19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Threats Catalogue Deliberate Acts Remarks<br />

____________________________________________________________________ .........................................<br />

T 5.13 Eavesdropping of rooms<br />

In general two different types of unauthorised bugging of rooms have to be<br />

distinguished. In the first type, the threat is directly represented by the<br />

terminal. In this case particularly intelligent terminals with installed<br />

microphones, such as answering machines, ISDN cards, or multimedia PCs<br />

are affected. Terminals of this kind can, assuming the relevant functions are<br />

installed, be activated via the public network to switch on the installed<br />

microphones. A well-known example of this is the so-called "baby-watch<br />

function" of answering machines (c.f. 8.3 Answering machine).<br />

<strong>The</strong> second type is to make use of the PBX system itself in connection with<br />

appropriately equipped terminals. This threat arises from the abuse of the<br />

"voice calling" user facility in conjunction with the "handsfree conversing"<br />

option. This function, of an intercom switching centre with simplex<br />

transmission if applied in this way, can, under certain circumstances, also<br />

beused for the bugging of a room.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!