1994-09-09 - Introduction: Telephone traffic analysis

Header Data

From: f_griffith@TITAN.SFASU.EDU
To: cypherpunks@toad.com
Message Hash: db833a5e4e0614f2c20ea11a92970ec53afc6dfca20ea8444c111697f39fc9d8
Message ID: <01HGWTBH6U4M0007DA@TITAN.SFASU.EDU>
Reply To: N/A
UTC Datetime: 1994-09-09 19:18:10 UTC
Raw Date: Fri, 9 Sep 94 12:18:10 PDT

Raw message

From: f_griffith@TITAN.SFASU.EDU
Date: Fri, 9 Sep 94 12:18:10 PDT
To: cypherpunks@toad.com
Subject: Introduction: Telephone traffic analysis
Message-ID: <01HGWTBH6U4M0007DA@TITAN.SFASU.EDU>
MIME-Version: 1.0
Content-Type: text/plain



>They track and compare the frequency of calling patterns made by the targets.
>Now they know the "calling circle" of the targets.  They expand the tracking
>pattern and start looking for cross overs.

Tom Clancy in _Clear and Present Danger_ has a description of the CIA
doing something like this to the Columbia drug cartel.  






Thread