Amazing what is possible when the usual rules don’t apply, and time and money 
is focused on a problem, e.g. #10 below.

 

https://securelist.com/files/2015/02/Equation_group_questions_and_answers.pdf

 

As this is a multi-national Russian firm that deconstructed this, it alludes 
that all sorts of groups could now probably construct something better, given 
this motivation and existence proof..

 

Marcus

 

From: Friam [mailto:[email protected]] On Behalf Of Roger Critchlow
Sent: Thursday, February 19, 2015 2:15 PM
To: The Friday Morning Applied Complexity Coffee Group
Subject: [FRIAM] fresh Snowden

 

To facilitate listening to cell phone conversations, the NSA and GCHQ hacked 
the world wide supplier of SIM cards and stole the encryption keys used to 
secure cell phone communications between handsets and the vendor's backbone.

 

  https://firstlook.org/theintercept/2015/02/19/great-sim-heist/

 

That way they didn't need to make any awkward requests for authority to 
eavesdrop or leave any other trace of their activities, they just record the 
communications to/from the handset of interest off the air and use the vendor's 
secret keys to decrypt the contents at their leisure.

 

They also decided to hack into the administrative computers at the cell phone 
carriers so they could erase any suspicious charges from the customer's bill.

 

-- rec --

============================================================
FRIAM Applied Complexity Group listserv
Meets Fridays 9a-11:30 at cafe at St. John's College
to unsubscribe http://redfish.com/mailman/listinfo/friam_redfish.com

Reply via email to