4G mobile calls still open to eavesdroppers Tuesday 6 December 2016 PDF Print 4G does not solve the issue of potential IMSI catcher style attacks leaving commercial and public sector/government organisations vulnerable Newest mobile network fails to solve 2G and 3G security issue London - Armour Communications, a provider of specialist, secure communications platforms explains in a paper published today entitled, Is someone listening in on your confidential calls?, how the latest 4G network fails to solve the problem of electronic eavesdropping. Firms’ intellectual property (IP) and commercially sensitive information can still be listened into by perpetrators using an IMSI catcher, despite new security measures and stronger encryption used by the 4G network. This type of hack can be set up with equipment that is highly portable and costs less than £1000. A rogue base station attracts mobiles by offering a stronger signal, and once connected forces the mobile back to 2G technology, where encryption is negligible and easily bypassed. This attack was demonstrated recently at the Ruxcon Security Conference, in Melbourne. Andy Lilly, director and co-founder of Armour Communications commented; “Given the many years of experience and the huge investment in time to develop the specification for the 4G network, it has been assumed that it would be much better at protecting privacy. While it is to some degree, 4G does not solve the issue of potential IMSI catcher style attacks leaving commercial and public sector/government organisations vulnerable.” 4G enforces mutual authentication between handset and network base station, unlike 2G/GSM, but it still requires the mobile to transmit its International Mobile Subscriber Identity (IMSI) at least once in order to connect. Also, because 4G coverage is not ubiquitous, a fraudulent base station can trick handsets into downgrading to 2G, meaning any communication, voice, text or attachment can be compromised. Andy Lilly added; “There is currently a proliferation of free apps and services that claim to be secure and encrypted, however, organisations should be careful about using such services. These services are not explicit about exactly what is encrypted and therefore there can be gaps that the user is unaware of. Furthermore, companies should not rely on services over which they have no control – for example the carrier service in some countries – in order to protect commercially sensitive information on which the success of their business depends.” To read a copy of the article ‘Is someone listening to your confidential calls?’ please visit: ARMOUR COMMS NOTES TO EDITORS About Armour Comms Armour Communications Limited is a UK based company supplying market leading technology for secure communication via 3G, LTE (4G), WiFi and satellite for voice, video, messaging and data on Android or iOS platforms. Armour Mobile also features in-built secure conferencing (audio or video) between multiple callers. Armour Mobile is available as a Cloud or an On-Premise solution, and by using the optional Armour Connect Gateway, integration to a customer’s PBX and standard office desk phones is possible. All solutions are FIPS, NATO and CPA approved up to OFFICIAL-SENSITIVE, with additional security layers to mitigate threats up to SECRET. For more information please visit:ARMOUR COMMS Editors Contacts David Holman Armour Comms +44 (0)203 637 3801 David.firstname.lastname@example.org Andreina West PR Artistry +44 (0) 1491 639500 email@example.com This press release was distributed by ResponseSource Press Release Wire on behalf of PR Artistry in the following categories: Computing & Telecoms, for more information visit http://pressreleasewire.responsesource.com/about.