31
National Security, Forensics and Mobile Communications V Gratzer, D Naccache, D Znaty wledgment: several of the techniques and tools described here developped by Gemplus. ssion to use these images owned by Gemplus slides was obtaine Gemplus.

National Security, Forensics and Mobile Communications

  • Upload
    garret

  • View
    21

  • Download
    6

Embed Size (px)

DESCRIPTION

National Security, Forensics and Mobile Communications. V Gratzer, D Naccache, D Znaty. Acknowledgment: several of the techniques and tools described here were developped by Gemplus. Permission to use these images owned by Gemplus slides was obtained from Gemplus. !!. Recent Case. - PowerPoint PPT Presentation

Citation preview

Page 1: National Security, Forensics and Mobile Communications

National Security, Forensics and Mobile

Communications V Gratzer, D Naccache, D

ZnatyAcknowledgment: several of the techniques and tools described herewere developped by Gemplus. Permission to use these images owned by Gemplus slides was obtained from Gemplus.

Page 2: National Security, Forensics and Mobile Communications
Page 3: National Security, Forensics and Mobile Communications

!!

Page 4: National Security, Forensics and Mobile Communications

Recent Case

Page 5: National Security, Forensics and Mobile Communications

In this talk…

• Back-end analysis techniques.• A few standard techniques used to

extract forensic data from GSM phones.

• Some new techniques.

Credit: several images in this presentation are excerpts from presentations done by the author while being a Gemplus employee.

Page 6: National Security, Forensics and Mobile Communications

Back-end techniques

• Correlation of SIM in a given vicinity with:Anonymous public-phone card use.Credit card payment.Another SIM.

Easy to do. Frequently used in homeland security

contexts.

Page 7: National Security, Forensics and Mobile Communications

What are we looking for?

User data:Directory, incoming/outgoing/lost calls, SMS,

WAP bookmarks, MMS, images, movies, agenda, Mail, documents.

Most mobile phone manufacturers (except very low cost ones) sell or provide tools allowing to manage such data.

Pre-requisite: the SIM’s PIN code.

Page 8: National Security, Forensics and Mobile Communications

Example

Page 9: National Security, Forensics and Mobile Communications

What are we looking for?

Operator data:• IMSI (International Mobile Subscriber Identity)

• Ki (16 byte key used for voice encryption session key derivation)

• Network priority and restrictions. • Geographic data (base station)

• SMS and WAP parameters

Pre-requisite: the SIM’s higher-level PINs.Same tools as previously still work.Some data is not accessible even with

these.

Page 10: National Security, Forensics and Mobile Communications

What are we looking for?

Handset data:• IMEI (International Mobile Subscriber Identity) • Indication of active internal

parameters

Page 11: National Security, Forensics and Mobile Communications

According to the situation

• Ability to access the target phone

No access, temporary access, seized.• Type of access to the target phone

Passive, invasive, ability to replace parts.• Knowledge of keys

None, PIN, PUK, Ki etc…• Device’s state

Functional, still powered-on, dysfunctional

A collection of solutions

Page 12: National Security, Forensics and Mobile Communications

Situation

• Ability to access the target phoneNo access, temporary access, seized.

• Type of access to the target phonePassive, invasive, ability to replace parts.

• Knowledge of keysNone, PIN, PUK, Ki etc…

• Device’s stateFunctional, still powered-on, dysfunctional

Page 13: National Security, Forensics and Mobile Communications

Solution

• Unsolder flash and read it externally.

Requires very specific equipment.(integrated vision, air flow and unsoldering, e.g Retronics, Metcal)

Flash containing user and phone dataµBGA connector

Page 14: National Security, Forensics and Mobile Communications

Situation

• Ability to access the target phoneNo access, temporary access, seized.

• Type of access to the target phonePassive, invasive, ability to replace parts.

• Knowledge of keysNone, PIN, PUK, Ki etc…

• Device’s stateFunctional, still powered-on, dysfunctional

Page 15: National Security, Forensics and Mobile Communications

Solution

Record and exhaust. Hardware for brute-force attacks against A5 exists, software

also.Hardware exhausts a 54-bit A5 key in < 8 hours.

Page 16: National Security, Forensics and Mobile Communications

Situation

• Ability to access the target phoneNo access, temporary access, seized.

• Type of access to the target phonePassive, invasive, ability to replace parts.

• Knowledge of keysNone, PIN, PUK, Ki etc…

• Device’s stateFunctional, still powered-on, dysfunctional

Page 17: National Security, Forensics and Mobile Communications

EM Monitoring

• A probe is positioned near the phone’s plastic cover (right above the SIM).

• Kc transferred on I/O causes huge variations in EM emanations (detectable 10 cm away).

• Interpret the 7816-3 byte flow to get Kc.

• Signal is much more readable than this

TIA(00) vs. TIA(FF)

power

EM

Page 18: National Security, Forensics and Mobile Communications

Situation

• Ability to access the target phoneNo access, temporary access, seized.

• Type of access to the target phonePassive, invasive, ability to replace parts.

• Knowledge of keysNone, PIN, PUK, Ki etc…

• Device’s stateFunctional, still powered-on, dysfunctional

Page 19: National Security, Forensics and Mobile Communications

Solution

Use standard PC connection kit

Page 20: National Security, Forensics and Mobile Communications

Situation

• Ability to access the target phoneNo access, temporary access, seized.

• Type of access to the target phonePassive, invasive, ability to replace parts.

• Knowledge of keysNone, PIN, PUK, Ki etc…

• Device’s stateFunctional, still powered-on, dysfunctional

Page 21: National Security, Forensics and Mobile Communications

Solution

• Objective:– Extract PIN codes, data, secret keys…

• Key Equipment:– Power analysis equipment: signal reader,

oscilloscope, acquisition & analysis s/w, PC– Fault injection & analysis equipment:

microscope, laser, dedicated analysis sw• 4 steps

– 1. Identify when to inject fault– 2. Identify where to inject fault– 3. Fault injection– 4. Differential Fault Analysis to extract keys

Page 22: National Security, Forensics and Mobile Communications

Situation

• Ability to access the target phoneNo access, temporary access, seized.

• Type of access to the target phonePassive, invasive, ability to replace parts.

• Knowledge of keysNone, PIN, PUK, Ki etc…

• Device’s stateFunctional, still powered-on, dysfunctional

Page 23: National Security, Forensics and Mobile Communications

Solution

A malicious piece of code ...

… hidden in a harmless and attractive appletsuch as a game

Page 24: National Security, Forensics and Mobile Communications

Trojan Horse technical details

• Written in Java Card• Uses the GSM 11.14 / 03.19 API

– Subscribes to external events (e.g. SMS delivery)

– Is triggered when events occur– Performs proactive commands

• Displays text and gets input on the handset• Constructs and sends SMS

Page 25: National Security, Forensics and Mobile Communications

General Panorama

Handset Sales 2001-2004(source Gartner Dataquest)

LG 2%

Motorola 9%

Nokia 37%

Others 31%

Samsung 10%

Siemens 10%

SonyEricsson 1%

Page 26: National Security, Forensics and Mobile Communications

General PanoramaParts de Marché EMEA

0%

10%

20%

30%

40%

50%

60%

70%

80%

90%

100%

2001 2002 2003 2004

Others

Motorola

Samsung

Siemens

Nokia

Terrorist Handset Preferences (source Gartner Dataquest, 1238 terrorists interrogated)

Page 27: National Security, Forensics and Mobile Communications

General PanoramaParts de Marché EMEA

0%

10%

20%

30%

40%

50%

60%

70%

80%

90%

100%

2001 2002 2003 2004

Others

Motorola

Samsung

Siemens

Nokia

Market share EMEA (source Gartner Dataquest)

Page 28: National Security, Forensics and Mobile Communications

Parts de marché ASIE

0%

10%

20%

30%

40%

50%

60%

70%

80%

90%

100%

2001 2002 2003 2004

Others

LG

Siemens

Samsung

Motorola

Nokia

General PanoramaMarket share ASIA (source Gartner Dataquest)

Page 29: National Security, Forensics and Mobile Communications

General Panorama

Ventes de téléphones mobiles sur l'année 2004source : Gartner Dataquest Aôut 2004

Basic Phones22%

Enhanced Phones72%

Smartphones5%

Wireless PDAs1%

Split by Handset Type (source Gartner Dataquest)

Page 30: National Security, Forensics and Mobile Communications

Conclusion

• Phone forensics is a permanent race.• To get real results one must remain

constantly aware of technical evolutions.• Opportunity windows open/close quickly!

Page 31: National Security, Forensics and Mobile Communications

What helps, what doesn’t

• 1500 different models

• Complexity increase

• Standardization• Open research

• 1500 different models

• Complexity increase

• Standardization• Open research