http://www.brookson.com/gsm/gsmdoc.doc Webmaster GSM Security and Encryption (Static information on website) URL: http://www.keralaconnect.com/gsm_security_encryption.htm Wagner, David GSM Cloning (Static information on website) URL: http://www.isaac.cs.berkeley.edu/isaac/gsm.html Webmaster GSM - Global System For Mobile Communications (Static information on website) URL: http://www.iec.org/online/tutorials/gsm/topic03.html Webmaster Introduction to GSM (Static information on website) URL: http://www.pt.com/products/gsmintro.html Webmaster How does a GSM network work? (Static information on website) URL: http://www.bryte.net/gsm-hoe.asp Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46

Last Updated: July 9th, 2016 Upcoming SANS Training Click Here for a full list of all Upcoming SANS Events by Location SANS San Antonio 2016 San Antonio, TXUS Jul 18, 2016 - Jul 23, 2016 Live Event SANS Minneapolis 2016 Minneapolis, MNUS Jul 18, 2016 - Jul 23, 2016 Live Event SANS Delhi 2016 Delhi, IN Jul 18, 2016 - Jul 30, 2016 Live Event SANS San Jose 2016 San Jose, CAUS Jul 25, 2016 - Jul 30, 2016 Live Event Industrial Control Systems Security Training Houston, TXUS Jul 25, 2016 - Jul 30, 2016 Live Event SANS Boston 2016 Boston, MAUS Aug 01, 2016 - Aug 06, 2016 Live Event SANS Vienna Vienna, AT Aug 01, 2016 - Aug 06, 2016 Live Event Security Awareness Summit & Training San Francisco, CAUS Aug 01, 2016 - Aug 10, 2016 Live Event DEV531: Defending Mobile Apps San Francisco, CAUS Aug 08, 2016 - Aug 09, 2016 Live Event SANS Portland 2016 Portland, ORUS Aug 08, 2016 - Aug 13, 2016 Live Event SANS Dallas 2016 Dallas, TXUS Aug 08, 2016 - Aug 13, 2016 Live Event DEV534: Secure DevOps San Francisco, CAUS Aug 10, 2016 - Aug 11, 2016 Live Event Data Breach Summit Chicago, ILUS Aug 18, 2016 - Aug 18, 2016 Live Event SANS Alaska 2016 Anchorage, AKUS Aug 22, 2016 - Aug 27, 2016 Live Event SANS Bangalore 2016 Bangalore, IN Aug 22, 2016 - Sep 03, 2016 Live Event SANS Chicago 2016 Chicago, ILUS Aug 22, 2016 - Aug 27, 2016 Live Event SANS Virginia Beach 2016 Virginia Beach, VAUS Aug 22, 2016 - Sep 02, 2016 Live Event SANS Adelaide 2016 Adelaide, AU Sep 05, 2016 - Sep 10, 2016 Live Event SANS Brussels Autumn 2016 Brussels, BE Sep 05, 2016 - Sep 10, 2016 Live Event SANS Northern Virginia - Crystal City 2016 Crystal City, VAUS Sep 06, 2016 - Sep 11, 2016 Live Event SANS Network Security 2016 Las Vegas, NVUS Sep 10, 2016 - Sep 19, 2016 Live Event SANS London Autumn London, GB Sep 19, 2016 - Sep 24, 2016 Live Event SANS ICS London 2016 London, GB Sep 19, 2016 - Sep 25, 2016 Live Event Security Leadership Summit Dallas, TXUS Sep 27, 2016 - Oct 04, 2016 Live Event SANS Oslo 2016 Oslo, NO Oct 03, 2016 - Oct 08, 2016 Live Event SANS Seattle 2016 Seattle, WAUS Oct 03, 2016 - Oct 08, 2016 Live Event SANS DFIR Prague 2016 Prague, CZ Oct 03, 2016 - Oct 15, 2016 Live Event SANS Rocky Mountain 2016 OnlineCOUS Jul 11, 2016 - Jul 16, 2016 Live Event SANS OnDemand Books & MP3s OnlyUS Anytime Self Paced