Vulnerabilities of Telecommunications Systems to Unauthorized Use
Gao ID: LCD-77-102 March 31, 1977Telecommunications systems are vulnerable to various penetration techniques that may be used for gaining access to the system and intercepting and interpreting communications traffic carried over the system or inserting traffic into the system.
The difficulty of penetration is dependent on such factors as the adequacy of administrative controls, the competence and integrity of telecommunications personnel, the physical security maintained over telecommunications facilities, the technical security resulting from telecommunications technology, and the penetrator's technical knowledge and financial resources. Investigation of abnormalities in telecommunications systems operations is the primary method used for detecting penetrations or attempted penetrations. However, a penetrator may not be identified due to the delays in identifying an abnormality and the investigation of its cause. The General Services Administration and the Department of Defense have issued warnings to civil agencies and military departments and agencies that commercial and most Government telecommunications systems do not provide the degree of security necessary to protect information.
RecommendationsOur recommendations from this work are listed below with a Contact for more information. Status will change from "In process" to "Open," "Closed - implemented," or "Closed - not implemented" based on our follow up work.
Director: No director on record Team: No team on record Phone: No phone on record