[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: CelBomb



On Sat, 6 Jan 1996, John Young wrote:

>    Can anyone in IL, or elsewhere, report more on the head-job
>    of The Engineer:
> 
>    Any crypto used to authenticate the target for the boombox,
>    or to obscure links to the assassin?

No.  It was not assumed that the victim would take special notice of the 
phone call, or certainly not enough to bother to try and track the signal 
realtime BEFORE accepting the phone.  Hence, crypto is serious overkill.

> 
>    How was the blast specifically targeted at him and not a
>    phone borrower?

The phone was given to a trusted traitor, a call comes in, trusted agent 
tells hapless victim that he should talk to this person, caller 
estlablishes that this is the target by voice or otherwise, then hits 
e.g., the pound key, which triggers the explosive concealed in the battery.

The charge was shaped to deliver the most available force into the ear.  
Not much explosive is required for such an application.

>    How it was set off -- by user-dialing, remote control, some
>    other means?

DTMF dialing.  It may also have been a special frequency not available 
from the keypad, but I don't believe so.

>    Any fishy smelling brand names to immediately run from?

Whatever is being used.  The installation was a totally custom job, and 
incidently, quite simple in implementation.  Never take anything from 
others without close scrutiny if you are this wanted.

Such devices on normal phones are common methods.  Moving them to keep up 
with technology is a simple matter.

>    Answers urgent.

Uh huh.  Sure.

---
My prefered and soon to be permanent e-mail address: [email protected]
"In fact, had Bancroft not existed,       potestas scientiae in usu est
Franklin might have had to invent him."    in nihilum nil posse reverti
00B9289C28DC0E55  E16D5378B81E1C96 - Finger for Current Key Information