Search Details

Word: wiretaps (lookup in dictionary) (lookup stats)
Dates: all
Sort By: most recent first (reverse)


Usage:

...Chairman Orrin Hatch (R-Utah) said he and Dole would introduce a bill that combines tougher penalties for terrorist acts in the United States with thepresident's proposals. Clinton said he would create an FBI-run center fordomestic counterterrorism. He also requested far more authority for federal agents to wiretap, trace phone calls, examine phone bills and inspect other consumer records in efforts to identify terrorist cells before they commit crimes...

Author: /time Magazine | Title: CLINTON, CONGRESS UNITE IN TERROR CRACKDOWN | 4/24/1995 | See Source »

Intelink operates over the Pentagon's Defense Systems Network, which has its own lines or leases special lines from phone companies to send encrypted messages. To penetrate that system, a hacker would first have to wiretap a dsnet line, then break the sophisticated encryption of its messages, as well as steal another user's password to get past the main menu...

Author: /time Magazine | Title: SPIES IN CYBERSPACE | 3/20/1995 | See Source »

...officials in both countries. Once a sure bet to succeed Socialist President Francois Mitterrand in the April 23 election, Gaullist Prime Minister Edouard Balladur has recently seen his high poll ratings nose-dive. His campaign was badly damaged by revelations that Pasqua, a Balladur supporter, authorized an illegal wiretap last December on the father-in-law of a judge investigating an illegal campaign-funding scheme in Pasqua's district west of Paris...

Author: /time Magazine | Title: ``HALT! FRIEND OR FOE?' | 3/6/1995 | See Source »

...cops. First Denver was shut down, then Cleveland and last, in a surprise raid that had the suspects fleeing just minutes before the police arrived, Birmingham. The technique of ``letting it walk''--allowing drug shipments and couriers to proceed unhindered in order to keep suspected criminals ignorant of a wiretap--was used at every location. ``That strategy was the key,'' says lead investigator Steven Gomez. ``To the very end, they never knew...

Author: /time Magazine | Title: ENTREPRENEURS OF CRACK | 2/27/1995 | See Source »

...they began to trespass on more than just the telephone lines. With Phiber's help, the crew infiltrated the computer networks of TRW, Martin Marietta, the Bank of America, the National Security Agency and Chiquita Banana. At one point, two MOD members can be heard in a Secret Service wiretap hatching a scheme to create their own bogus credit bureau that would -- for the right price -- alter people's credit histories. "We can destroy people's lives," they boasted. "Or make them look like saints...

Author: /time Magazine | Title: Hacker Homecoming | 1/23/1995 | See Source »

Previous | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 | 27 | 28 | Next