A German computer scientist has cracked the codes used to encrypt calls made from more than 80 percent of the world’s mobile phones.
Karsten Nohl and his team of 24 hackers began working on the security algorithm for GSM (Global System for Mobiles) in August.
Developed in 1988, the system prevents the interception of calls by forcing phones and base stations to change frequencies constantly. Most of the UK’s mobile phones use the GSM system and the breach represents a potential threat to the security of mobile phone communication.
Nohl claims that armed with the code, which has been published online, and a laptop with two network cards, an eavesdropper could be recording phone calls within 15 minutes.
“This shows that existing GSM security is inadequate,” Nohl told the Chaos Communication Congress, an international annual meeting of hackers taking place in Berlin this week.
Nohl said he deciphered the code to force the industry to upgrade its security.
Nohl said conversations involving politicians or business leaders could easily be intercepted and they should invest in further encryption software.
The GSM Association, which represents the interests of the worldwide mobile communications industry, played down the security threat and said Nohl’s activity was “highly illegal.”
“We consider this research, which appears to be motivated in part by commercial considerations, to be a long way from being a practical attack on GSM,” said Claire Cranton, a spokeswoman. “To do this while supposedly being concerned about privacy is beyond me.”
Nohl, who has a doctorate in computer engineering from the University of Virginia, said his work was purely academic.
“We have written advice from our lawyers stating that our research is within the legal realm,” he said.
Simon Bransfield-Garth, the chief executive of encryption software firm Cellcrypt, said: “The code that has been cracked is for the 21-year-old 64-bit A5/1 GSM algorithm. In 2007 the GSM Association developed a 128-bit version, A5/3. However, most network operators have not invested to make the required upgrade.”
AFGHAN CHILD: A court battle is ongoing over if the toddler can stay with Joshua Mast and his wife, who wanted ‘life, liberty and the pursuit of happiness’ for her Major Joshua Mast, a US Marine whose adoption of an Afghan war orphan has spurred a years-long legal battle, is to remain on active duty after a three-member panel of Marines on Tuesday found that while he acted in a way unbecoming of an officer to bring home the baby girl, it did not warrant his separation from the military. Lawyers for the Marine Corps argued that Mast abused his position, disregarded orders of his superiors, mishandled classified information and improperly used a government computer in his fight over the child who was found orphaned on the battlefield in rural Afghanistan
STICKING TO DEFENSE: Despite the screening of videos in which they appeared, one of the defendants said they had no memory of the event A court trying a Frenchman charged with drugging his wife and enlisting dozens of strangers to rape her screened videos of the abuse to the public on Friday, to challenge several codefendants who denied knowing she was unconscious during their actions. The judge in the southern city of Avignon had nine videos and several photographs of the abuse of Gisele Pelicot shown in the courtroom and an adjoining public chamber, involving seven of the 50 men accused alongside her husband. Present in the courtroom herself, Gisele Pelicot looked at her telephone during the hour and a half of screenings, while her ex-husband
NEW STORM: investigators dubbed the attacks on US telecoms ‘Salt Typhoon,’ after authorities earlier this year disrupted China’s ‘Flax Typhoon’ hacking group Chinese hackers accessed the networks of US broadband providers and obtained information from systems that the federal government uses for court-authorized wiretapping, the Wall Street Journal (WSJ) reported on Saturday. The networks of Verizon Communications, AT&T and Lumen Technologies, along with other telecoms, were breached by the recently discovered intrusion, the newspaper said, citing people familiar with the matter. The hackers might have held access for months to network infrastructure used by the companies to cooperate with court-authorized US requests for communications data, the report said. The hackers had also accessed other tranches of Internet traffic, it said. The Chinese Ministry of Foreign Affairs
EYEING THE US ELECTION: Analysts say that Pyongyang would likely leverage its enlarged nuclear arsenal for concessions after a new US administration is inaugurated North Korean leader Kim Jong-un warned again that he could use nuclear weapons in potential conflicts with South Korea and the US, as he accused them of provoking North Korea and raising animosities on the Korean Peninsula, state media reported yesterday. Kim has issued threats to use nuclear weapons pre-emptively numerous times, but his latest warning came as experts said that North Korea could ramp up hostilities ahead of next month’s US presidential election. In a Monday speech at a university named after him, the Kim Jong-un National Defense University, he said that North Korea “will without hesitation use all its attack