I used to write software that enabled telecommunications companies to be CALEA compliant, i.e. allowed them to gather call records, voicemails, IP addresses, cell tower records, and text message records from mobile subscribers. While there were many cases where the usage of this software was valid, I believe it was possible for authorized parties and law enforcement to misuse the software for personal uses.
Additionally, I have installed deep packet inspection devices to ISP edge routers for subscriber traffic analysis, though those devices were really just used to see how much of a provider's traffic was being used to watch porn (it's a lot) and were not geared towards analyzing any particular user's activities.
For further actions, you may consider blocking this person and/or reporting abuse
We're a place where coders share, stay up-to-date and grow their careers.
I used to write software that enabled telecommunications companies to be CALEA compliant, i.e. allowed them to gather call records, voicemails, IP addresses, cell tower records, and text message records from mobile subscribers. While there were many cases where the usage of this software was valid, I believe it was possible for authorized parties and law enforcement to misuse the software for personal uses.
Additionally, I have installed deep packet inspection devices to ISP edge routers for subscriber traffic analysis, though those devices were really just used to see how much of a provider's traffic was being used to watch porn (it's a lot) and were not geared towards analyzing any particular user's activities.