textfiles/phreak/CELLULAR/cellpdoc.txt
2021-04-15 13:31:59 -05:00

1058 lines
57 KiB
Plaintext

September 15, 1992
CELLULAR TELEPHONE OPERATIONS AND INTERCEPTIONS; FIRST OF ALL .
In a recent best seller, (ClearAnd PresentDanger) Tom Clancy, one hell of a
fine wordsmith, based much of the tension in the plot on the fact that the
good guys (government agents in this case) could not follow the bad guys, even
on their cellular telephones because cellular phones are "impossible to
monitor."
Tom, Tom, lack of research or just trying to be nice to those agents
who helped you out on the book? Let's face facts, it ain't exactly impos-
sible to eavesdrop on cellular phones. In fact cellular phones are just about
the easiest type of communication to monitor without major equipment
expenditures or committing grievous felonies. Ah, let me qualify that last one
just a bit, it is against the law to monitor cellular conversations because
they, unlike cordless phones which also transmit over the radio, give the
"expectation of privacy." Or it is against the law until some good ACLU type
lawyer takes the first case to court, but that is neither here nor there. It
is against the law to monitor these conversations without the correct legal
documents and I am writing this section secure in the knowledge that none of
you would break this law, and that anyone who uses these techniques has a
legal right to do so. Right? So please ignore the fact that anyone with a
halfway decent scanner, (and they don't make many without cellular coverage
anymore) can just turn on, tune in and drop, ah, in. Some scanners won't allow
this illegal listening. For instance, Radio Shack, that paragon of poor man's
eavesdropping equip- ment, although they designed their scanners to receive
these calls, made it impossible to do so after the laws were changed.
Unless you take a pair of scissors and clip one little wire...
But it's the intent of the law that is at stake here; suppose you don't have
a scanner? God forbid you should look at the frequency chart and realize that
some cellular channels can be received on an unmodified UHV television set.
Don't touch that dial!
A TRICK
The two problems with either of these drop in monitoring systems is that A.
One doesn't know who one is listening to, and B. As the target moves about in
any area covered by CP's his signal will be automatically "handed ofP' to new
cells as the signal strength of his transmis- sion falls off. These
frequencies are random on the basis that they are available on the system not
in use, and do not interfere with other conversations already in progress.
Pandora's box?
Hardly. Here is how cellular telephones work and how everybody who has any
desire to tune in on the world's greatest party line can do so with a minimum
of effort from those with $40,000 budgets to those equipped only with a
scanner and a sense of adventure...
OPERATING SYSTEMS & TRAINS THAT FLY
Cellular systems consist of a number of indi- vidual "cells" that contain a
number of indi- vidual frequencies for the transmission of audio information.
A certain number of other frequencies within the cell are allotted to channels
that transfer the data necessary to set up and maintain the call.
Every area covered in the U.S. has at least two cellular phone companies in
operation: One is a wireline company, meaning it is, or was, depending on
whose lawyers one believes, owned by Bell. The other operator is a non-
wireline, an independent rep. Both adhere to the same operating standards.
When a particular phone reaches the outer limit of a particular cell's power,
the equipment automatically senses this and "hands off" the call to an
adjacent cell to continue the conver- sation with no noticeable loss in
signal.
The hexagons usually used to illustrate cells are really only symbolic.
Graphic artists and other PR types use these shapes to describe the system but
the real boundary of a cell is a jagged line that represents a point where the
power level falls off to about -100 decibels relative to a milliwatt of radio
power hitting the receive antenna.
At that point the system doesn't work very well because it's about equal to
the regular noise input to the receiver and it becomes very difficult to get a
good signal in there so some- where in the range of -85 to -100 DBM is the
point where one would no longer use the radio in that cell and the signal is
handed off to another cell.
The decision of where and when to hand off is also mitigated by other
factors, for instance, are there any available voice channels in that cell
would be the preferred choice for the handoff target? If so the decision is
simply to take the frequency in that cell and command the mobile to change its
frequencies to that particular frequency in order to carry out the hand off.
In real life, cells do not come out to perfectly drawn symbols but rather
jagged areas of signal which are influenced by hills, buildings, and other
natural factors beyond the control of the cellular company.
There are hills in every city and every hill will create a signal shadow in
the area behind it. Tall buildings will create the same effect. If the cell
includes streets with buildings that have highly reflective windows, like
silver glass or enameled coating, this tends to form a wave guide and will cut
the power down a long distance along that street if it's in line aside an
antenna.
The waves begin bouncing back and forth and side to side, reflecting energy
like two parallel mirrors on opposite walls, so suddenly there are a lot of
strange things that weren't included in the original symmetrically-shaped
pattem. But that's life in the big city. Literally.
The combination of particular antenna placements plus buildings and
shadowing in the service city creates areas which need to be overlapped. Phone
companies want some overlap with the boundaries, which requires a little
leeway about where to make handoffs occur. They have to cover the whole city
to give good service. No area can be excluded.
Some operators employ an engineer on a full-time basis to go out and make
constant measurements. Others will bring in a consult- ant and have them make
measurements locally every other month or two depending on the rate of growth.
If a tall building goes up right on an existing antenna, they may go out and
survey it while it's still under construction in order to do some modeling and
field prediction to correct the problem before it happens. This means cell
site boundaries and handoff points are in a state of flux.
The mobile phone operates on one fre- quency, sending out one side of the
call and the cell operates at another frequency 45 MHz less than the mobile.
The cell itself broadcasts both sides of the call.
In the cells themselves there are basically two sets of channels-the
original channels were just the ones allocated to two different competitive
carriers in the world's metro areas. Of these 333 channels in each of these
two groups, 21 which are near the boundary and 21 on the other side of the
boundary, are used as the so-called set up channels. All the other channels
are available for voice.
Recently the FCC allocated an additional 83 channels to each of the two
carriers. The wireline carrier, which is a former Bell operat- ing company,
got it in one nice big chunk of 83 channels in every area. The A carrier, the
non-wireline carrier in each district, (Cellular One, for example) got the new
access in twochunks that were split apart, say 33 in one place and 50 in the
other. This is important because the FCC has said they are not going to give
out any more channel allocations until the end of the century.
HOW CALLS ARE PLACED
The overhead train, a continuous stream of data (on a data channel) that is
constantly sending out loads of information of who is where and with what will
be occasionally interrupted by a specific starting message, called a page.
This is a message that mitigates the telephone number of the call of the
mobile, indicating there's a call for the mobile.
At this point the system doesn't know where the mobile is in the city so
this page is sent out in every cell in the whole city. The mobile, if it's
there, will respond in one of the cells as it has been watching one particular
frequency in the setup channel. It will go to another channel and if that
fades out, it will scan and find another one so it's always watching one
particular frequency and responding in the same frequency.
If located the mobile will be rung up or a pre-recorded message will be
issued saying that it is busy or off hook. The caller will then be
disconnected whether he wants to stay on or not. He can dial again immediately
but with get the same result, because they are trying to limit the amount of
air time that's consumed without producing any revenue if the subscriber is
out of town or has his mobile tumed off.
What happens when a user goes to make a call? The setup channel in every cell
transmits a sequence of minor data in a certain frame in the overhead train,
which includes things like the actual number of the phone involved. Every
system in North America has a 3 digit number along with some other data which
tells the mobiles if they are from outside the local system, if they should
identify themselves or not. If a phone is visiting the city should it identify
itself or should it wait until the switch has a call for it?
When a mobile starts up cold, it begins scanning. It starts scanning the
supervisory channels. It only has 21 to look at so it scans all of them until
it finds the strongest one and locks onto it and looks for the overhead train.
As soon as overhead train is grabbed, it waits and watches. If the train fades
away, the mobile w~ go back and start scanning a~ over again.
If a mobile operator wants to originate a call, the operator enters all the
dial digits into a display register on the mobile and hits a key labeled
"send." This causes the mobile to transmit a call setup message on the reverse
frequency part of the supervisory or setup channel before it identifies itself
and gives the telephone number to be dialed and it listens to see if the train
wants any more information. The telco may only request 7 of the 10 digits of
the mobile number or it may demand every- thing including the electronic
serial number, but all the systems are capable of asking for everything and
the only reason some compa- nies reduce the amount of information is just to
save transaction time when they're very busy.
The response contains all the same informa- tion. The actual switch, which is
located at the cell site, has to have 3 types of radios: Voice channel
transceivers are for actually talking in duplex covering about 45 usable
channels per cell unless the expanded spectrum has been put into use where it
goes up to 56 channels per cell. At least one control or setup channel
transceiver is also required but most companies will install a spare for that
in case of failure because it's role is a crucial one. If it's dead,
everything's dead, calls can't be set up in either direction.
In addition, at least one locaffng receiver is required to measure radio
signal strength indication because when a handoff occurs there's always a
question. If the signal strength in this mobile is getting weak, where is it?
Is he driving north, is he driving east, west or south, which cell is he
getting closest to? The system, prior to the handoff, has to request all the
locating receivers in the nearby cells to tune tothe frequency of that mobile
in order to mea- sure the signal strength and report the stron- gest one.
The actual switches are called either an MTX or MTSO depending on the
manufacturer. MTX means Mobile Telephone Exchange and MTSO means Mobile
Telephone Switching Office.
The central switch is pretty much a standard telephone switch. Almost all
the modem ones are digital in nature with some type of a switch- ing network
which connects calls from one port to another. There is also some kind of a
control complex involved in the central proces- sor similar to a computer.
There is a digital trunk controller and some sort of interface which is used
to connect to other telephone central offices in other parts of the city.
When the call gets into that switch mecha- nism, the signal is handled like a
regular tele- phone call. All the same technologies about pen recording,
intercepting, tracking and taping all the conversation can and will be
intercepted by the carrier at this point without special equipment.
In addition to that, all the records exchanged produced by like automatic
number identifica- tion and billing and all the call records, (~UR's) can be
subpoened, so everything applies pretty much the same as it does in the
regular tele- phone system.
There's also some type of a control connec- tion to the central processor,
usually run through a voice frequency channel which leads to a controller of
some type which is another microprocessor system at the cell site that's
connected to both the radios to tell them to go on and off and then back into
the locating receiver in order to process the change to get the frequencies
and take measurements.
This is the format of one cell site. A city may have as many cell sites as
necessary. U.S. systems range from the minimum of one cell site to as many as
about 70 or 80. Los Angeles has about 80, New York runs a close secon~i
ROAMING AND ROVING
All of North American cellular operators have
uniform technical standards and in theory, if
there's no business reasons not to, a set can
roam anywhere in the continent where there's
radio coverage. The operator can at least origi-
nate calls even though he may or may not be
able to receive them, depending on whether
inter-connections exist for data transfer be-
tween the various cellular systems, but techni-
cally there's no reason why one can't originate
a call.
Any mobile set has several options. If it can't
find any supervisory channel at all-if it's
suddenly situated out in the country where
there's no cellular service-the local will scan
and scan and eventually, after a few tries it give
up and indicates that the caller is SOL.
If the operator scans all the channels but the
system number showing in the overhead train
doesn't match the one in the memory of the
telephone set, the mobile set, it will keep
watching it in the roam mode, understanding
it's outside of its home system. In most sets one
can also switch to the other carrier in the area.
The business arrangement is that most U.S. wire lines have some kind of
cross-billing contracts. All of the former Bell operating companies
subsidiaries have almost uniform aoss billing contracts and many, but not all
of the non-wire line people have cross-billing contracts, plus there are many
cross-billing contracts between wire line and non-wire line because there are
lots of cross ownership, so almost every place the phone goes there is about a
95% chance to place a call which will later appear on the operator's phone
bill.
General Telephone operates a clearinghouse that automatically bills the
correct party no matter where he happens to be at the time of the call.
If the city the call is being originated in overlaps coverage with a
neighbor, the handoff can occur between cities. In a few years the entire U.S.
is expected to be included in a system of mass coverage.This knowledge can be,
and is, used to protect oneself from law enforcement intercept orders as
follows (borrowed from the ah, well, a group of Italian businessmen):
If someone wants to protect his location and his number from intercept, he
registers on a non-wire line system and then "roams" in whatever city he's
located in, so, in order for his customers to reach him, they will have to
dial the local roamer number, then punch in the area code and phone number to
connect.
The transmitter could be 10' from the re- ceiver, it makes no difference.
This technique protects the caller's location and it protects the location of
the "customer" because he can't be isolated from the roamer truck, making it
effec- tively impossible to place intercept equipment to track and record the
unit's conversations.
The roam feature knocks the caller out of the regional system that normally
covers north, south, east or west in any area. Of course, the user is paying
the price of a toll call, and roaming calls are always more expensive than
non-roamers. But still...
By choosing the other wire/non-wireline system the phone will automatically
operate in the roaming mode. Something to remember, just in case that, well,
that your uncle from New Jersey drops in for an unexpected visit. . .
CELL CONSTRUCTION
AND INTERCEPTION TECHNIQUES
Law enforcement types can purchase sets to monitor, track and record cellular
phone calls. These sets are damn expensive from suppliers like HDS and are
usually just test sets designed to monitor cellular operations for a carrier.
They're still damn expensive.
If someone tries to intercept a call with a test, the results will be
printed out (including new handoff frequencies) and the sets can manually
switch to it almost as fast as the mobile does. That's because a certain
signal is transmitted in the voice channel just before the handoff containing
the mobile change frequency.
This means, among other relevant tidbits, that a person, hopefully a person
in Law Enforcement, who has a monitor that will read the overhead train
(usually a modified IFR service monitor, $25-$35K) can actually tell if a
subject is in a certain city and follow him from cell to cell even if he
doesn't make a singlephone call, as long as his phone is tumed on... In some
systems.
These sets are out of the reach of most police departments at this time, but
many big cities are purchasing some sort of auto-record equip- ment and trust
me, the Feds do have them, my friend.
Test sets such as those produced by IFR will reveal everything going on. It's
their job, after all. A good test set will not only listen to the audio, it
will display all the monitor data in the proper form and anything else asked
of it.
The test set, whether sold to telco suppliers or with a value added (say
$10,000) and sold to law enforcement as an intercept station, can mimic a base
station or it can metamorphosize itself into a mobile unit. It can follow
every handoff via the ESN or phone number auto- matically.
Test sets are programmed to become a certain mobile at any given notice and
record what calls it receives, when it changes to a different frequency and so
on. Although originally designed for sorting through a system they are ideal
for interception within any metropolitan area. Some cellular operators now
maintain a certain portion of their switch physically in the open so law
enforcement folks (armed with a warrant) can hook up their recorders right at
the switch without disturbing the phone company's personnel or equipment. The
telephone companies have only a certain number of spare ports to hook on to. A
few govemment agencies, like the Bureau had a habit of grabbing them up,
making it difficult for other companies to get them. For quite a while the
telephone companies were lying, saying they didn't have the ports avail- able,
forcing them to use a service monitor. However, so many cellular intercepts
came through that telephone companies are required by law to give the minimal
cooperation neces- sary. In the State of NewJersey, for instance, there is a
new phone building in North Jersey that has a separate room to house the
intercept equipment with space for any law enforcement goodies (slaves, etc.)
to live and work. New cellular switching stations are put~ng an appearance
outside for empty TSO's so the cops don't bother them all the time. The
routine is: Show me some paper-go hook up.
It does happen.
By understanding the concept of cellular placement and frequency allotment it
is ver,v possible to monitor cellularphone calls. Author Bill Cheek in his
fine book "Scanner Modifica- tion Handbook," published by CRB Research Books
Inc., describes cellular layout and how it can be tracked with a scanner. This
system is absolutely right-on and we are reprinting it (with permission from
Mr. Cheek and Tom Kneitel of CRB Research) here in full as our first find 'em
technique.
Table 3-1
CELLULAR BAND FREQUENCY ALLOCATIONS
Wireline (telephone company) cell sites
(bases): 880.020- 889.980
Wireline (telephone company) mobiles
(car phones): 835.020 - 844.980
Non-wireline company cell site
(bases): 870.030- 879.990
Non-wireline company mobiles
(car phones): 825.030 - 834.990
Since cellular systems are computer con- trolled and operated, the digital
data channels are always going full blast with an annoying buzzsaw sound.
These control frequencies are shown in Table 3-2.
Table 3-2
CELLULAR MOBILE TELEPHONE COMPUTER
CONTROL FREQUENCIES
Wireline (telephone company) cell site
(bases): 880.020 - 880.620
Wireline (telephone company) mobiles
(car phones): 835.020 - 835.620
Non-wireline company cell site
(bases): 879.390 - 879.990
Non-wireline company mobiles (car phones): 834.390 - 834.990 With 30 kHz
channel- spacing, in a typical 870 to 880 MHz, or 880 to 890 MHz system, there
are twenty-one computer control channels and 312 channels for voice, for a
total of 333 channels for each service provider. This, then, breaks down into
what might be considered several voice bands for cell sites and mobiles:
Band #1 870.030 to 879.360 MHz
(Non-wireline cell sites)
Band #2 880.650 to 889.980 MHz
(Wireline cell sites)
Band #3 835.650 to 844.980 MHz
(Non-wireline mobiles)
Band #4 825.030 to 834.360 MHz
(Wireline mobiles)
The bases (cell cites) use more power than the mobile units, and have antenna
systems that are higher and more formidable than the mobile units. As a
result, the cell sites present strong signals. Moreover, in almost all in-
stances, the cell sites transmit both sides of all conversations inasmuch as
they repeat the received signals from the mobile phones with which they are in
communication.
You might wish to refer to Tables 3-3 and 3-4 which depict the unique
frequency layout for up to seven cells. This is a complete cellular system
frequency layout plan for wireline and non-wireline systems. Visualize a
system this way: In order to avoid adjacent (side-by-side) cells from having
the same frequencies to interfere with one another, seven cells are required;
one at the center and six more sur- rounding the center cell. There is no
particular pattern as to how Cells "A" through "G" have to be laid out. That
is, Cell "D" can just as readily be a center cell with the others circling it,
as could any other combination. In a metro system consisting of many cells,
there isn't any such thing as a "center" cell, because every cell is, in
effect, a "center cell" with respect to six others which surround it.
Generally speaking, two cells can (and do) operate on the same frequencies
when they are separated by at least one different cell. Actually, the seven
cell system unit as depicted in Figure 3-1 is used over and over. Two or even
more adiacent cells on different frequencies are located between any two cells
on the some frequencies. The cellular concept thus takes advantage of low
powered, short range 800 MHz propagation to reuse the same frequencies at
several different cell sites in a large metro region. If this weren't
possible, then only 312 simultaneous conversations could take place at any one
time, as it is thousands of simuIta- neous conversations could be accommodated
within a large cellular system, thanks to fre- quency reuse.
Another factor here is the unique side effect of Frequency Modulation (FM)
where an FM receiver exclusively "hears" the stronger of two signals presented
to it on the same frequency.
So when cells on the same frequency are separated by one or more cells, even
though a mobile might be positioned to detect signals from either, it actually
will accept only the strongest one. The odds are very slim of the mobile being
located precisely where the two signals are exactly equal. But even in that
case, the odds against interference are improved even more because chances are
virtually certain that the mobile would be under the control of a stronger
third cell site signal on a different frequency.
Not only do two adjacent cells use the same frequencies, but no two cells
use adjacent frequencies. For example, a given cell (Cell "D") that transmits
on 880.950 MHz will not trans- mit on 880.980 MHz nor on 880.920 MHz.
Likewise, mobiles within any given cell will not transmit on adjacent
frequencies. This arrangement prevents adjacent channel inter- ference in
receivers located at cell sites and mobile units. FM receivers are not very
selective to begin with, and the use of adjacent channels would cause
interference within a cell. The scheme depicted in Tables 3-3 and 3-4 was
created to minimize the chances of adja- cent channel interference throughout
the entire cellular system. Note that each cell is allocated 47 or 48
frequencies, with a spacing of 210 kHz (seven channels) between each assigned
frequency. In that manner, adjacent frequencies are not used in the same or
adjacent cell sites.
DISCUSSION OF FIGURE 3-1:
Figure 3-1 illustrates the concept of a very large cellular mobile telephone
system. Cities and metro complexes are rarely symmetrical due to geographical
and other considerations, so Figure 3-1 is elongated to simulate the
configuration of a realistic cellular network.
Cities tend to grow along railroads, rivers, and major highways, so the
cellular system here is designed accordingly. Most are not this large, with
the typical system consisting ofthree to seven cells. Small communities might
even be served with a single cell, while metro areas like Los Angeles and New
York City might consist of a number of interconnected systems fanned out to
form a huge network. Frankly, size doesn't matter, because of low power, short
range, and frequency reuse. The potential size of a cellular system is
unlimited, so let's use Figure 3-1 to discuss how a "typical" system is
structured:
FIGURE 3-1.
TYPICAL CELLULAR SYSTEM LAYOUT
1. Cells of the same letter operate on same frequency groups. See Tables 3-3 &
3-4.
2. Numerical designator distinguishes cells of the same letter/frequency
group-otherwise there is no difference.
3. Two companies are permitted to operate cellular systems in any given metro
area. The two systems will be laid out functionally as shown above, even
though the physical layout will be different.
1. A hexagon is used to depict a cell's coverage territory, but the actual
coverage wouldn't be that shape; it would be more-or-less circular,
depending upon terrain and geogra- phy. However, circles don't illustrate
the cellular concept as well as hexagons, and that is why hexagons are
usually used in diagrams of cellular systems.
2. No two adjacent cell cites use the same frequencies. In other words, two
Cell "A's" are never side-by-side, nor two Cell "B's," nor Cell "C's," etc.
At least one cell site on different frequencies is always located between
two other cell sites that are assigned the some frequencies.
3. No two adjacent cell sites are assigned adjacent frequencies. So, Cells "A"
and "B" are never located next to each other. Neither are Cells "A" and
"G," or "B" and "C," etc. At least one different cell site is always
located between two other cell sites that are assigned adjacent
frequencies.
Summary: Each cell site is always assigned frequencies that differ by 60 kHz
or more from cell sites that are adjacent to it.
FIGURE 3-1
TYPICAL
CELLULAR
SYSTEM
LAYOUT
This information, while perhaps boring to lay readers, might be very useful
or handy to persons such as law enforcement officers performing
court-warranted electronic surveil- lance on cellular conversations of a drug
dealer-in-as-much as DEA and other enforce- ment officials have long been
aware that cellular phones have become heavily used by drug traffickers.
So, let's say that an authorized surveillance is taking place and the
suspect is monitored on 880.740 MHz, which is depicted in Table 3-1 under Cell
"D." Everything's fine, and the suspect starts to advise his party to meet him
at -, and then right at the crucial moment, the suspect's car enters the
control of a differ- ent cell site, and presto, the channel goes dead.
Putting the scanner into "Limit Search" mode in an attempt to track the
conversation would bring only frustration; might as well have a cup of coffee
and call it quits for the night. Chances are that the suspect's resumed
conversation will not be encountered. The "Search" mode tracks in a linear,
consecutive- frequency order, either higher or lower. If the suspect's
conversation should be relocated, it would certainly take a while.
There would, however, be a way of increas- ing the chances of zeroing back
in on the suspect. First, the scanner would have to be programmed with each
individual cellular frequency in order by cell sites as depicted in Table 3-3
or 3-4. For such an operation, it would be highly beneficial to be working
with a Realistic PRO-2004/2005 that has undergone the 6,400 channel memory
modification outlined in this book (ed. note-Bill's book) (MOD-16) so that
wireline and non-wireline cell site channels could be programmed.
There wouldn't be any reason to program any of the data-only control
channels, but the scanner could be programmed with Channel 1 = 880.650 MHz;
Channel 2 = 880.860 MHz; Channel 3 = 881.070 MHz, etc. Channel 40 would have
888.840 MHz, then continuing with Ch. 41 = 889.050 MHz and ending all Cell
"A's" programming with Ch. 45 = 889.890.
Then, all zeros would be entered into Ch. 45 to 50, with Cell "B"
programming as: Ch. 51 = 880.680 MHz; Ch. 52. = 880.890 MHz; through Ch. 95 =
889.920 MHz. All zeros would go into Ch. 95 to 100, and Cell "C" program- ming
would start in Ch. 101 with 880.710 MHz. Get the picture?
When completed, the wireline company's 312 voice channel's would have been
pro- grammed into the agency's scanner, organized by cell sites and frequency
allocations.
This would be particularly useful to the surveillance officer because, as
noted earlier, when a mobile unit passes from one cell to another, the new
frequency will not be in the old cell's assignment nor will it be an adjacent
frequency!
Therefore, one could logically eliminate the frequency assignments of three
cells from any consideration. So, when the suspect's conversa- tion gets
handed off from one cell to another, up to three scan banks that are known not
to contain the call are deselected.
The scanner could then check for the re- sumed conversation on the remaining
sites and probably locate same rather quickly, as in the example following the
frequency tables.
CELL A CELL B CELL C CELL D CELL E CELL F CELL C
-I- ======= ======= ======= ======= ======= ======= =======
wireline 889 890 889 920 889 950 889 980
company cell889 680 889 710 889 740 889 770 889 800 889 830 889 860
site x-mit 889 470 889 500 889 530 889 560 889 590 889 620 889 650
& mobile 889 260 889 290 889 320 889 350 889 380 889 410 889 440
receive 889 050 889 080 889 110 889 140 889 170 889 200 889 230
frequeencies888 840 888 870 888 900 888 930 888 960 888 990 889 020
888 630 888 660 888 690 888 720 888 750 888 780 888 810
888 420 888 450 888 480 888 510 888 540 888 570 888 600
888 210 888 240 888 270 888 300 888 330 888 360 888 390
888 000 888 030 888 060 888 090 888 120 888 150 888 180
887 790 887 820 887 850 887 880 887 910 887 940 887 970
887 580 887 610 887 640 887 670 887 700 887 730 887 760
887 370 887 400 887 430 887 460 887 490 887 520 887 550
887 160 887 190 887 220 887 250 887 280 887 310 887 340
886 950 886 980 887 010 887 040 887 070 887 100 887 130
886 740 886 770 886 800 886 830 886 860 886 890 886 920
886 530 886 560 886 590 886 620 886 650 886 680 886 710
886 320 886 350 886 380 886 410 886 440 886 470 886 500
886 110 886 140 886 170 886 200 886 230 886 260 886 290
885 900 885 930 885 960 885 990 886 020 886 050 886 080
885 690 885 720 885 750 885 780 885 810 885 840 885 870
885 480 885 510 885 540 885 570 885 600 885 630 885 660
Voice 885 270 885 300 885 330 885 360 885 390 885 420 885 450
Channels 885 060 885 090 885 120 885 150 885 180 885 210 885 240
884 850 884 880 884 910 884 940 884 970 885 000 885 030
884 640 884 670 884 700 884 730 884 760 884 790 884 820
884 430 884 460 884 490 884 520 884 550 884 580 884 610
884 220 884 250 884 280 884 310 884 340 884 370 884 400
884 010 884 040 884 070 884 100 884 130 884 160 884 190
883 800 883 830 883 860 883 890 883 920 883 950 883 980
883 590 883 620 883 650 883 680 883 710 883 740 883 770
883 380 883 410 883 440 883 470 883 500 883 530 883 560
883 170 883 200 883 230 883 260 883 290 883 320 883 350
882 960 882 990 883 020 883 050 883 080 883 110 883 140
882 750 882 780 882 810 882 840 882 870 882 900 882 930
882 540 882 570 882 600 882 630 882 660 882 690 882 720
882 330 882 360 882 390 882 420 882 450 882 480 882 510
882 120 882 150 882 180 882 210 882 240 882 270 882 300
881 910 881 940 881 970 882 000 882 030 882 060 882 090
881 700 881 730 881 760 881 790 881 820 881 850 881 880
881 490 881 520 881 550 881 580 881 610 881 640 881 670
881 280 881 310 881 340 881 370 881 400 881 430 881 460
881 070 881 100 881 130 881 160 881 190 881 220 881 250
880 860 880 890 880 920 880 950 880 980 881 010 881 040
880 650 880 680 880 710 880 740 880 770 880 800 880 830
Digital 880 440 880 470 880 500 880 530 880 560 880 590 880 620
COntrOI 880 230 880 260 880 290 880 320 880 350 880 380 880 410
ChannelS 880 020 880 050 880 080 880 110 880 140 880.170 880.200
Non_wireline company cell site transmit & mobile receive frequencies
CELLA CELL B CELL C CELL D CELL E CELL F CELL G
======= ======= ======= ======= ======= ======= =======
Digital 879.900 879.930 879.960 879.990
Control 879.690 879.720 879.750 879.780 879.810 879.840 879.870
Channels 879.480 879.510 879.540 879.570 879.600 879.630 879.660
879.270 879.300 879.330 879.360 879.390 879.420 879.450
879.060 879.090 879.120 879.150 879.180 879.210 879.240
878.850 878.880 878.910 878.940 878.970 879.000 879.030
878.640 878.670 878.700 878.730 878.760 878.790 878.820
878.430 878.460 878.490 878.520 878.550 878.580 878.610
878.220 878.250 878.280 878.310 878.340 878.370 878.400
878.010 878.040 878.070 878.100 878.130 878.160 878.190
877.800 877.830 877.860 877.890 877.920 877.950 877.980
877.590 877.620 877.650 877.680 877.710 877.740 877.770
877.380 877.410 877.440 877.470 877.500 877.530 877.560
877.170 877.200 877.230 877.260 877.290 877.320 877.350
876.960 876.990 877.020 877.050 877.080 877.110 877.140
876.750 876.780 876.810 876.840 876.870 876.900 876.930
876.540 876.570 876.600 876.630 876.660 876.690 876.720
876.330 876.360 876.390 876.420 876.450 876.480 876.510
876.120 876.150 876.180 876.210 876.240 876.270 876.300
875.910 875.940 875.970 876.000 876.030 876.060 876.090
875.700 875.730 875.760 875.790 875.820 875.850 875.880
875.490 875.520 875.550 875.580 875.610 875.640 875.670
875.280 875.310 875.340 875.370 875.400 875.430 875.460
voice 875.070 875.100 875.130 875.160 875.190 875.220 875.250
channels 874.860 874.890 874.920 874.950 874.980 875.010 875.040
874.650 874.680 874.710 874.740 874.770 874.800 874.830
874.440 874.470 874.500 874.530 874.560 874.590 874.620
874.230 874.260 874.290 874.320 874.350 874.380 874.410
874.020 874.050 874.080 874.110 874.140 874.170 874.200
873.810 873.840 873.870 873.900 873.930 873.960 873.990
873.600 873.630 873.660 873.690 873.720 873.750 873.780
873.390 873.420 873.450 873.480 873.510 873.540 873.570
873.180 873.210 873.240 873.270 873.300 873.330 873.360
872.970 873.000 873.030 873.060 873.090 873.120 873.150
872.760 872.790 872.820 872.850 872.880 872.910 872.940
872.550 872.580 872.610 872.640 872.670 872.700 872.730
872.340 872.370 872.400 872.430 872.460 872.490 872.520
872.130 872.160 872.190 872.220 872.250 872.280 872.310
871.920 871.950 871.980 872.010 872.040 872.070 872.100
871.710 871.740 871.770 871.800 871.830 871.860 871.890
871.500 871.530 871.560 871.590 871.620 871.650 871.680
871.290 871.320 871.350 871.380 871.410 871.440 871.470
871.080 871.110 871.140 871.170 871.200 871.230 871.260
870.870 870.900 870.930 870.960 870.990 871.020 871.050
870.660 870.690 870.720 870.750 870.780 870.810 870.840
870.450 870.480 870.510 870.540 870.570 870.600 870.630
870.240 870.270 870.300 870.330 870.360 870.390 870.420
870.030 870.060 870.090 870.120 870.150 870.180 870.210
======= ======= ======= ======= ======= ======= =======
EXAMPLE
Suspect is on a frequency in Cell "D" when the call is switched. The officer
immediately knows that the new cell will not be "C," "D," or "E," so those are
deselected and the scanner does not bother with them. The suspect will be on
only one of about 180 possible frequencies, which the officer could locate
within thirty seconds or less if he knows what to do and can react quickly
enough. If he had unsuccessfully used the "search" to look for resumed
conversa- tions, there were more than 300 frequencies to check through that
way. Note: If the suspect was originally in Cell "A," then Cells "B" and "G"
can be eliminated as possibilities. Likewise, if the original call was in Cell
"G," then calls from Cells "A" and "F" would be eliminated.
Remember: Cells of the same and/or adjacent frequencies are never physically
located next to another! A judicious law enforcement surveil- lance expert
would use both the "scan banks" and the "search" feature as tools to relocate
a handed-off cellular conversation.
Note: Cellular handoffs occur quite rapidly, especially when a mobile goes
from one cell through the fringe area of a second and then soon after into a
third cell. The two handoffs could take place within seconds, and a search for
the first handoff could well be in progress when the second handoff takes
place. That's when a cell map of a particular area or system would come in
handy.
Since the time Bill calculated the above information, new frequencies have
been allocated to cellular companies as follows:
824.010 - 834.990 Mobiles non-wireline A
835.020 - 844.980 Mobiles wireline B
845.010 - 846.480 Mobiles non-wireline A
846.510 - 849.000 Mobiles wireline B
869.010 - 879.990 Bases non-wireline A
880.020 - 889.980 Bases wireline B
890.010 - 891.480 Bases non-wireline A
891.510 - 894.000 Bases wireline B
It would be a simple matter to create the same frequency-cell tables with
these new frequencies.
OUR OWN REFINEMENTS:
I sat in on a cellular phone interception project with a couple of law
enforcement types during the writing of this book using an offshoot of Bill's
idea. Here's how they did it:
The target was operating in a major metropoli- tan city in the U.S. with a
number of hills and dead airvalleys. The LPwas situated in a house on a hill
that overlooked much of the city.
The LP was equipped with an ICOM 7000 receiver and a non-directional 800
sensitive antenna. The ICOM had been modified slightly by clipping an intemal
lead which allowed it to receive a baud rate of 9600.
The receiver was connected to an IBM PC clone that was loaded with a
frequency scan- ning program called Program 801. The local frequency banks
were programmed into the computer and we had a colleague watching the target's
residence.
When the target left his residence, the watcher called us on his cellular
phone and so informed us-we began scanning.
Within a few moments we had identified the subject by both his voice and the
subject of the conversation on a certain cell. When a handoff to another cell
occurred, the F4 key was stroked on the computer and it began to look through
the logical frequencies.
Did it work? The intercept was conducted on a weekend so, admittedly, the
traffic was light but in every case we found the target within a few seconds.
The maximum conversation loss was at most, 20 seconds.
The ICOM and the elevated listening post followed the target through each
and every cell as he changed position. There was NO cell that he accessed that
we could not receive from our stationary LP.
INDIVIDUAL CELLULAR TAILING
Another system tested for this book which proved luite invigorating was to
take a Motorola bench equency counter and equip it with a directional antenna.
This set up allowed me to follow a icular subject from a distance of 100-200
feet ~d simply read the operating frequency of his cellular whenever it was
put into use.
The keys to this system are to use a 12 volt bench counter with high
sensitivity and a gain antenna. Omni direction cellular antennas are limited
by a 3 dB gain. Use at least a 5 dB gainer from the 800 business band, or,
better yet, a Yagi transmit/receive antenna from one of several antenna
suppliers.
This will make it directional but will make the entire conceptviable. Remem-
ber, although the carphone onlybroad- casts one side of the conversation, the
cell rebroadcasts both at a frequency of 45 MHz lower than the mobile channel.
When the frequency counter latches on to a frequency, a handheld scanner is
manually pro- grammed to the correct frequency and the entire conversation is
monitored.
When a handoff occurs the new frequency is quickly acquired in a similar
manner and the monitoringresumes with only a minor loss of conversation. It is
possible to drop back from the 200 foot limitation until a handoff occurs at
which time the LP car must move back into position, but only long enough for
the counter to read the new frequency. And now folks, there's a brand new tool
about to come onto the market as we speak which does a much better job than on
individual intercepts.
A TRICK
Besides the previously-detailed cellular system there used to be a pattem in
use that involved 12 cells. This gave no adjacent fre- quencies in any
adjacent cells, but most cities have given that up and gone to above, more
compact 7 factored pattem because it offers more frequencies in each cell (1
of 7 instead of 1 in 12). The current system is likely to remain around a
while because it's about as down as it can be taken without bringing in
directional antennas.
TECHNIQUES FOR INCREASING CELLULAR DENSITY
It is possible to use a 320 degree directional antenna by having a heavy
signal lobe to avoid pickups of signals from the back side from that
particular antenna segment. This gives the option to the frequency right
behind it fairly close in so we get a liffle more density in a particular
system. Another approach to get more capacity buries some low power channels
in the middle of a particular cell which are so low in power that they don't
really get out to more than half way of the radius. It is then possible to use
these same allocations somewhere else because they interfere less than the
channels that run full power.
PHONE NUMBERS AND ESN S
The actual phone number is stored in a pro- grammable chip known as a NAM. In
most parts of the country this chip must be pre- programmed with an available
number on one of the local companies before the phone can be sold, or at least
before it can be put into use. The NAM is a 16 digit chip which contains the
phone number plus other info-in older style phones they are programmed in an
EPROM. New phones have programming capability built into their handsets. The
ESN or electronic serial number (some- times referred to as Electronic
Identification Number, EIN) is not stored in the in NAM chip. At the moment
there are about 125 different phones being manufactured and they all store the
ESN in a different place in their memory in either an EPROM or a ROM. Each
company can, and does utilize separate locations and different methods of
coding. NAM's themselves can be programmed at such mundane points of purchase
as Radio Shack stores. NAM programmers are openly available for about $1,000.
What is to stop someone from cloning a phone so their cellular will ring every
time a target's does? or even so when the cloned phone makes a call, the
target w~uld he hilled?
Several things, the first being the law of the land. No clones allowed. A
larger barrier is posed by the inclusion of the (usually) nonprogrammable
electronic serial number that is often accessed with the phone number. If a
set is stolen this number is put on a com- puterized hot list which shows up
immediately when the unit is used. Some new switches are also rumored to be
able to tell if more than one phone with the same number is on line at any
given time by comparing the serial numbers in a real time situation.
Does this mean no clones?
Well, not exactly. See early phones, before somebody in power decided the
ESN's should be a permanent part of the unit, allowed both NAM and ESN
programming. When research- ing this article, I was offered a series 1 or 2
Novetel mobile phone cloned to any set of numbers I required for $600.
This is to allow busy executives the opffon to have an extension mobile but
it could also be rigged to act as an unscrupulous clone, ringing and recording
every call made to the target number.
I have also been told of black market chips that can replace the ESN chips
in modem phones. The FCC doesn't like these, the phone associations don't like
these and even, yes, the FBI don't like these...
Although most people don't realize it, cellulars broadcast a super audible ID
tone along with the normal audio. The operator will not hear this because it's
filtered out, but it provides three choices for security, helping to make
certain that only one phone is on the system at any one time. The system
listens to what id tone is offered and if it's the wrong one, it'll disconnect
the offender.
This feature is designed to protect against radio propagaffon faults wherein
the signal comes back to the base too strong and over- powers the desired
signal but it is also a factor in cloning because the system will allow 5
seconds for the proper signal and then it willdisconnect the "wrong" signal
automatically. Not a perfect system, but one that must be taken into account
for any cloning attempt.
In fact, there are modified cellulars on the black market that the various
government agencies lLke even less than they do clones. I was also offered a
modified phone that would come up with a random and differentESN and serial
number every time it was used for $2500!
This option lets the user put the phone into the roam mode so it would
access this "traveler's" feature on every call but bill it to a different
number each time.
At first glance this seems to be the ideal (criminal) way to beat phone
charges since the unit will bill to a different number on every call the
operator will not be bothered by those annoying little notices from the local
telco every month.
But the real selling feature of this type of phone is that it cannot be
legally monitored. If a law enforcement agency gets a court order to monitor a
particular telephone (identified by the phone number) it will not be valid,
and in fact will not work if the unit in question changes its identity like
some sort of maddened electronic chameleon every time it is used...
Bet the farm I ain't the only person who has been offered one of these
phones...
In fact, one basic cellular flaw is considered to be the existence of fraud.
The rules of the FCC and the Canadian Department of Commu- nication require
portable phones have an unchangeable identification in a read-only memory in
the set. The wording says it should not be possible to modify the
identification without rendering the set inoperative. One industry study
recently reported that it was possible, with varying degrees of difficulty, to
change the identification in about 80% of the sets which are now out in the
field.
Fraud, fake, and oscillating ESN numbers are estimated to account for
somewhere between 4% of the industry's gross billing.
One of the inducements to fraud is that when a mobile identifies itself, the
local system has to decide if it should query the mobile for the full 10
digits or only 7 of the actual phone number? Should the ESN be required? Some-
times the operating company, to save on transmission time, cuts down on the
number of digits that are transferred in these opera- tions, especially at
rush hour.
Regardless of the saturation ad campaigns for cellular use, the systems are
filling up fast and most claim to operate at only marginally profitable
levels, yet corporations are always interested in purchasing cellular
companies. Why?
They're buying future potential. Capacity limitation will become a thing of
the past when digital cellular comes into play (scheduled to be the norm
within five years) because digital systems can multiplex 3 or more
conversations on each channel.
The technique has been standardized al- ready. There is digital equipment on
the market available for use with the proper support equipment already
although all the in-place equipment will be continued to be supported for
several years, probably until the end of the century, but digital will
gradually take over the market as surely as color television edged out black
and white.
Digital has several appetizing features for cellular users. It involves using
a digital code technique for speech to use 16,000 bytes per second per radio
channel, per conversation. This, plus 3-5 different conversations on each
channel, simultaneously will make the format secure from casual eavesdroppers.
Without a doubt scanner adaptable modules will be marketed to decipher and
demultiplex digital cellular, but from the point of view of security, the
important thing is that when digital speech coding is present one can take
advantage of these superior techniques inher- ent in encrypting digital
signals as opposed to the problems of scrambling analog dialogue.Systems are
now available (see the scrambling section) which will lock out almost
everybody but are still not considered military level secure. Digital
suppliers will probably offer a option for secrecy levels than it is to
constructively distort voice transmissions.
If you need to have a sensitive conversation during a mobile situationyou
have two choices, use a digital scrambler, or stop and use a coin phone by the
side of the road.
Remember this fact.
At one point I took a mobile phone and made a call to a friend and for about
15 min- utes, in the middle of a normal business day, drove around running a
tape asking anyone who was listening in on a scanner to give me an anonymous
phone call for a research study.
In the city of San Francisco I got three calls from casual listeners.
And these were just the people who bothered to call...
DATA AND FUTURE MODES
Because cellular was designed for audio and, at this writing, uses analog FM
transmission, it is difficult to transmit data over the system even though
mobile faxes and modems are available.
Using an ordinary data modem of the type that would be utilized on a
landline telephone, provides less than normal service. One problem is that as
the position changes the mobile passes through a combination of direct and
reflected radio waves which can get out of phase with each other and produce a
phenom- enon called multipath which means that the RF signal is going
constantly up and down like an elevator. The resulting conglomerate is okay
for speech but for data it's a no-no.
In most cases the solution to this is to stop the car. Immediately the
quality will improve and reasonable results will occur AS LONG AS A LOW BAUD
RATE IS MAINTAINED. This is important in digitally-scrambled transmissions, as
well as in data swapping, as well as with mobile FAX transmissions.
Any rate over 2400 is likely to cause some problems.
A new possibility for increasing the availabil- ity of cellular channels has
already been brought before the FCC. This new system is microcellular in
design and uses spread spec- trum technology.
The company that requested a license for this technology (Millicom) has
requested a frequency band in the 1710-2290 MHz region.
Great Britain is testing out a very short range RF-based system known as
Telepoint. This concept gives the user a small, portable unit for a base fee
of $12-$15 per month that can be used as a wireless/cellular phone only when
the operator is within 300 feet of a clearly marked base station.
Many base stations can be located in any given area because they cost only a
fraction of a cellular site and they are extremely low in power.
TAPPING CELLULARS
At first glance it seems to be an oxymoron- why tap a cellular? I mean the
damn things broadcast over the public air waves with 600 beautiful milliwatts
of power. Who needs to tap?
Some people, that's who. Someone out there needs to tap anything and right
at this mo- ment there are about 32 readers wondering how to tap a cellular.
The quickest method to hear at least one side of any conversation is simply
to secret a VOX activated tape recorder in the car. And hope the driver
doesn't play the stereo too loudly...
Saul Mineroff offers a car caddy, you know, one of those things that holds a
Big Mac and a drink and slips over the transmission console, with a great
little stereo recorder built right into the unit.
It would make a nice gift for, say your wife...
Olympus Corporation markets (available from C.I.A., the company, not the
company) a series of drop out recorders for cellular phones. These liffle
boxes connect between the handset and the phone and operate just like a
regularrecord both sides of the conversation when the phone is taken off hook.
These units, called Woodbury Interfaces, are not designed to be hidden but
are supposed to be used to record one's own conversations (legal in one-party
states) for later study.
They can be used somewhat surreptitiously by stashing them, along with a
mini recorder, in some sort of camouflaged unit like the Mineroff car caddy,
or even installed under the phone itself or under the upholstery.
Two elements necessary for success here are access to the target vehicle and a
not overly observant driver.
AID makes a bug that is concealed in a rechargeable Motorola-type battery
for portable phones. This unit works off the battery, which still operates the
phone, and picks up and transmits local conversation.
It would be possible to design some sort of infinity transmitter for a
cellular, although each make of phone is different enough to require some
uptown design work and when the transmitter was in operation, all the air time
would be billed to the target, allowing him a nice printout of the connection.
A wiser move would be to employ some sort of hookswitch bypass so the phone
would be hot on hook and broadcast the local audio. However, even this
technique has problems because it could easily cause interference problems
with other phones and might alarm the switch because more than one phone would
be on a single channel.
A quick thought: You want to record a cellular conversation that you are
part of without alerting anyone else in the car? Think ear mic's (devices that
receive and transmit inside the user's ear and look like a miniature earphone)
put one in your ear and have a conversation.
The DEA recently bought 1,000 of these from, well, from an unnamed New York
sup- plier.
A cellular phone can also be "accidentally" left operating after a call is
made to a recording phone. If l~ ehind ~n a ~u~iness conference, it will work
as a long distance bug. Some portable cellulars are now made with a hot switch
so they will broadcast to a nearby re- ceiver for the same sort of "forgetful"
bug~in~.
"CELLULAR PHONES ARE IMPOSSIBLE TO MONITOR"
RIGHT