From: Leif Ericksen <leif@imho.net>
To: N/A
Message Hash: 7f524a7a7218b77e9a0d1f509dbfe0a6c674145e599232af59080d399a480c69
Message ID: <3624E51A.C5074D7B@imho.net>
Reply To: <199810141617.SAA07987@replay.com>
UTC Datetime: 1998-10-14 18:36:43 UTC
Raw Date: Thu, 15 Oct 1998 02:36:43 +0800
From: Leif Ericksen <leif@imho.net>
Date: Thu, 15 Oct 1998 02:36:43 +0800
Subject: Re: Use encryption to foil spooks' data harvesting, says US state dept
In-Reply-To: <199810141617.SAA07987@replay.com>
Message-ID: <3624E51A.C5074D7B@imho.net>
MIME-Version: 1.0
Content-Type: text/plain
Anonymous wrote:
>
> http://ds.state.gov/documents/protect.doc
>
> transmission of competitive information.
>
> Many telecommunications transmissions will contain "key words", used to
>
HUM SOunds like the idea of the 'auto record' I say a keyword on the
phone and wham I am being recorded to see *IF* I am some sort of
terrorist trying to overthrow the government, get stuff that I should
not have like a fully functional missile and what not.
Do you all believe this? I do. I can not say why but I do.
(Actually I could say why but it is two long stories.)
Do you believe this is done in phone calls in the US based on the
telephone switch doing the monitoring and it monitors ALL calls not just
those that go over seas??? I believe so... See my above statement.
Have you been recorded before??? I believe I have.... WHY??? Well, if
you ask that then you do not belong on this group!
- lhe
Return to October 1998
Return to “Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>”