Text
Wireless Security : Models, Threats, and Solutions
Why is Wireless Different?
Introduction
Protecting The Means Of Communication
Protecting Privacy
Promoting Safety
The Personal and the Public
Shaking Up the Status Quo
Understanding wireless Forecasts
Reasonable Degree of Security
Regulatory Environments and Issues
Security-Related Regulations
Security Related Market Factors
Guideliens for Security Measures
Celluler Networka and Bearer Technologies
First-Generation Wireless (IG)
Second-Generation Wireless (2G)
Spread Spectrum
Code Division Multiple Access (CDMA)
Time Division Multiple Access (TDMA)
Global System for Mobile Communications (GSM)
Third-Generation Wireless (3G)
Short Message Service (SMS)
Fourth-Generation Wireless (4G)
Summary
Endnotes
Telephone System Vulnerabilities
Interception/ Ease of Interception
Interruption of Service
Unintentional Interruptions
Natural Hazards
Hurricanes
Tornadoes
Winter storms
Flooding
Earthquake
Fire
Power outages
Software failures
Intentional Interruptions
Phone Phreaking
Legal Aspects
Laws in the United States
Privacy
Cyptography
Jamming
Right to Free Spech and Privacy Expectations When Using
Cell Phones
Who Is Doing The Intercepting?
Joe Q. Public
Mobile Telephones
Cellular Telephones
Friends and Neighbors; The Unintentional Intercept
Voice Systems
Data Systems
Criminal Arena
Fraud
Pagers
Drugs Cartels
Military – United States
Other Countries
ECHELON
ECHELON Ground Stations
Future Research
Law Enforcement
Applications
Cell Phone Vulnerabilities
Jamming
Interception
Countermeasures to Jamming and Interception
Code Division Multiple Access (CDMA)
Who’s Listening to Cell Phone Conversations?
Fraud
Countermeasures to Fraud
History of Cordless Telephones
Handset Features
Handset Vulnereabilities
Countermeasures
Microphones
Types of Microphones
Use of Microphones
Countermeasures
RF Data Communications
Short Range:
No copy data
No other version available