[Name of the Writer]
[Name of the Institution]
Wiretapping is the process of secretly monitoring telephone calls, cellular calls, fax or Internet-based communications. However, it is a very controversial topic because wiretapping is not considered as unethical due to the privacy rights of an individual. Wiretapping was a very old concept which was usually used by police in the early twentieth century to monitor telephone calls and telegraph. However, it's not an ethical act whether government agencies are doing this or anyone else. It will be totally unfair to monitor communications of a private citizen without revealing them. There are also wiretapping tools which are being used to monitor the traffic of the network (Diffie & Landau, 2009).
There are certain ways which are being used for spying on what others do. Many people think that their phone lines are safe but actually, they are not safe and anyone can listen to our phone calls. It is important to understand the basics of telephones before knowing how wiretapping works completely. One of the best ways to monitor telephone calls is to fit an in-line tap with a recording output to listen to the voice calls. There are also call recording software which allows to record calls manually or automatically by detecting sound on the VOX.
Follow up 1
A sniffer is a wiretapping tool which is used to analyze the traffic of the network. It monitors and detects problems in a network. Sniffer helps a network administrator to manage the traffic flow and keep it efficient. It can be used both for legally and illegally to detect traffic on a network.
Follow up 2
Wiretap Trojan is a program which is used to record VoIP calls secretly. Peskyspy is a wiretap trojan which is specifically built for monitoring and recording Skype calls. It intercepts audio on Skype call before it is encrypted and converts that into an MP3 file. After converting into an MP3 file the audio stream, it is saved on the victim’s machine.
Diffie, W., & Landau, S. (2009). Communications surveillance: Privacy and security at risk. Association for Computing Machinery.Communications of the ACM, 52(11), 42. Retrieved from https://search.proquest.com/docview/237061043?accountid=41759
Useful LinksFree Essays About Blog
If you have any queries please write to us
Join our mailing list
@ All Rights Reserved 2023 email@example.com