Re: huawei

2013-06-15 Thread Jazz Kenny
What about through SDR? ie. http://nuand.com/

I mean, 'subscriber' seems to indicate a layman, but SDR isn't too complex
to get
running for someone with a modicum of electronics experience - especially
in this
day and age, where oscilloscopes and frequency analysis is available to
anyone with
some Google-fu.


On Sat, Jun 15, 2013 at 11:11 AM, Jay Ashworth  wrote:

> - Original Message -
> > From: "Scott Helms" 
>
> > Is it possible? Yes, but it's not feasible because the data rate would be
> > too low. That's what I'm trying to get across. There are lots things that
> > can be done but many of those are not useful.
> >
> > I could encode communications in fireworks displays, but that's not
> > effective for any sort of communication system.
>
> At this point, of course, we hearken back to the Multics system, which
> needed -- in order to get the B1(?) common criteria security rating that it
> had -- to prevent Covert Channel communication between processes of
> different
> security levels *by means as low-bandwidth as sending morse code by
> modulating the system load*.
>
> So I don't think "there's too little bandwidth" is a good enough argument,
> Scott.
>
> But there's a much more important issue here:
>
> In some cases, like the Verizon Wireless 4G puck I mentioned earlier,
> manufactured by ZTE, *you can't see the back side of the device*.   There's
> nearly no practical way for a subscriber to know what's coming out of the
> 4G side of that radio, so it could be doing anything it likes.
>
> Verizon Wireless proper could know, but they have no particular reason to
> look
> and, some might argue, lots of reasons not to want to know.
>
> Cheers,
> -- jra
> --
> Jay R. Ashworth  Baylink
> j...@baylink.com
> Designer The Things I Think   RFC
> 2100
> Ashworth & Associates http://baylink.pitas.com 2000 Land
> Rover DII
> St Petersburg FL USA   #natog  +1 727 647
> 1274
>
>


Re: huawei

2013-06-16 Thread Jazz Kenny
Why is it so difficult? Hiding communications is an intriguing subject - My
ears perked up a bit at the Multics remark - Morse is something that
probably never would have even crossed my mind.

EDIT: Okay, now it's sent to the list. DOHF!


On Sun, Jun 16, 2013 at 1:03 PM, Jazz Kenny wrote:

> Why is it so difficult? Hiding communications is an intriguing subject -
> My ears perked up a bit at the Multics remark - Morse is something that
> probably never would have even crossed my mind.
>
>
> On Sun, Jun 16, 2013 at 12:44 PM, Jay Ashworth  wrote:
>
>> - Original Message -
>> > From: "Phil Fagan" 
>>
>> > That's a very interesting point about the 4G puckdo you mean
>> > modulating
>> > data over side-lobes? To your point, I as a subscriber would have no
>> > way
>> > every knowing that unless of course I hooked up my specanny and
>> > started to
>> > try to decode the sidelobesI imagine most folks don't do that ( if
>> > thats how one would even go about it )
>>
>> Not at all.
>>
>> The *standard air-data link* coming out the back of the puck, in "4G"
>> (protip:
>> it's not) LTE, *is not something that the user can see*, without great
>> effort.
>>
>> So, that commercial end-user customer of Verizon has no way to see what
>> extra data *the puck itself* might be phoning home with.
>>
>> Cheers,
>> -- jra
>> --
>> Jay R. Ashworth  Baylink
>> j...@baylink.com
>> Designer The Things I Think   RFC
>> 2100
>> Ashworth & Associates http://baylink.pitas.com 2000 Land
>> Rover DII
>> St Petersburg FL USA   #natog  +1 727
>> 647 1274
>>
>>
>


Re: huawei (oscilloscopes and frequency analysis)

2013-06-18 Thread Jazz Kenny
On Mon, Jun 17, 2013 at 7:38 AM, Tony Patti  wrote:
> Thanks, I liked your pointer to the SDR.
>
> But can I ask you for a bit more info about your statement
>
> "where oscilloscopes and frequency analysis is available to anyone with some
> Google-fu"
>
> We don't need as much test equipment before?
>
> (as a guy with an oscilloscope in his basement, I don't see how Google can
> do what that device can).
>
>
>
> Thanks,
>
> Tony

All I meant was that the tools are relatively accessible to anyone
with the desire to look - An oscilloscope with the necessary freq.
range to study 4G communications can be bought or fabricated (all
that's really needed is a microcontroller with an ADC, some gain amps
and time), an appropriate SDR to intercept the signals shouldn't be
too hard to source, and that community has been blowing up for a few
years now. Hell, there are even a couple examples of LGA 4G receivers
floating around in the wild (gtm801, for example). Ignoring all of
that, there are commercial options like the YellowFin 4G analyzer. No
idea how much one of those costs, though.

Now, like Jay said, there are the issues of encryption and such, but
that's just another barrier to entry. A little Google-fu could
probably source a paper dealing with its implementation, at least.

I doubt it would be easy, but if the motivation exists, the required
test bed is easily assembled, and the information is available. Not
like we're talking about intercepted military GPS bands or something.
It's a consumer device that can sit on a workbench and be tested at
the leisure of the security researcher.

- J.