From: f_griffith@TITAN.SFASU.EDU
To: cypherpunks@toad.com
Message Hash: db833a5e4e0614f2c20ea11a92970ec53afc6dfca20ea8444c111697f39fc9d8
Message ID: <01HGWTBH6U4M0007DA@TITAN.SFASU.EDU>
Reply To: N/A
UTC Datetime: 1994-09-09 19:18:10 UTC
Raw Date: Fri, 9 Sep 94 12:18:10 PDT
From: f_griffith@TITAN.SFASU.EDU
Date: Fri, 9 Sep 94 12:18:10 PDT
To: cypherpunks@toad.com
Subject: Introduction: Telephone traffic analysis
Message-ID: <01HGWTBH6U4M0007DA@TITAN.SFASU.EDU>
MIME-Version: 1.0
Content-Type: text/plain
>They track and compare the frequency of calling patterns made by the targets.
>Now they know the "calling circle" of the targets. They expand the tracking
>pattern and start looking for cross overs.
Tom Clancy in _Clear and Present Danger_ has a description of the CIA
doing something like this to the Columbia drug cartel.
Return to September 1994
Return to ““Perry E. Metzger” <perry@imsi.com>”