[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAJVRA1QTUHiY=qwLYezZnE1Lg27sZ5z0idEbpmgkOLsFb0d2vQ@mail.gmail.com>
Date: Sun, 10 Jun 2012 13:25:30 -0700
From: coderman <coderman@...il.com>
To: Benjamin Kreuter <ben.kreuter@...il.com>
Cc: full-disclosure@...ts.grok.org.uk
Subject: Re: Obama Order Sped Up Wave of Cyberattacks
Against Iran
On Sun, Jun 10, 2012 at 9:42 AM, Benjamin Kreuter <ben.kreuter@...il.com> wrote:
> ...
>> (CALEA taps are *widely* exploited by the bad guys.
>
> Do you have a good citation for this?
the most infamous case is the athens affair:
http://spectrum.ieee.org/telecom/security/the-athens-affair
"While this is the first major infiltration to involve cellphones, the
scheme did not depend on the wireless nature of the network.
Basically, the hackers broke into a telephone network and subverted
its built-in wiretapping features for their own purposes."
with the "built-in wiretapping features" being CALEA components...
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists