Telephone tapping

Telephone tapping or wire tapping/ wiretapping (in US) is the monitoring of telephone conversations by a third party, often by covert means. The telephone tap or wire tap received its name because, historically, the monitoring connection was applied to the wires of the telephone line of the person who was being monitored and drew off or tapped a small amount of the electrical signal carrying the conversation.

Contents

Legal status

Telephone tapping is officially strictly controlled in many countries to safeguard an individual's privacy; this is the case in all developed democracies. In theory, telephone tapping often needs to be authorised by a court, and is, again in theory, normally only approved when evidence shows it is not possible to detect criminal or subversive activity in less intrusive ways; often the law and regulations require that the crime investigated must be at least of a certain severity. In many juristictions however, permission for telephone tapping is easily obtained on a routine basis without further investigation by the court or other entity granting such permission. Illegal or unauthorised telephone tapping is often a criminal offence. However, in certain jurisdictions such as Germany, courts will accept illegally recorded phone calls without the other party's consent as evidence.

In the United States, federal agencies may be authorized to engage in wiretaps by the Foreign Intelligence Surveillance Court, a court with secret proceedings, in certain circumstances.

Under United States federal law and most state laws there is nothing illegal about one of the parties to a telephone call recording the conversation, or giving permission for calls to be recorded or permitting their telephone line to be tapped. However, several states (i.e., California, Connecticut, Florida, Illinois, Maryland, Massachusetts, Michigan, Montana, Nevada, New Hampshire, Pennsylvania and Washington) require that all parties consent when one party wants to record a telephone conversation.

Many businesses and other organization record their telephone calls so that they can prove what was said, train their staff, or monitor performance. This activity may not be considered telephone tapping in some, but not all, jurisdictions because it is done with the knowledge of at least one of the parties to the telephone conversation. It is considered better practice to announce at the beginning of a call that the conversation is being recorded.

Wiretapping methods

The official tapping of telephone lines

The contracts or licenses by which the state controls telephone companies often require that the companies must provide access for tapping lines to the security services and the police. In the U.S., telecommunications carriers are required by law to cooperate in the interception of communications for law enforcement purposes under the terms of CALEA. Taps must be secret and undetectable.

When telephone exchanges were mechanical, a tap had to be installed by technicians, linking circuits together to route the audio signal from the call. Now that many exchanges have been converted to digital technology tapping is far simpler and can be ordered remotely by computer. Telephone services provided by cable TV companies also uses digital switching technology. If the tap is implemented at a digital switch, the switching computer simply copies the digitzed bits that represent the phone conversation to a second line and it is impossible to tell if your line is being tapped or not. Even a well designed tap installed on a phone wire can be difficult to detect. The noises that some people believe to be telephone taps are simply crosstalk created by the coupling of signals from other phone lines.

Data on the calling and called number, time of call and duration, will generally be collected automaticall on all calls and stored for later use by the billing department of your phone company. This data can be accessed by security services, often with fewer legal restrictions than for a tap. This information used to be colleted using special equipment known as pen registers and trap and trace devices and U.S. law still refers to it under those names. Today, a list of all calls to a specific number can be obtained by sorting billing records. A telephone tap during which only the call information is recorded but not the contents of the phone calls themselves, is called a Pen Register tap.

For telephone services via digital exchanges, the information collected may additionally include a log of the type of communications media being used (some services treat data and voice communications differently to conserve bandwidth).

The unofficial tapping of telephone lines

It's also possible to tap conversations unofficially. There are a number of ways to monitor telephone conversations:

  • Recording the conversation - the person making/receiving the call records the conversation using a coil tap ('telephone pickup coil') attached to the ear-piece, or they fit an in-line tap with a recording output. Both of these are easily available through electrical shops. Most who record telephone conversations, such as journalists, will use the recording for their own private work. But be aware that anything you say to someone you don't know may be recorded and used for other purposes.
  • Direct line tap - this is what the state used to do via the telephone exchange. But unofficial tapping, where the user's line is physically tapped near the house, is also possible. The tap can either involve a direct electrical connection to the line, or an induction coil. An induction coil is usually placed underneath the base of a telephone or on the back of a telephone handset to pick up the signal inductively. With a direct connection, there will be some drop in signal levels because of the loss of power from the line, and it may also generate noise on the line. An induction tap doesn't drain voltage or current from the line because it isn't physically connected to the phone line.

Direct taps sometimes require regular maintenance, either to change tapes or replace batteries, which may give away their presence.

  • Radio tap - this is like a bug that fits on the telephone line. The state does not normally do this because they have access via the telephone exchange, though certain organizations exempt from the common framework of law that applies to citizens may use devices like this. It can be fitted to one phone inside the house, or outside on the phone line. It may produce noise (you might even get signal feedback down the line on amateur made equipment) to alert you, but probably not as modern state of the art equipment operates in the 30-300 GHz range. The unit is powered from the line so once installed it's maintenance free, and only transmits when there is a call in progress. These devices tend to be low powered because the drain on the line would become too great, however a state of the art receiver could be located as far away as ten kilometers under ideal conditions, but is usually located within a radius of 1 to 3 km. Research however has also shown that a satellite can be used to pickup emissions in the range of a few milliwatts.

To guard against unofficial amateur line taps you should regularily inspect your phone itself, and your telephone line for new joints, or small wires connected to the line; a time-domain reflectometer is a worthy tool here. If you have reason to suspect your phone has been tapped consult a technical surveillance countermeasures (TSCM) specialist. Never contact a TSCM specialist from a phone you suspect is tapped or on any other phone on the premises or any other phone that is linked to you or your organization (home phone, company cellular etc.)

Location data and mobile phones

Mobile phones are, in surveillance terms, a major liability. This liability will only increase as the new third-generation (3G) phones are introduced. This is because the base stations will be located closer together.

For mobile phones the major threat is the collection of communications data. This data not only includes information about the time, duration, originator and recipient of the call, but also the identification of the base station where the call was made from, which equals its approximate geographical location. This data is stored with the details of the call and has utmost importance for traffic analysis.

It is also possible to get greater resolution of a person's location by combining information from a number of cells surrounding the persons location, forcing the phone to communicate with at least two or three of them and measuring the timing advance, a correction for the speed of light in the GSM standard. This additional precision must be specifically enabled by the telephone company - it is not part of ordinary operation. There is no countermeasure against the state/telephone companies doing this, perhaps with an exception of locking the phone to only one distant base station and accessing it from a distance using a high-gain antenna (which significantly impairs the attractive mobility), limiting the location data disclosed to the network to a quite large distant arc (not a circle - the base station antennas are typically divided to three individually controlled sectors, with usually 120° angle each).

The old first generation mobile phones could be easily monitored by anyone with a 'scanning all-band receiver' because the system used an analogue transmission system - like an ordinary radio transmitter. The second generation digital phones are harder to monitor because they use a digitally compressed transmission. However the state can tap mobile phones with the co-operation of the phone company. It's also possible for organizations with the correct technical equipment, such as large corporations, to monitor mobile phone communications and decrypt the audio. A special device called an "IMSI-catcher" pretends to the mobile phones in its vicinity to be a legitimate base station of the mobile phone network, subjecting the communication between the phone and the network to a man in the middle attack. This is possible because while the mobile phone has to authenticate itself to the mobile telephone network, the network does not authenticate itself to the phone. This blatant flaw in GSM security was intentionally introduced to facilitate eavesdropping without the knowledge or cooperation of the mobile phone network. Once the mobile phone has accepted the IMSI-catcher as its base station the IMSI-catcher can deactivate GSM encryption using a special flag. All calls made from the tapped mobile phone go through the IMSI-catcher and are then passed on to the mobile network. Up to now no phone is known which actively alerts the user when a base station or an IMSI-catcher deactivates GSM encryption. Some phones include a special monitor mode (activated with secret codes or special software) which displays GSM operating parameters such as encryption while a call is being made. But no matter whether GSM encryption is active or not, users should not trust the encryption to be secure enough that an eavesdropper can not decrypt the encrypted data. The GSM specification refers to the encryption algorithms used for encrypting voice/data services as algorithms A5/1,2,3. Today a ciphertext-only attack (an attack without knowledge of some of the originally unencrypted plaintext) requires a few milliseconds to find the correct A5 decryption key allowing the attacker to eavesdrop on any GSM phone conversation in less than a second. Other exploits on GSM security easily allow call hijacking, altering of data messages and call theft. There is no defense against IMSI-catcher based eavesdropping, except using end-to-end call encryption; products offering this feature, secure telephones, are already beginning to appear on the market, though they tend to be expensive and incompatible with each other, which limits their proliferation, much to joy of various intelligence agencies.

There were proposals for European mobile phones to use stronger encryption, but this was opposed by a number of European states, including the Netherlands and Germany. They are some of the world's most prolific telephone tappers. (Over 10000+ phone numbers in both countries 2003.)

Mobile phones can be used anonymously. Pre-paid mobile phones can be bought without having to give details of your name or address, and because you insert cards there is no billing information. However, once you have been identified as using a certain phone, you can be tracked with the unique built-in IMEI (International Mobile Equipment Identification) that is burned into each mobile phone. The IMEI emitted by the phone does not change, regardless what SIM is inserted into the phone. It is even transmitted when no SIM at all is present in the phone. If you require longer-term anonymity it is necessary to change the phone and SIM every few days. Sometimes, for complete anonymity it is not advisable to have a mobile phone on your person at all. Some phones may still transmit information to the network or be accessible from the network even though the user has switched them off. It is therefore strongly recommended to remove the batteries from the phone.

One Ring Calls: These pesky calls cannot be recongnised by a caller ID as a CID displays the no. only after 2 rings. Their purpose is usually to see if you are talking to a person they know or if they just want to check on you. Exchange tapping is the only solution for these calls.

See also

External links

Navigation

  • Art and Cultures
    • Art (https://academickids.com/encyclopedia/index.php/Art)
    • Architecture (https://academickids.com/encyclopedia/index.php/Architecture)
    • Cultures (https://www.academickids.com/encyclopedia/index.php/Cultures)
    • Music (https://www.academickids.com/encyclopedia/index.php/Music)
    • Musical Instruments (http://academickids.com/encyclopedia/index.php/List_of_musical_instruments)
  • Biographies (http://www.academickids.com/encyclopedia/index.php/Biographies)
  • Clipart (http://www.academickids.com/encyclopedia/index.php/Clipart)
  • Geography (http://www.academickids.com/encyclopedia/index.php/Geography)
    • Countries of the World (http://www.academickids.com/encyclopedia/index.php/Countries)
    • Maps (http://www.academickids.com/encyclopedia/index.php/Maps)
    • Flags (http://www.academickids.com/encyclopedia/index.php/Flags)
    • Continents (http://www.academickids.com/encyclopedia/index.php/Continents)
  • History (http://www.academickids.com/encyclopedia/index.php/History)
    • Ancient Civilizations (http://www.academickids.com/encyclopedia/index.php/Ancient_Civilizations)
    • Industrial Revolution (http://www.academickids.com/encyclopedia/index.php/Industrial_Revolution)
    • Middle Ages (http://www.academickids.com/encyclopedia/index.php/Middle_Ages)
    • Prehistory (http://www.academickids.com/encyclopedia/index.php/Prehistory)
    • Renaissance (http://www.academickids.com/encyclopedia/index.php/Renaissance)
    • Timelines (http://www.academickids.com/encyclopedia/index.php/Timelines)
    • United States (http://www.academickids.com/encyclopedia/index.php/United_States)
    • Wars (http://www.academickids.com/encyclopedia/index.php/Wars)
    • World History (http://www.academickids.com/encyclopedia/index.php/History_of_the_world)
  • Human Body (http://www.academickids.com/encyclopedia/index.php/Human_Body)
  • Mathematics (http://www.academickids.com/encyclopedia/index.php/Mathematics)
  • Reference (http://www.academickids.com/encyclopedia/index.php/Reference)
  • Science (http://www.academickids.com/encyclopedia/index.php/Science)
    • Animals (http://www.academickids.com/encyclopedia/index.php/Animals)
    • Aviation (http://www.academickids.com/encyclopedia/index.php/Aviation)
    • Dinosaurs (http://www.academickids.com/encyclopedia/index.php/Dinosaurs)
    • Earth (http://www.academickids.com/encyclopedia/index.php/Earth)
    • Inventions (http://www.academickids.com/encyclopedia/index.php/Inventions)
    • Physical Science (http://www.academickids.com/encyclopedia/index.php/Physical_Science)
    • Plants (http://www.academickids.com/encyclopedia/index.php/Plants)
    • Scientists (http://www.academickids.com/encyclopedia/index.php/Scientists)
  • Social Studies (http://www.academickids.com/encyclopedia/index.php/Social_Studies)
    • Anthropology (http://www.academickids.com/encyclopedia/index.php/Anthropology)
    • Economics (http://www.academickids.com/encyclopedia/index.php/Economics)
    • Government (http://www.academickids.com/encyclopedia/index.php/Government)
    • Religion (http://www.academickids.com/encyclopedia/index.php/Religion)
    • Holidays (http://www.academickids.com/encyclopedia/index.php/Holidays)
  • Space and Astronomy
    • Solar System (http://www.academickids.com/encyclopedia/index.php/Solar_System)
    • Planets (http://www.academickids.com/encyclopedia/index.php/Planets)
  • Sports (http://www.academickids.com/encyclopedia/index.php/Sports)
  • Timelines (http://www.academickids.com/encyclopedia/index.php/Timelines)
  • Weather (http://www.academickids.com/encyclopedia/index.php/Weather)
  • US States (http://www.academickids.com/encyclopedia/index.php/US_States)

Information

  • Home Page (http://academickids.com/encyclopedia/index.php)
  • Contact Us (http://www.academickids.com/encyclopedia/index.php/Contactus)

  • Clip Art (http://classroomclipart.com)
Toolbox
Personal tools