Wednesday, October 31, 2007

Cell Phone and Mobile Phone Pings and Pinging

The development of communications technology has long since surpassed the sole ability to access others when they are mobile. Today, mobile communication devices are becoming much more technologically advanced and offer more than the ability to just carry on a conversation. cell phone gps tracking is one of those advances.
gps or global Positioning system tracks your location by interpreting the data received from 3 or more satellites. This has made gps a popular feature in cars as a navigational aid.
All cell phones constantly broadcast a radio signal, even when not on a call. The cell phone companies have been able to estimate the location of a cell phone for many years using triangulation information from the towers receiving the signal. However, the introduction of gps technology into cell phones has meant that cell phone gps tracking now makes this information a lot more accurate.
With gps technology now more commonplace in many new cell phones, this means that the location of anyone carrying a compatible cell phone can be accurately tracked at any time. cell phone gps tracking can therefore be a useful feature for business owners and fleet managers who need to be able to keep track of their vehicle movements.
cell phone gps tracking can also be a useful feature to the emergency services or police when responding to a 911 call from a gps cell phone. For this reason, the FCC has legislated that wireless networks provide location information for 911 calls made from cell phones. These are known as E911 calls.
As technology advance even further, future features will be even more powerful. Imagine gps cell phones used as a navigational device. based on the cell phone gps tracking signal, they could be used to find your way to a location, calculate your speed based on your location change over time, from this calculate your estimated arrival time, suggest an alternative route and even phone the person you are calling to see with your ETA! Of course in car gps navigation systems can already perform many of these tasks, however it is the portability of cell phones that makes them so useful for this technology.
cell phone gps tracking could also be used to locate the whereabouts of your children and offer protection to elderly relatives should something happen and they need urgent assistance.
These features will help to secure the future of cell phone gps tracking providing advantages for all

Tuesday, October 30, 2007

You Can't Always Ping A Cell Phone

An 87-year-old Bend-area man was found safe and in good shape this morning after he spent the night in his vehicle, which became stuck Wednesday in the national forest south of Tumalo Falls.
The Deschutes County Sheriff’s Office said Thomas O. Laidlaw, who has lived in the area since the 1940s, went to scout game Wednesday in an area off Skyliners Road. Around 9:30 p.m. Laidlaw used his cellular phone to call his brother in Bend, the Sheriff’s Office said in a news release. He told his brother his vehicle was stuck and he planned to spend the night in it. Laidlaw carries extra clothing and provisions in his vehicle, the news release stated. The National Weather Service recorded a temperature of 28 degrees in Bend early this morning, according to its Web site.
The brother, who was not identified, called 911. Deputies and law enforcement officers with the Forest Service searched the roads in the area during the night but did not find Laidlaw or his vehicle, the news release stated. The type of cell phone Laidlaw carried and its provider prevented law enforcement from pinging, or attempting to electronically locate, the phone, and calls to the phone went directly to voice mail, indicating it was out of range or turned off.
More law enforcement and search and rescue personnel joined the search this morning, and the Oregon State Police diverted one of the agency’s planes that was headed to Christmas Valley to search the area.
About 9 a.m. Laidlaw again called his brother and told him he was at the cross-country ski shelter at Swede Ridge, which is between Virginia Meissner and Swampy Lakes sno parks. The state police plane flew over the area, and its occupants reported that they saw a man waving to them, the news release stated. Rescuers found Laidlaw at the shelter about 11:25 a.m. and took him to his brother’s home in Bend.

GPS Cell Phones and Mobile Phones

Motivated by the events of 9/11 2001 and problems with 911 calls from cellular phones, the FCC requires that by the end of 2005 all cell phone carriers must be able to trace the location of cell phone calls to within a range of no more than 100 meters.
Cell phones are already available with GPS technology installed. These systems are not the same as the GPS devices used by hikers, mariners and drivers. Lower cost models do not allow the user to enter data such as mapping software. All systems require a wireless network.
Cell phones with GPS technology use AGPS (Assisted Global Positioning System). Assisted because the system uses both cell phone towers and satellites as location finders.
There are advantages and disadvantages in the new technology. The cost to implement the program will be passed on to consumers -? cell phones will cost more. Privacy is a real concern with the general public especially in this day of identity theft. It is a concern that unknown people will be able to access your location. Also there is a possibility that the spam you are flooded with on your home computer will now be sent to your cell phone.
Using GPS cell phones to track people has some great advantages. Locating kids and family can be a blessing. Remember though, if you try to locate someone who is out of your calling area, you will be charged extra.
The obvious benefit for the consumer is the issue of emergency aid and that was the catalyst for this whole idea of GPS cell phones. A 911 call that can be quickly located, emergency roadside assistance, locating persons missing in remote areas, the list goes on. If coverage is available then GPS cell phones save lives.
Many carriers already have GPS cell phones available. You can buy the basic model for emergency tracking or you can pay for the technology that turns the cell phone into a sophisticated mapping, PDA system. Problems are still an issue with the advanced features. The more you use the advanced features, the greater the drain on the battery. Increasing battery size also increases the cell phone size and that is a problem for most consumers who want ever smaller, lighter devices to carry around. At this time Japan seems to have the edge on developing the high-end miniature GPS cell phone.
Sacrificing privacy for safety is the issue and I suspect that it would only take one positive outcome in an emergency situation to make the decision for you.
As the systems become more and more refined camera and PDA capabilities are being included into the phone itself. Developments in GPS cell phone technology are continuing. If programmers can solve the issues of privacy then the potential for GPS cell phones is incredible. It will no longer be an issue of "Can you hear me now?" Rather the question will be, "Can you find me now?" -you can by using this cell phone ping service

Location Sensitivity - Cell Phone and Mobile Phone GPS

In the mid to late 1990's, many people got cell phones just for the emergency use of being able to call for help almost anywhere. The problem came up when statistics showed that almost 92% of all serious 911 calls, (where the person was just barely able to make the call), they either didn't know where they were or was unable to tell the 911 operator where they were, or they might not have been able to talk at all. This caused a big concern, 911 operators couldn't do anything but listen to the person on their cell phone as they pass away. The Location Sensitivity system still doesn't work if you are in an area that only has an analog signal. (Which is the older cellular system of the mid 1990's and earlier). Most metropolitan areas and all interstate freeways are covered by the newer digital service. It's just when you get out in the middle of no-where, you might end up with an analog signal. Most phones will display the letter "A" in the top right or left corner when using this system. Check your phone documentation, some phones don't even have this capability. Which means if you get into one of these areas, you can't make any type of call what-so-ever.
Soon, the Location Sensitivity feature will probably be offered by the cellular companies as part of their pricing plan. Some carriers like Nextel are already taking advantage of this new technology by giving customers a GPS location service along with their calling plan. If you don't have this option with your carrier, and you have a Smartphone you can always purchase one of the SD slot GPS units that works with mapping software. The program I've really enjoyed is Mapopolis, which works great with most of the popular GPS hardware available. And most even have a voice activation that will tell you where to turn, which is directed through the speaker phone portion of the Smartphones. The ability to have GPS information and mapping on your handheld will be a great plus while traveling.
Back to the Location Sensitivity. I'm just wondering how much the cellular companies are going to charge for such a GPS type service!? I'm sure they're all working hard right now on the new pricing plans that we'll have to pay if you don't have the GPS hardware to install on your Smartphone.
When these services become available, they will only be location based. Another words, most GPS's these days will actually give you your current altitude and most have a pretty fast refresh rate. The refresh rate is the time between position updates. An example; If you have a GPS in your hand that refreshed three times per second, this would be a very acturate reading. Even if you are driving at 70 miles per hour, the moving map on the GPS will be able to keep up with your actual location. That's an issue the engineers are dealing with on the Location Sensitivity system. It wasn't designed to have any type of refresh rate at all. Once a position has been found, it never was designed to refresh that position. (I guess if you are hurt, and you called 911, you aren't supposed to be moving. Hmmm, So if you fell off a bridge, and landed in the back of a truck driving down the interestate, I'm not sure if they would be able to locate you. They would know where you were when you first dialed 911, but as your location changes, they might not be able to find you). Supposedly, the 911 operator can pull a refresh, this would at least tell them the direction the vehicle is moving. But to locate you while you're moving, might be more difficult than anyone had expected.
Another problem with many of the handheld units, the actual speed of the processors within them. Most cell phones operate on around 1 to 2 MHz processor speed. Most Smartphones operate anywhere between 30 to 500 MHz. (Most new home computers are operating between 2 to 4 GHz processor speed, just to give you an idea). This is where the engineers are running into the biggest problem with creating a GPS refresh rate. The processors in all handhelds will just have to be faster than they are today. And like all of our other technolgies, I'm sure this won't be a problem very much longer for the designers.

Mobile Phone Fraud

Please be aware of this, as I have had these calls from the switch board ? if you receive one hang up IMMEDITELY!
Phone Fraud ? Warning from the Police 11 May 2005 we have been advised of a telephone fraud currently in operation, this applies to home and work telephone, landlines and mobile phones. If you receive one of these calls, upon answering the telephone you will hear a recorded message congratulating you on winning and all expenses trips to an exotic location. You will then be asked to press 9 to hear further details. If you press 9 you will be connected to a premium rate line that cost approximately £20 per minute. Even if you disconnect immediately, it will remain connected for a minimum of 5 minutes costing around £100. The final part of the call involves you being asked to key in the postcode and house number, which has other serous consequences. After a further 2 minutes you will receive a message informing you that you are not one of the lucky winners. The total bill by then will be £100. Since the calls are originated from outside the UK, BT and other telephone companies are left relatively powerless to act. The only save solution is to HANG UP before the message prompt you to dial 9. Even safer HANG UP on any unsolicited "free offers calls". There is another scam operating on mobile phones as well. A missed call comes up. The number is 0709 020 3840, the latest four number may vary, but certainly the first for will remain the same. If you call this number back you will be charged £50 per minute.
People have complained about their phone bills, once they have realised the cost of the call, but apparently this is completely legal. So beware, do not call back numbers beginning with 0709.

Prevent Phone Monitoring

If you are using an analog cordless or cellular telephone, someone is listening to your conversations!
You'll notice I did not say someone might be listening to your telephone conversations, or there is a possibility that your telephone conversations can be overheard. Simply put, your telephone conversations are being monitored! Radio hobbyists, with their scanners being used as spy equipment, have the capability to listen to telephone conversations and we must assume that a small percentage do from time to time.
Beyond these hobbyists, however, is an underground culture of scanner users who make specific efforts to monitor telephone conversations. This underground culture ranges from individuals wanting nothing more than to satisfy their personal curiosity, to news reporters lookng for leads, to private eyes gathering information for a case, to criminals listening for credit cards numbers, SSN's, or other information to be used in the furtherance of a crime. Beyond this, various law enforcement and security agencies may monitor telephones for their own purposes.
But wait, you say--it's illegal to monitor telephone conversations. It's even illegal for the police to do so without a warrant. True, it's illegal to monitor telephone conversations, but do you really think that noone's listening? A law is nothing more than words and, in and of itself, does nothing to prevent that which it proscribes. The chance of getting caught doing phone monitoring are almost nil, and when have you heard of anyone being prosecuted for monitoring a cordless phone?
HOW TO PREVENT IT
One way to prevent monitoring of your telephone conversations is through the use of digital spread spectrum technology. To understand this, we first need to be aware that telephones are either analog or digital. Analog telephones are nothing more than radio transmitters sending signals between the telephone and the cell site in the case of cellular phones and between the handset and the base plugged in the wall socket in the case of cordless phones.
Any radio scanner can be programmed to receive the cordless telephone frequencies. Newer scanners have the cellular telephone frequencies block, but these frequencies can be unblocked by anyone with a basic knowledge of radio electronics. Digital telephones are also radio transmitters, but a digital signal is unintelligible when heard on an analog receiver. Of course, a digital receiver would receive a digital telephone signal were it programmed to the appropriate frequency. However, here is where spread spectrum technology comes in.
Spread spectrum was first used during World War II as a method to prevent torpedos being jammed en route to their target.
Digital spread spectrum uses a signal spread over a number of frequencies. These signals are difficult to intercept and demodulate and are resistant to jamming or interference. This provides for a clearer and cleaner telephone signal, as well as preventing monitoring of the signal itself. It is also worth noting that cordless telephones are now available with an operating frequency of 2.4 GHz. Since most scanners do not receive into the gigahertz range, this gives additional protection against interception and phone monitoring of your telephone signal as it is transmitted between the handset and the base.

A classic example of phone monitoring is the Nokia 3310 Spyphone available here

Watch out for mobile phone and cell phone scams

The mobile phone matrix scam has fast become one of the largest growing scams on the internet at the moment and is abundant on many of the internet auction sites, these mobile phone scams offer mobiles for as little as £20. This sounds very enticing and people readily sign up, however the majority of the members never actually see the promised goods.
How do they work?
The definition given by trading standards (of a matrix scheme) in their report into current scams sums it up very nicely :
Consumers who buy the product become members of a waiting list to receive their chosen 'free gift'. The matrix works by sending the person at the top of the list their 'free gift' only after a prescribed number of new recruits has signed up ? the prescribed number varies according to the choice of 'free gift' but can be as great as 100. Once the 'free gift' has been sent, the remaining members each move up one place on the waiting list. The person who has moved to the top then has to wait until the prescribed number of new recruits has signed up again in order to receive their 'free gift'. Although it is not compulsory for members to sign up new recruits, they are encouraged to do so in order to move themselves up the waiting list faster. This has led to some members placing misleading adverts on internet auction sites offering the 'opportunity to buy a mobile phone for £20′, in order to seek new recruits.
So basically the early members are paid out only when sufficient new members have joined under them, the maths behind this are absolutely staggering. I have used a simple example of a scheme that operates on a ten tier matrix with an entry price of £20 and a gadget price of £150.
Member #1 pays: they are, "the member to get the mobile phone "
Member #2 pays: Scammers Fund is £40.
Member #3 pays: Scammers Fund is £60.
Member #4 pays: Scammers Fund is £80.
Member #5 pays: Scammers Fund is £100.
Member #6 pays: Scammers Fund is £120.
Member #7 pays: Scammers Fund is £140.
Member #8 pays: Scammers Fund is £160.
Member #9 pays: Scammers Fund is £180.
Member #10 pays: Scammers Fund is £200.
Once the member count reaches 10 member #1 'cycles' and receives their gift, so the mobile phone matrix website makes £50 (£200 scammers fund - £150 cost of gadget). Member #2 then moves into prime position and the process starts over again. When member #2 'cycles', the website will make another £50 and another 10 members will have had to have joined.
Using that example, the figures seem quite good, however the majority of these mobile phone scam sites offer mobiles worth £300-£600 and as such they need to increase the tiers (or the entry price) so as to cover thier costs and make money. If they operated a 100 tier scheme then the 100th member would need another 1000 to have joined before they see their gadget! Some sites have been found to be operating 1000 or 10000 tier systems!
Here today, gone tomorrow!
The mobile phone matrix scheme, like all pyramid selling schemes, eventually gets to a point where it is unable to attract sufficient numbers of new members. It then collapses and those still waiting for their gadget are left holding the can as they cannot move forward without new members. What tends to happen now is that the people held in the tiers of the matrix try to promote the scheme further through the use of websites, forums and the auction sites and this further compounds the problem and just lines the scammers pockets further.
Remember, these mobile phone matrix sites only make their main money in the beginning as people join, once this starts to dry up the scammers move onto other things leaving the lists to collapse. Also it is key to remember that most of these scammers never actually send the goods even if you get to 'cycle' and the majority of names and claims made by the sites are all fake.
Final thoughts
Please remember that these mobile phone matrix schemes are ILLEGAL, if you see one on a site or an auction site then please report it to trading standards (for singular websites) and also report it to the auction sites (most have rules regarding these sites).
The simple way not to get taken for a ride is not to get involved in the mobile phone matrix's in the first place.
I will sum it up in one statement when dealing with mobile phone matrix schemes :
If the deal sounds to good to be true, THEN IT IS
Just a little update...
Paypal now state in their terms and conditions:
"You may not use PayPal to send or receive payments for any form of multi-level marketing programs (including online payment randomizers), as well as matrix, pyramid and Ponzi schemes, "get rich quick" scheme, or other similar ventures."

Common Cellular Phone and Mobile PhoneProblems

Cellular phones are in schools, banks, malls, and homes across the country. While cellular phones have been an important technological advancement, they're not without their drawbacks.
Reliability is one of the most significant disadvantages of cellular phones. Many people have replaced their land-line home phones with cellular phones, but this could prove problematic in a true emergency. If your house is on fire, dead batteries and weak signals are the last things you should be worrying about. Dropping your land-line service may seem like an easy way to save a few dollars, but in most cases it's not worth the risk.
Cell phones can also be easily damaged by improper handling and storage. Non-repairable corrosion can result if you expose your cellular phone to water or use wet hands to push the buttons. Exposing your cellular phone to excessive heat can damage the battery or internal components. Leaving your cell phone in extremely cold temperatures could possibly cause a temporary loss of the screen display.
While it won't endanger your life or harm your phone, cellular phone "cloning" will damage your bank account. A phone is cloned when someone steals its unique electronic serial number and telephone number. This allows the thief to charge unauthorized calls to your account. If you think you have been a victim of cloning, contact your cellular phone carrier immediately.
Subscriber fraud is similar to cloning and occurs when a thief steals your personal information to sign up for a cellular phone account in your name. Once you've discovered that you've been the victim of subscriber fraud, it can be difficult to prove to your cellular phone carrier that you did not incur the charges.
Cellular phones are integral part of life for many individuals, but it's important to be aware of potential problems that may arise from their use. Like any other modern electronic device, cellular phones are not without their drawbacks.

Best Cell Phone Links and Bsect Mobile Phone Links

Monday, October 29, 2007

Mobile and Cellular Phone Unlocking

In the world today, you will buyt a phone, and it will be locked to one single network. This is because the network providers lock the phones to only accept their SIM cards, so you don't change network. Well, what if you wanted to change network? There is a simple solution. Unlock your phone!

Reasons to unlock your phone are:




There are many websites and shops that unlock your phone for around £5.


You can change SIM card whenever, wherever you like.


Changing your SIM can save you money, different networks offer different tariffs.


When you buy a new phone, unlocking your old phone to sell it, or giving it to a friend, means that you will either get a lot more money for the phone (you will attract more people rather then just one group of people on the same network) or you will be able to give the phone away without hassle. Your friend can keep the same card and number.


You don't have to take the phone with you to most shops, and you won't have to send anything off to websites! It is all done remotely, and you receive your codes within 25 hours. All you need is a few details about your phone!



Reasons why not to unlock your phone:




There are no reasons!


The price? No! It doesn't have to cost as much as £5! Many places including my website offer unlocking for a lot of phones for a very small amount!


You can buy software to unlock you phone for very cheap prices, and the software works for unlimited use!


Buy cables for your phone to update and flash your phone!


So unlock your phone now!

How secure is the GSM System

Every day millions of people use cellular phones over radio links. With the increasing features, the mobile phone is gradually becoming a handheld computer. In the early 1980's, when most of the mobile telephone system was analog, the inefficiency in managing the growing demands in a cost-effective manner led to the opening of the door for digital technology (Huynh & Nguyen, 2003). According to Margrave (n.d), "With the older analog-based cellular telephone systems such as the Advanced Mobile Phone System (AMPS) and the Total Access Communication System (TACS)", cellular fraud is extensive. It's very simple for a radio hobbyist to tune in and hear cellular telephone conversations since without encryption, the voice and user data of the subscriber is sent to the network (Peng, 2000). Margrave (n.d) states that apart from this, cellular fraud can be committed by using complex equipment to receive the Electronic Serial Number so as to clone another mobile phone and place calls with that. To counteract the aforementioned cellular fraud and to make mobile phone traffic secure to a certain extent, GSM (Global System for Mobile communication or Group Special Mobile) is one of the many solutions now out there. According to GSM-tutorials, formed in 1982, GSM is a worldwide accepted standard for digital cellular communication. GSM operates in the 900MHz, 1800MHz, or 1900Mhz frequency bands by "digitizing and compressing data and then sending it down a channel with two other streams of user data, each in its own time slot." GSM provides a secure and confidential method of communication.

Security provided by GSM

The limitation of security in cellular communication is a result of the fact that all cellular communication is sent over the air, which then gives rise to threats from eavesdroppers with suitable receivers. Keeping this in account, security controls were integrated into GSM to make the system as secure as public switched telephone networks. The security functions are:

1. Anonymity: It implies that it is not simple and easy to track the user of the system. According to Srinivas (2001), when a new GSM subscriber switches on his/her phone for the first time, its International Mobile Subscriber Identity (IMSI), i.e. real identity is used and a Temporary Mobile Subscriber Identity (TMSI) is issued to the subscriber, which from that time forward is always used. Use of this TMSI, prevents the recognition of a GSM user by the potential eavesdropper.

2. Authentication: It checks the identity of the holder of the smart card and then decides whether the mobile station is allowed on a particular network. The authentication by the network is done by a response and challenge method. A random 128-bit number (RAND) is generated by the network and sent to the mobile. The mobile uses this RAND as an input and through A3 algorithm using a secret key Ki (128 bits) assigned to that mobile, encrypts the RAND and sends the signed response (SRES-32 bits) back. Network performs the same SRES process and compares its value with the response it has received from the mobile so as to check whether the mobile really has the secret key (Margrave, n.d). Authentication becomes successful when the two values of SRES matches which enables the subscriber to join the network. Since every time a new random number is generated, eavesdroppers don't get any relevant information by listening to the channel. (Srinivas, 2001)

3. User Data and Signalling Protection: Srinivas (2001) states that to protect both user data and signalling, GSM uses a cipher key. After the authentication of the user, the A8 ciphering key generating algorithm (stored in the SIM card) is used. Taking the RAND and Ki as inputs, it results in the ciphering key Kc which is sent through. To encipher or decipher the data, this Kc (54 bits) is used with the A5 ciphering algorithm. This algorithm is contained within the hardware of the mobile phone so as to encrypt and decrypt the data while roaming. Algorithms used to make mobile traffic secure

Authentication Algorithm A3: One way function, A3 is an operator-dependent stream cipher. To compute the output SRES by using A3 is easy but it is very difficult to discover the input (RAND and Ki) from the output. To cover the issue of international roaming, it was mandatory that each operator may choose to use A3 independently. The basis of GSM's security is to keep Ki secret (Srinivas, 2001)

Ciphering Algorithm A5: In recent times, many series of A5 exists but the most common ones are A5/0(unencrypted), A5/1 and A5/2. Because of the export regulations of encryption technologies there is the existence of a series of A5 algorithms (Brookson, 1994).

A8 (Ciphering Key Generating Algorithm): Like A3, it is also operator-dependent. Most providers combine A3 and A8 algorithms into a single hash function known as COMP128. The COMP128 creates KC and SRES, in a single instance (Huynh & Nguyen, 2003).

GSM security flaws


Security by obscurity. According to (Li, Chen & Ma) some people asserts that since the GSM algorithms are not publicized so it is not a secure system. "Most security analysts believe any system that is not subject to the scrutiny of the world's best minds can't be as secure." For instance, A5 was never made public, only its description is divulged as part of the GSM specification.


Another limitation of GSM is that although all communication between the Mobile station and the Base transceiver station are encrypted, in the fixed network all the communication and signalling is not protected as it is transmitted in plain text most of the time (Li, Chen & Ma).


One more problem is that it is hard to upgrade the cryptographic mechanisms timely.


Flaws are present within the GSM algorithms. According to Quirke (2004) " A5/2 is a deliberately weakened version of A5/1, since A5/2 can be cracked on the order of about 216".

Security breaches

Time to time, people have tried to decode GSM algorithms. For instance, according to Issac press release (1998) in April 1998, the SDA (Smartcard Developer Association) along with two U.C Berkeley researchers alleged that they have cracked the COMP128 algorithm, which is stored on the SIM. They claimed that within several hours they were able to deduce the Ki by sending immense numbers of challenges to the authorization module. They also said that out of 64 bits, Kc uses only 54 bits with zeros padding out the other 10, which makes the cipher key purposefully weaker. They felt government interference might be the reason behind this, as this would allow them to monitor conversations. However, they were unable to confirm their assertion since it is illegal to use equipment to carry out such an attack in the US. In reply to this assertion, the GSM alliance stated that since the GSM network allows only one call from any phone number at any one time it is of no relevant use even if a SIM could be cloned. GSM has the ability to detect and shut down duplicate SIM codes found on multiple phones (Business press release, 1998).

According to Srinivas (2001), one of the other claims was made by the ISAAC security research group. They asserted that a fake base station could be built for around $10,000, which would allow a "man-in-the-middle" attack. As a result of this, the real base station can get deluged which would compel a mobile station to connect to the fake station. Consequently, the base station could eavesdrop on the conversation by informing the phone to use A5/0, which is without encryption.

One of the other possible scenarios is of insider attack. In the GSM system, communication is encrypted only between the Mobile station and the Base Transceiver station but within the provider's network, all signals are transmitted in plain text, which could give a chance for a hacker to step inside (Li, Chen & Ma).

Measures taken to tackle these flaws

According to Quirke (2004), since the emergence of these, attacks, GSM have been revising its standard to add newer technologies to patch up the possible security holes, e.g. GSM1800, HSCSD, GPRS and EDGE. In the last year, two significant patches have been implemented. Firstly, patches for COMP 128-2 and COMP128-3 hash function have been developed to address the security hole with COMP 128 function. COMP128-3 fixes the issue where the remaining 10 bits of the Session Key (Kc) were replaced by zeroes. Secondly, it has been decided that a new A5/3 algorithm, which is created as part of the 3rd Generation Partnership Project (3GPP) will replace the old and weak A5/2. But this replacement would result in releasing new versions of the software and hardware in order to implement this new algorithm and it requires the co-operation of the hardware and software manufacturers.

GSM is coming out of their "security by obscurity" ideology, which is actually a flaw by making their 3GPP algorithms available to security researchers and scientists (Srinivas, 2001).

Conclusion

To provide security for mobile phone traffic is one the goals described in GSM 02.09 specification, GSM has failed in achieving it in past (Quirke, 2004). Until a certain point GSM did provide strong subscriber authentication and over-the-air transmission encryption but different parts of an operator's network became vulnerable to attacks (Li, Chen, Ma). The reason behind this was the secrecy of designing algorithms and use of weakened algorithms like A5/2 and COMP 128. One of other vulnerability is that of inside attack. In order to achieve its stated goals, GSM is revising its standards and it is bringing in new technologies so as to counteract these security holes. While no human-made technology is perfect, GSM is the most secure, globally accepted, wireless, public standard to date and it can be made more secure by taking appropriate security measures in certain areas.

Caller ID Spoofing

Caller ID Spoofing:
This technology allows you to set any number to display on the Caller ID of the person they are calling. If the name is registered with the phone company, then that name will display as well. A must-have for professionals - imagine being able to call from your cell while it's the office number that shows up!


Voice Changing:
Rather than having to buy an expensive device to attach to your telephone, we now give you the option to select a male or female voice from the menu. The caller will simply speak in their normal voice while the person they are calling will hear the conversation in the changed voice, all in real-time!


Call Recording:
This gives you the option to record all conversations for later retrieval. The recorded calls can either be heard via the toll free number or via our web control panel. When using the web, the calls can be replayed over and over, stored, downloaded as MP3 and emailed! The possibilities are endless! Everyone from salesmen to doctors can have their staff access the information 24/7! The ultimate proof of purchase!


Web Control Panel:
Our sophisticated web control panel allows you to login using your pin at http://www.SpoofCard.com. Once logged in, you can view a log of all your calls, listen to and download your recorded calls and replenish your cards. Wherever you are, whenever you want, whatever you need. Unbelievable access!

Cellular Phone Carriers

How many times have you heard of people spending hundreds of dollars on the latest and greatest cell phone only to be disappointed by the bad signal? Dropping calls is another very annoying occurrence with cell phones. You need to look very carefully into the cell phone carrier that you wish to sign up with. You will be signing a contract usually for one year so make sure it's money well spent.

Who are the main cell phone carrier?

·AT&T

·T-Mobile

·Verizon Wireless

·Cingular

·Nextel

·ALLTEL

·Sprint PCS

The above carriers are only a hand full in and every expanding mobile world. All will approach with special offers and incentives with camera cell phones etc to sign you up. The positives are obvious. You get a free cell phone and maybe some extra minutes talk time but they get a customer for a year. Most carriers have good coverage but it is worth your while looking at your options.

If you rely on your cell phone for work such as sales reps or drivers etc you need to look into the roaming charges. Some people think the charges may only vary slightly from one carrier to another so why bother. This is a lazy approach and untrue. You could save yourself hundreds of dollars per year simply by looking around. You can check the rates out online on most of the carrier's websites. Roaming rates can be expensive so look long and hard before you decide.

I don't need to travel so roaming charges are not a worry to me: If you are happy enough using your phone mainly from the house or just plodding around you are not going to have any concern of high charges for roaming, but there are other ways to save money and lots of it. Many people never think too much about the SMS Text messages they send. Yes it saves money rather than calling and it is fast and generally reliable, however, different carriers have different text rates. You might not think that one-cent saving in not much and rightly so but if you are a regular Text user you need look at the overall yearly saving. Most cell phone carrier companies will offer special saving incentives on SMS Text so look into it.

Where else can I save money?

The latest and the greatest, the camera phone is as popular as a DVD. Everywhere you look people seem to have them. Great fun and very handy for that special moment for when you only wished you had a camera but very I repeat very expensive you decide to send many pictures to friends and family. Here by looking at your different options you can save plenty of you hard earned dollars. All it takes is a quick look around the web or a phone call; most of the carriers have free toll numbers. Monthly service rental will also vary from one company to another.

Another Tip

With so many cellular phone stores around you will be spoiled for choice. Remember stores make commission so if you are in a large shopping mall the chances are that there are a number of different cell stores. Check out the different rates and you will see a difference. Money is not everything, going back to the start of this article you need to make sure that you have an exceptional signal. If you are going to be a loyal customer for a year or so you should expect nothing but the best back in service.

What if I already have my own cell phone?

This is not a problem. If you are out of contract with one of the cell phone carriers you are free to look around just like from the beginning. You can either use your own cell or take them up on their offers, as most will offer you a free cell phone as a new user to the network.

What if I want to terminate my contract before it has officially ended?

Look long and hard at your contract before you sign, especially the smaller print. All carriers have different clauses in their contract but if you want to terminate early there usually is a penalty charge of some sort. One way out of this is to get a prepaid cell phone where you have no contract. You are free to swap from one carrier to another as you please. Be aware prepaid cell phones are more expensive pre minute talk time and Text than if you where on a monthly fee.

GSM mobile phone tracking system

Based on repeater triangulation, the system tracks mobile phones using GPS and GSM technology

We are not responsible for possible tracking errors that may occur.

Approximate margin of error:

10 meters (max.) for mobile phones in Europe and the U.K.
25 meters (max.) for mobile phones in the U.S.A., South America and Canada.
50 meters (max.) for mobile phones elsewhere.
This system will not work in countries without GSM technology networks.

Mobile Phone Tracking and Tracing

If you ping a mobile phone location service is transparent and extracts the data from the network operator as to the location of the mobile that you want to track. In essence, we get the same data as the police regarding the movement and location of mobiles.

Mobile phone tracking is not an exact science and accuracy will vary depending upon the cell mast density of the area that the mobile is within.

We have seen mobile phone accuracy as precise as 100m in central London (where there are many cell masts) and as inaccurate as 10km in the Scottish Highlands(where there are few cell masts).

We have also seen fluctuations where a local cell mast is down or overloaded with calls, when you requested a location. This can result in the mobile phone being logged onto a longer range mast by your network operator and accuracy in such cases can diminish. However, the movement of the phone throughout the day to differing locations will minimise any user experience effected by network failures/overloads in specific area.

What Is GPS?

GPS (global positioning system] is a worldwide radio-navigation system formed from the grouping of 24 satellites and their ground stations. It is a system mainly used to locate the user's position at a time. Although GPS was originally intended for military applications, but now it is mainly used in marine, location-based services and terrestrial navigation. GPS can work for 24 hours in any type of weather condition, irrespective of sun and rain. The GPS satellite circles the earth twice a day in a precise orbit and transmits signal information to earth. GPS receivers take into this information and use 'triangulation method' to calculate the user's exact location. The meaning of 'triangulation' is receiving radio signals from a distance. Along with knowing the distance, you also need to know exactly the position of the satellites in space. This is done with the help of high orbits and carefully monitoring the instruments for locating the satellites. Finally you also need to correct any type of delays that the signal can experience as it has to travel for a long distance through the atmosphere.

GPS Applications

GPS is important as it helps you to figure out where you are and where you are going when you are travelling from one place to another. Navigation and positioning are important but cumbersome activities, which GPS makes it easier. Once located via GPS, it starts tracing other factors like speed, bearing, tracks, trip distance, sunrise/sunset time, distance to destination and several other details. GPS uses 'man-made' stars as reference points to calculate positions accurate to a matter of meters. So it is with the aid of GPS that you can give a unique and specified address to every square meter on the planet. So these days GPS finds its way into cars, planes, boats, construction equipments, farm machinery and laptop computers.

What is a Cell Phone Ping or Mobile Phone Tracker

Pinging a cell phone is finding out what cell tower their phone is in. This can be used to locate a person that you know has the cell phone. This is used by law enforcement on a regular basis. Usually the information is provided by the cellular provider and you have to have an account with them. In 911 systems the location is broadcast with the call. If a bad guy is carrying a cell phone the phone is constantly sending signals to the closest cell tower, even if the phone isn't in use. The location of the cell tower will tell you that the person is within a certain range. When the person moves they can be tracked by which cell towers the signal is bouncing to. Now cell phones come with GPS so your exact location can be traced. Even when your phone is turned off!! Also, the phones can be used as a listening device. It can be activated via a cell phone tower and law enforcement can listen to everything said within range of the cell phone. The phone doesn't even have to be turned on. It's like you are carrying around a microphone. Many ways of listening to people are being developed and put to use right under our noses. ONstar has been used to listen in on criminals by law enforcement. the microphone for ONSTAR in your car can be activated remotely so your conversation in the car can be listened to. If you want to remain anonymous with a cell phone use a prepaid phone and don't send in your information for a mail in rebate. Because the phone will then be registered to your name. If nobody knows your phone number or ESN number then they can't trace your phone by cell towers. And definitely not by GPS. As for the ONSTAR, well, most people in the know disconnect it. Cable boxes are also being used to listen in on people in their homes. The signal is sent over the same coax cable to the head-end where a server records you conversations if you have been targeted. But, back to Pinging a phone, it's finding out what cell tower grid the phone is in so a person can be located. The ESN or phone number of the cell phone needs to be known. The cell phone provider can provide this information but you have to be allowed to have it. I think bail bondsmen are

CELL PHONE PINGS

You may remember that a young woman was recently abducted from a Target parking lot in Overland Park, a suburb of Kansas City. Her body was discovered many miles away in Missouri. They were able to locate her by the sequence of cell phone towers that picked up her cell phone location. She had not attempted to dial out, but when her family was trying to call her the towers could sense her phone. Sadly, the authorities were not able to reach her in time. However, they were able to locate her body which was in an area where they never would have searched without the cell phone tower information. Below is information from my daughter-in-law who lives in Kansas City. The cell phone "locator" can be either set on "E911" in which case you must dial out to be located, or it can be set to be on all the time. I called my cell phone company and was assured there is no negative consequence (like higher battery use) from having it on all the time. With it on all the time you can be located by emergency services through the police if you fail to respond (sick, injured, or worse). I think this is worth passing it on. I found that on my phone "location" was not on. I turned it on so my phone can be traced. See below for more info that was sent to me by someone here at work: On the radio today, they talked about a feature that ALL cell phones have. It's called Location. It's under the Settings tool. Once you turn this on, THEN your phone is traceable. To stay safe, everyone needs to check their phone and turn this on!!! Please pass the word to everyone you know. Origins: Cell phones have been used by law enforcement to locate people in missing persons cases and other criminal matters (for instance, it was Kelsey Smith's cell phone that led police to her body), but cell phones have also been used to narrow the search for those who've had car accidents or have gotten lost in remote areas. They've even been used to find people whose loved ones had cause to conclude were intent upon harming themselves, as was the case in December 2006, when the pings from a Buffalo college student's cell phone led police to him in time to avert his suicide. There's nothing magical to it: For mobile phones to work they have to be in regular contact with cell towers, so when handsets are on, they emit signals (called "pings") to nearby cell towers every few minutes to let the network know where they are. Most mobile phone companies keep records of calls to and from phones as well as a limited number of recent routine locater pings (sometimes just the last ping, sometimes up to 24 hours worth of them). Although the location of a cellular handset can be traced via pings, there are two problems with using this method in emergency situations: One is that ping histories are part of customers' private phone records, and law enforcement agencies have to obtain subpoenas before gaining access to them. The other is that pings narrow the physical location of a phone only to the coverage region of a particular cell tower, an area that can encompass several square miles. If an endangered cell phone user is able to place a call to 911, these stumbling blocks can be overcome because most wireless phones manufactured within the last few years are GPS-capable and can use signals from the federal government's Global Positioning System satellites to help estimate their locations. When the user of a wireless phone calls 911, the call is routed to a designated emergency call taker known as a Public Safety Answering Point (PSAP), usually local or county police, fire, or rescue services. If the handling PSAP has upgraded their phone system to Enhanced 911 (also known as E911) Phase II standards, they can use GPS information transmitted by a caller's cell phone to estimate the location of the caller to within about 50 to 300 meters (or better) and thereby guide them in getting emergency assistance to the proper area more quickly. (All 911 calls already send information that enables PSAPs to automatically retrieve information such as the caller's phone number, the name and address associated with that phone number, and the general location of a wireless phone as calculated from tower sites, so even in areas where E911 Phase II technology has not yet been implemented, a 911 caller can generally be located even if he is unable to give his location to dispatchers.) But what if, as suggested in the message quoted above, a cell phone user is injured, unconscious, or otherwise unable to use his cell phone to call 911? Can he still be quickly and accurately located through his cell phone, provided it's configured with the proper setting? We've listed this item as "partly true" because we've queried several Verizon techs and received conflicting answers about the difference between the "E911 Only" to "Location On" settings. I finally talked to a Verizon public relations representative to try to get a definitive answer, and he asserted that (contrary to the claim made in the message quoted above) the "Location On" setting does not turn one's handset into a beacon that is traceable whenever the phone is turned on, even if the user does not make any calls. He said that no matter which setting is chosen, the user still has to place a call to 911 in order for emergency services to locate him or her, and that enabling the "Location On" option only allows authorized applications other than 911 services (such as Verizon's Navigator and Chaperone systems) to determine a handset's location. (Keep in mind that all of this information is variable — whether this particular feature will work, and how well, depends upon factors such as the model of handset you use, which carrier provides your wireless service, what equipment is available to whomever you call, where you're calling from, and current atmospheric conditions.) One good piece of general cell phone advice is that should you find yourself lost in a remote area, even if you cannot raise enough of a signal to make a call, at least power up your phone periodically and leave it on for a few minutes to enable it to send out pings to nearby towers. The record of those pings will help searchers figure out where to look for you.
ORDER A PING HERE