[19859] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: serious threat models

daemon@ATHENA.MIT.EDU (Travis H.)
Sat Feb 4 13:09:33 2006

X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
Date: Sat, 4 Feb 2006 00:27:58 -0600
From: "Travis H." <solinym@gmail.com>
To: Jaap-Henk Hoepman <jhh@cs.ru.nl>
Cc: cryptography@metzdowd.com
In-Reply-To: <82lkwsls5h.fsf@king-ink.cs.ru.nl>

On 2/3/06, Jaap-Henk Hoepman <jhh@cs.ru.nl> wrote:
> could this be
> done using phone conference facilities?

Good guess!

http://www.schneier.com/blog/archives/2006/02/phone_tapping_i.html

``The code tapped into the conference call system. It "conference
called" phone calls to 14 prepaid mobile phones where the calls were
recorded.''

I bet you can find a manual for one of these switches online somewhere,
should you be suitably motivated.
--
"Whosoever is delighted in solitude is either a wild beast or a god." -><-
http://www.lightconsulting.com/~travis/
GPG fingerprint: 50A1 15C5 A9DE 23B9 ED98 C93E 38E9 204A 94C2 641B

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post