CINXE.COM

Wiretapping - Wikipedia

<!DOCTYPE html> <html class="client-nojs vector-feature-language-in-header-enabled vector-feature-language-in-main-page-header-disabled vector-feature-sticky-header-disabled vector-feature-page-tools-pinned-disabled vector-feature-toc-pinned-clientpref-1 vector-feature-main-menu-pinned-disabled vector-feature-limited-width-clientpref-1 vector-feature-limited-width-content-enabled vector-feature-custom-font-size-clientpref-1 vector-feature-appearance-pinned-clientpref-1 vector-feature-night-mode-enabled skin-theme-clientpref-day vector-toc-available" lang="en" dir="ltr"> <head> <meta charset="UTF-8"> <title>Wiretapping - Wikipedia</title> <script>(function(){var className="client-js vector-feature-language-in-header-enabled vector-feature-language-in-main-page-header-disabled vector-feature-sticky-header-disabled vector-feature-page-tools-pinned-disabled vector-feature-toc-pinned-clientpref-1 vector-feature-main-menu-pinned-disabled vector-feature-limited-width-clientpref-1 vector-feature-limited-width-content-enabled vector-feature-custom-font-size-clientpref-1 vector-feature-appearance-pinned-clientpref-1 vector-feature-night-mode-enabled skin-theme-clientpref-day vector-toc-available";var cookie=document.cookie.match(/(?:^|; )enwikimwclientpreferences=([^;]+)/);if(cookie){cookie[1].split('%2C').forEach(function(pref){className=className.replace(new RegExp('(^| )'+pref.replace(/-clientpref-\w+$|[^\w-]+/g,'')+'-clientpref-\\w+( |$)'),'$1'+pref+'$2');});}document.documentElement.className=className;}());RLCONF={"wgBreakFrames":false,"wgSeparatorTransformTable":["",""],"wgDigitTransformTable":["",""],"wgDefaultDateFormat":"dmy", "wgMonthNames":["","January","February","March","April","May","June","July","August","September","October","November","December"],"wgRequestId":"5922ae18-6c1b-448c-83de-dbedef9c23fc","wgCanonicalNamespace":"","wgCanonicalSpecialPageName":false,"wgNamespaceNumber":0,"wgPageName":"Wiretapping","wgTitle":"Wiretapping","wgCurRevisionId":1252396711,"wgRevisionId":1252396711,"wgArticleId":91221,"wgIsArticle":true,"wgIsRedirect":false,"wgAction":"view","wgUserName":null,"wgUserGroups":["*"],"wgCategories":["Pages using cite court with unknown parameters","Articles with short description","Short description matches Wikidata","All articles with unsourced statements","Articles with unsourced statements from March 2019","Articles containing potentially dated statements from 2007","All articles containing potentially dated statements","All articles with failed verification","Articles with failed verification from November 2019","Telephone tapping"],"wgPageViewLanguage":"en","wgPageContentLanguage" :"en","wgPageContentModel":"wikitext","wgRelevantPageName":"Wiretapping","wgRelevantArticleId":91221,"wgIsProbablyEditable":true,"wgRelevantPageIsProbablyEditable":true,"wgRestrictionEdit":[],"wgRestrictionMove":[],"wgRedirectedFrom":"Telephone_tapping","wgNoticeProject":"wikipedia","wgCiteReferencePreviewsActive":false,"wgFlaggedRevsParams":{"tags":{"status":{"levels":1}}},"wgMediaViewerOnClick":true,"wgMediaViewerEnabledByDefault":true,"wgPopupsFlags":0,"wgVisualEditor":{"pageLanguageCode":"en","pageLanguageDir":"ltr","pageVariantFallbacks":"en"},"wgMFDisplayWikibaseDescriptions":{"search":true,"watchlist":true,"tagline":false,"nearby":true},"wgWMESchemaEditAttemptStepOversample":false,"wgWMEPageLength":50000,"wgInternalRedirectTargetUrl":"/wiki/Wiretapping","wgRelatedArticlesCompat":[],"wgCentralAuthMobileDomain":false,"wgEditSubmitButtonLabelPublish":true,"wgULSPosition":"interlanguage","wgULSisCompactLinksEnabled":false,"wgVector2022LanguageInHeader":true, "wgULSisLanguageSelectorEmpty":false,"wgWikibaseItemId":"Q1067529","wgCheckUserClientHintsHeadersJsApi":["brands","architecture","bitness","fullVersionList","mobile","model","platform","platformVersion"],"GEHomepageSuggestedEditsEnableTopics":true,"wgGETopicsMatchModeEnabled":false,"wgGEStructuredTaskRejectionReasonTextInputEnabled":false,"wgGELevelingUpEnabledForUser":false};RLSTATE={"ext.globalCssJs.user.styles":"ready","site.styles":"ready","user.styles":"ready","ext.globalCssJs.user":"ready","user":"ready","user.options":"loading","ext.cite.styles":"ready","skins.vector.search.codex.styles":"ready","skins.vector.styles":"ready","skins.vector.icons":"ready","jquery.makeCollapsible.styles":"ready","ext.wikimediamessages.styles":"ready","ext.visualEditor.desktopArticleTarget.noscript":"ready","ext.uls.interlanguage":"ready","wikibase.client.init":"ready","ext.wikimediaBadges":"ready"};RLPAGEMODULES=["mediawiki.action.view.redirect","ext.cite.ux-enhancements","mediawiki.page.media", "ext.scribunto.logs","site","mediawiki.page.ready","jquery.makeCollapsible","mediawiki.toc","skins.vector.js","ext.centralNotice.geoIP","ext.centralNotice.startUp","ext.gadget.ReferenceTooltips","ext.gadget.switcher","ext.urlShortener.toolbar","ext.centralauth.centralautologin","mmv.bootstrap","ext.popups","ext.visualEditor.desktopArticleTarget.init","ext.visualEditor.targetLoader","ext.echo.centralauth","ext.eventLogging","ext.wikimediaEvents","ext.navigationTiming","ext.uls.interface","ext.cx.eventlogging.campaigns","ext.cx.uls.quick.actions","wikibase.client.vector-2022","ext.checkUser.clientHints","ext.growthExperiments.SuggestedEditSession","wikibase.sidebar.tracking"];</script> <script>(RLQ=window.RLQ||[]).push(function(){mw.loader.impl(function(){return["user.options@12s5i",function($,jQuery,require,module){mw.user.tokens.set({"patrolToken":"+\\","watchToken":"+\\","csrfToken":"+\\"}); }];});});</script> <link rel="stylesheet" href="/w/load.php?lang=en&amp;modules=ext.cite.styles%7Cext.uls.interlanguage%7Cext.visualEditor.desktopArticleTarget.noscript%7Cext.wikimediaBadges%7Cext.wikimediamessages.styles%7Cjquery.makeCollapsible.styles%7Cskins.vector.icons%2Cstyles%7Cskins.vector.search.codex.styles%7Cwikibase.client.init&amp;only=styles&amp;skin=vector-2022"> <script async="" src="/w/load.php?lang=en&amp;modules=startup&amp;only=scripts&amp;raw=1&amp;skin=vector-2022"></script> <meta name="ResourceLoaderDynamicStyles" content=""> <link rel="stylesheet" href="/w/load.php?lang=en&amp;modules=site.styles&amp;only=styles&amp;skin=vector-2022"> <meta name="generator" content="MediaWiki 1.44.0-wmf.4"> <meta name="referrer" content="origin"> <meta name="referrer" content="origin-when-cross-origin"> <meta name="robots" content="max-image-preview:standard"> <meta name="format-detection" content="telephone=no"> <meta name="viewport" content="width=1120"> <meta property="og:title" content="Wiretapping - Wikipedia"> <meta property="og:type" content="website"> <link rel="preconnect" href="//upload.wikimedia.org"> <link rel="alternate" media="only screen and (max-width: 640px)" href="//en.m.wikipedia.org/wiki/Wiretapping"> <link rel="alternate" type="application/x-wiki" title="Edit this page" href="/w/index.php?title=Wiretapping&amp;action=edit"> <link rel="apple-touch-icon" href="/static/apple-touch/wikipedia.png"> <link rel="icon" href="/static/favicon/wikipedia.ico"> <link rel="search" type="application/opensearchdescription+xml" href="/w/rest.php/v1/search" title="Wikipedia (en)"> <link rel="EditURI" type="application/rsd+xml" href="//en.wikipedia.org/w/api.php?action=rsd"> <link rel="canonical" href="https://en.wikipedia.org/wiki/Wiretapping"> <link rel="license" href="https://creativecommons.org/licenses/by-sa/4.0/deed.en"> <link rel="alternate" type="application/atom+xml" title="Wikipedia Atom feed" href="/w/index.php?title=Special:RecentChanges&amp;feed=atom"> <link rel="dns-prefetch" href="//meta.wikimedia.org" /> <link rel="dns-prefetch" href="//login.wikimedia.org"> </head> <body class="skin--responsive skin-vector skin-vector-search-vue mediawiki ltr sitedir-ltr mw-hide-empty-elt ns-0 ns-subject mw-editable page-Wiretapping rootpage-Wiretapping skin-vector-2022 action-view"><a class="mw-jump-link" href="#bodyContent">Jump to content</a> <div class="vector-header-container"> <header class="vector-header mw-header"> <div class="vector-header-start"> <nav class="vector-main-menu-landmark" aria-label="Site"> <div id="vector-main-menu-dropdown" class="vector-dropdown vector-main-menu-dropdown vector-button-flush-left vector-button-flush-right" > <input type="checkbox" id="vector-main-menu-dropdown-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-main-menu-dropdown" class="vector-dropdown-checkbox " aria-label="Main menu" > <label id="vector-main-menu-dropdown-label" for="vector-main-menu-dropdown-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only " aria-hidden="true" ><span class="vector-icon mw-ui-icon-menu mw-ui-icon-wikimedia-menu"></span> <span class="vector-dropdown-label-text">Main menu</span> </label> <div class="vector-dropdown-content"> <div id="vector-main-menu-unpinned-container" class="vector-unpinned-container"> <div id="vector-main-menu" class="vector-main-menu vector-pinnable-element"> <div class="vector-pinnable-header vector-main-menu-pinnable-header vector-pinnable-header-unpinned" data-feature-name="main-menu-pinned" data-pinnable-element-id="vector-main-menu" data-pinned-container-id="vector-main-menu-pinned-container" data-unpinned-container-id="vector-main-menu-unpinned-container" > <div class="vector-pinnable-header-label">Main menu</div> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-pin-button" data-event-name="pinnable-header.vector-main-menu.pin">move to sidebar</button> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-unpin-button" data-event-name="pinnable-header.vector-main-menu.unpin">hide</button> </div> <div id="p-navigation" class="vector-menu mw-portlet mw-portlet-navigation" > <div class="vector-menu-heading"> Navigation </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="n-mainpage-description" class="mw-list-item"><a href="/wiki/Main_Page" title="Visit the main page [z]" accesskey="z"><span>Main page</span></a></li><li id="n-contents" class="mw-list-item"><a href="/wiki/Wikipedia:Contents" title="Guides to browsing Wikipedia"><span>Contents</span></a></li><li id="n-currentevents" class="mw-list-item"><a href="/wiki/Portal:Current_events" title="Articles related to current events"><span>Current events</span></a></li><li id="n-randompage" class="mw-list-item"><a href="/wiki/Special:Random" title="Visit a randomly selected article [x]" accesskey="x"><span>Random article</span></a></li><li id="n-aboutsite" class="mw-list-item"><a href="/wiki/Wikipedia:About" title="Learn about Wikipedia and how it works"><span>About Wikipedia</span></a></li><li id="n-contactpage" class="mw-list-item"><a href="//en.wikipedia.org/wiki/Wikipedia:Contact_us" title="How to contact Wikipedia"><span>Contact us</span></a></li> </ul> </div> </div> <div id="p-interaction" class="vector-menu mw-portlet mw-portlet-interaction" > <div class="vector-menu-heading"> Contribute </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="n-help" class="mw-list-item"><a href="/wiki/Help:Contents" title="Guidance on how to use and edit Wikipedia"><span>Help</span></a></li><li id="n-introduction" class="mw-list-item"><a href="/wiki/Help:Introduction" title="Learn how to edit Wikipedia"><span>Learn to edit</span></a></li><li id="n-portal" class="mw-list-item"><a href="/wiki/Wikipedia:Community_portal" title="The hub for editors"><span>Community portal</span></a></li><li id="n-recentchanges" class="mw-list-item"><a href="/wiki/Special:RecentChanges" title="A list of recent changes to Wikipedia [r]" accesskey="r"><span>Recent changes</span></a></li><li id="n-upload" class="mw-list-item"><a href="/wiki/Wikipedia:File_upload_wizard" title="Add images or other media for use on Wikipedia"><span>Upload file</span></a></li> </ul> </div> </div> </div> </div> </div> </div> </nav> <a href="/wiki/Main_Page" class="mw-logo"> <img class="mw-logo-icon" src="/static/images/icons/wikipedia.png" alt="" aria-hidden="true" height="50" width="50"> <span class="mw-logo-container skin-invert"> <img class="mw-logo-wordmark" alt="Wikipedia" src="/static/images/mobile/copyright/wikipedia-wordmark-en.svg" style="width: 7.5em; height: 1.125em;"> <img class="mw-logo-tagline" alt="The Free Encyclopedia" src="/static/images/mobile/copyright/wikipedia-tagline-en.svg" width="117" height="13" style="width: 7.3125em; height: 0.8125em;"> </span> </a> </div> <div class="vector-header-end"> <div id="p-search" role="search" class="vector-search-box-vue vector-search-box-collapses vector-search-box-show-thumbnail vector-search-box-auto-expand-width vector-search-box"> <a href="/wiki/Special:Search" class="cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only search-toggle" title="Search Wikipedia [f]" accesskey="f"><span class="vector-icon mw-ui-icon-search mw-ui-icon-wikimedia-search"></span> <span>Search</span> </a> <div class="vector-typeahead-search-container"> <div class="cdx-typeahead-search cdx-typeahead-search--show-thumbnail cdx-typeahead-search--auto-expand-width"> <form action="/w/index.php" id="searchform" class="cdx-search-input cdx-search-input--has-end-button"> <div id="simpleSearch" class="cdx-search-input__input-wrapper" data-search-loc="header-moved"> <div class="cdx-text-input cdx-text-input--has-start-icon"> <input class="cdx-text-input__input" type="search" name="search" placeholder="Search Wikipedia" aria-label="Search Wikipedia" autocapitalize="sentences" title="Search Wikipedia [f]" accesskey="f" id="searchInput" > <span class="cdx-text-input__icon cdx-text-input__start-icon"></span> </div> <input type="hidden" name="title" value="Special:Search"> </div> <button class="cdx-button cdx-search-input__end-button">Search</button> </form> </div> </div> </div> <nav class="vector-user-links vector-user-links-wide" aria-label="Personal tools"> <div class="vector-user-links-main"> <div id="p-vector-user-menu-preferences" class="vector-menu mw-portlet emptyPortlet" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> </ul> </div> </div> <div id="p-vector-user-menu-userpage" class="vector-menu mw-portlet emptyPortlet" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> </ul> </div> </div> <nav class="vector-appearance-landmark" aria-label="Appearance"> <div id="vector-appearance-dropdown" class="vector-dropdown " title="Change the appearance of the page&#039;s font size, width, and color" > <input type="checkbox" id="vector-appearance-dropdown-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-appearance-dropdown" class="vector-dropdown-checkbox " aria-label="Appearance" > <label id="vector-appearance-dropdown-label" for="vector-appearance-dropdown-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only " aria-hidden="true" ><span class="vector-icon mw-ui-icon-appearance mw-ui-icon-wikimedia-appearance"></span> <span class="vector-dropdown-label-text">Appearance</span> </label> <div class="vector-dropdown-content"> <div id="vector-appearance-unpinned-container" class="vector-unpinned-container"> </div> </div> </div> </nav> <div id="p-vector-user-menu-notifications" class="vector-menu mw-portlet emptyPortlet" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> </ul> </div> </div> <div id="p-vector-user-menu-overflow" class="vector-menu mw-portlet" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="pt-sitesupport-2" class="user-links-collapsible-item mw-list-item user-links-collapsible-item"><a data-mw="interface" href="https://donate.wikimedia.org/wiki/Special:FundraiserRedirector?utm_source=donate&amp;utm_medium=sidebar&amp;utm_campaign=C13_en.wikipedia.org&amp;uselang=en" class=""><span>Donate</span></a> </li> <li id="pt-createaccount-2" class="user-links-collapsible-item mw-list-item user-links-collapsible-item"><a data-mw="interface" href="/w/index.php?title=Special:CreateAccount&amp;returnto=Wiretapping" title="You are encouraged to create an account and log in; however, it is not mandatory" class=""><span>Create account</span></a> </li> <li id="pt-login-2" class="user-links-collapsible-item mw-list-item user-links-collapsible-item"><a data-mw="interface" href="/w/index.php?title=Special:UserLogin&amp;returnto=Wiretapping" title="You&#039;re encouraged to log in; however, it&#039;s not mandatory. [o]" accesskey="o" class=""><span>Log in</span></a> </li> </ul> </div> </div> </div> <div id="vector-user-links-dropdown" class="vector-dropdown vector-user-menu vector-button-flush-right vector-user-menu-logged-out" title="Log in and more options" > <input type="checkbox" id="vector-user-links-dropdown-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-user-links-dropdown" class="vector-dropdown-checkbox " aria-label="Personal tools" > <label id="vector-user-links-dropdown-label" for="vector-user-links-dropdown-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only " aria-hidden="true" ><span class="vector-icon mw-ui-icon-ellipsis mw-ui-icon-wikimedia-ellipsis"></span> <span class="vector-dropdown-label-text">Personal tools</span> </label> <div class="vector-dropdown-content"> <div id="p-personal" class="vector-menu mw-portlet mw-portlet-personal user-links-collapsible-item" title="User menu" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="pt-sitesupport" class="user-links-collapsible-item mw-list-item"><a href="https://donate.wikimedia.org/wiki/Special:FundraiserRedirector?utm_source=donate&amp;utm_medium=sidebar&amp;utm_campaign=C13_en.wikipedia.org&amp;uselang=en"><span>Donate</span></a></li><li id="pt-createaccount" class="user-links-collapsible-item mw-list-item"><a href="/w/index.php?title=Special:CreateAccount&amp;returnto=Wiretapping" title="You are encouraged to create an account and log in; however, it is not mandatory"><span class="vector-icon mw-ui-icon-userAdd mw-ui-icon-wikimedia-userAdd"></span> <span>Create account</span></a></li><li id="pt-login" class="user-links-collapsible-item mw-list-item"><a href="/w/index.php?title=Special:UserLogin&amp;returnto=Wiretapping" title="You&#039;re encouraged to log in; however, it&#039;s not mandatory. [o]" accesskey="o"><span class="vector-icon mw-ui-icon-logIn mw-ui-icon-wikimedia-logIn"></span> <span>Log in</span></a></li> </ul> </div> </div> <div id="p-user-menu-anon-editor" class="vector-menu mw-portlet mw-portlet-user-menu-anon-editor" > <div class="vector-menu-heading"> Pages for logged out editors <a href="/wiki/Help:Introduction" aria-label="Learn more about editing"><span>learn more</span></a> </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="pt-anoncontribs" class="mw-list-item"><a href="/wiki/Special:MyContributions" title="A list of edits made from this IP address [y]" accesskey="y"><span>Contributions</span></a></li><li id="pt-anontalk" class="mw-list-item"><a href="/wiki/Special:MyTalk" title="Discussion about edits from this IP address [n]" accesskey="n"><span>Talk</span></a></li> </ul> </div> </div> </div> </div> </nav> </div> </header> </div> <div class="mw-page-container"> <div class="mw-page-container-inner"> <div class="vector-sitenotice-container"> <div id="siteNotice"><!-- CentralNotice --></div> </div> <div class="vector-column-start"> <div class="vector-main-menu-container"> <div id="mw-navigation"> <nav id="mw-panel" class="vector-main-menu-landmark" aria-label="Site"> <div id="vector-main-menu-pinned-container" class="vector-pinned-container"> </div> </nav> </div> </div> <div class="vector-sticky-pinned-container"> <nav id="mw-panel-toc" aria-label="Contents" data-event-name="ui.sidebar-toc" class="mw-table-of-contents-container vector-toc-landmark"> <div id="vector-toc-pinned-container" class="vector-pinned-container"> <div id="vector-toc" class="vector-toc vector-pinnable-element"> <div class="vector-pinnable-header vector-toc-pinnable-header vector-pinnable-header-pinned" data-feature-name="toc-pinned" data-pinnable-element-id="vector-toc" > <h2 class="vector-pinnable-header-label">Contents</h2> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-pin-button" data-event-name="pinnable-header.vector-toc.pin">move to sidebar</button> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-unpin-button" data-event-name="pinnable-header.vector-toc.unpin">hide</button> </div> <ul class="vector-toc-contents" id="mw-panel-toc-list"> <li id="toc-mw-content-text" class="vector-toc-list-item vector-toc-level-1"> <a href="#" class="vector-toc-link"> <div class="vector-toc-text">(Top)</div> </a> </li> <li id="toc-Legal_status" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#Legal_status"> <div class="vector-toc-text"> <span class="vector-toc-numb">1</span> <span>Legal status</span> </div> </a> <button aria-controls="toc-Legal_status-sublist" class="cdx-button cdx-button--weight-quiet cdx-button--icon-only vector-toc-toggle"> <span class="vector-icon mw-ui-icon-wikimedia-expand"></span> <span>Toggle Legal status subsection</span> </button> <ul id="toc-Legal_status-sublist" class="vector-toc-list"> <li id="toc-United_States" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#United_States"> <div class="vector-toc-text"> <span class="vector-toc-numb">1.1</span> <span>United States</span> </div> </a> <ul id="toc-United_States-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Canada" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Canada"> <div class="vector-toc-text"> <span class="vector-toc-numb">1.2</span> <span>Canada</span> </div> </a> <ul id="toc-Canada-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-India" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#India"> <div class="vector-toc-text"> <span class="vector-toc-numb">1.3</span> <span>India</span> </div> </a> <ul id="toc-India-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Pakistan" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Pakistan"> <div class="vector-toc-text"> <span class="vector-toc-numb">1.4</span> <span>Pakistan</span> </div> </a> <ul id="toc-Pakistan-sublist" class="vector-toc-list"> </ul> </li> </ul> </li> <li id="toc-Methods" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#Methods"> <div class="vector-toc-text"> <span class="vector-toc-numb">2</span> <span>Methods</span> </div> </a> <button aria-controls="toc-Methods-sublist" class="cdx-button cdx-button--weight-quiet cdx-button--icon-only vector-toc-toggle"> <span class="vector-icon mw-ui-icon-wikimedia-expand"></span> <span>Toggle Methods subsection</span> </button> <ul id="toc-Methods-sublist" class="vector-toc-list"> <li id="toc-Official_use" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Official_use"> <div class="vector-toc-text"> <span class="vector-toc-numb">2.1</span> <span>Official use</span> </div> </a> <ul id="toc-Official_use-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Non-official_use" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Non-official_use"> <div class="vector-toc-text"> <span class="vector-toc-numb">2.2</span> <span>Non-official use</span> </div> </a> <ul id="toc-Non-official_use-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Location_data" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Location_data"> <div class="vector-toc-text"> <span class="vector-toc-numb">2.3</span> <span>Location data</span> </div> </a> <ul id="toc-Location_data-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Internet" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Internet"> <div class="vector-toc-text"> <span class="vector-toc-numb">2.4</span> <span>Internet</span> </div> </a> <ul id="toc-Internet-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Mobile_phone" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Mobile_phone"> <div class="vector-toc-text"> <span class="vector-toc-numb">2.5</span> <span>Mobile phone</span> </div> </a> <ul id="toc-Mobile_phone-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Webtapping" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Webtapping"> <div class="vector-toc-text"> <span class="vector-toc-numb">2.6</span> <span>Webtapping</span> </div> </a> <ul id="toc-Webtapping-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Telephone_recording" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Telephone_recording"> <div class="vector-toc-text"> <span class="vector-toc-numb">2.7</span> <span>Telephone recording</span> </div> </a> <ul id="toc-Telephone_recording-sublist" class="vector-toc-list"> </ul> </li> </ul> </li> <li id="toc-History" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#History"> <div class="vector-toc-text"> <span class="vector-toc-numb">3</span> <span>History</span> </div> </a> <button aria-controls="toc-History-sublist" class="cdx-button cdx-button--weight-quiet cdx-button--icon-only vector-toc-toggle"> <span class="vector-icon mw-ui-icon-wikimedia-expand"></span> <span>Toggle History subsection</span> </button> <ul id="toc-History-sublist" class="vector-toc-list"> <li id="toc-Greece" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Greece"> <div class="vector-toc-text"> <span class="vector-toc-numb">3.1</span> <span>Greece</span> </div> </a> <ul id="toc-Greece-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-United_States_2" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#United_States_2"> <div class="vector-toc-text"> <span class="vector-toc-numb">3.2</span> <span>United States</span> </div> </a> <ul id="toc-United_States_2-sublist" class="vector-toc-list"> </ul> </li> </ul> </li> <li id="toc-See_also" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#See_also"> <div class="vector-toc-text"> <span class="vector-toc-numb">4</span> <span>See also</span> </div> </a> <ul id="toc-See_also-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-References" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#References"> <div class="vector-toc-text"> <span class="vector-toc-numb">5</span> <span>References</span> </div> </a> <ul id="toc-References-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-External_links" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#External_links"> <div class="vector-toc-text"> <span class="vector-toc-numb">6</span> <span>External links</span> </div> </a> <ul id="toc-External_links-sublist" class="vector-toc-list"> </ul> </li> </ul> </div> </div> </nav> </div> </div> <div class="mw-content-container"> <main id="content" class="mw-body"> <header class="mw-body-header vector-page-titlebar"> <nav aria-label="Contents" class="vector-toc-landmark"> <div id="vector-page-titlebar-toc" class="vector-dropdown vector-page-titlebar-toc vector-button-flush-left" > <input type="checkbox" id="vector-page-titlebar-toc-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-page-titlebar-toc" class="vector-dropdown-checkbox " aria-label="Toggle the table of contents" > <label id="vector-page-titlebar-toc-label" for="vector-page-titlebar-toc-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only " aria-hidden="true" ><span class="vector-icon mw-ui-icon-listBullet mw-ui-icon-wikimedia-listBullet"></span> <span class="vector-dropdown-label-text">Toggle the table of contents</span> </label> <div class="vector-dropdown-content"> <div id="vector-page-titlebar-toc-unpinned-container" class="vector-unpinned-container"> </div> </div> </div> </nav> <h1 id="firstHeading" class="firstHeading mw-first-heading"><span class="mw-page-title-main">Wiretapping</span></h1> <div id="p-lang-btn" class="vector-dropdown mw-portlet mw-portlet-lang" > <input type="checkbox" id="p-lang-btn-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-p-lang-btn" class="vector-dropdown-checkbox mw-interlanguage-selector" aria-label="Go to an article in another language. Available in 27 languages" > <label id="p-lang-btn-label" for="p-lang-btn-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--action-progressive mw-portlet-lang-heading-27" aria-hidden="true" ><span class="vector-icon mw-ui-icon-language-progressive mw-ui-icon-wikimedia-language-progressive"></span> <span class="vector-dropdown-label-text">27 languages</span> </label> <div class="vector-dropdown-content"> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li class="interlanguage-link interwiki-ar mw-list-item"><a href="https://ar.wikipedia.org/wiki/%D8%AA%D9%86%D8%B5%D8%AA_%D8%B9%D8%A8%D8%B1_%D8%A7%D9%84%D9%87%D8%A7%D8%AA%D9%81" title="تنصت عبر الهاتف – Arabic" lang="ar" hreflang="ar" data-title="تنصت عبر الهاتف" data-language-autonym="العربية" data-language-local-name="Arabic" class="interlanguage-link-target"><span>العربية</span></a></li><li class="interlanguage-link interwiki-az mw-list-item"><a href="https://az.wikipedia.org/wiki/Telefon_dinl%C9%99m%C9%99" title="Telefon dinləmə – Azerbaijani" lang="az" hreflang="az" data-title="Telefon dinləmə" data-language-autonym="Azərbaycanca" data-language-local-name="Azerbaijani" class="interlanguage-link-target"><span>Azərbaycanca</span></a></li><li class="interlanguage-link interwiki-ca mw-list-item"><a href="https://ca.wikipedia.org/wiki/Escolta_telef%C3%B2nica" title="Escolta telefònica – Catalan" lang="ca" hreflang="ca" data-title="Escolta telefònica" data-language-autonym="Català" data-language-local-name="Catalan" class="interlanguage-link-target"><span>Català</span></a></li><li class="interlanguage-link interwiki-cs mw-list-item"><a href="https://cs.wikipedia.org/wiki/Odposlech_telefonn%C3%ADho_hovoru" title="Odposlech telefonního hovoru – Czech" lang="cs" hreflang="cs" data-title="Odposlech telefonního hovoru" data-language-autonym="Čeština" data-language-local-name="Czech" class="interlanguage-link-target"><span>Čeština</span></a></li><li class="interlanguage-link interwiki-da mw-list-item"><a href="https://da.wikipedia.org/wiki/Telefonaflytning" title="Telefonaflytning – Danish" lang="da" hreflang="da" data-title="Telefonaflytning" data-language-autonym="Dansk" data-language-local-name="Danish" class="interlanguage-link-target"><span>Dansk</span></a></li><li class="interlanguage-link interwiki-de mw-list-item"><a href="https://de.wikipedia.org/wiki/Telekommunikations%C3%BCberwachung" title="Telekommunikationsüberwachung – German" lang="de" hreflang="de" data-title="Telekommunikationsüberwachung" data-language-autonym="Deutsch" data-language-local-name="German" class="interlanguage-link-target"><span>Deutsch</span></a></li><li class="interlanguage-link interwiki-es mw-list-item"><a href="https://es.wikipedia.org/wiki/Escucha_telef%C3%B3nica" title="Escucha telefónica – Spanish" lang="es" hreflang="es" data-title="Escucha telefónica" data-language-autonym="Español" data-language-local-name="Spanish" class="interlanguage-link-target"><span>Español</span></a></li><li class="interlanguage-link interwiki-eu mw-list-item"><a href="https://eu.wikipedia.org/wiki/Telefono-entzuketa" title="Telefono-entzuketa – Basque" lang="eu" hreflang="eu" data-title="Telefono-entzuketa" data-language-autonym="Euskara" data-language-local-name="Basque" class="interlanguage-link-target"><span>Euskara</span></a></li><li class="interlanguage-link interwiki-fa mw-list-item"><a href="https://fa.wikipedia.org/wiki/%D8%B4%D9%86%D9%88%D8%AF_%D8%A7%D8%B1%D8%AA%D8%A8%D8%A7%D8%B7%D8%A7%D8%AA_%D9%85%D8%AE%D8%A7%D8%A8%D8%B1%D8%A7%D8%AA%DB%8C" title="شنود ارتباطات مخابراتی – Persian" lang="fa" hreflang="fa" data-title="شنود ارتباطات مخابراتی" data-language-autonym="فارسی" data-language-local-name="Persian" class="interlanguage-link-target"><span>فارسی</span></a></li><li class="interlanguage-link interwiki-fr mw-list-item"><a href="https://fr.wikipedia.org/wiki/%C3%89coute_(surveillance)" title="Écoute (surveillance) – French" lang="fr" hreflang="fr" data-title="Écoute (surveillance)" data-language-autonym="Français" data-language-local-name="French" class="interlanguage-link-target"><span>Français</span></a></li><li class="interlanguage-link interwiki-ko mw-list-item"><a href="https://ko.wikipedia.org/wiki/%EB%8F%84%EC%B2%AD" title="도청 – Korean" lang="ko" hreflang="ko" data-title="도청" data-language-autonym="한국어" data-language-local-name="Korean" class="interlanguage-link-target"><span>한국어</span></a></li><li class="interlanguage-link interwiki-id mw-list-item"><a href="https://id.wikipedia.org/wiki/Penyadapan_telepon" title="Penyadapan telepon – Indonesian" lang="id" hreflang="id" data-title="Penyadapan telepon" data-language-autonym="Bahasa Indonesia" data-language-local-name="Indonesian" class="interlanguage-link-target"><span>Bahasa Indonesia</span></a></li><li class="interlanguage-link interwiki-it mw-list-item"><a href="https://it.wikipedia.org/wiki/Intercettazione" title="Intercettazione – Italian" lang="it" hreflang="it" data-title="Intercettazione" data-language-autonym="Italiano" data-language-local-name="Italian" class="interlanguage-link-target"><span>Italiano</span></a></li><li class="interlanguage-link interwiki-hu mw-list-item"><a href="https://hu.wikipedia.org/wiki/Lehallgat%C3%A1s" title="Lehallgatás – Hungarian" lang="hu" hreflang="hu" data-title="Lehallgatás" data-language-autonym="Magyar" data-language-local-name="Hungarian" class="interlanguage-link-target"><span>Magyar</span></a></li><li class="interlanguage-link interwiki-ms mw-list-item"><a href="https://ms.wikipedia.org/wiki/Penyadapan_telefon" title="Penyadapan telefon – Malay" lang="ms" hreflang="ms" data-title="Penyadapan telefon" data-language-autonym="Bahasa Melayu" data-language-local-name="Malay" class="interlanguage-link-target"><span>Bahasa Melayu</span></a></li><li class="interlanguage-link interwiki-nl mw-list-item"><a href="https://nl.wikipedia.org/wiki/Telefoontap" title="Telefoontap – Dutch" lang="nl" hreflang="nl" data-title="Telefoontap" data-language-autonym="Nederlands" data-language-local-name="Dutch" class="interlanguage-link-target"><span>Nederlands</span></a></li><li class="interlanguage-link interwiki-no mw-list-item"><a href="https://no.wikipedia.org/wiki/Telefonavlytning" title="Telefonavlytning – Norwegian Bokmål" lang="nb" hreflang="nb" data-title="Telefonavlytning" data-language-autonym="Norsk bokmål" data-language-local-name="Norwegian Bokmål" class="interlanguage-link-target"><span>Norsk bokmål</span></a></li><li class="interlanguage-link interwiki-pl mw-list-item"><a href="https://pl.wikipedia.org/wiki/Pods%C5%82uch_telefoniczny" title="Podsłuch telefoniczny – Polish" lang="pl" hreflang="pl" data-title="Podsłuch telefoniczny" data-language-autonym="Polski" data-language-local-name="Polish" class="interlanguage-link-target"><span>Polski</span></a></li><li class="interlanguage-link interwiki-pt mw-list-item"><a href="https://pt.wikipedia.org/wiki/Grampo_telef%C3%B4nico" title="Grampo telefônico – Portuguese" lang="pt" hreflang="pt" data-title="Grampo telefônico" data-language-autonym="Português" data-language-local-name="Portuguese" class="interlanguage-link-target"><span>Português</span></a></li><li class="interlanguage-link interwiki-ro mw-list-item"><a href="https://ro.wikipedia.org/wiki/Interceptarea_convorbirilor_telefonice" title="Interceptarea convorbirilor telefonice – Romanian" lang="ro" hreflang="ro" data-title="Interceptarea convorbirilor telefonice" data-language-autonym="Română" data-language-local-name="Romanian" class="interlanguage-link-target"><span>Română</span></a></li><li class="interlanguage-link interwiki-ru mw-list-item"><a href="https://ru.wikipedia.org/wiki/%D0%97%D0%B0%D0%BF%D0%B8%D1%81%D1%8C_%D1%82%D0%B5%D0%BB%D0%B5%D1%84%D0%BE%D0%BD%D0%BD%D0%BE%D0%B3%D0%BE_%D1%80%D0%B0%D0%B7%D0%B3%D0%BE%D0%B2%D0%BE%D1%80%D0%B0" title="Запись телефонного разговора – Russian" lang="ru" hreflang="ru" data-title="Запись телефонного разговора" data-language-autonym="Русский" data-language-local-name="Russian" class="interlanguage-link-target"><span>Русский</span></a></li><li class="interlanguage-link interwiki-sq mw-list-item"><a href="https://sq.wikipedia.org/wiki/P%C3%ABrgjimi_i_telefonit" title="Përgjimi i telefonit – Albanian" lang="sq" hreflang="sq" data-title="Përgjimi i telefonit" data-language-autonym="Shqip" data-language-local-name="Albanian" class="interlanguage-link-target"><span>Shqip</span></a></li><li class="interlanguage-link interwiki-scn mw-list-item"><a href="https://scn.wikipedia.org/wiki/Ntercittazziuni" title="Ntercittazziuni – Sicilian" lang="scn" hreflang="scn" data-title="Ntercittazziuni" data-language-autonym="Sicilianu" data-language-local-name="Sicilian" class="interlanguage-link-target"><span>Sicilianu</span></a></li><li class="interlanguage-link interwiki-simple mw-list-item"><a href="https://simple.wikipedia.org/wiki/Telephone_tapping" title="Telephone tapping – Simple English" lang="en-simple" hreflang="en-simple" data-title="Telephone tapping" data-language-autonym="Simple English" data-language-local-name="Simple English" class="interlanguage-link-target"><span>Simple English</span></a></li><li class="interlanguage-link interwiki-fi mw-list-item"><a href="https://fi.wikipedia.org/wiki/Telekuuntelu" title="Telekuuntelu – Finnish" lang="fi" hreflang="fi" data-title="Telekuuntelu" data-language-autonym="Suomi" data-language-local-name="Finnish" class="interlanguage-link-target"><span>Suomi</span></a></li><li class="interlanguage-link interwiki-uk mw-list-item"><a href="https://uk.wikipedia.org/wiki/%D0%97%D0%B0%D0%BF%D0%B8%D1%81_%D1%82%D0%B5%D0%BB%D0%B5%D1%84%D0%BE%D0%BD%D0%BD%D0%BE%D1%97_%D1%80%D0%BE%D0%B7%D0%BC%D0%BE%D0%B2%D0%B8" title="Запис телефонної розмови – Ukrainian" lang="uk" hreflang="uk" data-title="Запис телефонної розмови" data-language-autonym="Українська" data-language-local-name="Ukrainian" class="interlanguage-link-target"><span>Українська</span></a></li><li class="interlanguage-link interwiki-zh mw-list-item"><a href="https://zh.wikipedia.org/wiki/%E9%9B%BB%E8%A9%B1%E7%AB%8A%E8%81%BD" title="電話竊聽 – Chinese" lang="zh" hreflang="zh" data-title="電話竊聽" data-language-autonym="中文" data-language-local-name="Chinese" class="interlanguage-link-target"><span>中文</span></a></li> </ul> <div class="after-portlet after-portlet-lang"><span class="wb-langlinks-edit wb-langlinks-link"><a href="https://www.wikidata.org/wiki/Special:EntityPage/Q1067529#sitelinks-wikipedia" title="Edit interlanguage links" class="wbc-editpage">Edit links</a></span></div> </div> </div> </div> </header> <div class="vector-page-toolbar"> <div class="vector-page-toolbar-container"> <div id="left-navigation"> <nav aria-label="Namespaces"> <div id="p-associated-pages" class="vector-menu vector-menu-tabs mw-portlet mw-portlet-associated-pages" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="ca-nstab-main" class="selected vector-tab-noicon mw-list-item"><a href="/wiki/Wiretapping" title="View the content page [c]" accesskey="c"><span>Article</span></a></li><li id="ca-talk" class="vector-tab-noicon mw-list-item"><a href="/wiki/Talk:Wiretapping" rel="discussion" title="Discuss improvements to the content page [t]" accesskey="t"><span>Talk</span></a></li> </ul> </div> </div> <div id="vector-variants-dropdown" class="vector-dropdown emptyPortlet" > <input type="checkbox" id="vector-variants-dropdown-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-variants-dropdown" class="vector-dropdown-checkbox " aria-label="Change language variant" > <label id="vector-variants-dropdown-label" for="vector-variants-dropdown-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet" aria-hidden="true" ><span class="vector-dropdown-label-text">English</span> </label> <div class="vector-dropdown-content"> <div id="p-variants" class="vector-menu mw-portlet mw-portlet-variants emptyPortlet" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> </ul> </div> </div> </div> </div> </nav> </div> <div id="right-navigation" class="vector-collapsible"> <nav aria-label="Views"> <div id="p-views" class="vector-menu vector-menu-tabs mw-portlet mw-portlet-views" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="ca-view" class="selected vector-tab-noicon mw-list-item"><a href="/wiki/Wiretapping"><span>Read</span></a></li><li id="ca-edit" class="vector-tab-noicon mw-list-item"><a href="/w/index.php?title=Wiretapping&amp;action=edit" title="Edit this page [e]" accesskey="e"><span>Edit</span></a></li><li id="ca-history" class="vector-tab-noicon mw-list-item"><a href="/w/index.php?title=Wiretapping&amp;action=history" title="Past revisions of this page [h]" accesskey="h"><span>View history</span></a></li> </ul> </div> </div> </nav> <nav class="vector-page-tools-landmark" aria-label="Page tools"> <div id="vector-page-tools-dropdown" class="vector-dropdown vector-page-tools-dropdown" > <input type="checkbox" id="vector-page-tools-dropdown-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-page-tools-dropdown" class="vector-dropdown-checkbox " aria-label="Tools" > <label id="vector-page-tools-dropdown-label" for="vector-page-tools-dropdown-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet" aria-hidden="true" ><span class="vector-dropdown-label-text">Tools</span> </label> <div class="vector-dropdown-content"> <div id="vector-page-tools-unpinned-container" class="vector-unpinned-container"> <div id="vector-page-tools" class="vector-page-tools vector-pinnable-element"> <div class="vector-pinnable-header vector-page-tools-pinnable-header vector-pinnable-header-unpinned" data-feature-name="page-tools-pinned" data-pinnable-element-id="vector-page-tools" data-pinned-container-id="vector-page-tools-pinned-container" data-unpinned-container-id="vector-page-tools-unpinned-container" > <div class="vector-pinnable-header-label">Tools</div> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-pin-button" data-event-name="pinnable-header.vector-page-tools.pin">move to sidebar</button> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-unpin-button" data-event-name="pinnable-header.vector-page-tools.unpin">hide</button> </div> <div id="p-cactions" class="vector-menu mw-portlet mw-portlet-cactions emptyPortlet vector-has-collapsible-items" title="More options" > <div class="vector-menu-heading"> Actions </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="ca-more-view" class="selected vector-more-collapsible-item mw-list-item"><a href="/wiki/Wiretapping"><span>Read</span></a></li><li id="ca-more-edit" class="vector-more-collapsible-item mw-list-item"><a href="/w/index.php?title=Wiretapping&amp;action=edit" title="Edit this page [e]" accesskey="e"><span>Edit</span></a></li><li id="ca-more-history" class="vector-more-collapsible-item mw-list-item"><a href="/w/index.php?title=Wiretapping&amp;action=history"><span>View history</span></a></li> </ul> </div> </div> <div id="p-tb" class="vector-menu mw-portlet mw-portlet-tb" > <div class="vector-menu-heading"> General </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="t-whatlinkshere" class="mw-list-item"><a href="/wiki/Special:WhatLinksHere/Wiretapping" title="List of all English Wikipedia pages containing links to this page [j]" accesskey="j"><span>What links here</span></a></li><li id="t-recentchangeslinked" class="mw-list-item"><a href="/wiki/Special:RecentChangesLinked/Wiretapping" rel="nofollow" title="Recent changes in pages linked from this page [k]" accesskey="k"><span>Related changes</span></a></li><li id="t-upload" class="mw-list-item"><a href="/wiki/Wikipedia:File_Upload_Wizard" title="Upload files [u]" accesskey="u"><span>Upload file</span></a></li><li id="t-specialpages" class="mw-list-item"><a href="/wiki/Special:SpecialPages" title="A list of all special pages [q]" accesskey="q"><span>Special pages</span></a></li><li id="t-permalink" class="mw-list-item"><a href="/w/index.php?title=Wiretapping&amp;oldid=1252396711" title="Permanent link to this revision of this page"><span>Permanent link</span></a></li><li id="t-info" class="mw-list-item"><a href="/w/index.php?title=Wiretapping&amp;action=info" title="More information about this page"><span>Page information</span></a></li><li id="t-cite" class="mw-list-item"><a href="/w/index.php?title=Special:CiteThisPage&amp;page=Wiretapping&amp;id=1252396711&amp;wpFormIdentifier=titleform" title="Information on how to cite this page"><span>Cite this page</span></a></li><li id="t-urlshortener" class="mw-list-item"><a href="/w/index.php?title=Special:UrlShortener&amp;url=https%3A%2F%2Fen.wikipedia.org%2Fwiki%2FWiretapping"><span>Get shortened URL</span></a></li><li id="t-urlshortener-qrcode" class="mw-list-item"><a href="/w/index.php?title=Special:QrCode&amp;url=https%3A%2F%2Fen.wikipedia.org%2Fwiki%2FWiretapping"><span>Download QR code</span></a></li> </ul> </div> </div> <div id="p-coll-print_export" class="vector-menu mw-portlet mw-portlet-coll-print_export" > <div class="vector-menu-heading"> Print/export </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="coll-download-as-rl" class="mw-list-item"><a href="/w/index.php?title=Special:DownloadAsPdf&amp;page=Wiretapping&amp;action=show-download-screen" title="Download this page as a PDF file"><span>Download as PDF</span></a></li><li id="t-print" class="mw-list-item"><a href="/w/index.php?title=Wiretapping&amp;printable=yes" title="Printable version of this page [p]" accesskey="p"><span>Printable version</span></a></li> </ul> </div> </div> <div id="p-wikibase-otherprojects" class="vector-menu mw-portlet mw-portlet-wikibase-otherprojects" > <div class="vector-menu-heading"> In other projects </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li class="wb-otherproject-link wb-otherproject-commons mw-list-item"><a href="https://commons.wikimedia.org/wiki/Category:Telephone_tapping" hreflang="en"><span>Wikimedia Commons</span></a></li><li id="t-wikibase" class="wb-otherproject-link wb-otherproject-wikibase-dataitem mw-list-item"><a href="https://www.wikidata.org/wiki/Special:EntityPage/Q1067529" title="Structured data on this page hosted by Wikidata [g]" accesskey="g"><span>Wikidata item</span></a></li> </ul> </div> </div> </div> </div> </div> </div> </nav> </div> </div> </div> <div class="vector-column-end"> <div class="vector-sticky-pinned-container"> <nav class="vector-page-tools-landmark" aria-label="Page tools"> <div id="vector-page-tools-pinned-container" class="vector-pinned-container"> </div> </nav> <nav class="vector-appearance-landmark" aria-label="Appearance"> <div id="vector-appearance-pinned-container" class="vector-pinned-container"> <div id="vector-appearance" class="vector-appearance vector-pinnable-element"> <div class="vector-pinnable-header vector-appearance-pinnable-header vector-pinnable-header-pinned" data-feature-name="appearance-pinned" data-pinnable-element-id="vector-appearance" data-pinned-container-id="vector-appearance-pinned-container" data-unpinned-container-id="vector-appearance-unpinned-container" > <div class="vector-pinnable-header-label">Appearance</div> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-pin-button" data-event-name="pinnable-header.vector-appearance.pin">move to sidebar</button> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-unpin-button" data-event-name="pinnable-header.vector-appearance.unpin">hide</button> </div> </div> </div> </nav> </div> </div> <div id="bodyContent" class="vector-body" aria-labelledby="firstHeading" data-mw-ve-target-container> <div class="vector-body-before-content"> <div class="mw-indicators"> </div> <div id="siteSub" class="noprint">From Wikipedia, the free encyclopedia</div> </div> <div id="contentSub"><div id="mw-content-subtitle"><span class="mw-redirectedfrom">(Redirected from <a href="/w/index.php?title=Telephone_tapping&amp;redirect=no" class="mw-redirect" title="Telephone tapping">Telephone tapping</a>)</span></div></div> <div id="mw-content-text" class="mw-body-content"><div class="mw-content-ltr mw-parser-output" lang="en" dir="ltr"><div class="shortdescription nomobile noexcerpt noprint searchaux" style="display:none">Third-party monitoring of electronic communications</div> <style data-mw-deduplicate="TemplateStyles:r1236090951">.mw-parser-output .hatnote{font-style:italic}.mw-parser-output div.hatnote{padding-left:1.6em;margin-bottom:0.5em}.mw-parser-output .hatnote i{font-style:normal}.mw-parser-output .hatnote+link+.hatnote{margin-top:-0.5em}@media print{body.ns-0 .mw-parser-output .hatnote{display:none!important}}</style><div role="note" class="hatnote navigation-not-searchable">"Wiretap" redirects here. For the radio program, see <a href="/wiki/WireTap_(radio_program)" title="WireTap (radio program)">WireTap (radio program)</a>. For the listening device, see <a href="/wiki/Covert_listening_device" title="Covert listening device">Covert listening device</a>.</div> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236090951"><div role="note" class="hatnote navigation-not-searchable">For the method of telephone dialing by depressing the hook switch, see <a href="/wiki/Pulse_dialing#Tapping" title="Pulse dialing">Pulse dialing §&#160;Tapping</a>.</div> <p><b>Wiretapping</b>, also known as <b>wire tapping</b> or <b>telephone tapping</b>, is the <a href="/wiki/Surveillance" title="Surveillance">monitoring</a> of <a href="/wiki/Telephone" title="Telephone">telephone</a> and <a href="/wiki/Internet" title="Internet">Internet</a>-based conversations by a third party, often by covert means. The wire tap received its name because, historically, the monitoring connection was an actual electrical tap on an analog telephone or telegraph line. Legal wiretapping by a <a href="/wiki/Government_agency" title="Government agency">government agency</a> is also called <a href="/wiki/Lawful_interception" title="Lawful interception">lawful interception</a>. <b>Passive wiretapping</b> monitors or records the traffic, while <b>active wiretapping</b> alters or otherwise affects it.<sup id="cite_ref-1" class="reference"><a href="#cite_note-1"><span class="cite-bracket">&#91;</span>1<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-2" class="reference"><a href="#cite_note-2"><span class="cite-bracket">&#91;</span>2<span class="cite-bracket">&#93;</span></a></sup> </p> <meta property="mw:PageProp/toc" /> <div class="mw-heading mw-heading2"><h2 id="Legal_status">Legal status</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Wiretapping&amp;action=edit&amp;section=1" title="Edit section: Legal status"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236090951"><div role="note" class="hatnote navigation-not-searchable">Main article: <a href="/wiki/Telephone_call_recording_laws" title="Telephone call recording laws">Telephone call recording laws</a></div> <figure class="mw-default-size mw-halign-right" typeof="mw:File/Thumb"><a href="/wiki/File:IDET2007_Jitka_phone_tapping_device.jpg" class="mw-file-description"><img src="//upload.wikimedia.org/wikipedia/commons/thumb/e/ea/IDET2007_Jitka_phone_tapping_device.jpg/220px-IDET2007_Jitka_phone_tapping_device.jpg" decoding="async" width="220" height="293" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/e/ea/IDET2007_Jitka_phone_tapping_device.jpg/330px-IDET2007_Jitka_phone_tapping_device.jpg 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/e/ea/IDET2007_Jitka_phone_tapping_device.jpg/440px-IDET2007_Jitka_phone_tapping_device.jpg 2x" data-file-width="1932" data-file-height="2576" /></a><figcaption>Telephone line control device "Jitka", used in late 1960s by Czechoslovakian <a href="/wiki/StB" title="StB">StB</a> to signal line occupancy, and connect a recorder</figcaption></figure> <p><a href="/wiki/Lawful_interception" title="Lawful interception">Lawful interception</a> is officially strictly controlled in many countries to safeguard <a href="/wiki/Privacy" title="Privacy">privacy</a>; this is the case in all <a href="/wiki/Liberal_democracy" title="Liberal democracy">liberal democracies</a>. In theory, telephone tapping often needs to be authorized by a <a href="/wiki/Court" title="Court">court</a>, and is again in theory, normally only approved when <a href="/wiki/Evidence_(law)" title="Evidence (law)">evidence</a> shows it is not possible to detect <a href="/wiki/Crime" title="Crime">criminal</a> or <a href="/wiki/Subversion" title="Subversion">subversive</a> activity in less intrusive ways. Oftentimes, the law and regulations require that the crime investigated must be at least of a certain severity.<sup id="cite_ref-hsw3_3-0" class="reference"><a href="#cite_note-hsw3-3"><span class="cite-bracket">&#91;</span>3<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-4" class="reference"><a href="#cite_note-4"><span class="cite-bracket">&#91;</span>4<span class="cite-bracket">&#93;</span></a></sup> Illegal or unauthorized telephone tapping is often a criminal offense.<sup id="cite_ref-hsw3_3-1" class="reference"><a href="#cite_note-hsw3-3"><span class="cite-bracket">&#91;</span>3<span class="cite-bracket">&#93;</span></a></sup> In certain jurisdictions, such as <a href="/wiki/Germany" title="Germany">Germany</a> and <a href="/wiki/France" title="France">France</a>, courts will accept illegally recorded phone calls without the <a href="/wiki/Two_party_consent" class="mw-redirect" title="Two party consent">other party's consent</a> as evidence, but the unauthorized telephone tapping will still be prosecuted.<sup id="cite_ref-5" class="reference"><a href="#cite_note-5"><span class="cite-bracket">&#91;</span>5<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-6" class="reference"><a href="#cite_note-6"><span class="cite-bracket">&#91;</span>6<span class="cite-bracket">&#93;</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="United_States">United States</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Wiretapping&amp;action=edit&amp;section=2" title="Edit section: United States"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>In the <a href="/wiki/United_States" title="United States">United States</a>, under the <a href="/wiki/Foreign_Intelligence_Surveillance_Act" title="Foreign Intelligence Surveillance Act">Foreign Intelligence Surveillance Act</a>, federal intelligence agencies can get approval for wiretaps from the <a href="/wiki/United_States_Foreign_Intelligence_Surveillance_Court" title="United States Foreign Intelligence Surveillance Court">United States Foreign Intelligence Surveillance Court</a>, a court with secret proceedings, or in certain circumstances from the <a href="/wiki/United_States_Attorney_General" title="United States Attorney General">Attorney General</a> without a court order.<sup id="cite_ref-7" class="reference"><a href="#cite_note-7"><span class="cite-bracket">&#91;</span>7<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-8" class="reference"><a href="#cite_note-8"><span class="cite-bracket">&#91;</span>8<span class="cite-bracket">&#93;</span></a></sup> </p><p>The <a href="/wiki/Telephone_call_recording_laws" title="Telephone call recording laws">telephone call recording laws</a> in most U.S. states require only one party to be aware of the recording, while twelve states require both parties to be aware.<sup id="cite_ref-9" class="reference"><a href="#cite_note-9"><span class="cite-bracket">&#91;</span>9<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-10" class="reference"><a href="#cite_note-10"><span class="cite-bracket">&#91;</span>10<span class="cite-bracket">&#93;</span></a></sup> In Nevada, the state legislature enacted a law making it legal for a party to record a conversation if one party to the conversation consented, but the Nevada Supreme Court issued two judicial opinions changing the law and requiring all parties to consent to the recording of a private conversation for it to be legal.<sup id="cite_ref-11" class="reference"><a href="#cite_note-11"><span class="cite-bracket">&#91;</span>11<span class="cite-bracket">&#93;</span></a></sup> It is considered better practice to announce at the beginning of a call that the conversation is being recorded.<sup id="cite_ref-12" class="reference"><a href="#cite_note-12"><span class="cite-bracket">&#91;</span>12<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-13" class="reference"><a href="#cite_note-13"><span class="cite-bracket">&#91;</span>13<span class="cite-bracket">&#93;</span></a></sup> </p><p>The <a href="/wiki/Fourth_Amendment_to_the_United_States_Constitution" title="Fourth Amendment to the United States Constitution">Fourth Amendment to the United States Constitution</a> protects privacy rights by requiring a <a href="/wiki/Search_warrant" title="Search warrant">warrant</a> to search a person. However, telephone tapping is the subject of controversy surrounding violations of this right. There are arguments that wiretapping invades a person's personal privacy and therefore violates their Fourth Amendment rights. On the other hand, there are certain rules and regulations, which permit wiretapping. A notable example of this is the <a href="/wiki/Patriot_Act" title="Patriot Act">Patriot Act</a>, which, in certain circumstances, gives the government permission to wiretap citizens.<sup id="cite_ref-14" class="reference"><a href="#cite_note-14"><span class="cite-bracket">&#91;</span>14<span class="cite-bracket">&#93;</span></a></sup> In addition, wiretapping laws vary per <a href="/wiki/U.S._state" title="U.S. state">state</a>, making it even more difficult to determine whether the Fourth Amendment is being violated.<sup id="cite_ref-15" class="reference"><a href="#cite_note-15"><span class="cite-bracket">&#91;</span>15<span class="cite-bracket">&#93;</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Canada">Canada</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Wiretapping&amp;action=edit&amp;section=3" title="Edit section: Canada"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>In Canadian law, police are allowed to wiretap without the authorization from a court when there is the risk for imminent harm, such as <a href="/wiki/Kidnapping" title="Kidnapping">kidnapping</a> or a <a href="/wiki/Bomb_threat" title="Bomb threat">bomb threat</a>.<sup id="cite_ref-C-55_leg_sum_16-0" class="reference"><a href="#cite_note-C-55_leg_sum-16"><span class="cite-bracket">&#91;</span>16<span class="cite-bracket">&#93;</span></a></sup> They must believe that the interception is immediately necessary to prevent an unlawful act that could cause serious harm to any person or to property. This was introduced by <a href="/wiki/Rob_Nicholson" title="Rob Nicholson">Rob Nicholson</a> on February 11, 2013, and is also known as Bill C-55.<sup id="cite_ref-C-55_leg_sum_16-1" class="reference"><a href="#cite_note-C-55_leg_sum-16"><span class="cite-bracket">&#91;</span>16<span class="cite-bracket">&#93;</span></a></sup> The Supreme Court gave Parliament twelve months to rewrite a new law. <a href="/wiki/Anti-terrorism_Act,_2015" title="Anti-terrorism Act, 2015">Bill C-51</a> (also known as the Anti-Terrorism Act) was then released in 2015, which transformed the Canadian Security Intelligence Service from an intelligence-gathering agency to an agency actively engaged in countering national security threats. </p><p>Legal protection extends to 'private communications' where the participants would not expect unintended persons to learn the content of the communication. A single participant can legally, and covertly record a conversation. Otherwise police normally need a judicial warrant based upon probable grounds to record a conversation they are not a part of. In order to be valid wiretap authorization must state: 1) the offense being investigated by the wiretap, 2) the type of communication, 3) the identity of the people or places targeted, 4) the period of validity (60 days from issue).<sup id="cite_ref-17" class="reference"><a href="#cite_note-17"><span class="cite-bracket">&#91;</span>17<span class="cite-bracket">&#93;</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="India">India</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Wiretapping&amp;action=edit&amp;section=4" title="Edit section: India"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>In India, the lawful interception of communication by authorized law enforcement agencies (LEAs) is carried out in accordance with Section 5(2) of the Indian Telegraph Act, 1885 read with Rule 419A of Indian Telegraph (Amendment) Rules, 2007. Directions for interception of any message or class of messages under sub-section (2) of Section 5 of the Indian Telegraph Act, 1885 shall not be issued except by an order made by the Secretary to the Government of India in the Ministry of Home Affairs in the case of Government of India and by the Secretary to the State Government in-charge of the Home Department in the case of a state government.<sup id="cite_ref-18" class="reference"><a href="#cite_note-18"><span class="cite-bracket">&#91;</span>18<span class="cite-bracket">&#93;</span></a></sup> The government has set up the <a href="/wiki/Centralized_Monitoring_System" class="mw-redirect" title="Centralized Monitoring System">Centralized Monitoring System</a> (CMS) to automate the process of lawful interception and monitoring of telecommunications technology. The government of India on 2015 December 2 in a reply to parliament question no. 595 on scope, objectives and framework of the CMS has struck a balance between national security, online privacy and free speech informed that to take care of the privacy of citizens, lawful interception and monitoring is governed by the Section 5(2) of Indian Telegraph Act, 1885 read with Rule 419A of Indian Telegraph (Amendment) Rules, 2007 wherein oversight mechanism exists in form of review committee under chairmanship of the Cabinet Secretary at Central Government level and Chief Secretary of the State at the state government level.<sup id="cite_ref-19" class="reference"><a href="#cite_note-19"><span class="cite-bracket">&#91;</span>19<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-20" class="reference"><a href="#cite_note-20"><span class="cite-bracket">&#91;</span>20<span class="cite-bracket">&#93;</span></a></sup> Section 5(2) also allows the government to intercept messages that are public emergencies or for public safety.<sup id="cite_ref-21" class="reference"><a href="#cite_note-21"><span class="cite-bracket">&#91;</span>21<span class="cite-bracket">&#93;</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Pakistan">Pakistan</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Wiretapping&amp;action=edit&amp;section=5" title="Edit section: Pakistan"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>In Pakistan, <a href="/wiki/Inter-Services_Intelligence" title="Inter-Services Intelligence">Inter-Services Intelligence</a> (ISI) is authorised by the Ministry of Information Technology and Telecommunication to intercept and trace telecommunications, as stipulated under Section 54 of the relevant Act, in July 2024.<sup id="cite_ref-auto_22-0" class="reference"><a href="#cite_note-auto-22"><span class="cite-bracket">&#91;</span>22<span class="cite-bracket">&#93;</span></a></sup> Under the authorization, ISI officers of at least grade 18, subject to periodic designation, are empowered to surveil calls and messages.<sup id="cite_ref-auto_22-1" class="reference"><a href="#cite_note-auto-22"><span class="cite-bracket">&#91;</span>22<span class="cite-bracket">&#93;</span></a></sup> </p> <div class="mw-heading mw-heading2"><h2 id="Methods">Methods</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Wiretapping&amp;action=edit&amp;section=6" title="Edit section: Methods"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <div class="mw-heading mw-heading3"><h3 id="Official_use">Official use</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Wiretapping&amp;action=edit&amp;section=7" title="Edit section: Official use"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236090951"><div role="note" class="hatnote navigation-not-searchable">Main article: <a href="/wiki/Lawful_interception" title="Lawful interception">Lawful interception</a></div> <p>The contracts or licenses by which the state controls <a href="/wiki/Telephone_company" class="mw-redirect" title="Telephone company">telephone companies</a> often require that the companies must provide access to tapping lines to law enforcement. In the U.S., telecommunications carriers are required by law to cooperate in the interception of communications for law enforcement purposes under the terms of <a href="/wiki/Communications_Assistance_for_Law_Enforcement_Act" title="Communications Assistance for Law Enforcement Act">Communications Assistance for Law Enforcement Act</a> (CALEA).<sup id="cite_ref-23" class="reference"><a href="#cite_note-23"><span class="cite-bracket">&#91;</span>23<span class="cite-bracket">&#93;</span></a></sup> </p><p>When <a href="/wiki/Telephone_exchange" title="Telephone exchange">telephone exchanges</a> were mechanical, a tap had to be installed by technicians, linking circuits together to route the audio signal from the call. Now that many exchanges have been converted to digital technology, tapping is far simpler and can be ordered remotely by computer. This central office switch wiretapping technology using the Advanced Intelligent Network (AIN) was invented by Wayne Howe and Dale Malik at BellSouth's Advanced Technology R&amp;D group in 1995 and was issued as US Patent #5,590,171.<sup id="cite_ref-24" class="reference"><a href="#cite_note-24"><span class="cite-bracket">&#91;</span>24<span class="cite-bracket">&#93;</span></a></sup> <a href="/wiki/Public_switched_telephone_network" title="Public switched telephone network">Telephone services</a> provided by <a href="/wiki/Cable_TV" class="mw-redirect" title="Cable TV">cable TV</a> companies also use digital switching technology. If the tap is implemented at a <a href="/wiki/Digital_switch" class="mw-redirect" title="Digital switch">digital switch</a>, the switching computer simply copies the digitized bits that represent the phone conversation to a second line and it is impossible to tell whether a line is being tapped. A well-designed tap installed on a phone wire can be difficult to detect. In some places, some law enforcement may be able to even access a mobile phone's internal microphone even while it isn't actively being used on a phone call (unless the battery is removed or drained).<sup id="cite_ref-25" class="reference"><a href="#cite_note-25"><span class="cite-bracket">&#91;</span>25<span class="cite-bracket">&#93;</span></a></sup> The noises that some people believe to be telephone taps are simply <a href="/wiki/Crosstalk" title="Crosstalk">crosstalk</a> created by the <a href="/wiki/Coupling_(electronics)" title="Coupling (electronics)">coupling</a> of signals from other phone lines.<sup id="cite_ref-26" class="reference"><a href="#cite_note-26"><span class="cite-bracket">&#91;</span>26<span class="cite-bracket">&#93;</span></a></sup> </p><p>Data on the calling and called number, time of call and duration, will generally be collected automatically on all calls and stored for later use by the <a href="/wiki/Invoice" title="Invoice">billing</a> department of the phone company. These data can be accessed by security services, often with fewer legal restrictions than for a tap. This information used to be collected using special equipment known as <i><a href="/wiki/Pen_register" title="Pen register">pen registers</a></i> and <i><a href="/wiki/Trap_and_trace_device" title="Trap and trace device">trap and trace devices</a></i> and U.S. law still refers to it under those names. Today, a list of all calls to a specific number can be obtained by sorting billing records. A telephone tap during which only the call information is recorded but not the contents of the phone calls themselves, is called a <i>pen register</i> tap. </p><p>For telephone services via digital exchanges, the information collected may additionally include a log of the type of communications media being used (some services treat data and voice communications differently, in order to conserve bandwidth). </p> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236090951"><div role="note" class="hatnote navigation-not-searchable">See also: <a href="/wiki/Carnivore_(FBI)" class="mw-redirect" title="Carnivore (FBI)">Carnivore (FBI)</a></div> <div class="mw-heading mw-heading3"><h3 id="Non-official_use">Non-official use</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Wiretapping&amp;action=edit&amp;section=8" title="Edit section: Non-official use"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <figure typeof="mw:File/Thumb"><a href="/wiki/File:TelRecAdapter.jpg" class="mw-file-description"><img src="//upload.wikimedia.org/wikipedia/commons/thumb/f/f0/TelRecAdapter.jpg/300px-TelRecAdapter.jpg" decoding="async" width="300" height="370" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/f/f0/TelRecAdapter.jpg/450px-TelRecAdapter.jpg 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/f/f0/TelRecAdapter.jpg/600px-TelRecAdapter.jpg 2x" data-file-width="1188" data-file-height="1464" /></a><figcaption>A telephone recording adapter (in-line tap). The <a href="/wiki/Telephone_plug" class="mw-redirect" title="Telephone plug">phone jack</a> connects to the wall socket while the phone being monitored is connected to the adapter's socket. The <a href="/wiki/Phone_connector_(audio)" title="Phone connector (audio)">audio plug</a> connects to the recording device (computer, tape recorder, etc.).</figcaption></figure> <p>Conversations can be recorded or monitored unofficially, either by tapping by a third party without the knowledge of the parties to the conversation or recorded by one of the parties. This may or may not be illegal, according to the circumstances and the jurisdiction. </p><p>There are a number of ways to monitor telephone conversations. One of the parties may record the conversation, either on a tape or solid-state recording device, or they may use a computer running <a href="/wiki/Call_recording_software" class="mw-redirect" title="Call recording software">call recording software</a>. The recording, whether overt or covert, may be started manually, automatically when it detects sound on the line (<a href="/wiki/Voice-operated_switch" title="Voice-operated switch">VOX</a>), or automatically whenever the phone is off the hook. </p> <ul><li>using an inductive <a href="/wiki/Coil_tap" title="Coil tap">coil tap</a> (telephone pickup coil) attached to the handset or near the base of the telephone, picking up the stray field of the <a href="/wiki/Telephone_hybrid" title="Telephone hybrid">telephone's hybrid</a>;<sup id="cite_ref-27" class="reference"><a href="#cite_note-27"><span class="cite-bracket">&#91;</span>27<span class="cite-bracket">&#93;</span></a></sup></li> <li>fitting an in-line tap, as discussed below, with a recording output;</li> <li>using an in-ear microphone while holding the telephone to the ear normally; this picks up both ends of the conversation without too much disparity between the volumes<sup id="cite_ref-28" class="reference"><a href="#cite_note-28"><span class="cite-bracket">&#91;</span>28<span class="cite-bracket">&#93;</span></a></sup></li> <li>more crudely and with lower quality, simply using a speakerphone and recording with a normal microphone</li></ul> <p>The conversation may be monitored (listened to or recorded) covertly by a third party by using an <a href="/wiki/Induction_coil" title="Induction coil">induction coil</a> or a direct electrical connection to the line using a <a href="/wiki/Beige_box_(phreaking)" title="Beige box (phreaking)">beige box</a>. An induction coil is usually placed underneath the base of a telephone or on the back of a telephone handset to pick up the signal inductively. An electrical connection can be made anywhere in the telephone system, and need not be in the same premises as the telephone. Some apparatus may require occasional access to replace batteries or tapes. Poorly designed tapping or transmitting equipment can cause interference audible to users of the telephone.<sup class="noprint Inline-Template Template-Fact" style="white-space:nowrap;">&#91;<i><a href="/wiki/Wikipedia:Citation_needed" title="Wikipedia:Citation needed"><span title="This claim needs references to reliable sources. (March 2019)">citation needed</span></a></i>&#93;</sup> </p><p>The tapped signal may either be recorded at the site of the tap or transmitted by radio or over the telephone wires. As of 2007<sup class="plainlinks noexcerpt noprint asof-tag update" style="display:none;"><a class="external text" href="https://en.wikipedia.org/w/index.php?title=Wiretapping&amp;action=edit">&#91;update&#93;</a></sup> state-of-the-art equipment operates in the 30–300&#160;GHz range to keep up with telephone technology compared to the 772&#160;kHz systems used in the past.<sup id="cite_ref-29" class="reference"><a href="#cite_note-29"><span class="cite-bracket">&#91;</span>29<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-30" class="reference"><a href="#cite_note-30"><span class="cite-bracket">&#91;</span>30<span class="cite-bracket">&#93;</span></a></sup> The transmitter may be powered from the line to be maintenance-free, and only transmits when a call is in progress. These devices are low-powered as not much power can be drawn from the line, but a state-of-the-art receiver could be located as far away as ten kilometers under ideal conditions, though usually located much closer. Research has shown that a <a href="/wiki/Artificial_satellite" class="mw-redirect" title="Artificial satellite">satellite</a> can be used to receive terrestrial <a href="/wiki/Electromagnetic_radiation" title="Electromagnetic radiation">transmissions</a> with a power of a few milliwatts.<sup id="cite_ref-31" class="reference"><a href="#cite_note-31"><span class="cite-bracket">&#91;</span>31<span class="cite-bracket">&#93;</span></a></sup> Any sort of radio transmitter whose presence is suspected is detectable with suitable equipment. </p><p>Conversation on many early <a href="/wiki/Cordless_telephone" title="Cordless telephone">cordless telephones</a> could be picked up with a simple <a href="/wiki/Radio_scanner" title="Radio scanner">radio scanner</a> or sometimes even a domestic radio. Widespread digital <a href="/wiki/Spread_spectrum" title="Spread spectrum">spread spectrum</a> technology and <a href="/wiki/Cordless_telephone#Security" title="Cordless telephone">encryption</a> has made eavesdropping increasingly difficult. </p><p>A problem with recording a telephone conversation is that the recorded volume of the two speakers may be very different. A simple tap will have this problem. An in-ear microphone, while involving an additional distorting step by converting the electrical signal to sound and back again, in practice gives better-matched volume. Dedicated, and relatively expensive, telephone recording equipment equalizes the sound at both ends from a direct tap much better. </p> <div class="mw-heading mw-heading3"><h3 id="Location_data">Location data</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Wiretapping&amp;action=edit&amp;section=9" title="Edit section: Location data"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p><a href="/wiki/Mobile_phone" title="Mobile phone">Mobile phones</a> are, in <a href="/wiki/Surveillance" title="Surveillance">surveillance</a> terms, a major liability. For mobile phones the major threat is the collection of communications data.<sup id="cite_ref-32" class="reference"><a href="#cite_note-32"><span class="cite-bracket">&#91;</span>32<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-33" class="reference"><a href="#cite_note-33"><span class="cite-bracket">&#91;</span>33<span class="cite-bracket">&#93;</span></a></sup> This data does not only include information about the time, duration, originator and recipient of the call, but also the identification of the base station where the call was made from, which equals its approximate geographical location. This data is stored with the details of the call and has utmost importance for <a href="/wiki/Traffic_analysis" title="Traffic analysis">traffic analysis</a>. </p><p>It is also possible to get greater resolution of a phone's location by combining information from a number of cells surrounding the location, which cells routinely communicate (to agree on the next handoff—for a moving phone) and measuring the <a href="/wiki/Timing_advance" title="Timing advance">timing advance</a>, a correction for the speed of light in the <a href="/wiki/Global_System_for_Mobile_Communications" class="mw-redirect" title="Global System for Mobile Communications">GSM</a> standard. This additional precision must be specifically enabled by the telephone company—it is not part of the network's ordinary operation. </p> <div class="mw-heading mw-heading3"><h3 id="Internet">Internet</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Wiretapping&amp;action=edit&amp;section=10" title="Edit section: Internet"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>In 1995, <a href="/wiki/Peter_Garza" title="Peter Garza">Peter Garza</a>, a Special Agent with the <a href="/wiki/Naval_Criminal_Investigative_Service" title="Naval Criminal Investigative Service">Naval Criminal Investigative Service</a>, conducted the first court-ordered Internet wiretap in the United States while investigating Julio Cesar "Griton" Ardita.<sup id="cite_ref-34" class="reference"><a href="#cite_note-34"><span class="cite-bracket">&#91;</span>34<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-35" class="reference"><a href="#cite_note-35"><span class="cite-bracket">&#91;</span>35<span class="cite-bracket">&#93;</span></a></sup> </p><p>As technologies emerge, including <a href="/wiki/VoIP" class="mw-redirect" title="VoIP">VoIP</a>, new questions are raised about law enforcement access to communications (see <a href="/wiki/VoIP_recording" title="VoIP recording">VoIP recording</a>). In 2004, the <a href="/wiki/Federal_Communications_Commission" title="Federal Communications Commission">Federal Communications Commission</a> was asked to clarify how the <a href="/wiki/Communications_Assistance_for_Law_Enforcement_Act" title="Communications Assistance for Law Enforcement Act">Communications Assistance for Law Enforcement Act</a> (CALEA) related to Internet service providers. The FCC stated that “providers of broadband Internet access and voice over Internet protocol (“VoIP”) services are regulable as “telecommunications carriers” under the Act.”<sup id="cite_ref-36" class="reference"><a href="#cite_note-36"><span class="cite-bracket">&#91;</span>36<span class="cite-bracket">&#93;</span></a></sup> Those affected by the Act will have to provide access to law enforcement officers who need to monitor or intercept communications transmitted through their networks. As of 2009, warrantless surveillance of internet activity has consistently been upheld in <a href="/wiki/FISA_court" class="mw-redirect" title="FISA court">FISA court</a>.<sup id="cite_ref-37" class="reference"><a href="#cite_note-37"><span class="cite-bracket">&#91;</span>37<span class="cite-bracket">&#93;</span></a></sup> </p><p>The <a href="/wiki/Internet_Engineering_Task_Force" title="Internet Engineering Task Force">Internet Engineering Task Force</a> has decided not to consider requirements for wiretapping as part of the process for creating and maintaining IETF standards.<sup id="cite_ref-38" class="reference"><a href="#cite_note-38"><span class="cite-bracket">&#91;</span>38<span class="cite-bracket">&#93;</span></a></sup> </p><p>Typically, illegal Internet wiretapping is conducted via <a href="/wiki/Wi-Fi" title="Wi-Fi">Wi-Fi</a> connection to someone's Internet by cracking the <a href="/wiki/Wired_Equivalent_Privacy" title="Wired Equivalent Privacy">WEP</a> or <a href="/wiki/Wi-Fi_Protected_Access" title="Wi-Fi Protected Access">WPA</a> key, using a tool such as <a href="/wiki/Aircrack-ng" title="Aircrack-ng">Aircrack-ng</a> or <a href="/wiki/Kismet_(software)" title="Kismet (software)">Kismet</a>.<sup id="cite_ref-39" class="reference"><a href="#cite_note-39"><span class="cite-bracket">&#91;</span>39<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-40" class="reference"><a href="#cite_note-40"><span class="cite-bracket">&#91;</span>40<span class="cite-bracket">&#93;</span></a></sup> Once in, the intruder relies on a number of potential tactics, for example an <a href="/wiki/ARP_spoofing" title="ARP spoofing">ARP spoofing</a> attack, allowing the intruder to view <a href="/wiki/Packet_(information_technology)" class="mw-redirect" title="Packet (information technology)">packets</a> in a tool such as <a href="/wiki/Wireshark" title="Wireshark">Wireshark</a> or <a href="/wiki/Ettercap_(computing)" class="mw-redirect" title="Ettercap (computing)">Ettercap</a>. </p> <div class="mw-heading mw-heading3"><h3 id="Mobile_phone">Mobile phone</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Wiretapping&amp;action=edit&amp;section=11" title="Edit section: Mobile phone"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>The first generation mobile phones (<abbr title="circa">c.</abbr><span style="white-space:nowrap;">&#8201;1978</span> through 1990) could be easily monitored by anyone with a <a href="/wiki/Scanner_(radio)" class="mw-redirect" title="Scanner (radio)">'scanning all-band receiver'</a> because the system used an analog transmission system-like an ordinary radio transmitter. Instead, digital phones are harder to monitor because they use digitally encoded and compressed transmission. However the government can tap mobile phones with the cooperation of the phone company.<sup id="cite_ref-41" class="reference"><a href="#cite_note-41"><span class="cite-bracket">&#91;</span>41<span class="cite-bracket">&#93;</span></a></sup> It is also possible for organizations with the correct technical equipment to monitor mobile phone communications and decrypt the audio.<sup class="noprint Inline-Template Template-Fact" style="white-space:nowrap;">&#91;<i><a href="/wiki/Wikipedia:Citation_needed" title="Wikipedia:Citation needed"><span title="This claim needs references to reliable sources. (March 2019)">citation needed</span></a></i>&#93;</sup> </p><p>To the mobile phones in its vicinity, a device called an "<a href="/wiki/IMSI-catcher" title="IMSI-catcher">IMSI-catcher</a>" pretends to be a legitimate base station of the mobile phone network, thus subjecting the communication between the phone and the network to a <a href="/wiki/Man-in-the-middle_attack" title="Man-in-the-middle attack">man-in-the-middle attack</a>. This is possible because, while the mobile phone has to authenticate itself to the mobile telephone network, the network does not authenticate itself to the phone.<sup id="cite_ref-42" class="reference"><a href="#cite_note-42"><span class="cite-bracket">&#91;</span>42<span class="cite-bracket">&#93;</span></a></sup><sup class="noprint Inline-Template" style="white-space:nowrap;">&#91;<i><a href="/wiki/Wikipedia:Verifiability" title="Wikipedia:Verifiability"><span title="The material near this tag failed verification of its source citation(s). (November 2019)">failed verification</span></a></i>&#93;</sup> There is no defense against IMSI-catcher based eavesdropping, except using end-to-end call encryption; products offering this feature, <a href="/wiki/Secure_telephone" title="Secure telephone">secure telephones</a>, are already beginning to appear on the market, though they tend to be expensive and incompatible with each other, which limits their proliferation.<sup id="cite_ref-43" class="reference"><a href="#cite_note-43"><span class="cite-bracket">&#91;</span>43<span class="cite-bracket">&#93;</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Webtapping">Webtapping</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Wiretapping&amp;action=edit&amp;section=12" title="Edit section: Webtapping"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>Logging the <a href="/wiki/IP_address" title="IP address">IP addresses</a> of users that access certain websites is commonly called "webtapping".<sup id="cite_ref-44" class="reference"><a href="#cite_note-44"><span class="cite-bracket">&#91;</span>44<span class="cite-bracket">&#93;</span></a></sup> </p><p>Webtapping is used to monitor websites that presumably contain dangerous or sensitive materials, and the people that access them. It is allowed in the US by the <a href="/wiki/USA_PATRIOT_Act" class="mw-redirect" title="USA PATRIOT Act">Patriot Act</a>, but is considered a questionable practice by many.<sup id="cite_ref-45" class="reference"><a href="#cite_note-45"><span class="cite-bracket">&#91;</span>45<span class="cite-bracket">&#93;</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Telephone_recording">Telephone recording</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Wiretapping&amp;action=edit&amp;section=13" title="Edit section: Telephone recording"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>In Canada, anyone is legally allowed to record a conversation as long as they are involved in the conversation. The police must apply for a warrant beforehand to legally eavesdrop on a conversation, which requires that it is expected to reveal evidence to a crime. State agents may record conversations, but must obtain a warrant to use them as evidence in court. </p> <div class="mw-heading mw-heading2"><h2 id="History">History</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Wiretapping&amp;action=edit&amp;section=14" title="Edit section: History"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>The history of voice communication technology began in 1876 with the invention of <a href="/wiki/Alexander_Graham_Bell" title="Alexander Graham Bell">Alexander Graham Bell</a>'s telephone. In the 1890s, "law enforcement agencies begin tapping wires on early telephone networks".<sup id="cite_ref-ISSUU_46-0" class="reference"><a href="#cite_note-ISSUU-46"><span class="cite-bracket">&#91;</span>46<span class="cite-bracket">&#93;</span></a></sup> Remote voice communications "were carried almost exclusively by circuit-switched systems," where telephone switches would connect wires to form a continuous circuit and disconnect the wires when the call ended). All other telephone services, such as call forwarding and message taking, were handled by human operators.<sup id="cite_ref-SCIENTIFIC_47-0" class="reference"><a href="#cite_note-SCIENTIFIC-47"><span class="cite-bracket">&#91;</span>47<span class="cite-bracket">&#93;</span></a></sup> </p><p>The earliest wiretaps were extra wires — physically inserted to the line between the switchboard and the subscriber — that carried the signal to a pair of earphones and a recorder. Later, wiretaps were installed at the central office on the frames that held the incoming wires.<sup id="cite_ref-SCIENTIFIC_47-1" class="reference"><a href="#cite_note-SCIENTIFIC-47"><span class="cite-bracket">&#91;</span>47<span class="cite-bracket">&#93;</span></a></sup> In late 1940, the Nazis tried to secure some telephone lines between their forward headquarters in Paris and a variety of <a href="/wiki/Fuhrerbunker" class="mw-redirect" title="Fuhrerbunker">Fuhrerbunkers</a> in Germany. They did this by constantly monitoring the voltage on the lines, looking for any sudden drops or increases in voltage indicating that other wiring had been attached. However, the French telephone engineer Robert Keller succeeded in attaching taps without alerting the Nazis. This was done through an isolated rental property just outside of <a href="/wiki/Paris" title="Paris">Paris</a>. Keller's group became known to <a href="/wiki/Special_Operations_Executive" title="Special Operations Executive">SOE</a> (and later Allied military intelligence generally) as "Source K". They were later betrayed by a mole within the French resistance, and Keller was murdered in the <a href="/wiki/Bergen-Belsen" class="mw-redirect" title="Bergen-Belsen">Bergen-Belsen</a> <a href="/wiki/Concentration_camp" title="Concentration camp">concentration camp</a> in April 1945. The first computerized telephone switch was developed by Bell Labs in 1965; it did not support standard wiretapping techniques.<sup id="cite_ref-ISSUU_46-1" class="reference"><a href="#cite_note-ISSUU-46"><span class="cite-bracket">&#91;</span>46<span class="cite-bracket">&#93;</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Greece">Greece</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Wiretapping&amp;action=edit&amp;section=15" title="Edit section: Greece"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>In the <a href="/wiki/Greek_telephone_tapping_case_2004%E2%80%932005" class="mw-redirect" title="Greek telephone tapping case 2004–2005">Greek telephone tapping case 2004–2005</a> more than 100 mobile phone numbers belonging mostly to members of the Greek government, including the <a href="/wiki/Prime_Minister_of_Greece" title="Prime Minister of Greece">Prime Minister of Greece</a>, and top-ranking civil servants were found to have been illegally tapped for a period of at least one year. The Greek government concluded this had been done by a foreign intelligence agency, for security reasons related to the <a href="/wiki/2004_Olympic_Games" class="mw-redirect" title="2004 Olympic Games">2004 Olympic Games</a>, by unlawfully activating the lawful interception subsystem of the <a href="/wiki/Vodafone_Greece" title="Vodafone Greece">Vodafone Greece</a> mobile network. An Italian tapping case which surfaced in November 2007 revealed significant manipulation of the news at the national television company <a href="/wiki/RAI" title="RAI">RAI</a>.<sup id="cite_ref-48" class="reference"><a href="#cite_note-48"><span class="cite-bracket">&#91;</span>48<span class="cite-bracket">&#93;</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="United_States_2">United States</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Wiretapping&amp;action=edit&amp;section=16" title="Edit section: United States"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>Many state legislatures in the United States enacted statutes that prohibited anyone from listening in on telegraph communication. Telephone wiretapping began in the 1890s,<sup id="cite_ref-hsw3_3-2" class="reference"><a href="#cite_note-hsw3-3"><span class="cite-bracket">&#91;</span>3<span class="cite-bracket">&#93;</span></a></sup> and its <a href="/wiki/Constitutionality" title="Constitutionality">constitutionality</a> was established in the <a href="/wiki/Prohibition" title="Prohibition">Prohibition</a>-Era conviction of <a href="/wiki/Rum_running" class="mw-redirect" title="Rum running">bootlegger</a> <a href="/wiki/Roy_Olmstead" title="Roy Olmstead">Roy Olmstead</a>. Wiretapping has also been carried out in the US under most presidents, sometimes with a lawful warrant since the <a href="/wiki/Supreme_Court_of_the_United_States" title="Supreme Court of the United States">Supreme Court</a> ruled it constitutional in 1928. On October 19, 1963, U.S.&#160;Attorney General <a href="/wiki/Robert_F._Kennedy" title="Robert F. Kennedy">Robert F. Kennedy</a>, who served under <a href="/wiki/John_F._Kennedy" title="John F. Kennedy">John F. Kennedy</a> and <a href="/wiki/Lyndon_B._Johnson" title="Lyndon B. Johnson">Lyndon B. Johnson</a>, authorized the <a href="/wiki/FBI" class="mw-redirect" title="FBI">FBI</a> to begin wiretapping the communications of Rev. <a href="/wiki/Martin_Luther_King_Jr." title="Martin Luther King Jr.">Martin Luther King Jr.</a> The wiretaps remained in place until April 1965 at his home and June 1966 at his office.<sup id="cite_ref-49" class="reference"><a href="#cite_note-49"><span class="cite-bracket">&#91;</span>49<span class="cite-bracket">&#93;</span></a></sup> </p><p>Before the <a href="/wiki/Attack_on_Pearl_Harbor" title="Attack on Pearl Harbor">attack on Pearl Harbor</a> and the subsequent entry of the United States into <a href="/wiki/World_War_II" title="World War II">World War II</a>, the U.S. House of Representatives held hearings on the legality of wiretapping for national defense. Significant legislation and judicial decisions on the legality and constitutionality of wiretapping had taken place years before World War&#160;II.<sup id="cite_ref-50" class="reference"><a href="#cite_note-50"><span class="cite-bracket">&#91;</span>50<span class="cite-bracket">&#93;</span></a></sup> However, it took on new urgency at that time of national crisis. The actions of the government regarding wiretapping for the purpose of national defense in the current war on terror have drawn considerable attention and criticism. In the World War II era, the public was also aware of the controversy over the question of the constitutionality and legality of wiretapping. Furthermore, the public was concerned with the decisions that the legislative and judicial branches of the government were making regarding wiretapping.<sup id="cite_ref-51" class="reference"><a href="#cite_note-51"><span class="cite-bracket">&#91;</span>51<span class="cite-bracket">&#93;</span></a></sup> </p> <figure class="mw-default-size" typeof="mw:File/Thumb"><a href="/wiki/File:This_Phone_Is_Tapped.jpg" class="mw-file-description"><img src="//upload.wikimedia.org/wikipedia/commons/thumb/e/eb/This_Phone_Is_Tapped.jpg/220px-This_Phone_Is_Tapped.jpg" decoding="async" width="220" height="293" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/e/eb/This_Phone_Is_Tapped.jpg/330px-This_Phone_Is_Tapped.jpg 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/e/eb/This_Phone_Is_Tapped.jpg/440px-This_Phone_Is_Tapped.jpg 2x" data-file-width="2112" data-file-height="2816" /></a><figcaption><a href="/wiki/CrimethInc." title="CrimethInc.">CrimethInc.</a> sticker on a telephone warning users of phone tapping by the U.S. government</figcaption></figure> <p>In 1967, the U.S. Supreme Court ruled that wiretapping (or “intercepting communications”) requires a warrant in <i><a href="/wiki/Katz_v._United_States" title="Katz v. United States">Katz v. United States</a></i>.<sup id="cite_ref-52" class="reference"><a href="#cite_note-52"><span class="cite-bracket">&#91;</span>52<span class="cite-bracket">&#93;</span></a></sup> In 1968 Congress passed a law that provided warrants for wiretapping in criminal investigations.<sup id="cite_ref-53" class="reference"><a href="#cite_note-53"><span class="cite-bracket">&#91;</span>53<span class="cite-bracket">&#93;</span></a></sup> </p><p>In the 1970s, <a href="/wiki/Optical_fibers" class="mw-redirect" title="Optical fibers">optical fibers</a> become a medium for telecommunications. These fiber lines, "long, thin strands of glass that carry signals via laser light," are more secure than radio and have become very cheap. From the 1990s to the present, the majority of communications between fixed locations has been achieved by fiber. Because these fiber communications are wired, they are protected under U.S. law.<sup id="cite_ref-ISSUU_46-2" class="reference"><a href="#cite_note-ISSUU-46"><span class="cite-bracket">&#91;</span>46<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-SCIENTIFIC_47-2" class="reference"><a href="#cite_note-SCIENTIFIC-47"><span class="cite-bracket">&#91;</span>47<span class="cite-bracket">&#93;</span></a></sup> </p><p>In 1978, the US Foreign Intelligence Surveillance Act (FISA) created a "secret federal court" for issuing wiretap warrants in national security cases. This was in response to findings from the Watergate break-in, which allegedly uncovered a history of presidential operations that had used surveillance on domestic and foreign political organizations.<sup id="cite_ref-54" class="reference"><a href="#cite_note-54"><span class="cite-bracket">&#91;</span>54<span class="cite-bracket">&#93;</span></a></sup> </p><p>A difference between US wiretapping in the US and elsewhere is that, when operating in other countries, "American intelligence services could not place wiretaps on phone lines as easily as they could in the U.S." Also, in the US, wiretapping is regarded as an extreme investigative technique, while communications are often intercepted in some other countries. The National Security Agency (NSA) "spends billions of dollars every year intercepting foreign communications from ground bases, ships, airplanes and satellites".<sup id="cite_ref-SCIENTIFIC_47-3" class="reference"><a href="#cite_note-SCIENTIFIC-47"><span class="cite-bracket">&#91;</span>47<span class="cite-bracket">&#93;</span></a></sup> </p><p>FISA distinguishes between U.S. persons and foreigners, between communications inside and outside the U.S., and between wired and wireless communications. Wired communications within the United States are protected, since intercepting them requires a warrant,<sup id="cite_ref-SCIENTIFIC_47-4" class="reference"><a href="#cite_note-SCIENTIFIC-47"><span class="cite-bracket">&#91;</span>47<span class="cite-bracket">&#93;</span></a></sup> but there is no regulation of US wiretapping elsewhere. </p><p>In 1994, Congress approved the Communications Assistance for Law Enforcement Act (CALEA), which “requires telephone companies to be able to install more effective wiretaps. In 2004, the <a href="/wiki/Federal_Bureau_of_Investigation" title="Federal Bureau of Investigation">Federal Bureau of Investigation</a> (FBI), <a href="/wiki/United_States_Department_of_Justice" title="United States Department of Justice">United States Department of Justice</a> (DOJ), <a href="/wiki/Bureau_of_Alcohol,_Tobacco,_Firearms,_and_Explosives" class="mw-redirect" title="Bureau of Alcohol, Tobacco, Firearms, and Explosives">Bureau of Alcohol, Tobacco, Firearms, and Explosives</a> (ATF), and <a href="/wiki/Drug_Enforcement_Administration" title="Drug Enforcement Administration">Drug Enforcement Administration</a> (DEA) wanted to expand CALEA requirements to VoIP service.”<sup id="cite_ref-ISSUU_46-3" class="reference"><a href="#cite_note-ISSUU-46"><span class="cite-bracket">&#91;</span>46<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-SCIENTIFIC_47-5" class="reference"><a href="#cite_note-SCIENTIFIC-47"><span class="cite-bracket">&#91;</span>47<span class="cite-bracket">&#93;</span></a></sup> </p><p>The <a href="/wiki/Federal_Communications_Commission" title="Federal Communications Commission">Federal Communications Commission</a> (FCC) ruled in August 2005 that “broadband-service providers and interconnected <a href="/wiki/VoIP" class="mw-redirect" title="VoIP">VoIP</a> providers fall within CALEA's scope. Currently, instant messaging, web boards and site visits are not included in CALEA's jurisdiction.<sup id="cite_ref-55" class="reference"><a href="#cite_note-55"><span class="cite-bracket">&#91;</span>55<span class="cite-bracket">&#93;</span></a></sup> In 2007 Congress amended FISA to "allow the government to monitor more communications without a warrant". In 2008 President <a href="/wiki/George_W._Bush" title="George W. Bush">George W. Bush</a> expanded the surveillance of internet traffic to and from the U.S. government by signing a national security directive.<sup id="cite_ref-ISSUU_46-4" class="reference"><a href="#cite_note-ISSUU-46"><span class="cite-bracket">&#91;</span>46<span class="cite-bracket">&#93;</span></a></sup> </p><p>The <a href="/wiki/NSA_warrantless_surveillance_(2001%E2%80%932007)" title="NSA warrantless surveillance (2001–2007)">NSA warrantless surveillance (2001–2007)</a> controversy was discovered in December 2005. It aroused much controversy after then President <a href="/wiki/George_W._Bush" title="George W. Bush">George W. Bush</a> admitted to violating a specific federal statute (FISA) and the warrant requirement of the Fourth Amendment to the <a href="/wiki/United_States_Constitution" class="mw-redirect" title="United States Constitution">United States Constitution</a>. The President claimed his authorization was consistent with other federal statutes (<a href="/wiki/Authorization_for_Use_of_Military_Force_Against_Terrorists" class="mw-redirect" title="Authorization for Use of Military Force Against Terrorists">AUMF</a>) and other provisions of the Constitution, also stating that it was necessary to keep America safe from <a href="/wiki/Terrorism" title="Terrorism">terrorism</a> and could lead to the capture of notorious terrorists responsible for the <a href="/wiki/September_11_attacks" title="September 11 attacks">September 11 attacks</a> in 2001.<sup class="noprint Inline-Template Template-Fact" style="white-space:nowrap;">&#91;<i><a href="/wiki/Wikipedia:Citation_needed" title="Wikipedia:Citation needed"><span title="This claim needs references to reliable sources. (March 2019)">citation needed</span></a></i>&#93;</sup><sup id="cite_ref-56" class="reference"><a href="#cite_note-56"><span class="cite-bracket">&#91;</span>56<span class="cite-bracket">&#93;</span></a></sup> </p><p>In 2008, <i><a href="/wiki/Wired_(magazine)" title="Wired (magazine)">Wired</a></i> and other media reported a <a href="/wiki/Whistleblower" class="mw-redirect" title="Whistleblower">lamplighter</a> disclosed a "Quantico Circuit", a 45-megabit/second DS-3 line linking a carrier's most sensitive network in an affidavit that was the basis for a lawsuit against Verizon Wireless. The circuit provides direct access to all content and all information concerning the origin and termination of telephone calls placed on the Verizon Wireless network as well as the actual content of calls, according to the filing.<sup id="cite_ref-57" class="reference"><a href="#cite_note-57"><span class="cite-bracket">&#91;</span>57<span class="cite-bracket">&#93;</span></a></sup> </p> <div class="mw-heading mw-heading2"><h2 id="See_also">See also</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Wiretapping&amp;action=edit&amp;section=17" title="Edit section: See also"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <style data-mw-deduplicate="TemplateStyles:r1239009302">.mw-parser-output .portalbox{padding:0;margin:0.5em 0;display:table;box-sizing:border-box;max-width:175px;list-style:none}.mw-parser-output .portalborder{border:1px solid var(--border-color-base,#a2a9b1);padding:0.1em;background:var(--background-color-neutral-subtle,#f8f9fa)}.mw-parser-output .portalbox-entry{display:table-row;font-size:85%;line-height:110%;height:1.9em;font-style:italic;font-weight:bold}.mw-parser-output .portalbox-image{display:table-cell;padding:0.2em;vertical-align:middle;text-align:center}.mw-parser-output .portalbox-link{display:table-cell;padding:0.2em 0.2em 0.2em 0.3em;vertical-align:middle}@media(min-width:720px){.mw-parser-output .portalleft{clear:left;float:left;margin:0.5em 1em 0.5em 0}.mw-parser-output .portalright{clear:right;float:right;margin:0.5em 0 0.5em 1em}}</style><ul role="navigation" aria-label="Portals" class="noprint portalbox portalborder portalright"> <li class="portalbox-entry"><span class="portalbox-image"><span class="noviewer" typeof="mw:File"><span><img alt="telephone icon" src="//upload.wikimedia.org/wikipedia/commons/thumb/b/b8/Telephone_icon_blue_gradient.svg/28px-Telephone_icon_blue_gradient.svg.png" decoding="async" width="28" height="28" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/b/b8/Telephone_icon_blue_gradient.svg/42px-Telephone_icon_blue_gradient.svg.png 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/b/b8/Telephone_icon_blue_gradient.svg/56px-Telephone_icon_blue_gradient.svg.png 2x" data-file-width="722" data-file-height="722" /></span></span></span><span class="portalbox-link"><a href="/wiki/Portal:Telephones" title="Portal:Telephones">Telephones portal</a></span></li></ul> <ul><li><a href="/wiki/Echelon_(signals_intelligence)" class="mw-redirect" title="Echelon (signals intelligence)">Echelon (signals intelligence)</a></li> <li><a href="/wiki/Indiscriminate_monitoring" title="Indiscriminate monitoring">Indiscriminate monitoring</a></li> <li><a href="/wiki/Harvest_now,_decrypt_later" title="Harvest now, decrypt later">Harvest now, decrypt later</a></li> <li><a href="/wiki/Mass_surveillance" title="Mass surveillance">Mass surveillance</a></li> <li><a href="/wiki/Phone_hacking" title="Phone hacking">Phone hacking</a></li> <li><a href="/wiki/Secure_telephone" title="Secure telephone">Secure telephone</a></li> <li><a href="/wiki/Telephone_tapping_in_the_Eastern_Bloc" title="Telephone tapping in the Eastern Bloc">Telephone tapping in the Eastern Bloc</a></li></ul> <div class="mw-heading mw-heading2"><h2 id="References">References</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Wiretapping&amp;action=edit&amp;section=18" title="Edit section: References"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <style data-mw-deduplicate="TemplateStyles:r1239543626">.mw-parser-output .reflist{margin-bottom:0.5em;list-style-type:decimal}@media screen{.mw-parser-output .reflist{font-size:90%}}.mw-parser-output .reflist .references{font-size:100%;margin-bottom:0;list-style-type:inherit}.mw-parser-output .reflist-columns-2{column-width:30em}.mw-parser-output .reflist-columns-3{column-width:25em}.mw-parser-output .reflist-columns{margin-top:0.3em}.mw-parser-output .reflist-columns ol{margin-top:0}.mw-parser-output .reflist-columns li{page-break-inside:avoid;break-inside:avoid-column}.mw-parser-output .reflist-upper-alpha{list-style-type:upper-alpha}.mw-parser-output .reflist-upper-roman{list-style-type:upper-roman}.mw-parser-output .reflist-lower-alpha{list-style-type:lower-alpha}.mw-parser-output .reflist-lower-greek{list-style-type:lower-greek}.mw-parser-output .reflist-lower-roman{list-style-type:lower-roman}</style><div class="reflist reflist-columns references-column-width reflist-columns-2"> <ol class="references"> <li id="cite_note-1"><span class="mw-cite-backlink"><b><a href="#cite_ref-1">^</a></b></span> <span class="reference-text"><style data-mw-deduplicate="TemplateStyles:r1238218222">.mw-parser-output cite.citation{font-style:inherit;word-wrap:break-word}.mw-parser-output .citation q{quotes:"\"""\"""'""'"}.mw-parser-output .citation:target{background-color:rgba(0,127,255,0.133)}.mw-parser-output .id-lock-free.id-lock-free a{background:url("//upload.wikimedia.org/wikipedia/commons/6/65/Lock-green.svg")right 0.1em center/9px no-repeat}.mw-parser-output .id-lock-limited.id-lock-limited a,.mw-parser-output .id-lock-registration.id-lock-registration a{background:url("//upload.wikimedia.org/wikipedia/commons/d/d6/Lock-gray-alt-2.svg")right 0.1em center/9px no-repeat}.mw-parser-output .id-lock-subscription.id-lock-subscription a{background:url("//upload.wikimedia.org/wikipedia/commons/a/aa/Lock-red-alt-2.svg")right 0.1em center/9px no-repeat}.mw-parser-output .cs1-ws-icon a{background:url("//upload.wikimedia.org/wikipedia/commons/4/4c/Wikisource-logo.svg")right 0.1em center/12px no-repeat}body:not(.skin-timeless):not(.skin-minerva) .mw-parser-output .id-lock-free a,body:not(.skin-timeless):not(.skin-minerva) .mw-parser-output .id-lock-limited a,body:not(.skin-timeless):not(.skin-minerva) .mw-parser-output .id-lock-registration a,body:not(.skin-timeless):not(.skin-minerva) .mw-parser-output .id-lock-subscription a,body:not(.skin-timeless):not(.skin-minerva) .mw-parser-output .cs1-ws-icon a{background-size:contain;padding:0 1em 0 0}.mw-parser-output .cs1-code{color:inherit;background:inherit;border:none;padding:inherit}.mw-parser-output .cs1-hidden-error{display:none;color:var(--color-error,#d33)}.mw-parser-output .cs1-visible-error{color:var(--color-error,#d33)}.mw-parser-output .cs1-maint{display:none;color:#085;margin-left:0.3em}.mw-parser-output .cs1-kern-left{padding-left:0.2em}.mw-parser-output .cs1-kern-right{padding-right:0.2em}.mw-parser-output .citation .mw-selflink{font-weight:inherit}@media screen{.mw-parser-output .cs1-format{font-size:95%}html.skin-theme-clientpref-night .mw-parser-output .cs1-maint{color:#18911f}}@media screen and (prefers-color-scheme:dark){html.skin-theme-clientpref-os .mw-parser-output .cs1-maint{color:#18911f}}</style><cite id="CITEREFBishop2003" class="citation book cs1">Bishop, Matt (2003). <a rel="nofollow" class="external text" href="http://nob.cs.ucdavis.edu/book/book-aands/aands01.pdf">"1: An Overview of Computer Security"</a> <span class="cs1-format">(PDF)</span>. <i>Computer security&#160;: art and science</i>. Boston: Addison-Wesley. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/0201440997" title="Special:BookSources/0201440997"><bdi>0201440997</bdi></a>. <a href="/wiki/OCLC_(identifier)" class="mw-redirect" title="OCLC (identifier)">OCLC</a>&#160;<a rel="nofollow" class="external text" href="https://search.worldcat.org/oclc/50251943">50251943</a>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20051222145350/http://nob.cs.ucdavis.edu/book/book-aands/aands01.pdf">Archived</a> <span class="cs1-format">(PDF)</span> from the original on 2005-12-22<span class="reference-accessdate">. Retrieved <span class="nowrap">2011-12-20</span></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=bookitem&amp;rft.atitle=1%3A+An+Overview+of+Computer+Security&amp;rft.btitle=Computer+security+%3A+art+and+science&amp;rft.place=Boston&amp;rft.pub=Addison-Wesley&amp;rft.date=2003&amp;rft_id=info%3Aoclcnum%2F50251943&amp;rft.isbn=0201440997&amp;rft.aulast=Bishop&amp;rft.aufirst=Matt&amp;rft_id=http%3A%2F%2Fnob.cs.ucdavis.edu%2Fbook%2Fbook-aands%2Faands01.pdf&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AWiretapping" class="Z3988"></span></span> </li> <li id="cite_note-2"><span class="mw-cite-backlink"><b><a href="#cite_ref-2">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFShirey2007" class="citation cs1">Shirey, R. (August 2007). <a rel="nofollow" class="external text" href="https://datatracker.ietf.org/doc/html/rfc4949"><i>Internet Security Glossary</i></a>. <a href="/wiki/Internet_Engineering_Task_Force" title="Internet Engineering Task Force">IETF</a>. pp.&#160;335–336. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<span class="id-lock-free" title="Freely accessible"><a rel="nofollow" class="external text" href="https://doi.org/10.17487%2FRFC4949">10.17487/RFC4949</a></span>. <a href="/wiki/Request_for_Comments" title="Request for Comments">RFC</a> <a rel="nofollow" class="external text" href="https://datatracker.ietf.org/doc/html/rfc4949">4949</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=Internet+Security+Glossary&amp;rft.pages=pp.-335-336&amp;rft.pub=IETF&amp;rft.date=2007-08&amp;rft_id=info%3Adoi%2F10.17487%2F&#82;FC4949&amp;rft.aulast=Shirey&amp;rft.aufirst=R.&amp;rft_id=https%3A%2F%2Fdatatracker.ietf.org%2Fdoc%2Fhtml%2Frfc4949&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AWiretapping" class="Z3988"></span></span> </li> <li id="cite_note-hsw3-3"><span class="mw-cite-backlink">^ <a href="#cite_ref-hsw3_3-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-hsw3_3-1"><sup><i><b>b</b></i></sup></a> <a href="#cite_ref-hsw3_3-2"><sup><i><b>c</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFHarris2001" class="citation web cs1">Harris, Tom (2001-05-08). <a rel="nofollow" class="external text" href="http://people.howstuffworks.com/wiretapping3.htm">"How Wiretapping Works"</a>. <i>How Stuff Works</i>. p.&#160;3<span class="reference-accessdate">. Retrieved <span class="nowrap">2011-12-20</span></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=How+Stuff+Works&amp;rft.atitle=How+Wiretapping+Works&amp;rft.pages=3&amp;rft.date=2001-05-08&amp;rft.aulast=Harris&amp;rft.aufirst=Tom&amp;rft_id=http%3A%2F%2Fpeople.howstuffworks.com%2Fwiretapping3.htm&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AWiretapping" class="Z3988"></span></span> </li> <li id="cite_note-4"><span class="mw-cite-backlink"><b><a href="#cite_ref-4">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFHarris2001" class="citation web cs1">Harris, Tom (2001-05-08). <a rel="nofollow" class="external text" href="http://people.howstuffworks.com/wiretapping.htm">"How Wiretapping Works"</a>. <i>How Stuff Works</i><span class="reference-accessdate">. Retrieved <span class="nowrap">2011-12-20</span></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=How+Stuff+Works&amp;rft.atitle=How+Wiretapping+Works&amp;rft.date=2001-05-08&amp;rft.aulast=Harris&amp;rft.aufirst=Tom&amp;rft_id=http%3A%2F%2Fpeople.howstuffworks.com%2Fwiretapping.htm&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AWiretapping" class="Z3988"></span></span> </li> <li id="cite_note-5"><span class="mw-cite-backlink"><b><a href="#cite_ref-5">^</a></b></span> <span class="reference-text"><cite><i>Klass and others v. Federal Republic of Germany</i></cite>,&#32;<a rel="nofollow" class="external text" href="http://www.hrcr.org/safrica/limitations/klass_germany.html">&#32;(Series A, NO 28) (1979–80)&#32;2 EHRR 214</a>&#32;(European Court of Human Rights&#32;1978-09-06).</span> </li> <li id="cite_note-6"><span class="mw-cite-backlink"><b><a href="#cite_ref-6">^</a></b></span> <span class="reference-text"><cite><i>Huvig v. France</i></cite>,&#32;<a rel="nofollow" class="external text" href="http://cambodia.ohchr.org/sites/default/files/echrsource/Huvig%20v.%20France%20%5B24%20Apr%201990%5D%20%5BEN%5D.pdf">&#32;11105/84</a>&#32;(European Court of Human Rights&#32;1990-04-24).</span> </li> <li id="cite_note-7"><span class="mw-cite-backlink"><b><a href="#cite_ref-7">^</a></b></span> <span class="reference-text"><span class="plainlinksneverexpand"><a href="/wiki/Title_50_of_the_United_States_Code" title="Title 50 of the United States Code">50 U.S.C.</a>&#160;<a rel="nofollow" class="external text" href="https://www.law.cornell.edu/uscode/text/50/1805">§&#160;1805</a></span>: <i>Issuance of order</i></span> </li> <li id="cite_note-8"><span class="mw-cite-backlink"><b><a href="#cite_ref-8">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFStevensDoyle2012" class="citation book cs1">Stevens, Gina; Doyle, Charles (2012-10-09). <a rel="nofollow" class="external text" href="https://fas.org/sgp/crs/intel/98-327.pdf"><i>Privacy: An Abbreviated Outline of Federal Statutes Governing Wiretapping and Electronic Eavesdropping</i></a> <span class="cs1-format">(PDF)</span>. Washington, DC: Congressional Research Service. <a rel="nofollow" class="external text" href="https://ghostarchive.org/archive/20221009/https://fas.org/sgp/crs/intel/98-327.pdf">Archived</a> <span class="cs1-format">(PDF)</span> from the original on 2022-10-09<span class="reference-accessdate">. Retrieved <span class="nowrap">2018-01-29</span></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=Privacy%3A+An+Abbreviated+Outline+of+Federal+Statutes+Governing+Wiretapping+and+Electronic+Eavesdropping&amp;rft.place=Washington%2C+DC&amp;rft.pub=Congressional+Research+Service&amp;rft.date=2012-10-09&amp;rft.aulast=Stevens&amp;rft.aufirst=Gina&amp;rft.au=Doyle%2C+Charles&amp;rft_id=https%3A%2F%2Ffas.org%2Fsgp%2Fcrs%2Fintel%2F98-327.pdf&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AWiretapping" class="Z3988"></span></span> </li> <li id="cite_note-9"><span class="mw-cite-backlink"><b><a href="#cite_ref-9">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.versadial.com/the-complicated-legality-of-voice-recording-in-2013/">"The Complicated Legality of Voice Recording in 2013"</a>. <i>Versadial Solutions</i>. 2019-05-24<span class="reference-accessdate">. Retrieved <span class="nowrap">2018-01-20</span></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=Versadial+Solutions&amp;rft.atitle=The+Complicated+Legality+of+Voice+Recording+in+2013&amp;rft.date=2019-05-24&amp;rft_id=https%3A%2F%2Fwww.versadial.com%2Fthe-complicated-legality-of-voice-recording-in-2013%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AWiretapping" class="Z3988"></span></span> </li> <li id="cite_note-10"><span class="mw-cite-backlink"><b><a href="#cite_ref-10">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.epic.org/privacy/consumer/states.html">"Privacy Laws by State"</a>. <i>Electronic Privacy Information Center</i><span class="reference-accessdate">. Retrieved <span class="nowrap">2018-01-20</span></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=Electronic+Privacy+Information+Center&amp;rft.atitle=Privacy+Laws+by+State&amp;rft_id=http%3A%2F%2Fwww.epic.org%2Fprivacy%2Fconsumer%2Fstates.html&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AWiretapping" class="Z3988"></span></span> </li> <li id="cite_note-11"><span class="mw-cite-backlink"><b><a href="#cite_ref-11">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFParry2014" class="citation web cs1">Parry, Zachariah B. (2014-05-09). <a rel="nofollow" class="external text" href="http://pickardparry.com/2014/04/is-it-legal-to-record-a-conversation/">"Is It Legal to Record a Conversation in Nevada Without the Other Party's Consent? Is It Legal to Record a Conversation in Nevada Without the Other Party's Consent?"</a>. <i>Parry &amp; Pfau</i><span class="reference-accessdate">. Retrieved <span class="nowrap">2015-01-24</span></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=Parry+%26+Pfau&amp;rft.atitle=Is+It+Legal+to+Record+a+Conversation+in+Nevada+Without+the+Other+Party%27s+Consent%3F+Is+It+Legal+to+Record+a+Conversation+in+Nevada+Without+the+Other+Party%27s+Consent%3F&amp;rft.date=2014-05-09&amp;rft.aulast=Parry&amp;rft.aufirst=Zachariah+B.&amp;rft_id=http%3A%2F%2Fpickardparry.com%2F2014%2F04%2Fis-it-legal-to-record-a-conversation%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AWiretapping" class="Z3988"></span></span> </li> <li id="cite_note-12"><span class="mw-cite-backlink"><b><a href="#cite_ref-12">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://www.callcorder.com/phone-recording-law-america.htm">"United States Telephone Recording Laws"</a>. <i>Call Corder</i><span class="reference-accessdate">. Retrieved <span class="nowrap">2011-12-20</span></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=Call+Corder&amp;rft.atitle=United+States+Telephone+Recording+Laws&amp;rft_id=http%3A%2F%2Fwww.callcorder.com%2Fphone-recording-law-america.htm&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AWiretapping" class="Z3988"></span></span> </li> <li id="cite_note-13"><span class="mw-cite-backlink"><b><a href="#cite_ref-13">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFRasmussenKomperdaBaldino2012" class="citation web cs1">Rasmussen, Kirsten; Komperda, Jack; Baldino, Raymond (Summer 2012). <a rel="nofollow" class="external text" href="https://www.rcfp.org/wp-content/uploads/imported/RECORDING.pdf">"Reporter's Recording Guide"</a> <span class="cs1-format">(PDF)</span>. The Reporters Committee for Freedom of the Press. <a rel="nofollow" class="external text" href="https://ghostarchive.org/archive/20221009/https://www.rcfp.org/wp-content/uploads/imported/RECORDING.pdf">Archived</a> <span class="cs1-format">(PDF)</span> from the original on 2022-10-09<span class="reference-accessdate">. Retrieved <span class="nowrap">2018-01-20</span></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Reporter%27s+Recording+Guide&amp;rft.pub=The+Reporters+Committee+for+Freedom+of+the+Press&amp;rft.date=2012&amp;rft.aulast=Rasmussen&amp;rft.aufirst=Kirsten&amp;rft.au=Komperda%2C+Jack&amp;rft.au=Baldino%2C+Raymond&amp;rft_id=https%3A%2F%2Fwww.rcfp.org%2Fwp-content%2Fuploads%2Fimported%2FRECORDING.pdf&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AWiretapping" class="Z3988"></span></span> </li> <li id="cite_note-14"><span class="mw-cite-backlink"><b><a href="#cite_ref-14">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFSomaNicholsMaishRogers2005" class="citation journal cs1">Soma, John T.; Nichols, Maury M.; Maish, Lance A.; Rogers, Jon David (Winter 2005). <span class="id-lock-subscription" title="Paid subscription required"><a rel="nofollow" class="external text" href="https://link.gale.com/apps/doc/A139431581/ITOF">"Balance of privacy vs. security: a historical perspective of the USA PATRIOT Act"</a></span>. <i>Rutgers Computer &amp; Technology Law Journal</i>. <b>31</b> (2). Newark: Rutgers University School of Law: 285–346. <a href="/wiki/ISSN_(identifier)" class="mw-redirect" title="ISSN (identifier)">ISSN</a>&#160;<a rel="nofollow" class="external text" href="https://search.worldcat.org/issn/0735-8938">0735-8938</a>. GALE|A139431581 &#8211; via Gale General OneFile.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Rutgers+Computer+%26+Technology+Law+Journal&amp;rft.atitle=Balance+of+privacy+vs.+security%3A+a+historical+perspective+of+the+USA+PATRIOT+Act&amp;rft.ssn=winter&amp;rft.volume=31&amp;rft.issue=2&amp;rft.pages=285-346&amp;rft.date=2005&amp;rft.issn=0735-8938&amp;rft.aulast=Soma&amp;rft.aufirst=John+T.&amp;rft.au=Nichols%2C+Maury+M.&amp;rft.au=Maish%2C+Lance+A.&amp;rft.au=Rogers%2C+Jon+David&amp;rft_id=https%3A%2F%2Flink.gale.com%2Fapps%2Fdoc%2FA139431581%2FITOF&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AWiretapping" class="Z3988"></span></span> </li> <li id="cite_note-15"><span class="mw-cite-backlink"><b><a href="#cite_ref-15">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFSlobogin2002" class="citation journal cs1">Slobogin, Christopher (2002). <span class="id-lock-subscription" title="Paid subscription required"><a rel="nofollow" class="external text" href="https://heinonline.org/HOL/P?h=hein.journals/mislj72&amp;i=227">"Public Privacy: Camera Surveillance of Public Places and the Right to Anonymity"</a></span>. <i>Mississippi Law Journal</i>. <b>72</b>: 213–316 &#8211; via HeinOnline.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Mississippi+Law+Journal&amp;rft.atitle=Public+Privacy%3A+Camera+Surveillance+of+Public+Places+and+the+Right+to+Anonymity&amp;rft.volume=72&amp;rft.pages=213-316&amp;rft.date=2002&amp;rft.aulast=Slobogin&amp;rft.aufirst=Christopher&amp;rft_id=https%3A%2F%2Fheinonline.org%2FHOL%2FP%3Fh%3Dhein.journals%2Fmislj72%26i%3D227&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AWiretapping" class="Z3988"></span></span> </li> <li id="cite_note-C-55_leg_sum-16"><span class="mw-cite-backlink">^ <a href="#cite_ref-C-55_leg_sum_16-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-C-55_leg_sum_16-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFKirkbyValiquet2013" class="citation web cs1">Kirkby, Cynthia; Valiquet, Dominique (2013-02-26). <a rel="nofollow" class="external text" href="https://lop.parl.ca/sites/PublicWebsite/default/en_CA/ResearchPublications/LegislativeSummaries/411C55E">"Legislative Summary of Bill C-55: An Act to amend the Criminal Code (Response to the Supreme Court of Canada Decision in R. v. Tse Act)"</a>. <i>Legal and Legislative Affairs Division, Parliamentary Information and Research Service</i>. Library of Parliament. 41-1-C-55-E.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=Legal+and+Legislative+Affairs+Division%2C+Parliamentary+Information+and+Research+Service&amp;rft.atitle=Legislative+Summary+of+Bill+C-55%3A+An+Act+to+amend+the+Criminal+Code+%28Response+to+the+Supreme+Court+of+Canada+Decision+in+R.+v.+Tse+Act%29&amp;rft.date=2013-02-26&amp;rft.aulast=Kirkby&amp;rft.aufirst=Cynthia&amp;rft.au=Valiquet%2C+Dominique&amp;rft_id=https%3A%2F%2Flop.parl.ca%2Fsites%2FPublicWebsite%2Fdefault%2Fen_CA%2FResearchPublications%2FLegislativeSummaries%2F411C55E&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AWiretapping" class="Z3988"></span></span> </li> <li id="cite_note-17"><span class="mw-cite-backlink"><b><a href="#cite_ref-17">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20170207020150/http://www.freelegalhelp.ca/evidence.html">"Rules of Evidence"</a>. Archived from <a rel="nofollow" class="external text" href="http://www.freelegalhelp.ca/evidence.html">the original</a> on 2017-02-07.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Rules+of+Evidence&amp;rft_id=http%3A%2F%2Fwww.freelegalhelp.ca%2Fevidence.html&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AWiretapping" class="Z3988"></span></span> </li> <li id="cite_note-18"><span class="mw-cite-backlink"><b><a href="#cite_ref-18">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://dot.gov.in/act-rules/act-rules-content/act-rules-content/act-rules-content/act-rules-content/2423">"Acts &amp; Rules"</a>. <i>Department of Telecommunications</i>. Government of India Ministry of Communications<span class="reference-accessdate">. Retrieved <span class="nowrap">2016-03-06</span></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=Department+of+Telecommunications&amp;rft.atitle=Acts+%26+Rules&amp;rft_id=http%3A%2F%2Fdot.gov.in%2Fact-rules%2Fact-rules-content%2Fact-rules-content%2Fact-rules-content%2Fact-rules-content%2F2423&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AWiretapping" class="Z3988"></span></span> </li> <li id="cite_note-19"><span class="mw-cite-backlink"><b><a href="#cite_ref-19">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://www.loksabha.nic.in">"Parliament of India, Lok Sabha"</a><span class="reference-accessdate">. Retrieved <span class="nowrap">2016-03-06</span></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Parliament+of+India%2C+Lok+Sabha&amp;rft_id=http%3A%2F%2Fwww.loksabha.nic.in&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AWiretapping" class="Z3988"></span></span> </li> <li id="cite_note-20"><span class="mw-cite-backlink"><b><a href="#cite_ref-20">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20150430215325/http://gangothri.org/?q=node/7">"Telephone Tapping in India&#160;: Legal Provisions"</a>. <i>Gangothri.org</i>. 2013-04-11. Archived from <a rel="nofollow" class="external text" href="http://gangothri.org/?q=node/7">the original</a> on 2015-04-30<span class="reference-accessdate">. Retrieved <span class="nowrap">2018-01-20</span></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=Gangothri.org&amp;rft.atitle=Telephone+Tapping+in+India+%3A+Legal+Provisions&amp;rft.date=2013-04-11&amp;rft_id=http%3A%2F%2Fgangothri.org%2F%3Fq%3Dnode%2F7&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AWiretapping" class="Z3988"></span></span> </li> <li id="cite_note-21"><span class="mw-cite-backlink"><b><a href="#cite_ref-21">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFArun2017" class="citation journal cs1">Arun, P. (2017). "Surveillance and democracy in India: Analysing challenges to constitutionalism and rule of law". <i>Journal of Public Affairs and Change</i>. <b>1</b>: 47–59 &#8211; via jpac.in.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Journal+of+Public+Affairs+and+Change&amp;rft.atitle=Surveillance+and+democracy+in+India%3A+Analysing+challenges+to+constitutionalism+and+rule+of+law&amp;rft.volume=1&amp;rft.pages=47-59&amp;rft.date=2017&amp;rft.aulast=Arun&amp;rft.aufirst=P.&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AWiretapping" class="Z3988"></span></span> </li> <li id="cite_note-auto-22"><span class="mw-cite-backlink">^ <a href="#cite_ref-auto_22-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-auto_22-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFQarar2024" class="citation web cs1">Qarar, Shakeel (July 9, 2024). <a rel="nofollow" class="external text" href="https://www.dawn.com/news/1844810">"Govt formally authorises ISI to 'trace, intercept' calls and messages in 'interest of national security'<span class="cs1-kern-right"></span>"</a>. <i>DAWN.COM</i>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=DAWN.COM&amp;rft.atitle=Govt+formally+authorises+ISI+to+%27trace%2C+intercept%27+calls+and+messages+in+%27interest+of+national+security%27&amp;rft.date=2024-07-09&amp;rft.aulast=Qarar&amp;rft.aufirst=Shakeel&amp;rft_id=https%3A%2F%2Fwww.dawn.com%2Fnews%2F1844810&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AWiretapping" class="Z3988"></span></span> </li> <li id="cite_note-23"><span class="mw-cite-backlink"><b><a href="#cite_ref-23">^</a></b></span> <span class="reference-text"><a href="/wiki/Act_of_Congress#Public_law,_private_law,_designation" title="Act of Congress"><abbr title="Public Law">Pub. L.</abbr></a>&#160;<a rel="nofollow" class="external text" href="https://uslaw.link/citation/us-law/public/103/414">103–414</a> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation cs1"><span class="cs1-ws-icon" title="s:Communications Assistance for Law Enforcement Act of 1994"><a class="external text" href="https://en.wikisource.org/wiki/Communications_Assistance_for_Law_Enforcement_Act_of_1994"><i>Communications Assistance for Law Enforcement Act of 1994</i>&#160;</a></span> &#8211; via <a href="/wiki/Wikisource" title="Wikisource">Wikisource</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=Communications+Assistance+for+Law+Enforcement+Act+of+1994&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AWiretapping" class="Z3988"></span></span> </li> <li id="cite_note-24"><span class="mw-cite-backlink"><b><a href="#cite_ref-24">^</a></b></span> <span class="reference-text"><style data-mw-deduplicate="TemplateStyles:r1041539562">.mw-parser-output .citation{word-wrap:break-word}.mw-parser-output .citation:target{background-color:rgba(0,127,255,0.133)}</style><span class="citation patent" id="CITEREFWayne_HoweDale_Malik1996"><a rel="nofollow" class="external text" href="https://worldwide.espacenet.com/textdoc?DB=EPODOC&amp;IDX=US5590171">US&#32;patent 5590171</a>,&#32;Wayne Howe&#32;&amp;&#32;Dale Malik,&#32;"Method and apparatus for communications monitoring",&#32;published 1996-12-31,&#32; assigned to Bellsouth Corporation</span><span class="Z3988" title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Apatent&amp;rft.number=5590171&amp;rft.cc=US&amp;rft.title=Method+and+apparatus+for+communications+monitoring&amp;rft.inventor=Wayne+Howe&amp;rft.assignee=Bellsouth+Corporation&amp;rft.appldate=1995-08-21&amp;rft.pubdate=1996-12-31"><span style="display: none;">&#160;</span></span></span> </li> <li id="cite_note-25"><span class="mw-cite-backlink"><b><a href="#cite_ref-25">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFMcCullagh2006" class="citation news cs1">McCullagh, Declan (2006-12-04). <a rel="nofollow" class="external text" href="http://news.cnet.com/2100-1029_3-6140191.html">"FBI taps cell phone mic as eavesdropping tool"</a>. <i>CNET</i><span class="reference-accessdate">. Retrieved <span class="nowrap">2010-06-24</span></span>. <q>The FBI appears to have begun using a novel form of electronic surveillance in criminal investigations: remotely activating a mobile phone's microphone and using it to eavesdrop on nearby conversations. […] Kaplan's opinion said that the eavesdropping technique "functioned whether the phone was powered on or off." Some handsets can't be fully powered down without removing the battery; for instance, some Nokia models will wake up when turned off if an alarm is set.</q></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=CNET&amp;rft.atitle=FBI+taps+cell+phone+mic+as+eavesdropping+tool&amp;rft.date=2006-12-04&amp;rft.aulast=McCullagh&amp;rft.aufirst=Declan&amp;rft_id=http%3A%2F%2Fnews.cnet.com%2F2100-1029_3-6140191.html&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AWiretapping" class="Z3988"></span></span> </li> <li id="cite_note-26"><span class="mw-cite-backlink"><b><a href="#cite_ref-26">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20120111100456/http://www.privacyrights.org/fs/fs9-wrtp.htm">"Fact Sheet 9: Wiretapping and Eavesdropping on Telephone Calls"</a>. <i>Privacy Rights Clearinghouse</i>. May 2010. Archived from <a rel="nofollow" class="external text" href="http://www.privacyrights.org/fs/fs9-wrtp.htm">the original</a> on 2012-01-11<span class="reference-accessdate">. Retrieved <span class="nowrap">2011-12-20</span></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=Privacy+Rights+Clearinghouse&amp;rft.atitle=Fact+Sheet+9%3A+Wiretapping+and+Eavesdropping+on+Telephone+Calls&amp;rft.date=2010-05&amp;rft_id=http%3A%2F%2Fwww.privacyrights.org%2Ffs%2Ffs9-wrtp.htm&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AWiretapping" class="Z3988"></span></span> </li> <li id="cite_note-27"><span class="mw-cite-backlink"><b><a href="#cite_ref-27">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFKenney" class="citation web cs1">Kenney, Crystal. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20100613151434/http://www.eece.maine.edu/research/gk12/Files%20for%20PM/CrystalKenney/telecoil_module.pdf">"Telecoil Experiment"</a> <span class="cs1-format">(PDF)</span>. Archived from <a rel="nofollow" class="external text" href="http://www.eece.maine.edu/research/gk12/Files%20for%20PM/CrystalKenney/telecoil_module.pdf">the original</a> <span class="cs1-format">(PDF)</span> on 2010-06-13<span class="reference-accessdate">. Retrieved <span class="nowrap">2011-12-20</span></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Telecoil+Experiment&amp;rft.aulast=Kenney&amp;rft.aufirst=Crystal&amp;rft_id=http%3A%2F%2Fwww.eece.maine.edu%2Fresearch%2Fgk12%2FFiles%2520for%2520PM%2FCrystalKenney%2Ftelecoil_module.pdf&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AWiretapping" class="Z3988"></span></span> </li> <li id="cite_note-28"><span class="mw-cite-backlink"><b><a href="#cite_ref-28">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20120905024651/https://www.olympus.co.uk/consumer/2587_TP-7_Telephone_Pick-up.htm">"An example of an in-ear telephone recording microphone"</a>. <i>Olympus</i>. Archived from <a rel="nofollow" class="external text" href="http://www.olympus.co.uk/consumer/2587_TP-7_Telephone_Pick-up.htm">the original</a> on 2012-09-05<span class="reference-accessdate">. Retrieved <span class="nowrap">2011-12-20</span></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=Olympus&amp;rft.atitle=An+example+of+an+in-ear+telephone+recording+microphone&amp;rft_id=http%3A%2F%2Fwww.olympus.co.uk%2Fconsumer%2F2587_TP-7_Telephone_Pick-up.htm&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AWiretapping" class="Z3988"></span></span> </li> <li id="cite_note-29"><span class="mw-cite-backlink"><b><a href="#cite_ref-29">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFBiswasGalibMamun2009" class="citation thesis cs1">Biswas, Debobroto; Galib, Saad Yosuf; Mamun, Noor Hossain (August 2009). <a rel="nofollow" class="external text" href="http://www.spyphonetap.com/Debobroto,.pdf"><i>Performance Analysis of Optical CDMA in Transmission Systems</i></a> <span class="cs1-format">(PDF)</span> (Bachelor of Science in Electronics and Communication Engineering thesis). BRAC University. p.&#160;14. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20161118040431/http://www.spyphonetap.com/Debobroto,.pdf">Archived</a> <span class="cs1-format">(PDF)</span> from the original on 2016-11-18<span class="reference-accessdate">. Retrieved <span class="nowrap">2014-07-22</span></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Adissertation&amp;rft.title=Performance+Analysis+of+Optical+CDMA+in+Transmission+Systems&amp;rft.degree=Bachelor+of+Science+in+Electronics+and+Communication+Engineering&amp;rft.inst=BRAC+University&amp;rft.date=2009-08&amp;rft.aulast=Biswas&amp;rft.aufirst=Debobroto&amp;rft.au=Galib%2C+Saad+Yosuf&amp;rft.au=Mamun%2C+Noor+Hossain&amp;rft_id=http%3A%2F%2Fwww.spyphonetap.com%2FDebobroto%2C.pdf&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AWiretapping" class="Z3988"></span></span> </li> <li id="cite_note-30"><span class="mw-cite-backlink"><b><a href="#cite_ref-30">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.private-investigators-uk.com/detectives/how-to-become/introduction-load-coils-bridge-taps/">"An Introduction to Load Coils and Bridge Taps"</a>. <i>Private Investigators UK</i>. 2011-07-22<span class="reference-accessdate">. Retrieved <span class="nowrap">2014-07-22</span></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=Private+Investigators+UK&amp;rft.atitle=An+Introduction+to+Load+Coils+and+Bridge+Taps&amp;rft.date=2011-07-22&amp;rft_id=https%3A%2F%2Fwww.private-investigators-uk.com%2Fdetectives%2Fhow-to-become%2Fintroduction-load-coils-bridge-taps%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AWiretapping" class="Z3988"></span></span> </li> <li id="cite_note-31"><span class="mw-cite-backlink"><b><a href="#cite_ref-31">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFChartrand2004" class="citation book cs1">Chartrand, Mark R. (2004). <i>Satellite communications for the nonspecialist</i>. Belingham, WA: SPIE Press. p.&#160;136. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/0819451851" title="Special:BookSources/0819451851"><bdi>0819451851</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=Satellite+communications+for+the+nonspecialist&amp;rft.place=Belingham%2C+WA&amp;rft.pages=136&amp;rft.pub=SPIE+Press&amp;rft.date=2004&amp;rft.isbn=0819451851&amp;rft.aulast=Chartrand&amp;rft.aufirst=Mark+R.&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AWiretapping" class="Z3988"></span></span> </li> <li id="cite_note-32"><span class="mw-cite-backlink"><b><a href="#cite_ref-32">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFKelly2013" class="citation news cs1">Kelly, John (2013-12-08). <a rel="nofollow" class="external text" href="https://www.usatoday.com/story/news/nation/2013/12/08/cellphone-data-spying-nsa-police/3902809/">"Cellphone data spying: It's not just the NSA"</a>. <i>USA Today</i>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20140722070610/https://www.usatoday.com/story/news/nation/2013/12/08/cellphone-data-spying-nsa-police/3902809/">Archived</a> from the original on 2014-07-22<span class="reference-accessdate">. Retrieved <span class="nowrap">2014-07-22</span></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=USA+Today&amp;rft.atitle=Cellphone+data+spying%3A+It%27s+not+just+the+NSA&amp;rft.date=2013-12-08&amp;rft.aulast=Kelly&amp;rft.aufirst=John&amp;rft_id=https%3A%2F%2Fwww.usatoday.com%2Fstory%2Fnews%2Fnation%2F2013%2F12%2F08%2Fcellphone-data-spying-nsa-police%2F3902809%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AWiretapping" class="Z3988"></span></span> </li> <li id="cite_note-33"><span class="mw-cite-backlink"><b><a href="#cite_ref-33">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.aclu.org/protecting-civil-liberties-digital-age/cell-phone-location-tracking-public-records-request">"Cell Phone Location Tracking Public Records Request"</a>. <i>American Civil Liberties Union</i>. 2013-03-25<span class="reference-accessdate">. Retrieved <span class="nowrap">2014-07-22</span></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=American+Civil+Liberties+Union&amp;rft.atitle=Cell+Phone+Location+Tracking+Public+Records+Request&amp;rft.date=2013-03-25&amp;rft_id=https%3A%2F%2Fwww.aclu.org%2Fprotecting-civil-liberties-digital-age%2Fcell-phone-location-tracking-public-records-request&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AWiretapping" class="Z3988"></span></span> </li> <li id="cite_note-34"><span class="mw-cite-backlink"><b><a href="#cite_ref-34">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation pressrelease cs1"><a rel="nofollow" class="external text" href="https://www.justice.gov/archive/opa/pr/1996/March96/146.txt">"Federal Cybersleuthers Armed With First Ever Computer Wiretap Order Net International hacker Charged With Illegally Entering Harvard and U.S. Military Computers"</a> (Press release). Washington, D.C.: US Department of Justice. 1996-03-29<span class="reference-accessdate">. Retrieved <span class="nowrap">2019-11-03</span></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Federal+Cybersleuthers+Armed+With+First+Ever+Computer+Wiretap+Order+Net+International+hacker+Charged+With+Illegally+Entering+Harvard+and+U.S.+Military+Computers&amp;rft.place=Washington%2C+D.C.&amp;rft.pub=US+Department+of+Justice&amp;rft.date=1996-03-29&amp;rft_id=https%3A%2F%2Fwww.justice.gov%2Farchive%2Fopa%2Fpr%2F1996%2FMarch96%2F146.txt&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AWiretapping" class="Z3988"></span></span> </li> <li id="cite_note-35"><span class="mw-cite-backlink"><b><a href="#cite_ref-35">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation pressrelease cs1"><a rel="nofollow" class="external text" href="https://fas.org/irp/news/1998/05/arditasnt.htm">"Argentine Computer Hacker Agrees to Waive Extradition and Returns to Plead Guilty to Felony Charges in Boston"</a> (Press release). Boston, MA: US Department of Justice. 1998-05-19<span class="reference-accessdate">. Retrieved <span class="nowrap">2019-11-03</span></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Argentine+Computer+Hacker+Agrees+to+Waive+Extradition+and+Returns+to+Plead+Guilty+to+Felony+Charges+in+Boston&amp;rft.place=Boston%2C+MA&amp;rft.pub=US+Department+of+Justice&amp;rft.date=1998-05-19&amp;rft_id=https%3A%2F%2Ffas.org%2Firp%2Fnews%2F1998%2F05%2Farditasnt.htm&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AWiretapping" class="Z3988"></span></span> </li> <li id="cite_note-36"><span class="mw-cite-backlink"><b><a href="#cite_ref-36">^</a></b></span> <span class="reference-text"><cite><i>American Council on Education v. Federal Communications Commission and Verizon Telephone Companies</i></cite>,&#32;<a rel="nofollow" class="external text" href="https://fjallfoss.fcc.gov/edocs_public/attachmatch/DOC-266204A1.pdf">&#32;05-1404</a>&#32;(D.C. Cir.&#32;2006-06-09),&#32;<a rel="nofollow" class="external text" href="https://ghostarchive.org/archive/20221009/http://fjallfoss.fcc.gov/edocs_public/attachmatch/DOC-266204A1.pdf">archived</a> from the original&#32;on 2022-10-09.</span> </li> <li id="cite_note-37"><span class="mw-cite-backlink"><b><a href="#cite_ref-37">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFRisenLichtblau2009" class="citation news cs1">Risen, James; Lichtblau, Eric (2009-01-15). <a rel="nofollow" class="external text" href="https://www.nytimes.com/2009/01/16/washington/16fisa.html?_r=2&amp;hp">"Court Affirms Wiretapping Without Warrant"</a>. <i>The New York Times</i>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=The+New+York+Times&amp;rft.atitle=Court+Affirms+Wiretapping+Without+Warrant&amp;rft.date=2009-01-15&amp;rft.aulast=Risen&amp;rft.aufirst=James&amp;rft.au=Lichtblau%2C+Eric&amp;rft_id=https%3A%2F%2Fwww.nytimes.com%2F2009%2F01%2F16%2Fwashington%2F16fisa.html%3F_r%3D2%26hp&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AWiretapping" class="Z3988"></span></span> </li> <li id="cite_note-38"><span class="mw-cite-backlink"><b><a href="#cite_ref-38">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation cs1"><a rel="nofollow" class="external text" href="https://datatracker.ietf.org/doc/html/rfc2804"><i>IETF Policy on Wiretapping</i></a>. <a href="/wiki/Internet_Engineering_Task_Force" title="Internet Engineering Task Force">IETF</a>. May 2000. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<span class="id-lock-free" title="Freely accessible"><a rel="nofollow" class="external text" href="https://doi.org/10.17487%2FRFC2804">10.17487/RFC2804</a></span>. <a href="/wiki/Request_for_Comments" title="Request for Comments">RFC</a> <a rel="nofollow" class="external text" href="https://datatracker.ietf.org/doc/html/rfc2804">2804</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=IETF+Policy+on+Wiretapping&amp;rft.pub=IETF&amp;rft.date=2000-05&amp;rft_id=info%3Adoi%2F10.17487%2F&#82;FC2804&amp;rft_id=https%3A%2F%2Fdatatracker.ietf.org%2Fdoc%2Fhtml%2Frfc2804&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AWiretapping" class="Z3988"></span></span> </li> <li id="cite_note-39"><span class="mw-cite-backlink"><b><a href="#cite_ref-39">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20061101160012/http://www.grape-info.com/doc/linux/config/aircrack-ng-0.6.html">"Aircrack-ng (WEP, WPA-PSK Crack)"</a>. Archived from <a rel="nofollow" class="external text" href="http://www.grape-info.com/doc/linux/config/aircrack-ng-0.6.html">the original</a> on 2006-11-01<span class="reference-accessdate">. Retrieved <span class="nowrap">2014-07-22</span></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Aircrack-ng+%28WEP%2C+WPA-PSK+Crack%29&amp;rft_id=http%3A%2F%2Fwww.grape-info.com%2Fdoc%2Flinux%2Fconfig%2Faircrack-ng-0.6.html&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AWiretapping" class="Z3988"></span></span> </li> <li id="cite_note-40"><span class="mw-cite-backlink"><b><a href="#cite_ref-40">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFWeiss2006" class="citation web cs1">Weiss, Aaron (2006-03-30). <a rel="nofollow" class="external text" href="https://web.archive.org/web/20140727001900/http://www.wi-fiplanet.com/tutorials/article.php/3595531">"Introduction to Kismet"</a>. <i>Wi-Fi Planet</i>. Archived from <a rel="nofollow" class="external text" href="http://www.wi-fiplanet.com/tutorials/article.php/3595531">the original</a> on 2014-07-27<span class="reference-accessdate">. Retrieved <span class="nowrap">2014-07-22</span></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=Wi-Fi+Planet&amp;rft.atitle=Introduction+to+Kismet&amp;rft.date=2006-03-30&amp;rft.aulast=Weiss&amp;rft.aufirst=Aaron&amp;rft_id=http%3A%2F%2Fwww.wi-fiplanet.com%2Ftutorials%2Farticle.php%2F3595531&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AWiretapping" class="Z3988"></span></span> </li> <li id="cite_note-41"><span class="mw-cite-backlink"><b><a href="#cite_ref-41">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFFlaherty2013" class="citation news cs1">Flaherty, Anne (2013-07-10). <a rel="nofollow" class="external text" href="https://apnews.com/0538d9746fdd4126b0e700a963f92df4">"The price of surveillance: US gov't pays to snoop"</a>. <i>AP News</i>. Washington: Associated Press<span class="reference-accessdate">. Retrieved <span class="nowrap">2019-11-03</span></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=AP+News&amp;rft.atitle=The+price+of+surveillance%3A+US+gov%27t+pays+to+snoop&amp;rft.date=2013-07-10&amp;rft.aulast=Flaherty&amp;rft.aufirst=Anne&amp;rft_id=https%3A%2F%2Fapnews.com%2F0538d9746fdd4126b0e700a963f92df4&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AWiretapping" class="Z3988"></span></span> </li> <li id="cite_note-42"><span class="mw-cite-backlink"><b><a href="#cite_ref-42">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFMessmer2013" class="citation web cs1">Messmer, Ellen (2013-10-29). <a rel="nofollow" class="external text" href="https://www.networkworld.com/article/2171269/apple-ios-apps-subject-to-man-in-the-middle-attacks.html">"Apple iOS Apps Subject to Man-in-the-Middle Attacks"</a>. <i>Network World</i><span class="reference-accessdate">. Retrieved <span class="nowrap">2014-07-22</span></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=Network+World&amp;rft.atitle=Apple+iOS+Apps+Subject+to+Man-in-the-Middle+Attacks&amp;rft.date=2013-10-29&amp;rft.aulast=Messmer&amp;rft.aufirst=Ellen&amp;rft_id=https%3A%2F%2Fwww.networkworld.com%2Farticle%2F2171269%2Fapple-ios-apps-subject-to-man-in-the-middle-attacks.html&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AWiretapping" class="Z3988"></span></span> </li> <li id="cite_note-43"><span class="mw-cite-backlink"><b><a href="#cite_ref-43">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFWang2007" class="citation thesis cs1">Wang, Zidu (2007-12-07). <a rel="nofollow" class="external text" href="https://www.slideshare.net/Garry54/crypto-phones"><i>Crypto Phones</i></a> (Thesis). Ruhr University Bochum<span class="reference-accessdate">. Retrieved <span class="nowrap">2014-07-22</span></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Adissertation&amp;rft.title=Crypto+Phones&amp;rft.inst=Ruhr+University+Bochum&amp;rft.date=2007-12-07&amp;rft.aulast=Wang&amp;rft.aufirst=Zidu&amp;rft_id=http%3A%2F%2Fwww.slideshare.net%2FGarry54%2Fcrypto-phones&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AWiretapping" class="Z3988"></span></span> </li> <li id="cite_note-44"><span class="mw-cite-backlink"><b><a href="#cite_ref-44">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFBronk2008" class="citation journal cs1">Bronk, Chris (2008-11-05). <a rel="nofollow" class="external text" href="https://doi.org/10.5210%2Ffm.v13i11.2192">"Webtapping: Securing the Internet to save us from transnational terror?"</a>. <i>First Monday</i>. <b>13</b> (11). <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<span class="id-lock-free" title="Freely accessible"><a rel="nofollow" class="external text" href="https://doi.org/10.5210%2Ffm.v13i11.2192">10.5210/fm.v13i11.2192</a></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=First+Monday&amp;rft.atitle=Webtapping%3A+Securing+the+Internet+to+save+us+from+transnational+terror%3F&amp;rft.volume=13&amp;rft.issue=11&amp;rft.date=2008-11-05&amp;rft_id=info%3Adoi%2F10.5210%2Ffm.v13i11.2192&amp;rft.aulast=Bronk&amp;rft.aufirst=Chris&amp;rft_id=https%3A%2F%2Fdoi.org%2F10.5210%252Ffm.v13i11.2192&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AWiretapping" class="Z3988"></span></span> </li> <li id="cite_note-45"><span class="mw-cite-backlink"><b><a href="#cite_ref-45">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFHarper2013" class="citation web cs1">Harper, Michael (2013-09-11). <a rel="nofollow" class="external text" href="http://www.redorbit.com/news/technology/1112945042/google-wiretapping-charges-upheld-091113/">"Google Wiretapping Charges Are Legit, Says US Appeals Court"</a>. <i>Redorbit</i><span class="reference-accessdate">. Retrieved <span class="nowrap">2013-09-11</span></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=Redorbit&amp;rft.atitle=Google+Wiretapping+Charges+Are+Legit%2C+Says+US+Appeals+Court&amp;rft.date=2013-09-11&amp;rft.aulast=Harper&amp;rft.aufirst=Michael&amp;rft_id=http%3A%2F%2Fwww.redorbit.com%2Fnews%2Ftechnology%2F1112945042%2Fgoogle-wiretapping-charges-upheld-091113%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AWiretapping" class="Z3988"></span></span> </li> <li id="cite_note-ISSUU-46"><span class="mw-cite-backlink">^ <a href="#cite_ref-ISSUU_46-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-ISSUU_46-1"><sup><i><b>b</b></i></sup></a> <a href="#cite_ref-ISSUU_46-2"><sup><i><b>c</b></i></sup></a> <a href="#cite_ref-ISSUU_46-3"><sup><i><b>d</b></i></sup></a> <a href="#cite_ref-ISSUU_46-4"><sup><i><b>e</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation magazine cs1"><a rel="nofollow" class="external text" href="http://issuu.com/sciam/docs/2008-09_pg58_2?mode=embed&amp;documentId=080820180613-64657d58c38f4897941bc60b292f46d6&amp;layout=grey">"A History of Listening In"</a>. <i>Scientific American</i>. September 2008. pp.&#160;57–59<span class="reference-accessdate">. Retrieved <span class="nowrap">2010-06-01</span></span> &#8211; via Issu.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Scientific+American&amp;rft.atitle=A+History+of+Listening+In&amp;rft.pages=57-59&amp;rft.date=2008-09&amp;rft_id=http%3A%2F%2Fissuu.com%2Fsciam%2Fdocs%2F2008-09_pg58_2%3Fmode%3Dembed%26documentId%3D080820180613-64657d58c38f4897941bc60b292f46d6%26layout%3Dgrey&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AWiretapping" class="Z3988"></span></span> </li> <li id="cite_note-SCIENTIFIC-47"><span class="mw-cite-backlink">^ <a href="#cite_ref-SCIENTIFIC_47-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-SCIENTIFIC_47-1"><sup><i><b>b</b></i></sup></a> <a href="#cite_ref-SCIENTIFIC_47-2"><sup><i><b>c</b></i></sup></a> <a href="#cite_ref-SCIENTIFIC_47-3"><sup><i><b>d</b></i></sup></a> <a href="#cite_ref-SCIENTIFIC_47-4"><sup><i><b>e</b></i></sup></a> <a href="#cite_ref-SCIENTIFIC_47-5"><sup><i><b>f</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFDiffieLandau2008" class="citation magazine cs1">Diffie, Whitfield; Landau, Susan (September 2008). <a rel="nofollow" class="external text" href="http://www.scientificamerican.com/article/internet-eavesdropping/">"Internet Eavesdropping: A Brave New World of Wiretapping"</a>. <i>Scientific American</i><span class="reference-accessdate">. Retrieved <span class="nowrap">2018-10-05</span></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Scientific+American&amp;rft.atitle=Internet+Eavesdropping%3A+A+Brave+New+World+of+Wiretapping&amp;rft.date=2008-09&amp;rft.aulast=Diffie&amp;rft.aufirst=Whitfield&amp;rft.au=Landau%2C+Susan&amp;rft_id=http%3A%2F%2Fwww.scientificamerican.com%2Farticle%2Finternet-eavesdropping%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AWiretapping" class="Z3988"></span></span> </li> <li id="cite_note-48"><span class="mw-cite-backlink"><b><a href="#cite_ref-48">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFStille2008" class="citation magazine cs1">Stille, Alexander (2008-10-27). <a rel="nofollow" class="external text" href="https://www.newyorker.com/magazine/2008/11/03/girls-girls-girls-letter-from-rome-alexander-stille">"Girls! Girls! Girls!"</a>. Letter from Rome. <i>The New Yorker</i> (published 2008-11-03). <a href="/wiki/ISSN_(identifier)" class="mw-redirect" title="ISSN (identifier)">ISSN</a>&#160;<a rel="nofollow" class="external text" href="https://search.worldcat.org/issn/0028-792X">0028-792X</a><span class="reference-accessdate">. Retrieved <span class="nowrap">2019-11-03</span></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=The+New+Yorker&amp;rft.atitle=Girls%21+Girls%21+Girls%21&amp;rft.date=2008-10-27&amp;rft.issn=0028-792X&amp;rft.aulast=Stille&amp;rft.aufirst=Alexander&amp;rft_id=https%3A%2F%2Fwww.newyorker.com%2Fmagazine%2F2008%2F11%2F03%2Fgirls-girls-girls-letter-from-rome-alexander-stille&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AWiretapping" class="Z3988"></span></span> </li> <li id="cite_note-49"><span class="mw-cite-backlink"><b><a href="#cite_ref-49">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFGarrow2002" class="citation magazine cs1">Garrow, David&#160;J. (July–August 2002). <a rel="nofollow" class="external text" href="https://www.theatlantic.com/doc/200207/garrow">"The FBI and Martin Luther King"</a>. <i>The Atlantic</i><span class="reference-accessdate">. Retrieved <span class="nowrap">2010-06-01</span></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=The+Atlantic&amp;rft.atitle=The+FBI+and+Martin+Luther+King&amp;rft.date=2002-07%2F2002-08&amp;rft.aulast=Garrow&amp;rft.aufirst=David+J.&amp;rft_id=https%3A%2F%2Fwww.theatlantic.com%2Fdoc%2F200207%2Fgarrow&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AWiretapping" class="Z3988"></span></span> </li> <li id="cite_note-50"><span class="mw-cite-backlink"><b><a href="#cite_ref-50">^</a></b></span> <span class="reference-text">United States Congress. <i>Joint resolution to authorize the Federal Bureau of Investigation of the Department of Justice to con-duct investigations in the interests of national defense, and ·for that purpose to permit wire tapping in certain cases</i>. H.J.Res. 571. 76th Cong. 2nd sess. House Committee on the Judiciary Rept. No. 2574. <a rel="nofollow" class="external text" href="https://www.govinfo.gov/app/details/GPO-CRECB-1940-pt8-v8686">Cong. Rec. (bound) <b>8300</b></a> (June 14, 1940)</span> </li> <li id="cite_note-51"><span class="mw-cite-backlink"><b><a href="#cite_ref-51">^</a></b></span> <span class="reference-text">United States Congress. <i>An act to amend section 606 of the Communications Act of 1934 for the pur-pose of granting to the President, in time of war or threatened war, certain powers with respect to communications by wire</i>. H.R. 6263. 77th Cong., 2nd sess. House Committee on the Judiciary.</span> </li> <li id="cite_note-52"><span class="mw-cite-backlink"><b><a href="#cite_ref-52">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20150403121612/http://www.uscourts.gov/educational-resources/get-involved/constitution-activities/fourth-amendment/wiretaps-cell-phone-surveillance/facts-case-summary.aspx">"Facts and Case Summary: Katz v. United States"</a>. <i>United States Courts</i>. Archived from <a rel="nofollow" class="external text" href="http://www.uscourts.gov/educational-resources/get-involved/constitution-activities/fourth-amendment/wiretaps-cell-phone-surveillance/facts-case-summary.aspx">the original</a> on 2015-04-03.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=United+States+Courts&amp;rft.atitle=Facts+and+Case+Summary%3A+Katz+v.+United+States&amp;rft_id=http%3A%2F%2Fwww.uscourts.gov%2Feducational-resources%2Fget-involved%2Fconstitution-activities%2Ffourth-amendment%2Fwiretaps-cell-phone-surveillance%2Ffacts-case-summary.aspx&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AWiretapping" class="Z3988"></span></span> </li> <li id="cite_note-53"><span class="mw-cite-backlink"><b><a href="#cite_ref-53">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://it.ojp.gov/default.aspx?area=privacy&amp;page=1284">"Title III of The Omnibus Crime Control and Safe Streets Act of 1968 (Wiretap Act)"</a>. <i>Justice Information Sharing</i>. DHS/Office for Civil Rights and Civil Liberties and the DHS/Privacy Office in cooperation with the DOJ, Office of Justice Programs, Bureau of Justice Assistance<span class="reference-accessdate">. Retrieved <span class="nowrap">2012-03-20</span></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=Justice+Information+Sharing&amp;rft.atitle=Title+III+of+The+Omnibus+Crime+Control+and+Safe+Streets+Act+of+1968+%28Wiretap+Act%29&amp;rft_id=https%3A%2F%2Fit.ojp.gov%2Fdefault.aspx%3Farea%3Dprivacy%26page%3D1284&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AWiretapping" class="Z3988"></span></span> </li> <li id="cite_note-54"><span class="mw-cite-backlink"><b><a href="#cite_ref-54">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.fjc.gov/history/courts/foreign-intelligence-surveillance-court-and-court-review-1978-present">"Foreign Intelligence Surveillance Court and Court of Review, 1978–present"</a>. <i>Federal Judicial Center</i><span class="reference-accessdate">. Retrieved <span class="nowrap">2014-07-22</span></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=Federal+Judicial+Center&amp;rft.atitle=Foreign+Intelligence+Surveillance+Court+and+Court+of+Review%2C+1978%E2%80%93present&amp;rft_id=https%3A%2F%2Fwww.fjc.gov%2Fhistory%2Fcourts%2Fforeign-intelligence-surveillance-court-and-court-review-1978-present&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AWiretapping" class="Z3988"></span></span> </li> <li id="cite_note-55"><span class="mw-cite-backlink"><b><a href="#cite_ref-55">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFEdwards" class="citation web cs1">Edwards, John. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20120711144311/http://www.voip-news.com/feature/guide-calea-030608/">"The Instant Expert Guide to CALEA"</a>. VoIP News. Archived from <a rel="nofollow" class="external text" href="https://it.toolbox.com/blogs/bobley/the-instant-expert-guide-to-calea-072312">the original</a> on 2012-07-11<span class="reference-accessdate">. Retrieved <span class="nowrap">2010-06-01</span></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=The+Instant+Expert+Guide+to+CALEA&amp;rft.pub=VoIP+News&amp;rft.aulast=Edwards&amp;rft.aufirst=John&amp;rft_id=https%3A%2F%2Fit.toolbox.com%2Fblogs%2Fbobley%2Fthe-instant-expert-guide-to-calea-072312&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AWiretapping" class="Z3988"></span></span> </li> <li id="cite_note-56"><span class="mw-cite-backlink"><b><a href="#cite_ref-56">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation news cs1"><a rel="nofollow" class="external text" href="https://www.washingtonpost.com/wp-srv/nation/specials/attacked/transcripts/bushtext_102601.html">"Text: Bush Signs Anti-Terrorism Legislation"</a>. <i>Washington Post</i>. October 25, 2001.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Washington+Post&amp;rft.atitle=Text%3A+Bush+Signs+Anti-Terrorism+Legislation&amp;rft.date=2001-10-25&amp;rft_id=https%3A%2F%2Fwww.washingtonpost.com%2Fwp-srv%2Fnation%2Fspecials%2Fattacked%2Ftranscripts%2Fbushtext_102601.html&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AWiretapping" class="Z3988"></span></span> </li> <li id="cite_note-57"><span class="mw-cite-backlink"><b><a href="#cite_ref-57">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFPoulsen2008" class="citation magazine cs1">Poulsen, Kevin (2008-03-06). <a rel="nofollow" class="external text" href="https://www.wired.com/threatlevel/2008/03/whistleblower-f/">"Whistle-Blower: Feds Have a Backdoor Into Wireless Carrier – Congress Reacts"</a>. Threat Level. <i>WIRED</i><span class="reference-accessdate">. Retrieved <span class="nowrap">2010-06-01</span></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=WIRED&amp;rft.atitle=Whistle-Blower%3A+Feds+Have+a+Backdoor+Into+Wireless+Carrier+%E2%80%93+Congress+Reacts&amp;rft.date=2008-03-06&amp;rft.aulast=Poulsen&amp;rft.aufirst=Kevin&amp;rft_id=https%3A%2F%2Fwww.wired.com%2Fthreatlevel%2F2008%2F03%2Fwhistleblower-f%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AWiretapping" class="Z3988"></span></span> </li> </ol></div> <div class="mw-heading mw-heading2"><h2 id="External_links">External links</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Wiretapping&amp;action=edit&amp;section=19" title="Edit section: External links"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <ul><li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222">RFC&#160;<a rel="nofollow" class="external text" href="https://datatracker.ietf.org/doc/html/rfc2804">2804</a></li> <li><a rel="nofollow" class="external text" href="https://www.nytimes.com/2008/05/05/business/media/05trial.html?">In Pellicano Case, Lessons in Wiretapping Skills</a> <a href="/wiki/NY_Times" class="mw-redirect" title="NY Times">NY Times</a> May 5, 2008</li> <li><a rel="nofollow" class="external text" href="https://www.nytimes.com/2008/05/07/us/07gitmo.html?">Lawyers for Guantanamo Inmates Accuse US of Eavesdropping</a> <a href="/wiki/NY_Times" class="mw-redirect" title="NY Times">NY Times</a> May 7, 2008</li></ul> <div class="navbox-styles"><style data-mw-deduplicate="TemplateStyles:r1129693374">.mw-parser-output .hlist dl,.mw-parser-output .hlist ol,.mw-parser-output .hlist ul{margin:0;padding:0}.mw-parser-output .hlist dd,.mw-parser-output .hlist dt,.mw-parser-output .hlist li{margin:0;display:inline}.mw-parser-output .hlist.inline,.mw-parser-output .hlist.inline dl,.mw-parser-output .hlist.inline ol,.mw-parser-output .hlist.inline ul,.mw-parser-output .hlist dl dl,.mw-parser-output .hlist dl ol,.mw-parser-output .hlist dl ul,.mw-parser-output .hlist ol dl,.mw-parser-output .hlist ol ol,.mw-parser-output .hlist ol ul,.mw-parser-output .hlist ul dl,.mw-parser-output .hlist ul ol,.mw-parser-output .hlist ul ul{display:inline}.mw-parser-output .hlist .mw-empty-li{display:none}.mw-parser-output .hlist dt::after{content:": "}.mw-parser-output .hlist dd::after,.mw-parser-output .hlist li::after{content:" · ";font-weight:bold}.mw-parser-output .hlist dd:last-child::after,.mw-parser-output .hlist dt:last-child::after,.mw-parser-output .hlist li:last-child::after{content:none}.mw-parser-output .hlist dd dd:first-child::before,.mw-parser-output .hlist dd dt:first-child::before,.mw-parser-output .hlist dd li:first-child::before,.mw-parser-output .hlist dt dd:first-child::before,.mw-parser-output .hlist dt dt:first-child::before,.mw-parser-output .hlist dt li:first-child::before,.mw-parser-output .hlist li dd:first-child::before,.mw-parser-output .hlist li dt:first-child::before,.mw-parser-output .hlist li li:first-child::before{content:" (";font-weight:normal}.mw-parser-output .hlist dd dd:last-child::after,.mw-parser-output .hlist dd dt:last-child::after,.mw-parser-output .hlist dd li:last-child::after,.mw-parser-output .hlist dt dd:last-child::after,.mw-parser-output .hlist dt dt:last-child::after,.mw-parser-output .hlist dt li:last-child::after,.mw-parser-output .hlist li dd:last-child::after,.mw-parser-output .hlist li dt:last-child::after,.mw-parser-output .hlist li li:last-child::after{content:")";font-weight:normal}.mw-parser-output .hlist ol{counter-reset:listitem}.mw-parser-output .hlist ol>li{counter-increment:listitem}.mw-parser-output .hlist ol>li::before{content:" "counter(listitem)"\a0 "}.mw-parser-output .hlist dd ol>li:first-child::before,.mw-parser-output .hlist dt ol>li:first-child::before,.mw-parser-output .hlist li ol>li:first-child::before{content:" ("counter(listitem)"\a0 "}</style><style data-mw-deduplicate="TemplateStyles:r1236075235">.mw-parser-output .navbox{box-sizing:border-box;border:1px solid #a2a9b1;width:100%;clear:both;font-size:88%;text-align:center;padding:1px;margin:1em auto 0}.mw-parser-output .navbox .navbox{margin-top:0}.mw-parser-output .navbox+.navbox,.mw-parser-output .navbox+.navbox-styles+.navbox{margin-top:-1px}.mw-parser-output .navbox-inner,.mw-parser-output .navbox-subgroup{width:100%}.mw-parser-output .navbox-group,.mw-parser-output .navbox-title,.mw-parser-output .navbox-abovebelow{padding:0.25em 1em;line-height:1.5em;text-align:center}.mw-parser-output .navbox-group{white-space:nowrap;text-align:right}.mw-parser-output .navbox,.mw-parser-output .navbox-subgroup{background-color:#fdfdfd}.mw-parser-output .navbox-list{line-height:1.5em;border-color:#fdfdfd}.mw-parser-output .navbox-list-with-group{text-align:left;border-left-width:2px;border-left-style:solid}.mw-parser-output tr+tr>.navbox-abovebelow,.mw-parser-output tr+tr>.navbox-group,.mw-parser-output tr+tr>.navbox-image,.mw-parser-output tr+tr>.navbox-list{border-top:2px solid #fdfdfd}.mw-parser-output .navbox-title{background-color:#ccf}.mw-parser-output .navbox-abovebelow,.mw-parser-output .navbox-group,.mw-parser-output .navbox-subgroup .navbox-title{background-color:#ddf}.mw-parser-output .navbox-subgroup .navbox-group,.mw-parser-output .navbox-subgroup .navbox-abovebelow{background-color:#e6e6ff}.mw-parser-output .navbox-even{background-color:#f7f7f7}.mw-parser-output .navbox-odd{background-color:transparent}.mw-parser-output .navbox .hlist td dl,.mw-parser-output .navbox .hlist td ol,.mw-parser-output .navbox .hlist td ul,.mw-parser-output .navbox td.hlist dl,.mw-parser-output .navbox td.hlist ol,.mw-parser-output .navbox td.hlist ul{padding:0.125em 0}.mw-parser-output .navbox .navbar{display:block;font-size:100%}.mw-parser-output .navbox-title .navbar{float:left;text-align:left;margin-right:0.5em}body.skin--responsive .mw-parser-output .navbox-image img{max-width:none!important}@media print{body.ns-0 .mw-parser-output .navbox{display:none!important}}</style><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1129693374"></div><div role="navigation" class="navbox" aria-labelledby="Espionage" style="padding:3px"><table class="nowraplinks mw-collapsible autocollapse navbox-inner" style="border-spacing:0;background:transparent;color:inherit"><tbody><tr><th scope="col" class="navbox-title" colspan="2"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1129693374"><style data-mw-deduplicate="TemplateStyles:r1239400231">.mw-parser-output .navbar{display:inline;font-size:88%;font-weight:normal}.mw-parser-output .navbar-collapse{float:left;text-align:left}.mw-parser-output .navbar-boxtext{word-spacing:0}.mw-parser-output .navbar ul{display:inline-block;white-space:nowrap;line-height:inherit}.mw-parser-output .navbar-brackets::before{margin-right:-0.125em;content:"[ "}.mw-parser-output .navbar-brackets::after{margin-left:-0.125em;content:" ]"}.mw-parser-output .navbar li{word-spacing:-0.125em}.mw-parser-output .navbar a>span,.mw-parser-output .navbar a>abbr{text-decoration:inherit}.mw-parser-output .navbar-mini abbr{font-variant:small-caps;border-bottom:none;text-decoration:none;cursor:inherit}.mw-parser-output .navbar-ct-full{font-size:114%;margin:0 7em}.mw-parser-output .navbar-ct-mini{font-size:114%;margin:0 4em}html.skin-theme-clientpref-night .mw-parser-output .navbar li a abbr{color:var(--color-base)!important}@media(prefers-color-scheme:dark){html.skin-theme-clientpref-os .mw-parser-output .navbar li a abbr{color:var(--color-base)!important}}@media print{.mw-parser-output .navbar{display:none!important}}</style><div class="navbar plainlinks hlist navbar-mini"><ul><li class="nv-view"><a href="/wiki/Template:Espionage" title="Template:Espionage"><abbr title="View this template">v</abbr></a></li><li class="nv-talk"><a href="/wiki/Template_talk:Espionage" title="Template talk:Espionage"><abbr title="Discuss this template">t</abbr></a></li><li class="nv-edit"><a href="/wiki/Special:EditPage/Template:Espionage" title="Special:EditPage/Template:Espionage"><abbr title="Edit this template">e</abbr></a></li></ul></div><div id="Espionage" style="font-size:114%;margin:0 4em"><a href="/wiki/Espionage" title="Espionage">Espionage</a></div></th></tr><tr><th scope="row" class="navbox-group" style="width:1%"><div class="hlist"><ul><li><a href="/wiki/Espionage#Agents_in_espionage" title="Espionage">Agents</a></li><li><a href="/wiki/Asset_(intelligence)" title="Asset (intelligence)">Assets</a></li></ul></div></th><td class="navbox-list-with-group navbox-list navbox-odd hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Agent_handling" title="Agent handling">Agent handling</a></li> <li><i><a href="/wiki/Agent_provocateur" title="Agent provocateur">Agent provocateur</a></i></li> <li><a href="/wiki/Cover_(intelligence_gathering)" title="Cover (intelligence gathering)">Cover</a> <ul><li><a href="/wiki/Covert_agent" title="Covert agent">Agent</a></li></ul></li> <li><a href="/wiki/Double_agent" title="Double agent">Double agent</a></li> <li><a href="/wiki/Field_agent" title="Field agent">Field agent</a></li> <li><a href="/wiki/Mole_(espionage)" title="Mole (espionage)">Mole</a></li> <li><a href="/wiki/Resident_spy" title="Resident spy">Resident spy</a></li> <li><a href="/wiki/Sleeper_agent" title="Sleeper agent">Sleeper agent</a></li> <li><a href="/wiki/Spymaster" class="mw-redirect" title="Spymaster">Spymaster</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Analysis</th><td class="navbox-list-with-group navbox-list navbox-even hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Intelligence_assessment" title="Intelligence assessment">Intelligence assessment</a> <ul><li><a href="/wiki/Analysis_of_competing_hypotheses" title="Analysis of competing hypotheses">competing hypotheses</a></li></ul></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Devices and<br />communications</th><td class="navbox-list-with-group navbox-list navbox-odd hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Burn_notice" title="Burn notice">Burn notice</a></li> <li><a href="/wiki/Concealment_device" title="Concealment device">Concealment device</a></li> <li><a href="/wiki/Covert_listening_device" title="Covert listening device">Covert listening device</a></li> <li><a href="/wiki/Cryptography" title="Cryptography">Cryptography</a></li> <li><a href="/wiki/Cutout_(espionage)" title="Cutout (espionage)">Cutout</a></li> <li><a href="/wiki/Computer_and_network_surveillance" title="Computer and network surveillance">Computer and network surveillance</a></li> <li><a href="/wiki/Cyber_spying" title="Cyber spying">Cyber spying</a></li> <li><a href="/wiki/Dead_drop" title="Dead drop">Dead drop</a></li> <li><a href="/wiki/Invisible_ink" title="Invisible ink">Invisible ink</a></li> <li><a href="/wiki/Numbers_station" title="Numbers station">Numbers station</a></li> <li><a href="/wiki/One-way_voice_link" title="One-way voice link">One-way voice link</a></li> <li><a href="/wiki/Phone_surveillance" title="Phone surveillance">Phone surveillance</a></li> <li><a href="/wiki/Short-range_agent_communications" title="Short-range agent communications">Short-range agent communications</a></li> <li><a href="/wiki/Steganography" title="Steganography">Steganography</a> <ul><li><a href="/wiki/Microdot" title="Microdot">microdot</a></li></ul></li> <li><a href="/wiki/Surveillance_tools" title="Surveillance tools">Surveillance tools</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%"><a href="/wiki/Tradecraft" title="Tradecraft">Tradecraft</a> and<br />techniques</th><td class="navbox-list-with-group navbox-list navbox-even hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Canary_trap" title="Canary trap">Canary trap</a></li> <li><a href="/wiki/Front_organization" title="Front organization">Front organization</a></li> <li><a href="/wiki/Limited_hangout" title="Limited hangout">Limited hangout</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Operations</th><td class="navbox-list-with-group navbox-list navbox-odd hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Chinese_intelligence_activity_abroad" title="Chinese intelligence activity abroad">Chinese intelligence activity abroad</a> <ul><li><a href="/wiki/Chinese_espionage_in_the_United_States" title="Chinese espionage in the United States">Chinese espionage in the United States</a></li></ul></li> <li><a href="/wiki/Cold_War_espionage" title="Cold War espionage">Cold War espionage</a></li> <li><a href="/wiki/Recruitment_of_spies" title="Recruitment of spies">Recruitment</a></li> <li><a href="/wiki/Black_operation" class="mw-redirect" title="Black operation">Black operation</a> <ul><li><a href="/wiki/Black_bag_operation" title="Black bag operation">black bag</a></li> <li><a href="/wiki/Wetwork" title="Wetwork">wetwork</a></li></ul></li> <li><a href="/wiki/Eavesdropping" title="Eavesdropping">Eavesdropping</a> <ul><li><a href="/wiki/Signals_intelligence" title="Signals intelligence">SIGINT</a></li> <li><a href="/wiki/Measurement_and_signature_intelligence" title="Measurement and signature intelligence">MASINT</a></li></ul></li> <li><a href="/wiki/False_flag" title="False flag">False flag</a></li> <li><a href="/wiki/Industrial_espionage" title="Industrial espionage">Industrial espionage</a></li> <li><a href="/wiki/Human_intelligence_(intelligence_gathering)" title="Human intelligence (intelligence gathering)">Interpersonal (HUMINT) intelligence</a> <ul><li><a href="/wiki/Interrogation" title="Interrogation">interrogation</a></li> <li><a href="/wiki/Safe_house" title="Safe house">safe house</a></li></ul></li> <li><a href="/wiki/COINTELPRO" title="COINTELPRO">COINTELPRO</a></li> <li><a href="/wiki/Project_MINARET" title="Project MINARET">MINARET</a></li> <li><a href="/wiki/Project_SHAMROCK" title="Project SHAMROCK">SHAMROCK</a></li> <li><a href="/wiki/Five_Eyes" title="Five Eyes">FVEY</a></li> <li><a href="/wiki/Sexpionage" title="Sexpionage">Sexpionage</a></li> <li><a href="/wiki/Stay-behind" title="Stay-behind">Stay-behind</a></li> <li><a href="/wiki/Sting_operation" title="Sting operation">Sting operation</a></li> <li><a href="/wiki/Surveillance" title="Surveillance">Surveillance</a> <ul><li><a href="/wiki/Global_surveillance" title="Global surveillance">Global</a></li> <li><a href="/wiki/Mass_surveillance" title="Mass surveillance">Mass</a></li></ul></li> <li><a href="/wiki/Targeted_surveillance" title="Targeted surveillance">Targeted surveillance</a></li></ul> </div></td></tr></tbody></table></div> <div class="navbox-styles"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1129693374"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236075235"></div><div role="navigation" class="navbox" aria-labelledby="Mobile_phones" style="padding:3px"><table class="nowraplinks hlist mw-collapsible autocollapse navbox-inner" style="border-spacing:0;background:transparent;color:inherit"><tbody><tr><th scope="col" class="navbox-title" colspan="2"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1129693374"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1239400231"><div class="navbar plainlinks hlist navbar-mini"><ul><li class="nv-view"><a href="/wiki/Template:Mobile_phones" title="Template:Mobile phones"><abbr title="View this template">v</abbr></a></li><li class="nv-talk"><a href="/wiki/Template_talk:Mobile_phones" title="Template talk:Mobile phones"><abbr title="Discuss this template">t</abbr></a></li><li class="nv-edit"><a href="/wiki/Special:EditPage/Template:Mobile_phones" title="Special:EditPage/Template:Mobile phones"><abbr title="Edit this template">e</abbr></a></li></ul></div><div id="Mobile_phones" style="font-size:114%;margin:0 4em"><a href="/wiki/Mobile_phone" title="Mobile phone">Mobile phones</a></div></th></tr><tr><th scope="row" class="navbox-group" style="width:1%"><a href="/wiki/Cellular_network" title="Cellular network">Mobile<br />networks</a>,<br />protocols</th><td class="navbox-list-with-group navbox-list navbox-odd" style="width:100%;padding:0"><div style="padding:0 0.25em"></div><table class="nowraplinks navbox-subgroup" style="border-spacing:0"><tbody><tr><td colspan="2" class="navbox-list navbox-odd" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Channel_capacity" title="Channel capacity">Channel capacity</a></li> <li><a href="/wiki/Cellular_frequencies" title="Cellular frequencies">Frequencies</a></li> <li><a href="/wiki/Multi-band_device" title="Multi-band device">Multi-band</a></li> <li><a href="/wiki/Mobile_phone_operator" title="Mobile phone operator">Network operator</a> <ul><li><a href="/wiki/List_of_mobile_network_operators" title="List of mobile network operators">list</a></li></ul></li> <li><a href="/wiki/Roaming" title="Roaming">Roaming</a></li> <li><a href="/wiki/Mobile_phone_signal" title="Mobile phone signal">Signal</a></li> <li><a href="/wiki/SIM_card" title="SIM card">SIM card</a> <ul><li><a href="/wiki/Dual_SIM" title="Dual SIM">dual SIM</a></li> <li><a href="/wiki/ESIM" title="ESIM">eSIM</a></li> <li><a href="/wiki/SIM_lock" title="SIM lock">SIM lock</a></li></ul></li> <li><a href="/wiki/Comparison_of_mobile_phone_standards" title="Comparison of mobile phone standards">Standards comparison</a></li> <li><a href="/wiki/Tethering" title="Tethering">Tethering</a></li> <li><a href="/wiki/Mobile_VoIP" title="Mobile VoIP">VoIP</a></li> <li><a href="/wiki/Wireless_Application_Protocol" title="Wireless Application Protocol">WAP</a></li> <li><a href="/wiki/XHTML_Mobile_Profile" title="XHTML Mobile Profile">XHTML-MP</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%"><a href="/wiki/List_of_mobile_phone_generations" class="mw-redirect" title="List of mobile phone generations">Generations</a></th><td class="navbox-list-with-group navbox-list navbox-even" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><b>Analogue</b>:</li> <li><a href="/wiki/Mobile_radio_telephone" title="Mobile radio telephone">0G</a></li> <li><a href="/wiki/1G" title="1G">1G</a></li> <li><b>Digital</b>:</li> <li><a href="/wiki/2G" title="2G">2G</a></li> <li><a href="/wiki/3G" title="3G">3G</a> <ul><li><a href="/wiki/3G_adoption" title="3G adoption">adoption</a></li></ul></li> <li><a href="/wiki/High_Speed_Packet_Access" title="High Speed Packet Access">3.5G</a></li> <li><a href="/wiki/4G" title="4G">4G</a></li> <li><a href="/wiki/LTE_Advanced_Pro" class="mw-redirect" title="LTE Advanced Pro">4.5G</a></li> <li><a href="/wiki/5G" title="5G">5G</a></li> <li><a href="/wiki/6G" title="6G">6G</a></li></ul> </div></td></tr></tbody></table><div></div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">General<br />operation</th><td class="navbox-list-with-group navbox-list navbox-odd" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Mobile_phone_feature" title="Mobile phone feature">Features</a></li> <li><a href="/wiki/GSM" title="GSM">GSM</a> <ul><li><a href="/wiki/GSM_services" title="GSM services">services</a></li></ul></li> <li><a href="/wiki/History_of_mobile_phones" title="History of mobile phones">History</a></li> <li><a href="/wiki/Mobile_operating_system" title="Mobile operating system">Operating system</a></li> <li><a href="/wiki/Mobile_security" title="Mobile security">Security</a> <ul><li><a href="/wiki/Phone_cloning" title="Phone cloning">phone cloning</a></li></ul></li> <li><a href="/wiki/Mobile_telephony" title="Mobile telephony">Telephony</a> <ul><li><a href="/wiki/Airplane_mode" title="Airplane mode">airplane mode</a></li></ul></li> <li><a href="/wiki/Text_messaging" title="Text messaging">Text messaging</a> <ul><li><a href="/wiki/Short_Message_Service" class="mw-redirect" title="Short Message Service">SMS</a></li> <li><a href="/wiki/Multimedia_Messaging_Service" title="Multimedia Messaging Service">MMS</a></li> <li><a href="/wiki/Rich_Communication_Services" title="Rich Communication Services">RCS</a></li></ul></li> <li><a href="/wiki/Mobile_phone_spam" title="Mobile phone spam">Spam</a></li> <li><a href="/wiki/Mobile_phone_tracking" title="Mobile phone tracking">Tracking</a></li> <li><a href="/wiki/Mobile_web" title="Mobile web">Web browsing</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%"><a href="/wiki/Mobile_device" title="Mobile device">Mobile<br />devices</a></th><td class="navbox-list-with-group navbox-list navbox-odd" style="width:100%;padding:0"><div style="padding:0 0.25em"></div><table class="nowraplinks navbox-subgroup" style="border-spacing:0"><tbody><tr><td colspan="2" class="navbox-list navbox-even" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><b><a href="/wiki/Category:Mobile_phone_manufacturers" title="Category:Mobile phone manufacturers">Manufacturers</a></b></li> <li><a href="/wiki/List_of_3D-enabled_mobile_phones" title="List of 3D-enabled mobile phones">3D phone</a></li> <li><a href="/wiki/Camera_phone" title="Camera phone">Camera phone</a></li> <li><a href="/wiki/Car_phone" title="Car phone">Car phone</a></li> <li><a href="/wiki/Feature_phone" title="Feature phone">Feature phone</a></li> <li><a href="/wiki/Projector_phone" title="Projector phone">Projector phone</a></li> <li><a href="/wiki/Satellite_phone" title="Satellite phone">Satellite phone</a></li> <li><a href="/wiki/Smartphone" title="Smartphone">Smartphone</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%"><a href="/wiki/Form_factor_(mobile_phones)" title="Form factor (mobile phones)">Form factors</a></th><td class="navbox-list-with-group navbox-list navbox-odd" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Form_factor_(mobile_phones)#Bar" title="Form factor (mobile phones)">Bar</a></li> <li><a href="/wiki/Clamshell_design" title="Clamshell design">Flip</a></li> <li><a href="/wiki/Phablet" title="Phablet">Phablet</a></li> <li><a href="/wiki/Form_factor_(mobile_phones)#Slider" title="Form factor (mobile phones)">Slider</a></li> <li><a href="/wiki/Form_factor_(mobile_phones)#Slate" title="Form factor (mobile phones)">Slate</a></li> <li><a href="/wiki/Smartwatch" title="Smartwatch">Smartwatch</a></li> <li><a href="/wiki/Foldable_smartphone" title="Foldable smartphone">Fold</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%"><a href="/wiki/Comparison_of_smartphones" title="Comparison of smartphones">Smartphones</a></th><td class="navbox-list-with-group navbox-list navbox-even" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Android_(operating_system)" title="Android (operating system)">Android devices</a> <ul><li><a href="/wiki/Rooting_(Android)" title="Rooting (Android)">rooting</a></li></ul></li> <li><a href="/wiki/BlackBerry_10#Devices" title="BlackBerry 10">BlackBerry 10</a></li> <li><a href="/wiki/IPhone" title="IPhone">iPhone</a> <ul><li><a href="/wiki/IOS_jailbreaking" title="IOS jailbreaking">iOS jailbreaking</a></li></ul></li> <li><a href="/wiki/List_of_open-source_mobile_phones" title="List of open-source mobile phones">Open-source mobile phones</a></li> <li><a href="/wiki/Comparison_of_Symbian_devices" title="Comparison of Symbian devices">Symbian devices</a></li> <li><a href="/wiki/List_of_Windows_phones" title="List of Windows phones">Windows Phone devices</a></li></ul> </div></td></tr></tbody></table><div></div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Mobile<br />specific<br /><a href="/wiki/Software" title="Software">software</a></th><td class="navbox-list-with-group navbox-list navbox-odd" style="width:100%;padding:0"><div style="padding:0 0.25em"></div><table class="nowraplinks navbox-subgroup" style="border-spacing:0"><tbody><tr><th scope="row" class="navbox-group" style="width:1%"><a href="/wiki/Mobile_app" title="Mobile app">Apps</a></th><td class="navbox-list-with-group navbox-list navbox-odd" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Mobile_app_development" title="Mobile app development">Development</a></li> <li><a href="/wiki/List_of_mobile_app_distribution_platforms" title="List of mobile app distribution platforms">Distribution</a></li> <li><a href="/wiki/Mobile_application_management" title="Mobile application management">Management</a></li> <li><a href="/wiki/Mobile_cloud_computing" title="Mobile cloud computing">Cloud computing</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%"><a href="/wiki/Mobile_commerce" title="Mobile commerce">Commerce</a></th><td class="navbox-list-with-group navbox-list navbox-even" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Mobile_banking" title="Mobile banking">Banking</a></li> <li><a href="/wiki/Mobile_marketing" title="Mobile marketing">Marketing</a> <ul><li><a href="/wiki/Mobile_advertising" title="Mobile advertising">advertising</a></li> <li><a href="/wiki/Mobile_campaign" title="Mobile campaign">campaigns</a></li></ul></li> <li><a href="/wiki/Mobile_payment" title="Mobile payment">Payments</a> <ul><li><a href="/wiki/Contactless_payment" title="Contactless payment">contactless</a></li> <li><a href="/wiki/Mobile_donating" title="Mobile donating">donating</a></li></ul></li> <li><a href="/wiki/Mobile_ticketing" title="Mobile ticketing">Ticketing</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%"><a href="/wiki/Mobile_content" title="Mobile content">Content</a></th><td class="navbox-list-with-group navbox-list navbox-odd" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Mobile_blogging" title="Mobile blogging">Blogging</a></li> <li><a href="/wiki/Push_email" title="Push email">Email</a></li> <li><a href="/wiki/Mobile_gambling" title="Mobile gambling">Gambling</a></li> <li><a href="/wiki/Mobile_game" title="Mobile game">Gaming</a></li> <li><a href="/wiki/MHealth" title="MHealth">Health</a></li> <li><a href="/wiki/Instant_messaging" title="Instant messaging">Instant messaging</a></li> <li><a href="/wiki/M-learning" title="M-learning">Learning</a></li> <li><a href="/wiki/Mobile_music" title="Mobile music">Music</a></li> <li><a href="/wiki/Mobile_news" title="Mobile news">News</a></li> <li><a href="/w/index.php?title=Mobile_search&amp;action=edit&amp;redlink=1" class="new" title="Mobile search (page does not exist)">Search</a> <ul><li><a href="/wiki/Mobile_local_search" title="Mobile local search">local</a></li></ul></li> <li><a href="/wiki/Mobile_social_network" title="Mobile social network">Social</a> <ul><li><a href="/wiki/Mobile_social_address_book" title="Mobile social address book">address book</a></li></ul></li> <li><a href="/wiki/Mobile_television" title="Mobile television">Television</a></li></ul> </div></td></tr></tbody></table><div></div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%"><a href="/wiki/Category:Mobile_phone_culture" title="Category:Mobile phone culture">Culture</a></th><td class="navbox-list-with-group navbox-list navbox-even" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Box_breaker" title="Box breaker">Box breaking</a></li> <li><a href="/wiki/Mobile_phone_charm" title="Mobile phone charm">Charms</a></li> <li><a href="/wiki/Mobile_comic" title="Mobile comic">Comics</a></li> <li><a href="/wiki/Mobile_dating" title="Mobile dating">Dating</a></li> <li><a href="/wiki/Japanese_mobile_phone_culture" title="Japanese mobile phone culture">Japanese culture</a></li> <li><a href="/wiki/Cell_phone_novel" title="Cell phone novel">Novels</a></li> <li><a href="/wiki/Ringtone" title="Ringtone">Ringtones</a> <ul><li><a href="/wiki/Silent_mode" title="Silent mode">silent mode</a></li></ul></li> <li><a href="/wiki/Selfie" title="Selfie">Selfie</a></li> <li><a href="/wiki/SMS_language" title="SMS language">Txt-spk</a></li> <li><a href="/wiki/Wallpaper_(computing)" title="Wallpaper (computing)">Wallpaper</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Environment<br />and health</th><td class="navbox-list-with-group navbox-list navbox-odd" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/De_Quervain_syndrome" title="De Quervain syndrome">BlackBerry thumb</a></li> <li><a href="/wiki/Mobile_phones_and_driving_safety" title="Mobile phones and driving safety">Driving safety</a></li> <li><a href="/wiki/Electronic_waste" title="Electronic waste">Electronic waste</a></li> <li><a href="/wiki/Common_external_power_supply" title="Common external power supply">External power supply</a></li> <li><a href="/wiki/Digital_media_use_and_mental_health" title="Digital media use and mental health">Mental health from overuse</a></li> <li><a href="/wiki/Phantom_vibration_syndrome" title="Phantom vibration syndrome">Phantom vibration syndrome</a></li> <li><a href="/wiki/Wireless_device_radiation_and_health" title="Wireless device radiation and health">Radiation and health</a></li> <li><a href="/wiki/Mobile_phone_recycling" title="Mobile phone recycling">Recycling</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%"><a href="/wiki/Law" title="Law">Law</a></th><td class="navbox-list-with-group navbox-list navbox-even" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Carrier_IQ" title="Carrier IQ">Carrier IQ</a></li> <li><a href="/wiki/Legality_of_recording_by_civilians" title="Legality of recording by civilians">Legality of recording by civilians</a></li> <li><a href="/wiki/Mobile_phones_in_prison" title="Mobile phones in prison">Mobile phones in prison</a></li> <li><a href="/wiki/Photography_and_the_law" title="Photography and the law">Photography and the law</a></li> <li><a href="/wiki/Telephone_tapping" class="mw-redirect" title="Telephone tapping">Telephone tapping</a></li> <li><a href="/wiki/Texting_while_driving" title="Texting while driving">Texting while driving</a></li> <li><a href="/wiki/Restrictions_on_cell_phone_use_while_driving_in_the_United_States" title="Restrictions on cell phone use while driving in the United States">USA use restrictions while driving</a></li></ul> </div></td></tr><tr><td class="navbox-abovebelow" colspan="2"><div> <ul><li><span class="nowrap"><span class="noviewer" typeof="mw:File"><span><img alt="" src="//upload.wikimedia.org/wikipedia/commons/thumb/4/4e/Telecom-icon.svg/28px-Telecom-icon.svg.png" decoding="async" width="28" height="28" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/4/4e/Telecom-icon.svg/42px-Telecom-icon.svg.png 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/4/4e/Telecom-icon.svg/56px-Telecom-icon.svg.png 2x" data-file-width="500" data-file-height="500" /></span></span> </span><a href="/wiki/Portal:Telecommunication" title="Portal:Telecommunication">Telecommunication&#32;portal</a></li> <li><span class="nowrap"><span class="noviewer" typeof="mw:File"><span><img alt="telephone icon" src="//upload.wikimedia.org/wikipedia/commons/thumb/b/b8/Telephone_icon_blue_gradient.svg/28px-Telephone_icon_blue_gradient.svg.png" decoding="async" width="28" height="28" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/b/b8/Telephone_icon_blue_gradient.svg/42px-Telephone_icon_blue_gradient.svg.png 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/b/b8/Telephone_icon_blue_gradient.svg/56px-Telephone_icon_blue_gradient.svg.png 2x" data-file-width="722" data-file-height="722" /></span></span> </span><a href="/wiki/Portal:Telephones" title="Portal:Telephones">Telephones&#32;portal</a></li> <li><span class="noviewer" typeof="mw:File"><span title="Category"><img alt="" src="//upload.wikimedia.org/wikipedia/en/thumb/9/96/Symbol_category_class.svg/16px-Symbol_category_class.svg.png" decoding="async" width="16" height="16" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/en/thumb/9/96/Symbol_category_class.svg/23px-Symbol_category_class.svg.png 1.5x, //upload.wikimedia.org/wikipedia/en/thumb/9/96/Symbol_category_class.svg/31px-Symbol_category_class.svg.png 2x" data-file-width="180" data-file-height="185" /></span></span>&#160;<a href="/wiki/Category:Mobile_telecommunications" title="Category:Mobile telecommunications">Category</a></li></ul> </div></td></tr></tbody></table></div> <div class="navbox-styles"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1129693374"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236075235"></div><div role="navigation" class="navbox authority-control" aria-labelledby="Authority_control_databases_frameless&amp;#124;text-top&amp;#124;10px&amp;#124;alt=Edit_this_at_Wikidata&amp;#124;link=https&amp;#58;//www.wikidata.org/wiki/Q1067529#identifiers&amp;#124;class=noprint&amp;#124;Edit_this_at_Wikidata" style="padding:3px"><table class="nowraplinks hlist mw-collapsible autocollapse navbox-inner" style="border-spacing:0;background:transparent;color:inherit"><tbody><tr><th scope="col" class="navbox-title" colspan="2"><div id="Authority_control_databases_frameless&amp;#124;text-top&amp;#124;10px&amp;#124;alt=Edit_this_at_Wikidata&amp;#124;link=https&amp;#58;//www.wikidata.org/wiki/Q1067529#identifiers&amp;#124;class=noprint&amp;#124;Edit_this_at_Wikidata" style="font-size:114%;margin:0 4em"><a href="/wiki/Help:Authority_control" title="Help:Authority control">Authority control databases</a> <span class="mw-valign-text-top noprint" typeof="mw:File/Frameless"><a href="https://www.wikidata.org/wiki/Q1067529#identifiers" title="Edit this at Wikidata"><img alt="Edit this at Wikidata" src="//upload.wikimedia.org/wikipedia/en/thumb/8/8a/OOjs_UI_icon_edit-ltr-progressive.svg/10px-OOjs_UI_icon_edit-ltr-progressive.svg.png" decoding="async" width="10" height="10" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/en/thumb/8/8a/OOjs_UI_icon_edit-ltr-progressive.svg/15px-OOjs_UI_icon_edit-ltr-progressive.svg.png 1.5x, //upload.wikimedia.org/wikipedia/en/thumb/8/8a/OOjs_UI_icon_edit-ltr-progressive.svg/20px-OOjs_UI_icon_edit-ltr-progressive.svg.png 2x" data-file-width="20" data-file-height="20" /></a></span></div></th></tr><tr><th scope="row" class="navbox-group" style="width:1%">National</th><td class="navbox-list-with-group navbox-list navbox-odd" style="width:100%;padding:0"><div style="padding:0 0.25em"><ul><li><span class="uid"><a rel="nofollow" class="external text" href="https://d-nb.info/gnd/7732308-7">Germany</a></span></li><li><span class="uid"><a rel="nofollow" class="external text" href="https://id.loc.gov/authorities/sh85147077">United States</a></span></li><li><span class="uid"><a rel="nofollow" class="external text" href="https://id.ndl.go.jp/auth/ndlna/00573444">Japan</a></span></li><li><span class="uid"><a rel="nofollow" class="external text" href="http://olduli.nli.org.il/F/?func=find-b&amp;local_base=NLX10&amp;find_code=UID&amp;request=987007558576405171">Israel</a></span></li></ul></div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Other</th><td class="navbox-list-with-group navbox-list navbox-even" style="width:100%;padding:0"><div style="padding:0 0.25em"><ul><li><span class="uid"><a rel="nofollow" class="external text" href="https://catalog.archives.gov/id/10641837">NARA</a></span></li></ul></div></td></tr></tbody></table></div> <!-- NewPP limit report Parsed by mw‐web.codfw.main‐f69cdc8f6‐5zrpf Cached time: 20241122142330 Cache expiry: 2592000 Reduced expiry: false Complications: [vary‐revision‐sha1, show‐toc] CPU time usage: 0.743 seconds Real time usage: 0.897 seconds Preprocessor visited node count: 5835/1000000 Post‐expand include size: 164703/2097152 bytes Template argument size: 7746/2097152 bytes Highest expansion depth: 16/100 Expensive parser function count: 16/500 Unstrip recursion depth: 1/20 Unstrip post‐expand size: 210559/5000000 bytes Lua time usage: 0.418/10.000 seconds Lua memory usage: 7066094/52428800 bytes Number of Wikibase entities loaded: 1/400 --> <!-- Transclusion expansion time report (%,ms,calls,template) 100.00% 764.580 1 -total 51.29% 392.185 1 Template:Reflist 14.22% 108.709 5 Template:Navbox 12.57% 96.138 26 Template:Cite_web 12.02% 91.908 3 Template:Cite_book 10.62% 81.193 1 Template:Espionage 8.45% 64.583 1 Template:Short_description 6.15% 47.059 3 Template:Citation_needed 5.88% 44.964 4 Template:Fix 5.29% 40.455 2 Template:Pagetype --> <!-- Saved in parser cache with key enwiki:pcache:idhash:91221-0!canonical and timestamp 20241122142330 and revision id 1252396711. Rendering was triggered because: page-view --> </div><!--esi <esi:include src="/esitest-fa8a495983347898/content" /> --><noscript><img src="https://login.wikimedia.org/wiki/Special:CentralAutoLogin/start?type=1x1" alt="" width="1" height="1" style="border: none; position: absolute;"></noscript> <div class="printfooter" data-nosnippet="">Retrieved from "<a dir="ltr" href="https://en.wikipedia.org/w/index.php?title=Wiretapping&amp;oldid=1252396711">https://en.wikipedia.org/w/index.php?title=Wiretapping&amp;oldid=1252396711</a>"</div></div> <div id="catlinks" class="catlinks" data-mw="interface"><div id="mw-normal-catlinks" class="mw-normal-catlinks"><a href="/wiki/Help:Category" title="Help:Category">Category</a>: <ul><li><a href="/wiki/Category:Telephone_tapping" title="Category:Telephone tapping">Telephone tapping</a></li></ul></div><div id="mw-hidden-catlinks" class="mw-hidden-catlinks mw-hidden-cats-hidden">Hidden categories: <ul><li><a href="/wiki/Category:Pages_using_cite_court_with_unknown_parameters" title="Category:Pages using cite court with unknown parameters">Pages using cite court with unknown parameters</a></li><li><a href="/wiki/Category:Articles_with_short_description" title="Category:Articles with short description">Articles with short description</a></li><li><a href="/wiki/Category:Short_description_matches_Wikidata" title="Category:Short description matches Wikidata">Short description matches Wikidata</a></li><li><a href="/wiki/Category:All_articles_with_unsourced_statements" title="Category:All articles with unsourced statements">All articles with unsourced statements</a></li><li><a href="/wiki/Category:Articles_with_unsourced_statements_from_March_2019" title="Category:Articles with unsourced statements from March 2019">Articles with unsourced statements from March 2019</a></li><li><a href="/wiki/Category:Articles_containing_potentially_dated_statements_from_2007" title="Category:Articles containing potentially dated statements from 2007">Articles containing potentially dated statements from 2007</a></li><li><a href="/wiki/Category:All_articles_containing_potentially_dated_statements" title="Category:All articles containing potentially dated statements">All articles containing potentially dated statements</a></li><li><a href="/wiki/Category:All_articles_with_failed_verification" title="Category:All articles with failed verification">All articles with failed verification</a></li><li><a href="/wiki/Category:Articles_with_failed_verification_from_November_2019" title="Category:Articles with failed verification from November 2019">Articles with failed verification from November 2019</a></li></ul></div></div> </div> </main> </div> <div class="mw-footer-container"> <footer id="footer" class="mw-footer" > <ul id="footer-info"> <li id="footer-info-lastmod"> This page was last edited on 21 October 2024, at 04:44<span class="anonymous-show">&#160;(UTC)</span>.</li> <li id="footer-info-copyright">Text is available under the <a href="/wiki/Wikipedia:Text_of_the_Creative_Commons_Attribution-ShareAlike_4.0_International_License" title="Wikipedia:Text of the Creative Commons Attribution-ShareAlike 4.0 International License">Creative Commons Attribution-ShareAlike 4.0 License</a>; additional terms may apply. By using this site, you agree to the <a href="https://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Terms_of_Use" class="extiw" title="foundation:Special:MyLanguage/Policy:Terms of Use">Terms of Use</a> and <a href="https://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Privacy_policy" class="extiw" title="foundation:Special:MyLanguage/Policy:Privacy policy">Privacy Policy</a>. Wikipedia® is a registered trademark of the <a rel="nofollow" class="external text" href="https://wikimediafoundation.org/">Wikimedia Foundation, Inc.</a>, a non-profit organization.</li> </ul> <ul id="footer-places"> <li id="footer-places-privacy"><a href="https://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Privacy_policy">Privacy policy</a></li> <li id="footer-places-about"><a href="/wiki/Wikipedia:About">About Wikipedia</a></li> <li id="footer-places-disclaimers"><a href="/wiki/Wikipedia:General_disclaimer">Disclaimers</a></li> <li id="footer-places-contact"><a href="//en.wikipedia.org/wiki/Wikipedia:Contact_us">Contact Wikipedia</a></li> <li id="footer-places-wm-codeofconduct"><a href="https://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Universal_Code_of_Conduct">Code of Conduct</a></li> <li id="footer-places-developers"><a href="https://developer.wikimedia.org">Developers</a></li> <li id="footer-places-statslink"><a href="https://stats.wikimedia.org/#/en.wikipedia.org">Statistics</a></li> <li id="footer-places-cookiestatement"><a href="https://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Cookie_statement">Cookie statement</a></li> <li id="footer-places-mobileview"><a href="//en.m.wikipedia.org/w/index.php?title=Wiretapping&amp;mobileaction=toggle_view_mobile" class="noprint stopMobileRedirectToggle">Mobile view</a></li> </ul> <ul id="footer-icons" class="noprint"> <li id="footer-copyrightico"><a href="https://wikimediafoundation.org/" class="cdx-button cdx-button--fake-button cdx-button--size-large cdx-button--fake-button--enabled"><img src="/static/images/footer/wikimedia-button.svg" width="84" height="29" alt="Wikimedia Foundation" loading="lazy"></a></li> <li id="footer-poweredbyico"><a href="https://www.mediawiki.org/" class="cdx-button cdx-button--fake-button cdx-button--size-large cdx-button--fake-button--enabled"><img src="/w/resources/assets/poweredby_mediawiki.svg" alt="Powered by MediaWiki" width="88" height="31" loading="lazy"></a></li> </ul> </footer> </div> </div> </div> <div class="vector-settings" id="p-dock-bottom"> <ul></ul> </div><script>(RLQ=window.RLQ||[]).push(function(){mw.config.set({"wgHostname":"mw-web.codfw.main-f69cdc8f6-rhwrx","wgBackendResponseTime":239,"wgPageParseReport":{"limitreport":{"cputime":"0.743","walltime":"0.897","ppvisitednodes":{"value":5835,"limit":1000000},"postexpandincludesize":{"value":164703,"limit":2097152},"templateargumentsize":{"value":7746,"limit":2097152},"expansiondepth":{"value":16,"limit":100},"expensivefunctioncount":{"value":16,"limit":500},"unstrip-depth":{"value":1,"limit":20},"unstrip-size":{"value":210559,"limit":5000000},"entityaccesscount":{"value":1,"limit":400},"timingprofile":["100.00% 764.580 1 -total"," 51.29% 392.185 1 Template:Reflist"," 14.22% 108.709 5 Template:Navbox"," 12.57% 96.138 26 Template:Cite_web"," 12.02% 91.908 3 Template:Cite_book"," 10.62% 81.193 1 Template:Espionage"," 8.45% 64.583 1 Template:Short_description"," 6.15% 47.059 3 Template:Citation_needed"," 5.88% 44.964 4 Template:Fix"," 5.29% 40.455 2 Template:Pagetype"]},"scribunto":{"limitreport-timeusage":{"value":"0.418","limit":"10.000"},"limitreport-memusage":{"value":7066094,"limit":52428800},"limitreport-logs":"table#1 {\n [\"size\"] = \"small\",\n}\ntable#1 {\n [\"size\"] = \"small\",\n}\n"},"cachereport":{"origin":"mw-web.codfw.main-f69cdc8f6-5zrpf","timestamp":"20241122142330","ttl":2592000,"transientcontent":false}}});});</script> <script type="application/ld+json">{"@context":"https:\/\/schema.org","@type":"Article","name":"Wiretapping","url":"https:\/\/en.wikipedia.org\/wiki\/Wiretapping","sameAs":"http:\/\/www.wikidata.org\/entity\/Q1067529","mainEntity":"http:\/\/www.wikidata.org\/entity\/Q1067529","author":{"@type":"Organization","name":"Contributors to Wikimedia projects"},"publisher":{"@type":"Organization","name":"Wikimedia Foundation, Inc.","logo":{"@type":"ImageObject","url":"https:\/\/www.wikimedia.org\/static\/images\/wmf-hor-googpub.png"}},"datePublished":"2002-09-25T13:13:34Z","dateModified":"2024-10-21T04:44:22Z","headline":"third-party monitoring of electronic communications"}</script> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10