{"guid":"import-1975766c6d4f873c2c","title":"Let Me Answer That for You","subtitle":"adventures in mobile paging","slug":"29c3-5216-en-attacking_mobile_terminated_service_in_gsm_h264","link":"http://events.ccc.de/congress/2012/Fahrplan/events/5216.en.html","description":"In the last years, mobile security and specifically GSM has been attacked in many different ways. It was demonstrated how to sniff and crack traffic, how to impersonate a subscriber by placing a fake call and the general security characteristics of this mobile protocol stack have been evaluated.\n\nIn this presentation, we will check out a part of the protocol procedures that hasn't been looked at yet, specifically Mobile Terminated services.\n","original_language":"eng","persons":["Nico Golde"],"tags":["29c3"],"view_count":1614,"promoted":false,"date":"2012-12-28T01:00:00.000+01:00","release_date":"2013-01-01T01:00:00.000+01:00","updated_at":"2026-03-19T17:30:05.869+01:00","length":2938,"duration":2938,"thumb_url":"https://static.media.ccc.de/media/congress/2012/29c3-5216-en-attacking_mobile_terminated_service_in_gsm_h264.jpg","poster_url":"https://static.media.ccc.de/media/congress/2012/29c3-5216-en-attacking_mobile_terminated_service_in_gsm_h264_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2012/import-1975766c6d4f873c2c-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2012/import-1975766c6d4f873c2c-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/29c3-5216-en-attacking_mobile_terminated_service_in_gsm_h264","url":"https://api.media.ccc.de/public/events/import-1975766c6d4f873c2c","conference_title":"29C3: Not my department","conference_url":"https://api.media.ccc.de/public/conferences/29c3","related":[{"event_id":1479,"event_guid":"import-6973e270e772374508","weight":5},{"event_id":1520,"event_guid":"import-70c32b8bc4f7a9b0a7","weight":6},{"event_id":1630,"event_guid":"import-196baee714b3785cfb","weight":17},{"event_id":1632,"event_guid":"import-0d984b8893f631f585","weight":4},{"event_id":1671,"event_guid":"import-873dcb9212006c08b8","weight":7},{"event_id":1693,"event_guid":"import-49361059fb0ed0c492","weight":2},{"event_id":1989,"event_guid":"4NABdZ7ki6qrAcGzcGtrqQ","weight":2},{"event_id":3603,"event_guid":"798573a8-f544-48f0-abaf-ebc405f03f4a","weight":2},{"event_id":3615,"event_guid":"74783236-46f4-493c-9574-1b27a44847b7","weight":2},{"event_id":3820,"event_guid":"f7716b25-9c12-5d69-be42-3a8fec10b2a6","weight":6}],"recordings":[{"size":310,"length":2938,"mime_type":"video/mp4","language":"eng","filename":"29c3-5216-en-attacking_mobile_terminated_service_in_gsm_h264.mp4","state":"downloaded","folder":"mp4-h264-HQ","high_quality":true,"width":720,"height":576,"updated_at":"2016-01-27T11:03:55.692+01:00","recording_url":"https://cdn.media.ccc.de/congress/2012/mp4-h264-HQ/29c3-5216-en-attacking_mobile_terminated_service_in_gsm_h264.mp4","url":"https://api.media.ccc.de/public/recordings/3425","event_url":"https://api.media.ccc.de/public/events/import-1975766c6d4f873c2c","conference_url":"https://api.media.ccc.de/public/conferences/29c3"}]}