posted on Jun, 7 2013 @ 02:38 AM
2G-3G Mobile Network Range Requirements
I. INTRODUCTION The 2G-3G Mobile Network Range (Mobile Network Range) will be a testing environment for third party applications. The subjects under
test are the third party applications not the network. The testing environment must be configurable to emulate a carrier network. Instrumentation
will be placed at various access and core network interfaces to collect data on application performance so all core and access network interfaces must
The Mobile Network Range access network components shall be delivered in a ruggedized rack mount case.
14. The Mobile Network Range access network components plus ruggedized case lifting requirement shall not exceed those of a 2 man lift. . 15. The
core network may be mounted in either a ruggedized rack mount case or may be designed for a fixed installation capable of remote trunking. 16. .
Well I can see two uses for this cell phone test range. One, the base is developing applications and wants to see if they are hackable. I suppose this
could be done on an existing network, but maybe they are going to do hacking that involves transmitting on the network with something other than a
phone. That is, they don't want to interfere with a commercial network and make headlines in the newspaper.
On the other hand, perhaps they are training to monitor cell phones, i.e. stingray, or practice silent ping direction finding.
If this ever becomes operational, there are phone appications to see the Mobile Country Code (MCC) and Mobile Network Code (MNC). It will show up on
any GSM phone that supports manual scans as some weird network.
For those not familiar with silent pinging, you can send a text message to a phone without it showing up as a message as far as the recipient is
concerned. The phone will acknowledge this message, i.e. you have forced the phone to transmit at will, and then you can "direction find" (DF) the
phone by a number of means. At one time you could overload the phone with a number of rapid silent pings, but most networks filter this kind of
attack. The silent ping is used by law enforcement, mostly outside the US.
In the US, the hacking tool of choice by law enforcement is the Stingray.
Stingray on wiki
The silent ping phone location scheme is quite legal. The Stingray is a bit suspect since it involves creating what looks like a cell tower to the
subject's phone, but in reality the phone is talking to your tower. You then lower the encryption level and hack the phone.