O'Reilly logo

Hiding Behind the Keyboard by John Bair, Brett Shavers

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 8

Electronic Intercepts

Abstract

When all other investigative methods fail, intercepting electronic communications may be the only remaining option to obtain covert communications. Although legal requirements vary between particular jurisdictions, the technical requirements to intercept communications remain fairly consistent and, for the most part, are easy to implement effectively.

Keywords

Administrative order; Content; Court order; Covert entry; Dialed Number Recorder; DNR; E-mail; Key loggers; Metadata; Pen Register; Search warrant; Title III; Trap and Trace; Wiretaps

Introduction

Intercepting electronic communications has been around as long as electronic communications have existed. Even during the US Civil War, intercepting telegraphs ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required