Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Wiretapping
(section)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
===Internet=== In 1995, [[Peter Garza]], a Special Agent with the [[Naval Criminal Investigative Service]], conducted the first court-ordered Internet wiretap in the United States while investigating Julio Cesar "Griton" Ardita.<ref>{{Cite press release |title=Federal Cybersleuthers Armed With First Ever Computer Wiretap Order Net International hacker Charged With Illegally Entering Harvard and U.S. Military Computers |date=1996-03-29 |publisher=US Department of Justice |location=Washington, D.C. |url=https://www.justice.gov/archive/opa/pr/1996/March96/146.txt |access-date=2019-11-03}}</ref><ref>{{Cite press release |title=Argentine Computer Hacker Agrees to Waive Extradition and Returns to Plead Guilty to Felony Charges in Boston |date=1998-05-19 |publisher=US Department of Justice |location=Boston, MA |url=https://fas.org/irp/news/1998/05/arditasnt.htm |access-date=2019-11-03}}</ref> As technologies emerge, including [[VoIP]], new questions are raised about law enforcement access to communications (see [[VoIP recording]]). In 2004, the [[Federal Communications Commission]] was asked to clarify how the [[Communications Assistance for Law Enforcement Act]] (CALEA) related to Internet service providers. The FCC stated that “providers of broadband Internet access and voice over Internet protocol (“VoIP”) services are regulable as “telecommunications carriers” under the Act.”<ref>{{cite court |litigants=American Council on Education v. Federal Communications Commission and Verizon Telephone Companies |opinion=05-1404 |court=D.C. Cir. |date=2006-06-09 |url=http://fjallfoss.fcc.gov/edocs_public/attachmatch/DOC-266204A1.pdf |archive-url=https://ghostarchive.org/archive/20221009/http://fjallfoss.fcc.gov/edocs_public/attachmatch/DOC-266204A1.pdf |archive-date=2022-10-09 |url-status=live |access-date=2010-06-01 |format=PDF }}</ref> Those affected by the Act will have to provide access to law enforcement officers who need to monitor or intercept communications transmitted through their networks. As of 2009, warrantless surveillance of internet activity has consistently been upheld in [[FISA court]].<ref>{{Cite news |url=https://www.nytimes.com/2009/01/16/washington/16fisa.html?_r=2&hp |title=Court Affirms Wiretapping Without Warrant |last1=Risen |first1=James |date=2009-01-15 |work=The New York Times |last2=Lichtblau |first2=Eric}}</ref> The [[Internet Engineering Task Force]] has decided not to consider requirements for wiretapping as part of the process for creating and maintaining IETF standards.<ref>{{cite IETF |title=IETF Policy on Wiretapping |rfc=2804 |date=May 2000 |publisher=[[Internet Engineering Task Force|IETF]] }}</ref> Typically, illegal Internet wiretapping is conducted via [[Wi-Fi]] connection to someone's Internet by cracking the [[Wired Equivalent Privacy|WEP]] or [[Wi-Fi Protected Access|WPA]] key, using a tool such as [[Aircrack-ng]] or [[Kismet (software)|Kismet]].<ref>{{Cite web |url=http://www.grape-info.com/doc/linux/config/aircrack-ng-0.6.html |title=Aircrack-ng (WEP, WPA-PSK Crack) |url-status=dead |archive-url=https://web.archive.org/web/20061101160012/http://www.grape-info.com/doc/linux/config/aircrack-ng-0.6.html |archive-date=2006-11-01 |access-date=2014-07-22}}</ref><ref>{{Cite web |url=http://www.wi-fiplanet.com/tutorials/article.php/3595531 |title=Introduction to Kismet |last=Weiss |first=Aaron |date=2006-03-30 |website=Wi-Fi Planet |url-status=dead |archive-url=https://web.archive.org/web/20140727001900/http://www.wi-fiplanet.com/tutorials/article.php/3595531 |archive-date=2014-07-27 |access-date=2014-07-22}}</ref> Once in, the intruder relies on a number of potential tactics, for example an [[ARP spoofing]] attack, allowing the intruder to view [[Packet (information technology)|packets]] in a tool such as [[Wireshark]] or [[Ettercap (computing)|Ettercap]].
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)