Wiretapping case not only fuss in Indonesia . In Germany too. When
Indonesian intelligence intercepted Australia , Germany also reportedly
enraged against NSA wiretapping conducted , the U.S. national security
agencies .Unmitigated , who tapped the NSA is the number one in the country . None other than Chancellor Angela Merkel . Once word leaked , the German parliament immediately called for replacing all phone country officials .As
quoted from GigaOM , Friday ( 29/11/2013 ) , the two largest parties in
the German middle to form a coalition government and one of the first
orders they are asking MPs to use an encrypted phone .Since
then the use of the iPhone among state officials no longer allowed ,
and Merkel was officially switched to using BlackBerry . Why should a BlackBerry ?Mentioned
, the reason the German parliament ejecting the iPhone not because
Apple does not support the encryption of information security in the
country's federal office . But there is also the thought , sacking the iPhone because German sentiment with the US-made products .While
Carl Howe , vice president of Yankee Group Research institute predicts
not only the iPhone are forbidden by the German parliament . But also other kinds of mobile phones with Android OS ."
I'm sure it's not just the iPhone alone , Android phones will also be
banned because they do not support the local encryption standard German ,
although it actually could have been if the German government wants to
develop and validate its own version of Android to support it , " he
said .
=Latest Tech News
Showing posts with label Spy. Show all posts
Showing posts with label Spy. Show all posts
Friday, November 29, 2013
Is this the Tapping Technique Australia against Indonesia ?
Indonesian
news shocked Australian intelligence intercepts made to a cell phone
line belonging to a number of Indonesian officials . The news come after the international media containing confidential Guardian revealed Edward Snowden.
Until now , how to conduct wiretaps Australia was examined . Ranging from using technology what , how, and to cooperate with any party . All still a mystery .Exploiticha launch pages , 28 November 2013 , there was a bit of an idea of the possibilities of the method are carried out by the Australian panyadapan , related to the data collection efforts of telephone , e - mail connections , and other cyberspace .1 . Building a Base Transceiver Station ( BTS ) is falseDaklam this method , which will be tapped phones usually are in the process of searching for a signal state as the original signal from the provider to be bothered by the bugs . When the phone trouble finding the signal , then the tapper activate fake BTS BTS has been designed to resemble the original belongs to the provider .When the phone has been " arrested " fake BTS , so eavesdroppers can freely conduct wiretaps . But , tapping techniques through fake BTS has its limitations , since only outgoing calls can be intercepted .2 . Network spoofing ( fake BTS configuration resembling the original BTS )In addition to using false base stations , can also do tappers tapping by using network trickery . In this process , the bugs will make the IP address of the computer that is trusted to create a limited access to the network and allowing an exchange of data packets .But , on the other hand spoofing network ( network hoax ) can also be a useful tool to handle the network traffic is congested . Namely , when the traffic is congested networks and gateways can not validate each data packet . So to minimize the density of the network can use a trick .3 . Catcher Network International Mobile Subscriber Identity ( IMSI ) in mobile phonesNetwork IMSI catcher is essentially shaped a fake cell phone tower that works near the phone to be tapped . This method is usually done to someone on his cell phone eavesdropping .Tool to capture network IMSI is a Virtual Base Transceiver Station ( VBTS ) . This tool is able to intercept calls from a mobile phone near VBTS established .Tapping techniques has proven its worth over the Defcon hacker gathering an event - 18 in 2010. At that time , one of the participants practiced tapping technique on networked 2G GSM phone .Keep in mind , the 2G has a security system that is lower than the next -generation 3G . So , to minimize the tapping action using the above techniques , you should start to switch to the 3G network , 3.5G , and 4G because it has a security system that is more difficult to penetrate .
Until now , how to conduct wiretaps Australia was examined . Ranging from using technology what , how, and to cooperate with any party . All still a mystery .Exploiticha launch pages , 28 November 2013 , there was a bit of an idea of the possibilities of the method are carried out by the Australian panyadapan , related to the data collection efforts of telephone , e - mail connections , and other cyberspace .1 . Building a Base Transceiver Station ( BTS ) is falseDaklam this method , which will be tapped phones usually are in the process of searching for a signal state as the original signal from the provider to be bothered by the bugs . When the phone trouble finding the signal , then the tapper activate fake BTS BTS has been designed to resemble the original belongs to the provider .When the phone has been " arrested " fake BTS , so eavesdroppers can freely conduct wiretaps . But , tapping techniques through fake BTS has its limitations , since only outgoing calls can be intercepted .2 . Network spoofing ( fake BTS configuration resembling the original BTS )In addition to using false base stations , can also do tappers tapping by using network trickery . In this process , the bugs will make the IP address of the computer that is trusted to create a limited access to the network and allowing an exchange of data packets .But , on the other hand spoofing network ( network hoax ) can also be a useful tool to handle the network traffic is congested . Namely , when the traffic is congested networks and gateways can not validate each data packet . So to minimize the density of the network can use a trick .3 . Catcher Network International Mobile Subscriber Identity ( IMSI ) in mobile phonesNetwork IMSI catcher is essentially shaped a fake cell phone tower that works near the phone to be tapped . This method is usually done to someone on his cell phone eavesdropping .Tool to capture network IMSI is a Virtual Base Transceiver Station ( VBTS ) . This tool is able to intercept calls from a mobile phone near VBTS established .Tapping techniques has proven its worth over the Defcon hacker gathering an event - 18 in 2010. At that time , one of the participants practiced tapping technique on networked 2G GSM phone .Keep in mind , the 2G has a security system that is lower than the next -generation 3G . So , to minimize the tapping action using the above techniques , you should start to switch to the 3G network , 3.5G , and 4G because it has a security system that is more difficult to penetrate .
source : viva.co.id
=
Subscribe to:
Comments (Atom)





