Message Hash: b1babe5fd549411f0ef993c0cfff1ee8d4bdb84564c6b26ab710904ed202262e
Message ID: <9311090903.AA10563@jobe.shell.portal.com>
Reply To: N/A
UTC Datetime: 1993-11-09 09:03:32 UTC
Raw Date: Tue, 9 Nov 93 01:03:32 PST
From: email@example.com Date: Tue, 9 Nov 93 01:03:32 PST To: firstname.lastname@example.org Subject: No Subject Message-ID: <9311090903.AA10563@jobe.shell.portal.com> MIME-Version: 1.0 Content-Type: text/plain Re the Phiber Optik case. I understand that only vanilla, split-band modems (1200, 2400 baud) were tapped, on the analog loop. They were, and still are, common in the mundane telco world. Throw a bandpass filter on the upper half of the audio band, get the answer data. Throw a filter on the lower half, get the originate data. Much MUCH easier than tapping modern full-duplex full-band modems with echo cancellation and compression. I know some of the datacops involved, and I seriously doubt they have a clue about how to handle V.32 without help from the NSA, which DOES know how to intercept them. Of course, even if the modems had NSA-proof encryption built in, the victim could always intercept the decrypted data on the DTE connector... cracking is and will remain a risky and stupid thing to do...