{"guid":"import-044a4bc90d533f8e0d","title":"3G Investigations","subtitle":"Scanning your GPRS/UMTS IP network for fun and profit","slug":"22C3-567-en-3g_investigations","link":"http://events.ccc.de/congress/2005/fahrplan/events/567.en.html","description":"We are giving an overview of ip networks used for \u003e=2.5G technologies. Our main focus is on scanning the overlaying ip network, on different Voice-over-IP filter implementations and the possibilities to circumvent them.\n","original_language":"eng","persons":["Achim 'ahzf' Friedland","Daniel 'btk' Kirstenpfad"],"tags":["22c3"," Hacking"],"view_count":197,"promoted":false,"date":"2005-12-28T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2025-12-28T12:00:13.148+01:00","length":3125,"duration":3125,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-567-en-3g_investigations.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-567-en-3g_investigations_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-044a4bc90d533f8e0d-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-044a4bc90d533f8e0d-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-567-en-3g_investigations","url":"https://api.media.ccc.de/public/events/import-044a4bc90d533f8e0d","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":710,"event_guid":"import-996ee6767784dc2e88","weight":5},{"event_id":924,"event_guid":"import-8bf1e2b44448e3f277","weight":4},{"event_id":931,"event_guid":"import-aff35a6cca25642871","weight":5},{"event_id":934,"event_guid":"import-67d60c82e456bd5ed2","weight":2},{"event_id":961,"event_guid":"import-14658f50e46cb66e2f","weight":2},{"event_id":1020,"event_guid":"import-8fb016024e60722cef","weight":3},{"event_id":1024,"event_guid":"import-380a620688f8b30ed1","weight":2},{"event_id":1187,"event_guid":"import-f50e40b051718848b9","weight":2},{"event_id":3514,"event_guid":"1fdb49e7-9f3d-4450-936e-8aae911d1aa2","weight":3}],"recordings":[{"size":110,"length":3125,"mime_type":"audio/ogg","language":"eng","filename":"22C3-567-en-3g_investigations.ogg","state":"downloaded","folder":"lectures/audio/ogg","high_quality":true,"width":320,"height":240,"updated_at":"2014-05-10T15:26:36.110+02:00","recording_url":"https://cdn.media.ccc.de/congress/2005/lectures/audio/ogg/22C3-567-en-3g_investigations.ogg","url":"https://api.media.ccc.de/public/recordings/1621","event_url":"https://api.media.ccc.de/public/events/import-044a4bc90d533f8e0d","conference_url":"https://api.media.ccc.de/public/conferences/22c3"},{"size":110,"length":3125,"mime_type":"video/mp4","language":"eng","filename":"22C3-567-en-3g_investigations.m4v","state":"downloaded","folder":"lectures/video/mp4-avc/320x240","high_quality":true,"width":320,"height":240,"updated_at":"2016-01-27T11:03:16.995+01:00","recording_url":"https://cdn.media.ccc.de/congress/2005/lectures/video/mp4-avc/320x240/22C3-567-en-3g_investigations.m4v","url":"https://api.media.ccc.de/public/recordings/1620","event_url":"https://api.media.ccc.de/public/events/import-044a4bc90d533f8e0d","conference_url":"https://api.media.ccc.de/public/conferences/22c3"}]}