Безопасность информационных технологий (Sep 2012)

Vulnerabilities of GSM and Wiretapping

  • A. V. Novitskiy,
  • D. M. Mikhailov,
  • A. V. Starikovskiy,
  • A. V. Zuykov

Journal volume & issue
Vol. 19, no. 2S
pp. 8 – 10

Abstract

Read online

The article presents the main methods used by hackers to listen to telephone conversations of subscribers and also offers ways to protect against them. The authors justify the necessity of developing a trusted operating system that implements a given security measures.

Keywords