Further, the information being transmitted did not pass into possession of the telephone company until after it entered the hardline. Therefore, due to the lack of expectation of privacy, listening to and recording these calls was not a violation of the first amendment (nor did it imply an action involving a third party - the telephone company). However, I'm not aware of how this would translate into non-voice related communications. Also, my information is dated (1994 era) and may have been specific to California's law enforcement. Further, I doubt if the FBI is still acting within the same levels of "restraint" since the passage of recent laws. Tony Anthony Brock Unix Administrator/Network Engineer Oregon University System Chancellor's Office (541) 737-9607 Anthony_Brock@privateCrispin Cowan <crispin@private> 10/14/03 08:07PM >>>A friend posed this question, and I have no idea what the answer might be: If I'm running an open, non-encrypted wireless network, what is (say) the FBI allowed to intercept in an effort to gain evidence? Do they need a warrant? Is the data admissible? What if I live in an apartment with other folks. What about when I'm using a t-mobile hotspot? Same questions, but this time, I'm running an encrypted network? Can they capture the data and crack the key? Can they capture it for later use after they sieze my equipment and get my key? No, I'm not under surveillance I'm giving a presentation and I know I'm going to get asked these questions. Any lawmen out there know the actual answer? Thanks, Crispin
-- *************************************************** Yellow Dragon Software - http://www.yellowdragonsoft.com Web Services & ebXML Messaging / Registry Downloads UN/CEFACT eBusiness Architecture/ ebXMl Technical Architecture Phone: +1 (604) 738-1051 - Canada: Pacific Standard Time Direct: +1 (604) 726-3329
This archive was generated by hypermail 2b30 : Wed Oct 15 2003 - 12:15:52 PDT