Thursday, December 5, 2019

Cell phone phreaking Essay Example For Students

Cell phone phreaking Essay Cellular Phreaking The cellular/mobile phone system is one that is perfectly set up to be exploited by phreaks with the proper knowledge and equipment. Thanks to deregulation, the regional BOCs (Bell Operating Companies) are scattered and do not communicate much with each other. Phreaks can take advantage of this by pretending to be mobile phone customers whose home base is a city served by a different BOC, known as a roamer. Since it is impractical for each BOC to keep track of the customers of all the other BOCs, they will usually allow the customer to make the calls he wishes, often with a surcharge of some sort. The bill is then forwarded to the roamers home BOC for collection. However, it is fairly simple (with the correct tools) to create a bogus ID number for your mobile phone, and pretend to be a roamer from some other city and state, thats just visiting. When your BOC tries to collect for the calls from your alleged home BOC, they will discover you are not a real customer; but by then, you can create an entirely new electronic identity, and use that instead. How does the cellular system know who is calling, and where they are? When a mobile phone enters a cells area of transmission, it transmits its phone number and its 8 digit ID number to that cell, who will keep track of it until it gets far enough away that the sound quality is sufficiently diminished, and then the phone is handed off to the cell that the customer has walked or driven into. This process continues as long as the phone has power and is turned on. If the phone is turned off (or the car is), someone attempting to call the mobile phone will receive a recording along the lines of The mobile phone customer you have dialed has left the vehicle or driven out of the service area. When a call is made to a mobile phone, the switching equipment will check to see if the mobile phone being called is logged in, so to speak, or present in one of the cells. If it is, the call will then act (to the speaking parties) just like a normal call the caller may hear a busy tone, the phone may just ring, or the call may be answered. How does the switching equipment know whether or not a particular phone is authorized to use the network? Many times, it doesnt. When a dealer installs a mobile phone, he gives the phones ID number (an 8 digit hexadecimal number) to the local BOC, as well as the phone number the BOC assigned to the customer. Thereafter, whenever a phone is present in one of the cells, the two numbers are checked they should be registered to the same person. If they dont match, the telco knows that an attempted fraud is taking place (or at best, some transmission error) and will not allow calls to be placed or received at that phone. However, it is impractical (especially given the present state of deregulation) for the telco to have records of every cellular customer of every BOC. Therefore, if youre going to create a fake ID/phone number combination, it will need to be based in an area that has a cellular system (obviously), has a different BOC than your local area does, and has some sort of a roamer agreement with your local BOC. How can one phreak a cellular phone? There are three general areas when phreaking cellular phones; using one you found in an unlocked car (or an unattended walk-about model), modifying your own chip set to look like a different phone, or recording the phone number/ID number combinations sent by other local cellular phones, and using those as your own. Most cellular phones include a crude password system to keep unauthorized users from using the phone however, dealers often set the password (usually a 3 to 5 digit code) to the last four digits of the customers mobile phone number. If you can find that somewhere on the phone, youre in luck. If not, it shouldnt be TOO hard to hack, since most people arent smart enough to use something besides 1111, 1234, or whatever. .u2af4e3331116c23caa75cc99dbb2a596 , .u2af4e3331116c23caa75cc99dbb2a596 .postImageUrl , .u2af4e3331116c23caa75cc99dbb2a596 .centered-text-area { min-height: 80px; position: relative; } .u2af4e3331116c23caa75cc99dbb2a596 , .u2af4e3331116c23caa75cc99dbb2a596:hover , .u2af4e3331116c23caa75cc99dbb2a596:visited , .u2af4e3331116c23caa75cc99dbb2a596:active { border:0!important; } .u2af4e3331116c23caa75cc99dbb2a596 .clearfix:after { content: ""; display: table; clear: both; } .u2af4e3331116c23caa75cc99dbb2a596 { display: block; transition: background-color 250ms; webkit-transition: background-color 250ms; width: 100%; opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #95A5A6; } .u2af4e3331116c23caa75cc99dbb2a596:active , .u2af4e3331116c23caa75cc99dbb2a596:hover { opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #2C3E50; } .u2af4e3331116c23caa75cc99dbb2a596 .centered-text-area { width: 100%; position: relative ; } .u2af4e3331116c23caa75cc99dbb2a596 .ctaText { border-bottom: 0 solid #fff; color: #2980B9; font-size: 16px; font-weight: bold; margin: 0; padding: 0; text-decoration: underline; } .u2af4e3331116c23caa75cc99dbb2a596 .postTitle { color: #FFFFFF; font-size: 16px; font-weight: 600; margin: 0; padding: 0; width: 100%; } .u2af4e3331116c23caa75cc99dbb2a596 .ctaButton { background-color: #7F8C8D!important; color: #2980B9; border: none; border-radius: 3px; box-shadow: none; font-size: 14px; font-weight: bold; line-height: 26px; moz-border-radius: 3px; text-align: center; text-decoration: none; text-shadow: none; width: 80px; min-height: 80px; background: url(https://artscolumbia.org/wp-content/plugins/intelly-related-posts/assets/images/simple-arrow.png)no-repeat; position: absolute; right: 0; top: 0; } .u2af4e3331116c23caa75cc99dbb2a596:hover .ctaButton { background-color: #34495E!important; } .u2af4e3331116c23caa75cc99dbb2a596 .centered-text { display: table; height: 80px; padding-left : 18px; top: 0; } .u2af4e3331116c23caa75cc99dbb2a596 .u2af4e3331116c23caa75cc99dbb2a596-content { display: table-cell; margin: 0; padding: 0; padding-right: 108px; position: relative; vertical-align: middle; width: 100%; } .u2af4e3331116c23caa75cc99dbb2a596:after { content: ""; display: block; clear: both; } READ: Natalie : What Discourse Community Are You Apart Of? Essay If you want to modify the chip set in a cellular phone you bought (or stole), there are two chips (of course, this depends on the model and manufacturer, yours may be different) that will need to be changed one installed at the manufacturer (often epoxied in) with the phones ID number, and one installed by the dealer with the phone number, and possible the security code. To do this, youll obviously need an EPROM burner as well as the same sort of chips used in the phone (or a friendly and unscrupulous dealer!). As to recording the numbers of other mobile phone customers and using them; as far as I know, this is ju st theory.. . but it seems quite possible, if youve got the equipment to record and decode it. The cellular system would probably freak out if two phones (with valid ID/phone number combinations) were both present in the network at once, but it remains to be seen what will happen. Bibliography:

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.