traffic analysis of phone calls?

David Honig dahonig at cox.net
Sat Jul 12 16:00:40 EDT 2003


At 11:21 AM 7/12/03 -0400, Don Davis wrote:
> It often does not lie behind a firewall. Heck, it
> usually doesn't even lie behind a door. It has a direct
> connection to the Internet because, believe it or not,
> that is how the wiretap data is collected and transmitted."

I believe the CALEA specs call for the data to be encrypted
however.

The sophisticated spook/cartel also gets payphone logs
and does geographic matching.

How much does a free-lance counter-intel person make in Columbia?




---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com



More information about the cryptography mailing list