OverviewThis course provides a detailed description of several surveillance techniques that can be exploited in many 2G,3G and 4G cellular systems. The techniques described are not purely based on the Radio Access part of these networks, however this aspect is discussed in considerable detail during the course. Exploitation via Core Network and Third Party Services is also presented, and examples of Service Provider architectures discussed.
Several sanitised case studies will be presented and the topics are delivered from several perspectives, including:
- Ease of deployment
- Risk of visibility
- Protection against being 'spoofed'
- Denial of service
- Setting the Scene - the state of the cellular industry
- Network architecture evolution
- Understanding cellular principles and procedures
What can be exposed?
- Different systems - different vulnerabilities
- Understanding the network and the environment
- Radio access exploitation:
- grab and go
- holding on
- on the move
- closing in
- Backhaul / Fronthaul exposure
- What goes on in the Core Network
- Third Parties and Transit networks
- Voice, Data and BIG data
- Case Studies
There are no prerequisites for this course, however, participants are expected to have a basic understanding of computers and the internet.