serious threat models
Peter Gutmann
pgut001 at cs.auckland.ac.nz
Sun Feb 5 07:23:59 EST 2006
"Steven M. Bellovin" <smb at cs.columbia.edu> writes:
>What makes this interesting is how it was done: software was installed on the
>switch that diverted calls to a prepaid phone. Think about who could manage
>that.
Just in case people think the answer is "The MIB", it's actually "Any kid with
a bit of technical knowledge". Susan Dreyfus' book "Underground", for
example, documents hackers playing around inside cellular phone switches in
Europe. So although the target list looks like a typical intelligence agency
hitlist, it could also have been done by a joyriding teenager interested in
listening in on what politicians, the military, and journalists were saying
and hearing.
(Yes, I know the evidence points at the MIB, but that doesn't automatically
mean it was them).
Peter.
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com
More information about the cryptography
mailing list