IntoMobile

Breaking news, information, and analysis on the latest mobile phones and mobile technology

Open NavigationOpen Search
  • Home
  • Platforms
    • iOS / iPhone OS
    • Android
    • Windows Phone
    • BlackBerry OS
  • Hardware
    • New Hardware
    • Tablets
    • Reviews
    • Rumors
  • Carriers
    • AT&T
    • Sprint
    • T-Mobile
    • Verizon
  • Manufacturers
    • Apple
    • Samsung
    • HTC
    • LG
    • Motorola
  • Best VPNs
    • Best VPNs for iPhone
    • Best VPNs for Android

Researchers claim to be able to hack GSM networks

February 22, 2008 by Will Park - Leave a Comment

Share on Twitter Share on Facebook ( 0 shares )

Whenever the folks at the Black Hat conference have a meet-up, the security world listens. This time around, the collective hacker minds of the security industry flocked to Washington D.C. where David Hulton and Steve (he didn’t want to give his last name – you know tinfoil hats and all) claimed that they had come up with a method to hack encrypted GSM calls for relatively cheap. 

Blackhat hackers claim GSM hacking on the cheapThe 64-bit A5/1 encryption scheme used by GSM networks to encrypt voice and text message transmissions had been theoretically cracked a decade ago, but the practical hacking of the encryption algorithms has been prohibitively expensive and time-consuming. Hulton and Steve now claim that with 30 minutes and $1,000 worth of gear (or 30 seconds and $100,000 in equipment), they can hack the GSM communications and even locate a particular device’s location to within 200 meters. That means that the GSM network hacking endeavor is no longer relegated to the realm of government and high-budget snooping operations – your average Joe Blow hacker can now take a gander at all your GSM-routed voice calls and text messages.

Hulton and Steve say that their method uses field programmable gate arrays to list and decrypt the 288 quadrillion possible encryption keys. The decrypted keys are then used to crack the GSM communications at will.

Now, it’s worth noting that 3G networks do not utilize the same A5/1 encryption algorithms, and should be immune to Hulton and Steve’s hacking methods. But, the prospect that our communications can be spied upon by non-government entities is a bit off-putting.

Better start talking in code. Or, you know, switch to CDMA. We’d rather talk in code.

[Via: Information Week]

Share on Twitter Share on Facebook ( 0 shares )

Back to top ▴

Back to top ▴

Follow IntoMobile

38k
36k
4k
13k
12k

Most Recent Posts

  • iPhone No Sound: Tips on How to Fix this Common Issue
  • The newest iOS – things you surely did not know
  • Transferring money through mobile: Why digital wallets are the future of commerce?
  • Review: Shine laser light Bluetooth headphones
  • Neptune Suite smart watch with phone and tablet screens killing it at Indiegogo

Get Updates Via E-Mail

  • This field is for validation purposes and should be left unchanged.

About IntoMobile

  • About IntoMobile
  • Contact IntoMobile
  • Send us News Tips
  • Privacy Policy

Social Links

  • IntoMobile on Facebook
  • IntoMobile on Twitter
  • IntoMobile on Google+
  • IntoMobile on YouTube

Copyright © 2006-2021 IntoMobile. All rights reserved.