Re: cellphones as room bugs
Ian Farquhar (ifarquha) wrote The other problem for this technique is battery life. Suppose this worked by recording from mic to memory and then transmitting later. This leads to a bunch of questions: By what factor could transmission time/power be reduced sending such a recording later? How many minutes could a typical phone buffer? How much does a typical conversation compress? Are such algorithms within the power of a typical phone's processor? How much power is used in recording to memory and compressing? Can transmission power requirements be reduced by transmitting when transmission power requirements are low? Can they be reduced often enough to make it worthwhile optimizing in this way? -Dan - The Cryptography Mailing List Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]
Re: NSA knows who you've called.
See also Title 18 section 2703(c)(2): (2) A provider of electronic communication service or remote computing service shall disclose to a governmental entity the - (A) name; (B) address; (C) local and long distance telephone connection records, or records of session times and durations; (D) length of service (including start date) and types of service utilized; (E) telephone or instrument number or other subscriber number or identity, including any temporarily assigned network address; and (F) means and source of payment for such service (including any credit card or bank account number), of a subscriber to or customer of such service when the governmental entity uses an administrative subpoena authorized by a Federal or State statute or a Federal or State grand jury or trial subpoena or any means available under paragraph (1). (at http://caselaw.lp.findlaw.com/casecode/uscodes/18/parts/i/chapters/121/sections/section_2703.html ) This paragraph specifically gives the requirements for disclosure of local and long distance telephone connection records, which were plainly not met. -Dan William Allen Simpson wrote: Perry E. Metzger wrote: http://www.usatoday.com/news/washington/2006-05-10-nsa_x.htm Legal analysis from Center for Democracy and Technology at: http://www.cdt.org/publications/policyposts/2006/8 - The Cryptography Mailing List Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]
Re: A small editorial about recent events.
David G. Koontz wrote: Yet President Bush as publicly stated it requires a court order to wiretap: Secondly, there are such things as roving wiretaps. Now, by the way, any time you hear the United States government talking about wiretap, it requires -- a wiretap requires a court order. Nothing has changed, by the way. When we're talking about chasing down terrorists, we're talking about getting a court order before we do so. It's important for our fellow citizens to understand, when you think Patriot Act, constitutional guarantees are in place when it comes to doing what is necessary to protect our homeland, because we value the Constitution. http://www.whitehouse.gov/news/releases/2004/04/20040420-2.html Bush didn't say it always requires a court order to wiretap. He said, any time you hear . . . a wiretap requires at court order. So, when don't hear the government talking about a wiretap, the wiretap doesn't require a court order. And he used the present tense. So, he didn't mean . . . any time you hear . . . required a court order. And if you think these by the way words weren't carefully chosen, see the care with which Bush clarified the antecedent of it, so his listeners would not be left with the impression that it requires a court order to hear the US Government talk about a wiretap. When you take Bush at his word (every carefully chosen word) its easy to see how little he cares for things like civil liberties and the rule of law. -Dan - The Cryptography Mailing List Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]
Re: Last WWII Comanche code talker dies in Oklahoma
Andreas Hasenack Wasn't that navajo instead? I wondered about that myself. With some googling, I have found that native american code talkers were used from a number of tribes (Navajo, Comanche, Choctaw). Code talkers were also used in WW I. Here are some links: http://www.comanchelanguage.org/code_talkers.htm http://codetalkers.info/content/view/20/37/ -Dan - The Cryptography Mailing List Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]