Wiretapping

(redirected from ECPA)
Also found in: Dictionary, Thesaurus, Financial, Acronyms, Encyclopedia.
Related to ECPA: ECPS

Wiretapping

A form of electronic eavesdropping accomplished by seizing or overhearing communications by means of a concealed recording or listening device connected to the transmission line.

Wiretapping is a particular form of Electronic Surveillance that monitors telephonic and telegraphic communication. The introduction of such surveillance raised fundamental issues concerning personal privacy. Since the late 1960s, law enforcement officials have been required to obtain a Search Warrant before placing a wiretap on a criminal suspect. Under the Federal Communications Act of 1934 (47 U.S.C.A. 151 et seq.), private citizens are prohibited from intercepting any communication and divulging its contents.

Police departments began tapping phone lines in the 1890s. The placing of a wiretap is relatively easy. A suspect's telephone line is identified at the phone company's switching station and a line, or "tap," is run off the line to a listening device. The telephone conversations may also be recorded.

The U.S. Supreme Court, in the 1928 case of olmstead v. united states, 277 U.S. 438, 48 S. Ct. 564, 72 L. Ed. 944, held that the tapping of a telephone line did not violate the Fourth Amendment's prohibition against unlawful searches and seizures, so long as the police had not trespassed on the property of the person whose line was tapped. Justice louis d. brandeis argued in a dissenting opinion that the Court had employed an outdated mechanical and spatial approach to the Fourth Amendment and failed to consider the interests in privacy that the amendment was designed to protect.

For almost 40 years the Supreme Court maintained that wiretapping was permissible in the absence of a Trespass. When police did trespass in federal investigations, the evidence was excluded in federal court. The Supreme Court reversed course in 1967, with its decision in Katz v. United States, 389 U.S. 347, 88 S. Ct. 507, 19 L. Ed. 2d 576. The Court abandoned the Olmstead approach of territorial trespass and adopted one based on the reasonable expectation of privacy of the victim of the wiretapping. Where an individual has an expectation of privacy, the government is required to obtain a warrant for wiretapping.

Congress responded by enacting provisions in the Omnibus Crime Control and Safe Streets Act of 1968 (18 U.S.C.A. § 2510 et seq.) that established procedures for wiretapping. All wiretaps were banned except those approved by a court. Wiretaps were legally permissible for a designated list of offenses, if a court approved. A wiretap may last a maximum of 30 days and notice must be provided to the subject of the search within 90 days of any application or a successful interception. In 1986, Congress extended wiretapping protection to electronic mail in the Electronic Communications Privacy Act (ECPA), 8 U.S.C.A. § 2701 et seq. The law, also known as the Wiretap Act, makes it illegal to tap into private E-Mail.

With the emergence of the Internet in the 1990s as a popular communications vehicle, law enforcement agencies concluded that it was necessary to conduct surveillance of E-mail, chat rooms, and Web pages in order to monitor illegal activities, such as the distribution of child Pornography and terrorist activities. In 2000, the Federal Bureau of Investigation (FBI) announced the launch of an Internet diagnostic tool called "Carnivore." Carnivore can monitor E-mail writers on-line or record the contents of messages. It performs these tasks by capturing "packets" of information that may be lawfully intercepted. Groups that safeguard civil liberties expressed alarm at the loss of privacy posed by such potentially invasive technology.

Following the september 11, 2001, terrorist attacks, Congress broadened wiretapping rules for monitoring suspected terrorists and perpetrators of computer Fraud and abuse through the usa patriot act, Pub. L. No. 107-56, 115 Stat. 272 (2001). For example, the act expanded the use of traditional pen registers (a device to capture outgoing phone numbers from a specific line) and "trap and trace" devices (that capture the telephone numbers of incoming callers) to include both telephone and Internet communications as long as they exclude message content. These devices can be used without having to show that the telephone being monitored was used in communications with someone involved in Terrorism or intelligence activities that may violate criminal laws.

In addition, the act broadened the provisions of the 1986 Wiretap Act that involve roving wiretaps. Roving wiretaps authorize law enforcement agents to monitor any telephone a suspect might use. Again, agents do not have to prove that the suspect is actually using the line. This means that if a suspect enters the private home of another person, the homeowner's telephone line can be tapped. The act does allow persons to file civil lawsuits if the federal government discloses information gained through surveillance and wiretapping powers.

Further readings

Adams, James A., and Daniel D. Blinka. 2003. Electronic Surveillance: Commentaries and Statutes. Notre Dame, Ind.: National Institute for Trial Advocacy.

American Bar Association. 2001. Standards for Criminal Justice. Electronic Surveillance. Section A, Electronic Surveillance of Private Communications. 3d ed. Washington, D.C.: American Bar Association.

"FBI Says Carnivore Will Not Devour Privacy." July 21, 2001. CNN.com: Technology. Available online at <www.cnn.com/2000/TECH/computing/07/21/fbi.carnivore> (accessed August 28, 2003).

O'Harrow, Robert, Jr. 2001. "FBI's 'Carnivore' Might Target Wireless Text." Washington Post (August 25).

Stevens, Gina Marie. 2002. Privacy: Wiretapping and Electronic Eavesdropping. Huntington, N.Y.: Nova Science.

Cross-references

Pen Register; Search and Seizure; Telecommunications.

References in periodicals archive ?
records was therefore not a novel application of ECPA across borders,
merely tinkered with the 1986 statute, even though the ECPA requires
Even after the USA FREEDOM Act amendments and most recent judicial opinions, lingering questions remain about the constitutionality of the ECPA NSL provisions.
pending legal issues, including, most importantly, ECPA reform.
(13.) The ECPA is comprised of three acts: The Wiretap Act, 18 U.S.C.A.
Given that Congress has failed to enact an amendment to the ECPA
Petrakis, Jamison Shefts, former founder and president of Access2Go, a telecommunications company, argued that two members of the Board of Directors violated the ECPA by "intentionally intercepting SMS text messages from his Blackberry without his authorization." (69) Members of the Board of Directors suspected that Schefts was sexually harassing employees, which prompted the Board of Directors to publish an employee handbook which "reserve[ed] the right to monitor electronic mail messages (including personal/private/instant messaging systems) and their content, as well as any and all use of the Internet and of computer equipment used to create, view or access e-mail and Internet content." (70) Schefts then filed a complaint against the Board of Directors.
In 1986, Congress enacted the Electronic Communications Privacy Act (ECPA) to govern the privacy of computer network communications.
The ECPA also requires that employers advise their employees that electronic communications systems at the workplace must be used solely for business purposes, and that data stored and transmitted by those systems are to be treated in a private and confidential manner.
The framework for the protection of electronic communications is governed by the Fourth Amendment, as well as various federal statutes, such as the Electronic Communications Privacy Act of 1986 (ECPA), which includes the Stored Communications Act (SCA).