Marlon,
I have been reading the WISPA CALEA FAQ and was a little concerned about
question #10. If the LEA does not know who the suspect is using an open
access point does this mean that everyone that has used that access
point will have their data handed over to the LEA? It would seem that if
On Thu, 2007-05-10 at 09:37 -0400, Dawn DiPietro wrote:
Marlon,
I have been reading the WISPA CALEA FAQ and was a little concerned about
question #10. If the LEA does not know who the suspect is using an open
access point does this mean that everyone that has used that access
point will
I have been reading the WISPA CALEA FAQ and was a little concerned about
question #10. If the LEA does not know who the suspect is using an open
access point does this mean that everyone that has used that access
point will have their data handed over to the LEA? It would seem that if
the LEA is
This is not the sense that I get from the meeting we had with the FBI.
They will know who the target is and be issuing an order for that
person. However, if they happen to live with several people all on one
wireless network, then the traffic is going to be mixed most likely. The
best you can
]
www.odessaoffice.com/wireless
www.odessaoffice.com/marlon/cam
- Original Message -
From: Dawn DiPietro [EMAIL PROTECTED]
To: WISPA General List wireless@wispa.org
Sent: Thursday, May 10, 2007 6:37 AM
Subject: [WISPA] CALEA FAQ Questions
Marlon,
I have been reading the WISPA CALEA FAQ
This is one of the things that has always bothered me when it comes to
wire tapping a data connection. On a phone call it can be pretty easy
to tell if your suspect is involved in the conversation, assuming they
have not used a voice modulator. But when it comes to a data
connection, how do
Sam,
The evidence that LEAs collect is just part of a case. If a suspect is
doing bad things then data will be collected. Next steps would usually
involve a warrant to get the computer and have it looked over. I have
seen other tools used by LEAs to gather evidence. I am guessing that