mobile security issues

41
Mobile Security Issues

Upload: kunal-kapoor

Post on 15-Apr-2017

208 views

Category:

Education


4 download

TRANSCRIPT

Page 1: Mobile security issues

Mobile Security Issues

Page 2: Mobile security issues

Why are mobiles used?

Portable Cheap Personal Communication Device Video Recorder GPRS GPS Camera ( Photos & Videos ) Memory Storage Sufficient Power Backup Software Installation Compatibility WI-FI

Page 3: Mobile security issues

Technical Working of Mobile

Once the Mobile phone is switched on first it checks for Authentication / Registration.

Then the mobile handset identity that is IMEI / ESN is sent via Tower to the Operator

At last the Signal strength is checked

Page 4: Mobile security issues

Mobile Technologies

GSM Global System For Mobile Communication. GSM is a satellite based global system. Sim Card Required. BSNL, Vodafone, IDEA, Airtel, Aircel, BPL,Trump .

CDMA Code Division Multiple Access. CDMA technology is based on terrestrial optic fiber (cable)

based network . No Sim Card Required. Reliance, Tata Indicom , MTS .

Page 5: Mobile security issues

Mobile Memory Storage

According to the type of memory storage used in Mobile Phones, there are two types of storage Internal Memory

Internal Memory Phone Memory By default memory storage available in mobile phone Phone book, Call register, SMS are stored Limited in Size

External Memory Memory Card Memory Extended Memory storage Photos, Videos, Ring tones, Wallpapers, etc… High Capacity storage

Page 6: Mobile security issues

SIM Card

SIM – Subscribers Identity Module SIM card is required for using GSM services

It is a small memory chip which contains Network provider

Subscribers Information,

Contact Numbers,

SMS

Page 7: Mobile security issues

Mobile Operator – Network Service Provider

Mobile operators are the companies which provide mobile communication service.

Following are the mobile operators from all over the India

BSNL, BPL, Vodafone, Idea, AirTel, Tata, Reliance, Dolphin, Uninor etc…

Page 8: Mobile security issues

Mobile to Landline

MTSO- Mobile Telephone Switching Office/Mobile Switching Centre

HLR- Home Location Register

VLR- Visitors Location Register

EIR- Equipment Identity Register 1) Grey List 2) Black List 3) White List

SMSC- SMS Center

MMSC- MMS Center

Page 9: Mobile security issues

Mobile to Mobile (eg. Hutch-Hutch)

Page 10: Mobile security issues

Mobile to Mobile (Hutch-BPL)

Page 11: Mobile security issues

Tracing stolen Handsets

IMEI International Mobile Equipment Identity 15 Digit Code Unique Identification Code of a Mobile Handset Identity of a Mobile Handset Also known as Serial Number of Handset *#06# / *#9999# Under the battery on the mobile you will find the IMEI number. The BILL OR BOX of mobile handset when purchased .

ESN: Electronic Serial Number Identification of CDMA Mobile Handset / Serial Number of a CDMA Mobile Handset

Page 12: Mobile security issues

IMEI :-International Mobile Equipment Identity

Eg. 35 5360 00 825028 3

35 = country of registration.

5360 = Type Approval Code (TAC). detail of phone make/model

00 = Factory Approval Code. detail of manufacturer/assembled factory

Code.

825028 = Serial number of handset. unique identity.

3 = Spare or Check digit. basic checksum to tell you IMEI number is

correct/not corrupt. to calculate CHK digit, it is LUHN algorithm

Page 13: Mobile security issues

SIM IDENTIFICATIONS 

SIM NUM:- 89915 94097 11165 5559

1st& 2nd digit Indicates Industrial Code i.e.89

3rd & 4th digit Indicates Country Code i.e.91 For India

5th & 6th digit Indicates MNC (Mobile Network Code) I .e.59 For Rajasthan

7th digit Indicates Last digit of year manufacture i.e.2004

8th & 9th digit indicates Month of Manufacture i.e.09

10th digit indicates for future use purpose

11th digit indicates Zonal code i.e. 1 (East, West, North, and South)

12th digit indicates MSC (mobile service center )code

13th digit indicates Prepaid=1 and postpaid =2

14-19th digits indicates Running Number.

Page 14: Mobile security issues

Mobile Messaging

Page 15: Mobile security issues

GPRS: General Packet Radio Service

Operator Based service

GPRS is a data based service used for internet

browsing in mobile phones .

GPRS offers always-on, high speed (up to

115kbps*) connectivity to the Net. Thus you can

check your email on the move and surf the web at

high speeds.

Page 16: Mobile security issues

EDGE: Enhanced GPRS

Operator Based Service.

Enhanced data rate

for GSM Environment

Data speeds of up to

384kb.

Enhanced GPRS

Page 17: Mobile security issues

BlueTooth

Non Operator Based Wireless No Line Of Sight Range 10m-100m Data rate: Faster Bluetooth Peripherals BT ID : *#2820#

Page 18: Mobile security issues

Bluetooth Crimes

Unsecured Bluetooth can create many problems It is possible to hack into the Bluetooth enabled

mobile. Possible to access

Phonebook, SMS, Call Register, Controlling Mobile, etc…

Page 19: Mobile security issues

WI-FI (Wireless Fidelity)

Non Operator Based service Wireless network access technology . No Line Of Sight. Normally using for wireless internet & Networking

WI-FI Crimes

Using unsecured wireless router and using internet .

(Eg. send e-mails , Social networking and other crimes)

Page 20: Mobile security issues

Cloning

1.GSM SIM CARD Cloning• Cloning means a process of copying , or say duplicating from original one . (Creating a image).

Hardware : SIM Card reader. Software : SIMSCAN.Blank SIM Card (12 in 1).

Authentication Numbers are IMEI,Ki

Page 21: Mobile security issues

Mobile Crime Investigation

How to Find out Operator Use following website to find out Operator of a given mobile number http://trace.bharatiyamobile.com/

IMEI Analysis We can find out Mobile Handset Manufacturer & Handset Model from

IMEI Number www.numberingplans.com

Online Telephone Number Search Trace BSNL Landline can be Traced from BSNL Online Directory www.bsnl.co.in

Page 22: Mobile security issues
Page 23: Mobile security issues
Page 24: Mobile security issues
Page 25: Mobile security issues
Page 26: Mobile security issues
Page 27: Mobile security issues
Page 28: Mobile security issues
Page 29: Mobile security issues
Page 30: Mobile security issues
Page 31: Mobile security issues
Page 32: Mobile security issues
Page 33: Mobile security issues
Page 34: Mobile security issues
Page 35: Mobile security issues
Page 36: Mobile security issues

CDR CDR Printouts Gets in Following Format

Excel

HTML

Text

PDF

Page 37: Mobile security issues

Seizing Mobile Handsets

Use the faraday bag Don’t switch off the mobile Shut down the Bluetooth, GPRS services on the handset Check for the required evidence Check all the software installed in the mobile Don’t delete anything Don’t copy the evidence

it will create the possibility of tampering the evidence. Note down all the details in the mobile like -

Dialed/Missed/Received call details along with the date and time SMS Location

Call a Mobile expert for the assistance

Page 38: Mobile security issues

Details to be mentioned in “Panchnama”

Mobile Handset Details : GSM / CDMA / Both Compatible Manufacture of the Handset Model Number of a Handset IMEI Number or ESN /RSN Number Type / Version Number

Whether Memory Card available ……..If Yes…then Memory Card Details

Manufacture of Memory Card Type – SD / Mini SD / Micro SD…etc Capacity of the Memory card

Page 39: Mobile security issues

Do’s & Don’ts

Do’s Use good Updated antivirus Register a complaint if your mobile has been stolen Use password security Update mobile software .(check software version code *#0000#)

Don’ts Buy second hand mobile phones Give your mobile to any unknown person Transfer our personal videos, snaps to other persons Switch on Bluetooth if it is not required

Page 40: Mobile security issues

Information Available with the Operators

Calling Party Number – Called Party Number Subscribers name, address, etc… ESN/IMEI; MIN/IMSI Type of Call – Incoming / Outgoing Call start time end time Total Call Duration Call Type (Long – International – Local) Conference Call – Normal Call Call made/received from Home location/Roaming

Location SMS Incoming – Outgoing for limited duration only

Page 41: Mobile security issues

Thank you