EavesdroppingSee also what's at Wikipedia, your library, or elsewhere.
Broader terms:Narrower terms:Used for:- Electronic bugging
- Electronic eavesdropping
- Electronic listening devices
- Interception of communications, Unauthorized
- Listening devices, Unauthorized use of
- Unauthorized interception of communications
|
Filed under: Eavesdropping
Filed under: Eavesdropping -- Great Britain
Filed under: Eavesdropping -- Law and legislation -- United StatesFiled under: Eavesdropping -- Periodicals
Filed under: Wiretapping -- PeriodicalsFiled under: Eavesdropping -- United States
Filed under: Wiretapping -- United States Privacy on the Line: The Politics of Wiretapping and Encryption (updated and expanded edition; Cambridge, MA and London: MIT Press, 2007), by Whitfield Diffie and Susan Eva Landau (PDF files with commentary at MIT Press) Warrantless Wiretapping: Hearings Before the Subcommitee on Administrative Practive and Procedure of the Committee on the Judiciary, United States Senate, Ninety-Second Congress, Second Session, on Practices and Procedures of the Department of Justice for Warrantless Wiretapping and Other Electronic Surveillance, June 29, 1972 (Washington: GPO, 1973), by United States Senate Committee on the Judiciary (page images at HathiTrust) Electronic Surveillance and Civil Liberties (1985), by United States Congress Office of Technology Assessment (PDF files at Princeton) Filed under: Wiretapping
Items below (if any) are from related and broader terms.
Filed under: Evidence, Criminal
Filed under: Evidence, Criminal -- FranceFiled under: Evidence, Criminal -- Germany Beiträge zur Lehre vom Beweis im Strafprozess (in German; Leipzig: Duncker and Humblot, 1883), by Julius Glaser
Filed under: Evidence, Criminal -- Great Britain -- History
Filed under: Evidence, Criminal -- New York (State) -- New York
Filed under: Evidence, Criminal -- Psychological aspects -- Cases
Filed under: Evidence, Criminal -- Standards -- United States
Filed under: Evidence, Criminal -- Technological innovations -- United States Advancing Justice Through DNA Technology Act of 2003: Report (Rept. 108-321 Part 1; no further parts known to be published; 2003), by United States House Committee on the Judiciary Filed under: Evidence, Criminal -- United States Fiber Evidence and the Wayne Williams Trial (reprinted from the FBI Law Enforcement Bulletin, 1984), by Harold A. Deadman (page images at HathiTrust) Mr. Justice Harlan Dissents! A Statement (1961), by Virginia Commission on Constitutional Government and John M. Harlan (multiple formats at archive.org) Strengthening Forensic Science in the United States: A Path Forward (2009), by National Research Council Committee on Identifying the Needs of the Forensic Science Community (multiple formats at NAP) Ensuring the Effective Use of DNA Evidence to Solve Rape Cases Nationwide: Hearing Before the Committee on the Judiciary, United States Senate, One Hundred Eleventh Congress, First Session, December 15, 2009 (Washington: GPO, 2010), by United States Senate Committee on the Judiciary (page images at HathiTrust)
Filed under: Evidence, Criminal -- United States -- EvaluationFiled under: Evidence, Criminal -- United States -- Handbooks, manuals, etc.Filed under: Evidence, Criminal -- United States -- HistoryFiled under: Evidence preservation -- United States
Filed under: Confession (Law) -- FictionFiled under: Confession (Law) -- IranFiled under: Writing -- Identification
Filed under: Listening
Filed under: Security systems -- Mexico Making Things Stick: Surveillance Technologies and Mexico's War on Crime (Oakland, CA: University of California Press, c2016), by Keith Guzik
Filed under: Computer security Bounty Everything: Hackers and the Making of the Global Bug Marketplace (New York: Data and Society, 2022), by Ryan Ellis and Yuan Stevens (PDF with commentary at datasociety.net) The Huawei and Snowden Questions: Can Electronic Equipment from Untrusted Vendors be Verified? Can an Untrusted Vendor Build Trust into Electronic Equipment? (Cham et al.: Springer Open, c2018), by Olav Lysne (PDF and Epub with commentary at SpringerLink) UNIX System Security: A Guide for Users and System Administrators (originally published 1992; free electronic edition 2014), by David A. Curry (multiple formats with commentary at bitsinthewind.com) Hacking the Xbox: An Introduction to Reverse Engineering (unlimited edition, 2013), by Andrew Huang (PDF with commentary at No Starch Press) Managing Risk and Information Security: Protect to Enable (c2013), by Malcolm Harkins (multiple formats with commentary at SpringerLink) Security Engineering: A Guide to Building Dependable Distributed Systems (second edition, 2008), by Ross Anderson (PDF files with commentary in the UK) Computers at Risk: Safe Computing in the Information Age (1991), by National Research Council Computer Science and Telecommunications Board (page images with commentary at NAP) A Guide to Writing the Security Features User's Guide for Trusted Systems (version 1; 1991), by David M. Chizmadia (text at fas.org) Rational Cybersecurity for Business: The Security Leaders' Guide to Business Alignment (Berkeley: APress Open, c2020), by Daniel J. Blum (PDF with commentary at OAPEN) The Dark Visitor: Inside the World of Chinese Hackers (c2007), by Scott Henderson (PDF at lulu.com) Introduction to the New Mainframe: Security (Poughkeepsie, NY: IBM International Technical Support Organization, 2007), by Rica Weller, Ross Clements, Ken Dugdale, Per Fremstad, Helmut Hellner, Olegario Hernandez, William C. Johnston, Patrick Kappeler, Linda Kochersberger, Abey Tedla, Jeff Thompson, and Ashwin Venkatraman (multiple formats at ibm.com) A Guide to Understanding Data Remanence in Automated Information Systems (version 2; 1991), by James K. Goldson (HTML at fas.org) The End of Trust (McSweeney's #54; 2018), ed. by McSweeney's (Firm) (PDF at eff.org) Intrusion Detection Systems With Snort: Advanced IDS Techniques Using Snort, Apache, MySQL, PHP, and ACID (c2003), by Rafeeq Ur Rehman (PDF at pearsoncmg.com) Open Source Security Tools: Practical Applications for Security, by Tony Howlett (PDF at pearsoncmg.com) Securing Java: Getting Down to Business with Mobile Code, by Gary McGraw and Ed Felten (illustrated HTML with commentary at securingjava.com) Cracking Codes with Python, by Al Sweigart (illustrated HTML with commentary at inventwithpython.com) For the Record: Protecting Electronic Health Information, by National Research Council Computer Science and Telecommunications Board (HTML and page images at NAP)
More items available under broader and related terms at left. |