No they wont. There are 200 billion pieces of mail through USPS every year. I ask a database management specialist how hard it would be to query that database looking for an address that got package from X location in Y time and also from Z location in T time. He said that an entry level laptop computer could return the list of addresses that fit this pattern in less than a day, a powerful network cluster could return results like this without even justification of a coffee break. Sure but I am also certain that there are fingerprints that stick out as worthy of further investigation. Assholeoutlaw pointed out one I had not thought of, profiling for addresses that only started getting a lot of mail / international packs after SR launched. There are probably a lot of interesting patterns that can be searched for, and to search a total of 200 billion entries for such patterns would require a trivial amount of computing power. Well they do profile mail based on how it looks all the time,but yeah smart vendors use good packaging that doesn't stick out. This thread is more about traffic analysis though, it is interested in patterns in routing data nothing else. The point I made in the original post is that all of this address routing information is potentially being stored already. In some countries *every single routing address: return address, to address, date sent* is recorded by the machine that sorts the mail. It is entirely possible for this to happen in USA as well and probably already is happening since the technology to do it is integrated into a lot of mail sorting technology and it isn't illegal for the feds to access such databases of routing information. USPS sends 200 billion packages a year about, searching a database of 200 billion entries for patterns is not computationally expensive. There is no man power involved, it is all computing power. Also you are not understanding how an intersection attack works. At any given time there are probably tens or hundreds of thousands of packages in route from location X. At any given time there are probably tens or hundreds of thousands of packages in route from location Z. But during those two time frames, there is probably not much cross contamination. If you know someone has a pack from location X coming to them in a certain time frame, and know this same person then has a pack from location Y coming to them in a different time frame, you can query the database for everyone who had packs from location X in this time frame and from location Z in this time frame. Then you intersect the crowds and remove addresses that are not in both of them. The resulting crowd is not likely going to be very large, and every single additional query that you add is going to likely reduce it by a lot. You are not understanding the attack. The attack identifies a pseudonyms real identity, at which point that persons mail can be more closely screened. The attack is not "Okay we know this person ordered a package from roughly X location, let's scan all packs from X location looking for drugs!". It is "We know this pseudonym ordered from X location in this time frame and Y location in this time frame, according to mail logs only this shipping address falls into this pattern, so this pseudonym is tied to this shipping address". That is how the intersection attack works anyway, the fingerprinting attack works more like "This address gets a lot of packages from netherlands and california, lets automatically flag it". I think traffic analysis will be pretty effective personally. Well we should assume the USA already is storing all routing information of all mail that passes through it, since it is technically possible to do with mail sorting equipment that is already on the market and since other countries are known to be doing this. We can also assume that such an algorithm exists, I mean it is really just a basic intersection attack it exists to be targeted at E-mail and other internet communications, "porting" that to work against real mail would be trivial. Also they would be identifying the shipping address that is likely tied to drug trafficking, so they could just have the dog smell packages when they make it to the post office that delivers it to the target. That would make it pretty simple. You also need to keep in mind that if they do this they will probably start intercepting a lot more packs than if they just have drug dogs randomly smell mail. They apparently already have most of what is required to be doing this. You have kind of lost me at this point but it seems you entirely misunderstood how this attack works . The information needed to perform these attacks is ALREADY probably being recorded and stored in USA, it is in use in other countries. The USA is a shitty highly regulated country with very little freedom....we are using the same technology that Chinese and Iranian dissidents use, so that we can avoid being thrown into re-education camps and prisons....sorry if you were brainwashed into thinking you are free. You are free to do what the state tells you you can do. The only reason average Americans think that people in China are not free is because the Chinese State says that Chinese citizens can't do things that the American State doesn't say American Citizens can't do.