British security expert Peter Cox has published an example of the
SIPtap intercept
program for the standard SIP protocol. The program demonstrates how poorly protected VoIP calls are from wiretapping. This specialist basically does not agree with his colleagues, who believe that
VoIP is more difficult to listen to than regular telephone conversations . In his opinion, on the contrary, it is much easier here, especially if the traffic is not encrypted.
Peter Cox explains that to intercept VoIP-traffic, it is enough to have access to the Internet channel in any place where VoIP-traffic is coming from the object of surveillance. This can be an object ISP-provider, WiFi hotspot, corporate network of the object or personal computer of the object infected with spyware.
In a simple Cox program, each call is recorded as a wav file and sent to an observer. The SIPtap monitoring module generated a
calendar page with links to all conversations. The date and time of the call, the coordinates of the recipient, Call ID, the duration in seconds are indicated. All wav files are also available.
')

Peter
says he wrote this program after talking to Phil Zimmerman, the author of PGP, who is currently developing Zfone software for robust crypto protection of VoIP traffic.
By the way, Peter Cox himself earns master classes on the protection of VoIP and corporate networks, his program
is called primitive and written for advertising purposes.