| ==Phrack Inc.== | |
| Volume Two, Issue Eleven, Phile #9 of 12 | |
| -------------------------------------------------------------------------- | |
| The following is reprinted from the November 1985 issue of Personal | |
| Communications Technology magazine by permission of the authors and | |
| the publisher, FutureComm Publications Inc., 4005 Williamsburg Ct., | |
| Fairfax, VA 22032, 703/352-1200. | |
| Copyright 1985 by FutureComm Publications Inc. All rights reserved. | |
| -------------------------------------------------------------------------- | |
| THE ELECTRONIC SERIAL NUMBER: A CELLULAR 'SIEVE'? | |
| 'SPOOFERS' CAN DEFRAUD USERS AND CARRIERS | |
| by Geoffrey S. Goodfellow, Robert N. Jesse, and Andrew H. Lamothe, Jr. | |
| What's the greatest security problem with cellular phones? Is it privacy of | |
| communications? No. | |
| Although privacy is a concern, it will pale beside an even greater problem: | |
| spoofing. | |
| 'Spoofing' is the process through which an agent (the 'spoofer') pretends to | |
| be somebody he isn't by proffering false identification, usually with intent | |
| to defraud. This deception, which cannot be protected against using the | |
| current U.S. cellular standards, has the potential to create a serious | |
| problem--unless the industry takes steps to correct some loopholes in the | |
| present cellular standards. | |
| Compared to spoofing, the common security concern of privacy is not so severe. | |
| Most cellular subscribers would, at worst, be irked by having their | |
| conversational privacy violated. A smaller number of users might actually | |
| suffer business or personal harm if their confidential exchanges were | |
| compromised. For them, voice encryption equipment is becoming increasingly | |
| available if they are willing to pay the price for it. | |
| Thus, even though technology is available now to prevent an interloper from | |
| overhearing sensitive conversations, cellular systems cannot--at any | |
| cost--prevent pirates from charging calls to any account. This predicament is | |
| not new to the industry. Even though cellular provides a modern, | |
| sophisticated quality mobile communications service, it is not fundamentally | |
| much safer than older forms of mobile telephony. | |
| History of Spoofing Vulnerability | |
| The earliest form of mobile telephony, unsquelched manual Mobile Telephone | |
| Service (MTS), was vulnerable to interception and eavesdropping. To place a | |
| call, the user listened for a free channel. When he found one, he would key | |
| his microphone to ask for service: 'Operator, this is Mobile 1234; may I | |
| please have 555-7890.' The operator knew to submit a billing ticket for | |
| account number 1234 to pay for the call. So did anybody else listening to the | |
| channel--hence the potential for spoofing and fraud. | |
| Squelched channel MTS hid the problem only slightly because users ordinarily | |
| didn't overhear channels being used by other parties. Fraud was still easy | |
| for those who turned off the squelch long enough to overhear account numbers. | |
| Direct-dial mobile telephone services such as Improved Mobile Telephone | |
| Service (IMTS) obscured the problem a bit more because subscriber | |
| identification was made automatically rather than by spoken exchange between | |
| caller and operator. Each time a user originated a call, the mobile telephone | |
| transmitted its identification number to the serving base station using some | |
| form of Audio Frequency Shift Keying (AFSK), which was not so easy for | |
| eavesdroppers to understand. | |
| Committing fraud under IMTS required modification of the mobile--restrapping | |
| of jumpers in the radio unit, or operating magic keyboard combinations in | |
| later units--to reprogram the unit to transmit an unauthorized identification | |
| number. Some mobile control heads even had convenient thumb wheel switches | |
| installed on them to facilitate easy and frequent ANI (Automatic Number | |
| Identification) changes. | |
| Cellular Evolution | |
| Cellular has evolved considerably from these previous systems. Signaling | |
| between mobile and base stations uses high-speed digital techniques and | |
| involves many different types of digital messages. As before, the cellular | |
| phone contains its own Mobile Identification Number (MIN), which is programmed | |
| by the seller or service shop and can be changed when, for example, the phones | |
| sold to a new user. In addition, the U.S. cellular standard incorporates a | |
| second number, the 'Electronic Serial Number' (ESN), which is intended to | |
| uniquely and permanently identify the mobile unit. | |
| According to the Electronic Industries Association (EIA) Interim Standard | |
| IS-3-B, Cellular System Mobile Station--Land Station Compatibility | |
| Specification (July 1984), 'The serial number is a 32-bit binary number that | |
| uniquely identifies a mobile station to any cellular system. It must be | |
| factory-set and not readily alterable in the field. The circuitry that | |
| provides the serial number must be isolated from fraudulent contact and | |
| tampering. Attempts to change the serial number circuitry should render the | |
| mobile station inoperative.' | |
| The ESN was intended to solve two problems the industry observed with its | |
| older systems. | |
| First, the number of subscribers that older systems could support fell far | |
| short of the demand in some areas, leading groups of users to share a single | |
| mobile number (fraudulently) by setting several phones to send the same | |
| identification. Carriers lost individual user accountability and their means | |
| of predicting and controlling traffic on their systems. | |
| Second, systems had no way of automatically detecting use of stolen equipment | |
| because thieves could easily change the transmitted identification. | |
| In theory, the required properties of the ESN allow cellular systems to check | |
| to ensure that only the correctly registered unit uses a particular MIN, and | |
| the ESNs of stolen units can be permanently denied service ('hot-listed'). | |
| This measure is an improvement over the older systems, but vulnerabilities | |
| remain. | |
| Ease of ESN Tampering | |
| Although the concept of the unalterable ESN is laudable in theory, weaknesses | |
| are apparent in practice. Many cellular phones are not constructed so that | |
| 'attempts to change the serial number circuitry renders the mobile station | |
| inoperative.' We have personally witnessed the trivial swapping of one ESN | |
| chip for another in a unit that functioned flawlessly after the switch was | |
| made. | |
| Where can ESN chips be obtained to perform such a swap? We know of one recent | |
| case in the Washington, D.C. area in which an ESN was 'bought' from a local | |
| service shop employee in exchange for one-half gram of cocaine. Making the | |
| matter simpler, most manufacturers are using industry standard Read-Only | |
| Memory (ROM) chips for their ESNs, which are easily bought and programmed or | |
| copied. | |
| Similarly, in the spirit of research, a west coast cellular carrier copied the | |
| ESN from one manufacturer's unit to another one of the same type and | |
| model--thus creating two units with the exact same identity. | |
| The ESN Bulletin Board | |
| For many phones, ESN chips are easy to obtain, program, and install. How does | |
| a potential bootlegger know which numbers to use? Remember that to obtain | |
| service from a system, a cellular unit must transmit a valid MIN (telephone | |
| number) and (usually) the corresponding serial number stored in the cellular | |
| switch's database. | |
| With the right equipment, the ESN/MIN pair can be read right off the air | |
| because the mobile transmits it each time it originates a call. Service shops | |
| can capture this information using test gear that automatically receives and | |
| decodes the reverse, or mobile-to-base, channels. | |
| Service shops keep ESN/MIN records on file for units they have sold or | |
| serviced, and the carriers also have these data on all of their subscribers. | |
| Unscrupulous employees could compromise the security of their customers' | |
| telephones. | |
| In many ways, we predict that 'trade' in compromised ESN/MIN pairs will | |
| resemble what currently transpires in the long distance telephone business | |
| with AT&T credit card numbers and alternate long-distance carrier (such as | |
| MCI, Sprint and Alltel) account codes. Code numbers are swapped among | |
| friends, published on computer 'bulletin boards' and trafficked by career | |
| criminal enterprises. | |
| Users whose accounts are being defrauded might--or might not--eventually | |
| notice higher-than-expected bills and be reassigned new numbers when they | |
| complain to the carrier. Just as in the long distance business, however, this | |
| number 'turnover' (deactivation) won't happen quickly enough to make abuse | |
| unprofitable. Catching pirates in the act will be even tougher than it is in | |
| the wireline telephone industry because of the inherent mobility of mobile | |
| radio. | |
| Automating Fraud | |
| Computer hobbyists and electronics enthusiasts are clever people. Why should | |
| a cellular service thief 'burn ROMs' and muck with hardware just to install | |
| new IDs in his radio? No Herculean technology is required to 'hack' a phone | |
| to allow ESN/MIN programming from a keyboard, much like the IMTS phone thumb | |
| wheel switches described above. | |
| Those not so technically inclined may be able to turn to mail-order | |
| entrepreneurs who will offer modification kits for cellular fraud, much as | |
| some now sell telephone toll fraud equipment and pay-TV decoders. | |
| At least one manufacturer is already offering units with keyboard-programmable | |
| MINs. While intended only for the convenience of dealers and service shops, | |
| and thus not described in customer documentation, knowledgeable and/or | |
| determined end users will likely learn the incantations required to operate | |
| the feature. Of course this does not permit ESN modification, but easy MIN | |
| reprogrammability alone creates a tremendous liability in today's roaming | |
| environment. | |
| The Rolls Royce of this iniquitous pastime might be a 'Cellular Cache-Box.' It | |
| would monitor reverse setup channels and snarf ESN/MIN pairs off the air, | |
| keeping a list in memory. Its owner could place calls as on any other | |
| cellphone. The Cache-Box would automatically select an ESN/MIN pair from its | |
| catalog, use it once and then discard it, thus distributing its fraud over | |
| many accounts. Neither customer nor service provider is likely to detect the | |
| abuse, much less catch the perpetrator. | |
| As the history of the computer industry shows, it is not far-fetched to | |
| predict explosive growth in telecommunications and cellular that will bring | |
| equipment prices within reach of many experimenters. Already we have seen the | |
| appearance of first-generation cellular phones on the used market, and new | |
| units can be purchased for well under $1000 in many markets. | |
| How High The Loss? | |
| Subscribers who incur fraudulent charges on their bills certainly can't be | |
| expected to pay them. How much will fraud cost the carrier? If the charge is | |
| for home-system airtime only, the marginal cost to the carrier of providing | |
| that service is not as high as if toll charges are involved. In the case of | |
| toll charges, the carrier suffers a direct cash loss. The situation is at its | |
| worst when the spoofer pretends to be a roaming user. Most inter-carrier | |
| roaming agreements to date make the user's home carrier (real or spoofed) | |
| responsible for charges, who would then be out hard cash for toll and airtime | |
| charges. | |
| We have not attempted to predict the dollar losses this chicanery might | |
| generate because there isn't enough factual information information for anyone | |
| to guess responsibly. Examination of current estimates of long-distance-toll | |
| fraud should convince the skeptic. | |
| Solutions | |
| The problems we have described are basically of two types. First, the ESN | |
| circuitry in most current mobiles is not tamper-resistant, much less | |
| tamper-proof. Second and more importantly, the determined perpetrator has | |
| complete access to all information necessary for spoofing by listening to the | |
| radio emissions from valid mobiles because the identification information | |
| (ESN/MIN) is not encrypted and remains the same with each transmission. | |
| Manufacturers can mitigate the first problem by constructing mobiles that more | |
| realistically conform to the EIA requirements quoted above. The second | |
| problem is not beyond solution with current technology, either. Well-known | |
| encryption techniques would allow mobiles to identify themselves to the | |
| serving cellular system without transmitting the same digital bit stream each | |
| time. Under this arrangement, an interloper receiving one transmission could | |
| not just retransmit the same pattern and have it work a second time. | |
| An ancillary benefit of encryption is that it would reasonably protect | |
| communications intelligence--the digital portion of each transaction that | |
| identifies who is calling whom when. | |
| The drawback to any such solution is that it requires some re-engineering in | |
| the Mobile-Land Station Compatibility Specification, and thus new software or | |
| hardware for both mobiles and base stations. The complex logistics of | |
| establishing a new standard, implementing it, and retrofitting as much of the | |
| current hardware as possible certainly presents a tough obstacle, complicated | |
| by the need to continue supporting the non-encrypted protocol during a | |
| transition period, possibly forever. | |
| The necessity of solving the problem will, however, become apparent. While we | |
| presently know of no documented cases of cellular fraud, the vulnerability of | |
| the current standards and experience with similar technologies lead us to | |
| conclude that it is inevitable. Failure to take decisive steps promptly will | |
| expose the industry to a far more expensive dilemma. XXX | |
| Geoffrey S. Goodfellow is a member of the senior research staff in the | |
| Computer Science Laboratory at SRI International, 333 Ravenswood Ave., Menlo | |
| Park, CA 94025, 415/859-3098. He is a specialist in computer security and | |
| networking technology and is an active participant in cellular industry | |
| standardization activities. He has provided Congressional testimony on | |
| telecommunications security and privacy issues and has co-authored a book on | |
| the computer 'hacking' culture. | |
| Robert N. Jesse (2221 Saint Paul St., Baltimore, MD 21218, 301/243-8133) is an | |
| independent consultant with expertise in security and privacy, computer | |
| operating systems, telecommunications and technology management. He is an | |
| active participant in cellular standardization efforts. He was previously a | |
| member of the senior staff at The Johns Hopkins University, after he obtained | |
| his BES/EE from Johns Hopkins. | |
| Andrew H. Lamothe, Jr. is executive vice-president of engineering at Cellular | |
| Radio Corporation, 8619 Westwood Center Dr., Vienna, VA 22180, 703/893-2680. | |
| He has played a leading role internationally in cellular technology | |
| development. He was with Motorola for 10 years prior to joining American | |
| TeleServices, where he designed and engineered the Baltimore/Washington market | |
| trial system now operated by Cellular One. | |
| -------- | |
| A later note indicates that one carrier may be losing something like $180K per | |
| month.... | |