Telephone tapping in the Eastern Bloc

Last updated

Telephone tapping in the Eastern Bloc was a widespread method of the mass surveillance of the population by the secret police. [1]

Contents

History

In the past, telephone tapping was an open and legal practice in certain countries. [2] During martial law in Poland, official censorship was introduced, which included open phone tapping. Despite the introduction of the new censorship division, the Polish secret police did not have resources to monitor all conversations. [3]

In Romania, telephone tapping was conducted by the General Directorate for Technical Operations of the Securitate. [4] Created with Soviet assistance in 1954, the outfit monitored all voice and electronic communications inside and outside of Romania. They bugged telephones and intercepted all telegraphs and telex messages, as well as placed microphones in both public and private buildings. [5]

Fiction

The 1991 Polish comedy film Calls Controlled [6] capitalizes on this fact. The title alludes to the pre-recorded message "Rozmowa kontrolowana" ("The call is being monitored") being sounded during phone calls while the martial law in Poland was in force during the 1980s.[ citation needed ] [7] [8]

The 2006 film The Lives of Others concerns a Stasi captain who is listening to the conversations of a suspected dissident writer in a bugged apartment with equipment including telephone-tapping.[ citation needed ] [9] [10]

See also

Related Research Articles

<span class="mw-page-title-main">United States Foreign Intelligence Surveillance Court</span> U.S. federal court

The United States Foreign Intelligence Surveillance Court (FISC), also called the FISA Court, is a U.S. federal court established under the Foreign Intelligence Surveillance Act of 1978 (FISA) to oversee requests for surveillance warrants against foreign spies inside the United States by federal law enforcement and intelligence agencies.

<span class="mw-page-title-main">Surveillance</span> Monitoring something for the purposes of influencing, protecting, or suppressing it

Surveillance is the monitoring of behavior, many activities, or information for the purpose of information gathering, influencing, managing or directing. This can include observation from a distance by means of electronic equipment, such as closed-circuit television (CCTV), or interception of electronically transmitted information like Internet traffic. It can also include simple technical methods, such as human intelligence gathering and postal interception.

A covert listening device, more commonly known as a bug or a wire, is usually a combination of a miniature radio transmitter with a microphone. The use of bugs, called bugging, or wiretapping is a common technique in surveillance, espionage and police investigations.

Wiretapping also known as wire tapping or telephone tapping, is the monitoring of telephone and Internet-based conversations by a third party, often by covert means. The wire tap received its name because, historically, the monitoring connection was an actual electrical tap on an analog telephone or telegraph line. Legal wiretapping by a government agency is also called lawful interception. Passive wiretapping monitors or records the traffic, while active wiretapping alters or otherwise affects it.

Computer and network surveillance is the monitoring of computer activity and data stored locally on a computer or data being transferred over computer networks such as the Internet. This monitoring is often carried out covertly and may be completed by governments, corporations, criminal organizations, or individuals. It may or may not be legal and may or may not require authorization from a court or other independent government agencies. Computer and network surveillance programs are widespread today and almost all Internet traffic can be monitored.

<span class="mw-page-title-main">Mass surveillance</span> Intricate surveillance of an entire or a substantial fraction of a population

Mass surveillance is the intricate surveillance of an entire or a substantial fraction of a population in order to monitor that group of citizens. The surveillance is often carried out by local and federal governments or governmental organizations, such as organizations like the NSA, but it may also be carried out by corporations. Depending on each nation's laws and judicial systems, the legality of and the permission required to engage in mass surveillance varies. It is the single most indicative distinguishing trait of totalitarian regimes. It is also often distinguished from targeted surveillance.

<span class="mw-page-title-main">Omnibus Crime Control and Safe Streets Act of 1968</span>

The Omnibus Crime Control and Safe Streets Act of 1968 was legislation passed by the Congress of the United States and signed into law by President Lyndon B. Johnson that established the Law Enforcement Assistance Administration (LEAA). Title III of the Act set rules for obtaining wiretap orders in the United States. The act was a major accomplishment of Johnson's war on crime.

Surveillance abuse is the use of surveillance methods or technology to monitor the activity of an individual or group of individuals in a way which violates the social norms or laws of a society.

Project SHAMROCK was the sister project to Project MINARET, an espionage exercise started in August 1945. Project MINARET involved the accumulation of all telegraphic data that entered or exited the United States. The Armed Forces Security Agency (AFSA) and its successor, the National Security Agency (NSA), were given direct access to daily microfilm copies of all incoming, outgoing, and transiting telegrams via the Western Union and its associates RCA and ITT. NSA did the operational interception, and, if there was information that would be of interest to other intelligence agencies, the material was passed to them. Intercepted messages were disseminated to the FBI, CIA, Secret Service, Bureau of Narcotics and Dangerous Drugs (BNDD), and the Department of Defense. No court authorized the operation and there were no warrants.

The System for Operative Investigative Activities is the technical specification for lawful interception interfaces of telecommunications and telephone networks operating in Russia. The current form of the specification enables the targeted surveillance of both telephone and Internet communications. Initially implemented in 1995 to allow access to surveillance data for the FSB, in subsequent years the access has been widened to other law enforcement agencies.

<span class="mw-page-title-main">MAINWAY</span> NSA database of US telephone calls

MAINWAY is a database maintained by the United States' National Security Agency (NSA) containing metadata for hundreds of billions of telephone calls made through the largest telephone carriers in the United States, including AT&T, Verizon, and T-Mobile.

Employee monitoring is the surveillance of workers' activity. Organizations engage in employee monitoring for different reasons such as to track performance, to avoid legal liability, to protect trade secrets, and to address other security concerns. This practice may impact employee satisfaction due to its impact on the employee's privacy. Among organizations, the extent and methods of employee monitoring differ.

Phone surveillance is the act of performing surveillance on phone conversations, location tracking, and data monitoring of a phone. Before the era of mobile phones, these used to refer to the tapping of phone lines via a method called wiretapping. Wiretapping has now been replaced by software that monitors the cell phones of users.

<span class="mw-page-title-main">Central Monitoring System</span>

The Central Monitoring System, abbreviated to CMS, is a centralized telephone interception provisioning system installed by the Centre for Development of Telematics (C-DOT), an Indian Government owned telecommunications technology development centre, and operated by Telecom Enforcement Resource and Monitoring (TERM) Cells. The CMC system is going to be set up in each major state collocated with the TERM Cells. Telecom operators in India are required by law to give access to their networks to law enforcement agencies.

<span class="mw-page-title-main">Mass surveillance in the United States</span>

The practice of mass surveillance in the United States dates back to wartime monitoring and censorship of international communications from, to, or which passed through the United States. After the First and Second World Wars, mass surveillance continued throughout the Cold War period, via programs such as the Black Chamber and Project SHAMROCK. The formation and growth of federal law-enforcement and intelligence agencies such as the FBI, CIA, and NSA institutionalized surveillance used to also silence political dissent, as evidenced by COINTELPRO projects which targeted various organizations and individuals. During the Civil Rights Movement era, many individuals put under surveillance orders were first labelled as integrationists, then deemed subversive, and sometimes suspected to be supportive of the communist model of the United States' rival at the time, the Soviet Union. Other targeted individuals and groups included Native American activists, African American and Chicano liberation movement activists, and anti-war protesters.

<span class="mw-page-title-main">2010s global surveillance disclosures</span> Disclosures of NSA and related global espionage

Ongoing news reports in the international media have revealed operational details about the Anglophone cryptographic agencies' global surveillance of both foreign and domestic nationals. The reports mostly emanate from a cache of top secret documents leaked by ex-NSA contractor Edward Snowden, which he obtained whilst working for Booz Allen Hamilton, one of the largest contractors for defense and intelligence in the United States. In addition to a trove of U.S. federal documents, Snowden's cache reportedly contains thousands of Australian, British, Canadian and New Zealand intelligence files that he had accessed via the exclusive "Five Eyes" network. In June 2013, the first of Snowden's documents were published simultaneously by The Washington Post and The Guardian, attracting considerable public attention. The disclosure continued throughout 2013, and a small portion of the estimated full cache of documents was later published by other media outlets worldwide, most notably The New York Times, the Canadian Broadcasting Corporation, the Australian Broadcasting Corporation, Der Spiegel (Germany), O Globo (Brazil), Le Monde (France), L'espresso (Italy), NRC Handelsblad, Dagbladet (Norway), El País (Spain), and Sveriges Television (Sweden).

<span class="mw-page-title-main">Timeline of global surveillance disclosures (2013–present)</span>

This timeline of global surveillance disclosures from 2013 to the present day is a chronological list of the global surveillance disclosures that began in 2013. The disclosures have been largely instigated by revelations from the former American National Security Agency contractor Edward Snowden.

<span class="mw-page-title-main">Cellphone surveillance</span> Interception of mobile phone activity

Cellphone surveillance may involve tracking, bugging, monitoring, eavesdropping, and recording conversations and text messages on mobile phones. It also encompasses the monitoring of people's movements, which can be tracked using mobile phone signals when phones are turned on.

Indiscriminate monitoring is the mass monitoring of individuals or groups without the careful judgement of wrong-doing. This form of monitoring could be done by government agencies, employers, and retailers. Indiscriminate monitoring uses tools such as email monitoring, telephone tapping, geo-locations, health monitoring to monitor private lives. Organizations that conduct indiscriminate monitoring may also use surveillance technologies to collect large amounts of data that could violate privacy laws or regulations. These practices could impact individuals emotionally, mentally, and globally. The government has also issued various protections to protect against indiscriminate monitoring.

References

  1. Secret Police Files from the Eastern Bloc: Between Surveillance and Life Writing (NED - New ed.). Boydell & Brewer. 2016. ISBN   978-1-57113-926-9. JSTOR   10.7722/j.ctt1kzccdr.
  2. Townshend, Charles. "State and public security: Charles Townshend". The State: Historical and Political Dimensions. Routledge.
  3. Martial Law in Poland Archived 2007-10-14 at the Wayback Machine (in Polish)
  4. Nomikos, John, and Andrew Liaropoulos. "Truly Reforming or Just Responding to Failures? Lessons Learned from the Modernisation of the Greek National Intelligence Service". Journal of Policing, Intelligence and Counter Terrorism.{{cite journal}}: CS1 maint: multiple names: authors list (link)
  5. Holland, Max (2006-08-21). "A Review of: "Krzysztof Persak and Lukasz Kaminski, editors:A Handbook of the Communist Security Apparatus in East Central Europe, 1944–1989"". International Journal of Intelligence and CounterIntelligence. 19 (2): 365–367. doi:10.1080/08850600500483871. ISSN   0885-0607. S2CID   152510727.
  6. Rozmowy kontrolowane at IMDb
  7. Kruk, Dawid, Dagmara Mętel, and Andrzej Cechnicki. "A paradigm description of virtual reality and its possible applications in psychiatry". Postępy Psychiatrii i Neurologii= Advances in Psychiatry and Neurology.{{cite journal}}: CS1 maint: multiple names: authors list (link)
  8. Haltof, Marek (1997). "Everything for sale: Polish national cinema after 1989". Canadian Slavonic Papers. 39 (1–2): 137–152. doi:10.1080/00085006.1997.11092147. ProQuest   274694186 via ProQuest.
  9. Cooke, Paul, Michael Eskin, and Karen Leeder. The Lives of Others' and Contemporary German Film. De Gruyter.{{cite book}}: CS1 maint: multiple names: authors list (link)
  10. Harper, Kate (2010). "Surveillance and Redemption in'The Lives of Others'". Screen Education. 59: 111.