Tuesday, July 22, 2014

LTE-WiFi Aggregation

LTE-U workshop: LAA (Licensed Assisted Access) - Use cases and scenarios

 


LTE workshop: LAA (Licensed Assisted Access)

Saturday, July 19, 2014

International Telecommunications Union and CSA

International Telecommunications Union and CSA

Were the standards to be made binding that could have political implications / ramifications regarding national sovereignty etc. However, a standard adopted by the ITU are called "recommendations". The recommendations carry a voluntary adoption by members states. The recommendations can though become directly or indirectly binding if it is incorporated into member states legislation where the legislation refers to a particular ITU recommendation. That would have a direct binding agreement. An indirect binding agreement could be where European legislation does not mention ITU recommendation per se but refers to CEPT or ETSI standards that become recorded that are in-turn derived from ITU recommendations. Were there to be an inextricable link requiring identical wording for CEPT/ESTI standard/ITU recommendation then that may amount to an indirect binding agreement with or to the ITU recommendation.

CSA - Site Survey Method 2/ITU - http://cellsiteanalysis.blogspot.co.uk/2014/07/csa-site-survey-method-2itu.html

As this discussion relates to CSA and identified recommendations listed here ( http://cellsiteanalysis.blogspot.co.uk/2014/07/csa-survey-method-2.html ) the detail below highlights the radio subject matter from the division ITU-R.

Sunday, July 13, 2014

CSA, propagation and keeping norms

CSA, propagation and keeping norms is an in-for-the-long-haul series of discussions about CSA (cell site analysis) and highlighting all the wider area topics of CSA that seldom get discussed. The first three discussions can be found here:

CSA - Site Survey Method -
http://cellsiteanalysis.blogspot.co.uk/2014/06/csa-site-survey-method.html

CSA - Site Survey Method 1 -
http://cellsiteanalysis.blogspot.co.uk/2014/06/csa-site-survey-method-1.html

CSA - Site Survey Method 2 -
http://cellsiteanalysis.blogspot.co.uk/2014/07/csa-survey-method-2.html


Sunday, June 08, 2014

GSM Normal Burst Power/Time Template

The image (below) is of the power/time template to illustrate a GSM Normal Burst (GSM05.01/05.02). A single burst when transmitted may contain up to 114-bits of useful speech data. Given the speed at which GSM radio signals traverse the ether calculated in micro-seconds to be received at a destination handset and processed by that handset in milli-seconds and converted into audible speech within one or seconds opens possibilities for examiners to demonstrate the power of mobile communications.

For instance, an attacker communicating a single 'provocative' word consisting of 80-bits in a normal burst to an accomplice could be:

D               E              T              O              N             A              T               E
01000100 01000101 01010100 01001111 01001110 01000001 01010100 01000101

The entire timing of this event may last no longer that 2 seconds. When you get time try a simple test to see how many clearly audible words you can speak within 2 seconds and what messages can be communicated in that time. Moreover, the clock for recording call records can be operated in 1000-ths of a second separated into 5 x 200-ths of a second. Whilst it is possible to see a call detail record showing a 0-second call duration and it is generally accepted there is no meaningful communication taking place, what about call that lasts 1, 2 or 3 seconds?

The knowledge tool to demonstrate the GSM Normal Burst power/time template, the power output of MS and BTS etc can be found in 3GPP TS 05.05 V8.20.00 (2005-11) Release 99.



Friday, June 06, 2014

D-Day 6th June

On the 6th June 2011 I wrote about D-Day at this blog. I did so because much of history was being forgotten by the younger generation. When I posted the thread below the blog received nearly 3000 hits in a few days. In 2014, we are now seeing a substantial increase, reported in the papers and on television, raising awareness about this day and other important historical dates that allow the young generation to re-connect with their heritage. It is so important to keep this knowledge flowing from generation to generation if the mistakes of the past are not to be forgotten but, worse still, to be repeated.

Today, this day, is remembrance of those men and women who fought, and so many gave their lives, to bring hope that we could enjoy our sunny days of freedom. 

This photo reminds me of how appropriate it is to use the words real heros.  


D-Day 6th June




I mentioned today's important date to a number of people. Quite a few had forgotten the date and mainly the younger generation didn't know about events that took place on this date back in 1944.



For anyone who may have missed it or might want to know more, here are some links providing the historical background.

NORMANDY LANDINGS
British Legion Remembrance d-day-65
Wikipedia Normandy Landings
Britannica DDay
Remembrance D-Day.html
Lifeformation D-Day


SCHOOL CHILDREN (CBBC)
BBC/CBBC D-Day



Sunday, May 04, 2014

iPhone factory reset bars access to revevlation

It has been known for sometime there is no general release that can handle the deleted encrypted data on iPhone 4s onwards.  The latest article in the The Register ( http://www.theregister.co.uk/2014/05/01/thanks_for_nothing_apple_say_forensic_security_chaps/ ) rehearses discussion the forensic community has already had about deleted keys and deleted encrypted data. The factory reset point merely reconfirms another method how a user can select an iPhone process to cause the data to no longer be available for access by the user.

These are just my own observations but I would find it highly surprising if the 'clever department' at Apple had not prepared for the day when National Security walks through the door with a grade 'X-level' warrant to decrypt, no matter the state of the smartphone. Germane and relevant to this type of discussion is that 'keys' are not so randomly generated that Apple couldn't predetermine access-doors or decryption methods based upon the smartphones IMEI, manufacturing batch, core processor, chip/s, board layout, country of supply and iOS etc being one side of the coin **. We are of course all being induced into talking about the other side of that same coin, the iPhone encrypted data made inert such that the data having no inherent power of action, motion, resistance or having little or no ability to react.

http://i107.photobucket.com/albums/m286/Jollygood_01/jtag-iph4s_zps80002346.jpg

Fig.1 Example of a hacker's study for accessing an iPhone memory chip 

History has shown that due to necessity or hacking revelation can always be possible. Such an example of gaining access where the manufacturer failed to correct a security flaw inspite of being advised about it is not new (http://reverse.put.as/2014/02/15/appledoesntgiveafuckaboutsecurity-itunes-evil-plugin-proof-of-concept/ ). Maybe a solution isn't too far off whether introduced by the manufacturer (vertical revenue stream) or another source divulges a method to reveal. However, we do need to be clear though where we stand. Forensics provides a particular 'defined approach' to examine and analyse a 'thing'. The process and procedures applied to the examination and analysis of a 'thing' takes into account various paths of enquiry including the producer/manufacturer spec of the thing; any inter/national and industry standards and legal requirements applicable to it; any academic and non-academic studies and materials that may be applicable; the skill, knowledge and experience of the individual involved with the examination and analysis. What we don't do or shouldn't do during the forensics process and procedures is 'hack' in the way hacking is commonly understood to be carried out or reverse engineer. The reason for that is by hacking/reverse engineering a thing a potential pitfall that arises is that the individual may cause or induce an event to occur on or in e.g. a smartphone that would have been impossible or unknown to the user of the smartphone and potentially create a suggestion of culpability that wasn't or didn't exist previously (add/loss data etc).

** Update 09/05/2014
LEGAL PROCESS GUIDELINES U.S. LAW ENFORCEMENT

"These Guidelines are provided for use by law enforcement or other government entities in the U.S. when seeking information from Apple Inc. (“Apple”) about users of Apple’s products and services, or from Apple devices. Apple will update these Guidelines as necessary. This version was released on May 7th, 2014."

" I. Extracting Data from Passcode Locked iOS Devices

Upon receipt of a valid search warrant, Apple can extract certain categories of active data from passcode locked iOS devices. Specifically, the user generated active files on an iOS device that are contained in Apple’s native apps and for which the data is not encrypted using the passcode (“user generated active files”), can be extracted and provided to law enforcement on external media.   Apple can perform this data extraction process on iOS devices running iOS 4 or more recent versions of iOS. Please note the only categories of user generated active files that can be provided to law enforcement, pursuant to a valid search warrant, are: SMS, photos, videos, contacts, audio recording, and call history. Apple cannot provide: email, calendar entries, or any third-party App data.

The data extraction process can only be performed at Apple’s Cupertino, CA headquarters for devices that are in good working order. For Apple to assist in this process, the language outlined below must be included in a search warrant, and the search warrant must include the serial or IMEI number of the device. For more information on locating the IMEI and serial number of an iOS device, refer to
http://support.apple.com/kb/ht4061.

Please make sure that the name of the judge on the search warrant is printed clearly and legibly in order for the paperwork to be completed."

http://www.apple.com/legal/more-resources/law-enforcement/ 

Wednesday, April 23, 2014

Happy ENGLAND Day


St George's Day 23rd April
St George is the patron saint of England. Saint George is celebrated on this day which falls on 23 April every year. To celebrate St George's Day is to celebrate England itself: Our history, culture and heritage that has created our nation. Patron saints are chosen as special protectors of life and culture. They're also a great excuse to have some fun!

Like England, every country in the UK has its own patron saint that in times of great threat is called upon to help save the country from its enemies. Legend says St George was a dragon-slaying knight and he was made patron saint of England in recognition of his great acts of christian kindness, protection and faith. St George is a popular figure outside England in countries Portugal, Catalonia, Georgia, Serbia, Bulgaria, Bosnia and Herzegovina, Republic of Macedonia and the Gora and Palestine. The symbol of St George, a red cross on a white background, is the flag of England, and part of the British flag. St George's symbol was originally adopted by Richard The Lion Heart and brought to England in the 12th century.

Very little is known about the real St George. He is thought to have been born into a noble Christian family in the late third century in Turkey. He followed in his father's military footsteps and became part of the retinue of the Emperor Diocletian. St George was a brave soldier in the Roman army who died for his beliefs. The emperor ordered the systematic persecution of Christians and George protested against the Romans' torture of Christians. For that he left the Roman army. For leaving, he was tortured, executed in Palestine, and finally beheaded, becoming an early Christian martyr in 303.

St George was also adopted as the Saint of Battles. This was not only because of his military background but, also, because it is said St George appeared to the Christian army before the Battle of Antioch.

Today England celebrates its National Day with parades through high streets, music and dancing; special St George's Day services at local churches are held, too. As today is Shakespeare's birthday,  the Globe Theatre usually holds a celebration with stalls and entertainment at the theatre, and the chance to get onto the stage and deliver a few lines. This event gets bigger every year. Pubs and private homes normally display a riot of red and white bunting on this day. Alongside all the official celebrations, there will be parties going on at various venues around.


Thanks to St Georges Day website and tourist information from LTH Hotels for the images and some historical review of St George's history.