Network Security Cyber Terrorism Attack (word count 150)
Suppose a terrorist is known to use Skype for encrypted email from internet cafes, using a known email ID in small city. How could you collect data for traffic analysis (i. e, what kind of technology or access could you use)? If it were in the US, under what condition would that be legal? What kind of information might you be able to discover by applying traffic analysis, and (briefly) how would you do the analysis?