t had taken Robert Lemoine barely twenty minutes to execute the man-in-the-middle attack. He had first sighted Mira when she turned off the highway on to the gravel access road and stashed her bike in the patch of scrub, and had gone at once to his controls; by the time she reached the second gate, he had forced a connection with her phone, accessed her identifying information, obtained her stored encryption key, simulated her over-the-air transmissions, established a connection with the local mast, and then authenticated himself so that from that point forward, he could appear to Mira’s service provider as Mira’s phone, and to Mira’s phone as her service provider. Not only did he now have complete access to her data, both present and historic, he also had the power to intercept and change her messages in both directions; now, if he wanted, he could both alter what communications she received, and send messages – to anyone – as her. It was a flawless capture. Had she ventured a little further up the gravel road, she would have come upon the trailer-mounted mobile cell site, fitted with an IMSI-catcher device, that he had used to carry out the operation; had she taken her phone
UNLIMITED
Playing God
Feb 12, 2023
7 minutes
You’re reading a preview, subscribe to read more.
Start your free 30 days