SBN

Mobile Phone Tracking [Updated 2018]

GSM or Global System for Mobile Communication is a technology that’s widely used in mobile communications, especially mobile phones. This technology utilizes microwave and signal transmission divided by time, so that the signal information sent will arrive at the destination. The GSM standard for mobile communications as well as mobile technology is deployed more than its counterparts around the world, like CDMA. At this time we will discuss how to track a cell phone by using the Doppler effect, in other words we will make it easier to know the whereabouts of a person just by having information such as cell phone numbers.

Ethical Hacking Boot Camp — 93% Exam Pass Rate

GSM Network Architecture

Typical GSM network architecture is divided into 3 parts:

  1. Mobile Station (MS)
  2. Base Station Sub-system (BSS)
  3. Network Sub-system (NSS)

All elements of the network at the top form a PLMN (Public Land Mobile Network).

Picture 1. GSM network architecture

Mobile Station or MS is a device used by the customer for making phone calls. This device consists of:

  • Mobile Equipment (ME) or the handset (UM) is a GSM device that is located on the user or customer end that serves as a terminal transceiver (transmitter and receiver) to communicate with other GSM devices.
  • Subscriber Identity Module (SIM) or SIM card is a card that contains all customer information and some information about services. ME can’t be used without a SIM in it, except for emergency calls. The data stored in the SIM in general are:
  • International Mobile Subscriber Identity (IMSI)
  • Mobile Subscriber ISDN (MSISDN)
  • Encryption mechanism

Base Station System or BSS consists of:

  • Base Transceiver Station (BTS), a GSM device that is directly related to MS and serves as the sender and receiver.
  • Base Station Controller (BSC), a controller device for base stations which (Read more...)

*** This is a Security Bloggers Network syndicated blog from InfoSec Resources authored by Tri Sumarno. Read the original post at: http://feedproxy.google.com/~r/infosecResources/~3/tssLjX1qhHo/

Secure Guardrails