• IP addresses are NOT logged in this forum so there's no point asking. Please note that this forum is full of homophobes, racists, lunatics, schizophrenics & absolute nut jobs with a smattering of geniuses, Chinese chauvinists, Moderate Muslims and last but not least a couple of "know-it-alls" constantly sprouting their dubious wisdom. If you believe that content generated by unsavory characters might cause you offense PLEASE LEAVE NOW! Sammyboy Admin and Staff are not responsible for your hurt feelings should you choose to read any of the content here.

    The OTHER forum is HERE so please stop asking.

BREAKING: Everyone Can Now Listen In To Everyone's Else Mobile Communications

ahleebabasingaporethief

Alfrescian
Loyal
Currently only GARMENT can listen in to your handphone conversations by buying a ISRAEL made scanner costing round $200,000. H/P conversations were NEVER safe.

BUT NOW....hooosay liao....you, I and every Ah ter Ah Kow can also listen in to GARMENT Ministars' conversation.. Wait for the underground people to bring this scanner in for around $1K maybe....hahaha


Secret mobile phone codes cracked


<!-- S BO --> <!-- S IBYL --> <table width="466" border="0" cellpadding="0" cellspacing="0"> <tbody><tr> <td valign="bottom"> By Jonathan Fildes
Technology reporter, BBC News
</td> </tr> </tbody></table>
999999.gif


<!-- E IBYL --> <!-- S IIMA --> <table width="226" align="right" border="0" cellpadding="0" cellspacing="0"> <tbody><tr><td>
_46988696_hack-bbc226.jpg.jpg
Encryption is used on mobiles to stop eavesdropping

</td></tr> </tbody></table> <!-- E IIMA --> <!-- S SF -->A German computer scientist has published details of the secret code used to protect the conversations of more than 4bn mobile phone users.
Karsten Nohl, working with other experts, has spent the past five months cracking the algorithm used to encrypt calls using GSM technology.
GSM is the most popular standard for mobile networks around the world.
The work could allow anyone - including criminals - to eavesdrop on private phone conversations.
<!-- E SF -->Mr Nohl told the Chaos Communication Congress in Berlin that the work showed that GSM security was "inadequate".
"We are trying to inform people about this widespread vulnerability," he told BBC News.
"We hope to create some additional pressure and demand from customers for better encryption."
The GSM Association (GSMA), which devised the algorithm and oversees development of the standard, said Mr Nohl's work would be "highly illegal" in the UK and many other countries.
"This isn't something that we take lightly at all," a spokeswoman said.
Mr Nohl told the BBC that he had consulted with lawyers before publication and believed the work was "legal".
'Secret key'
<!-- S IIMA --> <table width="226" align="right" border="0" cellpadding="0" cellspacing="0"> <tbody><tr><td>
_47005166_-9.jpg
GSM encryption was first introduced in 1987

</td></tr> </tbody></table> <!-- E IIMA --> Mr Nohl, working with a "few dozen" other people, claims to have published material that would crack the A5/1 algorithm, a 22-year-old code used by many carriers.
The code is designed to prevent phone calls from being intercepted by forcing mobile phones and base stations to rapidly change radio frequencies over a spectrum of 80 channels.
It is known to have a series of weaknesses with the first serious flaw exposed in 1994.
Mr Nohl, who describes himself as an "offensive security researcher", announced his intention to crack the code at the Hacking at Random (HAR) conference in The Netherlands in August this year.
"Any cryptographic function is a one way street," he told BBC News. "You should not be able to decrypt without the secret key".
To get around this problem, Mr Nohl, working with other members of the encryption community, used networks of computers to crunch through "every possible combination" of inputs and outputs for the encryption code. Mr Nohl said there were "trillions" of possibilities.
<!-- S IBOX --> <table width="231" align="right" border="0" cellpadding="0" cellspacing="0"> <tbody><tr> <td width="5">
o.gif
</td> <td class="sibtbg">
start_quote_rb.gif
It lowers the bar for people and organisations to crack GSM calls
end_quote_rb.gif



Ian Meakin
Cellcrypt

</td> </tr> </tbody></table> <!-- E IBOX --> All of the outputs are now detailed in a vast table, which can be used to determine the encryption key used to secure the conversation or text message.
"It's like a telephone book - if someone tells you a name you can look up their number," he said.
Using the codebook, a "beefy gaming computer and $3,000 worth of radio equipment" would allow anyone to decrypt signals from the billions of GSM users around the world, he said.
Signals could be decrypted in "real time" with $30,000 worth of equipment, Mr Nohl added.
'Not practical'
It has previously been possible to decrypt GSM signals to listen in on conversations, but the equipment cost "hundreds of thousands of dollars," experts said.
According to Ian Meakin, of mobile encryption firm Cellcrypt, only government agencies and "well funded" criminals had access to the necessary technology.
He described Mr Nohl's work as a "massive worry".
"It lowers the bar for people and organisations to crack GSM calls," he told BBC News.
"It inadvertently puts these tools and techniques in the hands of criminals."
However, the GSMA dismissed the worries, saying that "reports of an imminent GSM eavesdropping capability" were "common".
It said that there had been "a number" of academic papers outlining how A5/1 could be compromised but "none to date have led to a practical attack".
The association said that it had already outlined a proposal to upgrade A5/1 to a new standard known as A5/3 which was currently being "phased in".
"All in all, we consider this research, which appears to be motivated in part by commercial considerations, to be a long way from being a practical attack on GSM," the spokeswoman said
 

halsey02

Alfrescian (Inf)
Asset
The wives must buy this, and listen in to all the husband's talking sweet nothings to their China Mei Mei..
 

allanlee

Alfrescian
Loyal
Why reinvent the wheel? This guy is definitely not from the intel/security industry....... the singkie gahmen oredi has sophisticate equipment that can listen/intercept/eavesdrop on all communications...... Field officers oso carry a handheld pocket size similar device that enables them to eavesdrop on their target's communication within 400m radius for the past decade....... maybe now they may even have procured more advanced or sophisticated equipment :p
 
Top