Telephone Defenses Against The Dark Arts presented at SOURCE Boston 2008

by James Atkinson,

Tags: Security Exploitation Auditing

Summary : Exploration of the modern eavesdropping threat posed by telephone equipment, common penetration points exploited by eavesdroppers and spies, methods of detecting such penetrations, and how to secure both classified and unclassified telephone communications against eavesdropping both through technical means of operational trade-craft. Will include methods of properly auditing telephone instruments, wiring, transmission paths, and switching systems to detect and counter eavesdropping. The use, misuse, and exploitation of secure communications systems will also be presented including examples of prior penetrations, hacks, and attacks. Will include information on VOIP attacks, mechanisms to detect and defeat VOIP attacks and exploits, and methods to secure VOIP systems.