19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Threats Catalogue Deliberate Acts Remarks<br />

____________________________________________________________________ .........................................<br />

T 5.12 Interception of telephone calls and data<br />

transmissions<br />

By abusing user facilities, it may be possible for colleagues to listen in on<br />

telephone calls. One example is the add-on (three-party) conference. If<br />

subscriber A receives a call for subscriber B, he might try, in secret, to<br />

establish a three-party conference, instead of passing the call on. Subscriber B<br />

would not be aware of this fact if he had a telephone set without a display.<br />

In addition, it is possible for third parties to listen in on calls by activating<br />

disabled user facilities which are partly not allowed in Germany. One example<br />

is the add-on witness feature. Such an activation requires in-depth knowledge<br />

of the system.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!