background preloader

GSM

Facebook Twitter

Archaic but widely used crypto cipher allows NSA to decode most cell calls. The National Security Agency can easily defeat the world's most widely used cellphone encryption, a capability that means the agency can decode most of the billions of calls and texts that travel over public airwaves each day, according to published report citing documents leaked by Edward Snowden.

The NSA "can process encrypted A5/1" calls even when agents don't have the underlying cryptographic key, The Washington Postreported Friday, citing this top-secret document provided by former NSA contractor Snowden. A5/1 is an encryption cipher developed in the 1980s that researchers have repeatedly cracked for more than a decade. It remains widely used to encrypt older, 2G cellphone calls. Newer phones can still use A5/1, even when showing they're connected to 3G or 4G networks. In the past five years, cracking A5/1 has grown increasingly easier and less costly. In 2010 researchers unveiled a technique that cost about $650 and relied on open-source software and off-the-shelf hardware. Meet the machines that steal your phone’s data. The National Security Agency’s spying tactics are being intensely scrutinized following the recent leaks of secret documents. However, the NSA isn't the only US government agency using controversial surveillance methods.

Monitoring citizens' cell phones without their knowledge is a booming business. From Arizona to California, Florida to Texas, state and federal authorities have been quietly investing millions of dollars acquiring clandestine mobile phone surveillance equipment in the past decade. Earlier this year, a covert tool called the “Stingray” that can gather data from hundreds of phones over targeted areas attracted international attention. Rights groups alleged that its use could be unlawful. Details about the devices are not disclosed on the Harris website, and marketing materials come with a warning that anyone distributing them outside law enforcement agencies or telecom firms could be committing a crime punishable by up to five years in jail. “Stingray” “Gossamer” Defcon 18 - Practical Cellphone Spying - Chris Paget - Part.mov. Defcon 18 - Practical Cellphone Spying - Chris Paget - Part.mov.

Range Networks Products. 3310. OpenBTS. Asterisk. Asterisk permet de transformer un ordinateur en commutateur téléphonique performant. Il se présente sous la forme d'un logiciel libre édité par la société américaine Digium. La configuration d'un serveur Asterisk n'est pas relativement aisée, surtout pour les néophytes, c'est pour cette raison que certaines sociétés dont Digium éditent maintenant des distributions entièrement consacrées à Asterisk parmi lesquelles on peut citer : Asterisk Now (édité par Digium) Trixbox (anciennement Asterisk@home) Xivo (édité par Avencall, société française et basée sur Debian) Tout d'abord, veillez à avoir une distribution à jour : sudo apt update sudo apt upgrade Nous procédons ensuite à l'installation des dépendances : sudo apt install build-essential libxml2-dev libncurses5-dev linux-headers-`uname -r` libsqlite3-dev libssl-dev libedit-dev uuid-dev libjansson-dev On télécharge la dernière version d’Asterisk et on l’installe : Lorsque vous faites le . make make install make samples make config Autre méthode.