tag:blogger.com,1999:blog-6273930.post113749493605914547..comments2024-03-08T07:29:54.585-04:00Comments on Canadian Privacy Law Blog: How do they do that? Techniques of phone record vendorsprivacylawyerhttp://www.blogger.com/profile/03943567746055311435noreply@blogger.comBlogger1125tag:blogger.com,1999:blog-6273930.post-1137505939972445692006-01-17T09:52:00.000-04:002006-01-17T09:52:00.000-04:00Also see Techdirt's spin on this at: http://techdi...Also see Techdirt's spin on this at: http://techdirt.com/articles/20060117/0154207_F.shtml <BR/><BR/>While these dislosures should not happen, they point out how difficult it can be to discern legitimate requests from illegitmate ones.Anonymousnoreply@blogger.com