Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
Communications Security

Guide to DIY Wiretapping 183

Geeks are Sexy writes "ITSecurity.com has a nice piece this week on how wiretapping works and how you can protect yourself from people who wants to snoop into your life. From the article 'Even if you aren't involved in a criminal case or illegal operation, it's incredibly easy to set up a wiretap or surveillance system on any type of phone. Don't be surprised to learn that virtually anyone could be spying on you for any reason.'" Maybe I'm on the wrong track here, but I guess I assumed that wiretapping now happened in secret rooms at the telco, and not by affixing something physically to a wire in your home, but I'll definitely be aware next time I hear a stranger breathing next time I'm stuck on hold.
This discussion has been archived. No new comments can be posted.

Guide to DIY Wiretapping

Comments Filter:
  • It was.. (Score:2, Informative)

    by f8l_0e ( 775982 ) on Thursday June 19, 2008 @11:22AM (#23857547)
    The official, albeit illegal kind do occur at the telco, at least these days. Before modern switching a residential tap would have be the way it was done.
  • What a load of crap. (Score:5, Informative)

    by chill ( 34294 ) on Thursday June 19, 2008 @11:44AM (#23858105) Journal
    The 80s called and their want their wiretapping tech back.

    This is great if you're worried about the neighbor kid listening in, but not for anyone serious. Wiretapping is done at the telco level and you can't tell you're being tapped. In the digital age there is no clicking, breathing, voltage drops or any other indication. There is a big long checklist when implementing a CALEA node for making certain there is no way the target can tell they're being monitored.
  • Re:voltage drop (Score:3, Informative)

    by Anonymous Coward on Thursday June 19, 2008 @12:00PM (#23858485)
    The "professional" wiretap uses a buttset. These have bed-of-nails clips for monitoring without leaving any particularly obvious traces (a small hole is made through the sheath of the wire, that is all, no cutting or stripping is involved).

    They also have both a regular and monitor mode. The regular mode makes it work like a normal telephone, with about 600 Ohms impedance, causing a voltage drop. The monitor mode has 100+ kOhms impedance, which will cause a voltage drop low enough to be indistinguishable from a moisture leak (happens all the time on analog phone lines).

    Here's [tiptopelectronics.com] a nice one you can buy right now!
  • by Anonymous Coward on Thursday June 19, 2008 @12:02PM (#23858531)
    You mean there's a device you could attach to a phone line to listen to a call? Amazing!

    For people in the know, there's an easier method to listen in on calls which is only detectable by the phone company: a Direct Access Test Unit [wikipedia.org] or DATU. Find one of these "secret" numbers on the exchange your victim is on and you have the ability to snoop on their calls using the phone company's own test equipment. Messing with these numbers is also a very quick way to go to jail, but you sorta run that risk with an illegal wiretap anyway (unless you work in the Executive branch).
  • by rob_osx ( 851996 ) on Thursday June 19, 2008 @12:11PM (#23858769)
    As a embedded software developer at a major telco equipment manufacturer I can verify that when the government wants a wiretap, they can do it easily at the telco. Several times telcos came to us and said "the government has asked for a wiretap how can we use your equipment to comply?" The process to do the wiretap was the same used to setup a conference bridge, which digitally duplicates the DS0 or T1. The government could then get a digital copy of all voice/data of the lines.
  • More useful (Score:3, Informative)

    by Thelasko ( 1196535 ) on Thursday June 19, 2008 @01:51PM (#23861017) Journal
    Why only phone conversations, when a laser microphone can listen in on all conversations. They are also easy to build. [instructables.com]
  • by Thelasko ( 1196535 ) on Thursday June 19, 2008 @03:50PM (#23863179) Journal

    If someone is dumb enough to leave the microphone connected on an intercept phone, they deserve to get caught.
    You raise a good point. Using a plain speaker is risky, because it can potentially double as a microphone. Telephones have a duplex coil which prevents this from happening.

"I've seen it. It's rubbish." -- Marvin the Paranoid Android

Working...