19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Threats Catalogue Deliberate Acts Remarks<br />

____________________________________________________________________ .........................................<br />

T 5.95 Bugging of indoor conversations over mobile<br />

phones<br />

Mobile phones can be used to record or listen to conversations unnoticed. In<br />

the simplest case, a mobile phone can be switched on, connected to an<br />

interested third party and inconspicuously placed in a room, for example<br />

where a meeting is being held. However, as the phone has only a limited<br />

battery life and the microphone is not designed for room surveillance, such an<br />

attempt at bugging is of only limited effect.<br />

Through skilful selection of features and combining these with additional<br />

frills, it is possible to put a mobile phone into talk mode without this being<br />

indicated by a ringing tone or other means. For example, there is one type of<br />

phone in which the mobile phone's display can be switched off by entering a<br />

particular key combination even though a call is actually connected to the<br />

device.<br />

However, specially manipulated mobile phones can also be used for this<br />

purpose. With these phones, it is not evident from looking at the phone that it<br />

is switched on. Here the mobile phone is used as a bugging device which can<br />

be activated from anywhere in the world over the telephone network, without<br />

this being detectable from the phone itself. Devices in which this special<br />

function is implemented using additional circuits are known. This<br />

manipulation is relatively easy to detect through visual inspection after taking<br />

the device apart or using special investigation methods. Operation of such<br />

devices is illegal in Germany.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000<br />

Inconspicuous switching<br />

on<br />

Utilisation of features<br />

Manipulated mobile<br />

phones

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!