Russian News  
Analysis: Wireless phone headsets insecure

disclaimer: image is for illustration purposes only
by Shaun Waterman
Washington (UPI) Feb 1, 2008
Wireless phone headsets of the kind beloved by Wall Street executives and high-end law firms can be bugged by simple off-the-shelf radio scanners unless they are encrypted.

"These guys are bugging their own office, essentially," security consultant Doug Shields told United Press International.

He said that, for a recent client, he had used an inexpensive commercial scanner capable of monitoring frequencies in the 900 MHz and 1.2 GHz ranges, which is where many of the popular hands-free headsets operate.

He said the scanner could hear conversations inside buildings as far as 600 feet away. "Sometimes, when the other party has hung up, the wireless connection remains open and you can hear what (the party at your end) is saying afterwards."

From a position across the street from his client's facility, he said, the equipment was able to record conversations by employees, including commercially sensitive information. "Some of this stuff, if you traded on it, you'd never have to work again," said Shields, a partner in Syracuse, N.Y.-based Secure Network Inc.

Scott Berinato, the executive editor of Chief Security Officer magazine, told UPI he was aware of cases where the technique had been employed, among others, for corporate espionage.

"Some are encrypted, most are not," he said of the commercially available headsets. "The risk is (the difficulty involved in bugging them) is reasonably trivial."

He said "bigger, smarter" firms were likely to have adopted encryption, giving as an example the large pharmaceutical companies, which used encryption even for internal presentations employing wireless microphones.

Buildings could also be shielded, he said.

"More (companies) should be doing it (adopting countermeasures) than are," he said.

Shields said two other countermeasures were spread spectrum and frequency hopping -- both of which break up the transmission in different ways to make it harder to intercept.

But he said most companies seemed unaware of the risks inherent in this kind of technology. "They are focused on other things," he said.

"We use industry-standard security," said Deborah Kline, a spokeswoman for Avaya Inc., a telephone technology company that is one of the makers of hands-free wireless headsets.

But she added, "Industry standards �� are not always as secure as we would like."

Bob Hayes, managing director of the Security Executive Council, a membership organization for security leaders in the private and public sectors, struck a more skeptical note.

"There are a lot of threats that are technically possible," he said, pointing out that monitoring telephone conversations that way without permission was a federal crime. "Why would I do that," he asked, "when I could get the same information a dozen different ways?" For instance by going through someone's garbage, pretext phone calling, or eavesdropping on conversations at trade shows.

"If you're doing business that sensitive," he said, "your whole life should be at a higher security level. �� Secrets are stolen out of cars �� or garbage cans."

He also said that, unless the listeners were "in the right place at the right time," they were likely to get "a lot of pizza orders, bedtime kisses for kids" and other idle chatter.

"Think of it from the spies' point of view," he said. "There's a reason every intelligence agency in the world values human intelligence the most highly."

Jack Johnson, former chief security officer for the Department of Homeland Security and now a partner in the Washington federal practice at Price Waterhouse Coopers, told UPI that, in general when it came to new technology, "ease -of-use considerations tend to trump security."

"It's not until after the technologies are in use that we realize the vulnerabilities," he said.

Community
Email This Article
Comment On This Article

Related Links
Cyberwar - Internet Security News - Systems and Policy Issues

Reputation managers step in against Internet thugs
Washington (AFP) Jan 30, 2008
A new breed of image-manager is emerging in the United States to take on the masked and hooded cybermobs who, bolstered by anonymity and weak laws, launch damaging attacks on other web users.







  • Military Matters: Rebuilding states
  • US-China developing better military ties: US admiral
  • India showcases military might
  • Analysis: Taiwan faces better PLA ability

  • Russia says US approach to nuclear talks 'disappointing': Interfax
  • Musharraf rejects nuke concerns as Pakistan tests missile: army
  • NASA Ames Explores Possible Collaboration With South Korea
  • A New Nuclear Weapons Doctrine 2008 Part Two

  • Process On For Establishing Aerospace Command
  • Cisco plans to turn India into global hub, triple workforce
  • India's Biotech Baby Elephant

  • China, US aluminum giants buy into Rio Tinto
  • US subprime crisis could worsen China's bad loan problem: report
  • Foreign companies pour money into China: govt
  • Taiwan may ease China-bound investment restrictions: reports

  • Analysis: China beats West in Africa
  • Analysis: Turkey embraces wind power
  • Analysis: Iraq oil deals drawing near
  • Analysis: Shell to shut again in Nigeria

  • ISS astronauts repair solar array during 7-hr spacewalk
  • Europe sets launch window for maiden mission of space freighter
  • Station Crew Ready For Wednesday's Spacewalk
  • Crew Oxygen For ISS Loaded On Jules Verne

  • Northrop Grumman Demonstrates Compatibility Of AEHF Satellite Interface With Terminals Using Extended-Data-Rate Waveform
  • Elbit Systems To Supply Royal Netherlands Army Advanced BMS
  • Boeing Completes On-Orbit Handover Of Wideband Global SATCOM Satellite To USAF
  • SELEX Sistemi Integrati Contracts With EU For Command, Control And Information System

  • War Is Not A Video Game FCS Follies Part Two
  • Bows and arrows: deadly weapons of rural Kenya's war
  • Navy test fires powerful electromagnetic 'railgun'
  • Lockheed Martin Receives Contract For High Mobility Artillery Rocket System, Guided Multiple Launch Rocket System

  • The content herein, unless otherwise known to be public domain, are Copyright 1995-2007 - SpaceDaily.AFP and UPI Wire Stories are copyright Agence France-Presse and United Press International. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by SpaceDaily on any Web page published or hosted by SpaceDaily. Privacy Statement