traffic analysis of phone calls?
David Honig
dahonig at cox.net
Sat Jul 12 16:00:40 EDT 2003
At 11:21 AM 7/12/03 -0400, Don Davis wrote:
> It often does not lie behind a firewall. Heck, it
> usually doesn't even lie behind a door. It has a direct
> connection to the Internet because, believe it or not,
> that is how the wiretap data is collected and transmitted."
I believe the CALEA specs call for the data to be encrypted
however.
The sophisticated spook/cartel also gets payphone logs
and does geographic matching.
How much does a free-lance counter-intel person make in Columbia?
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com
More information about the cryptography
mailing list