[19865] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: serious threat models

daemon@ATHENA.MIT.EDU (Sidney Markowitz)
Sat Feb 4 17:01:20 2006

X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
Date: Sun, 05 Feb 2006 08:34:25 +1300
From: Sidney Markowitz <sidney@sidney.com>
To: Cryptography <cryptography@metzdowd.com>
In-Reply-To: <CEBFB6E4-CE23-47AE-AC38-751803C751B2@crypto.com>

Matt Blaze wrote:
> Yes, it's not at all clear from these stories just what was
> going on or how "high tech" the attack would have to be. What does
> "diverting" to a prepaid mobile mean?

There is more information in Bruce Scheier's blog entry and his links to blog
and news articles. It hit slashdot yesterday:

http://www.schneier.com/blog/archives/2006/02/phone_tapping_i.html

According to those reports, the attack involved modifying (configuring?)
software on a Vodafone switch to cause all calls to/from some 100 mobile phone
numbers to be conference calls with some prepaid mobile numbers that recorded
the conversations.

 Sidney Markowitz
 http://www.sidney.com

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post