There are many fairy tales around the issue of wiretapping a phone without installing a control program. Many newly minted spies claim this possibility. Unfortunate marketers promote their products to intercept other people's conversations and SMS on the fly. But that telephone GSM network protected and not hackable without specialized equipment is usually silent. And easily led to such tricks, uninformed Internet users listen excitedly and spend money.

All traffic mobile operators encrypted with a complex algorithm. It does not take much effort to intercept it, it is enough to stand in the way of this signal with the signal receiver (near the speaker), however, to decrypt the protected information, you will have to acquire very expensive equipment. Either the level of technical knowledge in the field of cryptography and equipment is simpler, but also very expensive and bulky, with which you will not be mobile enough. In general, everything here is at the level of professionals, which means it is not available to the masses.

Listening to the phone by subscriber number - theory

So, wiretapping by subscriber number is possible. This is clear. And it is possible in several ways.

First way- to listen to the phone without installing the program, you need to get access to operator data cellular communication . In line with latest changes in law, operators are now required to store the conversations of network users for several years. Just like text messages. But they do not have the right to disclose them in accordance with the same legislation. The responsibility for such an act is too great for them. Only special services can get access to this data, which is enough to send a corresponding request, after which the operator is obliged to transfer all the requested information. Hence the simple conclusion - wiretapping without access to the phone is the prerogative of the special services for whom this is a normal routine. You just didn’t think about how many crimes are solved by analyzing the data of mobile operators.

Second way- wiretapping the phone without installing the program is possible when using complex software and hardware systems to intercept and decrypt GSM. But there are so many complexities that the method will never become massive.

Firstly, you need to be in the zone of interception of a signal from a mobile phone (or place a receiver there that sends all gsm signals to your base station).

Next, you will need powerful equipment to decrypt the received information, which is encrypted by operators with cryptographic algorithms. There are mentions on the net of some “rainbow tables” for decrypting the 64-bit A5 / 1 cryptographic protection system used by cellular operators (it even sounds difficult, imagine what it takes to set up such a system). The tables themselves take up terabytes of hard disk space. For decryption, you need equipment like for mining (powerful GPUs). And it turns out that you need to assemble a GSM signal receiver together (it's expensive, but craftsmen can use ordinary old Nokias with some modifications), a computer with a large amount of memory and a powerful GPU. Combine this with a specialized program for processing an encrypted signal using rainbow tables and filter out everything superfluous.

There is nothing impossible in all this for advanced specialists, however, this is not a mass product for everyday use. And it is also very difficult and even not always possible to use it (you will have to follow your tracking object everywhere, or slip a GSM receiver-transmitter into it, but then why not use a regular bug for wiretapping?).

Therefore, we can safely say that wiretapping a phone without spyware is now available only to the elite, which are the special services and agencies specializing in this issue. Those. wiretapping the phone by the subscriber's number without direct access to his device to install the program is almost impossible!

Related content:

Hello! Welcome to my mobile phone security blog! Have you ever wondered how it is possible to listen mobile phone for free, by an outsider? Can anyone install a special application on your smartphone that opens unlimited access to any information from the device's memory? You will find the answer in this article, since this question also interested me a lot. At the very end of the presented material there will be a link to a useful video. You can immediately go there if you don’t want to read the whole text.

As for such programs, there are many of them on the Internet. I decided to check if such applications really work. Many promise to listen to a mobile phone for free, but what do we actually see? One scammer comes across! I reviewed a large number of software, but simply did not find anything really working. But I caught the eye of an interesting service that provides opportunities Reserve copy information. It is about him that I will tell further.

The versatility of the service lies in the support of a large number of applications from which you can collect the history of correspondence. Who will benefit from this? Yes, to anyone, because you cannot be insured against the accidental loss of a smartphone. If you use your phone for business and office communications, it's a good idea to back it up regularly. This service is able to perform such operations independently, in a fully automatic mode!

I installed a special application in Android that collects and archives data, and then sends it to the server. There is Personal Area which no third party can gain access to. Only the person who installed and configured the application. As for the supported software, there are clients for almost everyone social networks and messengers! Vkontakte, Facebook, Odnoklassniki, My World, WhatsApp, Skype, Viber, ICQ - this is not a complete list.

But what happens if an outsider installs such an application for you? Free listening to a mobile phone will be possible simply due to the fact that the records of conversations are stored in backup. And it does not matter at all whether it will be the application described above, or some other, but with the same functions. Antiviruses do not block such software, since there is no virus code in it. And the uninstall protection will not let you get rid of the program standard means mobile OS.

I realized one thing: you should treat your mobile phone more carefully! Do not leave it unattended in the office, do not pass it on to unfamiliar people! As for the described service, the following is a link to a useful video. In it, I will talk about how to properly install the program and configure it. But remember that you cannot use such an application on someone else's mobile phone! Personal life is confidential, and few phone owners would like this.

Hello! Welcome to my mobile phone security blog! Have you ever thought about how possible it is to listen to a mobile phone for free, by an outsider? Can anyone install a special application on your smartphone that opens unlimited access to any information from the device's memory? You will find the answer in this article, since this question also interested me a lot. At the very end of the presented material there will be a link to a useful video. You can immediately go there if you don’t want to read the whole text.

As for such programs, there are many of them on the Internet. I decided to check if such applications really work. Many promise to listen to a mobile phone for free, but what do we actually see? One scammer comes across! I reviewed a large number of software, but simply did not find anything really working. But I caught the eye of an interesting service that provides the possibility of backing up information. It is about him that I will tell further.

The versatility of the service lies in the support of a large number of applications from which you can collect the history of correspondence. Who will benefit from this? Yes, to anyone, because you cannot be insured against the accidental loss of a smartphone. If you use your phone for business and office communications, it's a good idea to back it up regularly. This service is able to perform such operations independently, in a fully automatic mode!

I installed a special application in Android that collects and archives data, and then sends it to the server. There is a personal account, access to which no unauthorized person can get. Only the person who installed and configured the application. As for the supported software, there are clients for almost all social networks and messengers! Vkontakte, Facebook, Odnoklassniki, My World, WhatsApp, Skype, Viber, ICQ - this is not a complete list.

But what happens if an outsider installs such an application for you? Free listening to a mobile phone will be possible simply due to the fact that the recordings of conversations are stored in a backup. And it does not matter at all whether it will be the application described above, or some other, but with the same functions. Antiviruses do not block such software, since there is no virus code in it. Yes, and protection from deletion will not allow you to get rid of the program using standard means of the mobile OS.

I realized one thing: you should treat your mobile phone more carefully! Do not leave it unattended in the office, do not pass it on to unfamiliar people! As for the described service, the following is a link to a useful video. In it, I will talk about how to properly install the program and configure it. But remember that you cannot use such an application on someone else's mobile phone! Personal life is confidential, and few phone owners would like this.

October 2, 2014 at 10:07 am

Listening to mobile phones and protecting them

  • Wireless technologies

What are the options for listening to conversations on a mobile phone, how can one protect against attacks of this kind, and how can a subscriber determine that perhaps his phone is being tapped? Due to the recent wave of espionage scandals, these issues are becoming relevant again. The journalists turned to the operators of the Ukrainian mobile communications with a request to explain how to behave to the subscriber in such cases.

It turned out to be striking that almost all the operators, where the journalists applied, simply could not give answers to the questions posed. The only company that agreed to help were representatives of MTS Ukraine. The Life:) operator did not give an answer to the sent request at all, and Kyivstar replied that they were not experts in such matters, and that such questions should be addressed to special civil services (read, Ministry of Internal Affairs, SBU, etc. ) In the article below, information about wiretapping of mobile phones obtained from public sources was also used.

How carriers protect their networks
During the development of GSM technology, as well as at the stage of its implementation, all requirements from the controlling state authorities were taken into account. authorities to the level of protection. It is because of these requirements that in many countries of the world the sale and purchase of special equipment is prohibited, such as powerful encoders, crypto equipment, scramblers, as well as very secure technologies for public communications. But mobile operators themselves provide protection for their radio channels using signal encryption methods. Encryption uses very complex algorithms. Which crypto algorithm will be used for encryption is selected at the stage when a connection is established between the base station and the subscriber himself. The probability of leakage of information about the subscriber from the operator's equipment, as MTS employees assured journalists, is almost zero. Why to zero, we asked - and all because of the complexity and control over access to operator facilities and equipment.
How can you "listen" to mobile phones
In total there are two methods of wiretapping subscribers - this is an active method, and a passive method. When passively listening to a subscriber, you need to use very expensive equipment and have specially trained workers. If you have money (read - big money) on the "black market" you can purchase special complexes, using which you can listen to the conversations of any subscriber within a radius of up to 500 meters. Ask why you need to have big money? The answer is simple - the price of one such set starts from several hundred thousand euros. What such a set looks like can be seen in the next photo. There are many sites on the net where you can get acquainted with the description and the principle of operation of such kits and listening systems.

As manufacturers of such listening systems convince, their systems can track GSM conversations in real time, because the principle of operation of the equipment is based on access to the SIM card of a mobile subscriber, or directly to the database of the mobile operator itself. Although, if those who listen to you do not have such access, they can listen to all your conversations with some delay. The amount of delay depends on the encryption level of the communication channel used by a particular operator. Such systems can also be mobile centers for listening and tracking the movement of objects.

The second way to wiretap is to actively interfere on the air on the authentication process and control protocols. For this, special mobile complexes are used. Such mobile systems, which, in fact, are a pair of specially modified phones and a laptop, despite their external simplicity and small size, are also an expensive pleasure - their price varies from a couple of tens of thousands to several hundred thousand US dollars. And again, only highly qualified specialists in the field of communications can work on such equipment.

The attack on the subscriber is carried out according to the following principle: since the complex is mobile and is located at a close distance to the subscriber - up to 500 meters - it "intercepts" signals to establish a connection and transfer data, replacing the operator's base station. In fact, the complex itself becomes an "intermediary bridge" between the nearest base station and the subscriber himself.

After “capturing” the desired mobile subscriber in this way, this complex can actually perform any control function over the intercepted channel: for example, connect the listened to any number necessary for those who listen, lower the encryption algorithm or disable this encryption altogether for a particular communication session, etc. .d.

How such a complex looks like - can be seen in the photo below.

As experts shared, it is impossible to determine 100% that the subscriber's phone is tapped at this very moment. But, you can get indirect evidence that may indicate that there is such a possibility. In the recent past, some mobile models (namely - push-button phones) had in their functionality a special symbol-icon in the form of a padlock. If the lock was closed, then the signal is encrypted, and vice versa - if the lock is open ... well, you yourself understood everything.

But in phones over the past 5-6 years, there is no such function ... It's a pity. Although, for some smartphone models, special applications are provided that will signal the phone owner about the configuration of the settings used in the current communication session. One of the options is to notify the user about the mode in which his conversation is transmitted - using encryption algorithms or openly. Below are a few of these applications:

EAGLE Security
It is one of the most powerful applications to protect your mobile from wiretapping. This program prevents any connections to false base stations. To determine the validity of a station, verification of signatures and station identifiers is used. In addition, the program independently monitors and remembers the location of all base stations and if it is detected that some base is moving around the city, or its signal from time to time disappears from its location - such a base is marked as false and suspicious and the application will notify the owner of the phone about this. Another one of useful features Applications - the ability to show which applications and programs installed on your phone have access to your phone's video camera and microphone. There is also a function to disable (prohibit) access of any software you do not need to the camera.
Darshak
This program differs from the previous one and its main function is to track any suspicious activity on the network, including when using SMS, which can be sent without the permission of the owner of the phone. The application evaluates in real time how secure your network is and what encryption algorithm is used at that moment and much more.
Android IMSI-Catcher Detector
This application also helps to protect your smartphone from any connections to pseudo-bases. The only disadvantage of this program is that you will not find it in Google Play and if you still want to install it, you will have to tinker with this procedure.
CatcherCatcher
The CatcherCatcher program, like its counterparts above, is engaged in identifying false base stations that attackers (or special services?) use as intermediate "intermediary bridges" between the subscriber and the real base station.

And finally, experts also recommended using special applications to ensure the security of private conversations and data, including - to encrypt your conversations. Similar counterparts are the anonymous web browsers Orbot or Orweb, for example. There are also special programs that encrypt your telephone conversations, photos and many already use secure messengers.

Recently, attempts to penetrate into someone else's personal life have become more frequent. If you have the same idea in your head, find out how to install wiretapping on a cell phone. To get started, answer yourself the question: “Will I be ashamed?”. If you agree with your conscience, learn about ways to obtain information.

Standard Methods

Standard methods include:

  • installation of a bug in the office;
  • installing a bug in mobile device(perhaps only with close people);
  • installation of the program on a desktop computer.

All of the above methods work, but have a lot of disadvantages. For example, if you want to install a device to listen to phones in a person's house, you are at risk. A person is not always at home. This means that it is possible to skip the most interesting conversations. In addition, you can only hear the speech of the one who is on this side of the tube.

Listening to the premises is a good thing, but not always productive. It is much more convenient to use a listening device for a mobile phone. So you can be sure that you will not lose a lot of facts. Also, you will hear both sides, which means that you will not get fragments of the conversation, but a full-fledged conversation.

Of course, this method also has disadvantages. If a person loses the means of communication (or uses another), you will be in the dark. In addition, the equipment for this operation (bug) is an expensive device, few can afford it.

Install the program via the Internet

Phone calls are easiest to listen to using special program. But its disadvantage is that it is very difficult to find its original version. This is the most common method of finding information from ex-girlfriends and wives. Thanks to this method, they can: freely find out with whom the husband communicates, where he happens.

It will also be possible to find out which institutions he visits, what his environment is like.

Non-standard methods

Today, progress has gone further and given its admirers new opportunity receive information without special equipment. This method works over the Internet. You need to go to a special site, and you can view calls, read SMS. Also thanks world wide web you can determine the location of the phone.

The most up-to-date web resource on this subject can be found at the link below. Its service is made as clear as possible, all the means for wiretapping are collected here. cell phones. Millions of people listen to other people's calls. Try to do the same for you.