OK, I finished reading through the posts and I am glad that when I reached Mindchild and Rhett's posts it was straightened out. If there is one thing that bugs me the most is when someone goes off half-cocked and tells everyone about technology that they themselves have no clue about.
Here's the skinny:
1. Hyperlinks from a website, such as this one pointing to another web site, generate a referral log in the redirected site's access log that shows the link where the person came from. Nothing special here, no Carnivore, just plain old internet logging.
2. Carnivore was already touched on earlier. To put it in simple terms, if you were to have any experience in using an ethernet sniffer, you would know that you can retrieve all ethernet and IP traffic IF you are on the same 'wired' LAN, not WAN. For the FBI's use, Carnivore is placed on the ISP's last switch or hub before the uplink to the IP cloud router. This allows packet sniffing of all incoming and outgoing traffic and can be matched to a particular MAC(your computer's NIC, modem, router, etc), IP address, or however else they want to tag it. It is merely an overglorified ethernet sniffer that also has a backhaul link that routes/copies the 'tagged' packets and sends them to a database that compiles all of the information they want on you. CALEA is similar. It is used by law enforcement for wireline/wireless phone tapping. The phone technicians in the central office never touch the CALEA box once it is installed. The law enforcement agency gets its court order and does their own tapping remotely.
3. Blocking cell phone usage in a building. If it's in the USA, then it is illegal, due to 911 issues and carries with it a hefty fine of about $10k a day I think. I'm not sure how other countries stand right now. I have heard of some using them in theaters and religious temples though.