X hits on this document

Powerpoint document

Cyber Security - the Laws that Govern Incident Response - page 7 / 38

137 views

0 shares

0 downloads

0 comments

7 / 38

2b. Monitoring Communications During an Incident; The Tools

Part I. Obtaining Content of Communications - Wiretap

Involves reading the content of communications in real-time

Phone – install a device to listen in on the line

Ex. listen in on a phone conversation planning a bank job

Computer – install a sniffer

Ex. read E-mail and IM of a kidnapper to learn where he is at the moment and what his plans are

If law enforcement wishes to do this

Must secure a court order – this is a choice of last resort

high burden of proof  

Document info
Document views137
Page views137
Page last viewedFri Jan 20 04:31:59 UTC 2017
Pages38
Paragraphs396
Words2817

Comments