1996-01-13 - Re: CelBomb

Header Data

From: Andrew.Spring@ping.be (Andrew Spring)
To: cypherpunks@toad.com
Message Hash: 0b44e7c980b19754c887d3061c89df37c530944e0fb0a9a4ba03f42143b9cd22
Message ID: <v01510100ad1c7a62b5c1@[193.74.216.26]>
Reply To: N/A
UTC Datetime: 1996-01-13 20:09:49 UTC
Raw Date: Sun, 14 Jan 1996 04:09:49 +0800

Raw message

From: Andrew.Spring@ping.be (Andrew Spring)
Date: Sun, 14 Jan 1996 04:09:49 +0800
To: cypherpunks@toad.com
Subject: Re: CelBomb
Message-ID: <v01510100ad1c7a62b5c1@[193.74.216.26]>
MIME-Version: 1.0
Content-Type: text/plain


>   Can anyone in IL, or elsewhere, report more on the head-job
>   of The Engineer:
>
I don't know beans about it, but I've never let that stop me before.

>   Any crypto used to authenticate the target for the boombox,
>   or to obscure links to the assassin?
>
>   How was the blast specifically targeted at him and not a
>   phone borrower?
>
>   How it was set off -- by user-dialing, remote control, some
>   other means?
>

Try this scenario.  Bomb in cell phone's trigger is activated by a tone,
say the DTMF tones for the numbers 8 and 6.

Assassin calls phone number, and performs the following authentication protocol:

"Hi, this is J.Random Assassin.  May I speak to Mr. Intended Victim Please?"
"Speaking."
"Message for youuuuuuuuuuu...." Beep  Boop

BOOM!!!








Thread