Performers intercepts have various ways to understand the important data and the contents of the user's phone conversation. Chairman of the Research Institute for Cyber Security and Communications (CISSReC) Primary Persadha explained that wiretapping is not difficult.
Wiretapping case continues, after the Acting Secretary General of the PDIP Hasto Kristiyanto claimed tapped Commission, now a member of a team of 9 Nurcholis also claimed was tapped. -Yack news tapping makes us ask, what is actually tapping it.
"In principle, all of which can be tapped via the communication line. With the availability of tools, technologies and systems, wiretapping easier than cooking instant noodles, "said Pratt Persadha, Chairman of the Research Institute CISSReC, Cyber Security and Communications Specialist through an official statement to Okezone.
Pratt explained, tapping can be done in several ways, ranging from a passive to an active method. Passive wiretapping done by taking information from the Base Transceiver Station (BTS) of the provider.
"With intercept directly to the BTS, eavesdroppers can take all the information, either SMS, voice to data. This is done without having to penetrate into the target phone intercepts. Passive eavesdropping like this can not be detected, because it does not change any information, "said the man born in this Cepu.
There are also tapping is done by holding the provider's official institutions. "Tapping the provider took almost impossible known. Because we are not going to feel anything. Both telephone and SMS will run normally as usual. Because the information obtained directly from the provider tapper, "said Pratt.
Meanwhile, active wiretapping is done with the help of artificial or BTS BTS apparent. BTS serves pseudo intercept sms, data and voice via OTA (on the water) prior to the original BTS. "In the process of this intercept, eavesdroppers may modify the message, it can even act as the sender of the message. So this is very dangerous because it can manipulate the information," said the former head of the IT team Presidency of this State Code Institution.
Active wiretapping can also be done by Installing a bug into one's mobile phone. "This kind of tapping new model can be known through forensic testing. It will be known if there is a bug, malware or trojan in the target phone tapping."
Encryption technology
Users unknowingly become a victim of wiretapping. As for knowing whether someone bugged is not easy. "To determine the presence of OTA tapping (on the water) require counter surveillance tool detector signal and spectrum analyzer. It can reach a frequency of 20 kHz to 24 GHz. This tool can detect suspicious signals. However, this tool is very expensive and only sold to state agencies , "Pratt said Persadha, Chairman of the Research Institute CISSReC, Cyber Security and Communications Specialist by the official statement.
Similarly, to determine the apparent BTS also needed a special tool called a GSM monitoring. "With the GSM monitoring will be found, anywhere identity and official and original BTS BTS pseudo used tappers," he added.
Primary officials appealed to us introspective to eavesdropping. Not to avoid the Commission, but the information they have is very vulnerable to foreign tapped and the irresponsible. "The solution is not to replace avoid tapping numbers, replace the phone, change the IMEI or wear a vintage telephone. It all would be useless against wiretapping technology today, "he explained.
"The only one who could resist tapping action is with encryption and cryptographic technologies. That's the most powerful antisadap technology. With technology antisadap especially domestic product, at least we can keep sensitive information from foreign lead and those who are not responsible, "said Pratt.
Wiretapping case continues, after the Acting Secretary General of the PDIP Hasto Kristiyanto claimed tapped Commission, now a member of a team of 9 Nurcholis also claimed was tapped. -Yack news tapping makes us ask, what is actually tapping it.
"In principle, all of which can be tapped via the communication line. With the availability of tools, technologies and systems, wiretapping easier than cooking instant noodles, "said Pratt Persadha, Chairman of the Research Institute CISSReC, Cyber Security and Communications Specialist through an official statement to Okezone.
Pratt explained, tapping can be done in several ways, ranging from a passive to an active method. Passive wiretapping done by taking information from the Base Transceiver Station (BTS) of the provider.
"With intercept directly to the BTS, eavesdroppers can take all the information, either SMS, voice to data. This is done without having to penetrate into the target phone intercepts. Passive eavesdropping like this can not be detected, because it does not change any information, "said the man born in this Cepu.
There are also tapping is done by holding the provider's official institutions. "Tapping the provider took almost impossible known. Because we are not going to feel anything. Both telephone and SMS will run normally as usual. Because the information obtained directly from the provider tapper, "said Pratt.
Meanwhile, active wiretapping is done with the help of artificial or BTS BTS apparent. BTS serves pseudo intercept sms, data and voice via OTA (on the water) prior to the original BTS. "In the process of this intercept, eavesdroppers may modify the message, it can even act as the sender of the message. So this is very dangerous because it can manipulate the information," said the former head of the IT team Presidency of this State Code Institution.
Active wiretapping can also be done by Installing a bug into one's mobile phone. "This kind of tapping new model can be known through forensic testing. It will be known if there is a bug, malware or trojan in the target phone tapping."
Encryption technology
Users unknowingly become a victim of wiretapping. As for knowing whether someone bugged is not easy. "To determine the presence of OTA tapping (on the water) require counter surveillance tool detector signal and spectrum analyzer. It can reach a frequency of 20 kHz to 24 GHz. This tool can detect suspicious signals. However, this tool is very expensive and only sold to state agencies , "Pratt said Persadha, Chairman of the Research Institute CISSReC, Cyber Security and Communications Specialist by the official statement.
Similarly, to determine the apparent BTS also needed a special tool called a GSM monitoring. "With the GSM monitoring will be found, anywhere identity and official and original BTS BTS pseudo used tappers," he added.
Primary officials appealed to us introspective to eavesdropping. Not to avoid the Commission, but the information they have is very vulnerable to foreign tapped and the irresponsible. "The solution is not to replace avoid tapping numbers, replace the phone, change the IMEI or wear a vintage telephone. It all would be useless against wiretapping technology today, "he explained.
"The only one who could resist tapping action is with encryption and cryptographic technologies. That's the most powerful antisadap technology. With technology antisadap especially domestic product, at least we can keep sensitive information from foreign lead and those who are not responsible, "said Pratt.
No comments:
Post a Comment