[19859] in cryptography@c2.net mail archive
Re: serious threat models
daemon@ATHENA.MIT.EDU (Travis H.)
Sat Feb 4 13:09:33 2006
X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
Date: Sat, 4 Feb 2006 00:27:58 -0600
From: "Travis H." <solinym@gmail.com>
To: Jaap-Henk Hoepman <jhh@cs.ru.nl>
Cc: cryptography@metzdowd.com
In-Reply-To: <82lkwsls5h.fsf@king-ink.cs.ru.nl>
On 2/3/06, Jaap-Henk Hoepman <jhh@cs.ru.nl> wrote:
> could this be
> done using phone conference facilities?
Good guess!
http://www.schneier.com/blog/archives/2006/02/phone_tapping_i.html
``The code tapped into the conference call system. It "conference
called" phone calls to 14 prepaid mobile phones where the calls were
recorded.''
I bet you can find a manual for one of these switches online somewhere,
should you be suitably motivated.
--
"Whosoever is delighted in solitude is either a wild beast or a god." -><-
http://www.lightconsulting.com/~travis/
GPG fingerprint: 50A1 15C5 A9DE 23B9 ED98 C93E 38E9 204A 94C2 641B
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com