My CDMA phone went "missing" and was "found" after a couple of days. Ever since this guy in whose presence the phone went missing has known about all my conversations.
My guess is :
It is a cell to cell wiretap.
Each time I turn my phone on a message is displayed on his cell phone.
He can make normal calls from his cell phone while being able to listen to my calls.
Could someone tell me how many ways can he do this in? So I can check what he did.
Take it to the nearest shop of your service provider and have it re-set. This isn't a "cracked" phone, right? So, they won't have any problem with restoring it...right? Otherwise....enjoy your new career in broadcasting!
4.4 Retrieving the Key from the SIM The security of the whole GSM security model is based on the secret Ki. If this key is compromised the whole account is compromised. Once the attacker is able to retrieve the Ki, he can not only listen to the subscribers calls, but also place calls billed to the original subscriber's account, because he can now impersonate the legitimate subscriber. The GSM network has trip wires for this: If two phones with the same ID are powered at the same time, the GSM network notices this, makes a location query for the phones, notices that the 'same' phone is in two different locations at the same time, and closes the account, thus preventing the attacker and the legitimate subscriber from placing calls [2]. But this is not relevant if the attacker is only interested in listening to the calls of the subscriber, as is assumed in this paper. In this case, the attacker can stay passive and just listen to the call, thus staying invisible to the GSM network.
ElectronDepot website is not affiliated with any of the manufacturers or service providers discussed here.
All logos and trade names are the property of their respective owners.