On Thu, Dec 23, 2021, 16:27 Jeremy Ardley <jer...@ardley.org> wrote:

>
> On 24/12/21 5:03 am, Curt wrote:
> >
> > It wasn't really that "rhetorical" a van because it was precisely the
> > very concrete "mobile FBI van" described on the Wikipedia page the OP
> > referenced.
> >
> > As for the accurate representation of reality, I'm afraid we can only
> > hope, however vainly, that people are capable of determining for
> > themselves who might or might not be an expert in the field.
> >
> >>
> https://theintercept.com/document/2015/12/17/government-cellphone-surveillance-catalogue/
> >>
> >
> The tools listed in the intercept article don't allow interception of
> actual voice calls. They are intended to perform traffic analysis and
> test functions.
>
> Any competent authority would simply get a warrant (or not) and
> intercept calls at the exchanges. It's very easy and happens all the
> time. In conflict countries like Syria and Ukraine you can be certain
> that 100% of call metadata are recorded and a significant fraction, if
> not 100%, of voice data recorded for future use. It's not a lot of data
> on the scale of things.
>
> Getting back to the OP, on the scale of likelihood:
>
> - zero probability a bad guy was sitting across the street to intercept
> his phone
>
> - zero probability a carrier exchange was compromised by a non-state actor
>
> - moderate probability the financial institution PBX was compromised
>
> - good probability the OP computer *could* have been compromised - it's
> relatively easy but may not have happened
>
> My working theory is the financial institution PBX was compromised and a
> small percentage of inbound calls intercepted. It was the OP's bad luck
> to be one of those.
>
> --
> Jeremy
>

> Thank you.

Reply via email to