X hits on this document

Powerpoint document

Cyber Security - the Laws that Govern Incident Response - page 7 / 38

89 views

0 shares

0 downloads

0 comments

7 / 38

2b. Monitoring Communications During an Incident; The Tools

Part I. Obtaining Content of Communications - Wiretap

Involves reading the content of communications in real-time

Phone – install a device to listen in on the line

Ex. listen in on a phone conversation planning a bank job

Computer – install a sniffer

Ex. read E-mail and IM of a kidnapper to learn where he is at the moment and what his plans are

If law enforcement wishes to do this

Must secure a court order – this is a choice of last resort

high burden of proof  

Document info
Document views89
Page views89
Page last viewedSat Dec 03 20:09:50 UTC 2016
Pages38
Paragraphs396
Words2817

Comments