intercepting telephone conversation

intercepting telephone conversation
A breach of privacy in listening without the consent of the communicants, whatever the method used to hear or record the conversation may be. United States v Polakoff (CA2 NY) 112 F2d 888, 134 ALR 607. Obtaining a telephone communication or message by wiretapping device. Benanti v United States, 355 US 96, 2 L Ed 2d 126, 78 S Ct 155.

Ballentine's law dictionary. . 1998.

Игры ⚽ Поможем написать реферат

Look at other dictionaries:

  • Telephone tapping — Wiretap redirects here. For the radio program, see WireTap (radio program). Telephone tapping (also wire tapping or wiretapping in American English) is the monitoring of telephone and Internet conversations by a third party, often by covert means …   Wikipedia

  • Greek telephone tapping case 2004-2005 — The Greek telephone tapping case of 2004 2005, also referred to as Greek Watergate, [cite web | first = Dina | last = Kyriakidou |title = Greek Watergate Scandal Sends Political Shockwaves | publisher = Reuters | date = March 2, 2006 | url = http …   Wikipedia

  • wiretapping — Intercepting a telephone conversation or a telegraph message by tapping the line of communication, that is, connecting a receiving instrument to the line. 29 Am J2d Ev §§ 428 et seq.: 41 Am J1st Priv § 29; 52 Am J1st Teleg & T § 65 …   Ballentine's law dictionary

  • Squidgygate — refers to the pre 1990 telephone conversations between Diana, Princess of Wales and a close friend, James Gilbey, and to the controversy surrounding how those conversations were recorded. During the calls, Gilbey affectionately called Diana by… …   Wikipedia

  • List of Terminator: The Sarah Connor Chronicles minor characters — The following is a list of characters in the FOX science fiction television series Terminator: The Sarah Connor Chronicles, including supporting characters, and important villains. Contents: Top · 0–9 A B C D E F G H I J K L M N O P Q R S T… …   Wikipedia

  • List of Heroes characters — From left to right: Micah, Niki, Nathan, Peter, Noah, Claire, Hiro, Mohinder, Matt, Sylar This is a list of fictional characters in the television series Heroes …   Wikipedia

  • NSA warrantless surveillance controversy — For the related controversy about data mining of domestic call records see NSA call database. National Security Agency logo The NSA warrantless surveillance controversy (AKA Warrantless Wiretapping ) concerns surveillance of persons within the… …   Wikipedia

  • Signals intelligence — SIGINT redirects here. For the UNIX signal, see SIGINT (POSIX). RAF Menwith Hill, a large site in the United Kingdom, part of ECHELON and the UK USA Security Agreement. Signals intelligence (often contracted to SIGINT) is intelligence gathering… …   Wikipedia

  • Deep packet inspection — (DPI) (also called complete packet inspection and Information eXtraction IX ) is a form of computer network packet filtering that examines the data part (and possibly also the header) of a packet as it passes an inspection point, searching for… …   Wikipedia

  • cryptology — cryptologist, n. cryptologic /krip tl oj ik/, cryptological, adj. /krip tol euh jee/, n. 1. cryptography. 2. the science and study of cryptanalysis and cryptography. [1635 45; < NL cryptologia. See CRYPTO , LOGY] * * * Introduction …   Universalium

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”