Group 1 T35 Tingxi Tan -Phone Tapping

Group Members:
Andrew Roberge

Alan Farley

Vincent Lo

Timothy Averion

Laura Lengyel

Group Member Contact Information:
Timothy Averion: phil.e.pino@hotmail.com

Andrew Roberge: ajroberg@ucalgary.ca

Vincent Lo: vincelo12@hotmail.com

Laura Lengyel: princesslaura13@hotmail.com

Alan Farley: farleyalan@shaw.ca

Technology And Issue
What is phone tapping?

How is phone tapping done?

Who can tap a phone?

What are the methods of phone tapping?

What is the societal impact to phone tapping?

Introduction to Phone Tapping:
Phone tapping is the process of someone (and unwanted someone) listening into to a phone conversation. This can be done in a number of ways including direct physical tapping and tapping from a distance. Both of these methods can be legal or illegal depending who is doing the phone tapping. Phone tapping has many advantages to society but can also cause many problems. Recently, phone tapping has been in the media because of the increased use by governments

Electronic surveillance
is used to observe or listen to persons, places or activities, usually in a secretive or obtrusive manner and with the aid of electronic devices such as cameras, microphones, tape recorders, eavesdropping transmitters, or wire taps. The object of electronic surveillance when used in law enforcement is to gather evidence of a crime or to accumulate intelligence about suspected criminal activity. Corporations use electronic surveillance to maintain the security of their buildings and grounds. Some companies use Electronic Surveillance or to gather information about competitors.

To have your phone tapped from a distance, is relatively easy for the large supercomputers used by Echelon or other signal intelligence users, though the average citizens doesn’t need to overtly worried, as the intelligence agencies are normally looking for talk of terrorist attacks and cases of espionage. Your phone company records the number that you have call and have received, as a standard method of tracking phone calls. Police and other investigators can apply for a warrant to check on those whom they are investigating. So having “Big Brother” out there is a little unnerving, but really if you’re doing nothing wrong, and have no ties to anything revolving around Terrorism, Mafia, Gangs, Political Espionage, Foreign Espionage, or anything criminal on a grand scale. In some countries your privacy and well being is less important than the national security of the country.

ECHELON
is a term associated with a global network of computers that automatically search through millions of intercepted messages for pre-programmed keywords or fax, telex and e-mail addresses. Every word of every message in the frequencies and channels selected at a station is automatically searched.



When telephone exchanges were mechanical, a tap had to be installed by technicians, linking circuits together to route the audio signal from the call. Now that many exchanges have been converted to digital technology tapping is far simpler and can be ordered remotely by computer. It is also possible to get greater resolution of a person's location by combining information from a number of cells surrounding the persons location, forcing the phone to communicate with at least two or three of them and measuring the timing advance, a correction for the speed of light in the GSM standard. This additional precision must be specifically enabled by the telephone company - it is not part of ordinary operation.

The old first generation mobile phones could be easily monitored by anyone with a 'scanning all-band receiver' because the system used an analogue transmission system - like an ordinary radio transmitter. The second generation digital phones are harder to monitor because they use a digitally compressed transmission. However the state can tap mobile phones with the co-operation of the phone company. It's also possible for organizations with the correct technical equipment, such as large corporations, to monitor mobile phone communications and decrypt the audio. A special device called an "IMSI-catcher" pretends to the mobile phones in its vicinity to be a legitimate base station of the mobile phone network, subjecting the communication between the phone and the network to a man in the middle attack. This is possible because while the mobile phone has to authenticate itself to the mobile telephone network, the network does not authenticate itself to the phone. This blatant flaw in GSM security was intentionally introduced to facilitate eavesdropping without the knowledge or cooperation of the mobile phone network. Once the mobile phone has accepted the IMSI-catcher as its base station the IMSI-catcher can deactivate GSM encryption using a special flag. All calls made from the tapped mobile phone go through the IMSI-catcher and are then passed on to the mobile network. Up to now no phone is known which actively alerts the user when a base station or an IMSI-catcher deactivates GSM encryption.

How to Physically Tap a Phone
To physically phone tap someone or somewhere, it requires 4 steps:


 * Step 1: Choose a point of entry
 * Step 2: Assemble your rig
 * Step 3: Insert the tap
 * Step 4: Test call



Step 1 Choosing where to start and the access point is where we begin. Several options to tap are the handset, wall jack, and outdoor utility box. Given the simplistic wiring in most handsets, tapping the receiver is an ideal starting point. Although it seems simple, you sacrifice stealth. To address this, typically pros install transmission equipment often called a “bug” into the handset.

Tapping a line through the wall jack has similar advantages and disadvantages of a handset. It is better concealed and the wiring is identical to what you’ll find in a handset. The disadvantage is cramming all of the equipment to a wall!

Last but not least is the utility box. Tapping a utility box is less suspicious but the problem is safely getting into the box and interpreting the mess of wires. After we have an idea of our access point, we should have an idea of the necessary equipment, which is step 2. Using an old lineman’s handset (a tool used by repairmen to test a line for activity) or building a “beige box” are the best starters. Another equipment would be a recorder. Wiring any old tape recorder into the tap would be ideal but the goal is avoiding the waiting game. To avoid this, setting up a voice-activated recorder would be a good start. Step 3 is where we insert the tap. Inside most handsets, wall jacks and utility boxes you’ll find a set of green wires and red wires devoted to each line. The green wire handles positively charged current and the red handles negative. All you need to do is connect the alligator clips from your tap of choice to the corresponding wires. The wire or access circuit intercepts the sound and a device (lineman’s handset or beige box) turns it into sound.

Step 4 is optional but a good idea. When absolutely sure that the line is not in use, try dialling out. If the call goes through, you’re in business.

Who Can Tap a Phone?
In general there are two groups of people that can tap phone lines, those who can tap phones legally and illegally.

Government
Governments have the capabilities of tapping any phones within their nation, as it is an issue of national defense. The government will normally leave the phone tapping to the police or other agencies like the FBI or CIA. However, sometimes governments get involved and attempt to bug places like foreign embassies and consulates. This type of phone tapping is very challenging as consulates and embassies are constantly on the look out for their phone lines being tapped. It is much simpler to tap a layperson as they are not as expecting to have their phone lines tapped and will not be constantly be on the lookout for their phones to be tapped.

Police
Most police forces hold the capabilities to tap phones. For police, weather national or local, it is in the police’s best interest to be able to tap phones. By tapping phones, the police now have one more way to help them crack down on criminals. Also, if the police tapped your phone line, and you complained to them, nothing would happen, as the police are the ones that are doing the tapping. In this case, the police are above the law because they enforce the law.

Phone Companies
Phone companies tap all of the phone calls of their customers for billing reasons. Phone companies will track the length of each call and have information as to which phone every call went do. By doing so, phone companies are able to figure out how many minutes on used phone service and if any conversations were long distance. This sort of phone tapping must follow the rules set out by the Federal Communications Commission (FCC).

Phone Companies also have the ability to listen in all conversations that go threw their phone lines. This is legally allowed, as phone companies own the property for which phone communication is possible. Having phone companies with the capability to listen into all could create great problems. However, your local phone company will refrain from listening into your conversations because it would be bad for business. If word ever got out that the phone company was listening to your conversations, there would be a mass exodus from that phone company’

Corporations
Some large corporations inform customers that their phone calls maybe recorded in order to guarantee quality of phone service. This form of phone tapping is simply recorded for the benefit of the firm. Here the caller is informed about the phone tap and then has the opportunity of either hang up or continue to stay on the line. By doing so, the company have found a way for noninvasive phone tapping on all conversations. A recoded phone conversation can be used many different ways for the company including agent training, quality control, quality assurance, and for security and liability issues.

Average People
Anyone is legally allowed to record a conversation that involves him or her. For the most part, only one-person need to know that there is a recording taking place. However in some states, both parties taking part in the conversation have to be aware that a recording is happening. Journalists often use this method, so that they can go back and re-listen to conversations that they had.

Illegally
As mentioned above, government agencies have the ability to tap phone conversations. One was to illegally set up a phone tap is to break into the systems of these government agencies and then listen to the tapped phones. Though this is a rather round about way, it can be effective.



Telephone Linemen can very easily tap a phone line. In fact they are taught how to tap a phone line as one of their orders of business. When a lineman checks to see if a phone line is working or not, he or she attaches a simple phone to the line and listens. Should the phone line be in use, than the lineman is capable of hearing into the conversation.

If a layperson wishes to tap a phone line, then they can very easily do so by means of a lineman’s telephone. Your local telephone service provider will provide you with the knowledge and the lineman telephone should you be able to get a job as a linemen at the company. If getting a job is not an option, it is very easy to purchase of linemen telephone on the internet for about $160. Once you have your linemen telephone simply attach the red and green cords to an outside telephone line and you can start listening in on peoples conversations.

It should be noted that the producers of linemen telephones know about the security issues around their product and issue warnings that all linemen telephones should “be used only in a legal and lawful manner in full accordance with all applicable laws and FCC regulations.”

Due to the simplicity of the linemen telephone it is very easy for anyone to tap a phone. With the danger of knowing that anyone can tap a phone there are numerous companies that sell products that detect phone tapping. The price ranges of these products are from $130 to $1200.

The Advantages and Disadvantages of Phone Tapping

 * The advantage of phone tapping for the offender depends on the method that is being used.
 * Methods:


 * 1) A direct wire tap into the host’s power line
 * 2) Usage of Bugs in combination of wireless communications
 * 3) A recording device attached to a phone line


 * Methods of Phone Tapping
 * http://people.howstuffworks.com/wiretapping1.htm 2003

Method 1: Direct Wire Tap:
 * This is the method in which the villain is able to attach his/her modified phone to not only listen to conversations of the victim but also have access to make phone calls through the same line.To create a phone designed for tapping lines is an easy process which involves cutting a modular plug of a corded phone and exposing the green and red wires, these wires are used for communication to other phones via electrical waves (analogue signal). These wires are also universal meaning all phone lines use the red and green wires, in addition to this there is no protection making tapping easy. [[Image:Chuigs_2.PNG|thumb| http://news.cnet.com/i/bto/20071010/tapped-phone_270x359.jpg ]]


 * Advantages: This method is the easiest method of the three, requiring you to only determine the line from the target house and attaching your modified phone to his/hers line. To use the victims line it’s as simple as connecting the exposed lines of the modified phone to the exposed lines coming from the target house.  This provides the villain all access and capabilities that the owner has and pays for, which include receiving and sending calls. It is also very economic and easy to install, almost any phone that is not digital will be able to be modified to use this method.


 * Disadvantages: It however has downsides for the villain as well. If the villain’s intention is to eavesdrop on the victim he would have to know when the victim is going to make a phone call so he/she can monitor the conversation, and with that in mind he/she would have to stay on the line and wait until a phone call is established. Another downside to this method is if the villain was to eavesdrop he would be giving his position away unless the microphone on his phone was disabled. If the villain wanted to make a phone call he would have to make sure the victim would not make a phone call at the same time this would result in the victim being alerted that he/she was getting tapped. The villain would avoid being detected by disabling his microphone however he/she wouldn’t be able to make any calls either. Also the lines are exposed along the residential areas and this method can be easily spotted by citizens and cops, also the villain cannot move from his location.

Method 2: Usage of Bugs in combination of wireless communications:
 * This method involves the uses of bugs which in simple terms transforms audio information into radio waves that can be broadcasted through the air. These radio waves can then be received by a radio receiver setup, ion which can be encoded by speakers or be recorded on tape for later reviewing.




 * Advantages: Bugs are the most advantageous method amongst the three methods, this is because they are small and discrete and very hard to detect. Bugs can constantly record and broadcast audio information despite the victim using the phone or not, all the while being able to record with no whatsoever maintenance involved. The bug can be attached to any part of the phone line and more discreetly in the phone itself. By having the ability to be incased in the phone not only is it hard to detect but it doesn’t need a microphone as the phone microphone is sufficient enough to accommodate. A bug also offers unlimited surveillance and grants the villain the choice to record from his safe point or just listen in. Since the bugs broadcast the audio information into radio waves it enables the villain to obtain that radio signal, this is advantageous because he/she is now able to listen in on any conversation that the bug picks up while maintaining a low profile from a distance. Compared to the other 2 methods this one is the most convenient and efficient method for the villain in terms of eavesdropping.


 * Disadvantages:Although it is clear that use of bugs and radio receivers are very efficient, it is very costly and most common villains would not be able to purchase this technology. The equipment used to receive the radio signals is large and heavy so some sort of large transportation will be needed to accommodate the equipment size. Although this method offers the safest in terms of eavesdropping on conversations, sadly it does not grant the villain access to make phone calls using the victim’s phone line. Although the Villain is remotely receiving the information he/she is still bound to a certain area which makes him stationary when receiving information.

Method 3: A recording device attached to a phone line:
 * This method requires the villain to attach any recording device, usually a tape recorder to record all the conversations in a discrete manner. While having the ability to leave the area and tend to other business. This method like the direct wire tap is again just a matter of connecting the device via creative wiring to an exposed phone line.  However instead of a person a device is put in place to monitor/record the activities.




 * Advantages: The advantage of this method is that the villain doesn’t have to be present in order to listen to a conversation; also he is able to rewind and review certain messages in more detail.  Another advantage of this method is that it is less obvious, suspicious and can be hidden from the public eye.  To the victim he/she cannot hear any instances of a phone tapping operation taking place.


 * Disadvantages: The disadvantage of this method is that the tape recorders are only limited to a certain amount of time, which could mean lost information or listening to a lot of “nothing”. It can also be quite costly as buying tapes and a tape recorder will cost lots of money. Unlike the direct phone tap method this one deals with a lot more complexity and cannot be so easily installed. Throughout time of monitoring it can cause suspicion as the villain is costly changing tapes. Since this method is only designed to eavesdrop, phone calls cannot be made from the villain using the victim’s phone line.

The offender and the victim: From the days of telegraphs to the first public phone it has been clear to see that for the most part the villain benefits from phone tapping, for years its been deemed as illegal but still is a common event in today's world. This can explained by the amount of ease that exists with creating a phone tap, namely method 1 although this method may seem brute and unprofessional it has proven to be one of the most effective and widely spread methods to date. the usage of bugs in combination of audio receivers is highly effective and discrete they are mostly applied within governments, major corporations and military operations although it offers the optimum eavesdropping capabilities it is very costly and most people can't afford it. So what it boils down to is the motive behind phone tapping if you want a free phone method 1 is your choice if you want to listen in method 3 is your best choice and if you want something in between method 2 will be your choice. As for the victim in the situation he/she can do little to prepare for a illegal/legal phone tap. The only defense is to report them during the process in which they can be persecuted but either than that there is no current technology that protects the physical phone lines.

Conclusion: Is Phone Tapping Bad or Good?
Phone tapping, like most things, has its good and bad. The negative aspects include that it’s readily available to criminals and other parties engaging in illegal activity. It is also a blatant offense to personal privacy rights. However on the other hand it is useful for law enforcement or governmental authority to track down or find crippling evidence against criminal factions. Nonetheless phone tapping remains a controversial topic that is not easily distinguished as good or bad. Lawful interception is an effective way to listen in on illegal activity. Due to the fact that it is court warranted it is respectable to observe a conversation that may guarantee the safety of others in society. The evidence gathered in tapped conversations is often overwhelming in court and can put many dangerous and suspicious people away from the general public. With the technology today it is almost undetectable and can very revealing of criminals. In these instances the phone tapping technology is good because it helps to maintain the safety of the general public. On the other hand due to the availability and ease of today’s phone taps the common civilian can easily access them. To add to the problem often the party being listened in on has no idea that they are being tapped. This is a criminal offense and an invasion of privacy rights. Similarly there have been instances where law enforcement and governmental authority have used phone tapping to record conversations that they were not warranted to tape.Due to the fact that in many of these scenarios the culprit is not notified the authorities cannot use taped evidence against them as this is against their rights. In addition to the common civilian using the tap to invade others privacy so may the common criminal. Often the villain will be able to listen in on valuable conversations such as banking information. This makes identity theft a much more common and dangerous prospect. Because of this in combination with other factors discussed above phone tapping can also be very bad for society. For the most part phone tapping has a negative effect on our lives. The availability of the phone tap to the common person offers far more bad then good. Despite its advantages it is too evasive and easily accessed by anyone to be good for society. However, because the technology is available and always will be it should be used, legally, for law enforcement and national defense. Therefore the government should take steps to crack down on its illegal use and allow the use of phone tapping for effective investigation into criminal acts. With this in mind although it is negative, phone tapping is a technology that is here to stay and should be used to its potential by the law and the government.

Laura:
Electronic Surveillance:

http://www.tscmvideo.com/Articles%20and%20Reports/electronic-surveillance-wiretaps.html

http://en.wikipedia.org/wiki/ECHELON

http://www.fas.org/irp/program/process/echelon.htm

civilliberty.about.com

Vincent:
Physical Phone Tapping:

http://howto.wired.com/wiki/Tap_a_Phone_Line

thedca.blogspot.com

Alan:
Who Can Tap Your Phone?

http://www.guardian.co.uk/science/2003/jul/31/thisweekssciencequestions1

http://howto.wired.com/wiki/Tap_a_Phone_Line

http://www.boingboing.net/2008/08/12/howto-tap-a-phone-li.html

http://www.safetyandsecuritycenter.com/noname.html

http://www.brickhousesecurity.com/phonetap-privacyprotection.html

http://www.totse.com/en/phreak/bugs_and_taps/tapfones.html

http://www.totse.com/en/phreak/boxes_old_and_new/lineman.html

http://www.callcorder.com/phone-recording-law.htm

http://www.pimall.com/nais/linemanheadset.html

http://www.rcfp.org/taping/

http://www4.nau.edu/its/itsinfo/lineman_opt.jpeg

http://img505.imageshack.us/img505/444/telephonehandheldlinemanb7.jpg

fancypantsbowl.wordpress.com

Timothy:
Advantages and Disadvantages:

http://news.cnet.com/i/bto/20071010/tapped-phone_270x359.jpg

http://www.stacymunn.com/blog/img/shoephone.jpg

http://incentraleurope.radio.cz/pictures/komunikace/telefon_odposlech.jpg

http://www.electronics-online.co.uk/acatalog/dt_no_lg_so_tcm450dv.jpg

http://people.howstuffworks.com/wiretapping1.htm

http://www.pimfg.com/ifaq/images/ModPlugCrimp/ModPlugCrimp09.gif

http://en.wikipedia.org/wiki/Phone_tapping

Andrew:
Conclusion:

http://en.wikipedia.org/wiki/Phone_tapping

http://answers.com/topic/wiretapping

http://people.howstuffworks.com/wiretapping1.htm

http://howto.wired.com/wiki/Tap_a_Phone_Line

http://debatewise.com/debates/192-phone-tapping-should-be-used-as-evidence-in

evansmediausa.blog.com