traffic analysis of phone calls?

David Honig dahonig at
Sat Jul 12 16:00:40 EDT 2003

At 11:21 AM 7/12/03 -0400, Don Davis wrote:
> It often does not lie behind a firewall. Heck, it
> usually doesn't even lie behind a door. It has a direct
> connection to the Internet because, believe it or not,
> that is how the wiretap data is collected and transmitted."

I believe the CALEA specs call for the data to be encrypted

The sophisticated spook/cartel also gets payphone logs
and does geographic matching.

How much does a free-lance counter-intel person make in Columbia?

The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at

More information about the cryptography mailing list