SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Technology Stocks : The New Qualcomm - a S&P500 company -- Ignore unavailable to you. Want to Upgrade?


To: slacker711 who wrote (5636)1/25/2000 1:06:00 PM
From: Caxton Rhodes  Read Replies (2) | Respond to of 13582
 
anyone havethe conf call info? Thanks



To: slacker711 who wrote (5636)1/25/2000 1:27:00 PM
From: Bux  Respond to of 13582
 
Oops....GSM not as impenetrable as once thought. Any idea if this could be done to CDMA too?

I'm sure if there was enough will, money and time it could be done. Would it be as practical to pluck a CDMA call out of the air? I doubt it. Consider this: Since every CDMA call is noise to every other call and the power levels need to be closely controlled to keep all signals equal when they arrive at the base, the only location that would be suitable for intercepting these signals would be at the base itself. At that point, it is probably much easier to just break into the base and put a wiretap on.

Just a guess,

Bux



To: slacker711 who wrote (5636)1/25/2000 2:46:00 PM
From: w molloy  Read Replies (2) | Respond to of 13582
 
Penetrable CDMA

I don't know why you are surprised. the US NSA and their British kissing cousins GCHQ have been able to monitor all telecommunications, including CDMA. It is very doubtful CDMA would be allowed to thrive commercially if this wasn't the case.

GSM and CDMA a very secure against commercial spying, and relatively secure against intercept by countries other than the US and UK.

QCOM derives a not insignificant amount of its income from 'black' government projects. Monitoring protocols undoubtedly form a large
block of these.

What is surprising is the Frogs took so long, and that they were found out.

On a side note, there are a number of amusing apocryphal stories circulating about Echelon, most of which can be found quite easily on the Web. I wont repeat them, since I don't want the 'men in black' knocking on my door.

w.



To: slacker711 who wrote (5636)1/27/2000 12:29:00 PM
From: slacker711  Read Replies (1) | Respond to of 13582
 
3G and security....

totaltele.com

3G Services Set to Battle Internet Crime

By Keith Nuthall

26 January 2000

A senior consultant to the U.K.'s department of trade and
industry on telecoms security has warned an international
conference that the introduction of third generation mobile
technology will increasingly expose the industry crime
presently committed on the Internet.

Charles Brookson told delegates to Crime 2000 that operators
will have to deal with attacks from computer viruses and
backdoor programmes - allowing hackers easy access to
networks - when 3G handsets become widely available.

Because the system routes calls through the Internet there will
be additional problems for law enforcement authorities wishing
to monitor calls. A check for a destination telephone number
could, in future, only reveal an e-mail address, Brookson
warned the Association of Chief Police Officers and Federation
of Communication Services conference in the U.K.

Another problem for police will be the fact that 3G will allow
users to encrypt their messages until they reach their
destination, instead of just to the local base station, as at
present.

The new system will also allow encryption of calls between
mobile networks. "It's a much more difficult system than GSM
from a security point of view," said the DTI consultant.

On a more optimistic note for those worried about security, Nick
Dunlop, general manager of Alcatel Telecommunications Ltd, a
fraud management group, spoke on subscriber finger-printing, a
new way to detect subscription fraud. It involves the analysis
of calls made by known fraudsters, whose lines have been cut
off.

Because it is assumed that they will approach a company again,
using another assumed or stolen identity, finger-printing
software screens call data to see if a user's call pattern closely
matches those made by a fraudster. If they phone the same
numbers, then action can be taken.