This file is available on a Cryptome DVD offered by Cryptome. Donate $25 for a DVD of the Cryptome 10-year archives of 35,000 files from June 1996 to June 2006 (~3.5 GB). Click Paypal or mail check/MO made out to John Young, 251 West 89th Street, New York, NY 10024. Archives include all files of cryptome.org, cryptome2.org, jya.com, cartome.org, eyeball-series.org and iraq-kill-maim.org. Cryptome offers with the Cryptome DVD an INSCOM DVD of about 18,000 pages of counter-intelligence dossiers declassified by the US Army Information and Security Command, dating from 1945 to 1985. No additional contribution required -- $25 for both. The DVDs will be sent anywhere worldwide without extra cost.


21 April 1998
Thanks to RH


Date: Tue, 21 Apr 1998 06:24:09 -0500
To: jya@pipeline.com
From: RH
Subject: GSM MoU Association response

John:

I thought this might be of interest to you for possible posting. A friend
who works for Giesecke Devrient, (a German Smartcard manufacturer, among
other things), and who is generally reliable, sent it to me.


=================

Liebe Kollegen,
     
die MoU hat mit einer offiziellen Press Release geantwortet (Quelle: 
www.gsmworld.com)["gsmworld.com" defunct; try: www.gsmmou.org]
     
The GSM MoU Association Responds To Recent Claims Of Compromise To GSM 
Security 
     
The GSM MoU Association, which represents the world's GSM* network 
operators, regulators and administrative bodies from 109 
countries/areas of the world, has received reports from the US which 
claim that the security provided by the GSM SIM** card may have been 
compromised. 
     
The recent, unsubstantiated, reports concern the mathematical code 
(A3) used to provide authentication within the GSM smartcard. 
     
Charles Brookson, Chairman of the GSM MoU Association's Security Group 
said: "The Association's members have been aware of reported attempts 
to compromise this element of GSM security. It has been alleged that, 
through a long process of trial and error, an individual user's secret 
key code may be discovered." 
     
"It is important to stress that this would only be feasible where the 
hacker has the card in their physical possession. If achieved, it 
would only compromise that one card and it is not practical to achieve 
over the airwaves by eavesdropping, so GSM mobiles cannot be 'cloned' 
(copying the users identity) in the manner of analogue phones." 
     
"There is no significant breach of security here," added Brookson. 
"Compromising the A3 algorithm does not, in itself present a 
significant threat to GSM security overall." 
     
"Furthermore, the GSM algorithm the students are claiming to have 
broken is the example algorithm provided to our members for them to 
create their own individual version. 
     
"Our customers can be assured that GSM remains a secure technology 
with standards of security greater than any other mobile public 
network," said Brookson. 
     
- ends -
April 15, 1998 
     
For more information, please contact: 
     
Mark Smith Mary King Companycare Communications Ltd GSM MoU 
Association Tel: +44 118 958 2031 Tel: +353 1 269 5922 Fax: +44 118 959 
9595 Fax: +353 1 269 5958 Email: mark@companycare.com Email: 
marketing@gsmmou.org