Wednesday, December 5, 2007

Cell Phone Pings and Pinging

A cell phone played a critical role in helping searchers find and rescue the wife and children of CNet senior editor James Kim after they had been stranded in the snowy Oregon wilderness for nine days, even though they were well out of cell phone range. (As of this writing, Kim himself -- who left his family on Saturday to find help -- is still missing.)
CNet News.com explains just how in a story examining the cell phone's growing role as a crucial lifeline for many:
Mobile devices are in constant communication with the network, constantly letting cell towers know of their location. Mobile operators don't typically store this information. So authorities are usually able to get information based only on the most recent "ping," or device communication, with a cell tower.
But when someone is missing, even this small bit of information can prove useful in determining the approximate location of a device. If the mobile subscriber is still within cell phone range, authorities can track the general movement by following the towers the phone has contacted or pinged. And if the cell phone goes out of range or runs out of battery power, the mobile operator will have a record of the last ping before the cell phone either lost its signal or lost power.
This is how authorities were able to home in on the general area where the Kim family was found, according to a sheriff's department spokesman during a press conference on Monday. A cell phone tower operated by Edge Wireless, the local cellular provider in the region, received a signal from one of the family's cell phones at about 1:30 a.m. November 26 near Glendale, Ore. ...
Authorities said the cell phone signal indicated only that they had been within a 26-mile radius of Glendale, where the tower is located. But people at Edge Wireless took this information and mapped the area, providing an approximate location of the Kims' vehicle, the sheriff's department spokesman said. And using this information, authorities sent out rescue teams, which eventually located Kati Kim and her children.
The GPS chips embedded in newer cell phones, which can be pinged directly by carriers, should make it even easier to locate missing people

Saturday, November 3, 2007

Satellite Communication

Satellites have been orbiting the earth for several decades now, and are constantly contributing to the evolution of global communication.
Satellite cell phones have made it possible for people to make phone calls from anywhere in the world, no matter how remote their location, and have been extremely useful in coordination of many activities ranging from scientific exploration to military operations.
Portable satellite radio is another important technology that has emerged in recent years, allowing users to subscribe to and access radio channels from around the world for either entertainment or informational purposes.
One small problem with satellite communication technology, however, is the sheer distance involved in communicating with orbiting satellites, which can cause a slight delay in transmission time. This, of course, is of no consequence to satellite radio, but it can be a slight problem for two-way communication services such as broadband and phone.
The only way to reduce the time delay involved in satellite transmission is to use lower orbits for satellites, thus reducing the distance involved in transmission. Lower orbits are already being used for some purposes, but there are many challenges that must be overcome in order to make such a transition.
Advancements in satellite technology have been plentiful in the past few years, and more are expected in the future. It will be very interesting to watch the development of this evolving technology over the coming years and beyond.

Satellite Phones or Cell Phones

There are several factors that differentiate satellite phones from cell phones. How they work, their utility and cost just to name a few.
Functionality Differences
Cellular phones or cell phones use small stations or towers known as ‘cells’ from which they receive their signals and to which they send signals. As the user moves from one destination to the next, his call or his cellular service is passed on from cell to the next. The mobile handset is thus in continuous connectivity with the different cells of the network provider and the individual can talk on the move. This is thus known as mobile connectivity.
Satellite phones on the other hand, do not use ‘cells’ or towers. They work with satellites orbiting the Earth. These Low Earth Orbiting or LEO satellites receive signals from the satellite phone handsets and send signals to these handsets as required. The satellite phones send signals to the satellite, which passes it on to a gateway. The gateway routes the calls to the receiver. Also, all calls made to the satellite phones are routed via the satellites.
Differences In Area Coverage
Cellular phone companies generally provide network coverage in densely populated areas. Since the companies have to set up ‘cells’ to be able to provide coverage, they need a high number of subscribers to justify setting up the cell. In thinly populated areas or remote areas with difficult terrains, the cost of providing coverage is often more than the expected returns. Hence, while cell phones work great in densely populated areas, they may or may not work in inaccessible locations.
Satellite phones communicate with the LEO satellites and not with any ‘cells’ on Earth. Hence, the coverage provided by satellite phone companies is far greater than that provided by cellular phone companies. Since satellite companies don’t have to set up cells from destination to destination, they offer service in a wider area and some even offer it across the globe.
Usability Differences
Cell phones have become an absolute necessity for practically all urban residents. In fact, a large number of people are opting to have cell phones instead of the traditional landlines. Cell phones are perfect to use while on the move in metropolitan cities. For marketing and sales executives, employees, CEOs, managers, mothers, students and almost all people in different walks of life - cell phones provide a high value service. They are also a great option to surf the net, listen to music and exchange photos. In short, cell phones have become the single all-purpose media electronic instrument of the 21st century.
Satellite phones on the other hand, are perfect for use in remote and thinly populated areas where cellular companies do not provide network coverage. Satellite phones are also extremely handy in situations when cellular networks go down. Such situations generally arise in times of natural disasters like hurricanes, earthquakes and floods when the ‘cells’ that route calls are damaged.
Satellite phones have the advantage in such conditions since natural disasters do not affect the LEO satellites. Hence while cellular phone networks are down, satellite phones continue to function as normal. This has indeed saved many lives in the recent past.
Satellite phones are also the perfect option for companies that have research laboratories or departments in isolated areas like Alaska, Siberia and Antartica. Adventurers who frequently travel to densely populated tropical forests, high mountain areas and across oceans also prefer the better coverage provided by satellite phones.
Differences In Cost
As is to be expected, cellular phones are far cheaper to operate and maintain than satellite phones. The cellular phone handsets as well as the subscription plans offered by cellular service providers are extremely affordable and cost barely a few cents per minute.
Satellite phones on the other hand are expensive. The satellite phone hand sets or the fixed satellite phone sets cost a pretty penny as does the satellite phone service provided by leaders in the industry like Iridium and Globalstar. At an average satellite phones can cost anything from $600 to $1000 with costs going up to $1.50 per minute for talktime.
Thus, cell phones and satellite phones are both a boon to the world of communication and both service users in different ways and under differing conditions

Spy Bugs

There are many different spy bugs that can be used to listen in on conversations. These can be bugs that you plant at a home, or listening devices that you wear on your person (or have someone else wear). But no matter how you use spy bugs, it is possible to glean useful information with them, whether you are an amateur, a professional, or are just looking for the truth.
The most common spy bugs are bugs that use a radio frequency to transmit the sounds around them. These bugs may be placed inside a home or office to catch conversations held in a room, or they may be hooked into a phone. When hooked into a phone, they can listen to both sides of a conversation over a phone line. Additionally, it is possible to wear these listening devices hidden on the body in what look regular items (pens, lighters, hats, etc.). The radio frequency is transmitted to a location where it can be heard, usually with no more than a regular FM radio.
Other spy bugs make use of ways that tap into the line itself and do not send radio transmissions. These types of bugs are harder to detect. A wiretap might fall into this category of direct bugs, as may a soft tap that makes use of computer software to listen to phone conversations. The best spy bugs, however, are the portable kind that go with the subject and allow you to phone in.
While it is possible to plant radio transmitting spy bugs on a person to go with her or him, it is far more practical to use a device that they trust, and that is unlikely to be shed or lost. This is a cell phone. Of course, spy bugs in the form of cell phones can only be used to learn information from people you know, and whom you might reasonably be expected to give a cell phone. A Spy Matrix Spy Phone is really a portable bug that lets you listen to conversations that make use of the cell phone as well as whatever is going on in the room at the time.
When you need to hear what is being said, the best things to use are spy bugs.

The Ultimate Spy Cell Phone

Perhaps the most advanced portable bug on the market today is the Spy Matrix Spy Phone. This spy cell phone looks just like a regular phone, and it works just like a regular cell phone. The only difference is that is also a bug. This is the ultimate in listening devices. It is the best way to keep track of teenagers or significant others who show signs of straying. And, with a little ingenuity, you can even use this spy cell phone to perform surveillance on acquaintances and strangers.
The spy cell phone is especially helpful when you want to keep track of family members. This is because you can pass it off as a new phone for the family’s new cell phone plan. It is perfect. Give it to teenagers and you can go wherever they go. This Spy Matrix Spy Phone is equipped with a GPS tracker and a special microphone that picks up noises and conversation in its general vicinity. Not only that, but can also allow you to listen in to both ends of the conversation. You can know whether you teen are where she or he is supposed to be, and you can find out, from listening to what is going on in the room, whether there really is a study group.
A secret phone number allow you to activate the spy cell phone without the subject knowing that you have done so. You call the secret number (there is a second real number for regular calling purposes) and the phone quietly turns on and begins giving you access. You can “forget” it in a room or leave it to “charge” and hear what others are saying. This is a device that is also useful when performing professional surveillance for clients. No matter what you want to use the phone for, the spy cell phone is a device that few people would suspect as being a bug — especially since it works just like a normal cell phone in all respects.
Stop wondering what is really going on and find out for sure. When you have the Spy Matrix Spy Phone you do not just have any phone. You have a real, top of the line spy cell phone.

Telephone Bugs and Phone Taps

When making use of telephone bugs, it can be very frustrating to be constantly checking, only to find that you missed a call. You have a busy life. Other things to do, other clients to work for, a life to live. You can’t just be sitting there trying to play hit and miss with telephone bugs. This is where the new generation of bugs comes in. It is possible to use a bug that will actually call you when a phone call is made. That way you need not miss a conversation that you cannot afford to miss.
Traditional bugs require that you listen to the transmissions or call in to see if a call is being placed. Additionally, some telephone bugs only allowed you to hear one end of the conversation. Neither of these things is very savory, nor do the provide help to you as you frantically try to listen in at just the right time. Additionally, many transmitters run the risk of being found as they transmit the signal out. With telephone bugs that call you, you can listen to both ends of the conversation, and receive notification when a call is placed or received by your subject.
The first telephone bugs that work in this manner are bugs that look like cell phones. You plug them in to share the same line as the regular phone, and they look like they were forgotten or like they are charging. These phones can be programmed to silently ring your preferred number whenever the home phone goes off. And it is set up so that when you pick up to listen in, you are listening as if you were on another phone in the house (just like mom and dad did when you called home from college). You hear both ends, and neither party is the wiser.
Other telephone bugs that can be programmed to call you are more high tech cell phones. You give the phone to the subject (or have your client do so) and then you wait. These phones work like regular cell phones. The person talks normally and receives calls normally. But every time he or she uses the phone (place or receive) the phone dials you and lets you know.
No matter which product you choose, you don’t have to miss a call when you are called by your telephone bugs.

GPS Tracking Device

GPS is one of the newest crazes on the Market today. GPS or global positioning system tracks your locations from a satellite which makes it a popular feature in cars. When you’re on a trip it can also help you find your way around with out getting lost. While GPS tracking can help track your location it also works in another way. You can use GPS tracking to track some ones location.
Cell phones have become something that everyone now carries. Cell phones are becoming more and more technologically advanced with more and more features. One of the newest features on cell phones is GPS. GPS is now available in almost everything from cars to cell phones. Cell phone GPS tracking is the newest feature on many cell phones. Locating someone is a popular job for a lot of detectives and cell phone GPS tracking is one thing that can make this task a lot easier.
Taking advantage of cell phone GPS tracking can help with the location of someone if they should come up lost. Cell phone GPS tracking can track their exact location. This can make locating the lost much faster and more efficient.
Several different kinds of GPS tracking products are available. They also offer several different products to meet all of your surveillance needs such as cameras, night vision products, listening devices and many other kinds of products to help get the job done right and prove the case.

GPS Tracker

The GPS tracker is fast becoming a staple in society. This is because there are so many uses for these devices. While GPS technology (short for global positioning system) was originally developed for the military, it is now widely used in things like cars and golf carts — even cell phones. There are even types of GPS tracker that are small enough to be worn on a body or slipped discreetly into a small pocketbook. These handy devices allow people to keep track of others as well as valuables from anywhere where they have Internet access.
One of the most popular uses for the GPS tracker is in cars. This is because a tracker can help the driver pinpoint his or her exact location without any trouble. On top of that, it is also a great way to track the vehicle should it be stolen. Also, service such as OnStar can use a GPS tracker in your car to send emergency help in the event of a car wreck and the driver’s incapacity.
And, as one would expect from the name GPS tracker, a GPS tracking system can help you keep tabs on loved ones and even pets. Some trackers are small enough to be attached without too much trouble to a dog or cat. This way, if Fido the dog or Fifi the cat slips away, you can find the errant critter without too much trouble. The same is true with kids. Trackers fit easily in backpacks and are even built into some cell phones. This means that you can be aware of exactly where your teen is at all times.
There are also many recreational uses for the GPS tracker. Geo-caching has become a popular pastime among some. Trackers can help enthusiasts plot the position of the next treasure and then leave something of their own. Additionally, many high-end golf courses equip their carts with tracking that allows you to map the course, and even figure out how far their ball has yet to go.
Acquiring a GPS tracker is fairly easy, and its usefulness is worth whatever amount is paid for it. It is possible to get one for right around $300, but most of them fall between $400 and $1,000 in price for a good GPS tracker

Keep Tabs on Your Teens

Spy gadgets are useful for more than just performing surveillance on people you do not know, or for protecting yourself from surveillance. Spy gadgets are increasingly helpful in keeping track of where your teenagers are and what they are doing. With all of the risks in the world today, it is no surprise that one might be concerned for the wellbeing of one’s children. With the right spy gadget, or combination of spy gadgets, it is possible to be sure of where your child is, and with whom he or she is keeping company.
One of the most basic spy gadgets that can help you understand where your teen is going is a GPS tracker. The most common tracker is a vehicle tracker. This way you can figure out where the car is at all times, and even keep tabs on where is has been. The problem is that such a device can be fooled. You teen need only to drive the car to the approved destination before removing to a friend’s car and taking off to someplace else. This is where a cell phone GPS tracker comes in handy.
Cell phone spy gadgets are increasingly popular because they look like and act just like regular cell phones. It is possible to get a cell phone with a tracking device that allows you to continue to track your teen even after the car is left behind. Just buy your child a hip new cell phone and she or he will be glad to have it. Then it can tell you where you’re teen is, and where you’re teen has been.
Knowing where you’re teen is important, but what is she or he doing? After all, maybe he or she is at Sally’s where they should be having a study group. But what is going on? Are they really studying, or are they doing something else. Spy gadgets like the spy phone go beyond simply tracking movement. They can be secretly activated to let you hear what is going on inside the room. You can listen to conversations and determine whether or not the kids are studying.
Knowing your kids are safe can easily be accomplished with the help a couple of well-chosen spy gadgets.

Using Spy Tools

Spy tools have many uses, many of them exciting, and quite a few of them mundane. But one of the widest uses of spy tools is to detect infidelity in a partner. The reason these are so widespread in investigations into infidelity is because such tools are meant to be used covertly to discover things that people want to keep hidden. And infidelity is one of those things that is meant to be hidden. The great thing about the availability of technology today is that there is no reason to hire a private investigator anymore because you can complete the surveillance yourself with your own spy tools.
One of the more effective spy tools is a GPS tracker. A tracking device will help you keep tabs on where your partner goes. A tracker can be put in a car, so that you can know where it is driven, or even slipped into a purse. Many cell phones now come with GPS tracking devices, so you can use that to track a loved one under suspicion. Most trackers also allow you see not only where the person is at the time, but also where the person has been.
Of course, tracking spy tools do not always provide enough hard evidence. What is needed in such cases is a phone tap or a bug. The less expensive listening devices can allow you to easily hook into a line, or even listen from a distance away. Those that hook into a line can allow you to listen to both ends of the conversation. If you are looking for something a little higher-end, spy phones that work like cell phones can help you hear everything that is going on in the vicinity of phone, even if it is not in use by your subject.
Finally, for hard proof that you have a cheating partner, it is possible to use a kit that allows you to detect bodily fluids on underwear. These spy tools can help you compare the results to your own fluids, and determine whether or not the two match.
You can either substantiate your trust in your partner, or catch him or her red-handed, when you make good use of spy tools.

Cell Phone Location Tracking

What is Location Tracking?
Location tracking is becoming easier to do. Before, investigators had to talk to people to find out where someone was. This took many hours with little chance for success. Today location tracking is much easier with the innovation of GPS products. This new technology has made it much easier to locate the missing.
GPS works by satellite to track the position and determines where the GPS receiver is. The hope is that the person that it lost has a GPS receiver on them so their location can be tracked. This may sound like a rare thing that only happens in the movies, when they are able to track someone’s location.
On the contrary, GPS receivers are becoming more and more popular. The tools in movies are a little more realistic these days than they used to be. Location tracking is more popular with the general public for directions. What they do not realize is that the location tracking that they use to keep from getting lost can also be used to find them.
While some may be alarmed at the loss of privacy, it is also a safety feature. When someone is kidnapped or just disappears, their cars, cell phones and other products with GPS receivers can help find them with location tracking. Many different kinds of location tracking products are available Along with location tracking products, this website has many other surveillance products that are also available to meet the needs of your surveillance needs.

Where Did Cell Phones Come From?

In 1949 the first car phone service was introduced. It was called “Mobile Telephone Service” (MTS). But the beginning of wireless communication started many years earlier, in 1895, when an Italian physicist named Guglielmo Marconi successfully sent wireless signals a distance of one and one half miles.
In 1896 Marconi was granted the world’s first patent for a wireless telegraphy system. In 1897 he formed The Wireless Telegraph and Signal Company. During that same year he successfully sent wireless signals a distance of twelve miles.
In 1901 Marconi proved the curve of the earth did not affect the successful sending of wireless waves. He proved it by transmitting signals from Cornwall, England to St. John’s, Newfoundland, which was a distance of over two thousand miles.
Marconi, along with other scientists and researchers, continued to work and do research on wireless transmissions. In 1932 the world’s first microwave radiotelephone link was established between the Pope’s summer home in the small Italian town of Caster Gandolfo and Vatican City, a distance of approximately thirty miles.
The first ship-to-shore radio conversation took place in 1922 from the ship S.S. America, which was 400 miles at sea. Inter-continent telephone communications between the United States and England occurred in the mid 1930’s.
As technology improved, interest in a car phone service developed. The first car phone service that was introduced in 1949 was a mobile service, but the equipment was big and heavy. The phone required a large receiver (about the size of a large piece of luggage). It was placed in the trunk of the vehicle. To talk on the phone, a button had to be pushed. To listen to the other person, the button had to be released. It was similar to using a two-way radio. A person couldn’t talk and listen at the same time. That technology came later.
Phone calls from the first mobile phone service were not direct-dialed. Instead, an operator working for the mobile phone service company answered when the phone was picked up. The operator connected the caller to the phone company operator, who then placed the call. By the early 1960’s the technology had improved, but only slightly. One step in the connection process was eliminated. The phone was able to connect directly to the phone company, saving the caller the step of having to connect to the mobile phone service operator first. The improved service was called “Improved Mobile Telephone Service” or IMTS.
By the early part of the 1980’s the phones had full-duplex capability. This meant a person could listen and talk at the same time. The phones and receivers were still heavy though. And, because the IMTS phones were a type of scanner, it wasn’t unusual for a person to press a channel button on the phone and hear parts of someone else’s conversation.
Technology continued to improve and continues to improve today. Cell phones are very popular. Today they are a truly mobile device and are easy to transport. Some of the cell phones available today only weigh a few ounces. Some of the small cell phones can be tricky to use though because the buttons on them are very small.
Cellular technology continues to improve. In the United States, carriers have been moving from analog technology to digital technology. One big reason the move to digital technology has been made in recent years is because it allows networks to carry more callers at one time. Calls are also more secure on digital networks, but are still far from being totally secure.
Today, people experience fewer dropped calls, and with the expansion of networks, there are getting to be fewer areas where there is no reception at all. And although many younger people are choosing to have cell phone over a land line phone, there are still many people who are not yet willing to give up their land line phones

Your Cell Phone And 911

If you're one of the millions of cell phone users who count on their wireless phone for emergency 911 calling........
You might want to think again.
Unfortunately, there's no guarantee that your 911 call will be routed to an emergency call center. Much less, the emergency dispatcher will have the ability to pinpoint the call's location.
Why?
Part of the problem is lack of service. Often, in more rural areas, your cell phone has fewer towers available to receive reception. And, many of those towers are designed for analog calls - not digital.
But, since the FCC does not require it, fewer carriers offer analog service -- or the ability to connect to it.
Not surprising, since much of the carriers' revenue is dependant on features available only on digital networks.
Another problem?
There is no uniform Ehanced 911 system (E911) for wireless carriers. The FCC neglected to force the carriers to conform their E911 systems to a single technology.
Because of this, there are now two incompatable E911 systems in the works.
Nextel, Sprint and Verizon each have cell phones available that use the Global Positioning System (GPS) to find a caller's location. While Cingular and T-Mobile rely on a triangulation system.
Unfortunately, both E911 systems have their flaws. The GPS system needs a minimum of three satalites to be able to "read" the handset's location. Accuracy can be hampered by heavy vegetation, mountains or tall buildings.
The triangulation system also has its shortcomings, because it relies on the strength and timing of cell towers to determine a location. It, too, requires multiple towers for accuracy. This becomes more difficult in rural areas where towers are scarce.
To compound the problem, Emergency Call Centers are not equipt with the technology needed to field E911 calls. Most smaller centers lack the funding for the sophisticated equiptment, while others lack the knowledge on how to integrate it to their existing system.
According to a 2004 article in the San Diego Union Tribune, only about 12% of the country's 911 centers had the ability to pinpoint the location of wireless phone users emergency calls.
Which cell phone is best?
Dual band, or tri-band phones, allow both analog and digital frequencies. If a 911 call does not connect in a digital mode, the alternate analog network is available.
The FCC also requires that any carrier offering multi-frequency phones must allow the 911 call to roam to another service, if the call can not be completed on their own network.
Currently, only Cingular and Verizon offer dual or tri-bands for both their service and handsets. Sprint PCS and T-Mobile wireless phones operate on a digital band, but allow analog roaming.
Nextel uses its own iDEN network, which has limited roaming ability.

Friday, November 2, 2007

cell phone ping

There are two ways that celluar (cell) phones are located, depending on thecell phone itself, and the technology that is built in to that cell phone.Older cell phones are located via a process of signal triangulation, whilenewer phones have a Global Postitioning System (GPS) built in to them. Inpractice, one, the other or both can be used to locate a cell phone.Triangulation can be done on most any cell phone, depending on the locationof the cell phone and any nearby towers. GPS locating depends on the cellphone being so equipped. There is a federal mandate that pretty much allcell phone companies, including Verizon, will be able to locate a cell phonebased on one, the other or both methods.Here is more information on both processes.IT Digest - Ingenious Tejas's Digest Blog http://geekswithblogs.net/tpatel/archive/2004/06/29/7329.aspx"Cell phones are two way radio transmitters that work by connecting to anearby tower and exchanging data. Despite the FCC's limitation on maximumpower output of a cell phone, they are still able to connect with towersmiles away at UHF frequencies ... Because cell phones put out a constant RFoutput (sometimes pulsed) they can be tracked using the tower triangulationmethod where the network administrators can find your precise location withtheir administrative network access."The Graduate School and University Center at the City University of New York(CUNY) has "Intro to Mapping Sciences" taught by Doug Williamson. http://www.geography.hunter.cuny.edu/~dougwill/CRIME/the_district/web_site/ep19/ep19.htm"Phase II of the FCC regulations will begin to be implemented in the fall of2001. During Phase II, wireless carriers and the PSAPs will be upgradingtheir systems to provide more exact geographic coordinates. Two methods willbe employed:1) triangulation: new receivers will be added to the tower arrays that willbe able to perform triangulation; and 2) global positioning receivers (GPS)may be added to new wireless phones.""Cell-phone companies add tracking abilities" was a Knight Ridder distributedarticle, dated Wednesday, July 20, 2005, written for the Dallas Morning Newsby Terry Maxon, here presented on the Portsmouth Herald web site.http://www.seacoastonline.com/news/07212005/biz_nati/53872.htm"However, a federal mandate requiring cell phones to automatically tell 911centers where the caller is located has speeded adoption.That can be accomplished through ground-based triangulation, in which thephone's location is determined by figuring its relative distance from variouscell stations. But most large cellular companies appear to be embracing theGPS method....Nextel has had GPS technology in every phone since November 2002. Sprint andVerizon phones also contain GPS technology, allowing them to provide locatorservices if they desire."This last article is a great one to read, as it speaks to how the technologyhas commerical applications, such as allowing shuttle companies track theirvans and giving directions to people over their cell phones.Here are some Verizon links on the subject and related services they offer.Frequently Asked Questions - Answers to FAQs http://www.verizonwireless.com/b2c/dispatcher?action=DISPLAY&item=_FAQ_TOPIC&topicID=243"The GPS (Global Positioning System) locator chip, which is present in allwireless phones we currently sell, except the BlackBerry 6750, is used solelyfor tracking purposes by Emergency 911 Services and does not function like atypical GPS device....Phase II Enhanced 911 rules requires wireless carriers to automaticallyprovide the telephone number of the 911 caller and far more precise locationinformation, within 50 to 100 meters in most cases.The first two steps have been implemented, however the third step (Phase II)is still in progress."Small/Medium Business - Fleet Administratorhttp://www.verizonwireless.com/b2c/businessSolutions/smallMediumBusiness/custom.jsp"Locate, monitor and manage vehicles equipped with the necessary vehicletracking hardware from any office computer."The technical terms for these services are ones such as "cellular phone GPSlocating" and "cellular phone signal traingulation" and E991 locating.The requirements for this technology came from the Federal CommunicationsCommission (FCC) wireless "Enhanced 911" (E911) rules.http://www.fcc.gov/911/enhanced/"The wireless E911 program is divided into two parts - Phase I and Phase II.Phase I requires carriers, upon appropriate request by a local Public SafetyAnswering Point (PSAP), to report the telephone number of a wireless 911caller and the location of the antenna that received the call. Phase IIrequires wireless carriers to provide far more precise location information,within 50 to 300 meters in most cases."More information on Phase II from this Wireless Advisor forum.http://forums.wirelessadvisor.com/archive/index.php/t-2863.html"In the second phase, cell phone companies have two options for significantlyimproving the locating capacity. They can install GPS chips in theirtelephones. The chip determines the phone’s location (in hours, minutes, andseconds of longitude and latitude) by receiving signals beamed down from anarray of satellites. The chip determines the location based on differentarrival times of these signals. Alternatively, a cell phone company cancomply with the mandate by using information provided by its network. Thisapproach uses towers and antennae in the carrier's network to measure thetiming of signals emitted from the phone, and thus its location ..."

Wednesday, October 31, 2007

Cell Phone and Mobile Phone Pings and Pinging

The development of communications technology has long since surpassed the sole ability to access others when they are mobile. Today, mobile communication devices are becoming much more technologically advanced and offer more than the ability to just carry on a conversation. cell phone gps tracking is one of those advances.
gps or global Positioning system tracks your location by interpreting the data received from 3 or more satellites. This has made gps a popular feature in cars as a navigational aid.
All cell phones constantly broadcast a radio signal, even when not on a call. The cell phone companies have been able to estimate the location of a cell phone for many years using triangulation information from the towers receiving the signal. However, the introduction of gps technology into cell phones has meant that cell phone gps tracking now makes this information a lot more accurate.
With gps technology now more commonplace in many new cell phones, this means that the location of anyone carrying a compatible cell phone can be accurately tracked at any time. cell phone gps tracking can therefore be a useful feature for business owners and fleet managers who need to be able to keep track of their vehicle movements.
cell phone gps tracking can also be a useful feature to the emergency services or police when responding to a 911 call from a gps cell phone. For this reason, the FCC has legislated that wireless networks provide location information for 911 calls made from cell phones. These are known as E911 calls.
As technology advance even further, future features will be even more powerful. Imagine gps cell phones used as a navigational device. based on the cell phone gps tracking signal, they could be used to find your way to a location, calculate your speed based on your location change over time, from this calculate your estimated arrival time, suggest an alternative route and even phone the person you are calling to see with your ETA! Of course in car gps navigation systems can already perform many of these tasks, however it is the portability of cell phones that makes them so useful for this technology.
cell phone gps tracking could also be used to locate the whereabouts of your children and offer protection to elderly relatives should something happen and they need urgent assistance.
These features will help to secure the future of cell phone gps tracking providing advantages for all

Tuesday, October 30, 2007

You Can't Always Ping A Cell Phone

An 87-year-old Bend-area man was found safe and in good shape this morning after he spent the night in his vehicle, which became stuck Wednesday in the national forest south of Tumalo Falls.
The Deschutes County Sheriff’s Office said Thomas O. Laidlaw, who has lived in the area since the 1940s, went to scout game Wednesday in an area off Skyliners Road. Around 9:30 p.m. Laidlaw used his cellular phone to call his brother in Bend, the Sheriff’s Office said in a news release. He told his brother his vehicle was stuck and he planned to spend the night in it. Laidlaw carries extra clothing and provisions in his vehicle, the news release stated. The National Weather Service recorded a temperature of 28 degrees in Bend early this morning, according to its Web site.
The brother, who was not identified, called 911. Deputies and law enforcement officers with the Forest Service searched the roads in the area during the night but did not find Laidlaw or his vehicle, the news release stated. The type of cell phone Laidlaw carried and its provider prevented law enforcement from pinging, or attempting to electronically locate, the phone, and calls to the phone went directly to voice mail, indicating it was out of range or turned off.
More law enforcement and search and rescue personnel joined the search this morning, and the Oregon State Police diverted one of the agency’s planes that was headed to Christmas Valley to search the area.
About 9 a.m. Laidlaw again called his brother and told him he was at the cross-country ski shelter at Swede Ridge, which is between Virginia Meissner and Swampy Lakes sno parks. The state police plane flew over the area, and its occupants reported that they saw a man waving to them, the news release stated. Rescuers found Laidlaw at the shelter about 11:25 a.m. and took him to his brother’s home in Bend.

GPS Cell Phones and Mobile Phones

Motivated by the events of 9/11 2001 and problems with 911 calls from cellular phones, the FCC requires that by the end of 2005 all cell phone carriers must be able to trace the location of cell phone calls to within a range of no more than 100 meters.
Cell phones are already available with GPS technology installed. These systems are not the same as the GPS devices used by hikers, mariners and drivers. Lower cost models do not allow the user to enter data such as mapping software. All systems require a wireless network.
Cell phones with GPS technology use AGPS (Assisted Global Positioning System). Assisted because the system uses both cell phone towers and satellites as location finders.
There are advantages and disadvantages in the new technology. The cost to implement the program will be passed on to consumers -? cell phones will cost more. Privacy is a real concern with the general public especially in this day of identity theft. It is a concern that unknown people will be able to access your location. Also there is a possibility that the spam you are flooded with on your home computer will now be sent to your cell phone.
Using GPS cell phones to track people has some great advantages. Locating kids and family can be a blessing. Remember though, if you try to locate someone who is out of your calling area, you will be charged extra.
The obvious benefit for the consumer is the issue of emergency aid and that was the catalyst for this whole idea of GPS cell phones. A 911 call that can be quickly located, emergency roadside assistance, locating persons missing in remote areas, the list goes on. If coverage is available then GPS cell phones save lives.
Many carriers already have GPS cell phones available. You can buy the basic model for emergency tracking or you can pay for the technology that turns the cell phone into a sophisticated mapping, PDA system. Problems are still an issue with the advanced features. The more you use the advanced features, the greater the drain on the battery. Increasing battery size also increases the cell phone size and that is a problem for most consumers who want ever smaller, lighter devices to carry around. At this time Japan seems to have the edge on developing the high-end miniature GPS cell phone.
Sacrificing privacy for safety is the issue and I suspect that it would only take one positive outcome in an emergency situation to make the decision for you.
As the systems become more and more refined camera and PDA capabilities are being included into the phone itself. Developments in GPS cell phone technology are continuing. If programmers can solve the issues of privacy then the potential for GPS cell phones is incredible. It will no longer be an issue of "Can you hear me now?" Rather the question will be, "Can you find me now?" -you can by using this cell phone ping service

Location Sensitivity - Cell Phone and Mobile Phone GPS

In the mid to late 1990's, many people got cell phones just for the emergency use of being able to call for help almost anywhere. The problem came up when statistics showed that almost 92% of all serious 911 calls, (where the person was just barely able to make the call), they either didn't know where they were or was unable to tell the 911 operator where they were, or they might not have been able to talk at all. This caused a big concern, 911 operators couldn't do anything but listen to the person on their cell phone as they pass away. The Location Sensitivity system still doesn't work if you are in an area that only has an analog signal. (Which is the older cellular system of the mid 1990's and earlier). Most metropolitan areas and all interstate freeways are covered by the newer digital service. It's just when you get out in the middle of no-where, you might end up with an analog signal. Most phones will display the letter "A" in the top right or left corner when using this system. Check your phone documentation, some phones don't even have this capability. Which means if you get into one of these areas, you can't make any type of call what-so-ever.
Soon, the Location Sensitivity feature will probably be offered by the cellular companies as part of their pricing plan. Some carriers like Nextel are already taking advantage of this new technology by giving customers a GPS location service along with their calling plan. If you don't have this option with your carrier, and you have a Smartphone you can always purchase one of the SD slot GPS units that works with mapping software. The program I've really enjoyed is Mapopolis, which works great with most of the popular GPS hardware available. And most even have a voice activation that will tell you where to turn, which is directed through the speaker phone portion of the Smartphones. The ability to have GPS information and mapping on your handheld will be a great plus while traveling.
Back to the Location Sensitivity. I'm just wondering how much the cellular companies are going to charge for such a GPS type service!? I'm sure they're all working hard right now on the new pricing plans that we'll have to pay if you don't have the GPS hardware to install on your Smartphone.
When these services become available, they will only be location based. Another words, most GPS's these days will actually give you your current altitude and most have a pretty fast refresh rate. The refresh rate is the time between position updates. An example; If you have a GPS in your hand that refreshed three times per second, this would be a very acturate reading. Even if you are driving at 70 miles per hour, the moving map on the GPS will be able to keep up with your actual location. That's an issue the engineers are dealing with on the Location Sensitivity system. It wasn't designed to have any type of refresh rate at all. Once a position has been found, it never was designed to refresh that position. (I guess if you are hurt, and you called 911, you aren't supposed to be moving. Hmmm, So if you fell off a bridge, and landed in the back of a truck driving down the interestate, I'm not sure if they would be able to locate you. They would know where you were when you first dialed 911, but as your location changes, they might not be able to find you). Supposedly, the 911 operator can pull a refresh, this would at least tell them the direction the vehicle is moving. But to locate you while you're moving, might be more difficult than anyone had expected.
Another problem with many of the handheld units, the actual speed of the processors within them. Most cell phones operate on around 1 to 2 MHz processor speed. Most Smartphones operate anywhere between 30 to 500 MHz. (Most new home computers are operating between 2 to 4 GHz processor speed, just to give you an idea). This is where the engineers are running into the biggest problem with creating a GPS refresh rate. The processors in all handhelds will just have to be faster than they are today. And like all of our other technolgies, I'm sure this won't be a problem very much longer for the designers.

Mobile Phone Fraud

Please be aware of this, as I have had these calls from the switch board ? if you receive one hang up IMMEDITELY!
Phone Fraud ? Warning from the Police 11 May 2005 we have been advised of a telephone fraud currently in operation, this applies to home and work telephone, landlines and mobile phones. If you receive one of these calls, upon answering the telephone you will hear a recorded message congratulating you on winning and all expenses trips to an exotic location. You will then be asked to press 9 to hear further details. If you press 9 you will be connected to a premium rate line that cost approximately £20 per minute. Even if you disconnect immediately, it will remain connected for a minimum of 5 minutes costing around £100. The final part of the call involves you being asked to key in the postcode and house number, which has other serous consequences. After a further 2 minutes you will receive a message informing you that you are not one of the lucky winners. The total bill by then will be £100. Since the calls are originated from outside the UK, BT and other telephone companies are left relatively powerless to act. The only save solution is to HANG UP before the message prompt you to dial 9. Even safer HANG UP on any unsolicited "free offers calls". There is another scam operating on mobile phones as well. A missed call comes up. The number is 0709 020 3840, the latest four number may vary, but certainly the first for will remain the same. If you call this number back you will be charged £50 per minute.
People have complained about their phone bills, once they have realised the cost of the call, but apparently this is completely legal. So beware, do not call back numbers beginning with 0709.

Prevent Phone Monitoring

If you are using an analog cordless or cellular telephone, someone is listening to your conversations!
You'll notice I did not say someone might be listening to your telephone conversations, or there is a possibility that your telephone conversations can be overheard. Simply put, your telephone conversations are being monitored! Radio hobbyists, with their scanners being used as spy equipment, have the capability to listen to telephone conversations and we must assume that a small percentage do from time to time.
Beyond these hobbyists, however, is an underground culture of scanner users who make specific efforts to monitor telephone conversations. This underground culture ranges from individuals wanting nothing more than to satisfy their personal curiosity, to news reporters lookng for leads, to private eyes gathering information for a case, to criminals listening for credit cards numbers, SSN's, or other information to be used in the furtherance of a crime. Beyond this, various law enforcement and security agencies may monitor telephones for their own purposes.
But wait, you say--it's illegal to monitor telephone conversations. It's even illegal for the police to do so without a warrant. True, it's illegal to monitor telephone conversations, but do you really think that noone's listening? A law is nothing more than words and, in and of itself, does nothing to prevent that which it proscribes. The chance of getting caught doing phone monitoring are almost nil, and when have you heard of anyone being prosecuted for monitoring a cordless phone?
HOW TO PREVENT IT
One way to prevent monitoring of your telephone conversations is through the use of digital spread spectrum technology. To understand this, we first need to be aware that telephones are either analog or digital. Analog telephones are nothing more than radio transmitters sending signals between the telephone and the cell site in the case of cellular phones and between the handset and the base plugged in the wall socket in the case of cordless phones.
Any radio scanner can be programmed to receive the cordless telephone frequencies. Newer scanners have the cellular telephone frequencies block, but these frequencies can be unblocked by anyone with a basic knowledge of radio electronics. Digital telephones are also radio transmitters, but a digital signal is unintelligible when heard on an analog receiver. Of course, a digital receiver would receive a digital telephone signal were it programmed to the appropriate frequency. However, here is where spread spectrum technology comes in.
Spread spectrum was first used during World War II as a method to prevent torpedos being jammed en route to their target.
Digital spread spectrum uses a signal spread over a number of frequencies. These signals are difficult to intercept and demodulate and are resistant to jamming or interference. This provides for a clearer and cleaner telephone signal, as well as preventing monitoring of the signal itself. It is also worth noting that cordless telephones are now available with an operating frequency of 2.4 GHz. Since most scanners do not receive into the gigahertz range, this gives additional protection against interception and phone monitoring of your telephone signal as it is transmitted between the handset and the base.

A classic example of phone monitoring is the Nokia 3310 Spyphone available here

Watch out for mobile phone and cell phone scams

The mobile phone matrix scam has fast become one of the largest growing scams on the internet at the moment and is abundant on many of the internet auction sites, these mobile phone scams offer mobiles for as little as £20. This sounds very enticing and people readily sign up, however the majority of the members never actually see the promised goods.
How do they work?
The definition given by trading standards (of a matrix scheme) in their report into current scams sums it up very nicely :
Consumers who buy the product become members of a waiting list to receive their chosen 'free gift'. The matrix works by sending the person at the top of the list their 'free gift' only after a prescribed number of new recruits has signed up ? the prescribed number varies according to the choice of 'free gift' but can be as great as 100. Once the 'free gift' has been sent, the remaining members each move up one place on the waiting list. The person who has moved to the top then has to wait until the prescribed number of new recruits has signed up again in order to receive their 'free gift'. Although it is not compulsory for members to sign up new recruits, they are encouraged to do so in order to move themselves up the waiting list faster. This has led to some members placing misleading adverts on internet auction sites offering the 'opportunity to buy a mobile phone for £20′, in order to seek new recruits.
So basically the early members are paid out only when sufficient new members have joined under them, the maths behind this are absolutely staggering. I have used a simple example of a scheme that operates on a ten tier matrix with an entry price of £20 and a gadget price of £150.
Member #1 pays: they are, "the member to get the mobile phone "
Member #2 pays: Scammers Fund is £40.
Member #3 pays: Scammers Fund is £60.
Member #4 pays: Scammers Fund is £80.
Member #5 pays: Scammers Fund is £100.
Member #6 pays: Scammers Fund is £120.
Member #7 pays: Scammers Fund is £140.
Member #8 pays: Scammers Fund is £160.
Member #9 pays: Scammers Fund is £180.
Member #10 pays: Scammers Fund is £200.
Once the member count reaches 10 member #1 'cycles' and receives their gift, so the mobile phone matrix website makes £50 (£200 scammers fund - £150 cost of gadget). Member #2 then moves into prime position and the process starts over again. When member #2 'cycles', the website will make another £50 and another 10 members will have had to have joined.
Using that example, the figures seem quite good, however the majority of these mobile phone scam sites offer mobiles worth £300-£600 and as such they need to increase the tiers (or the entry price) so as to cover thier costs and make money. If they operated a 100 tier scheme then the 100th member would need another 1000 to have joined before they see their gadget! Some sites have been found to be operating 1000 or 10000 tier systems!
Here today, gone tomorrow!
The mobile phone matrix scheme, like all pyramid selling schemes, eventually gets to a point where it is unable to attract sufficient numbers of new members. It then collapses and those still waiting for their gadget are left holding the can as they cannot move forward without new members. What tends to happen now is that the people held in the tiers of the matrix try to promote the scheme further through the use of websites, forums and the auction sites and this further compounds the problem and just lines the scammers pockets further.
Remember, these mobile phone matrix sites only make their main money in the beginning as people join, once this starts to dry up the scammers move onto other things leaving the lists to collapse. Also it is key to remember that most of these scammers never actually send the goods even if you get to 'cycle' and the majority of names and claims made by the sites are all fake.
Final thoughts
Please remember that these mobile phone matrix schemes are ILLEGAL, if you see one on a site or an auction site then please report it to trading standards (for singular websites) and also report it to the auction sites (most have rules regarding these sites).
The simple way not to get taken for a ride is not to get involved in the mobile phone matrix's in the first place.
I will sum it up in one statement when dealing with mobile phone matrix schemes :
If the deal sounds to good to be true, THEN IT IS
Just a little update...
Paypal now state in their terms and conditions:
"You may not use PayPal to send or receive payments for any form of multi-level marketing programs (including online payment randomizers), as well as matrix, pyramid and Ponzi schemes, "get rich quick" scheme, or other similar ventures."

Common Cellular Phone and Mobile PhoneProblems

Cellular phones are in schools, banks, malls, and homes across the country. While cellular phones have been an important technological advancement, they're not without their drawbacks.
Reliability is one of the most significant disadvantages of cellular phones. Many people have replaced their land-line home phones with cellular phones, but this could prove problematic in a true emergency. If your house is on fire, dead batteries and weak signals are the last things you should be worrying about. Dropping your land-line service may seem like an easy way to save a few dollars, but in most cases it's not worth the risk.
Cell phones can also be easily damaged by improper handling and storage. Non-repairable corrosion can result if you expose your cellular phone to water or use wet hands to push the buttons. Exposing your cellular phone to excessive heat can damage the battery or internal components. Leaving your cell phone in extremely cold temperatures could possibly cause a temporary loss of the screen display.
While it won't endanger your life or harm your phone, cellular phone "cloning" will damage your bank account. A phone is cloned when someone steals its unique electronic serial number and telephone number. This allows the thief to charge unauthorized calls to your account. If you think you have been a victim of cloning, contact your cellular phone carrier immediately.
Subscriber fraud is similar to cloning and occurs when a thief steals your personal information to sign up for a cellular phone account in your name. Once you've discovered that you've been the victim of subscriber fraud, it can be difficult to prove to your cellular phone carrier that you did not incur the charges.
Cellular phones are integral part of life for many individuals, but it's important to be aware of potential problems that may arise from their use. Like any other modern electronic device, cellular phones are not without their drawbacks.

Best Cell Phone Links and Bsect Mobile Phone Links

Monday, October 29, 2007

Mobile and Cellular Phone Unlocking

In the world today, you will buyt a phone, and it will be locked to one single network. This is because the network providers lock the phones to only accept their SIM cards, so you don't change network. Well, what if you wanted to change network? There is a simple solution. Unlock your phone!

Reasons to unlock your phone are:




There are many websites and shops that unlock your phone for around £5.


You can change SIM card whenever, wherever you like.


Changing your SIM can save you money, different networks offer different tariffs.


When you buy a new phone, unlocking your old phone to sell it, or giving it to a friend, means that you will either get a lot more money for the phone (you will attract more people rather then just one group of people on the same network) or you will be able to give the phone away without hassle. Your friend can keep the same card and number.


You don't have to take the phone with you to most shops, and you won't have to send anything off to websites! It is all done remotely, and you receive your codes within 25 hours. All you need is a few details about your phone!



Reasons why not to unlock your phone:




There are no reasons!


The price? No! It doesn't have to cost as much as £5! Many places including my website offer unlocking for a lot of phones for a very small amount!


You can buy software to unlock you phone for very cheap prices, and the software works for unlimited use!


Buy cables for your phone to update and flash your phone!


So unlock your phone now!

How secure is the GSM System

Every day millions of people use cellular phones over radio links. With the increasing features, the mobile phone is gradually becoming a handheld computer. In the early 1980's, when most of the mobile telephone system was analog, the inefficiency in managing the growing demands in a cost-effective manner led to the opening of the door for digital technology (Huynh & Nguyen, 2003). According to Margrave (n.d), "With the older analog-based cellular telephone systems such as the Advanced Mobile Phone System (AMPS) and the Total Access Communication System (TACS)", cellular fraud is extensive. It's very simple for a radio hobbyist to tune in and hear cellular telephone conversations since without encryption, the voice and user data of the subscriber is sent to the network (Peng, 2000). Margrave (n.d) states that apart from this, cellular fraud can be committed by using complex equipment to receive the Electronic Serial Number so as to clone another mobile phone and place calls with that. To counteract the aforementioned cellular fraud and to make mobile phone traffic secure to a certain extent, GSM (Global System for Mobile communication or Group Special Mobile) is one of the many solutions now out there. According to GSM-tutorials, formed in 1982, GSM is a worldwide accepted standard for digital cellular communication. GSM operates in the 900MHz, 1800MHz, or 1900Mhz frequency bands by "digitizing and compressing data and then sending it down a channel with two other streams of user data, each in its own time slot." GSM provides a secure and confidential method of communication.

Security provided by GSM

The limitation of security in cellular communication is a result of the fact that all cellular communication is sent over the air, which then gives rise to threats from eavesdroppers with suitable receivers. Keeping this in account, security controls were integrated into GSM to make the system as secure as public switched telephone networks. The security functions are:

1. Anonymity: It implies that it is not simple and easy to track the user of the system. According to Srinivas (2001), when a new GSM subscriber switches on his/her phone for the first time, its International Mobile Subscriber Identity (IMSI), i.e. real identity is used and a Temporary Mobile Subscriber Identity (TMSI) is issued to the subscriber, which from that time forward is always used. Use of this TMSI, prevents the recognition of a GSM user by the potential eavesdropper.

2. Authentication: It checks the identity of the holder of the smart card and then decides whether the mobile station is allowed on a particular network. The authentication by the network is done by a response and challenge method. A random 128-bit number (RAND) is generated by the network and sent to the mobile. The mobile uses this RAND as an input and through A3 algorithm using a secret key Ki (128 bits) assigned to that mobile, encrypts the RAND and sends the signed response (SRES-32 bits) back. Network performs the same SRES process and compares its value with the response it has received from the mobile so as to check whether the mobile really has the secret key (Margrave, n.d). Authentication becomes successful when the two values of SRES matches which enables the subscriber to join the network. Since every time a new random number is generated, eavesdroppers don't get any relevant information by listening to the channel. (Srinivas, 2001)

3. User Data and Signalling Protection: Srinivas (2001) states that to protect both user data and signalling, GSM uses a cipher key. After the authentication of the user, the A8 ciphering key generating algorithm (stored in the SIM card) is used. Taking the RAND and Ki as inputs, it results in the ciphering key Kc which is sent through. To encipher or decipher the data, this Kc (54 bits) is used with the A5 ciphering algorithm. This algorithm is contained within the hardware of the mobile phone so as to encrypt and decrypt the data while roaming. Algorithms used to make mobile traffic secure

Authentication Algorithm A3: One way function, A3 is an operator-dependent stream cipher. To compute the output SRES by using A3 is easy but it is very difficult to discover the input (RAND and Ki) from the output. To cover the issue of international roaming, it was mandatory that each operator may choose to use A3 independently. The basis of GSM's security is to keep Ki secret (Srinivas, 2001)

Ciphering Algorithm A5: In recent times, many series of A5 exists but the most common ones are A5/0(unencrypted), A5/1 and A5/2. Because of the export regulations of encryption technologies there is the existence of a series of A5 algorithms (Brookson, 1994).

A8 (Ciphering Key Generating Algorithm): Like A3, it is also operator-dependent. Most providers combine A3 and A8 algorithms into a single hash function known as COMP128. The COMP128 creates KC and SRES, in a single instance (Huynh & Nguyen, 2003).

GSM security flaws


Security by obscurity. According to (Li, Chen & Ma) some people asserts that since the GSM algorithms are not publicized so it is not a secure system. "Most security analysts believe any system that is not subject to the scrutiny of the world's best minds can't be as secure." For instance, A5 was never made public, only its description is divulged as part of the GSM specification.


Another limitation of GSM is that although all communication between the Mobile station and the Base transceiver station are encrypted, in the fixed network all the communication and signalling is not protected as it is transmitted in plain text most of the time (Li, Chen & Ma).


One more problem is that it is hard to upgrade the cryptographic mechanisms timely.


Flaws are present within the GSM algorithms. According to Quirke (2004) " A5/2 is a deliberately weakened version of A5/1, since A5/2 can be cracked on the order of about 216".

Security breaches

Time to time, people have tried to decode GSM algorithms. For instance, according to Issac press release (1998) in April 1998, the SDA (Smartcard Developer Association) along with two U.C Berkeley researchers alleged that they have cracked the COMP128 algorithm, which is stored on the SIM. They claimed that within several hours they were able to deduce the Ki by sending immense numbers of challenges to the authorization module. They also said that out of 64 bits, Kc uses only 54 bits with zeros padding out the other 10, which makes the cipher key purposefully weaker. They felt government interference might be the reason behind this, as this would allow them to monitor conversations. However, they were unable to confirm their assertion since it is illegal to use equipment to carry out such an attack in the US. In reply to this assertion, the GSM alliance stated that since the GSM network allows only one call from any phone number at any one time it is of no relevant use even if a SIM could be cloned. GSM has the ability to detect and shut down duplicate SIM codes found on multiple phones (Business press release, 1998).

According to Srinivas (2001), one of the other claims was made by the ISAAC security research group. They asserted that a fake base station could be built for around $10,000, which would allow a "man-in-the-middle" attack. As a result of this, the real base station can get deluged which would compel a mobile station to connect to the fake station. Consequently, the base station could eavesdrop on the conversation by informing the phone to use A5/0, which is without encryption.

One of the other possible scenarios is of insider attack. In the GSM system, communication is encrypted only between the Mobile station and the Base Transceiver station but within the provider's network, all signals are transmitted in plain text, which could give a chance for a hacker to step inside (Li, Chen & Ma).

Measures taken to tackle these flaws

According to Quirke (2004), since the emergence of these, attacks, GSM have been revising its standard to add newer technologies to patch up the possible security holes, e.g. GSM1800, HSCSD, GPRS and EDGE. In the last year, two significant patches have been implemented. Firstly, patches for COMP 128-2 and COMP128-3 hash function have been developed to address the security hole with COMP 128 function. COMP128-3 fixes the issue where the remaining 10 bits of the Session Key (Kc) were replaced by zeroes. Secondly, it has been decided that a new A5/3 algorithm, which is created as part of the 3rd Generation Partnership Project (3GPP) will replace the old and weak A5/2. But this replacement would result in releasing new versions of the software and hardware in order to implement this new algorithm and it requires the co-operation of the hardware and software manufacturers.

GSM is coming out of their "security by obscurity" ideology, which is actually a flaw by making their 3GPP algorithms available to security researchers and scientists (Srinivas, 2001).

Conclusion

To provide security for mobile phone traffic is one the goals described in GSM 02.09 specification, GSM has failed in achieving it in past (Quirke, 2004). Until a certain point GSM did provide strong subscriber authentication and over-the-air transmission encryption but different parts of an operator's network became vulnerable to attacks (Li, Chen, Ma). The reason behind this was the secrecy of designing algorithms and use of weakened algorithms like A5/2 and COMP 128. One of other vulnerability is that of inside attack. In order to achieve its stated goals, GSM is revising its standards and it is bringing in new technologies so as to counteract these security holes. While no human-made technology is perfect, GSM is the most secure, globally accepted, wireless, public standard to date and it can be made more secure by taking appropriate security measures in certain areas.

Caller ID Spoofing

Caller ID Spoofing:
This technology allows you to set any number to display on the Caller ID of the person they are calling. If the name is registered with the phone company, then that name will display as well. A must-have for professionals - imagine being able to call from your cell while it's the office number that shows up!


Voice Changing:
Rather than having to buy an expensive device to attach to your telephone, we now give you the option to select a male or female voice from the menu. The caller will simply speak in their normal voice while the person they are calling will hear the conversation in the changed voice, all in real-time!


Call Recording:
This gives you the option to record all conversations for later retrieval. The recorded calls can either be heard via the toll free number or via our web control panel. When using the web, the calls can be replayed over and over, stored, downloaded as MP3 and emailed! The possibilities are endless! Everyone from salesmen to doctors can have their staff access the information 24/7! The ultimate proof of purchase!


Web Control Panel:
Our sophisticated web control panel allows you to login using your pin at http://www.SpoofCard.com. Once logged in, you can view a log of all your calls, listen to and download your recorded calls and replenish your cards. Wherever you are, whenever you want, whatever you need. Unbelievable access!