« the Matthews culture and the kinchin lay | Main | dead author imitates life »

December 07, 2008


Fellow Traveller

Or that someone with the requisite technical skill hacked the telephone switch that routed the call so that it appeared to come from the Indian Foreign Ministry.

Anyone seen Kevin Mitnick lately?

It looks to me like a concerted effort to provoke war between these two states. We'll see a lot more of this kind of information warfare in the coming years.

The hacker also called Condoleezza Rice but failed to get through her staff's checks.


You don't need a Mitnick; you could do it with a suitably negligent VoIP bulk peer and an Asterisk box.


Is this for real?


Yes; adjust your delusions accordingly.

Chris Williams

A whole new vista of cyberterrorism, which makes a DDOS 'attack' look about as effective as a mean sneer, has just opened itself up to me. fuckfuckfuck. _This_ might have been the attack itself, with Mumbai just the bait.

Write your own Ems Telegram.

In a rational world, the arms control wonks of the planet would team up to offer secure and trusted communications infrastucture to all UN-recognised states - _especially_ the slightly mad, faily, ones. In a slightly luckier world, Arthur C Clarke would have survived to provide a video cameo at the launch press conference.

Chris Williams

PS - Never mind _The Day of the Jackal_ - what if their favorite novel is _Red Harvest_, their favorite movie _A Fistful of Dollars_, and their favorite memoir _Popski's Private Army_?


You're going to have to unpack that a bit for us, Chris. I for one haven't read "Red Harvest".

Fellow Traveller

I get it: third party manipulates two rival gangs into destroying one another, right?

Red Harvest ---> Yojimbo ---> A Fistful of Dollars

Chris Williams



Ah, got you. Thanks.


We already have one of those, Chris, and it was invented by a bunch of profs at MIT and random hackers. PGP; your e-mail client probably does it. To be specific, even without encrypting a document, you can sign it cryptographically, which proves to anyone with your public key that a) you signed it and b) the text is identical to the one you signed.

Voice is more problematic, but you could of course agree over encrypted e-mail on a shared secret to use for authentication. There are of course many, many fancy crypto systems for telephony.

But PGP, or just basic procedural security, would have defeated this attack trivially.

Chris Williams

Phew. Carry on, that planet.

. . . hang on, they all do _use_ this stuff, don't they?


Apparently not...

The comments to this entry are closed.

friends blogs


Blog powered by Typepad

my former home