preview

The Pros And Cons Of Eavesdropping

Decent Essays

!!!What is Eavesdropping?

Eavesdropping as we know it in layman terms is the act of secretly listening to a conversation, private or otherwise of which we are not actively a part. In computer security, the definition carries the same meaning in digital terms. __Eavesdropping__ in computer security is defined as the unauthorized interception of a conversation, communication or digital transmission in real time. The various forms of communication include phone calls, emails, instant messages or any other internet service.

The activities of eavesdropping normally do not cause disruptions on the normal operation of the systems being eavesdropped on. In reality if one is eavesdropping on a conversation you hardly want there to be any form of disruption …show more content…

The amount invested in data security whether in transmission or at rest can equal the value of the data itself. As such governments, departments, organizations, businesses, and individuals, have all been known to be both perpetrators as well as victims of this unscrupulous activity. In 1986, the Electronic Communications Privacy Act (ECPA) was passed in the United States. The Act prohibits any third party be it individual, department or government from any unauthorized access to electronic …show more content…

The law prohibits any person who seeks to or intentionally intercepts another person's communication or the communication of a device, or has knowledge of such a device, be it electronic, audio or wire or otherwise seek to use or solicits someone to do the same. (Asking or paying someone to unlawfully source information or position a devise that does so makes you equally guilty under the law) This stands true irrespective of the type of device used or its location. As long as it is a medium of transmission it is prohibited under the law. This means that if the device used is attached to, or transmits signals through hardware, wire communications, or similar device it is prohibited. Knowledge of such a perpetrator of such actions or device known to be used is transmitted interstate or abroad is also punishable by law. The law prohibits the use of such eavesdropping devices on the premises of any business organisation or private property under this

Get Access