In the last years, mobile security and specifically GSM has been attacked in many different ways. It was demonstrated how to sniff and crack traffic, how to impersonate a subscriber by placing a fake call and the general security characteristics of this mobile protocol stack have been evaluated.
In this presentation, we will check out a part of the protocol procedures that hasn't been looked at yet, specifically Mobile Terminated services.