. Earth Science News .
Analysis: Wireless phone headsets insecure

disclaimer: image is for illustration purposes only
by Shaun Waterman
Washington (UPI) Feb 1, 2008
Wireless phone headsets of the kind beloved by Wall Street executives and high-end law firms can be bugged by simple off-the-shelf radio scanners unless they are encrypted.

"These guys are bugging their own office, essentially," security consultant Doug Shields told United Press International.

He said that, for a recent client, he had used an inexpensive commercial scanner capable of monitoring frequencies in the 900 MHz and 1.2 GHz ranges, which is where many of the popular hands-free headsets operate.

He said the scanner could hear conversations inside buildings as far as 600 feet away. "Sometimes, when the other party has hung up, the wireless connection remains open and you can hear what (the party at your end) is saying afterwards."

From a position across the street from his client's facility, he said, the equipment was able to record conversations by employees, including commercially sensitive information. "Some of this stuff, if you traded on it, you'd never have to work again," said Shields, a partner in Syracuse, N.Y.-based Secure Network Inc.

Scott Berinato, the executive editor of Chief Security Officer magazine, told UPI he was aware of cases where the technique had been employed, among others, for corporate espionage.

"Some are encrypted, most are not," he said of the commercially available headsets. "The risk is (the difficulty involved in bugging them) is reasonably trivial."

He said "bigger, smarter" firms were likely to have adopted encryption, giving as an example the large pharmaceutical companies, which used encryption even for internal presentations employing wireless microphones.

Buildings could also be shielded, he said.

"More (companies) should be doing it (adopting countermeasures) than are," he said.

Shields said two other countermeasures were spread spectrum and frequency hopping -- both of which break up the transmission in different ways to make it harder to intercept.

But he said most companies seemed unaware of the risks inherent in this kind of technology. "They are focused on other things," he said.

"We use industry-standard security," said Deborah Kline, a spokeswoman for Avaya Inc., a telephone technology company that is one of the makers of hands-free wireless headsets.

But she added, "Industry standards �� are not always as secure as we would like."

Bob Hayes, managing director of the Security Executive Council, a membership organization for security leaders in the private and public sectors, struck a more skeptical note.

"There are a lot of threats that are technically possible," he said, pointing out that monitoring telephone conversations that way without permission was a federal crime. "Why would I do that," he asked, "when I could get the same information a dozen different ways?" For instance by going through someone's garbage, pretext phone calling, or eavesdropping on conversations at trade shows.

"If you're doing business that sensitive," he said, "your whole life should be at a higher security level. �� Secrets are stolen out of cars �� or garbage cans."

He also said that, unless the listeners were "in the right place at the right time," they were likely to get "a lot of pizza orders, bedtime kisses for kids" and other idle chatter.

"Think of it from the spies' point of view," he said. "There's a reason every intelligence agency in the world values human intelligence the most highly."

Jack Johnson, former chief security officer for the Department of Homeland Security and now a partner in the Washington federal practice at Price Waterhouse Coopers, told UPI that, in general when it came to new technology, "ease -of-use considerations tend to trump security."

"It's not until after the technologies are in use that we realize the vulnerabilities," he said.

Community
Email This Article
Comment On This Article

Related Links
Cyberwar - Internet Security News - Systems and Policy Issues



Memory Foam Mattress Review
Newsletters :: SpaceDaily :: SpaceWar :: TerraDaily :: Energy Daily
XML Feeds :: Space News :: Earth News :: War News :: Solar Energy News


Reputation managers step in against Internet thugs
Washington (AFP) Jan 30, 2008
A new breed of image-manager is emerging in the United States to take on the masked and hooded cybermobs who, bolstered by anonymity and weak laws, launch damaging attacks on other web users.







  • NC-Based Piedmont Triad Ambulance And Rescue Deploys Next Gen Wireless Network
  • Millions struggle for tickets as China battles weather
  • Beijing's disaster response too little, too late: travellers
  • Winter Freeze Sends Shockwaves Through China As Cash And More Run Short

  • Ancient Climate Secrets Raised From Ocean Depths
  • Microbes As Climate Engineers
  • Economists Help Climate Scientists To Improve Global Warming Forecasts
  • When Accounting For The Global Nitrogen Budget Do Not Forget Fish

  • Indonesia To Develop New EO Satellite
  • Russia To Launch Space Project To Monitor The Arctic In 2010
  • New Radar Satellite Technique Sheds Light On Ocean Current Dynamics
  • Radical New Lab Fights Disease Using Satellites

  • Analysis: China beats West in Africa
  • Analysis: Turkey embraces wind power
  • Analysis: Iraq oil deals drawing near
  • Analysis: Shell to shut again in Nigeria

  • Globe-Trotting Black Rat Genes Reveal Spread Of Humans And Diseases
  • Risk of meningitis epidemic in Burkina Faso increases
  • Analysis: NATO begins pandemic monitoring
  • China reports outbreak of bird flu in Tibet

  • Telepathic Genes
  • Cold Spring Harbor Laboratory Researchers Race Against Time To Save Tasmanian Devils
  • Rare dolphin 'beaten to death' in Bangladesh
  • Nonlinear Ecosystem Response Points To Environmental Solutions

  • New York City Uses Mobile GPS From AT and T and TeleNav To Help Keep City Clean
  • Italy pledges to honour Naples rubbish plan after EU ultimatum
  • EU threatens Italy with court action over rubbish crisis
  • Protecting The Alps From Traffic Noise And Air Pollution

  • Blue-Eyed Humans Have A Single, Common Ancestor
  • Brain Connections Strengthen During Waking Hours And Weaken During Sleep
  • Fueling And Feeding Bigfoot
  • Higher China fines for stars breaking one-child rule: state media

  • The content herein, unless otherwise known to be public domain, are Copyright 1995-2007 - SpaceDaily.AFP and UPI Wire Stories are copyright Agence France-Presse and United Press International. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by SpaceDaily on any Web page published or hosted by SpaceDaily. Privacy Statement