DocumentCode :
1172804
Title :
Listening in [electronic spying]
Author :
Cass, Stephen
Volume :
40
Issue :
4
fYear :
2003
fDate :
4/1/2003 12:00:00 AM
Firstpage :
32
Lastpage :
37
Abstract :
The author addresses the following question: are the glory days of electronic spying over-or just beginning? Rather than the creation of ever more sensitive receivers or code-breaking computers, the hot areas of cloak-and-dagger information gathering include tapping fiber-optic cables (even at the bottom of the sea); using tiny bugging devices and old fashioned bribery, blackmail, and burglary to get at data before it has been encrypted; exploiting software flaws and poorly configured communications systems to bypass data security measures; and automatically winnowing the vast amounts of intercepted communications.
Keywords :
security of data; telecommunication security; bugging devices; cloak-and-dagger information gathering; code-breaking computers; communications systems; cryptography; data security measures; electronic spying; fiber-optic cables; receivers; software flaws;
fLanguage :
English
Journal_Title :
Spectrum, IEEE
Publisher :
ieee
ISSN :
0018-9235
Type :
jour
DOI :
10.1109/MSPEC.2003.1191772
Filename :
1191772
Link To Document :
بازگشت