19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Threats Catalogue Deliberate Acts Remarks<br />

____________________________________________________________________ .........................................<br />

T 5.96 Tampering with mobile phones<br />

<strong>The</strong> installation of additional electronic circuitry, as described in T 5.95<br />

Bugging of indoor conversations over mobile phones, is a typical hardware<br />

manipulation. In order that such tampering can be carried out, the device to be<br />

manipulated must be in the possession of the adversary for a certain period of<br />

time.<br />

Another way of using mobile phones for bugging purposes is to tamper with<br />

the control software (firmware) installed on the device. This kind of tampering<br />

is a lot more difficult to detect than tampering with the hardware.<br />

A concealed, undocumented bugging function could already be programmed<br />

(either deliberately or by accident) into the control software during<br />

development of the device.<br />

However, it is also conceivable that the control software could be modified<br />

subsequently by a third party, for example when the device is out of the user’s<br />

(short-term) control during repair or due to other reasons (loss or theft). Such<br />

manipulation requires in-depth specialist expertise which is normally available<br />

to few persons other than the firmware developers. It is virtually impossible<br />

for an outsider to demonstrate that such manipulation has taken place.<br />

Mobile phones are becoming more flexible through extension of the mobile<br />

phone menu functions using SIM Toolkit and a new generation of SIM cards<br />

which support this functionality. Such a mobile phone can be programmed<br />

with new functions by the service provider over the cellular network. Thus, for<br />

example, the card provider can tailor the menu structure to meet the<br />

requirements of a particular customer.<br />

However, this capability carries with it the threat that firmware could be<br />

tampered with, as the functionality that is needed to reconfigure a phone into a<br />

bugging device could already be contained as standard in the firmware. <strong>The</strong><br />

probability that functions which will convert the mobile phone into a bugging<br />

transmitter can be called up from "outside" increases. It could also be possible<br />

for these functions to be enabled and disabled at will.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000<br />

Manipulation of firmware

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!