Skip to main content

Vulnerabilities of Telecommunications Systems to Unauthorized Use

LCD-77-102 Published: Mar 31, 1977. Publicly Released: Mar 31, 1977.
Jump To:
Skip to Highlights

Highlights

Telecommunications systems are vulnerable to various penetration techniques that may be used for gaining access to the system and intercepting and interpreting communications traffic carried over the system or inserting traffic into the system.

Full Report

Media Inquiries

Sarah Kaczmarek
Managing Director
Office of Public Affairs

Topics

Computer networksFacility securityRight of privacyElectronic data processingTelecommunicationsTelecommunications systemsDatabasesCommunicationsSoftwareComputers