Call for Paper - January 2023 Edition
IJCA solicits original research papers for the January 2023 Edition. Last date of manuscript submission is December 20, 2022. Read More

Utilizing Cellular Infrastructure for Spying of Smart Phones

Print
PDF
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2016
Authors:
Sheikh Riyaz Ul Haq, Syed Imtiyaz Hassan
10.5120/ijca2016909878

Sheikh Riyaz Ul Haq and Syed Imtiyaz Hassan. Utilizing Cellular Infrastructure for Spying of Smart Phones. International Journal of Computer Applications 142(8):9-13, May 2016. BibTeX

@article{10.5120/ijca2016909878,
	author = {Sheikh Riyaz Ul Haq and Syed Imtiyaz Hassan},
	title = {Utilizing Cellular Infrastructure for Spying of Smart Phones},
	journal = {International Journal of Computer Applications},
	issue_date = {May 2016},
	volume = {142},
	number = {8},
	month = {May},
	year = {2016},
	issn = {0975-8887},
	pages = {9-13},
	numpages = {5},
	url = {http://www.ijcaonline.org/archives/volume142/number8/24914-2016909878},
	doi = {10.5120/ijca2016909878},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}
}

Abstract

Smart phones form essential part of our daily lives and remain almost always with us or in our close vicinity. They act as an interface for very crucial and personal information like images, videos, voice calls, video calls, downloaded media, text messages, call logs, banking transaction details, passwords etc., thus housing very large amount of private information which can provide deep insight into the personality of the concerned person and thus can be of pivotal importance for Secret service and law enforcement agencies. We have proposed a new Surveillance scheme utilizing the existing Cellular Infrastructure to monitor and extract the information from the blacklisted smart phone devices i.e. devices of terrorists, corrupt politicians, hard core Criminals, drug dealers etc. We will review several attacks over the Smart phones via Communication channels in order to provide the insight for using the Cellular Infrastructure for the purpose of Surveillance and extraction of information from the Blacklisted Smart phone devices and for conducting those very attacks. Surveillance and extraction of information via Cellular infrastructure would be capable of providing both live feedbacks (like ongoing conference(in the vicinity of Smart phone device), ongoing voice/video call, present location etc.) as well as the information contained in the Smart Phone device’s memory (including Downloaded media, Images, video Call logs, e-mails, passwords, credit card numbers etc.).

References

  1. Lunden, I. (2014). Tech Crunch: Gartner: Device Shipments Break 2.4B Units In 2014, Tablets To Overtake PC Sales In 2015. http://techcrunch.com/2014/07/06/gartner-device-shipments-break-2-4b-units-in-2014-tablets-to-overtake-pc-sales-in-2015/ .
  2. Murtagh, R. (2014). Search Engine Watch: Mobile Now Exceeds PC: The Biggest Shift Since the Internet Began. http://searchenginewatch.com/sew/opinion/2353616/mobile-now-exceeds-pc-the-biggest-shift-since-the-internet-began.
  3. Casey, E. (2011).Digital Evidence and Computer Crime: Forensic Science, Computers, and the Internet. Academic Press.
  4. Rosenbach, M. (2013). Spiegel Online International: iSpy: How the NSA Accesses Smartphone Data.
  5. Rappaport, T. (2009). Wireless Communications: Principles and Practices. Pearson Education India.
  6. Hasan, R., Saxena, N., Haleviz, T., Zawoad, S., & Rinehart, D. (2013) Sensing-enabled channels for hard-to-detect command and control of mobile devices. In: Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security, ASIA CCS '13. ACM, New York, pp 469-480.
  7. Aloraini, B. (2014) A New Covert Channel Over Cellular Network Voice Channel. Thesis. Rochester Institute of Technology http://scholarworks.rit.edu/theses/8366 .
  8. Serror, J., Zang, H., & Bolot, J. (2006) Impact of paging channel overloads or attacks on a cellular network. In: Proceedings of the 5th ACM workshop on Wireless security, WiSe '06. ACM, New York, pp 75-84.
  9. Department of Electronics & Information Technology: Cyber Laws,http://deity.gov.in/content/cyber-laws .
  10. Martin, T., Hsiao, M., Ha, D., & Krishnaswami, D. (2004) Denial-of-Service Attacks on Battery-powered Mobile Computers. In: Proceedings of the Second IEEE International Conference on Pervasive Computing and Communications, PERCOM '04. IEEE Computer Society, Washington, p 309. www.spiegel.de/international/world/how-the-nsa-spies-on-smartphones-including-the-blackberry-a-921161.html
  11. Bassen, H. (1998) Radiofrequency interference with medical devices. Technical information statement. IEEE Engineering in Medicine and Biology, 17(3):111-114.
  12. Hietanen, M., & Sibakov, V.: INTERFERENCE IN MEDICAL DEVICES BY RADIOFREQUENCY SIGNALS FROM CELLULAR PHONES. http://www.ursi.org/proceedings/procga05/pdf/KE.4(0944).pdf .
  13. Wong, M., Lim, C., Lee, K., Gouhier, B., & Sparks, P. (2015) MJA: An unusual case of implantable cardioverter-defibrillator inhibition. https://www.mja.com.au/journal/2015/202/6/unusual-case-implantable-cardioverter-defibrillator-inhibition .
  14. Gabriel, C. (2012). Rethink Wireless: DoCoMo demands Google's help with signalling storm. http://www.rethink-wireless.com/2012/01/30/docomo-demands-googles-signalling-storm.htm
  15. Kasera, S., & Narang, N. (2004). 3G Networks Architecture ,Protocols and Procedures. Tata McGraw-Hill Publishing Company Limited, New Delhi.
  16. FederalCommunicationsCommission:https://www.fcc.gov/public-safety-and-homeland-security/policy-and-licensing-division/general/communications-assistance.

Keywords

Blacklisted smart phones, Spying of smart phones, Attacks over Communication Channels, Surveillance.