![]() |
| Room 641A, Folsom St. AT&T Facility, San Francisco, CA |
To find out for yourself (from WIRED's Threat Level):
If you're a Windows user, fire up an MS-DOS command prompt. Now type tracert followed by the domain name of the website, e-mail host, VoIP switch, or whatever destination you're interested in. Watch as the program spits out your route, line by line.
In the above example, my traffic is jumping from Level 3 Communications to AT&T's network in San Francisco, presumably over the OC-48 circuit that AT&T tapped on February 20th, 2003, according to the Klein docs. The magic string you're looking for is sffca.ip.att.net. If it's present immediately above or below a non-att.net entry, then -- by Klein's allegations -- your packets are being copied into room 641A, and from there, illegally, to the NSA. Of course, if Marcus is correct and AT&T has installed these secret rooms all around the country, then any att.net entry in your route is a bad sign.

No comments:
Post a Comment
You have the right to remain silent. You have the right to have an attorney present while you are commenting. If you cannot afford an attorney, you are "Shit Outta Luck" (SOL). Anything you type here can & may be used against you in a court of law or in a personal "beat-down" administered by a staff member or "associate" of this "web log."
The publisher thanks Google/Bugger for denecessitating verification. (Not that we need explain anything to anyone.)