19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Threats Catalogue Deliberate Acts Remarks<br />

____________________________________________________________________ .........................................<br />

T 5.99 Analysis of call data relating to the use of<br />

mobile phones<br />

With mobile communications, the signals transmitted on the radio link are not<br />

physically shielded against unauthorised passive monitoring and recording.<br />

Thus an aggressor could perpetrate an attack without the access problem<br />

which occurs on line-connected communications. A second problem which<br />

generally occurs with most radio communication services arises from the fact<br />

that for technical reasons the mobile communication partners have to be<br />

located in order to be contactable. Again, if these partners establish a<br />

connection themselves, they also give away information about their location<br />

through the act of establishing a connection. This location information could<br />

be used by the network or service provider - and also by third parties - to build<br />

up movement profiles.<br />

If an aggressor is familiar with particular filter characteristics over a mobile<br />

phone, he could (although it would be technically effort-intensive) identify<br />

individual phone calls by means of these characteristics. <strong>The</strong>se or other attacks<br />

require that the customer number (IMSI), mobile transceiver number (IMEI)<br />

and subscriber call number (MSISDN) are known.<br />

An insider who, for example, had access to the corporate or private telephone<br />

directories in a company would be able to identify the MSISDN call number.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!