Can anyone in IL, or elsewhere, report more on the head-job of The Engineer: Any crypto used to authenticate the target for the boombox, or to obscure links to the assassin? How was the blast specifically targeted at him and not a phone borrower? How it was set off -- by user-dialing, remote control, some other means? Any fishy smelling brand names to immediately run from? Answers urgent.
On Sat, 6 Jan 1996, John Young wrote:
Can anyone in IL, or elsewhere, report more on the head-job of The Engineer:
Any crypto used to authenticate the target for the boombox, or to obscure links to the assassin?
No. It was not assumed that the victim would take special notice of the phone call, or certainly not enough to bother to try and track the signal realtime BEFORE accepting the phone. Hence, crypto is serious overkill.
How was the blast specifically targeted at him and not a phone borrower?
The phone was given to a trusted traitor, a call comes in, trusted agent tells hapless victim that he should talk to this person, caller estlablishes that this is the target by voice or otherwise, then hits e.g., the pound key, which triggers the explosive concealed in the battery. The charge was shaped to deliver the most available force into the ear. Not much explosive is required for such an application.
How it was set off -- by user-dialing, remote control, some other means?
DTMF dialing. It may also have been a special frequency not available from the keypad, but I don't believe so.
Any fishy smelling brand names to immediately run from?
Whatever is being used. The installation was a totally custom job, and incidently, quite simple in implementation. Never take anything from others without close scrutiny if you are this wanted. Such devices on normal phones are common methods. Moving them to keep up with technology is a simple matter.
Answers urgent.
Uh huh. Sure. --- My prefered and soon to be permanent e-mail address: unicorn@schloss.li "In fact, had Bancroft not existed, potestas scientiae in usu est Franklin might have had to invent him." in nihilum nil posse reverti 00B9289C28DC0E55 E16D5378B81E1C96 - Finger for Current Key Information
Just FYI: Time has a different twist on the entire story than the 'trusted compatriot hands over rigged phone' story that has been the basis for comment around here. Their take on it was that Israeli intelligence was gradually triangulating the frequency of his phone over time, and was eventually able to setup some interference on his frequency such that he thought the phone was going bad (dropped calls and such I suppose). So, he sent the phone back to the factory. The Intelligence service, with the cooperation of the factory, intercepted the phone, placed the bomb, and then sent it back. Sometime later, they (somehow) get him on the phone, confirm it is him, and send the detonate code/tone/beep. Instant lobotomy. -- ____________________________________________________________________________ Doug Hughes Engineering Network Services System/Net Admin Auburn University doug@eng.auburn.edu Pro is to Con as progress is to congress
On Tue, 16 Jan 1996, Doug Hughes wrote:
Just FYI:
Time has a different twist on the entire story than the 'trusted compatriot hands over rigged phone' story that has been the basis for comment around here.
Is it any mystery that of the four publications quoted on the list, there are four different versions of the event? "Sources and Methods" ya know.
-- ____________________________________________________________________________ Doug Hughes Engineering Network Services System/Net Admin Auburn University doug@eng.auburn.edu Pro is to Con as progress is to congress
--- My prefered and soon to be permanent e-mail address: unicorn@schloss.li "In fact, had Bancroft not existed, potestas scientiae in usu est Franklin might have had to invent him." in nihilum nil posse reverti 00B9289C28DC0E55 E16D5378B81E1C96 - Finger for Current Key Information
participants (3)
-
Black Unicorn -
Doug Hughes -
John Young