
18 Jan
2004
18 Jan
'04
2:08 a.m.
Assuming lawful purposes, what is the best way to tap a network undetectable to the surveillance subject, not missing any relevant data, and not exposing the installer to undue risk?