Science Fair Project Encyclopedia
Telephone tapping or Wire tapping/ Wiretapping (in US) describes the monitoring of telephone conversations by a third party, often by covert means. The Telephone tap or Wire tap received its name because, historically, the monitoring connection was applied to the wires of the telephone line of the person who was being monitored and drew off or tapped a small amount of the electrical signal carrying the conversation.
Telephone tapping is officially strictly controlled in many countries to safeguard an individual's privacy; this is the case in all developed democracies. In theory, Telephone tapping often needs to be authorised by a court, and is, again in theory, normally only approved when evidence shows it is not possible to detect criminal or subversive activity in less intrusive ways; often the law and regulations require that the crime investigated must be at least of a certain severity. In practice however, permission for Telephone tapping is easily obtained on a routinely basis without further investigation by the court or other entity granting such permission. Illegal or unauthorised telephone tapping by the public is often a criminal offence. However, in certain jurisdictions such as Germany, courts will accept illegally recorded phone calls without the other party's consent as evidence.
In the United States, federal agencies may be authorized to engage in wiretaps by the Foreign Intelligence Surveillance Court, a court with secret proceedings, in certain circumstances. Telecommunications carriers have a duty duty to cooperate in the interception of communications for law lnforcement purposes under the terms of CALEA. Taps must be undetectable.
Under United States federal law and most state laws there is nothing illegal about one of the parties to a telephone call recording the conversation, or giving permission for calls to be recorded or permitting their telephone line to be tapped. However, several states (i.e., California, Connecticut, Florida, Illinois, Maryland, Massachusetts, Michigan, Montana, Nevada, New Hampshire, Pennsylvania and Washington) require that all parties consent when one party wants to record a telephone conversation.
Many businesses record their telephone calls for legal reasons, so that they can prove what was said, train their staff, or monitor performance. This activity is not normally considered telephone tapping in some jurisdictions because it is done with the knowledge of at least one of the parties to the telephone conversation. Some businesses and other organizations even ask if a conversation can be recorded.
The official tapping of telephone lines
When telephone exchanges were mechanical, a tap had to be installed by technicians, linking circuits together to route the audio signal from the call. Now that many exchanges are being converted to digital technology installing taps is far simpler, and can be done by installing small plugs, or even by computer. Telephone services provided by cable TV companies are tapped in a similar way.
Unless the tap has been very badly installed, it is not possible to tell if your line is being tapped or not. The noises that some people believe to be telephone taps are really just noise created by the induction of signals from other phone lines. Because the tap is made at the exchange it is very difficult to tell if the line is tapped because there will be no appreciable difference in volume. But irrespective of the tapping of content, communications data will always be collected automatically, and stored for later use by the billing department of your phone company or the security services.
In addition to making billing information available to the security services, which contains details such as the numbers called from a certain phone line as well as the duration of these calls, the security services can also acquire information on which numbers called the monitored phone line and the duration of these calls. A Telephone tap during which only the former information is recorded but not the contents of the phone calls themselves, is called a Pen Register tap.
For telephone services run via digital exchanges, the information collected may additionally include a log of the type of communications media being used (some services treat data and voice communications differently to conserve bandwidth).
- See also: Carnivore
The unofficial tapping of telephone lines
It's also possible to tap conversations unofficially. There are a number of ways to monitor telephone conversations:
- Recording the conversation - the person making/receiving the call records the conversation using a 'telephone pickup coil' attached to the ear-piece, or they fit an in-line tap with a recording output. Both of these are easily available through electrical shops. Most who record telephone conversations, such as journalists, will use the recording for their own private work. But be aware that anything you say to someone you don't know may be recorded and used for other purposes.
- Direct line tap - this is what the state used to do via the telephone exchange. But unofficial tapping, where the user's line is physically tapped near the house, is also possible. The tap can either involve a direct electrical connection to the line, or an induction coil. An induction coil is usually placed underneath the base of a telephone or on the back of a telephone handset to pick up the signal inductively. There will be some drop in signal levels because of the loss of power from the line, and it may also generate noise on the line. An induction tap doesn't drain voltage or current from the line because it isn't physically connected to the phone line.
Direct taps usually require regular maintenance, either to change tapes or replace batteries, which may give away their presence.
- Radio tap - this is like a bug that fits on the telephone line. The state does not normally do this because they have access via the exchange, though certain organizations exempt from the common framework of law that applies to citizens may use devices like this. It can be fitted to one phone inside the house, or outside on the phone line. It may produce noise (you might even get signal feedback down the line on amateur made equipment) to alert you, but probably not as modern state of the art equipment operates in the 30-300 GHz range. The unit is powered from the line so once installed it's maintenance free, and only transmits when there is a call in progress. These devices tend to be low powered because the drain on the line would become too great, however a state of the art receiver could be located as far away as ten kilometers under ideal conditions, but is usually located within a radius of 1 to 3 km. Research however has also shown that a satellite can be used to pickup emissions in the range of a few milliwatts.
To guard against unofficial amateur line taps you should regularily inspect your phone itself, and your telephone line for new joins, or small wires connected to the line. If you have reason to suspect your phone has been tapped consult a Technical Surveillance Countermeasure (TCSM) specialist. Never contact a TCSM specialist from a phone you suspect is tapped or on any other phone on the premises or any other phone that is linked to you or your organization (home phone, company cellular etc.)
Location data and mobile phones
Mobile phones are, in surveillance terms, a major liability. This liability will only increase as the new third-generation (3G) phones are introduced. This is because the base stations will be located closer together.
For mobile phones the major threat is the collection of communications data. This data not only includes information about the time and duration of the call, but also the geographical location where the call was made from and to whom. This data can be determined generally because the geographic communications cell that the call was made in is stored with the details of the call. But it is also possible to get greater resolution of a person's location by combining information from a number of cells surrounding the persons location. This additional precision must be specifically enabled by the telephone company - it is not part of ordinary operation. There is no counter-measure against the state/telephone companies doing this.
The old first generation mobile phones could be easily monitored by anyone with a 'scanning all-band receiver' because the system used an analogue transmission system - like an ordinary radio transmitter. The second generation digital phones are harder to monitor because they use a digitally compressed transmission. However the state can tap mobile phones with the co-operation of the phone company. It's also possible for organisations with the correct technical equipment, such as large corporations, to monitor mobile phone communications and decrypt the audio. A special device called an "IMSI-catcher" pretends to the mobile phones in its vicinity to be a legitimate base station of the mobile phone network. This is possible because while the mobile phone has to authenticate itself to the mobile telephone network, the network does not authenticate itself to the mobile phone. This blatant flaw in GSM security was intentionally introduced to facilitate eavesdropping without the knowledge or cooperation of the mobile phone network. Once the mobile phone has accepted the IMSI-catcher as its base station the IMSI-catcher can deactivate GSM encryption using a special flag. All calls made from the tapped mobile phone go through the IMSI-catcher and are then passed on to the mobile network. Up to now no phone is known which actively alerts the user when a base station or an IMSI-catcher deactivates GSM encryption. Some phones include a special monitor mode (activated with secret codes or special software) which displays GSM operating parameters such as encryption while a call is being made. But no matter whether GSM encryption is active or not, users should not trust the encryption to be secure enough that an eavesdropper can not decrypt the encrypted data. The GSM specification refers to the encryption algorithms used for encrypting voice/data services as algorithms A5/1,2,3. Today a ciphertext-only attack (an attack without knowledge of some of the originally unencrypted plaintext) requires a few milliseconds to find the correct A5 decryption key allowing the attacker to eavesdrop on any GSM phone conversation within less than a second. Other exploits on GSM security easily allow call hijacking, altering of data messages and call theft.
There were proposals for European mobile phones to use stronger encryption, but this was opposed by a number of European states, including the Netherlands and Germany. They are some of the world's most prolific telephone tappers. (Over 10000+ phone numbers in both countries 2003.)
Mobile phones can be used anonymously, but it is very expensive to do. Pre-paid mobile phones can be bought without having to give details of your name or address, and because you insert cards there is no billing information. However, once you have been identified as using a certain phone, you can be tracked with the unique built-in IMEI (International Mobile Equipment Identification) that is burned into each mobile phone. The IMEI emitted by the phone does not change, regardless what SIM is inserted into the phone. It is even transmitted when no SIM at all is present in the phone. If you require longer-term anonymity it is necessary to change the phone and SIM every few days. Sometimes, for complete anonymity it is not advisable to have a mobile phone on your person at all. Some phones may still transmit information to the network or be accessible from the network even though the user has switched them off. It is therefore strongly recommended to remove the batteries from the phone.
One Ring Calls: These pesky calls cannot be recongnised by a caller ID as a CID displays the no. only after 2 rings. Their purpose is usually to see if you are talking to a person they know or if they just want to check on you. Exchange tapping is the only solution for these calls.
- The first version of text of this article was taken from http://secdocs.net/manual/lp-sec/scb7.html which is licensed under the GFDL, and hence can be used in Wikipedia.
- A guide to whether you can tape your phone conversation in the United States: http://www.rcfp.org/taping/
- Telephone tapping laws for Australia, Canada, Great Britain, and the USA: http://www.callcorder.com/phone-recording-law.htm
- The Administrative Office of the United States Courts reports annually to Congress the number and nature of federal and state wiretap applications, along with the number of times encryption was encountered (once in 2003). Recent reports can be found here: http://www.askcalea.net/reports.html
The contents of this article is licensed from www.wikipedia.org under the GNU Free Documentation License. Click here to see the transparent copy and copyright details