[13829] in cryptography@c2.net mail archive
Re: traffic analysis of phone calls?
daemon@ATHENA.MIT.EDU (David Honig)
Sun Jul 13 01:27:37 2003
X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
Date: Sat, 12 Jul 2003 13:00:40 -0700
To: Don Davis <don@mit.edu>, Steve Bellovin <smb@research.att.com>
From: David Honig <dahonig@cox.net>
Cc: cryptography@metzdowd.com
In-Reply-To: <a05100348bb35d66a9de8@[67.242.205.201]>
At 11:21 AM 7/12/03 -0400, Don Davis wrote:
> It often does not lie behind a firewall. Heck, it
> usually doesn't even lie behind a door. It has a direct
> connection to the Internet because, believe it or not,
> that is how the wiretap data is collected and transmitted."
I believe the CALEA specs call for the data to be encrypted
however.
The sophisticated spook/cartel also gets payphone logs
and does geographic matching.
How much does a free-lance counter-intel person make in Columbia?
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com