I sent this to press@gsm.com, the email address of Claire Cranton, quoted in the article :<p>Dear Ms. Cranton,<p><a href="http://www.nytimes.com/2009/12/29/technology/29hack.html?_r=1" rel="nofollow">http://www.nytimes.com/2009/12/29/technology/29hack.html?_r=...</a><p>“This is theoretically possible but practically unlikely,” said Claire Cranton, a GSM spokeswoman, noting that no one else had broken the code since its adoption. “What he is doing would be illegal in Britain and the United States. To do this while supposedly being concerned about privacy is beyond me.”<p>A set of incredible admissions.<p>* This is theoretically possible but practically unlikely<p>GSM 64bit encryption is broken. Not theoretically but actually. The likelihood of it happening to someone now depends on the value of the calls.<p>* no one else had broken the code since its adoption.<p>And now they have, that's the point<p>* would be illegal in Britain and the United States<p>I don't think criminals are deterred by such niceties and they are hardly likely to reveal their source while extorting money from me or making insider trades<p>* To do this while supposedly being concerned about privacy is beyond me<p>Knowing that my handset can be eavesdropped by people outside of the law is the ultimate privacy concern. That you don't understand this is beyond me.<p>> The association noted that hackers intent on illegal eavesdropping would need a radio receiver system and signal processing software to process raw radio data, much of which is copyrighted.<p>Again, copyright infringement would be very low on the list of criminal organisations.<p>Your response beggars belief, except it is perfectly reasonable viewed through the lens of PR.<p>Yours sincerely<p><i></i><i></i><i></i><i></i>