Project Overwatch: Multi-National Effort to Combat IMSI Catchers

Slides:



Advertisements
Similar presentations
Fall VoN 2000 SIP for IP Communications Jonathan Rosenberg Chief Scientist.
Advertisements

LinkSec Architecture Attempt 3
Cell Phone Jammer By:- Ganesh Pathak Pallavi Mantri Rohit Patil Pawan Kumar.
CC4100 Active Cellular Intercept Technologies
WSUS Presented by: Nada Abdullah Ahmed.
1 Chapter 7 Intrusion Detection. 2 Objectives In this chapter, you will: Understand intrusion detection benefits and problems Learn about network intrusion.
Honeypot 서울과학기술대학교 Jeilyn Molina Honeypot is the software or set of computers that are intended to attract attackers, pretending to be weak.
Aappro Ltd GSM detection concepts for March 2010.
 How Safe Are Smart Phones? By Sean Breslin. Can We Trust Our Phones?  Our cell phone, for most of us, is always by our side  If it is always with.
Security Awareness: Applying Practical Security in Your World
Lesson 13-Intrusion Detection. Overview Define the types of Intrusion Detection Systems (IDS). Set up an IDS. Manage an IDS. Understand intrusion prevention.
©Ian Sommerville 2006Critical Systems Slide 1 Critical Systems Engineering l Processes and techniques for developing critical systems.
1 INTRUSION ALARM TECHNOLOGY LOCAL VS. MONITORING.
RF Drive Test (Testing) Engr. Mehran Mamonai. Introduction Every good RF design, after its implantation should be evaluated. There are few ways to do.
Intrusion Detection System Marmagna Desai [ 520 Presentation]
Network security policy: best practices
Commercialization of Mobile Real-Time Situational Awareness Technologies for Business Decision-Makers S4 Worldwide LLC.
©2014 Bit9. All Rights Reserved Endpoint Threat Prevention Charles Roussey | Sr. Sales Engineer Detection and Response in Seconds.
GSM Network Structure Lance Westberg.
Cellular Mobile Communication Systems Lecture 8
Fundamentals of Proxying. Proxy Server Fundamentals  Proxy simply means acting on someone other’s behalf  A Proxy acts on behalf of the client or user.
Knowing What You Missed Forensic Techniques for Investigating Network Traffic.
Digital Cellular Techniques ENGR 475 – Telecommunications October 26, 2006 Harding University Jonathan White.
Configuring Cisco Switches Chapter 13 powered by DJ 1.
Framework for combating Importation, Supply and Use of Counterfeit/substandard terminals in EACO member states Presenter Mwende Njiraini Communications.
CHAPTER 2 Laws of Security. Introduction Laws of security enable user make the judgment about the security of a system. Some of the “laws” are not really.
Role Of Network IDS in Network Perimeter Defense.
Cellular Networks 1. Overview 1G Analog Cellular 2G TDMA - GSM 2G CDMA - IS G 3G 4G and Beyond Cellular Engineering Issues 2.
Inside Sales Series Ten ideas to help you develop a successful sales plan for 2014.
BareDroid Presenter: Callan Christophersen. What is BareDroid BareDroid is a system to analyse Android apps on real devices with no emulation. It uses.
Android and IOS Permissions Why are they here and what do they want from me?
The Hacking Suite For Governmental Interception. The pain: the impact of encryption on Law Enforcement and National Security FBI - Statement Before the.
Visual Analytics for Cyber Defense Decision-Making Anita D’Amico, Ph.D. Secure Decisions division of Applied Visions, Inc.
IT-101 Section 001 Lecture #15 Introduction to Information Technology.
Proactive Incident Response
Threat, Analysis and Mitigation
Mobile communication methods
Introduction Wireless devices offering IP connectivity
Mobile Data Solutions Inc
Wireless Network Security
Outline What does the OS protect? Authentication for operating systems
Mobile communication methods
Introduction to Networking
Introduction to Networking
Outline What does the OS protect? Authentication for operating systems
By: Dr. Visavnath, Lecturer Comp. Engg. Deptt.
Nessus Vulnerability Scanning
NEW PRODUCT INTRODUCTION CONEKT™ Mobile Smartphone Access Control Identification Solution June 2018.
Summary AutoMap™ is an innovative vehicle tracking and reporting system that ensures the vehicle’s location and status. Reduces Cost Removes all routine.
Training Module Introduction to the TB9100/P25 CG/P25 TAG Customer Service Software (CSS) Describes Release 3.95 for Trunked TB9100 and P25 TAG Release.
IoT Security – fel vagyunk rá készülve?
Anonymous Reporting App
Denial-of-Service Jammer Detector Training Course Worldsensing
Intrusion Detection system
Mobile Phone Technology
improve customer experience
Anonymous Reporting App
Cellular Telephone Networks
The MobileIron® Threat Detection difference:
By: Dr. Visavnath, Lecturer Comp. Engg. Deptt.
Overview of Networking
Dept. of Business Administration
Marcial Quinones-Cardona
COMPLETE BUSINESS TEXTING SOLUTION
Harness Network Data and Artificial Intelligence
LM 7. Cellular Network Security
Security in Wide Area Networks
Anonymous Reporting App
Anonymous Reporting App
AIR-T11 What We’ve Learned Building a Cyber Security Operation Center: du Case Study Tamer El Refaey Senior Director, Security Monitoring and Operations.
Presentation transcript:

Project Overwatch: Multi-National Effort to Combat IMSI Catchers MBS-F03 Project Overwatch: Multi-National Effort to Combat IMSI Catchers Trent Smith Director of Overwatch ESD America @trentatesd

Who are we 6 years ago we commenced a joint research project into ways that groups like the NSA and GCHQ hack cell phones. The research was conducted on behalf of a major European government customer. The research focused on two main areas of attack: The SS7 protocol on cellular networks Over the air attacks using IMSI Catchers

“With access to Overwatch, our clientele are armed with real-time cellular network data that produces strategic, actionable intelligence aimed at stopping their exposures and securing their cellular networks.” J.D. LeaSure President/CEO, ComSec LLC TSCM, proven and perfected.™

IMSI Catchers in the Media

IMSI Catchers In The Media IMSI Catchers have shot to fame over the last 24 months

IMSI Catchers In The Media Their use/misuse is often a matter of perspective

IMSI Catcher Technology

What Is An IMSI Catcher IMSI - Individual Mobile Subscriber Identity A IMSI Catcher is a device that pretends to be a cell tower in order to trick your phone into connecting to it. In truth, your phone has no idea the IMSI Catcher is not part of the real network.

Why Do Phones Trust Them? Cell phones are designed to look for other towers with better reception. The IMSI Catcher operator must adjust settings to replicate a cell tower in your area. The phone will connect to the IMSI catcher if it’s made to look more ‘attractive’ than the real network. Broadcast a stronger signal (uncommon) Modifying the C1/C2 value Jam competing frequencies “Push the green button”

How Do They Work? In order to look more attractive than surrounding cell towers the IMSI Catcher could: Broadcast a stronger signal (uncommon) Modifying the C1/C2 value Jam competing frequencies “Push the green button” Techniques vary between hardware and the network being attacked (2G/3G/4G)

Why Use An IMSI Catcher Verify a phone’s (person’s) location Track and locate a device Denial of service Monitor cell phone use (prisons) Intercept calls/SMS Alert to the arrival or exit of a phone

Are 3G/4G Calls More Secure? They used to be 'safer' because he level of difficulty was higher and less 4G intercept systems were available. At the HITB Conference 2016 - Unicorn Team explained how to force a targeted LTE phone onto an unsafe network We've been seeing phones jump to an available 2G network in the absence of 4G coverage, instead of falling back to 3G. Locking your phone to use 3G/4G isn’t always reliable. We’ve found that locking your phone to 3G/4G seems to just stop your phone looking for 2G towers. However is doesn’t stop an attacker putting your phone into a 2G channel once it’s been caught.

What about 5G? Yes 5G is the next step forward expected around 2020. Doesn’t specify a particular technology yet. 4G IMSI catchers exist, so will 5G ones. You can bet your tax dollars that the 3-letter agency boffins are hard at work dreaming up solutions right now.

How To Catch an IMSI Catcher Some of the signs to look for when hunting IMSI Catchers: ARFCN for the serving cell changes Same Cell ID or LAC used in close proximity Cell has no neighbors Ciphering Disabled Force down to 2G Short T3212 timer Sequence of these events and indicators matter. It takes analysis, experience, and situational awareness to make a reliable judgment.

Is There An App For That? Apps available from iTunes or the Google Play Store are either ineffective or lying to you. Detecting some of these anomalies require access to the phones baseband processor which isn't possible without a jailbroken or rooted device. That's fine for geeks, but instantly voiding the warranty on your hardware isn't a commercially viable solution for most businesses or government agencies.

There’s NOT An App For That! Apps with only standard API access are missing critical indicators from the phone base band. Type0 SMS also known as ‘Silent SMS’ are often used for location tracking Apps do not provide the ability to establish extensive rules sets. With Overwatch we can easily configure it for the network operators normal operations. As an example power changes on many European carriers are minimal but in the USA the towers constantly change output power. Knowing the environment and establishing a rule set helps provide the operator with a noise floor. Apps are also limited to which ever cell tower the cell phone is connected. Overwatch can do analysis on multiple towers at once and reassess any tower it sees as behaving abnormally. The best example of something BBFW/OW Sensor can detect that a user installed app on a non-rooted or jailbroken device could never do because of the restricted access to the baseband processor, is to detect incoming silent SMS (Type0 SMS). By definition Type0 SMS are not to be shown to the User on arrival. Our sensors can detect those and generate an alert for that.

Project Overwatch Eating Stingrays for breakfast since 2015

Project Overwatch has been a multi-national effort between USA, Germany, and Australia to create a solution leveraging GSMK’s patented Baseband Firewall technology.

Project Overwatch Can detect and combat rogue base stations and other cellular attacks in real-time: IMSI Catchers Hostile takeover of Baseband Processor (Audio Path/DoS) Modified Pico Cells Other air interface attacks (Jamming/2G force-down)

Network Events in Real-time Jamming attack seen during a demonstration for Government customer

Rogue Cell Detected Tower was emulating the country and network codes for U.S. Cellular, however they don’t have 2G GSM cells. Their network is primarily CDMA in transition to LTE.

Rogue Cell Detected Overwatch logs detailed events for the suspicious tower

Rogue Cell Detected We can see from the Overwatch database that MCC 311 MNC 220 is actually an active CDMA service.

Project Overwatch A strategic deployment incorporating feeds from thousands of sensors creates an unparalleled view of the cellular air-interface.

Overwatch Demonstration

Government Response to IMSI Catchers FCC has been involved with investigating their use, but at the same time also provides equipment certification for these devices. An effective tool that Governments and Intelligences agencies don’t want to lose. We provide governments and law enforcement the ability to detect and monitor IMSI catchers. It’s up to them to decide which ones are legal/illegal.

What can be done? In reality network operators need to consider the effect on IMSI Catchers on customer services. The sale of IMSI catchers it already tightly regulated. Government needs to take a proactive role in detecting and prosecuting IMSI Catcher operators. Prompt investigation of potential threats is required. To defend against IMSI Catchers, you need to be able to find them first.

overwatch@esdamerica.com esdoverwatch.com Questions overwatch@esdamerica.com esdoverwatch.com