1994-06-18 - Re: Another Cellular Victim

Header Data

From: Tommy the Tourist <nobody@soda.berkeley.edu>
To: cypherpunks@toad.com
Message Hash: c41dbd3dc85d18033d369e36c353287506f382b4bdfbcbe54fdf835a478a9633
Message ID: <199406181748.KAA16670@soda.berkeley.edu>
Reply To: N/A
UTC Datetime: 1994-06-18 17:48:37 UTC
Raw Date: Sat, 18 Jun 94 10:48:37 PDT

Raw message

From: Tommy the Tourist <nobody@soda.berkeley.edu>
Date: Sat, 18 Jun 94 10:48:37 PDT
To: cypherpunks@toad.com
Subject: Re: Another Cellular Victim
Message-ID: <199406181748.KAA16670@soda.berkeley.edu>
MIME-Version: 1.0
Content-Type: text/plain


> >They report that he was tracked via his cellphone use.  What this country
> >needs is a good anonymous cellphone net.

> Really.  And what's more: when the Colombian drug lord was located
> via his cellular use, the story was that the NSA had to bring special
> equipment into the country to do the tracking.  That doesn't wash here.
> It looks like at least some switches in Amerika are already equipped
> to read out locations for individual phones.  They probably don't even
> have to wait for you to make a call - they can call you, or even use
> the phone's automatic pings.

   No NSA equipment needed. A simple scanner and some software can be
used to track which cell you are in. They didn't have to triangulate
OJ's position or anything, they only needed to know which cell he was in,
and the direction he was traveling. The rest is simple.

(you can find such software on hack/phreak BBSes already. The only
personal information needed is the telephone # of the cell phone)


------------
To respond to the sender of this message, send mail to
remailer@soda.berkeley.edu, starting your message with
the following 7 lines:
::
Response-Key: ideaclipper

====Encrypted-Sender-Begin====
MI@```$YS^P;+]AB?X9TW6\8WR:.P&2'N\0Q?\$?[X!7/,SN6`JBJ$D//!Z"Z
FS)`S)G0<=-J!/44-Q$^WK"37[MUZNKYYE)[BS7ZNSJSP<LH*RSD`
====Encrypted-Sender-End====





Thread