DE / FI : Boffins build a Euro-stingray Whilst the USA device can work in Europe; it not only looks like something from 40 years ago and would cost a lot - most likely there is only one in the UK which Metpol NCA and Police Scotland have to share between them.
in any area which isn't a complete shithole/ghetto it would cause many modern phones being used online to drop their connections and people would notice this...
However the folk below have made a 3/4G version of the device.
Their University is part funded by Deutsche Telekom; at least they are still investing in training over there...
Mobile communication systems now constitute an essential part of life throughout the world. Fourth generation "Long Term Evolution" (LTE) mobile communication networks are being deployed. The LTE suite of specifications is considered to be significantly better than its predecessors not only in terms of functionality but also with respect to security and privacy for subscribers.
We carefully analyzed LTE access network protocol specifications and uncovered several vulnerabilities. Using commercial LTE mobile devices in real LTE networks, we demonstrate inexpensive, and practical attacks exploiting these vulnerabilities. Our first class of attacks consists of three different ways of making an LTE device leak its location: A semi-passive attacker can locate an LTE device within a 2 sq.km area within a city whereas an active attacker can precisely locate an LTE device using GPS co-ordinates or trilateration via cell-tower signal strength information. Our second class of attacks can persistently deny some or all services to a target LTE device. To the best of our knowledge, our work constitutes the first publicly reported practical attacks against LTE access network protocols.
We present several countermeasures to resist our specific attacks. We also discuss possible trade-offs that may explain why these vulnerabilities exist and recommend that safety margins introduced into future specifications to address such trade-offs should incorporate greater agility to accommodate subsequent changes in the trade-off equilibrium
PDF file below
http://arxiv.org/pdf/1510.07563v1.pdf
1970s/1980s style analogue surveillance This is from the security training guides for Norway public services in the 1970s(?) It may not seem "PC" but the glamourous young secretary is smarter than her boss as she remembers the warning "some telephones can be made to work as a microphone even if the handset is on hook. So unplug the cable!"
A German professor explained how it worked and that the East German phones all had the extra bug wire added in the phone socket (although all European phones could be similarly modified) and suggested "Try it!"
so I did :laugh_at: (I used a more modern version of the 700 series with an electronic mic as the older ones are too noisy)
and then set up the "monitoring post" below. The red/green lamps/relays are what would be at the Telephone Exchange; they only light if the line is seized. The blue telephone is the same kind Openreach use to test lines with, it can monitor them without making a noise on the line or when the audio is very quiet...
It is possible to still ring the line so no one would notice anything is unusual; except I don't answer it (as it could be spies! :laugh_at:) and have the "ja ja ja polka" playing by the phone "volle Kanne" (as I needed to make some noise where the phone was) but it would stop the audio monitoring of any other noise in the room ;)
https://www.youtube.com/watch?v=gcq7_JG6oGQ
DRAM “Bitflipping” exploit for attacking PCs: Just add JavaScript DRAM ?Bitflipping? exploit for attacking PCs: Just add JavaScript | Ars Technica UK
Original story on the original exploit is here.
Cutting-edge hack gives super user status by exploiting DRAM weakness | Ars Technica
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
You can revoke your consent any time using the Revoke consent button.