[WISPA] CALEA FAQ Questions

2007-05-10 Thread Dawn DiPietro
Marlon, I have been reading the WISPA CALEA FAQ and was a little concerned about question #10. If the LEA does not know who the suspect is using an open access point does this mean that everyone that has used that access point will have their data handed over to the LEA? It would seem that if

Re: [WISPA] CALEA FAQ Questions

2007-05-10 Thread Ryan Langseth
On Thu, 2007-05-10 at 09:37 -0400, Dawn DiPietro wrote: Marlon, I have been reading the WISPA CALEA FAQ and was a little concerned about question #10. If the LEA does not know who the suspect is using an open access point does this mean that everyone that has used that access point will

Re: [WISPA] CALEA FAQ Questions

2007-05-10 Thread Matt
I have been reading the WISPA CALEA FAQ and was a little concerned about question #10. If the LEA does not know who the suspect is using an open access point does this mean that everyone that has used that access point will have their data handed over to the LEA? It would seem that if the LEA is

Re: [WISPA] CALEA FAQ Questions

2007-05-10 Thread Martha Huizenga
This is not the sense that I get from the meeting we had with the FBI. They will know who the target is and be issuing an order for that person. However, if they happen to live with several people all on one wireless network, then the traffic is going to be mixed most likely. The best you can

Re: [WISPA] CALEA FAQ Questions

2007-05-10 Thread Marlon K. Schafer (509) 982-2181
] www.odessaoffice.com/wireless www.odessaoffice.com/marlon/cam - Original Message - From: Dawn DiPietro [EMAIL PROTECTED] To: WISPA General List wireless@wispa.org Sent: Thursday, May 10, 2007 6:37 AM Subject: [WISPA] CALEA FAQ Questions Marlon, I have been reading the WISPA CALEA FAQ

Re: [WISPA] CALEA FAQ Questions

2007-05-10 Thread Sam Tetherow
This is one of the things that has always bothered me when it comes to wire tapping a data connection. On a phone call it can be pretty easy to tell if your suspect is involved in the conversation, assuming they have not used a voice modulator. But when it comes to a data connection, how do

Re: [WISPA] CALEA FAQ Questions

2007-05-10 Thread John Scrivner
Sam, The evidence that LEAs collect is just part of a case. If a suspect is doing bad things then data will be collected. Next steps would usually involve a warrant to get the computer and have it looked over. I have seen other tools used by LEAs to gather evidence. I am guessing that