Search This Blog

Thursday, August 3, 2023

Fraud

From Wikipedia, the free encyclopedia
A fake automated teller slot used to commit bank fraud upon bank patrons.

In law, fraud is intentional deception to secure unfair or unlawful gain, or to deprive a victim of a legal right. Fraud can violate civil law (e.g., a fraud victim may sue the fraud perpetrator to avoid the fraud or recover monetary compensation) or criminal law (e.g., a fraud perpetrator may be prosecuted and imprisoned by governmental authorities), or it may cause no loss of money, property, or legal right but still be an element of another civil or criminal wrong. The purpose of fraud may be monetary gain or other benefits, for example by obtaining a passport, travel document, or driver's license, or mortgage fraud, where the perpetrator may attempt to qualify for a mortgage by way of false statements.

Internal fraud, also known as "insider fraud", is fraud committed or attempted by someone within an organisation such as an employee.

A hoax is a distinct concept that involves deliberate deception without the intention of gain or of materially damaging or depriving a victim.

As a civil wrong

In common law jurisdictions, as a civil wrong, fraud is a tort. While the precise definitions and requirements of proof vary among jurisdictions, the requisite elements of fraud as a tort generally are the intentional misrepresentation or concealment of an important fact upon which the victim is meant to rely, and in fact does rely, to the harm of the victim. Proving fraud in a court of law is often said to be difficult as the intention to defraud is the key element in question. As such, proving fraud comes with a "greater evidentiary burden than other civil claims". This difficulty is exacerbated by the fact that some jurisdictions require the victim to prove fraud by clear and convincing evidence.

The remedies for fraud may include rescission (i.e., reversal) of a fraudulently obtained agreement or transaction, the recovery of a monetary award to compensate for the harm caused, punitive damages to punish or deter the misconduct, and possibly others.

In cases of a fraudulently induced contract, fraud may serve as a defense in a civil action for breach of contract or specific performance of contract. Similarly, fraud may serve as a basis for a court to invoke its equitable jurisdiction.

As a criminal offense

In common law jurisdictions, as a criminal offense, fraud takes many different forms, some general (e.g., theft by false pretense) and some specific to particular categories of victims or misconduct (e.g., bank fraud, insurance fraud, forgery). The elements of fraud as a crime similarly vary. The requisite elements of perhaps the most general form of criminal fraud, theft by false pretense, are the intentional deception of a victim by false representation or pretense with the intent of persuading the victim to part with property and with the victim parting with property in reliance on the representation or pretense and with the perpetrator intending to keep the property from the victim.

By region

North America

Canada

Section 380(1) of the Criminal Code provides the general definition for fraud in Canada:

380. (1) Every one who, by deceit, falsehood or other fraudulent means, whether or not it is a false pretence within the meaning of this Act, defrauds the public or any person, whether ascertained or not, of any property, money or valuable security or any service,

(a) is guilty of an indictable offence and liable to a term of imprisonment not exceeding fourteen years, where the subject-matter of the offence is a testamentary instrument or the value of the subject-matter of the offence exceeds five thousand dollars; or
(b) is guilty
(i) of an indictable offence and is liable to imprisonment for a term not exceeding two years, or
(ii) of an offence punishable on summary conviction, where the value of the subject-matter of the offence does not exceed five thousand dollars.

In addition to the penalties outlined above, the court can also issue a prohibition order under s. 380.2 (preventing a person from "seeking, obtaining or continuing any employment, or becoming or being a volunteer in any capacity, that involves having authority over the real property, money or valuable security of another person"). It can also make a restitution order under s. 380.3.

The Canadian courts have held that the offence consists of two distinct elements:

  • A prohibited act of deceit, falsehood or other fraudulent means. In the absence of deceit or falsehood, the courts will look objectively for a "dishonest act"; and
  • The deprivation must be caused by the prohibited act, and deprivation must relate to property, money, valuable security, or any service.

The Supreme Court of Canada has held that deprivation is satisfied on proof of detriment, prejudice or risk of prejudice; it is not essential that there be actual loss. Deprivation of confidential information, in the nature of a trade secret or copyrighted material that has commercial value, has also been held to fall within the scope of the offence.

United States

Criminal fraud

The proof requirements for criminal fraud charges in the United States are essentially the same as the requirements for other crimes: guilt must be proved beyond a reasonable doubt. Throughout the United States fraud charges can be misdemeanours or felonies depending on the amount of loss involved. High value fraud can also trigger additional penalties. For example, in California, losses of $500,000 or more will result in an extra two, three, or five years in prison in addition to the regular penalty for the fraud.

The U.S. government's 2006 fraud review concluded that fraud is a significantly under-reported crime, and while various agencies and organizations were attempting to tackle the issue, greater co-operation was needed to achieve a real impact in the public sector. The scale of the problem pointed to the need for a small but high-powered body to bring together the numerous counter-fraud initiatives that existed.

Civil fraud

Although elements may vary by jurisdiction and the specific allegations made by a plaintiff who files a lawsuit that alleged fraud, typical elements of a fraud case in the United States are that:

  1. Somebody misrepresents a material fact in order to obtain action or forbearance by another person;
  2. The other person relies upon the misrepresentation; and
  3. The other person suffers injury as a result of the act or forbearance taken in reliance upon the misrepresentation.

To establish a civil claim of fraud, most jurisdictions in the United States require that each element of a fraud claim be pleaded with particularity and be proved by a preponderance of the evidence, meaning that it is more likely than not that the fraud occurred. Some jurisdictions impose a higher evidentiary standard, such as Washington State's requirement that the elements of fraud be proved with clear, cogent, and convincing evidence (very probable evidence), or Pennsylvania's requirement that common law fraud be proved by clear and convincing evidence.

The measure of damages in fraud cases is normally computed using one of two rules:

  1. The "benefit of bargain" rule, which allows for recovery of damages in the amount of the difference between the value of the property had it been as represented and its actual value;
  2. Out-of-pocket loss, which allows for the recovery of damages in the amount of the difference between the value of what was given and the value of what was received.

Special damages may be allowed if shown to have been proximately caused by defendant's fraud and the damage amounts are proved with specificity.

Many jurisdictions permit a plaintiff in a fraud case to seek punitive or exemplary damages.

Asia

China

Zhang Yingyu's story collection The Book of Swindles (available here; ca. 1617) testifies to rampant commercial fraud, especially involving itinerant businessmen, in late Ming China. The Economist, CNN, and other media outlets regularly report on incidents of fraud or bad faith in Chinese business and trade practices. Forbes cites cybercrime as a persistent and growing threat to Chinese consumers.

India

In India the criminal laws are enshrined in the Indian Penal Code. It is supplemented by the Criminal Procedure Code and Indian Evidence Act.

Europe

United Kingdom

In 2016 the estimated value lost through fraud in the UK was £193 billion a year.

In January 2018 the Financial Times reported that the value of UK fraud hit a 15-year high of £2.11bn in 2017, according to a study. The article said that the accountancy firm BDO examined reported fraud cases worth more than £50,000 and found that the total number rose to 577 in 2017, compared with 212 in 2003. The study found that the average amount stolen in each incident rose to £3.66m, up from £1.5m in 2003.

As at November 2017, fraud is the most common criminal offence in the UK according to a study by Crowe Clark Whitehill, Experian and the Centre for Counter Fraud Studies. The study suggests the UK loses over £190 billion per year to fraud. £190 billion is more than 9% of the UK's projected GDP for 2017 ($2,496 (£2,080) billion according to Statistics Times.) The estimate for fraud in the UK figure is more than the entire GDP of countries such as Romania, Qatar and Hungary.

According to another review by the UK anti-fraud charity Fraud Advisory Panel (FAP), business fraud accounted for £144bn, while fraud against individuals was estimated at £9.7bn. The FAP has been particularly critical of the support available from the police to victims of fraud in the UK outside of London. Although victims of fraud are generally referred to the UK's national fraud and cyber crime reporting centre, Action Fraud, the FAP found that there was "little chance" that these crime reports would be followed up with any kind of substantive law enforcement action by UK authorities, according to the report.

In July 2016, it was reported that fraudulent activity levels in the UK increased in the 10 years leading up to 2016 from £52 billion to £193 bn. This figure would be a conservative estimate, since as the former commissioner of the City of London Police, Adrian Leppard, has said, only 1 in 12 such crimes are actually reported. Donald Toon, director of the NCA's economic crime command, stated in July 2016: "The annual losses to the UK from fraud are estimated to be more than £190bn". Figures released in October 2015 from the Crime Survey of England and Wales found that there had been 5.1 million incidents of fraud in England and Wales in the previous year, affecting an estimated one in 12 adults and making it the most common form of crime.

Also in July 2016, the Office for National Statistics (ONS) stated "Almost six million fraud and cyber crimes were committed last year in England and Wales and estimated there were two million computer misuse offences and 3.8 million fraud offences in the 12 months to the end of March 2016." Fraud affects one in ten people in the UK. According to the ONS, most fraud relates to bank account fraud. These figures are separate from the headline estimate that another 6.3 million crimes (distinct from fraud) were perpetrated in the UK against adults in the year to March 2016.

Fraud was not included in a "Crime Harm Index" published by the Office for National Statistics in 2016. Michael Levi, professor of criminology at Cardiff University, remarked in August 2016 that it was "deeply regrettable" that fraud was being left out of the first index despite being the most common crime reported to police in the UK. Levi said "If you've got some categories that are excluded, they are automatically left out of the police's priorities." The Chief of the National Audit Office (NAO), Sir Anyas Morse has also said "For too long, as a low-value but high-volume crime, online fraud has been overlooked by government, law enforcement and industry. It is now the most commonly experienced crime in England and Wales and demands an urgent response."

HM Treasury issued guidance to central government departments in January 2011 concerned with "Tackling Internal Fraud", concerned that economic pressures and potential staff redundancies at the time might lead those staff who "might be tempted" to commit fraud to make more of any opportunity which might arise, noting a possible shift in the balance between "the reward from fraud" and the risk of detection. An aspect of the guidance was to equip staff to look out for "fraud indicators": clues or hints that an individual member of staff, team or area of activity might need "a closer look".

In 2022, the television program Scam Interceptors revealed that the majority of fraud in the United Kingdom was perpetrated from industrial-scale scamming call centres in Asia.

England, Wales, and Northern Ireland

Since 2007, fraud in England and Wales and Northern Ireland has been covered by the Fraud Act 2006. The Act was given Royal Assent on 8 November 2006, and came into effect on 15 January 2007.

The Act gives a statutory definition of the criminal offence of fraud, defining it in three classes—fraud by false representation, fraud by failing to disclose information, and fraud by abuse of position. It provides that a person found guilty of fraud is liable to a fine or imprisonment for up to twelve months on summary conviction (six months in Northern Ireland), or a fine or imprisonment for up to ten years on conviction on indictment. This Act largely replaces the laws relating to obtaining property by deception, obtaining a pecuniary advantage and other offences that were created under the Theft Act 1978.

Scotland

In Scots law, fraud is covered under the common law and a number of statutory offences. The main fraud offences are common law fraud, uttering, embezzlement, and statutory fraud. The Fraud Act 2006 does not apply in Scotland.

Governmental Organizations

The Serious Fraud Office is an arm of the Government of the United Kingdom, accountable to the Attorney-General.

The National Fraud Authority (NFA) was, until 2014, a government agency coordinating the counter-fraud response in the UK.

Cifas is a British fraud prevention service, a not-for-profit membership organization for all sectors that enables organizations to share and access fraud data using their databases. Cifas is dedicated to the prevention of fraud, including internal fraud by staff, and the identification of financial and related crime.

Cost

Participants of a 2010 survey by the Association of Certified Fraud Examiners estimated that the typical organization loses five percent of its annual revenue to fraud, with a median loss of $160,000. Fraud committed by owners and executives were more than nine times as costly as employee fraud. The industries most commonly affected are banking, manufacturing, and government.

Types of fraudulent acts

The highly decorated fake uniform worn by a man impersonating a "Marine" caught by two gunnery sergeants at Times Square in New York City, New York
An advertisement for possibly fraudulent "work-at-home scheme"

The falsification of documents, known as forgery, and counterfeiting are types of fraud involved in physical duplication or fabrication. The "theft" of one's personal information or identity, like one finding out another's social security number and then using it as identification, is a type of fraud. Fraud can be committed through and across many media including mail, wire, phone, and the Internet (computer crime and Internet fraud).

Given the international nature of the web and ease with which users can hide their location, obstacles to checking identity and legitimacy online, and the variety of hacker techniques available to gain access to PII have all contributed to the very rapid growth of Internet fraud. In some countries, tax fraud is also prosecuted under false billing or tax forgery. There have also been fraudulent "discoveries", e.g., science, where the appetite is for prestige rather than immediate monetary gain.

Commodities fraud

The illegal act of obtaining (or the attempt of obtaining) a certain amount of currency in accordance with a contract that promises the later exchange of equated assets, which ultimately never arrive, is a type of fraud, known as commodities fraud. Alternatively, the term can relate to: the failure of registering in an exchange; the act of deliberately providing falsified information to clients; the action of executing transactions with the sole purpose of making a profit for the payee; the theft of client funds.                                                                                                                                            

Detection

A fraudulent manufacturer's suggested retail price on a speaker

The detection of fraudulent activities on a large scale is possible with the harvesting of massive amounts of financial data paired with predictive analytics or forensic analytics, the use of electronic data to reconstruct or detect financial fraud.

Using computer-based analytic methods in particular allows for surfacing of errors, anomalies, inefficiencies, irregularities, and biases which often refer to fraudsters gravitating to certain dollar amounts to get past internal control thresholds. These high-level tests include tests related to Benford's Law and possibly also those statistics known as descriptive statistics. High-level tests are always followed by more focused tests to look for small samples of highly irregular transactions. The familiar methods of correlation and time-series analysis can also be used to detect fraud and other irregularities.

Anti-fraud provisioning

Beyond laws that aim at prevention of fraud, there are also governmental and non-governmental organizations that aim to fight fraud. Between 1911 and 1933, 47 states adopted the so-called Blue Sky Laws status. These laws were enacted and enforced at the state level and regulated the offering and sale of securities to protect the public from fraud. Though the specific provisions of these laws varied among states, they all required the registration of all securities offerings and sales, as well as of every U.S. stockbroker and brokerage firm. However, these Blue Sky laws were generally found to be ineffective. To increase public trust in the capital markets the President of the United States, Franklin D. Roosevelt, established the U.S. Securities and Exchange Commission (SEC). The main reason for the creation of the SEC was to regulate the stock market and prevent corporate abuses relating to the offering and sale of securities and corporate reporting. The SEC was given the power to license and regulate stock exchanges, the companies whose securities traded on them, and the brokers and dealers who conducted the trading.

Wiretapping

From Wikipedia, the free encyclopedia
https://en.wikipedia.org/wiki/Wiretapping

Wiretapping also known as wire tapping or telephone tapping, is the monitoring of telephone and Internet-based conversations by a third party, often by covert means. The wire tap received its name because, historically, the monitoring connection was an actual electrical tap on an analog telephone or telegraph line. Legal wiretapping by a government agency is also called lawful interception. Passive wiretapping monitors or records the traffic, while active wiretapping alters or otherwise affects it.

Legal status

Telephone line control device "Jitka", used in late 1960s by Czechoslovakian StB to signal line occupancy, and connect a recorder

Lawful interception is officially strictly controlled in many countries to safeguard privacy; this is the case in all liberal democracies. In theory, telephone tapping often needs to be authorized by a court, and is again in theory, normally only approved when evidence shows it is not possible to detect criminal or subversive activity in less intrusive ways. Oftentimes, the law and regulations require that the crime investigated must be at least of a certain severity. Illegal or unauthorized telephone tapping is often a criminal offense. In certain jurisdictions, such as Germany and France, courts will accept illegally recorded phone calls without the other party's consent as evidence, but the unauthorized telephone tapping will still be prosecuted.

United States

In the United States, under the Foreign Intelligence Surveillance Act, federal intelligence agencies can get approval for wiretaps from the United States Foreign Intelligence Surveillance Court, a court with secret proceedings, or in certain circumstances from the Attorney General without a court order.

The telephone call recording laws in most U.S. states require only one party to be aware of the recording, while twelve states require both parties to be aware. In Nevada, the state legislature enacted a law making it legal for a party to record a conversation if one party to the conversation consented, but the Nevada Supreme Court issued two judicial opinions changing the law and requiring all parties to consent to the recording of a private conversation for it to be legal. It is considered better practice to announce at the beginning of a call that the conversation is being recorded.

The Fourth Amendment to the United States Constitution protects privacy rights by requiring a warrant to search an individual. However, telephone tapping is the subject of controversy surrounding violations of this right. There are arguments that wiretapping invades an individual's personal privacy and therefore violates their Fourth Amendment rights. On the other hand, there are certain rules and regulations, which permit wiretapping. A notable example of this is the Patriot Act. The Patriot act does, in certain circumstances, give the government permission to wiretap citizens. In addition, wiretapping laws vary per state which makes it even more difficult to determine whether the Fourth Amendment is being violated.

Canada

In Canadian law, police are allowed to wiretap without the authorization from a court when there is the risk for imminent harm, such as kidnapping or a bomb threat. They must believe that the interception is immediately necessary to prevent an unlawful act that could cause serious harm to any person or to property. This was introduced by Rob Nicholson on February 11, 2013, and is also known as Bill C-55. The Supreme Court gave Parliament twelve months to rewrite a new law. Bill C-51 (also known as the Anti-Terrorism Act) was then released in 2015, which transformed the Canadian Security Intelligence Service from an intelligence-gathering agency to an agency actively engaged in countering national security threats.

Legal protection extends to 'private communications' where the participants would not expect unintended persons to learn the content of the communication. A single participant can legally, and covertly record a conversation. Otherwise police normally need a judicial warrant based upon probable grounds to record a conversation they are not a part of. In order to be valid wiretap authorization must state: 1) the offense being investigated by the wiretap, 2) the type of communication, 3) the identity of the people or places targeted, 4) the period of validity (60 days from issue).

India

In India, the lawful interception of communication by authorized law enforcement agencies (LEAs) is carried out in accordance with Section 5(2) of the Indian Telegraph Act, 1885 read with Rule 419A of Indian Telegraph (Amendment) Rules, 2007. Directions for interception of any message or class of messages under sub-section (2) of Section 5 of the Indian Telegraph Act, 1885 shall not be issued except by an order made by the Secretary to the Government of India in the Ministry of Home Affairs in the case of Government of India and by the Secretary to the State Government in-charge of the Home Department in the case of a state government. The government has set up the Centralized Monitoring System (CMS) to automate the process of lawful interception and monitoring of telecommunications technology. The government of India on 2015 December 2 in a reply to parliament question no. 595 on scope, objectives and framework of the CMS has struck a balance between national security, online privacy and free speech informed that to take care of the privacy of citizens, lawful interception and monitoring is governed by the Section 5(2) of Indian Telegraph Act, 1885 read with Rule 419A of Indian Telegraph (Amendment) Rules, 2007 wherein oversight mechanism exists in form of review committee under chairmanship of the Cabinet Secretary at Central Government level and Chief Secretary of the State at the state government level. Section 5(2) also allows the government to intercept messages that are public emergencies or for public safety.

Methods

Official use

The contracts or licenses by which the state controls telephone companies often require that the companies must provide access to tapping lines to law enforcement. In the U.S., telecommunications carriers are required by law to cooperate in the interception of communications for law enforcement purposes under the terms of Communications Assistance for Law Enforcement Act (CALEA).

When telephone exchanges were mechanical, a tap had to be installed by technicians, linking circuits together to route the audio signal from the call. Now that many exchanges have been converted to digital technology, tapping is far simpler and can be ordered remotely by computer. This central office switch wiretapping technology using the Advanced Intelligent Network (AIN) was invented by Wayne Howe and Dale Malik at BellSouth's Advanced Technology R&D group in 1995 and was issued as US Patent #5,590,171. Telephone services provided by cable TV companies also use digital switching technology. If the tap is implemented at a digital switch, the switching computer simply copies the digitized bits that represent the phone conversation to a second line and it is impossible to tell whether a line is being tapped. A well-designed tap installed on a phone wire can be difficult to detect. In some places, some law enforcement may be able to even access a mobile phone's internal microphone even while it isn't actively being used on a phone call (unless the battery is removed or drained). The noises that some people believe to be telephone taps are simply crosstalk created by the coupling of signals from other phone lines.

Data on the calling and called number, time of call and duration, will generally be collected automatically on all calls and stored for later use by the billing department of the phone company. These data can be accessed by security services, often with fewer legal restrictions than for a tap. This information used to be collected using special equipment known as pen registers and trap and trace devices and U.S. law still refers to it under those names. Today, a list of all calls to a specific number can be obtained by sorting billing records. A telephone tap during which only the call information is recorded but not the contents of the phone calls themselves, is called a pen register tap.

For telephone services via digital exchanges, the information collected may additionally include a log of the type of communications media being used (some services treat data and voice communications differently, in order to conserve bandwidth).

Non-official use

A telephone recording adapter (in-line tap). The phone jack connects to the wall socket while the phone being monitored is connected to the adapter's socket. The audio plug connects to the recording device (computer, tape recorder, etc.).

Conversations can be recorded or monitored unofficially, either by tapping by a third party without the knowledge of the parties to the conversation or recorded by one of the parties. This may or may not be illegal, according to the circumstances and the jurisdiction.

There are a number of ways to monitor telephone conversations. One of the parties may record the conversation, either on a tape or solid-state recording device, or they may use a computer running call recording software. The recording, whether overt or covert, may be started manually, automatically when it detects sound on the line (VOX), or automatically whenever the phone is off the hook.

  • using an inductive coil tap (telephone pickup coil) attached to the handset or near the base of the telephone, picking up the stray field of the telephone's hybrid;
  • fitting an in-line tap, as discussed below, with a recording output;
  • using an in-ear microphone while holding the telephone to the ear normally; this picks up both ends of the conversation without too much disparity between the volumes;
  • more crudely and with lower quality, simply using a speakerphone and recording with a normal microphone.

The conversation may be monitored (listened to or recorded) covertly by a third party by using an induction coil or a direct electrical connection to the line using a beige box. An induction coil is usually placed underneath the base of a telephone or on the back of a telephone handset to pick up the signal inductively. An electrical connection can be made anywhere in the telephone system, and need not be in the same premises as the telephone. Some apparatus may require occasional access to replace batteries or tapes. Poorly designed tapping or transmitting equipment can cause interference audible to users of the telephone.

The tapped signal may either be recorded at the site of the tap or transmitted by radio or over the telephone wires. As of 2007 state-of-the-art equipment operates in the 30–300 GHz range to keep up with telephone technology compared to the 772 kHz systems used in the past. The transmitter may be powered from the line to be maintenance-free, and only transmits when a call is in progress. These devices are low-powered as not much power can be drawn from the line, but a state-of-the-art receiver could be located as far away as ten kilometers under ideal conditions, though usually located much closer. Research has shown that a satellite can be used to receive terrestrial transmissions with a power of a few milliwatts. Any sort of radio transmitter whose presence is suspected is detectable with suitable equipment.

Conversation on many early cordless telephones could be picked up with a simple radio scanner or sometimes even a domestic radio. Widespread digital spread spectrum technology and encryption has made eavesdropping increasingly difficult.

A problem with recording a telephone conversation is that the recorded volume of the two speakers may be very different. A simple tap will have this problem. An in-ear microphone, while involving an additional distorting step by converting the electrical signal to sound and back again, in practice gives better-matched volume. Dedicated, and relatively expensive, telephone recording equipment equalizes the sound at both ends from a direct tap much better.

Location data

Mobile phones are, in surveillance terms, a major liability. For mobile phones the major threat is the collection of communications data. This data does not only include information about the time, duration, originator and recipient of the call, but also the identification of the base station where the call was made from, which equals its approximate geographical location. This data is stored with the details of the call and has utmost importance for traffic analysis.

It is also possible to get greater resolution of a phone's location by combining information from a number of cells surrounding the location, which cells routinely communicate (to agree on the next handoff—for a moving phone) and measuring the timing advance, a correction for the speed of light in the GSM standard. This additional precision must be specifically enabled by the telephone company—it is not part of the network's ordinary operation.

Internet

In 1995, Peter Garza, a Special Agent with the Naval Criminal Investigative Service, conducted the first court-ordered Internet wiretap in the United States while investigating Julio Cesar "Griton" Ardita.

As technologies emerge, including VoIP, new questions are raised about law enforcement access to communications (see VoIP recording). In 2004, the Federal Communications Commission was asked to clarify how the Communications Assistance for Law Enforcement Act (CALEA) related to Internet service providers. The FCC stated that “providers of broadband Internet access and voice over Internet protocol (“VoIP”) services are regulable as “telecommunications carriers” under the Act.” Those affected by the Act will have to provide access to law enforcement officers who need to monitor or intercept communications transmitted through their networks. As of 2009, warrantless surveillance of internet activity has consistently been upheld in FISA court.

The Internet Engineering Task Force has decided not to consider requirements for wiretapping as part of the process for creating and maintaining IETF standards.

Typically, illegal Internet wiretapping will be conducted via Wi-Fi connection to someone's internet by cracking the WEP or WPA key, using a tool such as Aircrack-ng or Kismet. Once in, the intruder will rely on a number of potential tactics, for example an ARP spoofing attack which will allow the intruder to view packets in a tool such as Wireshark or Ettercap.

Mobile phone

The second generation mobile phones (c. 1978 through 1990) could be easily monitored by anyone with a 'scanning all-band receiver' because the system used an analog transmission system-like an ordinary radio transmitter. The third generation digital phones are harder to monitor because they use digitally encoded and compressed transmission. However the government can tap mobile phones with the cooperation of the phone company. It is also possible for organizations with the correct technical equipment to monitor mobile phone communications and decrypt the audio.

To the mobile phones in its vicinity, a device called an "IMSI-catcher" pretends to be a legitimate base station of the mobile phone network, thus subjecting the communication between the phone and the network to a man-in-the-middle attack. This is possible because, while the mobile phone has to authenticate itself to the mobile telephone network, the network does not authenticate itself to the phone. There is no defense against IMSI-catcher based eavesdropping, except using end-to-end call encryption; products offering this feature, secure telephones, are already beginning to appear on the market, though they tend to be expensive and incompatible with each other, which limits their proliferation.

Webtapping

Logging the IP addresses of users that access certain websites is commonly called "webtapping".

Webtapping is used to monitor websites that presumably contain dangerous or sensitive materials, and the people that access them. Though it is allowed by the USA PATRIOT Act, it is considered a questionable practice by many citizens.

Telephones recording

In Canada, anyone is legally allowed to record a conversation as long as they are involved in the conversation. The police must apply for a warrant beforehand to legally eavesdrop on the conversation. It must be expected that it will reveal evidence to a crime. State agents are lawfully allowed to record conversations, but to reveal the evidence in court, they must obtain a warrant.

History

Many state legislatures in the United States enacted statutes that prohibited anyone from listening in on telegraph communication. Telephone wiretapping began in the 1890s, following the invention of the telephone recorder, and its constitutionality was established in the Prohibition-Era conviction of bootlegger Roy Olmstead. Wiretapping has also been carried out under most Presidents, sometimes with a lawful warrant since the Supreme Court ruled it constitutional in 1928. On October 19, 1963, U.S. Attorney General Robert F. Kennedy, who served under John F. Kennedy and Lyndon B. Johnson, authorized the FBI to begin wiretapping the communications of Rev. Martin Luther King Jr. The wiretaps remained in place until April 1965 at his home and June 1966 at his office.

The history of voice communication technology began in 1876 with the invention of Alexander Graham Bell’s telephone. In the 1890s, “law enforcement agencies begin tapping wires on early telephone networks”. Remote voice communications “were carried almost exclusively by circuit-switched systems,” where telephone switches would connect wires to form a continuous circuit and disconnect the wires when the call ended). All other telephone services, such as call forwarding and message taking, were handled by human operators. However, the first computerized telephone switch was developed by Bell Labs in 1965. This got rid of standard wiretapping techniques.

In late 1940, the Nazis tried to secure some telephone lines between their forward headquarters in Paris and a variety of Fuhrerbunkers in Germany. They did this by constantly monitoring the voltage on the lines, looking for any sudden drops or increases in voltage indicating that other wiring had been attached. However, the French telephone engineer Robert Keller succeeded in attaching taps without alerting the Nazis. This was done through an isolated rental property just outside of Paris. Keller's group became known to SOE (and later Allied military intelligence generally) as "Source K". They were later betrayed by a mole within the French resistance, and Keller was murdered in Bergen-Belsen in April 1945.

In the 1970s, optical fibers become a medium for telecommunications. These fiber lines, “long, thin strands of glass that carry signals via laser light,” are more secure than radio and have become very cheap. From the 1990s to the present, the majority of communications between fixed locations has been achieved by fiber. Because these fiber communications are wired, they're given greater protection under U.S. law.

The earliest wiretaps were extra wires—physically inserted to the line between the switchboard and the subscriber—that carried the signal to a pair of earphones and a recorder. Later on, wiretaps were installed at the central office on the frames that held the incoming wires.”

Before the attack on Pearl Harbor and the subsequent entry of the United States into World War II, the U.S. House of Representatives held hearings on the legality of wiretapping for national defense. Significant legislation and judicial decisions on the legality and constitutionality of wiretapping had taken place years before World War II. However, it took on new urgency at that time of national crisis. The actions of the government regarding wiretapping for the purpose of national defense in the current war on terror have drawn considerable attention and criticism. In the World War II era, the public was also aware of the controversy over the question of the constitutionality and legality of wiretapping. Furthermore, the public was concerned with the decisions that the legislative and judicial branches of the government were making regarding wiretapping.

CrimethInc. sticker on a telephone warning users of phone tapping by the U.S. government

In 1967 the U.S. Supreme Court ruled that wiretapping (or “intercepting communications”) requires a warrant in Katz v. United States. In 1968 Congress passed a law that provided warrants for wiretapping in criminal investigations. In 1978 the Foreign Intelligence Surveillance Act (FISA) created a "secret federal court" for issuing wiretap warrants in national security cases. This was in response to findings from the Watergate break-in, which allegedly uncovered a history of presidential operations that had used surveillance on domestic and foreign political organizations.

In 1994, Congress approved the Communications Assistance for Law Enforcement Act (CALEA), which “requires telephone companies to be able to install more effective wiretaps. In 2004, the Federal Bureau of Investigation (FBI), United States Department of Justice (DOJ), Bureau of Alcohol, Tobacco, Firearms, and Explosives (ATF), and Drug Enforcement Administration (DEA) wanted to expand CALEA requirements to VoIP service.”

The Federal Communications Commission (FCC) ruled in August 2005 that “broadband-service providers and interconnected VoIP providers fall within CALEA’s scope. Currently, instant messaging, web boards and site visits are not included in CALEA’s jurisdiction. In 2007 Congress amended FISA to “allow the government to monitor more communications without a warrant”. In 2008 President George W. Bush expanded the surveillance of internet traffic to and from the U.S. government by signing a national security directive.

In the Greek telephone tapping case 2004–2005 more than 100 mobile phone numbers belonging mostly to members of the Greek government, including the Prime Minister of Greece, and top-ranking civil servants were found to have been illegally tapped for a period of at least one year. The Greek government concluded this had been done by a foreign intelligence agency, for security reasons related to the 2004 Olympic Games, by unlawfully activating the lawful interception subsystem of the Vodafone Greece mobile network. An Italian tapping case which surfaced in November 2007 revealed significant manipulation of the news at the national television company RAI.

In 2008, Wired and other media reported a lamplighter disclosed a "Quantico Circuit", a 45-megabit/second DS-3 line linking a carrier's most sensitive network in an affidavit that was the basis for a lawsuit against Verizon Wireless. The circuit provides direct access to all content and all information concerning the origin and termination of telephone calls placed on the Verizon Wireless network as well as the actual content of calls, according to the filing.

The most recent case of U.S. wiretapping was the NSA warrantless surveillance controversy discovered in December 2005. It aroused much controversy after then President George W. Bush admitted to violating a specific federal statute (FISA) and the warrant requirement of the Fourth Amendment to the United States Constitution. The President claimed his authorization was consistent with other federal statutes (AUMF) and other provisions of the Constitution, also stating that it was necessary to keep America safe from terrorism and could lead to the capture of notorious terrorists responsible for the September 11 attacks in 2001.

One difference between foreign wiretapping and domestic wiretapping is that, when operating in other countries, “American intelligence services could not place wiretaps on phone lines as easily as they could in the U.S.” Also, domestically, wiretapping is regarded as an extreme investigative technique, whereas outside of the country, the interception of communications is huge. The National Security Agency (NSA) “spends billions of dollars every year intercepting foreign communications from ground bases, ships, airplanes and satellites”.

FISA distinguishes between U.S. persons and foreigners, between communications inside and outside the U.S., and between wired and wireless communications. Wired communications within the United States are protected, since intercepting them requires a warrant.

Authorship of the Bible

From Wikipedia, the free encyclopedia ...