From: Sandy Sandfort <sandfort@crl.com>
To: Cypherpunks <cypherpunks@toad.com>
Message Hash: d9011cc346f3cd304d03dd29fea5fd429b088d1737529b1638465fd9d0bae1dc
Message ID: <Pine.3.87.9407251517.A3557-0100000@crl.crl.com>
Reply To: N/A
UTC Datetime: 1994-07-26 02:39:15 UTC
Raw Date: Mon, 25 Jul 94 19:39:15 PDT
From: Sandy Sandfort <sandfort@crl.com>
Date: Mon, 25 Jul 94 19:39:15 PDT
To: Cypherpunks <cypherpunks@toad.com>
Subject: LITTLE BROTHER INSIDE
Message-ID: <Pine.3.87.9407251517.A3557-0100000@crl.crl.com>
MIME-Version: 1.0
Content-Type: text/plain
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
SANDY SANDFORT
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
C'punks,
I was just thinking about computer seizures and thefts. I think
I've come up with a couple of interesting solutions.
REMOTE CONTROL--In addition to denying access to your files by
encrypting, you might want to *change* them in some way *after*
your computer has been seized/stolen. Pagers are cheap. They
can be pinged no matter where they are located in their service
area. They can be accessed from any phone (even a jailhouse
payphone). And they are small enough to be wired into your
computer. It souldn't be too difficult to fix it so your
computer can read transmitted numbers from the pager's memory.
Code numbers could be used to tell your computer to take various
actions. Depending upon your circumstances, you could tell your
computer to decrypt this or that set of files, to reformat the
hard drive, to fry the CPU, etc.
LITTLE BROTHER INSIDE--Even better than a pager, would be a cell
phone. It would be more expensive, but also more versatile. In
addition to giving instructions to your computer, a cell phone
could be used to *eavesdrop* on the location where your computer
is being held. By disabling the ringer and remounting the
mouthpiece, you could surreptitiously call your computer, any
time, from any phone and monitor conversations in the area. (To
paraphrase an old military curse, "bug the bugging buggers.") As
long as the computer is plugged in, the cell phones batteries
will continue to be topped off. (For the truly thorough privacy
advocate, a GPS unit could be hooked into the cell phone to give
you its location.)
S a n d y
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Return to July 1994
Return to “Sandy Sandfort <sandfort@crl.com>”