Researchers devise stealthy phone tracking without fake base stations – Security – Telco/ISP – Networking

Scientists at the Eidgenössische Technische Hochschule Zürich have developed a absolutely passive cellular cell phone tracking procedure for Extensive Phrase Evolution (LTE) networks, which does not require the use of phony base stations as with present-day technology.

The ETH Zurich researchers known as their assault LTrack, and it can locate telephones in just six metres in 90 percent of instances, the scientists explained [pdf].

LTrack uses uplink and downlink website traffic sniffers devised by the scientists for passive localisation attacks on a substantial scale.

The uplink and downlink sniffers can also be used to capture a phone’s special 15-digit Global Mobile Subscriber Identity (IMSI) quantity.

The scientists had been in a position to validate the IMSI Extractor’s functionality by screening it with 17 more recent smartphones from large vendors these kinds of as Samsung, Google, Huawei and Xiaomi.

Understanding the IMSI makes it possible for surveillance agents to establish particular user units by placing up pretend mobile cell phone network stations, but these are detectable by law enforcement and operators many thanks to the large amount of transmission electrical power they use.

“As an alternative of relying on pretend base stations like present IMSI Catchers, which are detectable owing to their continual transmission, IMSI Extractor depends on our uplink/downlink sniffer enhanced with surgical message overshadowing,” the scientists wrote.

“This makes our IMSI Extractor the stealthiest IMSI Catcher to day.”

Components for LTrack is cheap, given that it utilizes minimal-energy computer software outlined radios.

The scientists suggest countermeasures this kind of as notifying people when their equipment get IMSI id requests, or a significant variety of eavesdroppers on operators’ networks to detect their IMSI Extractor.

Utilizing the newer 5G protocol also stops IMSI Extractor, as the unqiue identifier is encrypted with the network’s community vital, and can not be decoded by attackers.