


Cellphone Forensic Software Open Sourced 23
Niek writes "The Netherlands Forensic Institute (part of the Dutch Ministry of Justice) has open sourced one of their high-profile software frameworks, TULP2G. With this BSD licensed framework, one can extract and decode all data from GSM SIM cards, e.g. called phone numbers and received SMS messages. This was previously only possible with commercial software. Dutch press release, Powerpoint presentation. Earlier this year, the Dutch government GPLed their online election software."
I think I speak for all of us when I ask... (Score:3, Funny)
Re:I think I speak for all of us when I ask... (Score:1)
Re:I think I speak for all of us when I ask... (Score:1)
Re:I think I speak for all of us when I ask... (Score:2, Insightful)
Re:I think I speak for all of us when I ask... (Score:3, Funny)
Yes, and so is the weed
Re:I think I speak for all of us when I ask... (Score:3)
Not to mention the hookers.
Before you think of packing (Score:3, Informative)
The netherlands has gotten used to something called coalition goverment. Unlike the US or england we got a lot of parties ranging from (when I was young) to extreme left to extreme right. To be sure both extremes were tiny but they were there with a seat in the goverment after some elections (we are talking really really small here).
So to get a majority the biggest partie would form a coalition with smaller parties and agree on a common policy to govern the country wi
Re:Before you think of packing (Score:2, Insightful)
Pim Fortuyn was not leading in the polls. Three parties, the conservative-liberal VVD, the social-democrat PvdA, and the christian-democrat CDA were always bigger than the Pim Fortuyn party, in all polls.
Secondly, Theo van Gogh was highly controversial with many Dutch people before his highly hate-inspiring statements about the islam. He was wishing people dead (not a big
Re:Before you think of packing (Score:1)
hardware ? (Score:2, Interesting)
where do I get one of those I am in the uk
plus I am looking into recording GSM signals has anyone got any advice ?
regards
John Jones
Re:hardware ? (Score:3, Informative)
If not, I found this [tigerdirect.com] from a quick search on Google
Re:hardware ? (Score:3, Informative)
Re:hardware ? (Score:1)
http://www.mrgadget.com.au/catalog/product_info
Ships within australia only, but I'm sure you can find it somewhere else.
Re:hardware ? (Score:2)
try an e-Mobile SIM card reader, http://www.kinforce.com/en/ArticleShow.asp?Article ID=34 [kinforce.com] , about $20 off ebay.
Since you can use this open source application it won't need to bother with the crappy software the sim reader comes with.
You can read my short comments regarding it in my blog [blogspot.com]
HUH ? (Score:5, Informative)
Files are organized into a tree structure in directories and protected (read, write..) by PIN codes. Files can be seen as fixed size arrays of fixed siez strings. The GSM standard specification (GSM 11.11) says that, and what information can be found where. (example, on the directory 'GSM' - which is really a filenumber on the sim instead of a filename), you'll have the last number dialled (LDN file).
the procotol used to open/read files is fairly open.
That's it. So what's so special to write such a program ? You need e.g. serial access to the card interface, the SIM specification [3gpp.org], and a small script language, then a few hours later, voila.
(or you could put the SIM card in a phone and check the information)
What you don't have is access to the pin protected information, and good luck to attack those since all european telco industry relies on this.
Re:HUH ? (Score:3, Informative)
Since you mean a PIN number, which normally is 4 digits 0-9, I think there would be NO problem in doing a brute-force attack to check what information can be found there.
I.e. last number called protected by PIN? no problem, as long as you get strange characters from the decrypt you go on.. then with one PIN you get some ok characters and you investigate.
Or not?
Re:HUH ? (Score:3)
Then, 3 bad PIN renders the card unusable. No brute force.
Even calculation times and power consumption (generally) have been randomized to prevent attacks. Info is hidden from Eletronic microscope
Not so trivial anymore.
Re:HUH ? (Score:2)
Re:HUH ? (Score:2)
Re:HUH ? (Score:3, Interesting)