CellphoneVulnerabilities(2).pdf
(
198 KB
)
Pobierz
CELL PHONE
VULNERABILITIES!
UNCLASSIFIED
1
Be Aware!
Your cell telephone has
three major
vulnerabilities
1. Vulnerability to
monitoring
of your conversations while using the
phone.
2. Vulnerability of your phone being turned into a
microphone
to
monitor conversations in the vicinity of your phone while your phone
is inactive.
3. Vulnerability to "cloning," or the use of your phone number by
others to make calls that are charged to your account.
UNCLASSIFIED
2
VULNERABILITY TO MONITORING:
All cell telephones are radio transceivers. Your voice is
transmitted through the air on radio waves.
Radio waves are not directional -- they disperse in all directions
so that anyone with the right kind of radio receiver can listen in.
Although the law provides penalties for the interception of cellular
telephone calls, it is easily accomplished and impossible to detect.
UNCLASSIFIED
3
VULNERABILITY TO MONITORING:
Radio hobbyists have web sites where they exchange cell phone
numbers of "interesting" targets
(YOU).
Opportunistic hobbyists
sometimes sell their best "finds
"
(YOU).
Criminal syndicates in several major U.S. metropolitan areas
maintain extensive cell phone monitoring operations.
It is easy for an eavesdropper to determine a target's
(YOU)
cell
phone number, because transmissions are going back and forth to the
cell site whenever the cell phone has battery power and is able to
receive a call.
UNCLASSIFIED
4
CAR PHONES
For a car phone, this generally happens as soon as the ignition is
turned on.
Therefore, the eavesdropper simply waits for the target
(YOU)
to
leave his or her home or office and start the car.
The scanner immediately picks up the initial transmission to the
cellular site to register the active system.
The number can be entered automatically into a file of numbers for
continuous monitoring.
UNCLASSIFIED
5
Plik z chomika:
musli_com
Inne pliki z tego folderu:
3A(1).pdf
(343 KB)
A Closer Look At Ethical Hacking And Hackers(1).pdf
(83 KB)
A Practical Fault Attack on Square and Multiply(1).pdf
(366 KB)
A Primer on Scientific Programming with Python (2009)(1).pdf
(6983 KB)
A+(2).zip
(9992 KB)
Inne foldery tego chomika:
CloudStack
distribution
dsp
electronics
LPI
Zgłoś jeśli
naruszono regulamin