From: Andrew.Spring@ping.be (Andrew Spring)
To: cypherpunks@toad.com
Message Hash: 0b44e7c980b19754c887d3061c89df37c530944e0fb0a9a4ba03f42143b9cd22
Message ID: <v01510100ad1c7a62b5c1@[193.74.216.26]>
Reply To: N/A
UTC Datetime: 1996-01-13 20:09:49 UTC
Raw Date: Sun, 14 Jan 1996 04:09:49 +0800
From: Andrew.Spring@ping.be (Andrew Spring)
Date: Sun, 14 Jan 1996 04:09:49 +0800
To: cypherpunks@toad.com
Subject: Re: CelBomb
Message-ID: <v01510100ad1c7a62b5c1@[193.74.216.26]>
MIME-Version: 1.0
Content-Type: text/plain
> Can anyone in IL, or elsewhere, report more on the head-job
> of The Engineer:
>
I don't know beans about it, but I've never let that stop me before.
> Any crypto used to authenticate the target for the boombox,
> or to obscure links to the assassin?
>
> How was the blast specifically targeted at him and not a
> phone borrower?
>
> How it was set off -- by user-dialing, remote control, some
> other means?
>
Try this scenario. Bomb in cell phone's trigger is activated by a tone,
say the DTMF tones for the numbers 8 and 6.
Assassin calls phone number, and performs the following authentication protocol:
"Hi, this is J.Random Assassin. May I speak to Mr. Intended Victim Please?"
"Speaking."
"Message for youuuuuuuuuuu...." Beep Boop
BOOM!!!
Return to January 1996
Return to “Andrew.Spring@ping.be (Andrew Spring)”
1996-01-13 (Sun, 14 Jan 1996 04:09:49 +0800) - Re: CelBomb - Andrew.Spring@ping.be (Andrew Spring)