Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

SECURITY SERVICES: IP Telephony: Your Company’s at Risk!

By Bob Decker
April 3, 2006


While much has been made of President Bush’s use of wiretaps for spying on suspected terrorists, the NSA and FBI are hardly the sole proprietor of clandestine technology. New-age wire tapping might be going on at any company using IP telephony.

Unbeknownst to most companies, just about any curious, technically savvy employee or visitor with ill intent, granted access by consent or force, might be able to do some serious damage with some simple freeware available on the Internet. While adequate physical security may prevent outside intruders from accessing key communication areas, often the threats that come from within require even more protection than basic perimeter security measures.

Vulnerability example

Consider the following hypothetical scenario. Widget Ltd. is known to be a divestiture object for its parent holding company. The company’s workforce is scattered across the country, and the main headquarters building has a skeleton staff during normal business hours. After business hours, the only employee on the premises is a security officer.

John Green, an almost-executive who has been kept out of recent negotiations, decides to do a little of his own inspection to see if his personal investments in the company are safe. Since his office is in the executive wing and he is often the last person to leave, he feels safe taking a little adventure with the new IP telephony system the company recently had installed. He visits a local electronics store, purchases a small IP switch that supports port mirroring and puts the switch in line between the CEO’s administrative assistant’s workstation and the corporate LAN. Green configures the switch to mirror the port and forwards the packets from the port, into which the administrative assistant’s PC is connected, to his own PC. Using Ethereal, Green begins packet capture and analysis of the session initiation protocol (SIP) control signaling and voice media stream from that port.

What would Green be able to see in this scenario? Figure 1 below is a simple capture from Ethereal which is pretty typical of the session log.

What is visible in Ethereal is the SIP invite from the multi-media client on the PC to extension 4839 at the SIP application server for domain ssclab.com. This extension happens to be a digital phone connected to the PBX at the local site. Okay, so what? John can tell who the CEO called within the company. Since the identity of the calling party only will lead to assumptions, it’s not a major risk for the company.

Now examine the following example in Figure 2 below.

John now knows an external number that is being called from the CEO’s office and can access the actual session. What that means is that John actually can capture the packet load as a .wav file and replay and hear the conversation. The risk here is quite apparent.

This is a simple example of the important role physical security represents even with the latest high tech applications and how every employee needs to participate in implementation, not just the staff tasked with perimeter security. While there are many countermeasures that may be taken to resolve the identified vulnerability, none is more important than educating key personnel – those who might be a target for a wire tap – on how to avoid a breach.

Most companies have locked down the switch rooms that control LAN communications. Companies concentrate heavily on installing firewalls and intrusion prevention to ensure that external resources can’t compromise their confidential information. The same level of awareness and investment must be made inside the building where most vulnerability exists.

Five Top VoIP Threats

A heightened awareness for voice over IP or VoIP can help ensure effective countermeasures are in place for what are considered the most costly threats:
  • Denial of Service of voice call processing (disabling the call system).
  • Confidentiality and Eavesdropping.
  • Call Redirection (redirecting inbound or outbound calls to unscrupulous persons).
  • Improper Design/Configuration of System (E911 calls mishandled; ineffective backup).
  • SPIT – SPAM over IP Telephony. Since VoIP is free it would be easy to enable a machine to call everyone on the Internet.
When implementing a VoIP system, companies must ensure that both logical and physical countermeasures are used to protect availability, integrity and confidentiality of this critical information resource.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Bob Decker, a Certified Information Systems Security Professional, leads the services field sales and marketing team at NextiraOne. Contributors to this article include: Scot Cowan, Network Architect, NextiraOne, and Scott Tanner, CCDP, CCNP, CCSP, INFOSEC, CISSP, Solutions Architect, NextiraOne.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Code

Security Leaders Discuss the Marquis Data Breach

Digital human mind

Should Organizations Block AI Browsers? Security Leaders Discuss

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Webcor implements managed security services to mitigate risk

    Commercial construction company Webcor implements managed services to improve its security posture

    See More
  • cyber laptop2

    Databases stores, cloud storage and services at risk from exposed access keys

    See More

Related Products

See More Products
  • 1119490936.jpg

    Solving Cyber Risk: Protecting Your Company and Society

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • 9780367339456.jpg.jpg.jpg

    Cyber Strategy: Risk-Driven Security and Resiliency

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing