15.01.2024 Views

CompTIA A+ Certification All-in-One Exam Guide

  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

periodically updated, but there is a technique called tower spoofing that

involves setting up equipment to spoof a carrier’s tower and infrastructure

and cause a cellular device to use it instead of the normal tower equipment. It

requires overpowering the nearest legitimate cell signal, causing the cellular

device to lock onto it instead. Equipment used in tower spoofing can also

eavesdrop on any conversation, even if it is encrypted. In some cases, the

equipment can fool the device into turning off encryption completely—and

sophisticated attacks can even install malware on the device.

Just as hackers have been using this technique for a few years, law

enforcement officials have been reportedly using it as well. Since 2010, there

have been numerous court cases highlighted in the media questioning the

admissibility of evidence obtained from cell signal interception. Media

reports say various federal, state, and local law enforcement agencies use a

device called a “Stingray” to intercept a suspect’s cell traffic using tower

spoofing equipment and techniques. There’s even an aircraft-mounted

version, known as a “Dirtbox.”

NOTE Though much of the news coverage on tower spoofing focuses on

U.S. law enforcement agencies using the Stingray, you could just as easily

encounter malicious cellular or Wi-Fi networks run (for a variety of reasons)

by individuals, businesses, organized crime, and governments anywhere in

the world.

Unintended Wi-Fi connections and unintended Bluetooth pairings can

enable malicious people to access, steal, or modify data. Configure your

mobile device not to connect to unknown Wi-Fi networks or automatically

pair with other Bluetooth devices. This will require you to manually connect

to known and trusted Wi-Fi networks, and manually pair with Bluetooth

devices—but it’s worth it. If the device is centrally managed, MDM software

can enforce these protections via profile settings.

Signal Drop and Weak Signal

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!