Thomas Shaddack wrote:
[...]
Suggested countermeasure: When true anonymity is requested, use the card
ONLY ONCE, then destroy it. Makes the calls rather expensive, but less
risky. Make sure you can't be traced back by other means, ranging from
surveillance cameras in the vicinity of the phone
Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of R. A. Hettinga
Sent: Friday, March 26, 2004 7:10 PM
To: Thomas Shaddack; Cypherpunks
Subject: Re: Anonymity of prepaid phone chip-cards
At 7:51 PM +0100 3/26/04, Thomas Shaddack wrote:
I strongly suspect the usage
At 01:51 PM 3/26/2004, Thomas Shaddack [EMAIL PROTECTED] wrote:
Suggested countermeasure: When true anonymity is requested, use the card
ONLY ONCE, then destroy it. Makes the calls rather expensive, but less
risky. Make sure you can't be traced back by other means, ranging from
surveillance
At 12:41 AM 3/27/04 -0500, [EMAIL PROTECTED] wrote:
And yet one would've thought that a smart radical would have been able
to
purchase a measly couple of 50 lb bags of (NH4NO3) without having to
call
all over the place and brag about it, and for cash at that. You don't
want
it known, don't say
At 01:05 AM 3/27/04 -0500, [EMAIL PROTECTED] wrote:
At 01:51 PM 3/26/2004, Thomas Shaddack [EMAIL PROTECTED] wrote:
Suggested countermeasure: When true anonymity is requested, use the
card
ONLY ONCE, then destroy it.
Better yet, take another 10 minutes, get change from a laundromat, and
use
At 08:39 PM 3/26/04 -0600, Black Unicorn wrote:
Keeping calling cards from leaking information probably isn't possible.
Limiting the information leaked to that which is already known or is
useless
is probably the best bet. Using separate cards for separate
operations /
cells and immediate
At 10:51 AM 3/26/2004, Thomas Shaddack wrote:
Each prepaid Trick phone card has its unique serial number. The payphone
reads it from the card. The busted person (let's call him target) used
the same card for multiple phone calls, thus becoming the card's number
known as the target's temporary
At 7:51 PM +0100 3/26/04, Thomas Shaddack wrote:
I strongly suspect the usage logs exist for individual cards, allowing to
back-trace the phonecalls done with the given card, thus tracing the
identity of the card's owner by the call patterns.
Of course.
How do you think they caught the Oklahoma
:10 PM
To: Thomas Shaddack; Cypherpunks
Subject: Re: Anonymity of prepaid phone chip-cards
At 7:51 PM +0100 3/26/04, Thomas Shaddack wrote:
I strongly suspect the usage logs exist for individual
cards, allowing
to back-trace the phonecalls done with the given card, thus
tracing