Telephone tapping in the Eastern Bloc

Last updated
"Jitka" telephone tapping equipment; signaled that the line was busy, allowed the connection of a recorder, late sixties of 20th century, used by Czechoslovak StB IDET2007 Jitka phone tapping device.jpg
"Jitka" telephone tapping equipment; signaled that the line was busy, allowed the connection of a recorder, late sixties of 20th century, used by Czechoslovak StB

Telephone tapping in the Eastern Bloc was a widespread method of the mass surveillance of the population by the secret police. [1]

Contents

History

In the past, telephone tapping was an open and legal practice in certain countries. [2] During martial law in Poland, official censorship was introduced, which included open phone tapping. Despite the introduction of the new censorship division, the Polish secret police did not have resources to monitor all conversations. [3]

In Romania, telephone tapping was conducted by the General Directorate for Technical Operations of the Securitate. [4] Created with Soviet assistance in 1954, the outfit monitored all voice and electronic communications inside and outside of Romania. They bugged telephones and intercepted all telegraphs and telex messages, as well as placed microphones in both public and private buildings. [5]

Fiction

The 1991 Polish comedy film Calls Controlled [6] capitalizes on this fact. The title alludes to the pre-recorded message "Rozmowa kontrolowana" ("The call is being monitored") being sounded during phone calls while the martial law in Poland was in force during the 1980s. [7] [8]

The 2006 film The Lives of Others concerns a Stasi captain who is listening to the conversations of a suspected dissident writer in a bugged apartment with equipment including telephone-tapping. [9] [10]

See also

Related Research Articles

<span class="mw-page-title-main">United States Foreign Intelligence Surveillance Court</span> U.S. federal court

The United States Foreign Intelligence Surveillance Court (FISC), also called the FISA Court, is a U.S. federal court established under the Foreign Intelligence Surveillance Act of 1978 (FISA) to oversee requests for surveillance warrants against foreign spies inside the United States by federal law enforcement and intelligence agencies.

<span class="mw-page-title-main">Security Service (Poland)</span>

The Security Service, in full Security Service of the Ministry of Internal Affairs and commonly known as SB, was a secret police force established in the Polish People's Republic in 1956 as a successor to the Ministry of Public Security (UB). The SB was the chief foreign and domestic security organization in Poland from 1956 until the fall of communism in 1989.

<span class="mw-page-title-main">Surveillance</span> Monitoring something for the purposes of influencing, protecting, or suppressing it

Surveillance is the monitoring of behavior, many activities, or information for the purpose of information gathering, influencing, managing, or directing. This can include observation from a distance by means of electronic equipment, such as closed-circuit television (CCTV), or interception of electronically transmitted information like Internet traffic. Increasingly, governments may also obtain consumer data through the purchase of online information, effectively expanding surveillance capabilities through commercially available digital records. It can also include simple technical methods, such as human intelligence gathering and postal interception.

A covert listening device, more commonly known as a bug or a wire, is usually a combination of a miniature radio transmitter with a microphone. The use of bugs, called bugging, or wiretapping is a common technique in surveillance, espionage and police investigations.

Wiretapping, also known as wire tapping or telephone tapping, is the monitoring of telephone and Internet-based conversations by a third party, often by covert means. The wire tap received its name because, historically, the monitoring connection was an actual electrical tap on an analog telephone or telegraph line. Legal wiretapping by a government agency is also called lawful interception. Passive wiretapping monitors or records the traffic, while active wiretapping alters or otherwise affects it.

Computer and network surveillance is the monitoring of computer activity and data stored locally on a computer or data being transferred over computer networks such as the Internet. This monitoring is often carried out covertly and may be completed by governments, corporations, criminal organizations, or individuals. It may or may not be legal and may or may not require authorization from a court or other independent government agencies. Computer and network surveillance programs are widespread today and almost all Internet traffic can be monitored.

<span class="mw-page-title-main">Mass surveillance</span> Intricate surveillance of an entire or a substantial fraction of a population

Mass surveillance is the intricate surveillance of an entire or a substantial fraction of a population in order to monitor that group of citizens. The surveillance is often carried out by local and federal governments or governmental organizations, but it may also be carried out by corporations. Depending on each nation's laws and judicial systems, the legality of and the permission required to engage in mass surveillance varies. It is the single most indicative distinguishing trait of totalitarian regimes. It is often distinguished from targeted surveillance.

<span class="mw-page-title-main">Securitate</span> Secret police of the Socialist Republic of Romania

The Department of State Security, commonly known as the Securitate, was the secret police agency of the Socialist Republic of Romania. It was founded on 30 August 1948 from the Siguranța with help and direction from the Soviet MGB.

<span class="mw-page-title-main">Omnibus Crime Control and Safe Streets Act of 1968</span> US federal legislation

The Omnibus Crime Control and Safe Streets Act of 1968 was legislation passed by the Congress of the United States and signed into law by President Lyndon B. Johnson that established the Law Enforcement Assistance Administration (LEAA). Title III of the Act set rules for obtaining wiretap orders in the United States. The act was a major accomplishment of Johnson's war on crime.

The Ministry of State Security, abbreviated as MGB, was a ministry of the Soviet Union from 1946 to 1953 which functioned as the country's secret police. The ministry inherited the intelligence and state security responsibilities of the People's Commissariat for Internal Affairs (NKVD) and People's Commissariat for State Security (NKGB). The MGB was led by Viktor Abakumov from 1946 to 1951, then by Semyon Ignatiev until Stalin's death in 1953, upon which it was merged into an enlarged Ministry of Internal Affairs (MVD).

<span class="mw-page-title-main">Martial law in Poland</span> 1981–83 period of repression

Martial law in Poland existed between 13 December 1981 and 22 July 1983. The government of the Polish People's Republic drastically restricted everyday life by introducing martial law and a military junta in an attempt to counter political opposition, in particular the Solidarity movement.

United States v. U.S. District Court, 407 U.S. 297 (1972), also known as the Keith Case, was a landmark United States Supreme Court decision that upheld, in a unanimous 8-0 ruling, the requirements of the Fourth Amendment in cases of domestic surveillance targeting a domestic threat.

The System for Operative Investigative Activities is the technical specification for lawful interception interfaces of telecommunications and telephone networks operating in Russia. The current form of the specification enables the targeted surveillance of both telephone and Internet communications. Initially implemented in 1995 to allow access to surveillance data for the FSB, in subsequent years the access has been widened to other law enforcement agencies.

Employee monitoring is the surveillance of workers' activity. Organizations engage in employee monitoring for different reasons such as to track performance, to avoid legal liability, to protect trade secrets, and to address other security concerns. This practice may impact employee satisfaction due to its impact on the employee's privacy. Among organizations, the extent and methods of employee monitoring differ.

Phone surveillance is the act of performing surveillance on phone conversations, location tracking, and data monitoring of a phone. Before the era of mobile phones, these used to refer to the tapping of phone lines via a method called wiretapping. Wiretapping has now been replaced by software that monitors the cell phones of users.

<span class="mw-page-title-main">Mass surveillance in the United States</span>

The practice of mass surveillance in the United States dates back to wartime monitoring and censorship of international communications from, to, or which passed through the United States. After the First and Second World Wars, mass surveillance continued throughout the Cold War period, via programs such as the Black Chamber and Project SHAMROCK. The formation and growth of federal law-enforcement and intelligence agencies such as the FBI, CIA, and NSA institutionalized surveillance used to also silence political dissent, as evidenced by COINTELPRO projects which targeted various organizations and individuals. During the Civil Rights Movement era, many individuals put under surveillance orders were first labelled as integrationists, then deemed subversive, and sometimes suspected to be supportive of the communist model of the United States' rival at the time, the Soviet Union. Other targeted individuals and groups included Native American activists, African American and Chicano liberation movement activists, and anti-war protesters.

<span class="mw-page-title-main">2010s global surveillance disclosures</span> Disclosures of NSA and related global espionage

During the 2010s, international media reports revealed new operational details about the Anglophone cryptographic agencies' global surveillance of both foreign and domestic nationals. The reports mostly relate to top secret documents leaked by ex-NSA contractor Edward Snowden. The documents consist of intelligence files relating to the U.S. and other Five Eyes countries. In June 2013, the first of Snowden's documents were published, with further selected documents released to various news outlets through the year.

<span class="mw-page-title-main">Timeline of global surveillance disclosures (2013–present)</span>

This timeline of global surveillance disclosures from 2013 to the present day is a chronological list of the global surveillance disclosures that began in 2013. The disclosures have been largely instigated by revelations from the former American National Security Agency contractor Edward Snowden.

<span class="mw-page-title-main">Cellphone surveillance</span> Interception of mobile phone activity

Cellphone surveillance may involve tracking, bugging, monitoring, eavesdropping, and recording conversations and text messages on mobile phones. It also encompasses the monitoring of people's movements, which can be tracked using mobile phone signals when phones are turned on.

References

  1. Secret Police Files from the Eastern Bloc: Between Surveillance and Life Writing (NED - New ed.). Boydell & Brewer. 2016. ISBN   978-1-57113-926-9. JSTOR   10.7722/j.ctt1kzccdr.
  2. Townshend, Charles. "State and public security: Charles Townshend". The State: Historical and Political Dimensions. Routledge.
  3. Martial Law in Poland Archived 2007-10-14 at the Wayback Machine (in Polish)
  4. Nomikos, John, and Andrew Liaropoulos. "Truly Reforming or Just Responding to Failures? Lessons Learned from the Modernisation of the Greek National Intelligence Service". Journal of Policing, Intelligence and Counter Terrorism.{{cite journal}}: CS1 maint: multiple names: authors list (link)
  5. Holland, Max (2006-08-21). "A Review of: "Krzysztof Persak and Lukasz Kaminski, editors:A Handbook of the Communist Security Apparatus in East Central Europe, 1944–1989"". International Journal of Intelligence and CounterIntelligence. 19 (2): 365–367. doi:10.1080/08850600500483871. ISSN   0885-0607. S2CID   152510727.
  6. Rozmowy kontrolowane at IMDb
  7. Kruk, Dawid, Dagmara Mętel, and Andrzej Cechnicki. "A paradigm description of virtual reality and its possible applications in psychiatry". Postępy Psychiatrii i Neurologii= Advances in Psychiatry and Neurology.{{cite journal}}: CS1 maint: multiple names: authors list (link)
  8. Haltof, Marek (1997). "Everything for sale: Polish national cinema after 1989". Canadian Slavonic Papers. 39 (1–2): 137–152. doi:10.1080/00085006.1997.11092147. ProQuest   274694186 via ProQuest.
  9. Cooke, Paul, Michael Eskin, and Karen Leeder. The Lives of Others' and Contemporary German Film. De Gruyter.{{cite book}}: CS1 maint: multiple names: authors list (link)
  10. Harper, Kate (2010). "Surveillance and Redemption in'The Lives of Others'". Screen Education. 59: 111.