Telephone Call Interception System

advertisement
Telephone Call
Interception
System
Kevin Colkitt
Personal and Public
Communications
Flowchart
A cell phone
sends data
through a
GSM or 3g
Network
Telephone
Call
Interception
System picks
up the RadioFrequency
Identification
with
decryption
A man in the
middle is
attack is
performed by
having an
antenna act
as a false cell
tower.
The cell phone
sends the data
to the false
GSM tower
The data is
transferred to
a central
server
Process
 RFID

Obtaining
Data Interception
SIM Card
 Processing
Device

http://photosinbox.com/wpcontent/uploads/2012/02/gsm-simcard.jpg
Cell Tower
Output
Device
http://247wallst.files.wor
dpress.com/2012/10/thi
nkstock_cell_tower.jpeg
?w=400
Antenna
 Input

Device
http://www.motorolasolutions.com/we
b/Business/Products/Accessories/G%20%20I/HAF4025/_images/_staticfiles/HAF
4025_LG.jpg
Laptop
Processing
Device
http://static.guim.co.uk/sysimages/Guardian/About/General/
2013/4/12/1365760916127/AppleMacBook-Pro-laptop--008.jpg
Cellphone Microphone
 Input

Device
http://www.phonepartsaccessories.com/img/p/767-1720thickbox.jpg
Decryption Software
http://www.downloa
d32.com/images/scr
een/hs_crypto_c_sou
rce_library28541.bmp
Necessity for Decryption
 Creates
the possibility of obtaining a
mobile phone network’s RFID.
Beneficiary
Suffering Stakeholder
Beneficiary
Suffering Stakeholder
Privacy
Security
Surveillance
Download