From: Doug Hughes <Doug.Hughes@Eng.Auburn.EDU>
To: cypherpunks@toad.com
Message Hash: 22c1e8528f3618a8bf739717cf4f1ffdb99abc2db0bac30c7197929b0205e7d2
Message ID: <doug-9600161914.AA002018317@netman.eng.auburn.edu>
Reply To: <Pine.SUN.3.91.960115200633.18120B-100000@polaris.mindport.net>
UTC Datetime: 1996-01-16 20:33:53 UTC
Raw Date: Wed, 17 Jan 1996 04:33:53 +0800
From: Doug Hughes <Doug.Hughes@Eng.Auburn.EDU>
Date: Wed, 17 Jan 1996 04:33:53 +0800
To: cypherpunks@toad.com
Subject: Re: CelBomb
In-Reply-To: <Pine.SUN.3.91.960115200633.18120B-100000@polaris.mindport.net>
Message-ID: <doug-9600161914.AA002018317@netman.eng.auburn.edu>
MIME-Version: 1.0
Content-Type: text/plain
Just FYI:
Time has a different twist on the entire story than the 'trusted
compatriot hands over rigged phone' story that has been the basis
for comment around here. Their take on it was that Israeli intelligence
was gradually triangulating the frequency of his phone over time, and
was eventually able to setup some interference on his frequency such
that he thought the phone was going bad (dropped calls and such I suppose).
So, he sent the phone back to the factory. The Intelligence service, with
the cooperation of the factory, intercepted the phone, placed the bomb,
and then sent it back. Sometime later, they (somehow) get him on the phone,
confirm it is him, and send the detonate code/tone/beep. Instant
lobotomy.
--
____________________________________________________________________________
Doug Hughes Engineering Network Services
System/Net Admin Auburn University
doug@eng.auburn.edu
Pro is to Con as progress is to congress
Return to January 1996
Return to “John Young <jya@pipeline.com>”