Chapter 8

Electronic Intercepts

Abstract

When all other investigative methods fail, intercepting electronic communications may be the only remaining option to obtain covert communications. Although legal requirements vary between particular jurisdictions, the technical requirements to intercept communications remain fairly consistent and, for the most part, are easy to implement effectively.

Keywords

Administrative order; Content; Court order; Covert entry; Dialed Number Recorder; DNR; E-mail; Key loggers; Metadata; Pen Register; Search warrant; Title III; Trap and Trace; Wiretaps

Introduction

Intercepting electronic communications has been around as long as electronic communications have existed. Even during the US Civil War, intercepting telegraphs ...

Get Hiding Behind the Keyboard now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.