Whether cellular communication security
Technologies / / December 19, 2019
Mobile - this is what we continue to use every day. Is it easy to listen to it? Who and how can do it? Is there a way to protect yourself? We delve into the subject and can answer some questions.
Generally, to obtain any specific information from the mobile operators themselves virtually impossible. The reason is clear: the smaller of the system know the better it is protected. For protection of the communication channels is encrypted by means of operators themselves. Due to the fact that the operator's communications infrastructure is quite isolated, kriptotehnologii complex, and access to infrastructure constantly and strictly controlled, the likelihood that an unauthorized person will have access to any information that comes to zero.
Who can listen
At the legislative level, the operators are required by the need to provide access to the data of a certain civil service. Note that the law thus also limits the effectiveness of the protection, which can use the "simple" people and companies. Specially protected technology simply prohibited to use, and related equipment, aimed as a defense, and at its breaking - for sale. In general, here everything is built so that the state and its specific services can ensure the safety and the need to have control and access to any data they fit. Naturally, cellular communications among them, but it is unlikely you will listen, if you are not doing anything illegal.
Another issue is that your phone conversations are an interest to intruders, who may then use the data obtained for the benefit of themselves and to harm you. This is subject to not only more financially wealthy individual, but also to any man who has valuable information.
How can you listen to
To listen to conversations on cell always requires expensive equipment. The situation is aggravated by the fact that purchase such equipment is not as easy to control as they need experts, resulting in even greater costs. From this we can conclude that mobile resorting to tapping only in situations when it comes to really serious matters or amounts.
listening to three principles:
- Passive wiretapping involves the interception and subsequent decryption of the conversation. With a copy of SIM-card wiretapping is possible in real time. Such systems may have a radius of action of a few hundred meters and sufficiently small dimensions for the installation, such as a car.
- Active wiretapping - is when an attacker interferes directly in the work of a bunch "subscriber - base station". The complex of active interception replaces the nearest base station operator, after which, in fact, has full control over the connection.
- The third option, unlike the first two, does not require expensive equipment and expertise for its operation. It is enough to install on the smartphone victims of malicious software, and then remotely manage settings connections and receive data, such as from the phonebook contacts and, if necessary, other information.
How can I determine that I was listening to
Certainly - in any way. In some ancient cell phones on the screen when the call was a special indicator, indicating the presence of encrypted connection, but in modern smartphones such an indicator is not present. Who can replace it with a more functional application, analyzing the parameters of the current connection and warns you about suspicious things.
Android IMSI-Catcher Detector - as the name implies, prevents and protects against phishing web connection to the base stations. Application is not on Google Play, and will have to install it manually. The application source code is open.
CatcherCatcher - an analog of the previous application. It is also set hands.
Darshak - catches SMS, sent without the knowledge of the owner, and analyzes the level of security of the network operator at a given time.
EAGLE Security - a comprehensive remedy. Catches feykovye station displays applications with access to the microphone and smartphone chamber and prevents access when needed.