How Hackers track your Mobile number Location
By
Unknown
5
comments
Cellular phones have become a ubiquitous means of
communications with over 5 billion users worldwide in2010, of which 80% are GSM
subscribers. Due to theiruse of the wireless medium and their mobile nature,
thosephones listen to broadcast communications that could reveal their physical
location to a passive adversary.
University of Minnesota researchers
found a flaw in AT&T and T-Mobile cell towers that reveals the location of
phone users. The attack, described in a Research paper
(Click to Download Pdf), is most useful for determining whether
a target is within a given geographic area as large as about 100 square kms or
as small as one square kilometer. It can also be used to pinpoint a target's
location but only when the attacker already knows the city, or part of a city,
the person is in.
Ph.D. student Denis Foo Kune says, “Cell phone towers
have to track cell phone subscribers to provide service efficiently. For
example, an incoming voice call requires the network to locate that device so
it can allocate the appropriate resources to handle the call. Your cell phone
network has to at least loosely track your phone within large regions in order
to make it easy to find it“.
The messages contain I.D. codes. In
order to match the codes to the cell phone number, researchers called the phone
three times. The code that appeared three times in the same time period in
which researchers were listening in is most likely the code of the cell phone.“From there we can
use that I.D. to determine if you’re around a certain area or if you’re on a
particular cell tower,” he said.
The process requires a feature
cellphone and a laptop, running the open-source Osmocom GSM firmware and
software respectively, along with a cable connecting the two devices. It also
uses a separate cellphone and landline.
The attackers use the landline to call the target's cellphone
when it's located near the same LAC as the equipment and use the laptop output
to monitor the broadcasts that immediately follow over the airwaves to page the
target phone.
The implications of this research
highlight possible personal safety issues. The group explains their work
in a recently presented at the 19th Annual
Network & Distributed System Security Symposium and was
titled “Location Leaks on the GSM Air Interface”. The group has also
contacted AT&T and Nokia with some low-cost options that could be
implemented without changing the hardware.
Thanks for the blog loaded with so many information. Stopping by your blog helped me to get what I was looking for. ( Locateanumber.com | www.locateanumber.com | http://locateanumber.com | https://locateanumber.com )
ReplyDeleteThanks for the blog loaded with so many information. Stopping by your blog helped me to get what I was looking for. https://locateanumber.com
ReplyDeleteHello everyone I want to introduce you guys to a group a private investigators who can help you with information you need in any situation in life and they are ready to follow you step by step until your case is cleared just contact +17078685071 and you will happily ever after
ReplyDeletePremiumhackservices@gmail.com
Thank you very much for this useful article. I like it. cell phone tracking
ReplyDeleteThe criminal record on my credit deprived me of so many opportunities alongside 19 hard inquiries and about 15 derogatory items which messed up my report and lowered my credit score to low 544(TransUnion) 523(Equifax) 515(Experian). After my mum told me about CREDIT TRINITY CARE. I reached out immediately and complied with the proposal, after about five days I was asked to pull my report to confirm the job has been done. Yes...... my score is now 801 across the 3 credit bureaus and all of those things removed. I strongly recommend them to anyone who’s in need of credit fix. Email on: creditscoretrinity@gmail.com Or Text +1 385 758 4966
ReplyDelete