Wiretapping (English Wikipedia)

Analysis of information sources in references of the Wikipedia article "Wiretapping" in English language version.

refsWebsite
Global rank English rank
1st place
1st place
5th place
5th place
2nd place
2nd place
32nd place
21st place
214th place
176th place
840th place
635th place
505th place
410th place
1,873rd place
1,347th place
low place
low place
1,210th place
1,422nd place
332nd place
246th place
low place
low place
low place
low place
low place
low place
low place
low place
low place
low place
1,435th place
802nd place
3,322nd place
1,897th place
7,073rd place
4,772nd place
low place
low place
low place
low place
low place
low place
low place
low place
354th place
207th place
low place
6,260th place
27th place
51st place
800th place
676th place
272nd place
225th place
low place
low place
low place
low place
low place
low place
low place
low place
low place
low place
41st place
34th place
5,482nd place
3,140th place
918th place
556th place
1,271st place
703rd place
7th place
7th place
low place
low place
low place
low place
129th place
89th place
4,121st place
2,662nd place
2,161st place
2,535th place
7,503rd place
4,969th place
537th place
476th place
896th place
674th place
146th place
110th place
228th place
158th place
1,998th place
1,116th place
2,275th place
1,288th place
8,153rd place
4,786th place
2,852nd place
1,508th place
low place
low place
34th place
27th place
193rd place
152nd place

aclu.org

apnews.com

callcorder.com

cnet.com

news.cnet.com

  • McCullagh, Declan (2006-12-04). "FBI taps cell phone mic as eavesdropping tool". CNET. Retrieved 2010-06-24. The FBI appears to have begun using a novel form of electronic surveillance in criminal investigations: remotely activating a mobile phone's microphone and using it to eavesdrop on nearby conversations. […] Kaplan's opinion said that the eavesdropping technique "functioned whether the phone was powered on or off." Some handsets can't be fully powered down without removing the battery; for instance, some Nokia models will wake up when turned off if an alarm is set.

cornell.edu

law.cornell.edu

dawn.com

doi.org

dot.gov.in

  • "Acts & Rules". Department of Telecommunications. Government of India Ministry of Communications. Retrieved 2016-03-06.

epic.org

espacenet.com

worldwide.espacenet.com

  • US patent 5590171, Wayne Howe & Dale Malik, "Method and apparatus for communications monitoring", published 1996-12-31, assigned to Bellsouth Corporation 

fas.org

fcc.gov

fjallfoss.fcc.gov

  • American Council on Education v. Federal Communications Commission and Verizon Telephone Companies, 05-1404 (D.C. Cir. 2006-06-09), archived from the original on 2022-10-09.

fjc.gov

freelegalhelp.ca

gale.com

link.gale.com

gangothri.org

ghostarchive.org

govinfo.gov

  • United States Congress. Joint resolution to authorize the Federal Bureau of Investigation of the Department of Justice to con-duct investigations in the interests of national defense, and ·for that purpose to permit wire tapping in certain cases. H.J.Res. 571. 76th Cong. 2nd sess. House Committee on the Judiciary Rept. No. 2574. Cong. Rec. (bound) 8300 (June 14, 1940)

grape-info.com

heinonline.org

howstuffworks.com

people.howstuffworks.com

hrcr.org

ietf.org

datatracker.ietf.org

issuu.com

justice.gov

loksabha.nic.in

maine.edu

eece.maine.edu

networkworld.com

newyorker.com

nytimes.com

ohchr.org

cambodia.ohchr.org

  • Huvig v. France, 11105/84 (European Court of Human Rights 1990-04-24).

ojp.gov

it.ojp.gov

olympus.co.uk

parl.ca

lop.parl.ca

pickardparry.com

privacyrights.org

private-investigators-uk.com

rcfp.org

  • Rasmussen, Kirsten; Komperda, Jack; Baldino, Raymond (Summer 2012). "Reporter's Recording Guide" (PDF). The Reporters Committee for Freedom of the Press. Archived (PDF) from the original on 2022-10-09. Retrieved 2018-01-20.

redorbit.com

scientificamerican.com

slideshare.net

  • Wang, Zidu (2007-12-07). Crypto Phones (Thesis). Ruhr University Bochum. Retrieved 2014-07-22.

spyphonetap.com

theatlantic.com

toolbox.com

it.toolbox.com

ucdavis.edu

nob.cs.ucdavis.edu

  • Bishop, Matt (2003). "1: An Overview of Computer Security" (PDF). Computer security : art and science. Boston: Addison-Wesley. ISBN 0201440997. OCLC 50251943. Archived (PDF) from the original on 2005-12-22. Retrieved 2011-12-20.

usatoday.com

uscourts.gov

versadial.com

washingtonpost.com

web.archive.org

  • Bishop, Matt (2003). "1: An Overview of Computer Security" (PDF). Computer security : art and science. Boston: Addison-Wesley. ISBN 0201440997. OCLC 50251943. Archived (PDF) from the original on 2005-12-22. Retrieved 2011-12-20.
  • "Rules of Evidence". Archived from the original on 2017-02-07.
  • "Telephone Tapping in India : Legal Provisions". Gangothri.org. 2013-04-11. Archived from the original on 2015-04-30. Retrieved 2018-01-20.
  • "Fact Sheet 9: Wiretapping and Eavesdropping on Telephone Calls". Privacy Rights Clearinghouse. May 2010. Archived from the original on 2012-01-11. Retrieved 2011-12-20.
  • Kenney, Crystal. "Telecoil Experiment" (PDF). Archived from the original (PDF) on 2010-06-13. Retrieved 2011-12-20.
  • "An example of an in-ear telephone recording microphone". Olympus. Archived from the original on 2012-09-05. Retrieved 2011-12-20.
  • Biswas, Debobroto; Galib, Saad Yosuf; Mamun, Noor Hossain (August 2009). Performance Analysis of Optical CDMA in Transmission Systems (PDF) (Bachelor of Science in Electronics and Communication Engineering thesis). BRAC University. p. 14. Archived (PDF) from the original on 2016-11-18. Retrieved 2014-07-22.
  • Kelly, John (2013-12-08). "Cellphone data spying: It's not just the NSA". USA Today. Archived from the original on 2014-07-22. Retrieved 2014-07-22.
  • "Aircrack-ng (WEP, WPA-PSK Crack)". Archived from the original on 2006-11-01. Retrieved 2014-07-22.
  • Weiss, Aaron (2006-03-30). "Introduction to Kismet". Wi-Fi Planet. Archived from the original on 2014-07-27. Retrieved 2014-07-22.
  • "Facts and Case Summary: Katz v. United States". United States Courts. Archived from the original on 2015-04-03.
  • Edwards, John. "The Instant Expert Guide to CALEA". VoIP News. Archived from the original on 2012-07-11. Retrieved 2010-06-01.

wi-fiplanet.com

wikisource.org

en.wikisource.org

wired.com

worldcat.org

search.worldcat.org

  • Bishop, Matt (2003). "1: An Overview of Computer Security" (PDF). Computer security : art and science. Boston: Addison-Wesley. ISBN 0201440997. OCLC 50251943. Archived (PDF) from the original on 2005-12-22. Retrieved 2011-12-20.
  • Soma, John T.; Nichols, Maury M.; Maish, Lance A.; Rogers, Jon David (Winter 2005). "Balance of privacy vs. security: a historical perspective of the USA PATRIOT Act". Rutgers Computer & Technology Law Journal. 31 (2). Newark: Rutgers University School of Law: 285–346. ISSN 0735-8938. GALE|A139431581 – via Gale General OneFile.
  • Stille, Alexander (2008-10-27). "Girls! Girls! Girls!". Letter from Rome. The New Yorker (published 2008-11-03). ISSN 0028-792X. Retrieved 2019-11-03.