Fast and reliable interception

for Incoming and Outgoing encrypted GSM communication

Description:


Fast and reliable interception, interrogation and jamming of GSM traffic

•     Interception for Incoming and Outgoing encrypted GSM communication including A5/1 in real-time and without cooperation with network operators
•     Interception for multiple concurrent duplex calls
•     Simultaneous interception of multiple operators 
•     Selective jamming and phone manipulation capabilities 
•     Extracting of phone identities including phone numbers
•     Invisible and undetectable operation
•     User-friendly operation

1.    Introduction

This document provides product description and technical characteristics of Complex. It generally explains its features, capabilities, operational modes and applications.

2.    System overview

Complex consists of following parts:
1.    Compact BTS
2.    Target Clone Unit
3.    Receiver Unit
4.    Notebook computer with A5/2 decipher
5.    Booster
6.    Two antennas
Functional diagram of Complex is represented bellow:

3.   Operational overview

It is a true Man-In-The-Middle (MitM) attack on GSM communication which is fully implemented in the SYSTEM. 
Compact BTS forces GSM phones in its vicinity to register with it. Using of booster and directional antenna helps to increase operational range of the system. Compact BTS requests mobile phones to introduce themselves, i.e. to send their identities – IMSI and IMEI. During the registration and authentication process compact BTS requests mobile phones to implement encryption A5/2 which they do. Real-time A5/2 decipher decrypts the information exchange and calculates Kc (ciphering Key). From this moment SYSTEM can fully imitate target’s phone and talks with GSM network on its  behalf.
So the target communicates with compact BTS which poses to be a real GSM  network. The real GSM network talks to clone of the target phone. Computer collects information from the compact BTS and the clone. Such a scheme makes possible
interception of incoming and outgoing calls, SMS messages, DTMF tones and all call related information transmitted over the air. 

4.
   Operational Applications
-     Off-Air Interception
-     IMSI/IMEI catching
-     Selective jamming of communication
-     Presence verification
-     Data Analysis
-     Direction Finding Support

5.   What is in the package?
-     Receiver Unit
-     Notebook Computer with preinstalled interception software and A5/2 decipher
-     Target clones Unit
-     Booster
-     Two planar directional antennas
-     Carrying Case
-     Special Phone for silent call
-     Nokia phone with Net Monitor
-     Set of Cables
-     User’s Manual
-     Software Backup

6.   Comparison between SYSTEM and other known active systems in the market

There are two major distinctions making significant difference between SYSTEM and all other known active systems in the market:
-     ability to clone target phone
-     using A5/2 decipher for ciphering key calculation
Bellow is functional diagram of all others known active systems.  

Not having such features all other active systems are only able to force mobile phones to register with faked BTS and identify themselves. While operating well as IMSI/IMEI catchers they are not able to efficiently intercept communication.

7.
   Screen shots


Main screen


Protocol screen


HLR screen


Target list screen


Parameters screen


Cross-compare screen


Data Base Screen

8.   System features, Technical and Operational Characteristics


System Features


Technical Characteristics
 

Free Web Hosting