Security researchers have revealed a recently discovered vulnerability in modern, high-speed cell networks, which they say can allow low-cost phone surveillance and location tracking.
The findings, revealed Wednesday at the Black Hat conference in Las Vegas, detail a cryptographic flaw in the protocol used in 3G and 4G LTE networks which enables mobile devices to connect with the cell operator.
The findings, revealed Wednesday at the Black Hat conference in Las Vegas, detail a cryptographic flaw in the protocol used in 3G and 4G LTE networks which enables mobile devices to connect with the cell operator.
This flaw could pave the way for a next-generation of stingray devices, otherwise known as cell site (or IMSI) simulators.
These highly controversial surveillance devices are shrouded in secrecy, but are almost exclusively used by local police and law enforcement, often without warrants, in order to carry out indiscriminate cellular surveillance. They trick cell phones into downgrading to the weaker 2G standard to easily intercept communications and track locations of anyone nearby.
These highly controversial surveillance devices are shrouded in secrecy, but are almost exclusively used by local police and law enforcement, often without warrants, in order to carry out indiscriminate cellular surveillance. They trick cell phones into downgrading to the weaker 2G standard to easily intercept communications and track locations of anyone nearby.
Because the weakness is part of the 3G and 4G standard, the researchers say that the flaw "affects all operators worldwide," and the majority of modern devices.
The researchers say that "very little" can be done to protect against these kinds of attacks, in part because mobile operating systems don't detect radio-level attacks.
3GPP, a consortium of telecoms standard organizations which developed the vulnerable protocol, acknowledged the flaw and, according to the researchers, hope that the issue will be addressed in the upcoming 5G standards.
The researchers say that "very little" can be done to protect against these kinds of attacks, in part because mobile operating systems don't detect radio-level attacks.
3GPP, a consortium of telecoms standard organizations which developed the vulnerable protocol, acknowledged the flaw and, according to the researchers, hope that the issue will be addressed in the upcoming 5G standards.