Introduction: Telephone traffic analysis

f_griffith at TITAN.SFASU.EDU f_griffith at TITAN.SFASU.EDU
Fri Sep 9 12:18:10 PDT 1994



>They track and compare the frequency of calling patterns made by the targets.
>Now they know the "calling circle" of the targets.  They expand the tracking
>pattern and start looking for cross overs.

Tom Clancy in _Clear and Present Danger_ has a description of the CIA
doing something like this to the Columbia drug cartel.  







More information about the cypherpunks-legacy mailing list