Carl writes: > Meanwhile, where is the proof that the key being requested corresponds to > a person on whom a wiretap has been ordered? The authorized key request will normally occur after law-enforcement officials have snagged the chip serial number from the LEAF (law-enforcement field) of the signal they captured with an authorized wiretap. --Mike