HOME

TheInfoList



OR:

Telephone tapping (also wire tapping or wiretapping in
American English American English, sometimes called United States English or U.S. English, is the set of varieties of the English language native to the United States. English is the most widely spoken language in the United States and in most circumstances ...
) is the
monitoring Monitoring may refer to: Science and technology Biology and healthcare * Monitoring (medicine), the observation of a disease, condition or one or several medical parameters over time * Baby monitoring * Biomonitoring, of toxic chemical compounds, ...
of
telephone A telephone is a telecommunications device that permits two or more users to conduct a conversation when they are too far apart to be easily heard directly. A telephone converts sound, typically and most efficiently the human voice, into e ...
and
Internet The Internet (or internet) is the global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a '' network of networks'' that consists of private, p ...
-based conversations by a third party, often by covert means. The wire tap received its name because, historically, the monitoring connection was an actual electrical tap on the telephone line. Legal wiretapping by a
government agency A government or state agency, sometimes an appointed commission, is a permanent or semi-permanent organization in the machinery of government that is responsible for the oversight and administration of specific functions, such as an administrati ...
is also called
lawful interception Lawful interception (LI) refers to the facilities in telecommunications and telephone networks that allow law enforcement agencies with court orders or other legal authorization to selectively wiretap individual subscribers. Most countries requir ...
. Passive wiretapping monitors or records the traffic, while active wiretapping alters or otherwise affects it.


Legal status

Lawful interception Lawful interception (LI) refers to the facilities in telecommunications and telephone networks that allow law enforcement agencies with court orders or other legal authorization to selectively wiretap individual subscribers. Most countries requir ...
is officially strictly controlled in many countries to safeguard
privacy Privacy (, ) is the ability of an individual or group to seclude themselves or information about themselves, and thereby express themselves selectively. The domain of privacy partially overlaps with security, which can include the concepts of ...
; this is the case in all
liberal democracies Liberal democracy is the combination of a liberal political ideology that operates under an indirect democratic form of government. It is characterized by elections between multiple distinct political parties, a separation of powers into ...
. In theory, telephone tapping often needs to be authorized by a
court A court is any person or institution, often as a government institution, with the authority to adjudicate legal disputes between parties and carry out the administration of justice in civil, criminal, and administrative matters in acco ...
, and is again in theory, normally only approved when
evidence Evidence for a proposition is what supports this proposition. It is usually understood as an indication that the supported proposition is true. What role evidence plays and how it is conceived varies from field to field. In epistemology, evidenc ...
shows it is not possible to detect
criminal In ordinary language, a crime is an unlawful act punishable by a state or other authority. The term ''crime'' does not, in modern criminal law, have any simple and universally accepted definition,Farmer, Lindsay: "Crime, definitions of", in C ...
or
subversive Subversion () refers to a process by which the values and principles of a system in place are contradicted or reversed in an attempt to transform the established social order and its structures of power, authority, hierarchy, and social norms. Sub ...
activity in less intrusive ways. Oftentimes, the law and regulations require that the crime investigated must be at least of a certain severity. Illegal or unauthorized telephone tapping is often a criminal offense. In certain jurisdictions, such as
Germany Germany,, officially the Federal Republic of Germany, is a country in Central Europe. It is the second most populous country in Europe after Russia, and the most populous member state of the European Union. Germany is situated betwee ...
and
France France (), officially the French Republic ( ), is a country primarily located in Western Europe. It also comprises of Overseas France, overseas regions and territories in the Americas and the Atlantic Ocean, Atlantic, Pacific Ocean, Pac ...
, courts will accept illegally recorded phone calls without the other party's consent as evidence, but the unauthorized telephone tapping will still be prosecuted.


United States

In the
United States The United States of America (U.S.A. or USA), commonly known as the United States (U.S. or US) or America, is a country Continental United States, primarily located in North America. It consists of 50 U.S. state, states, a Washington, D.C., ...
, under the
Foreign Intelligence Surveillance Act The Foreign Intelligence Surveillance Act of 1978 ("FISA" , ) is a United States federal law that establishes procedures for the physical and electronic surveillance and the collection of "foreign intelligence information" between "foreign pow ...
, federal intelligence agencies can get approval for wiretaps from the
United States Foreign Intelligence Surveillance Court The United States Foreign Intelligence Surveillance Court (FISC), also called the FISA Court, is a U.S. federal court established under the Foreign Intelligence Surveillance Act of 1978 (FISA) to oversee requests for surveillance warrants aga ...
, a court with secret proceedings, or in certain circumstances from the
Attorney General In most common law jurisdictions, the attorney general or attorney-general (sometimes abbreviated AG or Atty.-Gen) is the main legal advisor to the government. The plural is attorneys general. In some jurisdictions, attorneys general also have exec ...
without a court order. The
telephone call recording laws Telephone call recording laws refer to the official legislation regarding call recording in different countries, including how or if the consent of parties is required beforehand. Australia The federal ''Telecommunications (Interception and Acces ...
in most U.S. states require only one party to be aware of the recording, while twelve states require both parties to be aware. In Nevada, the state legislature enacted a law making it legal for a party to record a conversation if one party to the conversation consented, but the Nevada Supreme Court issued two judicial opinions changing the law and requiring all parties to consent to the recording of a private conversation for it to be legal. It is considered better practice to announce at the beginning of a call that the conversation is being recorded. The
Fourth Amendment to the United States Constitution The Fourth Amendment (Amendment IV) to the United States Constitution is part of the Bill of Rights. It prohibits unreasonable searches and seizures. In addition, it sets requirements for issuing warrants: warrants must be issued by a judge o ...
protects privacy rights by requiring a warrant to search an individual. However, telephone tapping is the subject of controversy surrounding violations of this right. There are arguments that wiretapping invades an individual's personal privacy and therefore violates their Fourth Amendment rights. On the other hand, there are certain rules and regulations, which permit wiretapping. A notable example of this is the
Patriot Act The USA PATRIOT Act (commonly known as the Patriot Act) was a landmark Act of the United States Congress, signed into law by President George W. Bush. The formal name of the statute is the Uniting and Strengthening America by Providing Appro ...
. The Patriot act does, in certain circumstances, give the government permission to wiretap citizens. In addition, wiretapping laws vary per
state State may refer to: Arts, entertainment, and media Literature * ''State Magazine'', a monthly magazine published by the U.S. Department of State * ''The State'' (newspaper), a daily newspaper in Columbia, South Carolina, United States * ''Our S ...
which makes it even more difficult to determine whether the Fourth Amendment is being violated.


Canada

In Canadian law, police are allowed to wiretap without the authorization from a court when there is the risk for imminent harm, such as
kidnapping In criminal law, kidnapping is the unlawful confinement of a person against their will, often including transportation/asportation. The asportation and abduction element is typically but not necessarily conducted by means of force or fear: the p ...
or a
bomb threat A bomb threat or bomb scare is a threat, usually verbal or written, to detonate an explosive or incendiary device to cause property damage, death, injuries, and/or incite fear, whether or not such a device actually exists. History Bomb threat ...
. They must believe that the interception is immediately necessary to prevent an unlawful act that could cause serious harm to any person or to property. This was introduced by
Rob Nicholson Robert Douglas "Rob" Nicholson (born April 29, 1952) is a Canadian politician who represented the riding of Niagara Falls in the House of Commons of Canada from 2004 to 2019 as a member of the Conservative Party. Under Prime Minister Stephen Ha ...
on February 11, 2013, and is also known as Bill C-55. The Supreme Court gave Parliament twelve months to rewrite a new law. Bill C-51 (also known as the Anti-Terrorism Act) was then released in 2015, which transformed the Canadian Security Intelligence Service from an intelligence-gathering agency to an agency actively engaged in countering national security threats. Legal protection extends to 'private communications' where the participants would not expect unintended persons to learn the content of the communication. A single participant can legally, and covertly record a conversation. Otherwise police normally need a judicial warrant based upon probable grounds to record a conversation they are not a part of. In order to be valid wiretap authorization must state: 1) the offense being investigated by the wiretap, 2) the type of communication, 3) the identity of the people or places targeted, 4) the period of validity (60 days from issue).


India

In India, the lawful interception of communication by authorized law enforcement agencies (LEAs) is carried out in accordance with Section 5(2) of the Indian Telegraph Act, 1885 read with Rule 419A of Indian Telegraph (Amendment) Rules, 2007. Directions for interception of any message or class of messages under sub-section (2) of Section 5 of the Indian Telegraph Act, 1885 shall not be issued except by an order made by the Secretary to the Government of India in the Ministry of Home Affairs in the case of Government of India and by the Secretary to the State Government in-charge of the Home Department in the case of a state government. The government has set up the
Centralized Monitoring System The Central Monitoring System, abbreviated to CMS, is a centralized telephone interception provisioning system installed by the Centre for Development of Telematics (C-DOT), an Indian Government owned telecommunications technology development ...
(CMS) to automate the process of lawful interception and monitoring of telecommunications technology. The government of India on 2015 December 2 in a reply to parliament question no. 595 on scope, objectives and framework of the CMS has struck a balance between national security, online privacy and free speech informed that to take care of the privacy of citizens, lawful interception and monitoring is governed by the Section 5(2) of Indian Telegraph Act, 1885 read with Rule 419A of Indian Telegraph (Amendment) Rules, 2007 wherein oversight mechanism exists in form of review committee under chairmanship of the Cabinet Secretary at Central Government level and Chief Secretary of the State at the state government level. Section 5(2) also allows the government to intercept messages that are public emergencies or for public safety.


Methods


Official use

The contracts or licenses by which the state controls
telephone companies A telephone company, also known as a telco, telephone service provider, or telecommunications operator, is a kind of communications service provider (CSP), more precisely a telecommunications service provider (TSP), that provides telecommunicat ...
often require that the companies must provide access to tapping lines to law enforcement. In the U.S., telecommunications carriers are required by law to cooperate in the interception of communications for law enforcement purposes under the terms of
Communications Assistance for Law Enforcement Act The Communications Assistance for Law Enforcement Act (CALEA), also known as the "Digital Telephony Act," is a United States wiretapping law passed in 1994, during the presidency of Bill Clinton (Pub. L. No. 103-414, 108 Stat. 4279, codified at 47 ...
(CALEA). When
telephone exchange telephone exchange, telephone switch, or central office is a telecommunications system used in the public switched telephone network (PSTN) or in large enterprises. It interconnects telephone subscriber lines or virtual circuits of digital syste ...
s were mechanical, a tap had to be installed by technicians, linking circuits together to route the audio signal from the call. Now that many exchanges have been converted to digital technology, tapping is far simpler and can be ordered remotely by computer. This central office switch wiretapping technology using the Advanced Intelligent Network (AIN) was invented by Wayne Howe and Dale Malik at BellSouth's Advanced Technology R&D group in 1995 and was issued as US Patent #5,590,171. Telephone services provided by
cable TV Cable television is a system of delivering television programming to consumers via radio frequency (RF) signals transmitted through coaxial cables, or in more recent systems, light pulses through fibre-optic cables. This contrasts with broa ...
companies also use digital switching technology. If the tap is implemented at a digital switch, the switching computer simply copies the digitized bits that represent the phone conversation to a second line and it is impossible to tell whether a line is being tapped. A well-designed tap installed on a phone wire can be difficult to detect. In some places, some law enforcement may be able to even access a mobile phone's internal microphone even while it isn't actively being used on a phone call (unless the battery is removed or drained). The noises that some people believe to be telephone taps are simply
crosstalk In electronics, crosstalk is any phenomenon by which a signal transmitted on one circuit or channel of a transmission system creates an undesired effect in another circuit or channel. Crosstalk is usually caused by undesired capacitive, i ...
created by the
coupling A coupling is a device used to connect two shafts together at their ends for the purpose of transmitting power. The primary purpose of couplings is to join two pieces of rotating equipment while permitting some degree of misalignment or end mov ...
of signals from other phone lines. Data on the calling and called number, time of call and duration, will generally be collected automatically on all calls and stored for later use by the billing department of the phone company. These data can be accessed by security services, often with fewer legal restrictions than for a tap. This information used to be collected using special equipment known as ''
pen register A pen register, or dialed number recorder (DNR), is an electronic device that records all numbers called from a particular telephone line. The term has come to include any device or program that performs similar functions to an original pen regi ...
s'' and ''
trap and trace device A trap and trace device captures incoming phone calls to a particular number, similar to a how a pen register captures outgoing phone calls. Description Title 18 of the United States Code defines a trap and trace device as follows: : The term ...
s'' and U.S. law still refers to it under those names. Today, a list of all calls to a specific number can be obtained by sorting billing records. A telephone tap during which only the call information is recorded but not the contents of the phone calls themselves, is called a ''pen register'' tap. For telephone services via digital exchanges, the information collected may additionally include a log of the type of communications media being used (some services treat data and voice communications differently, in order to conserve bandwidth).


Non-official use

Conversations can be recorded or monitored unofficially, either by tapping by a third party without the knowledge of the parties to the conversation or recorded by one of the parties. This may or may not be illegal, according to the circumstances and the jurisdiction. There are a number of ways to monitor telephone conversations. One of the parties may record the conversation, either on a tape or solid-state recording device, or they may use a computer running
call recording softwareMp3/3gpp/wavCall recording software records telephone conversations over PSTN or VoIP in a digital audio file format. Call recording is distinct from call logging and tracking, which record details about the call but not the conversation; however, ...
. The recording, whether overt or covert, may be started manually, automatically when it detects sound on the line ( VOX), or automatically whenever the phone is off the hook. *using an inductive
coil tap A coil tap is a wiring feature found on some electrical transformers, inductors and coil pickups, all of which are sets of wire coils. The coil tap(s) are points in a wire coil where a conductive patch has been exposed (usually on a loop of wire t ...
(telephone pickup coil) attached to the handset or near the base of the telephone, picking up the stray field of the telephone's hybrid; *fitting an in-line tap, as discussed below, with a recording output; *using an in-ear microphone while holding the telephone to the ear normally; this picks up both ends of the conversation without too much disparity between the volumes *more crudely and with lower quality, simply using a speakerphone and recording with a normal microphone The conversation may be monitored (listened to or recorded) covertly by a third party by using an
induction coil An induction coil or "spark coil" ( archaically known as an inductorium or Ruhmkorff coil after Heinrich Rühmkorff) is a type of electrical transformer used to produce high-voltage pulses from a low-voltage direct current (DC) supply. p.98 ...
or a direct electrical connection to the line using a
beige box In consumer computer products, a beige box is a standard personal computer (PC). It has come to be used as a term of derision implying conservative or dated aesthetics and unremarkable specifications. The term is ultimately derived from the styl ...
. An induction coil is usually placed underneath the base of a telephone or on the back of a telephone handset to pick up the signal inductively. An electrical connection can be made anywhere in the telephone system, and need not be in the same premises as the telephone. Some apparatus may require occasional access to replace batteries or tapes. Poorly designed tapping or transmitting equipment can cause interference audible to users of the telephone. The tapped signal may either be recorded at the site of the tap or transmitted by radio or over the telephone wires. state-of-the-art equipment operates in the 30–300 GHz range to keep up with telephone technology compared to the 772 kHz systems used in the past. The transmitter may be powered from the line to be maintenance-free, and only transmits when a call is in progress. These devices are low-powered as not much power can be drawn from the line, but a state-of-the-art receiver could be located as far away as ten kilometers under ideal conditions, though usually located much closer. Research has shown that a
satellite A satellite or artificial satellite is an object intentionally placed into orbit in outer space. Except for passive satellites, most satellites have an electricity generation system for equipment on board, such as solar panels or radioiso ...
can be used to receive terrestrial transmissions with a power of a few milliwatts. Any sort of radio transmitter whose presence is suspected is detectable with suitable equipment. Conversation on many early
cordless telephone A cordless telephone or portable telephone has a portable telephone handset that connects by radio to a base station connected to the public telephone network. The operational range is limited, usually to the same building or within some short ...
s could be picked up with a simple
radio scanner A scanner (also referred to as a radio scanner) is a radio receiver that can automatically tune, or ''scan'', two or more discrete frequencies, stopping when it finds a signal on one of them and then continuing to scan other frequencies when the ...
or sometimes even a domestic radio. Widespread digital
spread spectrum In telecommunication and radio communication, spread-spectrum techniques are methods by which a signal (e.g., an electrical, electromagnetic, or acoustic signal) generated with a particular bandwidth is deliberately spread in the frequency d ...
technology and
encryption In cryptography, encryption is the process of encoding information. This process converts the original representation of the information, known as plaintext, into an alternative form known as ciphertext. Ideally, only authorized parties can d ...
has made eavesdropping increasingly difficult. A problem with recording a telephone conversation is that the recorded volume of the two speakers may be very different. A simple tap will have this problem. An in-ear microphone, while involving an additional distorting step by converting the electrical signal to sound and back again, in practice gives better-matched volume. Dedicated, and relatively expensive, telephone recording equipment equalizes the sound at both ends from a direct tap much better.


Location data

Mobile phone A mobile phone, cellular phone, cell phone, cellphone, handphone, hand phone or pocket phone, sometimes shortened to simply mobile, cell, or just phone, is a portable telephone that can make and receive calls over a radio frequency link whi ...
s are, in
surveillance Surveillance is the monitoring of behavior, many activities, or information for the purpose of information gathering, influencing, managing or directing. This can include observation from a distance by means of electronic equipment, such as ...
terms, a major liability. For mobile phones the major threat is the collection of communications data. This data does not only include information about the time, duration, originator and recipient of the call, but also the identification of the base station where the call was made from, which equals its approximate geographical location. This data is stored with the details of the call and has utmost importance for
traffic analysis Traffic analysis is the process of intercepting and examining messages in order to deduce information from patterns in communication, it can be performed even when the messages are encrypted. In general, the greater the number of messages observe ...
. It is also possible to get greater resolution of a phone's location by combining information from a number of cells surrounding the location, which cells routinely communicate (to agree on the next handoff—for a moving phone) and measuring the
timing advance In the GSM cellular mobile phone standard, timing advance (TA) value corresponds to the length of time a signal takes to reach the base station from a mobile phone. GSM uses TDMA technology in the radio interface to share a single frequency between ...
, a correction for the speed of light in the
GSM The Global System for Mobile Communications (GSM) is a standard developed by the European Telecommunications Standards Institute (ETSI) to describe the protocols for second-generation ( 2G) digital cellular networks used by mobile devices such ...
standard. This additional precision must be specifically enabled by the telephone company—it is not part of the network's ordinary operation.


Internet

In 1995, Peter Garza, a Special Agent with the
Naval Criminal Investigative Service The United States Naval Criminal Investigative Service (NCIS) is the primary law enforcement agency of the U.S. Department of the Navy. Its primary function is to investigate criminal activities involving the Navy and Marine Corps, though its ...
, conducted the first court-ordered Internet wiretap in the United States while investigating Julio Cesar "Griton" Ardita. As technologies emerge, including
VoIP Voice over Internet Protocol (VoIP), also called IP telephony, is a method and group of technologies for the delivery of voice communications and multimedia sessions over Internet Protocol (IP) networks, such as the Internet. The terms Internet t ...
, new questions are raised about law enforcement access to communications (see VoIP recording). In 2004, the
Federal Communications Commission The Federal Communications Commission (FCC) is an independent agency of the United States federal government that regulates communications by radio, television, wire, satellite, and cable across the United States. The FCC maintains jurisdicti ...
was asked to clarify how the
Communications Assistance for Law Enforcement Act The Communications Assistance for Law Enforcement Act (CALEA), also known as the "Digital Telephony Act," is a United States wiretapping law passed in 1994, during the presidency of Bill Clinton (Pub. L. No. 103-414, 108 Stat. 4279, codified at 47 ...
(CALEA) related to Internet service providers. The FCC stated that “providers of broadband Internet access and voice over Internet protocol (“VoIP”) services are regulable as “telecommunications carriers” under the Act.” Those affected by the Act will have to provide access to law enforcement officers who need to monitor or intercept communications transmitted through their networks. As of 2009, warrantless surveillance of internet activity has consistently been upheld in
FISA court The United States Foreign Intelligence Surveillance Court (FISC), also called the FISA Court, is a U.S. federal court established under the Foreign Intelligence Surveillance Act of 1978 (FISA) to oversee requests for surveillance warrants agai ...
. The
Internet Engineering Task Force The Internet Engineering Task Force (IETF) is a standards organization for the Internet and is responsible for the technical standards that make up the Internet protocol suite (TCP/IP). It has no formal membership roster or requirements an ...
has decided not to consider requirements for wiretapping as part of the process for creating and maintaining IETF standards. Typically, illegal Internet wiretapping will be conducted via
Wi-Fi Wi-Fi () is a family of wireless network protocols, based on the IEEE 802.11 family of standards, which are commonly used for local area networking of devices and Internet access, allowing nearby digital devices to exchange data by radio waves ...
connection to someone's internet by cracking the WEP or WPA key, using a tool such as
Aircrack-ng Aircrack-ng is a network software suite consisting of a detector, packet sniffer, WEP and WPA/WPA2-PSK cracker and analysis tool for 802.11 wireless LANs. It works with any wireless network interface controller whose driver supports raw moni ...
or Kismet. Once in, the intruder will rely on a number of potential tactics, for example an
ARP spoofing In computer networking, ARP spoofing, ARP cache poisoning, or ARP poison routing, is a technique by which an attacker sends ( spoofed) Address Resolution Protocol (ARP) messages onto a local area network. Generally, the aim is to associate the a ...
attack which will allow the intruder to view packets in a tool such as
Wireshark Wireshark is a free and open-source packet analyzer. It is used for network troubleshooting, analysis, software and communications protocol development, and education. Originally named Ethereal, the project was renamed Wireshark in May 2006 du ...
or Ettercap.


Mobile phone

The second generation mobile phones (circa 1978 through 1990) could be easily monitored by anyone with a 'scanning all-band receiver' because the system used an analog transmission system-like an ordinary radio transmitter. The third generation digital phones are harder to monitor because they use digitally encoded and compressed transmission. However the government can tap mobile phones with the cooperation of the phone company. It is also possible for organizations with the correct technical equipment to monitor mobile phone communications and decrypt the audio. To the mobile phones in its vicinity, a device called an "
IMSI-catcher An international mobile subscriber identity-catcher, or IMSI-catcher, is a telephone eavesdropping device used for intercepting mobile phone traffic and tracking location data of mobile phone users. Essentially a "fake" mobile tower acting betwe ...
" pretends to be a legitimate base station of the mobile phone network, thus subjecting the communication between the phone and the network to a
man-in-the-middle attack In cryptography and computer security, a man-in-the-middle, monster-in-the-middle, machine-in-the-middle, monkey-in-the-middle, meddler-in-the-middle, manipulator-in-the-middle (MITM), person-in-the-middle (PITM) or adversary-in-the-middle (AiTM) ...
. This is possible because, while the mobile phone has to authenticate itself to the mobile telephone network, the network does not authenticate itself to the phone. There is no defense against IMSI-catcher based eavesdropping, except using end-to-end call encryption; products offering this feature,
secure telephone A secure telephone is a telephone that provides voice security in the form of end-to-end encryption for the telephone call, and in some cases also the mutual authentication of the call parties, protecting them against a man-in-the-middle attack ...
s, are already beginning to appear on the market, though they tend to be expensive and incompatible with each other, which limits their proliferation.


Webtapping

Logging the
IP address An Internet Protocol address (IP address) is a numerical label such as that is connected to a computer network that uses the Internet Protocol for communication.. Updated by . An IP address serves two main functions: network interface ident ...
es of users that access certain websites is commonly called "webtapping". Webtapping is used to monitor websites that presumably contain dangerous or sensitive materials, and the people that access them. Though it is allowed by the
USA PATRIOT Act The USA PATRIOT Act (commonly known as the Patriot Act) was a landmark Act of the United States Congress, signed into law by President George W. Bush. The formal name of the statute is the Uniting and Strengthening America by Providing Appro ...
, it is considered a questionable practice by many citizens.


Telephones recording

In Canada, anyone is legally allowed to record a conversation as long as they are involved in the conversation. The police must apply for a warrant beforehand to legally eavesdrop on the conversation. It must be expected that it will reveal evidence to a crime. State agents are lawfully allowed to record conversations, but to reveal the evidence in court, they must obtain a warrant.


History

Many state legislatures in the United States enacted statutes that prohibited anyone from listening in on telegraph communication. Telephone wiretapping began in the 1890s, following the invention of the telephone recorder, and its
constitutionality Constitutionality is said to be the condition of acting in accordance with an applicable constitution; "Webster On Line" the status of a law, a procedure, or an act's accordance with the laws or set forth in the applicable constitution. When l ...
was established in the
Prohibition Prohibition is the act or practice of forbidding something by law; more particularly the term refers to the banning of the manufacture, storage (whether in barrels or in bottles), transportation, sale, possession, and consumption of alcoholi ...
-Era conviction of bootlegger
Roy Olmstead Roy Olmstead (September 18, 1886 – April 30, 1966) was one of the most successful and best-known bootleggers in the Pacific Northwest region during American Prohibition. A former lieutenant in the Seattle Police Department, he began smug ...
. Wiretapping has also been carried out under most Presidents, sometimes with a lawful warrant since the
Supreme Court A supreme court is the highest court within the hierarchy of courts in most legal jurisdictions. Other descriptions for such courts include court of last resort, apex court, and high (or final) court of appeal. Broadly speaking, the decisions of ...
ruled it constitutional in 1928. On October 19, 1963, U.S. Attorney General Robert F. Kennedy, who served under John F. Kennedy and
Lyndon B. Johnson Lyndon Baines Johnson (; August 27, 1908January 22, 1973), often referred to by his initials LBJ, was an American politician who served as the 36th president of the United States from 1963 to 1969. He had previously served as the 37th vice ...
, authorized the FBI to begin
wiretapping Telephone tapping (also wire tapping or wiretapping in American English) is the monitoring of telephone and Internet-based conversations by a third party, often by covert means. The wire tap received its name because, historically, the monitorin ...
the communications of Rev.
Martin Luther King Jr. Martin Luther King Jr. (born Michael King Jr.; January 15, 1929 – April 4, 1968) was an American Baptist minister and activist, one of the most prominent leaders in the civil rights movement from 1955 until his assassination in 1968 ...
The wiretaps remained in place until April 1965 at his home and June 1966 at his office. The history of voice communication technology began in 1876 with the invention of
Alexander Graham Bell Alexander Graham Bell (, born Alexander Bell; March 3, 1847 – August 2, 1922) was a Scottish-born inventor, scientist and engineer who is credited with patenting the first practical telephone. He also co-founded the American Telephone and T ...
’s telephone. In the 1890s, “law enforcement agencies begin tapping wires on early telephone networks”. Remote voice communications “were carried almost exclusively by circuit-switched systems,” where telephone switches would connect wires to form a continuous circuit and disconnect the wires when the call ended). All other telephone services, such as call forwarding and message taking, were handled by human operators. However, the first computerized telephone switch was developed by Bell Labs in 1965. This got rid of standard wiretapping techniques. In late 1940, the Nazis tried to secure some telephone lines between their forward headquarters in Paris and a variety of Fuhrerbunkers in Germany. They did this by constantly monitoring the voltage on the lines, looking for any sudden drops or increases in voltage indicating that other wiring had been attached. However, the French telephone engineer Robert Keller succeeded in attaching taps without alerting the Nazis. This was done through an isolated rental property just outside of
Paris Paris () is the capital and most populous city of France, with an estimated population of 2,165,423 residents in 2019 in an area of more than 105 km² (41 sq mi), making it the 30th most densely populated city in the world in 2020. Si ...
. Keller's group became known to SOE (and later Allied military intelligence generally) as "Source K". They were later betrayed by a mole within the French resistance, and Keller was murdered in
Bergen-Belsen Bergen-Belsen , or Belsen, was a Nazi concentration camp in what is today Lower Saxony in northern Germany, southwest of the town of Bergen near Celle. Originally established as a prisoner of war camp, in 1943, parts of it became a concentrati ...
in April 1945. In the 1970s,
optical fibers An optical fiber, or optical fibre in Commonwealth English, is a flexible, transparent fiber made by drawing glass ( silica) or plastic to a diameter slightly thicker than that of a human hair. Optical fibers are used most often as a mea ...
become a medium for telecommunications. These fiber lines, “long, thin strands of glass that carry signals via laser light,” are more secure than radio and have become very cheap. From the 1990s to the present, the majority of communications between fixed locations has been achieved by fiber. Because these fiber communications are wired, they're given greater protection under U.S. law. The earliest wiretaps were extra wires — physically inserted to the line between the switchboard and the subscriber — that carried the signal to a pair of earphones and a recorder. Later on, wiretaps were installed at the central office on the frames that held the incoming wires.” Before the
attack on Pearl Harbor The attack on Pearl HarborAlso known as the Battle of Pearl Harbor was a surprise military strike by the Imperial Japanese Navy Air Service upon the United States against the naval base at Pearl Harbor in Honolulu, Territory of Hawaii ...
and the subsequent entry of the United States into
World War II World War II or the Second World War, often abbreviated as WWII or WW2, was a world war that lasted from 1939 to 1945. It involved the World War II by country, vast majority of the world's countries—including all of the great power ...
, the U.S. House of Representatives held hearings on the legality of wiretapping for national defense. Significant legislation and judicial decisions on the legality and constitutionality of wiretapping had taken place years before World War II. However, it took on new urgency at that time of national crisis. The actions of the government regarding wiretapping for the purpose of national defense in the current war on terror have drawn considerable attention and criticism. In the World War II era, the public was also aware of the controversy over the question of the constitutionality and legality of wiretapping. Furthermore, the public was concerned with the decisions that the legislative and judicial branches of the government were making regarding wiretapping. In 1967 the U.S. Supreme Court ruled that wiretapping (or “intercepting communications”) requires a warrant in ''
Katz v. United States ''Katz v. United States'', 389 U.S. 347 (1967), was a landmark decision of the U.S. Supreme Court in which the Court redefined what constitutes a "search" or "seizure" with regard to the protections of the Fourth Amendment to the U.S. Constituti ...
''. In 1968 Congress passed a law that provided warrants for wiretapping in criminal investigations. In 1978 the Foreign Intelligence Surveillance Act (FISA) created a "secret federal court" for issuing wiretap warrants in national security cases. This was in response to findings from the Watergate break-in, which allegedly uncovered a history of presidential operations that had used surveillance on domestic and foreign political organizations. In 1994, Congress approved the Communications Assistance for Law Enforcement Act (CALEA), which “requires telephone companies to be able to install more effective wiretaps. In 2004, the
Federal Bureau of Investigation The Federal Bureau of Investigation (FBI) is the domestic intelligence and security service of the United States and its principal federal law enforcement agency. Operating under the jurisdiction of the United States Department of Justice ...
(FBI),
United States Department of Justice The United States Department of Justice (DOJ), also known as the Justice Department, is a federal executive department of the United States government tasked with the enforcement of federal law and administration of justice in the United Stat ...
(DOJ),
Bureau of Alcohol, Tobacco, Firearms, and Explosives The Bureau of Alcohol, Tobacco, Firearms and Explosives (BATFE), commonly referred to as the ATF, is a domestic law enforcement agency within the United States Department of Justice. Its responsibilities include the investigation and preven ...
(ATF), and
Drug Enforcement Administration The Drug Enforcement Administration (DEA; ) is a United States federal law enforcement agency under the U.S. Department of Justice tasked with combating drug trafficking and distribution within the U.S. It is the lead agency for domestic en ...
(DEA) wanted to expand CALEA requirements to VoIP service.” The
Federal Communications Commission The Federal Communications Commission (FCC) is an independent agency of the United States federal government that regulates communications by radio, television, wire, satellite, and cable across the United States. The FCC maintains jurisdicti ...
(FCC) ruled in August 2005 that “broadband-service providers and interconnected
VoIP Voice over Internet Protocol (VoIP), also called IP telephony, is a method and group of technologies for the delivery of voice communications and multimedia sessions over Internet Protocol (IP) networks, such as the Internet. The terms Internet t ...
providers fall within CALEA’s scope. Currently, instant messaging, web boards and site visits are not included in CALEA’s jurisdiction. In 2007 Congress amended FISA to “allow the government to monitor more communications without a warrant”. In 2008 President George W. Bush expanded the surveillance of internet traffic to and from the U.S. government by signing a national security directive. In the Greek telephone tapping case 2004–2005 more than 100 mobile phone numbers belonging mostly to members of the Greek government, including the
Prime Minister of Greece The prime minister of the Hellenic Republic ( el, Πρωθυπουργός της Ελληνικής Δημοκρατίας, Prothypourgós tis Ellinikís Dimokratías), colloquially referred to as the prime minister of Greece ( el, Πρωθυ� ...
, and top-ranking civil servants were found to have been illegally tapped for a period of at least one year. The Greek government concluded this had been done by a foreign intelligence agency, for security reasons related to the
2004 Olympic Games The 2004 Summer Olympics ( el, Θερινοί Ολυμπιακοί Αγώνες 2004, ), officially the Games of the XXVIII Olympiad ( el, Αγώνες της 28ης Ολυμπιάδας, ) and also known as Athens 2004 ( el, Αθήνα 2004), ...
, by unlawfully activating the lawful interception subsystem of the
Vodafone Greece Vodafone Greece (officially known as Vodafone-Panafon Hellenic Telecommunications Company S.A) is the Greek subsidiary of Vodafone. In 2004 it was the leading mobile operator in Greece. Its headquarters are in Chalandri - one of the northern ...
mobile network. An Italian tapping case which surfaced in November 2007 revealed significant manipulation of the news at the national television company
RAI RAI – Radiotelevisione italiana (; commercially styled as Rai since 2000; known until 1954 as Radio Audizioni Italiane) is the national public broadcasting company of Italy, owned by the Ministry of Economy and Finance. RAI operates many ter ...
. In 2008, ''
Wired ''Wired'' (stylized as ''WIRED'') is a monthly American magazine, published in print and online editions, that focuses on how emerging technologies affect culture, the economy, and politics. Owned by Condé Nast, it is headquartered in San ...
'' and other media reported a
lamplighter A lamplighter is a person employed to light and maintain candle or, later, gas street lights. Very few exist today as most gas street lighting has long been replaced by electric lamps. Function Lights were lit each evening, generally by means ...
disclosed a "Quantico Circuit", a 45-megabit/second DS-3 line linking a carrier's most sensitive network in an affidavit that was the basis for a lawsuit against Verizon Wireless. The circuit provides direct access to all content and all information concerning the origin and termination of telephone calls placed on the Verizon Wireless network as well as the actual content of calls, according to the filing. The most recent case of U.S. wiretapping was the
NSA warrantless surveillance controversy The National Security Agency (NSA) is a national-level intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence (DNI). The NSA is responsible for global monitoring, collectio ...
discovered in December 2005. It aroused much controversy after then President George W. Bush admitted to violating a specific federal statute (FISA) and the warrant requirement of the Fourth Amendment to the
United States Constitution The Constitution of the United States is the supreme law of the United States of America. It superseded the Articles of Confederation, the nation's first constitution, in 1789. Originally comprising seven articles, it delineates the natio ...
. The President claimed his authorization was consistent with other federal statutes ( AUMF) and other provisions of the Constitution, also stating that it was necessary to keep America safe from
terrorism Terrorism, in its broadest sense, is the use of criminal violence to provoke a state of terror or fear, mostly with the intention to achieve political or religious aims. The term is used in this regard primarily to refer to intentional violen ...
and could lead to the capture of notorious terrorists responsible for the
September 11 attacks The September 11 attacks, commonly known as 9/11, were four coordinated suicide terrorist attacks carried out by al-Qaeda against the United States on Tuesday, September 11, 2001. That morning, nineteen terrorists hijacked four commer ...
in 2001. One difference between foreign wiretapping and domestic wiretapping is that, when operating in other countries, “American intelligence services could not place wiretaps on phone lines as easily as they could in the U.S.” Also, domestically, wiretapping is regarded as an extreme investigative technique, whereas outside of the country, the interception of communications is huge. The National Security Agency (NSA) “spends billions of dollars every year intercepting foreign communications from ground bases, ships, airplanes and satellites”. FISA distinguishes between U.S. persons and foreigners, between communications inside and outside the U.S., and between wired and wireless communications. Wired communications within the United States are protected, since intercepting them requires a warrant.


See also

*
Echelon (signals intelligence) ECHELON, originally a secret government code name, is a surveillance program (signals intelligence/SIGINT collection and analysis network) operated by the five signatory states to the UKUSA Security Agreement:Given the 5 dialects that use ...
* Indiscriminate monitoring *
Mass surveillance Mass surveillance is the intricate surveillance of an entire or a substantial fraction of a population in order to monitor that group of citizens. The surveillance is often carried out by local and federal governments or governmental organizati ...
*
Phone hacking Phone hacking is the practice of exploring a mobile device often using computer exploits to analyze everything from the lowest memory and central processing unit levels up to the highest file system and process levels. Modern open source toolin ...
*
Secure telephone A secure telephone is a telephone that provides voice security in the form of end-to-end encryption for the telephone call, and in some cases also the mutual authentication of the call parties, protecting them against a man-in-the-middle attack ...
*
Telephone tapping in the Eastern Bloc Telephone tapping in the Eastern Bloc was a widespread method of the mass surveillance of the population by the secret police. History In the past, telephone tapping was an open and legal practice in certain countries. During martial law in Polan ...


References


External links

*
In Pellicano Case, Lessons in Wiretapping Skills
NY Times ''The New York Times'' (''the Times'', ''NYT'', or the Gray Lady) is a daily newspaper based in New York City with a worldwide readership reported in 2020 to comprise a declining 840,000 paid print subscribers, and a growing 6 million paid ...
May 5, 2008
Lawyers for Guantanamo Inmates Accuse US of Eavesdropping
NY Times ''The New York Times'' (''the Times'', ''NYT'', or the Gray Lady) is a daily newspaper based in New York City with a worldwide readership reported in 2020 to comprise a declining 840,000 paid print subscribers, and a growing 6 million paid ...
May 7, 2008 {{DEFAULTSORT:Telephone Tapping