Wiretapping

[3] In certain jurisdictions, such as Germany and France, courts will accept illegally recorded phone calls without the other party's consent as evidence, but the unauthorized telephone tapping will still be prosecuted.

[12][13] The Fourth Amendment to the United States Constitution protects privacy rights by requiring a warrant to search a person.

[15] In Canadian law, police are allowed to wiretap without the authorization from a court when there is the risk for imminent harm, such as kidnapping or a bomb threat.

595 on scope, objectives and framework of the CMS has struck a balance between national security, online privacy and free speech informed that to take care of the privacy of citizens, lawful interception and monitoring is governed by the Section 5(2) of Indian Telegraph Act, 1885 read with Rule 419A of Indian Telegraph (Amendment) Rules, 2007 wherein oversight mechanism exists in form of review committee under chairmanship of the Cabinet Secretary at Central Government level and Chief Secretary of the State at the state government level.

[23] When telephone exchanges were mechanical, a tap had to be installed by technicians, linking circuits together to route the audio signal from the call.

[25] The noises that some people believe to be telephone taps are simply crosstalk created by the coupling of signals from other phone lines.

This information used to be collected using special equipment known as pen registers and trap and trace devices and U.S. law still refers to it under those names.

The conversation may be monitored (listened to or recorded) covertly by a third party by using an induction coil or a direct electrical connection to the line using a beige box.

As of 2007[update] state-of-the-art equipment operates in the 30–300 GHz range to keep up with telephone technology compared to the 772 kHz systems used in the past.

An in-ear microphone, while involving an additional distorting step by converting the electrical signal to sound and back again, in practice gives better-matched volume.

The FCC stated that “providers of broadband Internet access and voice over Internet protocol (“VoIP”) services are regulable as “telecommunications carriers” under the Act.”[36] Those affected by the Act will have to provide access to law enforcement officers who need to monitor or intercept communications transmitted through their networks.

[37] The Internet Engineering Task Force has decided not to consider requirements for wiretapping as part of the process for creating and maintaining IETF standards.

The first generation mobile phones (c. 1978 through 1990) could be easily monitored by anyone with a 'scanning all-band receiver' because the system used an analog transmission system-like an ordinary radio transmitter.

[42][failed verification] There is no defense against IMSI-catcher based eavesdropping, except using end-to-end call encryption; products offering this feature, secure telephones, are already beginning to appear on the market, though they tend to be expensive and incompatible with each other, which limits their proliferation.

[47] The earliest wiretaps were extra wires — physically inserted to the line between the switchboard and the subscriber — that carried the signal to a pair of earphones and a recorder.

The Greek government concluded this had been done by a foreign intelligence agency, for security reasons related to the 2004 Olympic Games, by unlawfully activating the lawful interception subsystem of the Vodafone Greece mobile network.

An Italian tapping case which surfaced in November 2007 revealed significant manipulation of the news at the national television company RAI.

[49] Before the attack on Pearl Harbor and the subsequent entry of the United States into World War II, the U.S. House of Representatives held hearings on the legality of wiretapping for national defense.

Significant legislation and judicial decisions on the legality and constitutionality of wiretapping had taken place years before World War II.

The actions of the government regarding wiretapping for the purpose of national defense in the current war on terror have drawn considerable attention and criticism.

These fiber lines, "long, thin strands of glass that carry signals via laser light," are more secure than radio and have become very cheap.

[46][47] In 1978, the US Foreign Intelligence Surveillance Act (FISA) created a "secret federal court" for issuing wiretap warrants in national security cases.

This was in response to findings from the Watergate break-in, which allegedly uncovered a history of presidential operations that had used surveillance on domestic and foreign political organizations.

The National Security Agency (NSA) "spends billions of dollars every year intercepting foreign communications from ground bases, ships, airplanes and satellites".

In 1994, Congress approved the Communications Assistance for Law Enforcement Act (CALEA), which “requires telephone companies to be able to install more effective wiretaps.

In 2004, the Federal Bureau of Investigation (FBI), United States Department of Justice (DOJ), Bureau of Alcohol, Tobacco, Firearms, and Explosives (ATF), and Drug Enforcement Administration (DEA) wanted to expand CALEA requirements to VoIP service.”[46][47] The Federal Communications Commission (FCC) ruled in August 2005 that “broadband-service providers and interconnected VoIP providers fall within CALEA's scope.

In 2008 President George W. Bush expanded the surveillance of internet traffic to and from the U.S. government by signing a national security directive.

It aroused much controversy after then President George W. Bush admitted to violating a specific federal statute (FISA) and the warrant requirement of the Fourth Amendment to the United States Constitution.

The President claimed his authorization was consistent with other federal statutes (AUMF) and other provisions of the Constitution, also stating that it was necessary to keep America safe from terrorism and could lead to the capture of notorious terrorists responsible for the September 11 attacks in 2001.

[citation needed][56] In 2008, Wired and other media reported a lamplighter disclosed a "Quantico Circuit", a 45-megabit/second DS-3 line linking a carrier's most sensitive network in an affidavit that was the basis for a lawsuit against Verizon Wireless.

Telephone line control device "Jitka", used in late 1960s by Czechoslovakian StB to signal line occupancy, and connect a recorder
A telephone recording adapter (in-line tap). The phone jack connects to the wall socket while the phone being monitored is connected to the adapter's socket. The audio plug connects to the recording device (computer, tape recorder, etc.).
CrimethInc. sticker on a telephone warning users of phone tapping by the U.S. government