Skip to main content

Vulnerabilities of Telecommunications Systems to Unauthorized Use

LCD-77-102 Published: Mar 31, 1977. Publicly Released: Mar 31, 1977.
Jump To:
Skip to Highlights


Telecommunications systems are vulnerable to various penetration techniques that may be used for gaining access to the system and intercepting and interpreting communications traffic carried over the system or inserting traffic into the system.

Full Report

Office of Public Affairs


Computer networksFacility securityRight of privacyElectronic data processingTelecommunicationsTelecommunications systemsDatabasesCommunicationsSoftwareComputers