Jump to content

Wiretapping: Difference between revisions

From Wikipedia, the free encyclopedia
Content deleted Content added
m Fixed typo
Tags: Mobile edit Mobile app edit iOS app edit
m CommaS
Tags: Visual edit Mobile edit Mobile web edit
 
(24 intermediate revisions by 15 users not shown)
Line 3: Line 3:
{{For|the method of telephone dialing by depressing the hook switch|Pulse dialing#Tapping}}
{{For|the method of telephone dialing by depressing the hook switch|Pulse dialing#Tapping}}


'''Wiretapping''' also known as '''wire tapping''' or '''telephone tapping''', is the [[Surveillance|monitoring]] of [[telephone]] and [[Internet]]-based conversations by a third party, often by covert means. The wire tap received its name because, historically, the monitoring connection was an actual electrical tap on an analog telephone or telegraph line. Legal wiretapping by a [[government agency]] is also called [[lawful interception]]. '''Passive wiretapping''' monitors or records the traffic, while '''active wiretapping''' alters or otherwise affects it.<ref>{{Cite book |title=Computer security : art and science |last=Bishop |first=Matt |publisher=Addison-Wesley |year=2003 |isbn=0201440997 |location=Boston |chapter=1: An Overview of Computer Security |oclc=50251943 |access-date=2011-12-20 |chapter-url=http://nob.cs.ucdavis.edu/book/book-aands/aands01.pdf |archive-url=https://web.archive.org/web/20051222145350/http://nob.cs.ucdavis.edu/book/book-aands/aands01.pdf |archive-date=2005-12-22 |url-status=live }}</ref><ref>{{cite IETF |title=Internet Security Glossary |rfc=4949 |pages=335–336 |last=Shirey |first=R. |date=August 2007 |publisher=[[Internet Engineering Task Force|IETF]] }}</ref>
'''Wiretapping''', also known as '''wire tapping''' or '''telephone tapping''', is the [[Surveillance|monitoring]] of [[telephone]] and [[Internet]]-based conversations by a third party, often by covert means. The wire tap received its name because, historically, the monitoring connection was an actual electrical tap on an analog telephone or telegraph line. Legal wiretapping by a [[government agency]] is also called [[lawful interception]]. '''Passive wiretapping''' monitors or records the traffic, while '''active wiretapping''' alters or otherwise affects it.<ref>{{Cite book |title=Computer security : art and science |last=Bishop |first=Matt |publisher=Addison-Wesley |year=2003 |isbn=0201440997 |location=Boston |chapter=1: An Overview of Computer Security |oclc=50251943 |access-date=2011-12-20 |chapter-url=http://nob.cs.ucdavis.edu/book/book-aands/aands01.pdf |archive-url=https://web.archive.org/web/20051222145350/http://nob.cs.ucdavis.edu/book/book-aands/aands01.pdf |archive-date=2005-12-22 |url-status=live }}</ref><ref>{{cite IETF |title=Internet Security Glossary |rfc=4949 |pages=335–336 |last=Shirey |first=R. |date=August 2007 |publisher=[[Internet Engineering Task Force|IETF]] }}</ref>


==Legal status==
==Legal status==
Line 9: Line 9:


[[File:IDET2007 Jitka phone tapping device.jpg|thumb|right|Telephone line control device "Jitka", used in late 1960s by Czechoslovakian [[StB]] to signal line occupancy, and connect a recorder]]
[[File:IDET2007 Jitka phone tapping device.jpg|thumb|right|Telephone line control device "Jitka", used in late 1960s by Czechoslovakian [[StB]] to signal line occupancy, and connect a recorder]]
[[Lawful interception]] is officially strictly controlled in many countries to safeguard [[privacy]]; this is the case in all [[liberal democracy|liberal democracies]]. In theory, telephone tapping often needs to be authorized by a [[court]], and is again in theory, normally only approved when [[evidence (law)|evidence]] shows it is not possible to detect [[Crime|criminal]] or [[Subversion|subversive]] activity in less intrusive ways. Oftentimes, the law and regulations require that the crime investigated must be at least of a certain severity.<ref name="hsw3">{{Cite web |url=http://people.howstuffworks.com/wiretapping3.htm |title=How Wiretapping Works |last=Harris |first=Tom |date=2001-05-08 |website=How Stuff Works |page=3 |access-date=2011-12-20}}</ref><ref>{{Cite web |url=http://people.howstuffworks.com/wiretapping.htm |title=How Wiretapping Works |last=Harris |first=Tom |date=2001-05-08 |website=How Stuff Works |access-date=2011-12-20}}</ref> Illegal or unauthorized telephone tapping is often a criminal offense.<ref name=hsw3/> In certain jurisdictions, such as [[Germany]] and [[France]], courts will accept illegally recorded phone calls without the [[Two party consent|other party's consent]] as evidence, but the unauthorized telephone tapping will still be prosecuted.<ref>{{cite court |litigants=Klass and others v. Federal Republic of Germany |reporter=(Series A, NO 28) (1979-80) |opinion=2 EHRR 214 |court=European Court of Human Rights |date=1978-09-06 |url=http://www.hrcr.org/safrica/limitations/klass_germany.html |access-date=2014-07-22 }}</ref><ref>{{cite court |litigants=Huvig v. France |opinion=11105/84 |court=European Court of Human Rights |date=1990-04-24 |url=http://cambodia.ohchr.org/sites/default/files/echrsource/Huvig%20v.%20France%20%5B24%20Apr%201990%5D%20%5BEN%5D.pdf |access-date=2014-07-22 }}</ref>
[[Lawful interception]] is officially strictly controlled in many countries to safeguard [[privacy]]; this is the case in all [[liberal democracy|liberal democracies]]. In theory, telephone tapping often needs to be authorized by a [[court]], and is again in theory, normally only approved when [[evidence (law)|evidence]] shows it is not possible to detect [[Crime|criminal]] or [[Subversion|subversive]] activity in less intrusive ways. Oftentimes, the law and regulations require that the crime investigated must be at least of a certain severity.<ref name="hsw3">{{Cite web |url=http://people.howstuffworks.com/wiretapping3.htm |title=How Wiretapping Works |last=Harris |first=Tom |date=2001-05-08 |website=How Stuff Works |page=3 |access-date=2011-12-20}}</ref><ref>{{Cite web |url=http://people.howstuffworks.com/wiretapping.htm |title=How Wiretapping Works |last=Harris |first=Tom |date=2001-05-08 |website=How Stuff Works |access-date=2011-12-20}}</ref> Illegal or unauthorized telephone tapping is often a criminal offense.<ref name=hsw3/> In certain jurisdictions, such as [[Germany]] and [[France]], courts will accept illegally recorded phone calls without the [[Two party consent|other party's consent]] as evidence, but the unauthorized telephone tapping will still be prosecuted.<ref>{{cite court |litigants=Klass and others v. Federal Republic of Germany |reporter=(Series A, NO 28) (1979–80) |opinion=2 EHRR 214 |court=European Court of Human Rights |date=1978-09-06 |url=http://www.hrcr.org/safrica/limitations/klass_germany.html |access-date=2014-07-22 }}</ref><ref>{{cite court |litigants=Huvig v. France |opinion=11105/84 |court=European Court of Human Rights |date=1990-04-24 |url=http://cambodia.ohchr.org/sites/default/files/echrsource/Huvig%20v.%20France%20%5B24%20Apr%201990%5D%20%5BEN%5D.pdf |access-date=2014-07-22 }}</ref>


===United States===
===United States===
Line 16: Line 16:
The [[telephone call recording laws]] in most U.S. states require only one party to be aware of the recording, while twelve states require both parties to be aware.<ref>{{Cite web |url=https://www.versadial.com/the-complicated-legality-of-voice-recording-in-2013/ |title=The Complicated Legality of Voice Recording in 2013 |date=2019-05-24 |website=Versadial Solutions |access-date=2018-01-20}}</ref><ref>{{Cite web |url=http://www.epic.org/privacy/consumer/states.html |title=Privacy Laws by State |website=Electronic Privacy Information Center |access-date=2018-01-20}}</ref> In Nevada, the state legislature enacted a law making it legal for a party to record a conversation if one party to the conversation consented, but the Nevada Supreme Court issued two judicial opinions changing the law and requiring all parties to consent to the recording of a private conversation for it to be legal.<ref>{{Cite web |url=http://pickardparry.com/2014/04/is-it-legal-to-record-a-conversation/ |title= Is It Legal to Record a Conversation in Nevada Without the Other Party's Consent? Is It Legal to Record a Conversation in Nevada Without the Other Party's Consent? |last=Parry |first=Zachariah B. |date=2014-05-09 |website=Parry & Pfau |access-date=2015-01-24}}</ref> It is considered better practice to announce at the beginning of a call that the conversation is being recorded.<ref>{{Cite web |url=http://www.callcorder.com/phone-recording-law-america.htm |title=United States Telephone Recording Laws |website=Call Corder |access-date=2011-12-20}}</ref><ref>{{Cite web |url=https://www.rcfp.org/wp-content/uploads/imported/RECORDING.pdf |archive-url=https://ghostarchive.org/archive/20221009/https://www.rcfp.org/wp-content/uploads/imported/RECORDING.pdf |archive-date=2022-10-09 |url-status=live |title=Reporter's Recording Guide |last1=Rasmussen |first1=Kirsten |last2=Komperda |first2=Jack |date=Summer 2012 |publisher=The Reporters Committee for Freedom of the Press |access-date=2018-01-20 |last3=Baldino |first3=Raymond}}</ref>
The [[telephone call recording laws]] in most U.S. states require only one party to be aware of the recording, while twelve states require both parties to be aware.<ref>{{Cite web |url=https://www.versadial.com/the-complicated-legality-of-voice-recording-in-2013/ |title=The Complicated Legality of Voice Recording in 2013 |date=2019-05-24 |website=Versadial Solutions |access-date=2018-01-20}}</ref><ref>{{Cite web |url=http://www.epic.org/privacy/consumer/states.html |title=Privacy Laws by State |website=Electronic Privacy Information Center |access-date=2018-01-20}}</ref> In Nevada, the state legislature enacted a law making it legal for a party to record a conversation if one party to the conversation consented, but the Nevada Supreme Court issued two judicial opinions changing the law and requiring all parties to consent to the recording of a private conversation for it to be legal.<ref>{{Cite web |url=http://pickardparry.com/2014/04/is-it-legal-to-record-a-conversation/ |title= Is It Legal to Record a Conversation in Nevada Without the Other Party's Consent? Is It Legal to Record a Conversation in Nevada Without the Other Party's Consent? |last=Parry |first=Zachariah B. |date=2014-05-09 |website=Parry & Pfau |access-date=2015-01-24}}</ref> It is considered better practice to announce at the beginning of a call that the conversation is being recorded.<ref>{{Cite web |url=http://www.callcorder.com/phone-recording-law-america.htm |title=United States Telephone Recording Laws |website=Call Corder |access-date=2011-12-20}}</ref><ref>{{Cite web |url=https://www.rcfp.org/wp-content/uploads/imported/RECORDING.pdf |archive-url=https://ghostarchive.org/archive/20221009/https://www.rcfp.org/wp-content/uploads/imported/RECORDING.pdf |archive-date=2022-10-09 |url-status=live |title=Reporter's Recording Guide |last1=Rasmussen |first1=Kirsten |last2=Komperda |first2=Jack |date=Summer 2012 |publisher=The Reporters Committee for Freedom of the Press |access-date=2018-01-20 |last3=Baldino |first3=Raymond}}</ref>


The [[Fourth Amendment to the United States Constitution]] protects privacy rights by requiring a [[Search warrant|warrant]] to search an individual. However, telephone tapping is the subject of controversy surrounding violations of this right. There are arguments that wiretapping invades an individual's personal privacy and therefore violates their Fourth Amendment rights. On the other hand, there are certain rules and regulations, which permit wiretapping. A notable example of this is the [[Patriot Act]]. The Patriot act does, in certain circumstances, give the government permission to wiretap citizens.<ref>{{Cite journal |last1=Soma |first1=John T. |last2=Nichols |first2=Maury M. |last3=Maish |first3=Lance A. |last4=Rogers |first4=Jon David |date=Winter 2005 |title=Balance of privacy vs. security: a historical perspective of the USA PATRIOT Act |url=https://link.gale.com/apps/doc/A139431581/ITOF |journal=Rutgers Computer & Technology Law Journal |publisher=Rutgers University School of Law |location=Newark |volume=31 |issue=2 |pages=285–346 |issn=0735-8938 |id=GALE{{!}}A139431581 |url-access=subscription |via=Gale General OneFile}}</ref> In addition, wiretapping laws vary per [[U.S. state|state]] which makes it even more difficult to determine whether the Fourth Amendment is being violated.<ref>{{Cite journal |last=Slobogin |first=Christopher |date=2002 |title=Public Privacy: Camera Surveillance of Public Places and the Right to Anonymity |url=https://heinonline.org/HOL/P?h=hein.journals/mislj72&i=227 |journal=Mississippi Law Journal |volume=72 |pages=213–316 |url-access=subscription |via=HeinOnline}}</ref>
The [[Fourth Amendment to the United States Constitution]] protects privacy rights by requiring a [[Search warrant|warrant]] to search a person. However, telephone tapping is the subject of controversy surrounding violations of this right. There are arguments that wiretapping invades a person's personal privacy and therefore violates their Fourth Amendment rights. On the other hand, there are certain rules and regulations, which permit wiretapping. A notable example of this is the [[Patriot Act]], which, in certain circumstances, gives the government permission to wiretap citizens.<ref>{{Cite journal |last1=Soma |first1=John T. |last2=Nichols |first2=Maury M. |last3=Maish |first3=Lance A. |last4=Rogers |first4=Jon David |date=Winter 2005 |title=Balance of privacy vs. security: a historical perspective of the USA PATRIOT Act |url=https://link.gale.com/apps/doc/A139431581/ITOF |journal=Rutgers Computer & Technology Law Journal |publisher=Rutgers University School of Law |location=Newark |volume=31 |issue=2 |pages=285–346 |issn=0735-8938 |id=GALE{{!}}A139431581 |url-access=subscription |via=Gale General OneFile}}</ref> In addition, wiretapping laws vary per [[U.S. state|state]], making it even more difficult to determine whether the Fourth Amendment is being violated.<ref>{{Cite journal |last=Slobogin |first=Christopher |date=2002 |title=Public Privacy: Camera Surveillance of Public Places and the Right to Anonymity |url=https://heinonline.org/HOL/P?h=hein.journals/mislj72&i=227 |journal=Mississippi Law Journal |volume=72 |pages=213–316 |url-access=subscription |via=HeinOnline}}</ref>


===Canada===
===Canada===
Line 24: Line 24:


===India===
===India===
In India, the lawful interception of communication by authorized law enforcement agencies (LEAs) is carried out in accordance with Section 5(2) of the Indian Telegraph Act, 1885 read with Rule 419A of Indian Telegraph (Amendment) Rules, 2007. Directions for interception of any message or class of messages under sub-section (2) of Section 5 of the Indian Telegraph Act, 1885 shall not be issued except by an order made by the Secretary to the Government of India in the Ministry of Home Affairs in the case of Government of India and by the Secretary to the State Government in-charge of the Home Department in the case of a state government.<ref>{{Cite web |url=http://dot.gov.in/act-rules/act-rules-content/act-rules-content/act-rules-content/act-rules-content/2423 |title=Acts & Rules |website=Department of Telecomunications |publisher=Government of India Ministry of Communications |access-date=2016-03-06}}</ref> The government has set up the [[Centralized Monitoring System]] (CMS) to automate the process of lawful interception and monitoring of telecommunications technology. The government of India on 2015 December 2 in a reply to parliament question no. 595 on scope, objectives and framework of the CMS has struck a balance between national security, online privacy and free speech informed that to take care of the privacy of citizens, lawful interception and monitoring is governed by the Section 5(2) of Indian Telegraph Act, 1885 read with Rule 419A of Indian Telegraph (Amendment) Rules, 2007 wherein oversight mechanism exists in form of review committee under chairmanship of the Cabinet Secretary at Central Government level and Chief Secretary of the State at the state government level.<ref>{{Cite web |url=http://www.loksabha.nic.in |title=Parliament of India, Lok Sabha |access-date=2016-03-06}}</ref><ref>{{Cite web |url=http://gangothri.org/?q=node/7 |title=Telephone Tapping in India : Legal Provisions |date=2013-04-11 |website=Gangothri.org |url-status=dead |archive-url=https://web.archive.org/web/20150430215325/http://gangothri.org/?q=node/7 |archive-date=2015-04-30 |access-date=2018-01-20}}</ref> Section 5(2) also allows the government to intercept messages that are public emergencies or for public safety.<ref>{{Cite journal|last=Arun|first=P.|date=2017|title=Surveillance and democracy in India: Analysing challenges to constitutionalism and rule of law|journal=Journal of Public Affairs and Change|volume=1|pages=47–59|via=jpac.in}}</ref>
In India, the lawful interception of communication by authorized law enforcement agencies (LEAs) is carried out in accordance with Section 5(2) of the Indian Telegraph Act, 1885 read with Rule 419A of Indian Telegraph (Amendment) Rules, 2007. Directions for interception of any message or class of messages under sub-section (2) of Section 5 of the Indian Telegraph Act, 1885 shall not be issued except by an order made by the Secretary to the Government of India in the Ministry of Home Affairs in the case of Government of India and by the Secretary to the State Government in-charge of the Home Department in the case of a state government.<ref>{{Cite web |title=Acts & Rules |url=http://dot.gov.in/act-rules/act-rules-content/act-rules-content/act-rules-content/act-rules-content/2423 |access-date=2016-03-06 |website=Department of Telecommunications |publisher=Government of India Ministry of Communications}}</ref> The government has set up the [[Centralized Monitoring System]] (CMS) to automate the process of lawful interception and monitoring of telecommunications technology. The government of India on 2015 December 2 in a reply to parliament question no. 595 on scope, objectives and framework of the CMS has struck a balance between national security, online privacy and free speech informed that to take care of the privacy of citizens, lawful interception and monitoring is governed by the Section 5(2) of Indian Telegraph Act, 1885 read with Rule 419A of Indian Telegraph (Amendment) Rules, 2007 wherein oversight mechanism exists in form of review committee under chairmanship of the Cabinet Secretary at Central Government level and Chief Secretary of the State at the state government level.<ref>{{Cite web |url=http://www.loksabha.nic.in |title=Parliament of India, Lok Sabha |access-date=2016-03-06}}</ref><ref>{{Cite web |url=http://gangothri.org/?q=node/7 |title=Telephone Tapping in India : Legal Provisions |date=2013-04-11 |website=Gangothri.org |url-status=dead |archive-url=https://web.archive.org/web/20150430215325/http://gangothri.org/?q=node/7 |archive-date=2015-04-30 |access-date=2018-01-20}}</ref> Section 5(2) also allows the government to intercept messages that are public emergencies or for public safety.<ref>{{Cite journal|last=Arun|first=P.|date=2017|title=Surveillance and democracy in India: Analysing challenges to constitutionalism and rule of law|journal=Journal of Public Affairs and Change|volume=1|pages=47–59|via=jpac.in}}</ref>

===Pakistan===
In Pakistan, [[Inter-Services Intelligence]] (ISI) is authorised by the Ministry of Information Technology and Telecommunication to intercept and trace telecommunications, as stipulated under Section 54 of the relevant Act, in July 2024.<ref name="auto">{{Cite web|url=https://www.dawn.com/news/1844810|title=Govt formally authorises ISI to 'trace, intercept' calls and messages in 'interest of national security'|first=Shakeel|last=Qarar|date=July 9, 2024|website=DAWN.COM}}</ref> Under the authorization, ISI officers of at least grade 18, subject to periodic designation, are empowered to surveil calls and messages.<ref name="auto"/>


==Methods==
==Methods==
Line 32: Line 35:
The contracts or licenses by which the state controls [[Telephone company|telephone companies]] often require that the companies must provide access to tapping lines to law enforcement. In the U.S., telecommunications carriers are required by law to cooperate in the interception of communications for law enforcement purposes under the terms of [[Communications Assistance for Law Enforcement Act]] (CALEA).<ref>{{USPL|103|414}} {{cite wikisource |title=Communications Assistance for Law Enforcement Act of 1994 |wslink=Communications Assistance for Law Enforcement Act of 1994 }}</ref>
The contracts or licenses by which the state controls [[Telephone company|telephone companies]] often require that the companies must provide access to tapping lines to law enforcement. In the U.S., telecommunications carriers are required by law to cooperate in the interception of communications for law enforcement purposes under the terms of [[Communications Assistance for Law Enforcement Act]] (CALEA).<ref>{{USPL|103|414}} {{cite wikisource |title=Communications Assistance for Law Enforcement Act of 1994 |wslink=Communications Assistance for Law Enforcement Act of 1994 }}</ref>


When [[telephone exchange]]s were mechanical, a tap had to be installed by technicians, linking circuits together to route the audio signal from the call. Now that many exchanges have been converted to digital technology, tapping is far simpler and can be ordered remotely by computer. This central office switch wiretapping technology using the Advanced Intelligent Network (AIN) was invented by Wayne Howe and Dale Malik at BellSouth's Advanced Technology R&D group in 1995 and was issued as US Patent #5,590,171.<ref>{{cite patent |country=US |number=5590171 |title=Method and apparatus for communications monitoring |pubdate=1996-12-31 |fdate=1995-08-21 |invent1=Wayne Howe |invent2=Dale Malik |assign1=Bellsouth Corporation |status=patent}}</ref> [[Public switched telephone network|Telephone service]]s provided by [[cable TV]] companies also use digital switching technology. If the tap is implemented at a [[digital switch]], the switching computer simply copies the digitized bits that represent the phone conversation to a second line and it is impossible to tell whether a line is being tapped. A well-designed tap installed on a phone wire can be difficult to detect. In some places, some law enforcement may be able to even access a mobile phone's internal microphone even while it isn't actively being used on a phone call (unless the battery is removed or drained).<ref>{{Cite news |url=http://news.cnet.com/2100-1029_3-6140191.html |title=FBI taps cell phone mic as eavesdropping tool |last=McCullagh |first=Declan |date=2006-12-04 |work=CNET |access-date=2010-06-24 |quote=The FBI appears to have begun using a novel form of electronic surveillance in criminal investigations: remotely activating a mobile phone's microphone and using it to eavesdrop on nearby conversations. [. . . ] Kaplan's opinion said that the eavesdropping technique "functioned whether the phone was powered on or off." Some handsets can't be fully powered down without removing the battery; for instance, some Nokia models will wake up when turned off if an alarm is set.}}</ref> The noises that some people believe to be telephone taps are simply [[crosstalk]] created by the [[coupling (electronics)|coupling]] of signals from other phone lines.<ref>{{Cite web |url=http://www.privacyrights.org/fs/fs9-wrtp.htm |title=Fact Sheet 9: Wiretapping and Eavesdropping on Telephone Calls |date=May 2010 |website=Privacy Rights Clearinghouse |url-status=dead |archive-url=https://web.archive.org/web/20120111100456/http://www.privacyrights.org/fs/fs9-wrtp.htm |archive-date=2012-01-11 |access-date=2011-12-20}}</ref>
When [[telephone exchange]]s were mechanical, a tap had to be installed by technicians, linking circuits together to route the audio signal from the call. Now that many exchanges have been converted to digital technology, tapping is far simpler and can be ordered remotely by computer. This central office switch wiretapping technology using the Advanced Intelligent Network (AIN) was invented by Wayne Howe and Dale Malik at BellSouth's Advanced Technology R&D group in 1995 and was issued as US Patent #5,590,171.<ref>{{cite patent |country=US |number=5590171 |title=Method and apparatus for communications monitoring |pubdate=1996-12-31 |fdate=1995-08-21 |invent1=Wayne Howe |invent2=Dale Malik |assign1=Bellsouth Corporation |status=patent}}</ref> [[Public switched telephone network|Telephone service]]s provided by [[cable TV]] companies also use digital switching technology. If the tap is implemented at a [[digital switch]], the switching computer simply copies the digitized bits that represent the phone conversation to a second line and it is impossible to tell whether a line is being tapped. A well-designed tap installed on a phone wire can be difficult to detect. In some places, some law enforcement may be able to even access a mobile phone's internal microphone even while it isn't actively being used on a phone call (unless the battery is removed or drained).<ref>{{Cite news |url=http://news.cnet.com/2100-1029_3-6140191.html |title=FBI taps cell phone mic as eavesdropping tool |last=McCullagh |first=Declan |date=2006-12-04 |work=CNET |access-date=2010-06-24 |quote=The FBI appears to have begun using a novel form of electronic surveillance in criminal investigations: remotely activating a mobile phone's microphone and using it to eavesdrop on nearby conversations. [] Kaplan's opinion said that the eavesdropping technique "functioned whether the phone was powered on or off." Some handsets can't be fully powered down without removing the battery; for instance, some Nokia models will wake up when turned off if an alarm is set.}}</ref> The noises that some people believe to be telephone taps are simply [[crosstalk]] created by the [[coupling (electronics)|coupling]] of signals from other phone lines.<ref>{{Cite web |url=http://www.privacyrights.org/fs/fs9-wrtp.htm |title=Fact Sheet 9: Wiretapping and Eavesdropping on Telephone Calls |date=May 2010 |website=Privacy Rights Clearinghouse |url-status=dead |archive-url=https://web.archive.org/web/20120111100456/http://www.privacyrights.org/fs/fs9-wrtp.htm |archive-date=2012-01-11 |access-date=2011-12-20}}</ref>


Data on the calling and called number, time of call and duration, will generally be collected automatically on all calls and stored for later use by the [[invoice|billing]] department of the phone company. These data can be accessed by security services, often with fewer legal restrictions than for a tap. This information used to be collected using special equipment known as ''[[pen register]]s'' and ''[[trap and trace device]]s'' and U.S. law still refers to it under those names. Today, a list of all calls to a specific number can be obtained by sorting billing records. A telephone tap during which only the call information is recorded but not the contents of the phone calls themselves, is called a ''pen register'' tap.
Data on the calling and called number, time of call and duration, will generally be collected automatically on all calls and stored for later use by the [[invoice|billing]] department of the phone company. These data can be accessed by security services, often with fewer legal restrictions than for a tap. This information used to be collected using special equipment known as ''[[pen register]]s'' and ''[[trap and trace device]]s'' and U.S. law still refers to it under those names. Today, a list of all calls to a specific number can be obtained by sorting billing records. A telephone tap during which only the call information is recorded but not the contents of the phone calls themselves, is called a ''pen register'' tap.


For telephone services via digital exchanges, the information collected may additionally include a log of the type of communications media being used (some services treat data and voice communications differently, in order to conserve bandwidth).
For telephone services via digital exchanges, the information collected may additionally include a log of the type of communications media being used (some services treat data and voice communications differently, in order to conserve bandwidth).
Line 67: Line 70:
In 1995, [[Peter Garza]], a Special Agent with the [[Naval Criminal Investigative Service]], conducted the first court-ordered Internet wiretap in the United States while investigating Julio Cesar "Griton" Ardita.<ref>{{Cite press release |title=Federal Cybersleuthers Armed With First Ever Computer Wiretap Order Net International hacker Charged With Illegally Entering Harvard and U.S. Military Computers |date=1996-03-29 |publisher=US Department of Justice |location=Washington, D.C. |url=https://www.justice.gov/archive/opa/pr/1996/March96/146.txt |access-date=2019-11-03}}</ref><ref>{{Cite press release |title=Argentine Computer Hacker Agrees to Waive Extradition and Returns to Plead Guilty to Felony Charges in Boston |date=1998-05-19 |publisher=US Department of Justice |location=Boston, MA |url=https://fas.org/irp/news/1998/05/arditasnt.htm |access-date=2019-11-03}}</ref>
In 1995, [[Peter Garza]], a Special Agent with the [[Naval Criminal Investigative Service]], conducted the first court-ordered Internet wiretap in the United States while investigating Julio Cesar "Griton" Ardita.<ref>{{Cite press release |title=Federal Cybersleuthers Armed With First Ever Computer Wiretap Order Net International hacker Charged With Illegally Entering Harvard and U.S. Military Computers |date=1996-03-29 |publisher=US Department of Justice |location=Washington, D.C. |url=https://www.justice.gov/archive/opa/pr/1996/March96/146.txt |access-date=2019-11-03}}</ref><ref>{{Cite press release |title=Argentine Computer Hacker Agrees to Waive Extradition and Returns to Plead Guilty to Felony Charges in Boston |date=1998-05-19 |publisher=US Department of Justice |location=Boston, MA |url=https://fas.org/irp/news/1998/05/arditasnt.htm |access-date=2019-11-03}}</ref>


As technologies emerge, including [[VoIP]], new questions are raised about law enforcement access to communications (see [[VoIP recording]]). In 2004, the [[Federal Communications Commission]] was asked to clarify how the [[Communications Assistance for Law Enforcement Act]] (CALEA) related to Internet service providers. The FCC stated that “providers of broadband Internet access and voice over Internet protocol (“VoIP”) services are regulable as “telecommunications carriers” under the Act.”<ref>{{cite court |litigants=American Council on Education v. Federal Communications Commission and Verizon Telephone Companies |opinion=05-1404 |court=D.C. Cir. |date=2006-06-09 |url=http://fjallfoss.fcc.gov/edocs_public/attachmatch/DOC-266204A1.pdf |archive-url=https://ghostarchive.org/archive/20221009/http://fjallfoss.fcc.gov/edocs_public/attachmatch/DOC-266204A1.pdf |archive-date=2022-10-09 |url-status=live |access-date=2010-06-01 |format=PDF }}</ref> Those affected by the Act will have to provide access to law enforcement officers who need to monitor or intercept communications transmitted through their networks. As of 2009, warrantless surveillance of internet activity has consistently been upheld in [[FISA court]].<ref>{{Cite news |url=https://www.nytimes.com/2009/01/16/washington/16fisa.html?_r=2&hp |title=Court Affirms Wiretapping Without Warrant |last1=Risen |first1=James |date=2009-01-15 |work=The New York Times |last2=Lichtblau |first2=Eric}}</ref>
As technologies emerge, including [[VoIP]], new questions are raised about law enforcement access to communications (see [[VoIP recording]]). In 2004, the [[Federal Communications Commission]] was asked to clarify how the [[Communications Assistance for Law Enforcement Act]] (CALEA) related to Internet service providers. The FCC stated that “providers of broadband Internet access and voice over Internet protocol (“VoIP”) services are regulable as “telecommunications carriers” under the Act.”<ref>{{cite court |litigants=American Council on Education v. Federal Communications Commission and Verizon Telephone Companies |opinion=05-1404 |court=D.C. Cir. |date=2006-06-09 |url=http://fjallfoss.fcc.gov/edocs_public/attachmatch/DOC-266204A1.pdf |archive-url=https://ghostarchive.org/archive/20221009/http://fjallfoss.fcc.gov/edocs_public/attachmatch/DOC-266204A1.pdf |archive-date=2022-10-09 |url-status=live |access-date=2010-06-01 |format=PDF }}</ref> Those affected by the Act will have to provide access to law enforcement officers who need to monitor or intercept communications transmitted through their networks. As of 2009, warrantless surveillance of internet activity has consistently been upheld in [[FISA court]].<ref>{{Cite news |url=https://www.nytimes.com/2009/01/16/washington/16fisa.html?_r=2&hp |title=Court Affirms Wiretapping Without Warrant |last1=Risen |first1=James |date=2009-01-15 |work=The New York Times |last2=Lichtblau |first2=Eric}}</ref>


The [[Internet Engineering Task Force]] has decided not to consider requirements for wiretapping as part of the process for creating and maintaining IETF standards.<ref>{{cite IETF |title=IETF Policy on Wiretapping |rfc=2804 |date=May 2000 |publisher=[[Internet Engineering Task Force|IETF]] }}</ref>
The [[Internet Engineering Task Force]] has decided not to consider requirements for wiretapping as part of the process for creating and maintaining IETF standards.<ref>{{cite IETF |title=IETF Policy on Wiretapping |rfc=2804 |date=May 2000 |publisher=[[Internet Engineering Task Force|IETF]] }}</ref>


Typically, illegal Internet wiretapping will be conducted via [[Wi-Fi]] connection to someone's internet by cracking the [[Wired Equivalent Privacy|WEP]] or [[Wi-Fi Protected Access|WPA]] key, using a tool such as [[Aircrack-ng]] or [[Kismet (software)|Kismet]].<ref>{{Cite web |url=http://www.grape-info.com/doc/linux/config/aircrack-ng-0.6.html |title=Aircrack-ng (WEP, WPA-PSK Crack) |url-status=dead |archive-url=https://web.archive.org/web/20061101160012/http://www.grape-info.com/doc/linux/config/aircrack-ng-0.6.html |archive-date=2006-11-01 |access-date=2014-07-22}}</ref><ref>{{Cite web |url=http://www.wi-fiplanet.com/tutorials/article.php/3595531 |title=Introduction to Kismet |last=Weiss |first=Aaron |date=2006-03-30 |website=Wi-Fi Planet |url-status=dead |archive-url=https://web.archive.org/web/20140727001900/http://www.wi-fiplanet.com/tutorials/article.php/3595531 |archive-date=2014-07-27 |access-date=2014-07-22}}</ref> Once in, the intruder will rely on a number of potential tactics, for example an [[ARP spoofing]] attack which will allow the intruder to view [[Packet (information technology)|packets]] in a tool such as [[Wireshark]] or [[Ettercap (computing)|Ettercap]].
Typically, illegal Internet wiretapping is conducted via [[Wi-Fi]] connection to someone's Internet by cracking the [[Wired Equivalent Privacy|WEP]] or [[Wi-Fi Protected Access|WPA]] key, using a tool such as [[Aircrack-ng]] or [[Kismet (software)|Kismet]].<ref>{{Cite web |url=http://www.grape-info.com/doc/linux/config/aircrack-ng-0.6.html |title=Aircrack-ng (WEP, WPA-PSK Crack) |url-status=dead |archive-url=https://web.archive.org/web/20061101160012/http://www.grape-info.com/doc/linux/config/aircrack-ng-0.6.html |archive-date=2006-11-01 |access-date=2014-07-22}}</ref><ref>{{Cite web |url=http://www.wi-fiplanet.com/tutorials/article.php/3595531 |title=Introduction to Kismet |last=Weiss |first=Aaron |date=2006-03-30 |website=Wi-Fi Planet |url-status=dead |archive-url=https://web.archive.org/web/20140727001900/http://www.wi-fiplanet.com/tutorials/article.php/3595531 |archive-date=2014-07-27 |access-date=2014-07-22}}</ref> Once in, the intruder relies on a number of potential tactics, for example an [[ARP spoofing]] attack, allowing the intruder to view [[Packet (information technology)|packets]] in a tool such as [[Wireshark]] or [[Ettercap (computing)|Ettercap]].


===Mobile phone===
===Mobile phone===
The second generation mobile phones ({{circa|1978}} through 1990) could be easily monitored by anyone with a [[Scanner (radio)|'scanning all-band receiver']] because the system used an analog transmission system-like an ordinary radio transmitter. The third generation digital phones are harder to monitor because they use digitally encoded and compressed transmission. However the government can tap mobile phones with the cooperation of the phone company.<ref>{{Cite news |url=https://apnews.com/0538d9746fdd4126b0e700a963f92df4 |title=The price of surveillance: US gov't pays to snoop |last=Flaherty |first=Anne |date=2013-07-10 |work=AP News |access-date=2019-11-03 |publisher=Associated Press |location=Washington}}</ref> It is also possible for organizations with the correct technical equipment to monitor mobile phone communications and decrypt the audio.{{Citation needed|date=March 2019}}
The first generation mobile phones ({{circa|1978}} through 1990) could be easily monitored by anyone with a [[Scanner (radio)|'scanning all-band receiver']] because the system used an analog transmission system-like an ordinary radio transmitter. Instead, digital phones are harder to monitor because they use digitally encoded and compressed transmission. However the government can tap mobile phones with the cooperation of the phone company.<ref>{{Cite news |url=https://apnews.com/0538d9746fdd4126b0e700a963f92df4 |title=The price of surveillance: US gov't pays to snoop |last=Flaherty |first=Anne |date=2013-07-10 |work=AP News |access-date=2019-11-03 |publisher=Associated Press |location=Washington}}</ref> It is also possible for organizations with the correct technical equipment to monitor mobile phone communications and decrypt the audio.{{Citation needed|date=March 2019}}


To the mobile phones in its vicinity, a device called an "[[IMSI-catcher]]" pretends to be a legitimate base station of the mobile phone network, thus subjecting the communication between the phone and the network to a [[man-in-the-middle attack]]. This is possible because, while the mobile phone has to authenticate itself to the mobile telephone network, the network does not authenticate itself to the phone.<ref>{{Cite web |url=https://www.networkworld.com/article/2171269/apple-ios-apps-subject-to-man-in-the-middle-attacks.html |title=Apple iOS Apps Subject to Man-in-the-Middle Attacks |last=Messmer |first=Ellen |date=2013-10-29 |website=Network World |access-date=2014-07-22}}</ref>{{Failed verification|date=November 2019}} There is no defense against IMSI-catcher based eavesdropping, except using end-to-end call encryption; products offering this feature, [[secure telephone]]s, are already beginning to appear on the market, though they tend to be expensive and incompatible with each other, which limits their proliferation.<ref>{{Cite thesis |last=Wang |first=Zidu |title=Crypto Phones |date=2007-12-07 |publisher=Ruhr University Bochum |url=http://www.slideshare.net/Garry54/crypto-phones |access-date=2014-07-22}}</ref>
To the mobile phones in its vicinity, a device called an "[[IMSI-catcher]]" pretends to be a legitimate base station of the mobile phone network, thus subjecting the communication between the phone and the network to a [[man-in-the-middle attack]]. This is possible because, while the mobile phone has to authenticate itself to the mobile telephone network, the network does not authenticate itself to the phone.<ref>{{Cite web |url=https://www.networkworld.com/article/2171269/apple-ios-apps-subject-to-man-in-the-middle-attacks.html |title=Apple iOS Apps Subject to Man-in-the-Middle Attacks |last=Messmer |first=Ellen |date=2013-10-29 |website=Network World |access-date=2014-07-22}}</ref>{{Failed verification|date=November 2019}} There is no defense against IMSI-catcher based eavesdropping, except using end-to-end call encryption; products offering this feature, [[secure telephone]]s, are already beginning to appear on the market, though they tend to be expensive and incompatible with each other, which limits their proliferation.<ref>{{Cite thesis |last=Wang |first=Zidu |title=Crypto Phones |date=2007-12-07 |publisher=Ruhr University Bochum |url=http://www.slideshare.net/Garry54/crypto-phones |access-date=2014-07-22}}</ref>


===Webtapping===
===Webtapping===
Line 82: Line 85:
Logging the [[IP address]]es of users that access certain websites is commonly called "webtapping".<ref>{{Cite journal |last=Bronk |first=Chris |date=2008-11-05 |title=Webtapping: Securing the Internet to save us from transnational terror? |journal=First Monday |volume=13 |issue=11 |doi=10.5210/fm.v13i11.2192 |doi-access=free}}</ref>
Logging the [[IP address]]es of users that access certain websites is commonly called "webtapping".<ref>{{Cite journal |last=Bronk |first=Chris |date=2008-11-05 |title=Webtapping: Securing the Internet to save us from transnational terror? |journal=First Monday |volume=13 |issue=11 |doi=10.5210/fm.v13i11.2192 |doi-access=free}}</ref>


Webtapping is used to monitor websites that presumably contain dangerous or sensitive materials, and the people that access them. Though it is allowed by the [[USA PATRIOT Act]], it is considered a questionable practice by many citizens.<ref>{{Cite web |url=http://www.redorbit.com/news/technology/1112945042/google-wiretapping-charges-upheld-091113/ |title=Google Wiretapping Charges Are Legit, Says US Appeals Court |last=Harper |first=Michael |date=2013-09-11 |website=Redorbit |access-date=2013-09-11}}</ref>
Webtapping is used to monitor websites that presumably contain dangerous or sensitive materials, and the people that access them. It is allowed in the US by the [[USA PATRIOT Act|Patriot Act]], but is considered a questionable practice by many.<ref>{{Cite web |url=http://www.redorbit.com/news/technology/1112945042/google-wiretapping-charges-upheld-091113/ |title=Google Wiretapping Charges Are Legit, Says US Appeals Court |last=Harper |first=Michael |date=2013-09-11 |website=Redorbit |access-date=2013-09-11}}</ref>


=== Telephones recording ===
=== Telephone recording ===
In Canada, anyone is legally allowed to record a conversation as long as they are involved in the conversation. The police must apply for a warrant beforehand to legally eavesdrop on the conversation. It must be expected that it will reveal evidence to a crime. State agents are lawfully allowed to record conversations, but to reveal the evidence in court, they must obtain a warrant.
In Canada, anyone is legally allowed to record a conversation as long as they are involved in the conversation. The police must apply for a warrant beforehand to legally eavesdrop on a conversation, which requires that it is expected to reveal evidence to a crime. State agents may record conversations, but must obtain a warrant to use them as evidence in court.


==History==
==History==
Many state legislatures in the United States enacted statutes that prohibited anyone from listening in on telegraph communication. Telephone wiretapping began in the 1890s, following the invention of the telephone recorder,<ref name="hsw3" /> and its [[constitutionality]] was established in the [[Prohibition]]-Era conviction of [[Rum running|bootlegger]] [[Roy Olmstead]]. Wiretapping has also been carried out under most Presidents, sometimes with a lawful warrant since the [[Supreme Court of the United States|Supreme Court]] ruled it constitutional in 1928. On October 19, 1963, U.S.&nbsp;Attorney General [[Robert F. Kennedy]], who served under [[John F. Kennedy]] and [[Lyndon B. Johnson]], authorized the [[FBI]] to begin [[wiretapping]] the communications of Rev. [[Martin Luther King Jr.]] The wiretaps remained in place until April 1965 at his home and June 1966 at his office.<ref>{{Cite magazine |last=Garrow |first=David&nbsp;J. |date=July–August 2002 |title=The FBI and Martin Luther King |url=https://www.theatlantic.com/doc/200207/garrow |magazine=The Atlantic |access-date=2010-06-01}}</ref>


The history of voice communication technology began in 1876 with the invention of [[Alexander Graham Bell]]’s telephone. In the 1890s, “law enforcement agencies begin tapping wires on early telephone networks”.<ref name="ISSUU">{{Cite magazine |date=September 2008 |title=A History of Listening In |url=http://issuu.com/sciam/docs/2008-09_pg58_2?mode=embed&documentId=080820180613-64657d58c38f4897941bc60b292f46d6&layout=grey |magazine=Scientific American |pages=57–59 |access-date=2010-06-01 |via=Issu}}</ref> Remote voice communications “were carried almost exclusively by circuit-switched systems, where telephone switches would connect wires to form a continuous circuit and disconnect the wires when the call ended). All other telephone services, such as call forwarding and message taking, were handled by human operators.<ref name="SCIENTIFIC" /> However, the first computerized telephone switch was developed by Bell Labs in 1965. This got rid of standard wiretapping techniques.<ref name="ISSUU" />
The history of voice communication technology began in 1876 with the invention of [[Alexander Graham Bell]]'s telephone. In the 1890s, "law enforcement agencies begin tapping wires on early telephone networks".<ref name="ISSUU">{{Cite magazine |date=September 2008 |title=A History of Listening In |url=http://issuu.com/sciam/docs/2008-09_pg58_2?mode=embed&documentId=080820180613-64657d58c38f4897941bc60b292f46d6&layout=grey |magazine=Scientific American |pages=57–59 |access-date=2010-06-01 |via=Issu}}</ref> Remote voice communications "were carried almost exclusively by circuit-switched systems," where telephone switches would connect wires to form a continuous circuit and disconnect the wires when the call ended). All other telephone services, such as call forwarding and message taking, were handled by human operators.<ref name="SCIENTIFIC" />


In late 1940, the Nazis tried to secure some telephone lines between their forward headquarters in Paris and a variety of [[Fuhrerbunker]]s in Germany. They did this by constantly monitoring the voltage on the lines, looking for any sudden drops or increases in voltage indicating that other wiring had been attached. However, the French telephone engineer Robert Keller succeeded in attaching taps without alerting the Nazis. This was done through an isolated rental property just outside of [[Paris]]. Keller's group became known to [[Special Operations Executive|SOE]] (and later Allied military intelligence generally) as "Source K". They were later betrayed by a mole within the French resistance, and Keller was murdered in [[Bergen-Belsen]] in April 1945.
The earliest wiretaps were extra wires — physically inserted to the line between the switchboard and the subscriber — that carried the signal to a pair of earphones and a recorder. Later, wiretaps were installed at the central office on the frames that held the incoming wires.<ref name="SCIENTIFIC" /> In late 1940, the Nazis tried to secure some telephone lines between their forward headquarters in Paris and a variety of [[Fuhrerbunker]]s in Germany. They did this by constantly monitoring the voltage on the lines, looking for any sudden drops or increases in voltage indicating that other wiring had been attached. However, the French telephone engineer Robert Keller succeeded in attaching taps without alerting the Nazis. This was done through an isolated rental property just outside of [[Paris]]. Keller's group became known to [[Special Operations Executive|SOE]] (and later Allied military intelligence generally) as "Source K". They were later betrayed by a mole within the French resistance, and Keller was murdered in the [[Bergen-Belsen]] [[concentration camp]] in April 1945. The first computerized telephone switch was developed by Bell Labs in 1965; it did not support standard wiretapping techniques.<ref name="ISSUU" />


===Greece===
In the 1970s, [[optical fibers]] become a medium for telecommunications. These fiber lines, “long, thin strands of glass that carry signals via laser light, are more secure than radio and have become very cheap. From the 1990s to the present, the majority of communications between fixed locations has been achieved by fiber. Because these fiber communications are wired, they're given greater protection under U.S. law.<ref name="ISSUU" /><ref name="SCIENTIFIC">{{Cite magazine |last1=Diffie |first1=Whitfield |last2=Landau |first2=Susan |date=September 2008 |title=Internet Eavesdropping: A Brave New World of Wiretapping |url=http://www.scientificamerican.com/article/internet-eavesdropping/ |magazine=Scientific American |access-date=2018-10-05}}</ref>
In the [[Greek telephone tapping case 2004–2005]] more than 100 mobile phone numbers belonging mostly to members of the Greek government, including the [[Prime Minister of Greece]], and top-ranking civil servants were found to have been illegally tapped for a period of at least one year. The Greek government concluded this had been done by a foreign intelligence agency, for security reasons related to the [[2004 Olympic Games]], by unlawfully activating the lawful interception subsystem of the [[Vodafone Greece]] mobile network. An Italian tapping case which surfaced in November 2007 revealed significant manipulation of the news at the national television company [[RAI]].<ref>{{Cite magazine |url=https://www.newyorker.com/magazine/2008/11/03/girls-girls-girls-letter-from-rome-alexander-stille |title=Girls! Girls! Girls! |last=Stille |first=Alexander |date=2008-10-27 |magazine=The New Yorker |access-date=2019-11-03 |department=Letter from Rome |publication-date=2008-11-03 |language=en |issn=0028-792X}}</ref>


===United States===
The earliest wiretaps were extra wires — physically inserted to the line between the switchboard and the subscriber — that carried the signal to a pair of earphones and a recorder. Later on, wiretaps were installed at the central office on the frames that held the incoming wires.”<ref name="SCIENTIFIC" />
Many state legislatures in the United States enacted statutes that prohibited anyone from listening in on telegraph communication. Telephone wiretapping began in the 1890s,<ref name="hsw3" /> and its [[constitutionality]] was established in the [[Prohibition]]-Era conviction of [[Rum running|bootlegger]] [[Roy Olmstead]]. Wiretapping has also been carried out in the US under most presidents, sometimes with a lawful warrant since the [[Supreme Court of the United States|Supreme Court]] ruled it constitutional in 1928. On October 19, 1963, U.S.&nbsp;Attorney General [[Robert F. Kennedy]], who served under [[John F. Kennedy]] and [[Lyndon B. Johnson]], authorized the [[FBI]] to begin wiretapping the communications of Rev. [[Martin Luther King Jr.]] The wiretaps remained in place until April 1965 at his home and June 1966 at his office.<ref>{{Cite magazine |last=Garrow |first=David&nbsp;J. |date=July–August 2002 |title=The FBI and Martin Luther King |url=https://www.theatlantic.com/doc/200207/garrow |magazine=The Atlantic |access-date=2010-06-01}}</ref>


Before the [[attack on Pearl Harbor]] and the subsequent entry of the United States into [[World War II]], the U.S. House of Representatives held hearings on the legality of wiretapping for national defense. Significant legislation and judicial decisions on the legality and constitutionality of wiretapping had taken place years before World War&nbsp;II.<ref>United States Congress. ''Joint resolution to authorize the Federal Bureau of Investigation of the Department of Justice to con-duct investigations in the interests of national defense, and ·for that purpose to permit wire tapping in certain cases''. H.J.Res. 571. 76th Cong. 2nd sess. House Committee on the Judiciary Rept. No. 2574. [https://www.govinfo.gov/app/details/GPO-CRECB-1940-pt8-v8686 Cong. Rec. (bound) '''8300'''] (June 14, 1940)</ref> However, it took on new urgency at that time of national crisis. The actions of the government regarding wiretapping for the purpose of national defense in the current war on terror have drawn considerable attention and criticism. In the World War II era, the public was also aware of the controversy over the question of the constitutionality and legality of wiretapping. Furthermore, the public was concerned with the decisions that the legislative and judicial branches of the government were making regarding wiretapping.<ref>United States Congress. ''An act to amend section 606 of the Communications Act of 1934 for the pur-pose of granting to the President, in time of war or threatened war, certain powers with respect to communications by wire''. H.R. 6263. 77th Cong., 2nd sess. House Committee on the Judiciary.</ref>
Before the [[attack on Pearl Harbor]] and the subsequent entry of the United States into [[World War II]], the U.S. House of Representatives held hearings on the legality of wiretapping for national defense. Significant legislation and judicial decisions on the legality and constitutionality of wiretapping had taken place years before World War&nbsp;II.<ref>United States Congress. ''Joint resolution to authorize the Federal Bureau of Investigation of the Department of Justice to con-duct investigations in the interests of national defense, and ·for that purpose to permit wire tapping in certain cases''. H.J.Res. 571. 76th Cong. 2nd sess. House Committee on the Judiciary Rept. No. 2574. [https://www.govinfo.gov/app/details/GPO-CRECB-1940-pt8-v8686 Cong. Rec. (bound) '''8300'''] (June 14, 1940)</ref> However, it took on new urgency at that time of national crisis. The actions of the government regarding wiretapping for the purpose of national defense in the current war on terror have drawn considerable attention and criticism. In the World War II era, the public was also aware of the controversy over the question of the constitutionality and legality of wiretapping. Furthermore, the public was concerned with the decisions that the legislative and judicial branches of the government were making regarding wiretapping.<ref>United States Congress. ''An act to amend section 606 of the Communications Act of 1934 for the pur-pose of granting to the President, in time of war or threatened war, certain powers with respect to communications by wire''. H.R. 6263. 77th Cong., 2nd sess. House Committee on the Judiciary.</ref>


[[File:This Phone Is Tapped.jpg|thumb|[[CrimethInc.]] sticker on a telephone warning users of phone tapping by the U.S. government]]
[[File:This Phone Is Tapped.jpg|thumb|[[CrimethInc.]] sticker on a telephone warning users of phone tapping by the U.S. government]]
In 1967, the U.S. Supreme Court ruled that wiretapping (or “intercepting communications”) requires a warrant in ''[[Katz v. United States]]''.<ref>{{Cite web |url=http://www.uscourts.gov/educational-resources/get-involved/constitution-activities/fourth-amendment/wiretaps-cell-phone-surveillance/facts-case-summary.aspx |title=Facts and Case Summary: Katz v. United States |website=United States Courts |url-status=dead |archive-url=https://web.archive.org/web/20150403121612/http://www.uscourts.gov/educational-resources/get-involved/constitution-activities/fourth-amendment/wiretaps-cell-phone-surveillance/facts-case-summary.aspx |archive-date=2015-04-03}}</ref> In 1968 Congress passed a law that provided warrants for wiretapping in criminal investigations.<ref>{{Cite web |url=https://it.ojp.gov/default.aspx?area=privacy&page=1284 |title=Title III of The Omnibus Crime Control and Safe Streets Act of 1968 (Wiretap Act) |website=Justice Information Sharing |publisher=DHS/Office for Civil Rights and Civil Liberties and the DHS/Privacy Office in cooperation with the DOJ, Office of Justice Programs, Bureau of Justice Assistance |access-date=2012-03-20}}</ref>


In the 1970s, [[optical fibers]] become a medium for telecommunications. These fiber lines, "long, thin strands of glass that carry signals via laser light," are more secure than radio and have become very cheap. From the 1990s to the present, the majority of communications between fixed locations has been achieved by fiber. Because these fiber communications are wired, they are protected under U.S. law.<ref name="ISSUU" /><ref name="SCIENTIFIC">{{Cite magazine |last1=Diffie |first1=Whitfield |last2=Landau |first2=Susan |date=September 2008 |title=Internet Eavesdropping: A Brave New World of Wiretapping |url=http://www.scientificamerican.com/article/internet-eavesdropping/ |magazine=Scientific American |access-date=2018-10-05}}</ref>
In 1967 the U.S. Supreme Court ruled that wiretapping (or “intercepting communications”) requires a warrant in ''[[Katz v. United States]]''.<ref>{{Cite web |url=http://www.uscourts.gov/educational-resources/get-involved/constitution-activities/fourth-amendment/wiretaps-cell-phone-surveillance/facts-case-summary.aspx |title=Facts and Case Summary: Katz v. United States |website=United States Courts |url-status=dead |archive-url=https://web.archive.org/web/20150403121612/http://www.uscourts.gov/educational-resources/get-involved/constitution-activities/fourth-amendment/wiretaps-cell-phone-surveillance/facts-case-summary.aspx |archive-date=2015-04-03}}</ref> In 1968 Congress passed a law that provided warrants for wiretapping in criminal investigations.<ref>{{Cite web |url=https://it.ojp.gov/default.aspx?area=privacy&page=1284 |title=Title III of The Omnibus Crime Control and Safe Streets Act of 1968 (Wiretap Act) |website=Justice Information Sharing |publisher=DHS/Office for Civil Rights and Civil Liberties and the DHS/Privacy Office in cooperation with the DOJ, Office of Justice Programs, Bureau of Justice Assistance |access-date=2012-03-20}}</ref> In 1978 the Foreign Intelligence Surveillance Act (FISA) created a "secret federal court" for issuing wiretap warrants in national security cases. This was in response to findings from the Watergate break-in, which allegedly uncovered a history of presidential operations that had used surveillance on domestic and foreign political organizations.<ref>{{Cite web |url=https://www.fjc.gov/history/courts/foreign-intelligence-surveillance-court-and-court-review-1978-present |title=Foreign Intelligence Surveillance Court and Court of Review, 1978-present |website=Federal Judicial Center |access-date=2014-07-22}}</ref>


In 1978, the US Foreign Intelligence Surveillance Act (FISA) created a "secret federal court" for issuing wiretap warrants in national security cases. This was in response to findings from the Watergate break-in, which allegedly uncovered a history of presidential operations that had used surveillance on domestic and foreign political organizations.<ref>{{Cite web |url=https://www.fjc.gov/history/courts/foreign-intelligence-surveillance-court-and-court-review-1978-present |title=Foreign Intelligence Surveillance Court and Court of Review, 1978–present |website=Federal Judicial Center |access-date=2014-07-22}}</ref>
In 1994, Congress approved the Communications Assistance for Law Enforcement Act (CALEA), which “requires telephone companies to be able to install more effective wiretaps. In 2004, the [[Federal Bureau of Investigation]] (FBI), [[United States Department of Justice]] (DOJ), [[Bureau of Alcohol, Tobacco, Firearms, and Explosives]] (ATF), and [[Drug Enforcement Administration]] (DEA) wanted to expand CALEA requirements to VoIP service.”<ref name="ISSUU" /><ref name="SCIENTIFIC" />


A difference between US wiretapping in the US and elsewhere is that, when operating in other countries, "American intelligence services could not place wiretaps on phone lines as easily as they could in the U.S." Also, in the US, wiretapping is regarded as an extreme investigative technique, while communications are often intercepted in some other countries. The National Security Agency (NSA) "spends billions of dollars every year intercepting foreign communications from ground bases, ships, airplanes and satellites".<ref name="SCIENTIFIC" />
The [[Federal Communications Commission]] (FCC) ruled in August 2005 that “broadband-service providers and interconnected [[VoIP]] providers fall within CALEA’s scope. Currently, instant messaging, web boards and site visits are not included in CALEA’s jurisdiction.<ref>{{Cite web |url=https://it.toolbox.com/blogs/bobley/the-instant-expert-guide-to-calea-072312 |title=The Instant Expert Guide to CALEA |last=Edwards |first=John <!--Incorrect author added when article moved to new website --> |date=<!--Original undated--> |publisher=VoIP News |archive-url=https://web.archive.org/web/20120711144311/http://www.voip-news.com/feature/guide-calea-030608/ |archive-date=2012-07-11 |access-date=2010-06-01}}</ref> In 2007 Congress amended FISA to “allow the government to monitor more communications without a warrant”. In 2008 President [[George W. Bush]] expanded the surveillance of internet traffic to and from the U.S. government by signing a national security directive.<ref name="ISSUU" />


FISA distinguishes between U.S. persons and foreigners, between communications inside and outside the U.S., and between wired and wireless communications. Wired communications within the United States are protected, since intercepting them requires a warrant,<ref name="SCIENTIFIC" /> but there is no regulation of US wiretapping elsewhere.
In the [[Greek telephone tapping case 2004–2005]] more than 100 mobile phone numbers belonging mostly to members of the Greek government, including the [[Prime Minister of Greece]], and top-ranking civil servants were found to have been illegally tapped for a period of at least one year. The Greek government concluded this had been done by a foreign intelligence agency, for security reasons related to the [[2004 Olympic Games]], by unlawfully activating the lawful interception subsystem of the [[Vodafone Greece]] mobile network. An Italian tapping case which surfaced in November 2007 revealed significant manipulation of the news at the national television company [[RAI]].<ref>{{Cite magazine |url=https://www.newyorker.com/magazine/2008/11/03/girls-girls-girls-letter-from-rome-alexander-stille |title=Girls! Girls! Girls! |last=Stille |first=Alexander |date=2008-10-27 |magazine=The New Yorker |access-date=2019-11-03 |department=Letter from Rome |publication-date=2008-11-03 |language=en |issn=0028-792X}}</ref>


In 1994, Congress approved the Communications Assistance for Law Enforcement Act (CALEA), which “requires telephone companies to be able to install more effective wiretaps. In 2004, the [[Federal Bureau of Investigation]] (FBI), [[United States Department of Justice]] (DOJ), [[Bureau of Alcohol, Tobacco, Firearms, and Explosives]] (ATF), and [[Drug Enforcement Administration]] (DEA) wanted to expand CALEA requirements to VoIP service.”<ref name="ISSUU" /><ref name="SCIENTIFIC" />
In 2008, ''[[Wired (magazine)|Wired]]'' and other media reported a [[whistleblower|lamplighter]] disclosed a "Quantico Circuit", a 45-megabit/second DS-3 line linking a carrier's most sensitive network in an affidavit that was the basis for a lawsuit against Verizon Wireless. The circuit provides direct access to all content and all information concerning the origin and termination of telephone calls placed on the Verizon Wireless network as well as the actual content of calls, according to the filing.<ref>{{Cite magazine |url=https://www.wired.com/threatlevel/2008/03/whistleblower-f/ |title=Whistle-Blower: Feds Have a Backdoor Into Wireless Carrier Congress Reacts |last=Poulsen |first=Kevin |date=2008-03-06 |magazine=WIRED |access-date=2010-06-01 |department=Threat Level}}</ref>


The [[Federal Communications Commission]] (FCC) ruled in August 2005 that “broadband-service providers and interconnected [[VoIP]] providers fall within CALEA's scope. Currently, instant messaging, web boards and site visits are not included in CALEA's jurisdiction.<ref>{{Cite web |url=https://it.toolbox.com/blogs/bobley/the-instant-expert-guide-to-calea-072312 |title=The Instant Expert Guide to CALEA |last=Edwards |first=John <!--Incorrect author added when article moved to new website --> |date=<!--Original undated--> |publisher=VoIP News |archive-url=https://web.archive.org/web/20120711144311/http://www.voip-news.com/feature/guide-calea-030608/ |archive-date=2012-07-11 |access-date=2010-06-01}}</ref> In 2007 Congress amended FISA to "allow the government to monitor more communications without a warrant". In 2008 President [[George W. Bush]] expanded the surveillance of internet traffic to and from the U.S. government by signing a national security directive.<ref name="ISSUU" />
The most recent case of U.S. wiretapping was the [[NSA warrantless surveillance controversy]] discovered in December 2005. It aroused much controversy after then President [[George W. Bush]] admitted to violating a specific federal statute (FISA) and the warrant requirement of the Fourth Amendment to the [[United States Constitution]]. The President claimed his authorization was consistent with other federal statutes ([[Authorization for Use of Military Force Against Terrorists|AUMF]]) and other provisions of the Constitution, also stating that it was necessary to keep America safe from [[terrorism]] and could lead to the capture of notorious terrorists responsible for the [[September 11 attacks]] in 2001.{{Citation needed|date=March 2019}}<ref>{{Cite news|date=October 25, 2001|title=Text: Bush Signs Anti-Terrorism Legislation|url=https://www.washingtonpost.com/wp-srv/nation/specials/attacked/transcripts/bushtext_102601.html|newspaper=Washington Post}}</ref>


The [[NSA warrantless surveillance (2001–2007)]] controversy was discovered in December 2005. It aroused much controversy after then President [[George W. Bush]] admitted to violating a specific federal statute (FISA) and the warrant requirement of the Fourth Amendment to the [[United States Constitution]]. The President claimed his authorization was consistent with other federal statutes ([[Authorization for Use of Military Force Against Terrorists|AUMF]]) and other provisions of the Constitution, also stating that it was necessary to keep America safe from [[terrorism]] and could lead to the capture of notorious terrorists responsible for the [[September 11 attacks]] in 2001.{{Citation needed|date=March 2019}}<ref>{{Cite news|date=October 25, 2001|title=Text: Bush Signs Anti-Terrorism Legislation|url=https://www.washingtonpost.com/wp-srv/nation/specials/attacked/transcripts/bushtext_102601.html|newspaper=Washington Post}}</ref>
One difference between foreign wiretapping and domestic wiretapping is that, when operating in other countries, “American intelligence services could not place wiretaps on phone lines as easily as they could in the U.S. Also, domestically, wiretapping is regarded as an extreme investigative technique, whereas outside of the country, the interception of communications is huge. The National Security Agency (NSA) “spends billions of dollars every year intercepting foreign communications from ground bases, ships, airplanes and satellites”.<ref name="SCIENTIFIC" />


In 2008, ''[[Wired (magazine)|Wired]]'' and other media reported a [[whistleblower|lamplighter]] disclosed a "Quantico Circuit", a 45-megabit/second DS-3 line linking a carrier's most sensitive network in an affidavit that was the basis for a lawsuit against Verizon Wireless. The circuit provides direct access to all content and all information concerning the origin and termination of telephone calls placed on the Verizon Wireless network as well as the actual content of calls, according to the filing.<ref>{{Cite magazine |url=https://www.wired.com/threatlevel/2008/03/whistleblower-f/ |title=Whistle-Blower: Feds Have a Backdoor Into Wireless Carrier Congress Reacts |last=Poulsen |first=Kevin |date=2008-03-06 |magazine=WIRED |access-date=2010-06-01 |department=Threat Level}}</ref>
FISA distinguishes between U.S. persons and foreigners, between communications inside and outside the U.S., and between wired and wireless communications. Wired communications within the United States are protected, since intercepting them requires a warrant.<ref name="SCIENTIFIC" />


==See also==
==See also==

Latest revision as of 04:44, 21 October 2024

Wiretapping, also known as wire tapping or telephone tapping, is the monitoring of telephone and Internet-based conversations by a third party, often by covert means. The wire tap received its name because, historically, the monitoring connection was an actual electrical tap on an analog telephone or telegraph line. Legal wiretapping by a government agency is also called lawful interception. Passive wiretapping monitors or records the traffic, while active wiretapping alters or otherwise affects it.[1][2]

[edit]
Telephone line control device "Jitka", used in late 1960s by Czechoslovakian StB to signal line occupancy, and connect a recorder

Lawful interception is officially strictly controlled in many countries to safeguard privacy; this is the case in all liberal democracies. In theory, telephone tapping often needs to be authorized by a court, and is again in theory, normally only approved when evidence shows it is not possible to detect criminal or subversive activity in less intrusive ways. Oftentimes, the law and regulations require that the crime investigated must be at least of a certain severity.[3][4] Illegal or unauthorized telephone tapping is often a criminal offense.[3] In certain jurisdictions, such as Germany and France, courts will accept illegally recorded phone calls without the other party's consent as evidence, but the unauthorized telephone tapping will still be prosecuted.[5][6]

United States

[edit]

In the United States, under the Foreign Intelligence Surveillance Act, federal intelligence agencies can get approval for wiretaps from the United States Foreign Intelligence Surveillance Court, a court with secret proceedings, or in certain circumstances from the Attorney General without a court order.[7][8]

The telephone call recording laws in most U.S. states require only one party to be aware of the recording, while twelve states require both parties to be aware.[9][10] In Nevada, the state legislature enacted a law making it legal for a party to record a conversation if one party to the conversation consented, but the Nevada Supreme Court issued two judicial opinions changing the law and requiring all parties to consent to the recording of a private conversation for it to be legal.[11] It is considered better practice to announce at the beginning of a call that the conversation is being recorded.[12][13]

The Fourth Amendment to the United States Constitution protects privacy rights by requiring a warrant to search a person. However, telephone tapping is the subject of controversy surrounding violations of this right. There are arguments that wiretapping invades a person's personal privacy and therefore violates their Fourth Amendment rights. On the other hand, there are certain rules and regulations, which permit wiretapping. A notable example of this is the Patriot Act, which, in certain circumstances, gives the government permission to wiretap citizens.[14] In addition, wiretapping laws vary per state, making it even more difficult to determine whether the Fourth Amendment is being violated.[15]

Canada

[edit]

In Canadian law, police are allowed to wiretap without the authorization from a court when there is the risk for imminent harm, such as kidnapping or a bomb threat.[16] They must believe that the interception is immediately necessary to prevent an unlawful act that could cause serious harm to any person or to property. This was introduced by Rob Nicholson on February 11, 2013, and is also known as Bill C-55.[16] The Supreme Court gave Parliament twelve months to rewrite a new law. Bill C-51 (also known as the Anti-Terrorism Act) was then released in 2015, which transformed the Canadian Security Intelligence Service from an intelligence-gathering agency to an agency actively engaged in countering national security threats.

Legal protection extends to 'private communications' where the participants would not expect unintended persons to learn the content of the communication. A single participant can legally, and covertly record a conversation. Otherwise police normally need a judicial warrant based upon probable grounds to record a conversation they are not a part of. In order to be valid wiretap authorization must state: 1) the offense being investigated by the wiretap, 2) the type of communication, 3) the identity of the people or places targeted, 4) the period of validity (60 days from issue).[17]

India

[edit]

In India, the lawful interception of communication by authorized law enforcement agencies (LEAs) is carried out in accordance with Section 5(2) of the Indian Telegraph Act, 1885 read with Rule 419A of Indian Telegraph (Amendment) Rules, 2007. Directions for interception of any message or class of messages under sub-section (2) of Section 5 of the Indian Telegraph Act, 1885 shall not be issued except by an order made by the Secretary to the Government of India in the Ministry of Home Affairs in the case of Government of India and by the Secretary to the State Government in-charge of the Home Department in the case of a state government.[18] The government has set up the Centralized Monitoring System (CMS) to automate the process of lawful interception and monitoring of telecommunications technology. The government of India on 2015 December 2 in a reply to parliament question no. 595 on scope, objectives and framework of the CMS has struck a balance between national security, online privacy and free speech informed that to take care of the privacy of citizens, lawful interception and monitoring is governed by the Section 5(2) of Indian Telegraph Act, 1885 read with Rule 419A of Indian Telegraph (Amendment) Rules, 2007 wherein oversight mechanism exists in form of review committee under chairmanship of the Cabinet Secretary at Central Government level and Chief Secretary of the State at the state government level.[19][20] Section 5(2) also allows the government to intercept messages that are public emergencies or for public safety.[21]

Pakistan

[edit]

In Pakistan, Inter-Services Intelligence (ISI) is authorised by the Ministry of Information Technology and Telecommunication to intercept and trace telecommunications, as stipulated under Section 54 of the relevant Act, in July 2024.[22] Under the authorization, ISI officers of at least grade 18, subject to periodic designation, are empowered to surveil calls and messages.[22]

Methods

[edit]

Official use

[edit]

The contracts or licenses by which the state controls telephone companies often require that the companies must provide access to tapping lines to law enforcement. In the U.S., telecommunications carriers are required by law to cooperate in the interception of communications for law enforcement purposes under the terms of Communications Assistance for Law Enforcement Act (CALEA).[23]

When telephone exchanges were mechanical, a tap had to be installed by technicians, linking circuits together to route the audio signal from the call. Now that many exchanges have been converted to digital technology, tapping is far simpler and can be ordered remotely by computer. This central office switch wiretapping technology using the Advanced Intelligent Network (AIN) was invented by Wayne Howe and Dale Malik at BellSouth's Advanced Technology R&D group in 1995 and was issued as US Patent #5,590,171.[24] Telephone services provided by cable TV companies also use digital switching technology. If the tap is implemented at a digital switch, the switching computer simply copies the digitized bits that represent the phone conversation to a second line and it is impossible to tell whether a line is being tapped. A well-designed tap installed on a phone wire can be difficult to detect. In some places, some law enforcement may be able to even access a mobile phone's internal microphone even while it isn't actively being used on a phone call (unless the battery is removed or drained).[25] The noises that some people believe to be telephone taps are simply crosstalk created by the coupling of signals from other phone lines.[26]

Data on the calling and called number, time of call and duration, will generally be collected automatically on all calls and stored for later use by the billing department of the phone company. These data can be accessed by security services, often with fewer legal restrictions than for a tap. This information used to be collected using special equipment known as pen registers and trap and trace devices and U.S. law still refers to it under those names. Today, a list of all calls to a specific number can be obtained by sorting billing records. A telephone tap during which only the call information is recorded but not the contents of the phone calls themselves, is called a pen register tap.

For telephone services via digital exchanges, the information collected may additionally include a log of the type of communications media being used (some services treat data and voice communications differently, in order to conserve bandwidth).

Non-official use

[edit]
A telephone recording adapter (in-line tap). The phone jack connects to the wall socket while the phone being monitored is connected to the adapter's socket. The audio plug connects to the recording device (computer, tape recorder, etc.).

Conversations can be recorded or monitored unofficially, either by tapping by a third party without the knowledge of the parties to the conversation or recorded by one of the parties. This may or may not be illegal, according to the circumstances and the jurisdiction.

There are a number of ways to monitor telephone conversations. One of the parties may record the conversation, either on a tape or solid-state recording device, or they may use a computer running call recording software. The recording, whether overt or covert, may be started manually, automatically when it detects sound on the line (VOX), or automatically whenever the phone is off the hook.

  • using an inductive coil tap (telephone pickup coil) attached to the handset or near the base of the telephone, picking up the stray field of the telephone's hybrid;[27]
  • fitting an in-line tap, as discussed below, with a recording output;
  • using an in-ear microphone while holding the telephone to the ear normally; this picks up both ends of the conversation without too much disparity between the volumes[28]
  • more crudely and with lower quality, simply using a speakerphone and recording with a normal microphone

The conversation may be monitored (listened to or recorded) covertly by a third party by using an induction coil or a direct electrical connection to the line using a beige box. An induction coil is usually placed underneath the base of a telephone or on the back of a telephone handset to pick up the signal inductively. An electrical connection can be made anywhere in the telephone system, and need not be in the same premises as the telephone. Some apparatus may require occasional access to replace batteries or tapes. Poorly designed tapping or transmitting equipment can cause interference audible to users of the telephone.[citation needed]

The tapped signal may either be recorded at the site of the tap or transmitted by radio or over the telephone wires. As of 2007 state-of-the-art equipment operates in the 30–300 GHz range to keep up with telephone technology compared to the 772 kHz systems used in the past.[29][30] The transmitter may be powered from the line to be maintenance-free, and only transmits when a call is in progress. These devices are low-powered as not much power can be drawn from the line, but a state-of-the-art receiver could be located as far away as ten kilometers under ideal conditions, though usually located much closer. Research has shown that a satellite can be used to receive terrestrial transmissions with a power of a few milliwatts.[31] Any sort of radio transmitter whose presence is suspected is detectable with suitable equipment.

Conversation on many early cordless telephones could be picked up with a simple radio scanner or sometimes even a domestic radio. Widespread digital spread spectrum technology and encryption has made eavesdropping increasingly difficult.

A problem with recording a telephone conversation is that the recorded volume of the two speakers may be very different. A simple tap will have this problem. An in-ear microphone, while involving an additional distorting step by converting the electrical signal to sound and back again, in practice gives better-matched volume. Dedicated, and relatively expensive, telephone recording equipment equalizes the sound at both ends from a direct tap much better.

Location data

[edit]

Mobile phones are, in surveillance terms, a major liability. For mobile phones the major threat is the collection of communications data.[32][33] This data does not only include information about the time, duration, originator and recipient of the call, but also the identification of the base station where the call was made from, which equals its approximate geographical location. This data is stored with the details of the call and has utmost importance for traffic analysis.

It is also possible to get greater resolution of a phone's location by combining information from a number of cells surrounding the location, which cells routinely communicate (to agree on the next handoff—for a moving phone) and measuring the timing advance, a correction for the speed of light in the GSM standard. This additional precision must be specifically enabled by the telephone company—it is not part of the network's ordinary operation.

Internet

[edit]

In 1995, Peter Garza, a Special Agent with the Naval Criminal Investigative Service, conducted the first court-ordered Internet wiretap in the United States while investigating Julio Cesar "Griton" Ardita.[34][35]

As technologies emerge, including VoIP, new questions are raised about law enforcement access to communications (see VoIP recording). In 2004, the Federal Communications Commission was asked to clarify how the Communications Assistance for Law Enforcement Act (CALEA) related to Internet service providers. The FCC stated that “providers of broadband Internet access and voice over Internet protocol (“VoIP”) services are regulable as “telecommunications carriers” under the Act.”[36] Those affected by the Act will have to provide access to law enforcement officers who need to monitor or intercept communications transmitted through their networks. As of 2009, warrantless surveillance of internet activity has consistently been upheld in FISA court.[37]

The Internet Engineering Task Force has decided not to consider requirements for wiretapping as part of the process for creating and maintaining IETF standards.[38]

Typically, illegal Internet wiretapping is conducted via Wi-Fi connection to someone's Internet by cracking the WEP or WPA key, using a tool such as Aircrack-ng or Kismet.[39][40] Once in, the intruder relies on a number of potential tactics, for example an ARP spoofing attack, allowing the intruder to view packets in a tool such as Wireshark or Ettercap.

Mobile phone

[edit]

The first generation mobile phones (c. 1978 through 1990) could be easily monitored by anyone with a 'scanning all-band receiver' because the system used an analog transmission system-like an ordinary radio transmitter. Instead, digital phones are harder to monitor because they use digitally encoded and compressed transmission. However the government can tap mobile phones with the cooperation of the phone company.[41] It is also possible for organizations with the correct technical equipment to monitor mobile phone communications and decrypt the audio.[citation needed]

To the mobile phones in its vicinity, a device called an "IMSI-catcher" pretends to be a legitimate base station of the mobile phone network, thus subjecting the communication between the phone and the network to a man-in-the-middle attack. This is possible because, while the mobile phone has to authenticate itself to the mobile telephone network, the network does not authenticate itself to the phone.[42][failed verification] There is no defense against IMSI-catcher based eavesdropping, except using end-to-end call encryption; products offering this feature, secure telephones, are already beginning to appear on the market, though they tend to be expensive and incompatible with each other, which limits their proliferation.[43]

Webtapping

[edit]

Logging the IP addresses of users that access certain websites is commonly called "webtapping".[44]

Webtapping is used to monitor websites that presumably contain dangerous or sensitive materials, and the people that access them. It is allowed in the US by the Patriot Act, but is considered a questionable practice by many.[45]

Telephone recording

[edit]

In Canada, anyone is legally allowed to record a conversation as long as they are involved in the conversation. The police must apply for a warrant beforehand to legally eavesdrop on a conversation, which requires that it is expected to reveal evidence to a crime. State agents may record conversations, but must obtain a warrant to use them as evidence in court.

History

[edit]

The history of voice communication technology began in 1876 with the invention of Alexander Graham Bell's telephone. In the 1890s, "law enforcement agencies begin tapping wires on early telephone networks".[46] Remote voice communications "were carried almost exclusively by circuit-switched systems," where telephone switches would connect wires to form a continuous circuit and disconnect the wires when the call ended). All other telephone services, such as call forwarding and message taking, were handled by human operators.[47]

The earliest wiretaps were extra wires — physically inserted to the line between the switchboard and the subscriber — that carried the signal to a pair of earphones and a recorder. Later, wiretaps were installed at the central office on the frames that held the incoming wires.[47] In late 1940, the Nazis tried to secure some telephone lines between their forward headquarters in Paris and a variety of Fuhrerbunkers in Germany. They did this by constantly monitoring the voltage on the lines, looking for any sudden drops or increases in voltage indicating that other wiring had been attached. However, the French telephone engineer Robert Keller succeeded in attaching taps without alerting the Nazis. This was done through an isolated rental property just outside of Paris. Keller's group became known to SOE (and later Allied military intelligence generally) as "Source K". They were later betrayed by a mole within the French resistance, and Keller was murdered in the Bergen-Belsen concentration camp in April 1945. The first computerized telephone switch was developed by Bell Labs in 1965; it did not support standard wiretapping techniques.[46]

Greece

[edit]

In the Greek telephone tapping case 2004–2005 more than 100 mobile phone numbers belonging mostly to members of the Greek government, including the Prime Minister of Greece, and top-ranking civil servants were found to have been illegally tapped for a period of at least one year. The Greek government concluded this had been done by a foreign intelligence agency, for security reasons related to the 2004 Olympic Games, by unlawfully activating the lawful interception subsystem of the Vodafone Greece mobile network. An Italian tapping case which surfaced in November 2007 revealed significant manipulation of the news at the national television company RAI.[48]

United States

[edit]

Many state legislatures in the United States enacted statutes that prohibited anyone from listening in on telegraph communication. Telephone wiretapping began in the 1890s,[3] and its constitutionality was established in the Prohibition-Era conviction of bootlegger Roy Olmstead. Wiretapping has also been carried out in the US under most presidents, sometimes with a lawful warrant since the Supreme Court ruled it constitutional in 1928. On October 19, 1963, U.S. Attorney General Robert F. Kennedy, who served under John F. Kennedy and Lyndon B. Johnson, authorized the FBI to begin wiretapping the communications of Rev. Martin Luther King Jr. The wiretaps remained in place until April 1965 at his home and June 1966 at his office.[49]

Before the attack on Pearl Harbor and the subsequent entry of the United States into World War II, the U.S. House of Representatives held hearings on the legality of wiretapping for national defense. Significant legislation and judicial decisions on the legality and constitutionality of wiretapping had taken place years before World War II.[50] However, it took on new urgency at that time of national crisis. The actions of the government regarding wiretapping for the purpose of national defense in the current war on terror have drawn considerable attention and criticism. In the World War II era, the public was also aware of the controversy over the question of the constitutionality and legality of wiretapping. Furthermore, the public was concerned with the decisions that the legislative and judicial branches of the government were making regarding wiretapping.[51]

CrimethInc. sticker on a telephone warning users of phone tapping by the U.S. government

In 1967, the U.S. Supreme Court ruled that wiretapping (or “intercepting communications”) requires a warrant in Katz v. United States.[52] In 1968 Congress passed a law that provided warrants for wiretapping in criminal investigations.[53]

In the 1970s, optical fibers become a medium for telecommunications. These fiber lines, "long, thin strands of glass that carry signals via laser light," are more secure than radio and have become very cheap. From the 1990s to the present, the majority of communications between fixed locations has been achieved by fiber. Because these fiber communications are wired, they are protected under U.S. law.[46][47]

In 1978, the US Foreign Intelligence Surveillance Act (FISA) created a "secret federal court" for issuing wiretap warrants in national security cases. This was in response to findings from the Watergate break-in, which allegedly uncovered a history of presidential operations that had used surveillance on domestic and foreign political organizations.[54]

A difference between US wiretapping in the US and elsewhere is that, when operating in other countries, "American intelligence services could not place wiretaps on phone lines as easily as they could in the U.S." Also, in the US, wiretapping is regarded as an extreme investigative technique, while communications are often intercepted in some other countries. The National Security Agency (NSA) "spends billions of dollars every year intercepting foreign communications from ground bases, ships, airplanes and satellites".[47]

FISA distinguishes between U.S. persons and foreigners, between communications inside and outside the U.S., and between wired and wireless communications. Wired communications within the United States are protected, since intercepting them requires a warrant,[47] but there is no regulation of US wiretapping elsewhere.

In 1994, Congress approved the Communications Assistance for Law Enforcement Act (CALEA), which “requires telephone companies to be able to install more effective wiretaps. In 2004, the Federal Bureau of Investigation (FBI), United States Department of Justice (DOJ), Bureau of Alcohol, Tobacco, Firearms, and Explosives (ATF), and Drug Enforcement Administration (DEA) wanted to expand CALEA requirements to VoIP service.”[46][47]

The Federal Communications Commission (FCC) ruled in August 2005 that “broadband-service providers and interconnected VoIP providers fall within CALEA's scope. Currently, instant messaging, web boards and site visits are not included in CALEA's jurisdiction.[55] In 2007 Congress amended FISA to "allow the government to monitor more communications without a warrant". In 2008 President George W. Bush expanded the surveillance of internet traffic to and from the U.S. government by signing a national security directive.[46]

The NSA warrantless surveillance (2001–2007) controversy was discovered in December 2005. It aroused much controversy after then President George W. Bush admitted to violating a specific federal statute (FISA) and the warrant requirement of the Fourth Amendment to the United States Constitution. The President claimed his authorization was consistent with other federal statutes (AUMF) and other provisions of the Constitution, also stating that it was necessary to keep America safe from terrorism and could lead to the capture of notorious terrorists responsible for the September 11 attacks in 2001.[citation needed][56]

In 2008, Wired and other media reported a lamplighter disclosed a "Quantico Circuit", a 45-megabit/second DS-3 line linking a carrier's most sensitive network in an affidavit that was the basis for a lawsuit against Verizon Wireless. The circuit provides direct access to all content and all information concerning the origin and termination of telephone calls placed on the Verizon Wireless network as well as the actual content of calls, according to the filing.[57]

See also

[edit]

References

[edit]
  1. ^ Bishop, Matt (2003). "1: An Overview of Computer Security" (PDF). Computer security : art and science. Boston: Addison-Wesley. ISBN 0201440997. OCLC 50251943. Archived (PDF) from the original on 2005-12-22. Retrieved 2011-12-20.
  2. ^ Shirey, R. (August 2007). Internet Security Glossary. IETF. pp. 335–336. doi:10.17487/RFC4949. RFC 4949.
  3. ^ a b c Harris, Tom (2001-05-08). "How Wiretapping Works". How Stuff Works. p. 3. Retrieved 2011-12-20.
  4. ^ Harris, Tom (2001-05-08). "How Wiretapping Works". How Stuff Works. Retrieved 2011-12-20.
  5. ^ Klass and others v. Federal Republic of Germany, (Series A, NO 28) (1979–80) 2 EHRR 214 (European Court of Human Rights 1978-09-06).
  6. ^ Huvig v. France, 11105/84 (European Court of Human Rights 1990-04-24).
  7. ^ 50 U.S.C. § 1805: Issuance of order
  8. ^ Stevens, Gina; Doyle, Charles (2012-10-09). Privacy: An Abbreviated Outline of Federal Statutes Governing Wiretapping and Electronic Eavesdropping (PDF). Washington, DC: Congressional Research Service. Archived (PDF) from the original on 2022-10-09. Retrieved 2018-01-29.
  9. ^ "The Complicated Legality of Voice Recording in 2013". Versadial Solutions. 2019-05-24. Retrieved 2018-01-20.
  10. ^ "Privacy Laws by State". Electronic Privacy Information Center. Retrieved 2018-01-20.
  11. ^ Parry, Zachariah B. (2014-05-09). "Is It Legal to Record a Conversation in Nevada Without the Other Party's Consent? Is It Legal to Record a Conversation in Nevada Without the Other Party's Consent?". Parry & Pfau. Retrieved 2015-01-24.
  12. ^ "United States Telephone Recording Laws". Call Corder. Retrieved 2011-12-20.
  13. ^ Rasmussen, Kirsten; Komperda, Jack; Baldino, Raymond (Summer 2012). "Reporter's Recording Guide" (PDF). The Reporters Committee for Freedom of the Press. Archived (PDF) from the original on 2022-10-09. Retrieved 2018-01-20.
  14. ^ Soma, John T.; Nichols, Maury M.; Maish, Lance A.; Rogers, Jon David (Winter 2005). "Balance of privacy vs. security: a historical perspective of the USA PATRIOT Act". Rutgers Computer & Technology Law Journal. 31 (2). Newark: Rutgers University School of Law: 285–346. ISSN 0735-8938. GALE|A139431581 – via Gale General OneFile.
  15. ^ Slobogin, Christopher (2002). "Public Privacy: Camera Surveillance of Public Places and the Right to Anonymity". Mississippi Law Journal. 72: 213–316 – via HeinOnline.
  16. ^ a b Kirkby, Cynthia; Valiquet, Dominique (2013-02-26). "Legislative Summary of Bill C-55: An Act to amend the Criminal Code (Response to the Supreme Court of Canada Decision in R. v. Tse Act)". Legal and Legislative Affairs Division, Parliamentary Information and Research Service. Library of Parliament. 41-1-C-55-E.
  17. ^ "Rules of Evidence". Archived from the original on 2017-02-07.
  18. ^ "Acts & Rules". Department of Telecommunications. Government of India Ministry of Communications. Retrieved 2016-03-06.
  19. ^ "Parliament of India, Lok Sabha". Retrieved 2016-03-06.
  20. ^ "Telephone Tapping in India : Legal Provisions". Gangothri.org. 2013-04-11. Archived from the original on 2015-04-30. Retrieved 2018-01-20.
  21. ^ Arun, P. (2017). "Surveillance and democracy in India: Analysing challenges to constitutionalism and rule of law". Journal of Public Affairs and Change. 1: 47–59 – via jpac.in.
  22. ^ a b Qarar, Shakeel (July 9, 2024). "Govt formally authorises ISI to 'trace, intercept' calls and messages in 'interest of national security'". DAWN.COM.
  23. ^ Pub. L. 103–414 Communications Assistance for Law Enforcement Act of 1994  – via Wikisource.
  24. ^ US patent 5590171, Wayne Howe & Dale Malik, "Method and apparatus for communications monitoring", published 1996-12-31, assigned to Bellsouth Corporation 
  25. ^ McCullagh, Declan (2006-12-04). "FBI taps cell phone mic as eavesdropping tool". CNET. Retrieved 2010-06-24. The FBI appears to have begun using a novel form of electronic surveillance in criminal investigations: remotely activating a mobile phone's microphone and using it to eavesdrop on nearby conversations. […] Kaplan's opinion said that the eavesdropping technique "functioned whether the phone was powered on or off." Some handsets can't be fully powered down without removing the battery; for instance, some Nokia models will wake up when turned off if an alarm is set.
  26. ^ "Fact Sheet 9: Wiretapping and Eavesdropping on Telephone Calls". Privacy Rights Clearinghouse. May 2010. Archived from the original on 2012-01-11. Retrieved 2011-12-20.
  27. ^ Kenney, Crystal. "Telecoil Experiment" (PDF). Archived from the original (PDF) on 2010-06-13. Retrieved 2011-12-20.
  28. ^ "An example of an in-ear telephone recording microphone". Olympus. Archived from the original on 2012-09-05. Retrieved 2011-12-20.
  29. ^ Biswas, Debobroto; Galib, Saad Yosuf; Mamun, Noor Hossain (August 2009). Performance Analysis of Optical CDMA in Transmission Systems (PDF) (Bachelor of Science in Electronics and Communication Engineering thesis). BRAC University. p. 14. Archived (PDF) from the original on 2016-11-18. Retrieved 2014-07-22.
  30. ^ "An Introduction to Load Coils and Bridge Taps". Private Investigators UK. 2011-07-22. Retrieved 2014-07-22.
  31. ^ Chartrand, Mark R. (2004). Satellite communications for the nonspecialist. Belingham, WA: SPIE Press. p. 136. ISBN 0819451851.
  32. ^ Kelly, John (2013-12-08). "Cellphone data spying: It's not just the NSA". USA Today. Archived from the original on 2014-07-22. Retrieved 2014-07-22.
  33. ^ "Cell Phone Location Tracking Public Records Request". American Civil Liberties Union. 2013-03-25. Retrieved 2014-07-22.
  34. ^ "Federal Cybersleuthers Armed With First Ever Computer Wiretap Order Net International hacker Charged With Illegally Entering Harvard and U.S. Military Computers" (Press release). Washington, D.C.: US Department of Justice. 1996-03-29. Retrieved 2019-11-03.
  35. ^ "Argentine Computer Hacker Agrees to Waive Extradition and Returns to Plead Guilty to Felony Charges in Boston" (Press release). Boston, MA: US Department of Justice. 1998-05-19. Retrieved 2019-11-03.
  36. ^ American Council on Education v. Federal Communications Commission and Verizon Telephone Companies, 05-1404 (D.C. Cir. 2006-06-09), archived from the original on 2022-10-09.
  37. ^ Risen, James; Lichtblau, Eric (2009-01-15). "Court Affirms Wiretapping Without Warrant". The New York Times.
  38. ^ IETF Policy on Wiretapping. IETF. May 2000. doi:10.17487/RFC2804. RFC 2804.
  39. ^ "Aircrack-ng (WEP, WPA-PSK Crack)". Archived from the original on 2006-11-01. Retrieved 2014-07-22.
  40. ^ Weiss, Aaron (2006-03-30). "Introduction to Kismet". Wi-Fi Planet. Archived from the original on 2014-07-27. Retrieved 2014-07-22.
  41. ^ Flaherty, Anne (2013-07-10). "The price of surveillance: US gov't pays to snoop". AP News. Washington: Associated Press. Retrieved 2019-11-03.
  42. ^ Messmer, Ellen (2013-10-29). "Apple iOS Apps Subject to Man-in-the-Middle Attacks". Network World. Retrieved 2014-07-22.
  43. ^ Wang, Zidu (2007-12-07). Crypto Phones (Thesis). Ruhr University Bochum. Retrieved 2014-07-22.
  44. ^ Bronk, Chris (2008-11-05). "Webtapping: Securing the Internet to save us from transnational terror?". First Monday. 13 (11). doi:10.5210/fm.v13i11.2192.
  45. ^ Harper, Michael (2013-09-11). "Google Wiretapping Charges Are Legit, Says US Appeals Court". Redorbit. Retrieved 2013-09-11.
  46. ^ a b c d e "A History of Listening In". Scientific American. September 2008. pp. 57–59. Retrieved 2010-06-01 – via Issu.
  47. ^ a b c d e f Diffie, Whitfield; Landau, Susan (September 2008). "Internet Eavesdropping: A Brave New World of Wiretapping". Scientific American. Retrieved 2018-10-05.
  48. ^ Stille, Alexander (2008-10-27). "Girls! Girls! Girls!". Letter from Rome. The New Yorker (published 2008-11-03). ISSN 0028-792X. Retrieved 2019-11-03.
  49. ^ Garrow, David J. (July–August 2002). "The FBI and Martin Luther King". The Atlantic. Retrieved 2010-06-01.
  50. ^ United States Congress. Joint resolution to authorize the Federal Bureau of Investigation of the Department of Justice to con-duct investigations in the interests of national defense, and ·for that purpose to permit wire tapping in certain cases. H.J.Res. 571. 76th Cong. 2nd sess. House Committee on the Judiciary Rept. No. 2574. Cong. Rec. (bound) 8300 (June 14, 1940)
  51. ^ United States Congress. An act to amend section 606 of the Communications Act of 1934 for the pur-pose of granting to the President, in time of war or threatened war, certain powers with respect to communications by wire. H.R. 6263. 77th Cong., 2nd sess. House Committee on the Judiciary.
  52. ^ "Facts and Case Summary: Katz v. United States". United States Courts. Archived from the original on 2015-04-03.
  53. ^ "Title III of The Omnibus Crime Control and Safe Streets Act of 1968 (Wiretap Act)". Justice Information Sharing. DHS/Office for Civil Rights and Civil Liberties and the DHS/Privacy Office in cooperation with the DOJ, Office of Justice Programs, Bureau of Justice Assistance. Retrieved 2012-03-20.
  54. ^ "Foreign Intelligence Surveillance Court and Court of Review, 1978–present". Federal Judicial Center. Retrieved 2014-07-22.
  55. ^ Edwards, John. "The Instant Expert Guide to CALEA". VoIP News. Archived from the original on 2012-07-11. Retrieved 2010-06-01.
  56. ^ "Text: Bush Signs Anti-Terrorism Legislation". Washington Post. October 25, 2001.
  57. ^ Poulsen, Kevin (2008-03-06). "Whistle-Blower: Feds Have a Backdoor Into Wireless Carrier – Congress Reacts". Threat Level. WIRED. Retrieved 2010-06-01.
[edit]