CellphoneVulnerabilities(2).pdf

(198 KB) Pobierz
CELL PHONE
VULNERABILITIES!
UNCLASSIFIED
1
Be Aware!
Your cell telephone has
three major
vulnerabilities
1. Vulnerability to
monitoring
of your conversations while using the
phone.
2. Vulnerability of your phone being turned into a
microphone
to
monitor conversations in the vicinity of your phone while your phone
is inactive.
3. Vulnerability to "cloning," or the use of your phone number by
others to make calls that are charged to your account.
UNCLASSIFIED
2
VULNERABILITY TO MONITORING:
All cell telephones are radio transceivers. Your voice is
transmitted through the air on radio waves.
Radio waves are not directional -- they disperse in all directions
so that anyone with the right kind of radio receiver can listen in.
Although the law provides penalties for the interception of cellular
telephone calls, it is easily accomplished and impossible to detect.
UNCLASSIFIED
3
VULNERABILITY TO MONITORING:
Radio hobbyists have web sites where they exchange cell phone
numbers of "interesting" targets
(YOU).
Opportunistic hobbyists
sometimes sell their best "finds
"
(YOU).
Criminal syndicates in several major U.S. metropolitan areas
maintain extensive cell phone monitoring operations.
It is easy for an eavesdropper to determine a target's
(YOU)
cell
phone number, because transmissions are going back and forth to the
cell site whenever the cell phone has battery power and is able to
receive a call.
UNCLASSIFIED
4
CAR PHONES
For a car phone, this generally happens as soon as the ignition is
turned on.
Therefore, the eavesdropper simply waits for the target
(YOU)
to
leave his or her home or office and start the car.
The scanner immediately picks up the initial transmission to the
cellular site to register the active system.
The number can be entered automatically into a file of numbers for
continuous monitoring.
UNCLASSIFIED
5
Zgłoś jeśli naruszono regulamin