Maybe we do need to look at secure Mobile phone comms?

.as a means of getting a high speed large capacity datanetwork up and running on exercise/ops ?

Turkey's Turkcell and Ericsson have sent wide capacity mobile communications equipment and systems to meet the emergency communication needs in the region of the Iranian earthquake an Bam. Under the umbrella of Turkcell's fast deployable "Emergency Communication System" project, initiated in cooperation with Ericsson, the equipment was sent to Iran and a full communications network was set up in a record speed of nearly 24 hours after the equipment was on site. The network is operational as of today and can accomodate 5,000 people. The capacity can be increased up to 40,000 people.

In addition to the mobile network, Turkcell and Ericsson sent 1 radio base station, 3 mobile base stations, 10 generators and satellite equipment.

Turkcell had completed its unique and fast deployable mobile "Emergency Communications System" project in 2002, in order to set up emergency communications systems in Turkey and surrounding areas to be activated in disaster situations. The project is established in cooperation with the global Ericsson Response Project and enables the emergency rescue teams to communicate on GSM technology.

The "Emergency Communications System" is built to solve probable communications problems that crisis management and rescue teams may face after natural disasters like an earthquake. Immediately after the disaster, the system is transported to the area and reassembled. The system stays operational in the area as long as the need for quality communications services over GSM technology continues among the crisis management and rescue teams.
For secure comms just get two Geordies on the net......lets see the NSA decrypt those tinkers
Pretty interesting, but the Turkcell/Ericsson network isn't secure I don't think. That throws in some more considerations.
Can you imagine exercising some sort of control over a system like that?
RCSignals - look here

We, the UK have had a secure (up to Secret) GSM for years so has Norway, France and others ((OPSEC ( All data from the Net)) .

If even NATO can get the kit then why can't we. Oh yes its a $4000 a pop for the phone and $40000 for a base station . But I think that is quite a bit less than say one of the Bowman contractors lunch meetings.

128 bit encryption with full GSM connectivity is pretty damn good . Also as its not U.S. kit that don't have back doors to break in.
Yes I did Gunny.

2 years ago? Blimey , PTP telecoms visionary - LOL :D

Seriously , I appreciate the considerations on network security, and I believe an Israeli team have claimed to have actually cracked the GSM algoritims,1283,32900,00.html

Although the paper describes how the GSM scrambling algorithm can be deciphered if a call is intercepted, plucking a transmission from the air is not yet practical for individuals to do.

James Moran, the fraud and security director of the GSM Association in Dublin, says that "nowhere in the world has it been demonstrated --an ability to intercept a call on the GSM network. That's a fact.... To our knowledge there's no hardware capable of intercepting
It is possible the algoritim has been cracked , but if the Voice and Text traffic, is wrapped in another algoritim, then it doesn't do the other team any good at all. Certainly not within a timescale, that would make the intelligence gained of any value.

I know there are other Arrse users , who know their mobile phone bits and bobs , is there any reason, why mobile telephony can't be used in certain scenarios? Say a TETRA system etc?

I have to admit a particular interest in encrypted mobile telephony , as my company has developed an encrypted SMS/MMS messaging system for mobiles using the US DOD AES algoritim, which is currently under evaluation by a couple of government agencies. Primairily because whilst voice and data transmission was encrypted on these systems, for some strange reason, text and imagery , phone to phone was not..

Yes the two brains Alex Biryukov and Adi Shamir did crack the GMS with off an Off the shelf PC. They also happen to have been in the field since the 80'ies and are know wizzards at the game. And further papers refute the claim as they only broke a percentage of it.

You are correct that even if the GSM is broken then the double encrypted part is still OK.but you knew that anyway
Us stuff is good but as it is akll from the same place; well who knows who is listning in.

If Skipjack has a back door, so some say - Biryukov and Shamir do. Then most other stuff from the US might also.

Sounds strange that voice (which is data) and data ? is encrypted but that the text and image -(which is also data in the same protocol as the voice was A/D to, was not.)

As regards backdoors, I don't know if there are or not. But, in my dealings with the DarkSide to date, I can tell you for a fact that their particular fear is "homebrew" algorithims, so make from that what you will :wink:

I didn't explain the encrypted data part properly. At present, to encrypt text or imagery, you require a hard terminal and a cable connected to the phone, not much use, if you are using your camera phone in a COP/ Surveillance/Deep recce scenario.Also, as far as I am aware/been briefed , there is no facility, to send encrypted imagery via a lightweight, portable inexpensive device.

I used a camera phone on a TEWTS, , equipped with the encryption software.Transmitting phone was a Sony P800 , receiver a Nokia 7650. The imagery of the objective was received back at Coy , within seconds of being sent,via MMS/e-mail and decrypted successfully. The Imagery, could then be downloaded via bluetooth , I/R or cable to a laptop, and examined in more detail. The imagery of the obj, was stored encrypted on the phone as a Rijandael encrypted datablob, so if the phone had been captured etc, it would still have been secure. Since then, we have added an "auto-shred" feature, so once the message goes, it's destroyed on the transmitting device. With the new zoom/resolution/lowlight capabilities of standard phones coming in this year, mobies should be considered as an essential tool in Ops. comms.

Admittedly, the whole system needs coverage in place, but if you're using satphones, or temporary masts , then it might be workable in other areas. GSM coverage, despite the Spams best efforts, is a world standard.
GSM worldwide - true.

However when the conflict starts then the rulers of said country can just turn off the GSM. Happend a few times over the last 10 years.

OOps no comms, secure or otherwise.

Another reason why we need our own.

Sad but true. We need Bowman.
OB, I take your point re. Dictators closing down the GSM network, but remember, as per the opening cut and paste, I'm talking about deploying with our own GSM kit, and satellite comms to talk out of theatre.
So would the Armed forces have thier own Sim card, or roam on to another network...

What would stop other mobile users logging into our network and filling the base stations....

HLR and VLR would be a nightmare for such a small network.... also the base station would have to be defended as so much would rely on there performance and constant necessity to work.

Convoy co-ck is a grown up in this matter, maybe he could input about the make up of a GSM network
old_bloke said:
RCSignals - look here

We, the UK have had a secure (up to Secret) GSM for years so has Norway, France and others ((OPSEC ( All data from the Net)) .

If even NATO can get the kit then why can't we. Oh yes its a $4000 a pop for the phone and $40000 for a base station . But I think that is quite a bit less than say one of the Bowman contractors lunch meetings.

128 bit encryption with full GSM connectivity is pretty damn good . Also as its not U.S. kit that don't have back doors to break in.
Yes, I was just saying that I don't think the system set up in Iran is secure, although I'm probably wrong.

The NATO kit should be available, barring the price, but then "ruggedised" and unique military kit is always more $ (I agree about the lunch meetings!)

Obviously there is a place and use for such a system, how far down it should be used is the question I suppose.

Remember when this kit was being used 20 years ago? Personal portable telephones the size of a brief case, with a hand set on top? LOL

As for the rest of the thread on encryption, the biggest mistake is to assume it cannot, or has not been cracked (just ask the Germans and Japanese) But then you know that.
Fine for static or peace keeping ops but nothing else. Certainly not a mobile high intensity operation as base stations are required and need guarding.

As has been mentioned before - security is a real issue.
if the BTS was deployed in a HQ then it would be defended anyway
and as at the moment the Ptarmigan network depends on single trucks being sited on hill top site with only a small crew to both defend and operate the kit then what would be the difference?
the same guys could set up the BTS and then not have to worry about operating it, stag on!!
So what criteria, would have to be satisfied, to deploy and use this kit, as per Ramillies statement?
QMan9193 said:
Mobiles are the way ahead- many an EX on the Plain would have collapsed if not for Mr Samsung and Nokia!
This is QMAN's reason for getting secure mobiles. I don't agree, teach the CROWS how to use the kit better, and if that fails update it ARMY! But bring out the update when you say you will, not 5 years after!
Some outfit connected with Leeds University have just raised cash to work on a little solar-powered UAV as a rural wireless network base station...sounds good no?
question to those who want to have secure mobile phones as means of communications.

What happens where there is no coverage?

Like southern Iraq when we arrived or the middle of a Jungle?
How secure are mobiles could hostile nations not for example have acces to decrypts of mobile services in their regions?

Similar threads

Latest Threads