We hitherto discussed hostage analyzer Chris Paget's plans to demonstrate practical cell phone interception at DefCon. Paget completed his talk yesterday, and reader suraj.sun points out home & life insurance for you get an online quote. no obligationwww.libertymutual.comsponsored linksgeorgia auto insuranceavg. policy in georgia is $79.45/mo local ga agents & major carrierswww.insweb.com/georgia/quotesinsurance directoryfind local insura from Wired. Quoting:
"A safety scientist created a $1,500 cell phone base station kit (including a laptop and two RF antennas) that tricks cell phones into routing their outbound calls through his device, allowing someone to intercept even encrypted calls in the clear. Most of the price is for the laptop he used to operate the system. The device tricks the phones into disabling encryption and records call details and content before they are routed on their proper way through voice-over-IP. The low-cost, home-brewed device ... mimics more dear devices already used by wit
d and law enforcement agencies — called IMSI catchers — that can capture phone ID data and content. The devices basically spoof a legitimate GSM tower and entice cell phones to send them data by emitting a signal that's all the more so than legitimate towers in the area. Encrypted calls are not protected from interception because the rogue tower can simply turn it off. even if the GSM specifications say that a phone should pop up a warning when it connects to a station that does not have encryption, SIM cards disable that setting so that alerts are not displayed. Even though the GSM spec requires it, this is a deliberate choice on the cell phone makers, Paget said."
Read more of this story at Slashdot.
More: - From the site