Democratic Underground Latest Greatest Lobby Journals Search Options Help Login
Google

Logistics of wiretapping

Printer-friendly format Printer-friendly format
Printer-friendly format Email this thread to a friend
Printer-friendly format Bookmark this thread
This topic is archived.
Home » Discuss » Archives » General Discussion (01/01/06 through 01/22/2007) Donate to DU
 
SCDem Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Jan-05-06 12:14 PM
Original message
Logistics of wiretapping
I am not a member of the NSA, CIA or FAA so I do not the specifics of how to wiretap a conversation. The little that I have picked up from fictional TV and movies leaves me with the impression that someone has to physically enter your place of residence and do what ever to the actual phone (talking just about regular land lines here).

Is this so?

Because if this is true it means that government has literally been in thousands of homes.
Printer Friendly | Permalink |  | Top
evermind Donating Member (833 posts) Send PM | Profile | Ignore Thu Jan-05-06 12:18 PM
Response to Original message
1. No physical entry is required, just privileged access to telephone company
computers (switches) or other points on the telephony network where data can be monitored.
Printer Friendly | Permalink |  | Top
 
ptolle Donating Member (423 posts) Send PM | Profile | Ignore Thu Jan-05-06 12:31 PM
Response to Reply #1
5. rf
And don't forget how much of our comm net depends on microwave/radio frequency technologies these days. Matter of fact my link to the internets is a radio frequency technology.
Printer Friendly | Permalink |  | Top
 
davepc Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Jan-05-06 12:23 PM
Response to Original message
2. thats the stuff of 1960's spy movies
Edited on Thu Jan-05-06 12:23 PM by davepc
Most of the 'guts' of telecommunications are digital, no need to plant a bug in the receiver, you can access the data going over the line anywhere as long as you have a way around the encryption that secures the networks.
Printer Friendly | Permalink |  | Top
 
One_Life_To_Give Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Jan-05-06 12:23 PM
Response to Original message
3. No need to enter your house.
Anyplace on the wire pair will work. So your line could be tapped at the telco central office. But that would only be used if the intent was to tap your line exclusivly. To listen in or scan the majority of phone conversations. Taping into the long distance carrier lines would be more cost effective.
Printer Friendly | Permalink |  | Top
 
SCDem Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Jan-05-06 12:27 PM
Response to Original message
4. Thanks for clearing that up
I wonder if there is a device that can be placed on the phone (or the line) to block any attempts to wiretap (eavesdrop on a conversation.
Printer Friendly | Permalink |  | Top
 
evermind Donating Member (833 posts) Send PM | Profile | Ignore Thu Jan-05-06 12:39 PM
Response to Reply #4
8. For blocking eavesdropping, you'd need to encrypt your conversation,
and have it decrypted at the other end, using something like the encryption technologies that are commonly used to protect email (PGP, GPG, etc., ie public key encryption).

There's probably hardware to do this on land-lines (though I don't know), but I think it's easier done by using internet telephony (voice-over-IP, VOIP) like skype, etc. and encrypting the audio data before it leaves your computer. I believe you can get public key encryption plugins for some VOIP applications. Large key sizes (2048 bits and up) should guarantee it's next to impossible to to break - unless the NSA have major mathematical or computing breakthroughs they aren't letting on about...

I doubt there's a way of scrambling your call, or altering the electrical characteristics of the line, to stop tapping without having to have a corresponding descrambler at the other end. As pointed out above, almost all calls involve a digital stage at some point these days. If your call can't be digitised then the person at the other end won't be able to hear it. If it *can* be digitized, then it's vulnerable to tapping at the digital stage..
Printer Friendly | Permalink |  | Top
 
Cleetus Donating Member (405 posts) Send PM | Profile | Ignore Thu Jan-05-06 12:32 PM
Response to Original message
6. Data mining
One would think that the feds have at least the same resources as Google.

I envision enormous facilities housing countless computers that continually monitor internet activity, looking for matches to their search criteria, including ip info and traffic content. It is doubtful that all the traffic on the internet can be monitored in real time, but that hardly matters.

Look at the wealth of information that Google has indexed. Over time, incredible amounts of data can be gathered.

I imagine that as the volume of data increases, the data is further processed using tighter criteria. Up until this point, no human intervention is required.

A mountain of data is gathered, the data is analyzed, at that point people look at the data. Persons of interest are placed on the shitlist.

We all know what happens from there.

That's how I see it.

I suspect that the internet is used more for the transmission of information than telephones.

Printer Friendly | Permalink |  | Top
 
unhappycamper Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Jan-05-06 12:36 PM
Response to Original message
7. Physical access is not necessary for wiretapping.
You only need to access the switch to get everything.

Here's an overview of the telephone network.

The switches come in many flavors; 5ESS and DMS100 are two of the biggies in the telephone biz.

Every time you dial or answer your phone, a new record of your activity is written to the switch logs. Millions and millions of switch records are aggregated daily to accurately bill telephone usage.
Printer Friendly | Permalink |  | Top
 
On the Road Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Jan-05-06 12:39 PM
Response to Original message
9. From Wikipedia:
"When telephone exchanges were mechanical, a tap had to be installed by technicians, linking circuits together to route the audio signal from the call. Now that many exchanges have been converted to digital technology tapping is far simpler and can be ordered remotely by computer. Telephone services provided by cable TV companies also use digital switching technology. If the tap is implemented at a digital switch, the switching computer simply copies the digitzed bits that represent the phone conversation to a second line and it is impossible to tell whether a line is being tapped. Even a well designed tap installed on a phone wire can be difficult to detect. The noises that some people believe to be telephone taps are simply crosstalk created by the coupling of signals from other phone lines.

Data on the calling and called number, time of call and duration, will generally be collected automatically on all calls and stored for later use by the billing department of the phone company. This data can be accessed by security services, often with fewer legal restrictions than for a tap. This information used to be collected using special equipment known as pen registers and trap and trace devices and U.S. law still refers to it under those names. Today, a list of all calls to a specific number can be obtained by sorting billing records. A telephone tap during which only the call information is recorded but not the contents of the phone calls themselves, is called a Pen Register tap."

http://en.wikipedia.org/wiki/Wiretap


On the NSA spying, it seemed that the data was being gathered by picking satellite transmissions out of the air. That would include most international and some domestic long-distance.



Printer Friendly | Permalink |  | Top
 
melm00se Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Jan-05-06 12:46 PM
Response to Original message
10. Under CALEA
(Communications Assistance for Law Enforcement Act, 1994), telco carriers were required, by law, to provide law enforcement, the ability and assistance to electronically surveille (sp?) telco traffic (assuming a lawful court order). this "forced" telcos and their equipment providers to create access ports (physical or virtual) into their equipment so the FBI technician on the phone pole was no longer necessary. Law Enforcement could just "plug" into the central office switch and monitor the call traffic.
Printer Friendly | Permalink |  | Top
 
ThomWV Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Jan-05-06 12:51 PM
Response to Original message
11. You Don't Even Need That Much Access
In truth you certainly don't need access to the 'wires'.

You really don't need to get to the switching to make duplicates either.

In fact you don't really have to have access to the satellites.

Oh, and if you happen to be using a cordless phone or computer connection of any sort at all, well, heh heh heh, what can I say?
Printer Friendly | Permalink |  | Top
 
DU AdBot (1000+ posts) Click to send private message to this author Click to view 
this author's profile Click to add 
this author to your buddy list Click to add 
this author to your Ignore list Tue Apr 30th 2024, 05:28 PM
Response to Original message
Advertisements [?]
 Top

Home » Discuss » Archives » General Discussion (01/01/06 through 01/22/2007) Donate to DU

Powered by DCForum+ Version 1.1 Copyright 1997-2002 DCScripts.com
Software has been extensively modified by the DU administrators


Important Notices: By participating on this discussion board, visitors agree to abide by the rules outlined on our Rules page. Messages posted on the Democratic Underground Discussion Forums are the opinions of the individuals who post them, and do not necessarily represent the opinions of Democratic Underground, LLC.

Home  |  Discussion Forums  |  Journals |  Store  |  Donate

About DU  |  Contact Us  |  Privacy Policy

Got a message for Democratic Underground? Click here to send us a message.

© 2001 - 2011 Democratic Underground, LLC