About | HeinOnline Law Journal Library | HeinOnline Law Journal Library | HeinOnline

LCD-77-102 1 (1977-03-31)

handle is hein.gao/gaobaagwc0001 and id is 1 raw text is: 





DOCUIENT RESOE


00056 - (11052008]

Vulnerabilities of Telecommunications Systems to Unauthorized
Use. B-146864. LCD-77-102. March 31. 1977. Released April 26,
1977. 29 pp.

Report to Rep. Paul . McCioskey, Jr.; by Fred J. Shafer,
Di-ector, Logistics and Communications Div.

Contact: Logistics and communications Div.
Budget Function: General Science, Space, and Technology:
    Telecommunications and Radio Frequency SpectruA Use (258).
organization Concerned: Department of Defense; Department of
    Justice; Federal Communications commission; General Services
    Administration; office of Telecommunications Policy.
Congressional Relevance: Rep. Paul i. McCloskey, Jr.
Authority: Federal Property and Administrative services Act of
    1949 (40 U.S.C. 481). Executive Order 115563 U.S.C. 301.

         Telecommunications systems are vulnerable to various
penetration techniques that may be used for gaining access to
the system and intercepting and interpreting communications
traffic carried over the system or inserting traffic into the
system. Findingz/Conclusions: The difficulty of penetration is
dependent On such factors as the adequacy of administrative
controls, the competence and integrity of telecommaunications
personnel. the physical security maintained over
telecommunications .licilities, the technical security resulting
from telecommunications technology, ant 'e penetrptor's
technical knouledge and financial resources. Investigation of
abnormalities in telecommunications systems operatins is the
primary method used for detecting penetraticns or attempted
penetrations. Houever, a penetrator may not be identified due to
the delays in identifying an abnormality and the iuvestigation
of its cause. The General Services Administration and the
Department of Defense have issued warnings to civil agencies and
military departments and agencies hat commercial and Rost
Government telecommunications systems io not provide the degree
of security necessary to protect information. Recommendations:
Separate computer access controls should be established by the
user uhen computers and associated remote terminal eguipment are
interconnected through telecomSunications systems. Such access
controls, if adequate, would increase the difficulty in gaining
access to computerized data bases. (Author/SC)

What Is HeinOnline?

HeinOnline is a subscription-based resource containing thousands of academic and legal journals from inception; complete coverage of government documents such as U.S. Statutes at Large, U.S. Code, Federal Register, Code of Federal Regulations, U.S. Reports, and much more. Documents are image-based, fully searchable PDFs with the authority of print combined with the accessibility of a user-friendly and powerful database. For more information, request a quote or trial for your organization below.



Contact us for annual subscription options:

Already a HeinOnline Subscriber?

profiles profiles most