Telephone Call Interception System Kevin Colkitt Personal and Public Communications Flowchart A cell phone sends data through a GSM or 3g Network Telephone Call Interception System picks up the RadioFrequency Identification with decryption A man in the middle is attack is performed by having an antenna act as a false cell tower. The cell phone sends the data to the false GSM tower The data is transferred to a central server Process RFID Obtaining Data Interception SIM Card Processing Device http://photosinbox.com/wpcontent/uploads/2012/02/gsm-simcard.jpg Cell Tower Output Device http://247wallst.files.wor dpress.com/2012/10/thi nkstock_cell_tower.jpeg ?w=400 Antenna Input Device http://www.motorolasolutions.com/we b/Business/Products/Accessories/G%20%20I/HAF4025/_images/_staticfiles/HAF 4025_LG.jpg Laptop Processing Device http://static.guim.co.uk/sysimages/Guardian/About/General/ 2013/4/12/1365760916127/AppleMacBook-Pro-laptop--008.jpg Cellphone Microphone Input Device http://www.phonepartsaccessories.com/img/p/767-1720thickbox.jpg Decryption Software http://www.downloa d32.com/images/scr een/hs_crypto_c_sou rce_library28541.bmp Necessity for Decryption Creates the possibility of obtaining a mobile phone network’s RFID. Beneficiary Suffering Stakeholder Beneficiary Suffering Stakeholder Privacy Security Surveillance