A German computer engineer has claimed he deciphered the code used to encrypt most of the world’s mobile internet traffic and that he planned to publish a guide to prompt global operators to improve their safeguards.
Karsten Nohl, who published the algorithms used by mobile operators to encrypt voice conversations on digital phone networks in 2009, said he planned to demonstrate how he had intercepted and read the data during a presentation Wednesday.
Nohl said a colleague, Luca Melette, and he intercepted and decrypted wireless data using an inexpensive, modified, seven-year old Motorola cellphone and several free software applications. The two intercepted and decrypted data traffic in a five-kilometre, or 3.1-mile, radius, Nohl said.
The interceptor phone was used to test networks in Germany, Italy and other European countries that Nohl declined to identify. In Germany, Nohl said he was able to decrypt and read data transmissions on all four mobile networks — T-Mobile, O2 Germany, Vodafone and E-Plus. He described the level of encryption provided by operators as “weak.”
In Italy, Nohl said his interceptions revealed two operators, TIM, the mobile unit of the market leader, Telecom Italia, and Wind did not encrypt their mobile data transmissions at all. A third, Vodafone Italia, provided weak encryption, he said.
A spokeswoman for the GSM Association, the industry group based in London that represents global telephone operators, said the group would await details of Nohl’s research before commenting. A spokesman for O2, which is owned by Telefónica of Spain, said the operator followed Nohl’s research closely and would take account his findings in its own operations.
Vodafone, in a statement, said, “We regularly review security measures and carry out risk assessments to prevent the kind of exploit described. We implement appropriate measures across our networks to protect our customers’ privacy.” Nohl said he developed his interception technology on an internal broadband network he set up at his research firm, Security Research Labs, in Berlin. His tests focused on mobile data networks that ran on the General Packet Radio Service, or GPRS, technology, which is used widely across the globe.
GPRS networks were introduced in 2000 as successors to GSM digital networks and were the first mobile networks to deliver significant data besides short text messages. GPRS networks are still widely used as back-ups for newer, faster 3G wireless networks, and consumers are often diverted to GPRS grids when they reach the limits of their monthly data plans.
Rogers Communications, a Canadian operator, estimates that 90 per cent of mobile data traffic still runs on GPRS networks.
Nohl said he was surprised to find the two Italian operators, TIM and Wind, did not encrypt their data traffic at all. In a statement, TIM would not confirm Nohl’s claims. “TIM confirms that it uses state-of-the-art radio mobile technologies from primary international vendors to guarantee the protection of its mobile communications,” it said. Nohl, who said he works for mobile operators who hire him to detect vulnerabilities in their systems, said many operators continue to run unencrypted data networks because it allows them to more easily filter out competing, unwanted services like Skype.
“One reason operators keep giving me for switching off encryption is, operators want to be able to monitor traffic, to detect and suppress Skype, or to filter viruses, in a decentralised fashion,” Nohl said. “With encryption switched on, the operator cannot ‘look into’ the traffic anymore while in transit to the central GPRS system.”
Nohl said he planned to release his instructions at a conference of the Chaos Computer Club, a computer hackers’ group, which is being held near Berlin in Finowfurt, Germany. They will describe how to convert a Motorola C-123 cellphone, which is designed to run open-source software, into an interception device.
“We are releasing the software needed to reprogramme cheap Motorola phones to become GPRS interceptors,” Nohl said. “This exposes operators with no encryption, like those in Italy, to immediate risk.”
Nohl said the release of the information would give mobile operators “a few months” to improve security before other hackers recreated his results and attempted to breech security of the mobile broadband networks.
©2011 The New York
Times News Service
You’ve reached your limit of {{free_limit}} free articles this month.
Subscribe now for unlimited access.
Already subscribed? Log in
Subscribe to read the full story →
Smart Quarterly
₹900
3 Months
₹300/Month
Smart Essential
₹2,700
1 Year
₹225/Month
Super Saver
₹3,900
2 Years
₹162/Month
Renews automatically, cancel anytime
Here’s what’s included in our digital subscription plans
Exclusive premium stories online
Over 30 premium stories daily, handpicked by our editors


Complimentary Access to The New York Times
News, Games, Cooking, Audio, Wirecutter & The Athletic
Business Standard Epaper
Digital replica of our daily newspaper — with options to read, save, and share


Curated Newsletters
Insights on markets, finance, politics, tech, and more delivered to your inbox
Market Analysis & Investment Insights
In-depth market analysis & insights with access to The Smart Investor


Archives
Repository of articles and publications dating back to 1997
Ad-free Reading
Uninterrupted reading experience with no advertisements


Seamless Access Across All Devices
Access Business Standard across devices — mobile, tablet, or PC, via web or app
