While cop shows have shown us that it's easy for service providers to track a person's location via their mobile phone, researchers at the University of Minnesota have revealed it's also an easy task for hackers. Using a cheap phone and open source software, the researchers were able to track the location of mobile phone users without their knowledge on the GSM network, which is estimated to serve 80 percent of the global mobile market.
According to the new research by computer scientists in the University of Minnesota's College of Science and Engineering, a third party could easily track the location of a mobile phone user without their knowledge because cellular mobile phone networks "leak" the locations of mobile phone users.
"Cell phone towers have to track cell phone subscribers to provide service efficiently," Foo Kune explained. "For example, an incoming voice call requires the network to locate that device so it can allocate the appropriate resources to handle the call. Your cell phone network has to at least loosely track your phone within large regions in order to make it easy to find it."
To do this, mobile phone towers will broadcast a page to a user's phone and wait for the phone to respond when they get a call. Hackers would be able to ascertain the general location of the user by forcing those pages to go out and hanging up before the phone rings.
Although the GSM standard assigns a phone a temporary ID to disguise its identity, it is possible to map the phone number to its temporary ID. Just by looking at the broadcast messages sent by the network, the researchers say it is possible to locate the device within an area of 100 square km (38 square miles). But by testing for a user on a single tower allows a user to be tracked to within a geographic area of 1 square km (0.38 square miles) or less.
"It has a low entry barrier," Foo Kune said. "Being attainable through open source projects running on commodity software."
In a field test using an inexpensive mobile phone and open source software and with no direct help from the service provider, the researchers were able to track the location of a test subject within a 10-block area as they traveled across an area of Minneapolis at walking pace.
In their Paper, which was presented at the 19th Annual Network & Distributed System Security Symposium in San Diego, California, the researchers highlight some possible personal safety issues arising from their discovery.
"For example, agents from an oppressive regime may no longer require cooperation from reluctant service providers to determine if dissidents are at a protest location. A second example could be the location test of a prominent figure by a group of insurgents with the intent to cause physical harm for political gain. Yet another example could be thieves testing if a user's cell phone is absent from a specific area and therefore deduce the risk level associated with a physical break-in of the victim's residence."
But it's not all bad news. Foo Kune and his group have identified low-cost techniques to plug the leaks that could be implemented without changing the hardware. They have contacted AT&T and Nokia to inform them of these techniques and are also in the process of drafting responsible disclosure statements for mobile service operators.
Source: University of Minnesota
Besides just locating you though GPS for as little as $50 anyone can have complete access to your entire cellular phone, email, text messages, live calls or the ability to turn the microphone or camera on remotely to monitor your conversation and activities in real time. Experts have shown that there is almost no way to tell your phone is comprimised, and turning your phone \"off\" provides no protection.
National news reports give examples of domestic violence cases where compromised cell phones have resulted in women and children loosing their lives. Meanwhile congressional investigations have shown that device manufacturers have been installing tracking software on products like the I-phone and android family of products before they leave the factory. New technologies like Google Wallet create an additional level of exposure as cell phones handle banking and financial transactions.
We set out years ago to solve this problem and the users of our \"Privacy Case\" feel safe and secure knowing that no one will be able to track, eavesdrop or monitor private and personal conversations through their cell phones and wireless devices.
See our products and the collection of news stories supporting everything I just said on our blog at www.thecaseforprivacy.com
As for your silly cases - get real. If the phone can recieve a call, then the case does nothing. If the case blocks calls, then the owner may as well turn their phone off and save battery at the same time. Sheesh...
GSM towers need to know the approximate distance of your phone from the tower, because they need to advance or retard the instant they they transmite GSM data packets out to you (as does your phone back to them), such that everything is neatly syncronized to the speed of light. In other words, if your phone sent a datapacket at the exact same intant that someone next to you did - those packets would collide. If you were 2km from the tower, and that other person was 1km from the tower, you have the exact same problem, except with the slightly different timing issue now, because the \"exact same instant\" is now 1km of the speed of light apart. You get the idea. That\'s why these things are call \"cell\" phones.
These guys track people because the cell tower talks to the phone when they instruct it (by placing a call), and they \"sniff\" the GSM call transmission negotiation stage in order to extract the speed-of-light syncronization data from the call. It\'s an 8bit number. If you\'ve got an old nokia, you can put it into service mode, and you can see these numbers on your screen. If you know where the tower is, you can thus figure out roughly where the call recipient is.
Here\'s some more things to sell in your store:-
http://tinyurl.com/ycod8u6
http://tinyurl.com/55qcgw
If you refuse to take the time to watch and learn the information we provided for you I encourage you to Google: Cellphone Spyware
Not really trying to bash you because when we started out, we didn't realize just how bad the problem was either.
The difference was we were willing to admit we didn't know everything and set out to find out what was possible and what wasn't and now the users of our "Privacy Case" feel safe and secure knowing that no one will be able to track, eavesdrop or monitor private and personal conversations through their cell phones and wireless devices.