Don Davis <[EMAIL PROTECTED]> writes:
>with similar import, here's cringely's article on insecure CALEA
>workstations:
A friend of mine who used to work for a large telco ended up being delegated
to attend some of the CALEA meetings. He reports that the FBI were totally
unable to comprehend that
At 11:21 AM 7/12/03 -0400, Don Davis wrote:
> It often does not lie behind a firewall. Heck, it
> usually doesn't even lie behind a door. It has a direct
> connection to the Internet because, believe it or not,
> that is how the wiretap data is collected and transmitted."
I believe the CALEA specs
Personal
(Use it if you'd like, but keep me out of it.)
Steve Bellovin wrote:
Slightly off-topic, but a reminder of the sort of thing that ordinary
crypto doesn't hide.
http://www.silicon.com/news/59-51/1/5093.html?rolling=2
IT Myths: Colombian drugs gang's mainframe-assisted assassinatio
> Slightly off-topic, but a reminder of the sort of thing that
> ordinary crypto doesn't hide.
>
> http://www.silicon.com/news/59-51/1/5093.html?rolling=2
>
> IT Myths: Colombian drugs gang's mainframe-assisted assassinations?
> Did drugs barons really use multi-million pound systems to see
Slightly off-topic, but a reminder of the sort of thing that ordinary
crypto doesn't hide.
http://www.silicon.com/news/59-51/1/5093.html?rolling=2
IT Myths: Colombian drugs gang's mainframe-assisted assassinations?
Did drugs barons really use multi-million pound systems to see who
was gra