Email tapping by ISPs, forwarder addresses, and crypto proxies
Sunder
sunder at sunder.net
Wed Jul 7 12:06:42 PDT 2004
On Wed, 7 Jul 2004, Tyler Durden wrote:
> "If you think the cable landings in Va/Md are coincidental, you are
> smoking something I've run out of. Its all recorded. I'm sure the
> archiving and database groups in Ft. Meade will get a chuckle out of your
> "the right to" idioms."
>
> Well, I don't actually believe it's all recorded. As I've attempted to
> explain previously, "they" almost certainly have risk models in place. When
> several variables twinkle enough (eg, origination area, IP address, presence
> of crypto...) some rule fires and then diverts a copy into the WASP'S Nest.
> There's probably some kind of key word search that either diverts the copy
> into storage or into the short list for an analyst to peek it.
To channel Mr. May: "All of this of course can be put to rest by reading
some Bamford. (Body of Secrets, Puzzle Palace.)"
More information about the Testlist
mailing list