"Steven M. Bellovin" <[EMAIL PROTECTED]> writes: >What makes this interesting is how it was done: software was installed on the >switch that diverted calls to a prepaid phone. Think about who could manage >that.
Just in case people think the answer is "The MIB", it's actually "Any kid with a bit of technical knowledge". Susan Dreyfus' book "Underground", for example, documents hackers playing around inside cellular phone switches in Europe. So although the target list looks like a typical intelligence agency hitlist, it could also have been done by a joyriding teenager interested in listening in on what politicians, the military, and journalists were saying and hearing. (Yes, I know the evidence points at the MIB, but that doesn't automatically mean it was them). Peter. --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]