[funsec] insite to using cell phone to intercept

Kurt Grutzmacher grutz at jingojango.net
Tue Mar 13 11:43:25 CDT 2007

The NYT article (
isn't entirely clear but I'd be surprised if it wasn't just programming the
PBX to record calls to a specific extension when CID = NYT. The home-made
rig to capture text messages from within the building is intriguing.

This has a little stink of HP's troubles but in a southern-state kind of
way. Never mess with good'ol'boys with bubba trucks and gun racks! They'll
monitor your SMS messages with some hillbilly ingenuity!

On 3/13/07, C Q <kyle.c.quest at gmail.com> wrote:
> The article said that cloning is one of the methods saying that,
> "Wal-Mart isn't discussing details of the method its employee used".
> Cloning used to be relatively simple with analog cellphones,
> which nobody is using anymore. It wasn't very cheap though.
> On 3/13/07, Dude VanWinkle <dudevanwinkle at gmail.com> wrote:
> >
> > The article said that he cloned their phone. That would be similar to
> > cloning a MAC address, except that both could send and receive data.
> >
> > this used to be really popular in the analog days of cell phones, but
> > the process got more complex after digital got popular.
> >
> > Now-a-days, with the advent of sim chips, i think it would be as
> > simple as cloning the data on the sim and inserting that cloned sim
> > into any phone.
> >
> >
> >
> _______________________________________________
> Fun and Misc security discussion for OT posts.
> https://linuxbox.org/cgi-bin/mailman/listinfo/funsec
> Note: funsec is a public and open mailing list.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://linuxbox.org/pipermail/funsec/attachments/20070313/c6b38553/attachment.html

More information about the funsec mailing list