serious threat models

Travis H. solinym at gmail.com
Sat Feb 4 01:27:58 EST 2006


On 2/3/06, Jaap-Henk Hoepman <jhh at cs.ru.nl> wrote:
> could this be
> done using phone conference facilities?

Good guess!

http://www.schneier.com/blog/archives/2006/02/phone_tapping_i.html

``The code tapped into the conference call system. It "conference
called" phone calls to 14 prepaid mobile phones where the calls were
recorded.''

I bet you can find a manual for one of these switches online somewhere,
should you be suitably motivated.
--
"Whosoever is delighted in solitude is either a wild beast or a god." -><-
http://www.lightconsulting.com/~travis/
GPG fingerprint: 50A1 15C5 A9DE 23B9 ED98 C93E 38E9 204A 94C2 641B

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com



More information about the cryptography mailing list