Glossary entry

English term or phrase:

fake base station protection

French translation:

protection contre les fausses stations de base

Added to glossary by SensumDeSensu
Jan 24, 2016 00:35
8 yrs ago
English term

fake base station protection

English to French Tech/Engineering Telecom(munications)
"The xxx supports 4G+ and VoLTE and is powered by a 4000 mAh high-capacity battery. It also includes a number of powerful security features to keep your calls and messages secure, such as chip-level fake base station protection."

Il s'agit d'un nouveau modèle de smartphone.

Merci d'avance pour votre aide.

Discussion

Daryo Jan 24, 2016:
what have you got so far?

Proposed translations

+3
6 hrs
Selected

protection contre les fausses stations de base

"Les réseaux de troisième génération apportent donc des améliorations signi-
ficatives en matière de confidentialité. Le chiffrement demeure à l’initiative du
réseau (qui peut décider de rester en clair), cependant le réseau doit authentifier
l’ordre de rester en clair, donc être reconnu de l’opérateur d’origine. Les attaques
par fausses stations de base sont donc inopérantes.
"
État des lieux de la sécurité des communications cellulaires
http://www.ssi.gouv.fr/.../cesar2011-papier-secu-reseaux-mo....
Peer comment(s):

agree Erzsébet Czopyk : yeess... (I do not speak French so it was hard to find the right expression but crryptography I love a lot so I wanted to contribute) and until I finished you picked the right one. My heart is bleeding :)
5 mins
merci!
agree Tony M : Your apparently authoritiatvie gov. ref. convinces me.
25 mins
Thanks Tony // these stations are very real BTW, (they are not mockups) just not "genuine" - they don't belong to the telco, and are set up by pirates.
agree Daryo
7 hrs
thanks!
Something went wrong...
3 KudoZ points awarded for this answer. Comment: "Merci FX"
6 hrs

niveau de sécurité supplémentaire, puces baseband, Baseband pare-feu - do not translate directly

VoLTE, an acronym for Voice over LTE, which is based on the IP Multimedia Subsystem (IMS) network

fake cell "towers" are not actually towers, and can be vehicle-mounted or man-portable.

https://www.schneier.com/blog/archives/2014/09/fake_cell_pho...
nobody@localhost • September 19, 2014 12:04 PM
@CallMeLateForSupper
For nomenclature, I suggest "fake cell base stations", "fake mobile phone receiver", or similar. Use familiar language. Your suggestion "Stingray-type devices" requires that people heard of Stingray; my first instinct "mobile man-in-the-middle" rolls off the tongue, but is too technical jargon-like (as is "IMSI catcher"). But everybody can get the idea of what a "base station" or "receiver" is.

http://www.makeuseof.com/tag/4-things-you-need-know-about-th...
The Anatomy Of A Rogue Base Station
Rogue base stations – hereafter referred to as interceptors – look like a standard base station to a cell phone. The simplest ones are unfathomably easy to create, with some even building interceptors around the popular (and cheap) Raspberry Pi system (it’s versatile enough) and the free, open-source OpenBTS GSM access-point software. This allows the implementation of the GSM protocol, which is used by phones in oder to communicate with base stations.
However, to really convince a phone that you’re a genuine base station, you need an outlay of thousands. This limits this type of attack to a select few; namely governments and large criminal organizations. Some police stations in the US have also spent thousands on interceptors that force phones to use 2G and GPRS in an effort to easily intercept and decrypt traffic in real time.

How the Attack Works
Regardless of what phone you use, it’s running two operating systems. The first is what you use to interact with it, be that Android, iOS or Blackberry OS. Working in tandem with that is a second operating system which handles phone traffic. This operates on something called the Baseband chip. and is used to connect to the base station and to serve voice, SMS and data traffic.

Phones automatically connect to the nearest, strongest phone station signal, and when they create a new connection they send what is known as an IMSI identification number. This number uniquely identifies subscribers, and is sent to a base station once a connection is made. This is sent regardless of the authenticity of the tower.

The tower can then respond with a data packet that establishes the standard of encryption used by the phone when communicating with the tower. This depends upon the phone protocol used. For example, the default voice encryption in 3G communications (by far the most used phone protocol) is a proprietary standard called ‘KASUMI’, which has a number of noted security flaws. However, any encryption is better than no encryption, and a false base station can turn all encryption off. This could then result in a man-in-the-middle attack.
Meanwhile, the rogue tower passes on all traffic to a legitimate tower, resulting in continued voice and data services, whilst the user is surreptitiously being surveilled.

If you’ve got deep pockets, you could always buy a cryptophone produced by ESD America. These come with something called ‘Baseband Firewalls’, which establish and enforce an additional layer of security on the baseband level of your phone, ensuring that interceptor towers are easy to identify and easy to mitigate against.

BASEBAND SIGNALGENERATOR ...... l'entrée de niveau de bande de base du second chemin. BASEBD ON/ ...... Le fait de désactiver le pare-feu ou d'appliquer des exceptions rend votre appareil plus vulnérable ...

Le Blackphone – Vraie promesse ou future déception ? «
korben.info/le-blackphone-vraie-promesse-ou-future-de...

Niveau logiciel, Silent Circle développe en effet des applications supportant le chiffrement et d'après ce que j'ai pu voir, les communications entre Blackphone seront chiffrées un peu à la manière d'une connexion VPN.

On sait encore peu de choses sur ce téléphone, mais d'après ces ... Firmware, puces baseband...etc., comment savoir ce qui se passe ... Mais préparer votre portefeuille c'est pas donnée ! ... niveau ressources) et on l'envoie par le réseau au correspondant, .... Comment tu les fais les boules de feu T_T ?

--------------------------------------------------
Note added at 6 hrs (2016-01-24 06:45:55 GMT)
--------------------------------------------------

http://www.nextinpact.com/news/76393-discretio-et-redphone-p...

--------------------------------------------------
Note added at 6 hrs (2016-01-24 06:50:10 GMT)
--------------------------------------------------

Défense contre l'attaque d'analyse de trafic dans les réseaux
https://publications.polymtl.ca/655/
Défense contre l'attaque d'analyse de trafic dans les réseaux de capteurs sans fil ... Notre technique de protection utilisée est la génération aléatoire de faux ... L'élection de la fausse station de base et des capteurs collaborateurs est aléatoire.
Patent WO2007004054A1 - Protection de dispositifs sans ...
https://www.google.com.ar/patents/WO2007004054A1?... - Oldal lefordítása
... fil une protection contre des attaques de faux points d'accès/stations de base au moyen d'une protection d'adresse de commande d'accès au support.
Patent EP1891791A1 - Protection de dispositifs ... - Google
https://www.google.com.ar/patents/EP1891791A1?cl=fr - Oldal lefordítása
... fil une protection contre des attaques de faux points d'accès/stations de base au moyen d'une protection d'adresse de commande d'accès au support.


protection contre des attaques de faux points d'accès/stations de base
Peer comment(s):

neutral Daryo : c'est trop technique, ça ne dit absolument rien à l'usager moyen
11 hrs
Something went wrong...
17 hrs

protection contre les vraies-fausses antennes-relais

plus précis, attire plus l'attention et plus mémorable !

--------------------------------------------------
Note added at 18 hrs (2016-01-24 19:35:03 GMT)
--------------------------------------------------

et déjà utilisé ...

"... n°2941 20/07 2015

- Santé et contrôle de la population.
- Alerte déploiement de vraies fausses antennes relais plus puissantes système d’identifications, de traçages et d’écoutes.
- Analyse de Next-up organisation. ..."

http://www.next-up.org/images/Vraies_fausses_antennes_relais...

http://www.next-up.org/Newsoftheworld/2015.php



Something went wrong...
Term search
  • All of ProZ.com
  • Term search
  • Jobs
  • Forums
  • Multiple search