mirror of
https://github.com/fdiskyou/Zines.git
synced 2025-03-09 00:00:00 +01:00
280 lines
14 KiB
Text
280 lines
14 KiB
Text
==Phrack Inc.==
|
|
|
|
Volume Two, Issue Eleven, Phile #9 of 12
|
|
|
|
--------------------------------------------------------------------------
|
|
The following is reprinted from the November 1985 issue of Personal
|
|
Communications Technology magazine by permission of the authors and
|
|
the publisher, FutureComm Publications Inc., 4005 Williamsburg Ct.,
|
|
Fairfax, VA 22032, 703/352-1200.
|
|
|
|
Copyright 1985 by FutureComm Publications Inc. All rights reserved.
|
|
--------------------------------------------------------------------------
|
|
|
|
|
|
THE ELECTRONIC SERIAL NUMBER: A CELLULAR 'SIEVE'?
|
|
'SPOOFERS' CAN DEFRAUD USERS AND CARRIERS
|
|
|
|
by Geoffrey S. Goodfellow, Robert N. Jesse, and Andrew H. Lamothe, Jr.
|
|
|
|
|
|
What's the greatest security problem with cellular phones? Is it privacy of
|
|
communications? No.
|
|
|
|
Although privacy is a concern, it will pale beside an even greater problem:
|
|
spoofing.
|
|
|
|
'Spoofing' is the process through which an agent (the 'spoofer') pretends to
|
|
be somebody he isn't by proffering false identification, usually with intent
|
|
to defraud. This deception, which cannot be protected against using the
|
|
current U.S. cellular standards, has the potential to create a serious
|
|
problem--unless the industry takes steps to correct some loopholes in the
|
|
present cellular standards.
|
|
|
|
Compared to spoofing, the common security concern of privacy is not so severe.
|
|
Most cellular subscribers would, at worst, be irked by having their
|
|
conversational privacy violated. A smaller number of users might actually
|
|
suffer business or personal harm if their confidential exchanges were
|
|
compromised. For them, voice encryption equipment is becoming increasingly
|
|
available if they are willing to pay the price for it.
|
|
|
|
Thus, even though technology is available now to prevent an interloper from
|
|
overhearing sensitive conversations, cellular systems cannot--at any
|
|
cost--prevent pirates from charging calls to any account. This predicament is
|
|
not new to the industry. Even though cellular provides a modern,
|
|
sophisticated quality mobile communications service, it is not fundamentally
|
|
much safer than older forms of mobile telephony.
|
|
|
|
History of Spoofing Vulnerability
|
|
|
|
The earliest form of mobile telephony, unsquelched manual Mobile Telephone
|
|
Service (MTS), was vulnerable to interception and eavesdropping. To place a
|
|
call, the user listened for a free channel. When he found one, he would key
|
|
his microphone to ask for service: 'Operator, this is Mobile 1234; may I
|
|
please have 555-7890.' The operator knew to submit a billing ticket for
|
|
account number 1234 to pay for the call. So did anybody else listening to the
|
|
channel--hence the potential for spoofing and fraud.
|
|
|
|
Squelched channel MTS hid the problem only slightly because users ordinarily
|
|
didn't overhear channels being used by other parties. Fraud was still easy
|
|
for those who turned off the squelch long enough to overhear account numbers.
|
|
|
|
Direct-dial mobile telephone services such as Improved Mobile Telephone
|
|
Service (IMTS) obscured the problem a bit more because subscriber
|
|
identification was made automatically rather than by spoken exchange between
|
|
caller and operator. Each time a user originated a call, the mobile telephone
|
|
transmitted its identification number to the serving base station using some
|
|
form of Audio Frequency Shift Keying (AFSK), which was not so easy for
|
|
eavesdroppers to understand.
|
|
|
|
Committing fraud under IMTS required modification of the mobile--restrapping
|
|
of jumpers in the radio unit, or operating magic keyboard combinations in
|
|
later units--to reprogram the unit to transmit an unauthorized identification
|
|
number. Some mobile control heads even had convenient thumb wheel switches
|
|
installed on them to facilitate easy and frequent ANI (Automatic Number
|
|
Identification) changes.
|
|
|
|
Cellular Evolution
|
|
|
|
Cellular has evolved considerably from these previous systems. Signaling
|
|
between mobile and base stations uses high-speed digital techniques and
|
|
involves many different types of digital messages. As before, the cellular
|
|
phone contains its own Mobile Identification Number (MIN), which is programmed
|
|
by the seller or service shop and can be changed when, for example, the phones
|
|
sold to a new user. In addition, the U.S. cellular standard incorporates a
|
|
second number, the 'Electronic Serial Number' (ESN), which is intended to
|
|
uniquely and permanently identify the mobile unit.
|
|
|
|
According to the Electronic Industries Association (EIA) Interim Standard
|
|
IS-3-B, Cellular System Mobile Station--Land Station Compatibility
|
|
Specification (July 1984), 'The serial number is a 32-bit binary number that
|
|
uniquely identifies a mobile station to any cellular system. It must be
|
|
factory-set and not readily alterable in the field. The circuitry that
|
|
provides the serial number must be isolated from fraudulent contact and
|
|
tampering. Attempts to change the serial number circuitry should render the
|
|
mobile station inoperative.'
|
|
|
|
The ESN was intended to solve two problems the industry observed with its
|
|
older systems.
|
|
|
|
First, the number of subscribers that older systems could support fell far
|
|
short of the demand in some areas, leading groups of users to share a single
|
|
mobile number (fraudulently) by setting several phones to send the same
|
|
identification. Carriers lost individual user accountability and their means
|
|
of predicting and controlling traffic on their systems.
|
|
|
|
Second, systems had no way of automatically detecting use of stolen equipment
|
|
because thieves could easily change the transmitted identification.
|
|
|
|
In theory, the required properties of the ESN allow cellular systems to check
|
|
to ensure that only the correctly registered unit uses a particular MIN, and
|
|
the ESNs of stolen units can be permanently denied service ('hot-listed').
|
|
This measure is an improvement over the older systems, but vulnerabilities
|
|
remain.
|
|
|
|
Ease of ESN Tampering
|
|
|
|
Although the concept of the unalterable ESN is laudable in theory, weaknesses
|
|
are apparent in practice. Many cellular phones are not constructed so that
|
|
'attempts to change the serial number circuitry renders the mobile station
|
|
inoperative.' We have personally witnessed the trivial swapping of one ESN
|
|
chip for another in a unit that functioned flawlessly after the switch was
|
|
made.
|
|
|
|
Where can ESN chips be obtained to perform such a swap? We know of one recent
|
|
case in the Washington, D.C. area in which an ESN was 'bought' from a local
|
|
service shop employee in exchange for one-half gram of cocaine. Making the
|
|
matter simpler, most manufacturers are using industry standard Read-Only
|
|
Memory (ROM) chips for their ESNs, which are easily bought and programmed or
|
|
copied.
|
|
|
|
Similarly, in the spirit of research, a west coast cellular carrier copied the
|
|
ESN from one manufacturer's unit to another one of the same type and
|
|
model--thus creating two units with the exact same identity.
|
|
|
|
The ESN Bulletin Board
|
|
|
|
For many phones, ESN chips are easy to obtain, program, and install. How does
|
|
a potential bootlegger know which numbers to use? Remember that to obtain
|
|
service from a system, a cellular unit must transmit a valid MIN (telephone
|
|
number) and (usually) the corresponding serial number stored in the cellular
|
|
switch's database.
|
|
|
|
With the right equipment, the ESN/MIN pair can be read right off the air
|
|
because the mobile transmits it each time it originates a call. Service shops
|
|
can capture this information using test gear that automatically receives and
|
|
decodes the reverse, or mobile-to-base, channels.
|
|
|
|
Service shops keep ESN/MIN records on file for units they have sold or
|
|
serviced, and the carriers also have these data on all of their subscribers.
|
|
Unscrupulous employees could compromise the security of their customers'
|
|
telephones.
|
|
|
|
In many ways, we predict that 'trade' in compromised ESN/MIN pairs will
|
|
resemble what currently transpires in the long distance telephone business
|
|
with AT&T credit card numbers and alternate long-distance carrier (such as
|
|
MCI, Sprint and Alltel) account codes. Code numbers are swapped among
|
|
friends, published on computer 'bulletin boards' and trafficked by career
|
|
criminal enterprises.
|
|
|
|
Users whose accounts are being defrauded might--or might not--eventually
|
|
notice higher-than-expected bills and be reassigned new numbers when they
|
|
complain to the carrier. Just as in the long distance business, however, this
|
|
number 'turnover' (deactivation) won't happen quickly enough to make abuse
|
|
unprofitable. Catching pirates in the act will be even tougher than it is in
|
|
the wireline telephone industry because of the inherent mobility of mobile
|
|
radio.
|
|
|
|
Automating Fraud
|
|
|
|
Computer hobbyists and electronics enthusiasts are clever people. Why should
|
|
a cellular service thief 'burn ROMs' and muck with hardware just to install
|
|
new IDs in his radio? No Herculean technology is required to 'hack' a phone
|
|
to allow ESN/MIN programming from a keyboard, much like the IMTS phone thumb
|
|
wheel switches described above.
|
|
|
|
Those not so technically inclined may be able to turn to mail-order
|
|
entrepreneurs who will offer modification kits for cellular fraud, much as
|
|
some now sell telephone toll fraud equipment and pay-TV decoders.
|
|
|
|
At least one manufacturer is already offering units with keyboard-programmable
|
|
MINs. While intended only for the convenience of dealers and service shops,
|
|
and thus not described in customer documentation, knowledgeable and/or
|
|
determined end users will likely learn the incantations required to operate
|
|
the feature. Of course this does not permit ESN modification, but easy MIN
|
|
reprogrammability alone creates a tremendous liability in today's roaming
|
|
environment.
|
|
|
|
The Rolls Royce of this iniquitous pastime might be a 'Cellular Cache-Box.' It
|
|
would monitor reverse setup channels and snarf ESN/MIN pairs off the air,
|
|
keeping a list in memory. Its owner could place calls as on any other
|
|
cellphone. The Cache-Box would automatically select an ESN/MIN pair from its
|
|
catalog, use it once and then discard it, thus distributing its fraud over
|
|
many accounts. Neither customer nor service provider is likely to detect the
|
|
abuse, much less catch the perpetrator.
|
|
|
|
As the history of the computer industry shows, it is not far-fetched to
|
|
predict explosive growth in telecommunications and cellular that will bring
|
|
equipment prices within reach of many experimenters. Already we have seen the
|
|
appearance of first-generation cellular phones on the used market, and new
|
|
units can be purchased for well under $1000 in many markets.
|
|
|
|
How High The Loss?
|
|
|
|
Subscribers who incur fraudulent charges on their bills certainly can't be
|
|
expected to pay them. How much will fraud cost the carrier? If the charge is
|
|
for home-system airtime only, the marginal cost to the carrier of providing
|
|
that service is not as high as if toll charges are involved. In the case of
|
|
toll charges, the carrier suffers a direct cash loss. The situation is at its
|
|
worst when the spoofer pretends to be a roaming user. Most inter-carrier
|
|
roaming agreements to date make the user's home carrier (real or spoofed)
|
|
responsible for charges, who would then be out hard cash for toll and airtime
|
|
charges.
|
|
|
|
We have not attempted to predict the dollar losses this chicanery might
|
|
generate because there isn't enough factual information information for anyone
|
|
to guess responsibly. Examination of current estimates of long-distance-toll
|
|
fraud should convince the skeptic.
|
|
|
|
Solutions
|
|
|
|
The problems we have described are basically of two types. First, the ESN
|
|
circuitry in most current mobiles is not tamper-resistant, much less
|
|
tamper-proof. Second and more importantly, the determined perpetrator has
|
|
complete access to all information necessary for spoofing by listening to the
|
|
radio emissions from valid mobiles because the identification information
|
|
(ESN/MIN) is not encrypted and remains the same with each transmission.
|
|
|
|
Manufacturers can mitigate the first problem by constructing mobiles that more
|
|
realistically conform to the EIA requirements quoted above. The second
|
|
problem is not beyond solution with current technology, either. Well-known
|
|
encryption techniques would allow mobiles to identify themselves to the
|
|
serving cellular system without transmitting the same digital bit stream each
|
|
time. Under this arrangement, an interloper receiving one transmission could
|
|
not just retransmit the same pattern and have it work a second time.
|
|
|
|
An ancillary benefit of encryption is that it would reasonably protect
|
|
communications intelligence--the digital portion of each transaction that
|
|
identifies who is calling whom when.
|
|
|
|
The drawback to any such solution is that it requires some re-engineering in
|
|
the Mobile-Land Station Compatibility Specification, and thus new software or
|
|
hardware for both mobiles and base stations. The complex logistics of
|
|
establishing a new standard, implementing it, and retrofitting as much of the
|
|
current hardware as possible certainly presents a tough obstacle, complicated
|
|
by the need to continue supporting the non-encrypted protocol during a
|
|
transition period, possibly forever.
|
|
|
|
The necessity of solving the problem will, however, become apparent. While we
|
|
presently know of no documented cases of cellular fraud, the vulnerability of
|
|
the current standards and experience with similar technologies lead us to
|
|
conclude that it is inevitable. Failure to take decisive steps promptly will
|
|
expose the industry to a far more expensive dilemma. XXX
|
|
|
|
|
|
Geoffrey S. Goodfellow is a member of the senior research staff in the
|
|
Computer Science Laboratory at SRI International, 333 Ravenswood Ave., Menlo
|
|
Park, CA 94025, 415/859-3098. He is a specialist in computer security and
|
|
networking technology and is an active participant in cellular industry
|
|
standardization activities. He has provided Congressional testimony on
|
|
telecommunications security and privacy issues and has co-authored a book on
|
|
the computer 'hacking' culture.
|
|
|
|
Robert N. Jesse (2221 Saint Paul St., Baltimore, MD 21218, 301/243-8133) is an
|
|
independent consultant with expertise in security and privacy, computer
|
|
operating systems, telecommunications and technology management. He is an
|
|
active participant in cellular standardization efforts. He was previously a
|
|
member of the senior staff at The Johns Hopkins University, after he obtained
|
|
his BES/EE from Johns Hopkins.
|
|
|
|
Andrew H. Lamothe, Jr. is executive vice-president of engineering at Cellular
|
|
Radio Corporation, 8619 Westwood Center Dr., Vienna, VA 22180, 703/893-2680.
|
|
He has played a leading role internationally in cellular technology
|
|
development. He was with Motorola for 10 years prior to joining American
|
|
TeleServices, where he designed and engineered the Baltimore/Washington market
|
|
trial system now operated by Cellular One.
|
|
--------
|
|
|
|
|
|
A later note indicates that one carrier may be losing something like $180K per
|
|
month....
|