HostedDB - Dedicated UNIX Servers

-->
IT Baseline Protection Manual T 5.97 Unauthorised transfer of data over mobile phones

T 5.97 Unauthorised transfer of data over mobile phones

Mobile phones provide the means whereby data from one IT system, e.g. a PC or notebook, can be transported to another without a cable connection having to be established between the two devices.

Information can then be surreptitiously retrieved and transmitted in a place where IT systems can be accessed openly. If a mobile phone is connected to a modem or has an in-built modem, information held on a computer can be transmitted to virtually anywhere in the world wire-free.

This type of unauthorised data transfer can be performed either with a mobile phone that has been specially brought along for the purpose or even using an internal mobile phone. In this way large quantities of data can be passed to the outside world unnoticed. Existing bandwidth limitations which currently make the transmission of large quantities of data unattractive are likely to disappear over the next few years as new technologies come on stream. With GSM the maximum data transfer rate is currently 9600 bps, whereas next generation protocols (GPRS, UMTS) envisage significantly higher transfer rates.

Nor is it always possible to check afterwards whether such data transmission has occurred as the network provider's record of the call data may already have been deleted.

Example:


© Copyright by
Bundesamt für Sicherheit in der Informationstechnik
last update:
October 2000
home