[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: KEY ESCROW PROCEDURES



 
Carl writes:
 
> Meanwhile, where is the proof that the key being requested corresponds to
> a person on whom a wiretap has been ordered?

The authorized key request will normally occur after law-enforcement
officials have snagged the chip serial number from the LEAF
(law-enforcement field) of the signal they captured with an authorized
wiretap.


--Mike