[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: CelBomb



>   Can anyone in IL, or elsewhere, report more on the head-job
>   of The Engineer:
>
I don't know beans about it, but I've never let that stop me before.

>   Any crypto used to authenticate the target for the boombox,
>   or to obscure links to the assassin?
>
>   How was the blast specifically targeted at him and not a
>   phone borrower?
>
>   How it was set off -- by user-dialing, remote control, some
>   other means?
>

Try this scenario.  Bomb in cell phone's trigger is activated by a tone,
say the DTMF tones for the numbers 8 and 6.

Assassin calls phone number, and performs the following authentication protocol:

"Hi, this is J.Random Assassin.  May I speak to Mr. Intended Victim Please?"
"Speaking."
"Message for youuuuuuuuuuu...." Beep  Boop

BOOM!!!