SlideShare a Scribd company logo
Covert Audio and the Law 
At Supercircuits, we work closely with law 
enforcement agencies to provide a wide array of 
covert surveillance technologies including covert 
audio gear. Our commercial sales division routinely 
receives calls with questions about covert video 
surveillance and covert audio surveillance from both 
businesses and end-users. 
The biggest question regarding covert audio is if it’s 
legal. Covert audio is legal, but you need to 
understand exactly when and how to legally use it— 
or your evidence will not be admissible in court and you could be in serious trouble. Below are 
common questions we hear with explanations as to what can and can’t be done with covert audio 
and video surveillance. 
1. What is covert audio equipment? 
In general, the law defines covert audio devices as anything that is intentionally designed to 
covertly intercept oral communication. Most of these laws do not cover the components that make 
up covert devices such as microphones, batteries, transmitters or recorders. Instead, most laws 
restrict these devices once they are constructed. 
To illustrate the threshold of most laws, a common camcorder with a built-in microphone by itself is 
completely legal. However, when the camcorder is concealed in something that is designed for 
covert use, the person using the camcorder as a covert device to capture video and audio from a 
hidden location would be in violation of federal law and many state laws dealing with 
manufacturing and possession of covert and audio devices. 
2. Why do the laws regulate audio and not video—it seems backwards? 
To most people, video seems like the superior technology. With this reasoning, many wonder why 
the laws are so strict concerning covert audio and in many cases silent when it comes to covert 
video.
It is important to note that when most of the laws around covert devices were written video 
technology did not exist as it does today and audio was the dominate means of covertly obtaining 
information. 
Additionally, audio technology has a higher propensity to do harm by covertly recording 
conversations. Everyone, regardless of their walk in life, has a reasonable expectation to privacy in 
their daily lives like when they see the doctor or parent a child. 
If those private conversations fell into the wrong hands it would devastate relationships, break 
down trust and even in some cases, ruin a person’s life. 
Business managers are another example. They need to have private conversations with other 
managers or employees about things like the health of the business or employment. However if 
these conversations were made public, business security or even careers may be at stake. 
3. Are there any laws covering surveillance video? 
It wasn’t until the 1990s that legislation began to appear about the legal use of video surveillance 
equipment. States were prompted to pass legislation after law enforcement agencies uncovered 
horrific stories of voyeurism but had no law in which to press charges. 
These laws can be found under statutes covering criminal trespass, disorderly conduct, invasion of 
privacy, and revised peeping tom laws. 
The spirit of the laws states that video cannot be used in areas where people have a reasonable 
expectation of privacy such as homes, bathrooms or locker rooms. In 2004 the federal government 
followed state legislation and enacted the Video Voyeurism Act of 2004 covering the use of covert 
video. (Voyeurism Statutes 2009 PDF) 
We’re glad to see the establishment of these laws and, on rare occasion, we have assisted 
agencies in the prosecution of the inappropriate use of video equipment. It is worth pointing out 
that these cases are rare. The general trend for the use of video equipment is for good people to 
use video to catch bad people doing bad things. Just ask any criminal, they hate video cameras.
4. My state allows covert audio, why does the federal law matter? 
Federal law, known as the USC (United States Code), supersedes state law when it comes to 
covert audio. Many well-intentioned individuals believe that because their particular state law does 
not address or even allow the use of covert audio that it is perfectly legal for them to use it. 
Unfortunately that belief is faulty and criminally dangerous. It is true that federal and state laws 
conflict from time to time such as recent state legislation allowing medicinal use of cannabis. In all 
of those states, federal law enforcement agents are still enforcing USC drug laws on cannabis 
regardless of the state laws. The use of covert audio is no different—federal law trumps state law. 
5. Both state and federal law seem to allow one-party consent for audio recording. Does this 
mean I can covertly record conversations? 
Clauses about recording with one-party consent are mostly applied to recording telephone 
conversations where at least one person of the conversation is the rightful owner or controller of 
the telephone in use. 
These clauses are also designed to restrict the highly illegal practice of wiretapping where no party 
has given consent to the recording or interception of the conversation. Under federal law it is illegal 
for a person to even possess covert audio equipment – making the question of one-party consent 
irrelevant. 
6. What are the specific laws about covert audio? 
USC Title 18 Section 2512 (18 USC § 2512) is the federal law that regulates the manufacturing, 
possession, sales and solicitation of covert audio surveillance equipment. State laws vary from 
state to state, but most are similar to USC Title 18 Section 2512. Some even further outline the 
legal and illegal use of covert audio equipment. 
7. I am a private investigator; can I buy and use covert audio? 
Unfortunately, no – private investigators provide a much needed service to our nation, but the 
federal law provides no special provision for private investigations. However, if a private 
investigator is fulfilling a government contract that requires the use of covert audio, there may be 
some legal allowance for the investigator to use this gear.
This potential allowance would also apply to security, military and training contractors. If this 
allowance is applicable, the purchase would most likely need to be done through the government 
agency issuing the contract. 
8. Is a tiny microphone considered illegal? 
No. Microphones themselves regardless of their size are completely legal and easily obtained from 
a variety of legitimate sources. However, as with many things that are legally benign, how they’re 
used can make them highly illegal. 
9. I’m from another country that has no laws regarding audio, can I buy covert audio? 
It’s possible that you may be able to purchase covert audio in the US and export it to another 
country. However, US export laws require companies exporting such devices to obtain prior 
authorization and licensing from federal controlling bodies. 
United States export laws also dictate that the export of covert audio can only occur to certain 
countries, organizations and individuals. All parties involved in export of covert audio equipment 
are criminally liable and because of this, many companies choose not to export any surveillance 
equipment. 
10. If I am a full time police officer; can I purchase covert audio equipment for personal 
use? 
Federal law does not allow for the personal purchase, use or possession of covert audio 
equipment. Any use or purchase must be made in pursuit of official duties as a government agent. 
However, individuals and non-government organizations donating to government agencies can 
fund, or in other words pay for, the purchase but the use and possession must be done by the 
government agency. 
11. I provide goods and services to government agencies; can I buy covert audio for resale 
purposes? 
Yes. However, prior to any solicitation or purchase a verified contract from a government agency 
must be received that specifies the need for covert audio equipment. Most providers will require 
the delivery of such goods to be made directly to the government agency.
12. Can I legally use audio equipment at all? 
Absolutely! There are hundreds of applications of audio equipment that are completely legitimate 
and legal. In the realm of security, audio has played a pivotal role in solving cases, providing 
protection against lawsuits and more. Crooks in the commission of crimes often reveal names and 
discuss key element or plans to cover their tracks, should they be discovered. 
When using audio for surveillance purposes there are a couple of important things to keep in mind. 
First, placement of audio equipment should be done in such a way that no one could reasonably 
consider it hidden or covert. Secondly, state laws should be studied carefully as most will have 
specific parameters for how audio is used in the security of a business or home. 
Generally, states require the property to include conspicuous signs that make others aware that 
audio surveillance equipment is in use. 
If you have questions about covert audio surveillance, we encourage you to seek legal counsel 
prior to the use of audio surveillance. They can provide you with specific information of how the law 
applies to your specific needs and provide you with a legal avenue for your application. 
http://www.supercircuits.com/resources/blog/covert-audio-and-the-law
12. Can I legally use audio equipment at all? 
Absolutely! There are hundreds of applications of audio equipment that are completely legitimate 
and legal. In the realm of security, audio has played a pivotal role in solving cases, providing 
protection against lawsuits and more. Crooks in the commission of crimes often reveal names and 
discuss key element or plans to cover their tracks, should they be discovered. 
When using audio for surveillance purposes there are a couple of important things to keep in mind. 
First, placement of audio equipment should be done in such a way that no one could reasonably 
consider it hidden or covert. Secondly, state laws should be studied carefully as most will have 
specific parameters for how audio is used in the security of a business or home. 
Generally, states require the property to include conspicuous signs that make others aware that 
audio surveillance equipment is in use. 
If you have questions about covert audio surveillance, we encourage you to seek legal counsel 
prior to the use of audio surveillance. They can provide you with specific information of how the law 
applies to your specific needs and provide you with a legal avenue for your application. 
http://www.supercircuits.com/resources/blog/covert-audio-and-the-law

More Related Content

What's hot

Privacy right under it act, 2000 and under other law
Privacy right under it act, 2000 and under other lawPrivacy right under it act, 2000 and under other law
Privacy right under it act, 2000 and under other law
Nitya Nand Pandey
 
Every Move You Make: Balancing Privacy Rights in the GPS Tracking of Sales an...
Every Move You Make: Balancing Privacy Rights in the GPS Tracking of Sales an...Every Move You Make: Balancing Privacy Rights in the GPS Tracking of Sales an...
Every Move You Make: Balancing Privacy Rights in the GPS Tracking of Sales an...
Dinsmore & Shohl LLP
 
ARTICLE REVIEW: FREEDOM OF SPEECH AND THE INTERNET
ARTICLE REVIEW: FREEDOM OF SPEECH AND THE INTERNETARTICLE REVIEW: FREEDOM OF SPEECH AND THE INTERNET
ARTICLE REVIEW: FREEDOM OF SPEECH AND THE INTERNET
ASMAH CHE WAN
 
Information technology and law and trai
Information technology and law and traiInformation technology and law and trai
Information technology and law and trai
Himanshu Jawa
 
Computer forensics law and privacy
Computer forensics   law and privacyComputer forensics   law and privacy
Computer forensics law and privacy
ch samaram
 
Art 10 st
Art 10 stArt 10 st
Art 10 st
Latifah Kaiyisah
 
Cyber space: its legal jurisdiction
Cyber space: its legal jurisdictionCyber space: its legal jurisdiction
Cyber space: its legal jurisdiction
ITM UNIVERSITY, RAIPUR- SCHOOL OF LAW
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
ShashankBajpai24
 
Cyberspace jurisdiction meaning and concept
Cyberspace jurisdiction meaning and conceptCyberspace jurisdiction meaning and concept
Cyberspace jurisdiction meaning and concept
gagan deep
 
Analyzinglegislation
AnalyzinglegislationAnalyzinglegislation
AnalyzinglegislationDr. TJ Wolfe
 
IPR Enforcement in India through Criminal Measures - By Vijay Pal Dalmia
IPR Enforcement in India through Criminal Measures - By Vijay Pal DalmiaIPR Enforcement in India through Criminal Measures - By Vijay Pal Dalmia
IPR Enforcement in India through Criminal Measures - By Vijay Pal Dalmia
Vijay Dalmia
 
Important section of IT Act 2000 & IPC sections related to cyber law.
Important section  of IT Act 2000 & IPC sections related to cyber law. Important section  of IT Act 2000 & IPC sections related to cyber law.
Important section of IT Act 2000 & IPC sections related to cyber law.
KOMALMALLIK
 
Cyber jurisdiction in India
Cyber jurisdiction in IndiaCyber jurisdiction in India
Cyber jurisdiction in India
shamvisingh
 
Maximizing the Return on Your Cell Lease/Licenses
Maximizing the Return on Your Cell Lease/LicensesMaximizing the Return on Your Cell Lease/Licenses
Maximizing the Return on Your Cell Lease/Licenses
Best Best and Krieger LLP
 
Criminal remedies under ip law
Criminal remedies under ip lawCriminal remedies under ip law
Criminal remedies under ip lawAltacit Global
 
April 2011 - Business Law & Order - Richard (Rick) Hoffmann
April 2011 - Business Law & Order - Richard (Rick) HoffmannApril 2011 - Business Law & Order - Richard (Rick) Hoffmann
April 2011 - Business Law & Order - Richard (Rick) Hoffmann
AnnArborSPARK
 
Enforcement of IPR on indian prospective
Enforcement of IPR on indian prospectiveEnforcement of IPR on indian prospective
Enforcement of IPR on indian prospectiveSolicitor Ashrujit Basu
 
Article_deleberate_misapplication_of_law
Article_deleberate_misapplication_of_lawArticle_deleberate_misapplication_of_law
Article_deleberate_misapplication_of_lawMohammed Hanif memon
 
13 fundamental liberties 10 11 (9)
13 fundamental liberties 10 11 (9)13 fundamental liberties 10 11 (9)
13 fundamental liberties 10 11 (9)Ainnabila Rosdi
 
Article 10 freedom of speech
Article 10   freedom of speechArticle 10   freedom of speech
Article 10 freedom of speechHafizul Mukhlis
 

What's hot (20)

Privacy right under it act, 2000 and under other law
Privacy right under it act, 2000 and under other lawPrivacy right under it act, 2000 and under other law
Privacy right under it act, 2000 and under other law
 
Every Move You Make: Balancing Privacy Rights in the GPS Tracking of Sales an...
Every Move You Make: Balancing Privacy Rights in the GPS Tracking of Sales an...Every Move You Make: Balancing Privacy Rights in the GPS Tracking of Sales an...
Every Move You Make: Balancing Privacy Rights in the GPS Tracking of Sales an...
 
ARTICLE REVIEW: FREEDOM OF SPEECH AND THE INTERNET
ARTICLE REVIEW: FREEDOM OF SPEECH AND THE INTERNETARTICLE REVIEW: FREEDOM OF SPEECH AND THE INTERNET
ARTICLE REVIEW: FREEDOM OF SPEECH AND THE INTERNET
 
Information technology and law and trai
Information technology and law and traiInformation technology and law and trai
Information technology and law and trai
 
Computer forensics law and privacy
Computer forensics   law and privacyComputer forensics   law and privacy
Computer forensics law and privacy
 
Art 10 st
Art 10 stArt 10 st
Art 10 st
 
Cyber space: its legal jurisdiction
Cyber space: its legal jurisdictionCyber space: its legal jurisdiction
Cyber space: its legal jurisdiction
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
 
Cyberspace jurisdiction meaning and concept
Cyberspace jurisdiction meaning and conceptCyberspace jurisdiction meaning and concept
Cyberspace jurisdiction meaning and concept
 
Analyzinglegislation
AnalyzinglegislationAnalyzinglegislation
Analyzinglegislation
 
IPR Enforcement in India through Criminal Measures - By Vijay Pal Dalmia
IPR Enforcement in India through Criminal Measures - By Vijay Pal DalmiaIPR Enforcement in India through Criminal Measures - By Vijay Pal Dalmia
IPR Enforcement in India through Criminal Measures - By Vijay Pal Dalmia
 
Important section of IT Act 2000 & IPC sections related to cyber law.
Important section  of IT Act 2000 & IPC sections related to cyber law. Important section  of IT Act 2000 & IPC sections related to cyber law.
Important section of IT Act 2000 & IPC sections related to cyber law.
 
Cyber jurisdiction in India
Cyber jurisdiction in IndiaCyber jurisdiction in India
Cyber jurisdiction in India
 
Maximizing the Return on Your Cell Lease/Licenses
Maximizing the Return on Your Cell Lease/LicensesMaximizing the Return on Your Cell Lease/Licenses
Maximizing the Return on Your Cell Lease/Licenses
 
Criminal remedies under ip law
Criminal remedies under ip lawCriminal remedies under ip law
Criminal remedies under ip law
 
April 2011 - Business Law & Order - Richard (Rick) Hoffmann
April 2011 - Business Law & Order - Richard (Rick) HoffmannApril 2011 - Business Law & Order - Richard (Rick) Hoffmann
April 2011 - Business Law & Order - Richard (Rick) Hoffmann
 
Enforcement of IPR on indian prospective
Enforcement of IPR on indian prospectiveEnforcement of IPR on indian prospective
Enforcement of IPR on indian prospective
 
Article_deleberate_misapplication_of_law
Article_deleberate_misapplication_of_lawArticle_deleberate_misapplication_of_law
Article_deleberate_misapplication_of_law
 
13 fundamental liberties 10 11 (9)
13 fundamental liberties 10 11 (9)13 fundamental liberties 10 11 (9)
13 fundamental liberties 10 11 (9)
 
Article 10 freedom of speech
Article 10   freedom of speechArticle 10   freedom of speech
Article 10 freedom of speech
 

Viewers also liked

28 Nov 2012 1ABCT Weekly Newsletter
28 Nov 2012 1ABCT Weekly Newsletter28 Nov 2012 1ABCT Weekly Newsletter
28 Nov 2012 1ABCT Weekly Newsletter
Noel Waterman
 
English central
English centralEnglish central
English central
imchichen
 
QR Code, l'esperienza di Cervia
QR Code, l'esperienza di CerviaQR Code, l'esperienza di Cervia
QR Code, l'esperienza di Cervia
Turismo Cervia
 
28 March 2012 1HBCT Weekly News Update
28 March 2012 1HBCT Weekly News Update28 March 2012 1HBCT Weekly News Update
28 March 2012 1HBCT Weekly News Update
Noel Waterman
 
The State of Social 2012
The State of Social 2012The State of Social 2012
The State of Social 2012
M Booth & DePaul University
 
Vancouver real estate stats package, june 2011
Vancouver real estate stats package, june 2011Vancouver real estate stats package, june 2011
Vancouver real estate stats package, june 2011Matt Collinge
 
16 May 2012 1HBCT Weekly News Update
16 May 2012 1HBCT Weekly News Update16 May 2012 1HBCT Weekly News Update
16 May 2012 1HBCT Weekly News Update
Noel Waterman
 
презентация Microsoft office power point
презентация Microsoft office power pointпрезентация Microsoft office power point
презентация Microsoft office power pointamalik111
 
Vancouver real estate rebgv stats package january 2011
Vancouver real estate rebgv stats package january 2011Vancouver real estate rebgv stats package january 2011
Vancouver real estate rebgv stats package january 2011
Matt Collinge
 
Bc Homes Sales Edge Lower in July 2011
Bc Homes Sales Edge Lower in July 2011Bc Homes Sales Edge Lower in July 2011
Bc Homes Sales Edge Lower in July 2011
Matt Collinge
 
презентация Tex drive 26 янв 2012
презентация Tex drive 26 янв 2012презентация Tex drive 26 янв 2012
презентация Tex drive 26 янв 2012Leonid Danilov
 
Str8ts Weekly Extreme #59 - Solution
Str8ts Weekly Extreme #59 - SolutionStr8ts Weekly Extreme #59 - Solution
Str8ts Weekly Extreme #59 - Solution
SlowThinker
 
Beware of Phishing Scams
Beware of Phishing ScamsBeware of Phishing Scams
Beware of Phishing Scams
Noel Waterman
 
Jan lokpal vs govt. lokpal
Jan lokpal vs govt. lokpalJan lokpal vs govt. lokpal
Jan lokpal vs govt. lokpalPandurang Shinde
 
Chemistry applicants - the process
Chemistry applicants - the processChemistry applicants - the process
Chemistry applicants - the processTeam MyRSC
 
Sept 2012 Monthly Network Slides
Sept 2012 Monthly Network SlidesSept 2012 Monthly Network Slides
Sept 2012 Monthly Network Slides
Noel Waterman
 
Mi metafora visual competencias en marketing
Mi metafora visual competencias en marketingMi metafora visual competencias en marketing
Mi metafora visual competencias en marketing
Allan Gonzalez Torres
 
NOVEMBER 29 2012 NETWORK SLIDES
NOVEMBER 29 2012 NETWORK SLIDESNOVEMBER 29 2012 NETWORK SLIDES
NOVEMBER 29 2012 NETWORK SLIDESNoel Waterman
 

Viewers also liked (20)

28 Nov 2012 1ABCT Weekly Newsletter
28 Nov 2012 1ABCT Weekly Newsletter28 Nov 2012 1ABCT Weekly Newsletter
28 Nov 2012 1ABCT Weekly Newsletter
 
English central
English centralEnglish central
English central
 
QR Code, l'esperienza di Cervia
QR Code, l'esperienza di CerviaQR Code, l'esperienza di Cervia
QR Code, l'esperienza di Cervia
 
28 March 2012 1HBCT Weekly News Update
28 March 2012 1HBCT Weekly News Update28 March 2012 1HBCT Weekly News Update
28 March 2012 1HBCT Weekly News Update
 
The State of Social 2012
The State of Social 2012The State of Social 2012
The State of Social 2012
 
Vancouver real estate stats package, june 2011
Vancouver real estate stats package, june 2011Vancouver real estate stats package, june 2011
Vancouver real estate stats package, june 2011
 
16 May 2012 1HBCT Weekly News Update
16 May 2012 1HBCT Weekly News Update16 May 2012 1HBCT Weekly News Update
16 May 2012 1HBCT Weekly News Update
 
презентация Microsoft office power point
презентация Microsoft office power pointпрезентация Microsoft office power point
презентация Microsoft office power point
 
Vancouver real estate rebgv stats package january 2011
Vancouver real estate rebgv stats package january 2011Vancouver real estate rebgv stats package january 2011
Vancouver real estate rebgv stats package january 2011
 
Bc Homes Sales Edge Lower in July 2011
Bc Homes Sales Edge Lower in July 2011Bc Homes Sales Edge Lower in July 2011
Bc Homes Sales Edge Lower in July 2011
 
презентация Tex drive 26 янв 2012
презентация Tex drive 26 янв 2012презентация Tex drive 26 янв 2012
презентация Tex drive 26 янв 2012
 
Str8ts Weekly Extreme #59 - Solution
Str8ts Weekly Extreme #59 - SolutionStr8ts Weekly Extreme #59 - Solution
Str8ts Weekly Extreme #59 - Solution
 
Beware of Phishing Scams
Beware of Phishing ScamsBeware of Phishing Scams
Beware of Phishing Scams
 
Jan lokpal vs govt. lokpal
Jan lokpal vs govt. lokpalJan lokpal vs govt. lokpal
Jan lokpal vs govt. lokpal
 
Chemistry applicants - the process
Chemistry applicants - the processChemistry applicants - the process
Chemistry applicants - the process
 
Sept 2012 Monthly Network Slides
Sept 2012 Monthly Network SlidesSept 2012 Monthly Network Slides
Sept 2012 Monthly Network Slides
 
Presentation1
Presentation1Presentation1
Presentation1
 
Mi metafora visual competencias en marketing
Mi metafora visual competencias en marketingMi metafora visual competencias en marketing
Mi metafora visual competencias en marketing
 
NOVEMBER 29 2012 NETWORK SLIDES
NOVEMBER 29 2012 NETWORK SLIDESNOVEMBER 29 2012 NETWORK SLIDES
NOVEMBER 29 2012 NETWORK SLIDES
 
Where we live
Where we liveWhere we live
Where we live
 

Similar to Covert Audio and the Law

Illegal video recording & violation of privacy
Illegal video recording & violation of privacyIllegal video recording & violation of privacy
Illegal video recording & violation of privacy
DhruveshPatel31
 
PRSA PSA-18: Illegal Recordings
PRSA PSA-18: Illegal RecordingsPRSA PSA-18: Illegal Recordings
PRSA PSA-18: Illegal Recordings
Public Relations Society of America
 
Aclunc lye-sting rays-the_most_common_surveillance_tool_the_govt_wont_tell_yo...
Aclunc lye-sting rays-the_most_common_surveillance_tool_the_govt_wont_tell_yo...Aclunc lye-sting rays-the_most_common_surveillance_tool_the_govt_wont_tell_yo...
Aclunc lye-sting rays-the_most_common_surveillance_tool_the_govt_wont_tell_yo...DeepDude
 
Aclunc lye-sting rays-the_most_common_surveillance_tool_the_govt_wont_tell_yo...
Aclunc lye-sting rays-the_most_common_surveillance_tool_the_govt_wont_tell_yo...Aclunc lye-sting rays-the_most_common_surveillance_tool_the_govt_wont_tell_yo...
Aclunc lye-sting rays-the_most_common_surveillance_tool_the_govt_wont_tell_yo...PublicLeaker
 
STINGRAYS: The Most Common Surveillance Tool the Government Won't Tell You About
STINGRAYS: The Most Common Surveillance Tool the Government Won't Tell You AboutSTINGRAYS: The Most Common Surveillance Tool the Government Won't Tell You About
STINGRAYS: The Most Common Surveillance Tool the Government Won't Tell You About
- Mark - Fullbright
 
Plans for photoshoot task 23
Plans for photoshoot task 23Plans for photoshoot task 23
Plans for photoshoot task 23
eh05057922
 
Your Rights When Performing A Freedom Of Speech Event In A Public Venue
Your Rights When Performing A Freedom Of Speech Event In A Public VenueYour Rights When Performing A Freedom Of Speech Event In A Public Venue
Your Rights When Performing A Freedom Of Speech Event In A Public Venue
guest07b3f268
 
Legal Issues in Mobile Security Research
Legal Issues in Mobile Security ResearchLegal Issues in Mobile Security Research
Legal Issues in Mobile Security Research
London School of Cyber Security
 
Legal Issues in Mobile Security Research
Legal Issues in Mobile Security ResearchLegal Issues in Mobile Security Research
Legal Issues in Mobile Security Research
marciahofmann
 
2014 Crowdfunding and Intellectual Property 101
2014 Crowdfunding and Intellectual Property 1012014 Crowdfunding and Intellectual Property 101
2014 Crowdfunding and Intellectual Property 101
Charles Mudd
 
Learning ObjectivesAfter studying this chapter, you should be ab.docx
Learning ObjectivesAfter studying this chapter, you should be ab.docxLearning ObjectivesAfter studying this chapter, you should be ab.docx
Learning ObjectivesAfter studying this chapter, you should be ab.docx
smile790243
 
Background TLG has explained to the GC owners that it is vital to u
Background TLG has explained to the GC owners that it is vital to uBackground TLG has explained to the GC owners that it is vital to u
Background TLG has explained to the GC owners that it is vital to u
cameroncourtney45
 
ODI Queensland - Open Data Essentials - Law and Licensing
ODI Queensland - Open Data Essentials - Law and LicensingODI Queensland - Open Data Essentials - Law and Licensing
ODI Queensland - Open Data Essentials - Law and Licensing
AusGOAL
 
10 Criminology in the FutureCriminology in the FutureKristop.docx
10 Criminology in the FutureCriminology in the FutureKristop.docx10 Criminology in the FutureCriminology in the FutureKristop.docx
10 Criminology in the FutureCriminology in the FutureKristop.docx
hyacinthshackley2629
 
Reporter's Recording Guide
Reporter's Recording GuideReporter's Recording Guide
Reporter's Recording Guide
- Mark - Fullbright
 
Reporter's Recording Guide: A state-by-state guide to taping phone calls and ...
Reporter's Recording Guide: A state-by-state guide to taping phone calls and ...Reporter's Recording Guide: A state-by-state guide to taping phone calls and ...
Reporter's Recording Guide: A state-by-state guide to taping phone calls and ...
- Mark - Fullbright
 
Privacy and Protection of Personal Information law seminar
Privacy and Protection of Personal Information law seminarPrivacy and Protection of Personal Information law seminar
Privacy and Protection of Personal Information law seminarLance Michalson
 
Catherine Raffaele - IP Event
Catherine Raffaele - IP EventCatherine Raffaele - IP Event
Catherine Raffaele - IP EventGordon Renouf
 
Ethics and legislation in the it industry
Ethics and legislation in the it industryEthics and legislation in the it industry
Ethics and legislation in the it industry
jamiehaworth1
 

Similar to Covert Audio and the Law (20)

Illegal video recording & violation of privacy
Illegal video recording & violation of privacyIllegal video recording & violation of privacy
Illegal video recording & violation of privacy
 
PRSA PSA-18: Illegal Recordings
PRSA PSA-18: Illegal RecordingsPRSA PSA-18: Illegal Recordings
PRSA PSA-18: Illegal Recordings
 
Aclunc lye-sting rays-the_most_common_surveillance_tool_the_govt_wont_tell_yo...
Aclunc lye-sting rays-the_most_common_surveillance_tool_the_govt_wont_tell_yo...Aclunc lye-sting rays-the_most_common_surveillance_tool_the_govt_wont_tell_yo...
Aclunc lye-sting rays-the_most_common_surveillance_tool_the_govt_wont_tell_yo...
 
Aclunc lye-sting rays-the_most_common_surveillance_tool_the_govt_wont_tell_yo...
Aclunc lye-sting rays-the_most_common_surveillance_tool_the_govt_wont_tell_yo...Aclunc lye-sting rays-the_most_common_surveillance_tool_the_govt_wont_tell_yo...
Aclunc lye-sting rays-the_most_common_surveillance_tool_the_govt_wont_tell_yo...
 
STINGRAYS: The Most Common Surveillance Tool the Government Won't Tell You About
STINGRAYS: The Most Common Surveillance Tool the Government Won't Tell You AboutSTINGRAYS: The Most Common Surveillance Tool the Government Won't Tell You About
STINGRAYS: The Most Common Surveillance Tool the Government Won't Tell You About
 
Plans for photoshoot task 23
Plans for photoshoot task 23Plans for photoshoot task 23
Plans for photoshoot task 23
 
Your Rights When Performing A Freedom Of Speech Event In A Public Venue
Your Rights When Performing A Freedom Of Speech Event In A Public VenueYour Rights When Performing A Freedom Of Speech Event In A Public Venue
Your Rights When Performing A Freedom Of Speech Event In A Public Venue
 
Legal Issues in Mobile Security Research
Legal Issues in Mobile Security ResearchLegal Issues in Mobile Security Research
Legal Issues in Mobile Security Research
 
Legal Issues in Mobile Security Research
Legal Issues in Mobile Security ResearchLegal Issues in Mobile Security Research
Legal Issues in Mobile Security Research
 
Task 5+8
Task 5+8Task 5+8
Task 5+8
 
2014 Crowdfunding and Intellectual Property 101
2014 Crowdfunding and Intellectual Property 1012014 Crowdfunding and Intellectual Property 101
2014 Crowdfunding and Intellectual Property 101
 
Learning ObjectivesAfter studying this chapter, you should be ab.docx
Learning ObjectivesAfter studying this chapter, you should be ab.docxLearning ObjectivesAfter studying this chapter, you should be ab.docx
Learning ObjectivesAfter studying this chapter, you should be ab.docx
 
Background TLG has explained to the GC owners that it is vital to u
Background TLG has explained to the GC owners that it is vital to uBackground TLG has explained to the GC owners that it is vital to u
Background TLG has explained to the GC owners that it is vital to u
 
ODI Queensland - Open Data Essentials - Law and Licensing
ODI Queensland - Open Data Essentials - Law and LicensingODI Queensland - Open Data Essentials - Law and Licensing
ODI Queensland - Open Data Essentials - Law and Licensing
 
10 Criminology in the FutureCriminology in the FutureKristop.docx
10 Criminology in the FutureCriminology in the FutureKristop.docx10 Criminology in the FutureCriminology in the FutureKristop.docx
10 Criminology in the FutureCriminology in the FutureKristop.docx
 
Reporter's Recording Guide
Reporter's Recording GuideReporter's Recording Guide
Reporter's Recording Guide
 
Reporter's Recording Guide: A state-by-state guide to taping phone calls and ...
Reporter's Recording Guide: A state-by-state guide to taping phone calls and ...Reporter's Recording Guide: A state-by-state guide to taping phone calls and ...
Reporter's Recording Guide: A state-by-state guide to taping phone calls and ...
 
Privacy and Protection of Personal Information law seminar
Privacy and Protection of Personal Information law seminarPrivacy and Protection of Personal Information law seminar
Privacy and Protection of Personal Information law seminar
 
Catherine Raffaele - IP Event
Catherine Raffaele - IP EventCatherine Raffaele - IP Event
Catherine Raffaele - IP Event
 
Ethics and legislation in the it industry
Ethics and legislation in the it industryEthics and legislation in the it industry
Ethics and legislation in the it industry
 

More from Christian Watson

6 Steps to Install Analog Security Cameras Like a Pro
6 Steps to Install Analog Security Cameras Like a Pro6 Steps to Install Analog Security Cameras Like a Pro
6 Steps to Install Analog Security Cameras Like a Pro
Christian Watson
 
DVR Networking: How to Connect Your DVR to the LAN
DVR Networking: How to Connect Your DVR to the LANDVR Networking: How to Connect Your DVR to the LAN
DVR Networking: How to Connect Your DVR to the LAN
Christian Watson
 
Dallas PD Nabs Car Thieves with Covert Vehicle Monitoring Program
Dallas PD Nabs Car Thieves with Covert Vehicle Monitoring ProgramDallas PD Nabs Car Thieves with Covert Vehicle Monitoring Program
Dallas PD Nabs Car Thieves with Covert Vehicle Monitoring Program
Christian Watson
 
7-Eleven Catches Thieves and Reduces Merchandise Shrink in Stores
7-Eleven Catches Thieves and Reduces Merchandise Shrink in Stores7-Eleven Catches Thieves and Reduces Merchandise Shrink in Stores
7-Eleven Catches Thieves and Reduces Merchandise Shrink in Stores
Christian Watson
 
Audubon Starr Ranch NestCam Video Aids Bird Sanctuary Conservation
Audubon Starr Ranch NestCam Video Aids Bird Sanctuary ConservationAudubon Starr Ranch NestCam Video Aids Bird Sanctuary Conservation
Audubon Starr Ranch NestCam Video Aids Bird Sanctuary Conservation
Christian Watson
 
Be Prepared: Get the Real Facts on Crime
Be Prepared: Get the Real Facts on CrimeBe Prepared: Get the Real Facts on Crime
Be Prepared: Get the Real Facts on Crime
Christian Watson
 
Top 7 benefits of an led monitor
Top 7 benefits of an led monitorTop 7 benefits of an led monitor
Top 7 benefits of an led monitor
Christian Watson
 
Alvin ISD Employs IP Cameras to Monitor Activities at 13 Schools
Alvin ISD Employs IP Cameras to Monitor Activities at 13 SchoolsAlvin ISD Employs IP Cameras to Monitor Activities at 13 Schools
Alvin ISD Employs IP Cameras to Monitor Activities at 13 Schools
Christian Watson
 
6 Steps To protect your baby’s IP camera from HACKERS
6 Steps To protect your baby’s IP camera from HACKERS6 Steps To protect your baby’s IP camera from HACKERS
6 Steps To protect your baby’s IP camera from HACKERS
Christian Watson
 
White Paper: Border Security: The Other Story
White Paper: Border Security: The Other StoryWhite Paper: Border Security: The Other Story
White Paper: Border Security: The Other Story
Christian Watson
 
Birds are Video Stars at Audubon’s Starr Ranch
Birds are Video Stars at Audubon’s Starr RanchBirds are Video Stars at Audubon’s Starr Ranch
Birds are Video Stars at Audubon’s Starr Ranch
Christian Watson
 
For Dallas Police, Video Evidence Was The Key to Convicting Car Thieves
For Dallas Police, Video Evidence Was The Key to Convicting Car ThievesFor Dallas Police, Video Evidence Was The Key to Convicting Car Thieves
For Dallas Police, Video Evidence Was The Key to Convicting Car ThievesChristian Watson
 

More from Christian Watson (13)

6 Steps to Install Analog Security Cameras Like a Pro
6 Steps to Install Analog Security Cameras Like a Pro6 Steps to Install Analog Security Cameras Like a Pro
6 Steps to Install Analog Security Cameras Like a Pro
 
DVR Networking: How to Connect Your DVR to the LAN
DVR Networking: How to Connect Your DVR to the LANDVR Networking: How to Connect Your DVR to the LAN
DVR Networking: How to Connect Your DVR to the LAN
 
Dallas PD Nabs Car Thieves with Covert Vehicle Monitoring Program
Dallas PD Nabs Car Thieves with Covert Vehicle Monitoring ProgramDallas PD Nabs Car Thieves with Covert Vehicle Monitoring Program
Dallas PD Nabs Car Thieves with Covert Vehicle Monitoring Program
 
7-Eleven Catches Thieves and Reduces Merchandise Shrink in Stores
7-Eleven Catches Thieves and Reduces Merchandise Shrink in Stores7-Eleven Catches Thieves and Reduces Merchandise Shrink in Stores
7-Eleven Catches Thieves and Reduces Merchandise Shrink in Stores
 
Sanluisobispo casestudy
Sanluisobispo casestudySanluisobispo casestudy
Sanluisobispo casestudy
 
Audubon Starr Ranch NestCam Video Aids Bird Sanctuary Conservation
Audubon Starr Ranch NestCam Video Aids Bird Sanctuary ConservationAudubon Starr Ranch NestCam Video Aids Bird Sanctuary Conservation
Audubon Starr Ranch NestCam Video Aids Bird Sanctuary Conservation
 
Be Prepared: Get the Real Facts on Crime
Be Prepared: Get the Real Facts on CrimeBe Prepared: Get the Real Facts on Crime
Be Prepared: Get the Real Facts on Crime
 
Top 7 benefits of an led monitor
Top 7 benefits of an led monitorTop 7 benefits of an led monitor
Top 7 benefits of an led monitor
 
Alvin ISD Employs IP Cameras to Monitor Activities at 13 Schools
Alvin ISD Employs IP Cameras to Monitor Activities at 13 SchoolsAlvin ISD Employs IP Cameras to Monitor Activities at 13 Schools
Alvin ISD Employs IP Cameras to Monitor Activities at 13 Schools
 
6 Steps To protect your baby’s IP camera from HACKERS
6 Steps To protect your baby’s IP camera from HACKERS6 Steps To protect your baby’s IP camera from HACKERS
6 Steps To protect your baby’s IP camera from HACKERS
 
White Paper: Border Security: The Other Story
White Paper: Border Security: The Other StoryWhite Paper: Border Security: The Other Story
White Paper: Border Security: The Other Story
 
Birds are Video Stars at Audubon’s Starr Ranch
Birds are Video Stars at Audubon’s Starr RanchBirds are Video Stars at Audubon’s Starr Ranch
Birds are Video Stars at Audubon’s Starr Ranch
 
For Dallas Police, Video Evidence Was The Key to Convicting Car Thieves
For Dallas Police, Video Evidence Was The Key to Convicting Car ThievesFor Dallas Police, Video Evidence Was The Key to Convicting Car Thieves
For Dallas Police, Video Evidence Was The Key to Convicting Car Thieves
 

Recently uploaded

GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 

Recently uploaded (20)

GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 

Covert Audio and the Law

  • 1. Covert Audio and the Law At Supercircuits, we work closely with law enforcement agencies to provide a wide array of covert surveillance technologies including covert audio gear. Our commercial sales division routinely receives calls with questions about covert video surveillance and covert audio surveillance from both businesses and end-users. The biggest question regarding covert audio is if it’s legal. Covert audio is legal, but you need to understand exactly when and how to legally use it— or your evidence will not be admissible in court and you could be in serious trouble. Below are common questions we hear with explanations as to what can and can’t be done with covert audio and video surveillance. 1. What is covert audio equipment? In general, the law defines covert audio devices as anything that is intentionally designed to covertly intercept oral communication. Most of these laws do not cover the components that make up covert devices such as microphones, batteries, transmitters or recorders. Instead, most laws restrict these devices once they are constructed. To illustrate the threshold of most laws, a common camcorder with a built-in microphone by itself is completely legal. However, when the camcorder is concealed in something that is designed for covert use, the person using the camcorder as a covert device to capture video and audio from a hidden location would be in violation of federal law and many state laws dealing with manufacturing and possession of covert and audio devices. 2. Why do the laws regulate audio and not video—it seems backwards? To most people, video seems like the superior technology. With this reasoning, many wonder why the laws are so strict concerning covert audio and in many cases silent when it comes to covert video.
  • 2. It is important to note that when most of the laws around covert devices were written video technology did not exist as it does today and audio was the dominate means of covertly obtaining information. Additionally, audio technology has a higher propensity to do harm by covertly recording conversations. Everyone, regardless of their walk in life, has a reasonable expectation to privacy in their daily lives like when they see the doctor or parent a child. If those private conversations fell into the wrong hands it would devastate relationships, break down trust and even in some cases, ruin a person’s life. Business managers are another example. They need to have private conversations with other managers or employees about things like the health of the business or employment. However if these conversations were made public, business security or even careers may be at stake. 3. Are there any laws covering surveillance video? It wasn’t until the 1990s that legislation began to appear about the legal use of video surveillance equipment. States were prompted to pass legislation after law enforcement agencies uncovered horrific stories of voyeurism but had no law in which to press charges. These laws can be found under statutes covering criminal trespass, disorderly conduct, invasion of privacy, and revised peeping tom laws. The spirit of the laws states that video cannot be used in areas where people have a reasonable expectation of privacy such as homes, bathrooms or locker rooms. In 2004 the federal government followed state legislation and enacted the Video Voyeurism Act of 2004 covering the use of covert video. (Voyeurism Statutes 2009 PDF) We’re glad to see the establishment of these laws and, on rare occasion, we have assisted agencies in the prosecution of the inappropriate use of video equipment. It is worth pointing out that these cases are rare. The general trend for the use of video equipment is for good people to use video to catch bad people doing bad things. Just ask any criminal, they hate video cameras.
  • 3. 4. My state allows covert audio, why does the federal law matter? Federal law, known as the USC (United States Code), supersedes state law when it comes to covert audio. Many well-intentioned individuals believe that because their particular state law does not address or even allow the use of covert audio that it is perfectly legal for them to use it. Unfortunately that belief is faulty and criminally dangerous. It is true that federal and state laws conflict from time to time such as recent state legislation allowing medicinal use of cannabis. In all of those states, federal law enforcement agents are still enforcing USC drug laws on cannabis regardless of the state laws. The use of covert audio is no different—federal law trumps state law. 5. Both state and federal law seem to allow one-party consent for audio recording. Does this mean I can covertly record conversations? Clauses about recording with one-party consent are mostly applied to recording telephone conversations where at least one person of the conversation is the rightful owner or controller of the telephone in use. These clauses are also designed to restrict the highly illegal practice of wiretapping where no party has given consent to the recording or interception of the conversation. Under federal law it is illegal for a person to even possess covert audio equipment – making the question of one-party consent irrelevant. 6. What are the specific laws about covert audio? USC Title 18 Section 2512 (18 USC § 2512) is the federal law that regulates the manufacturing, possession, sales and solicitation of covert audio surveillance equipment. State laws vary from state to state, but most are similar to USC Title 18 Section 2512. Some even further outline the legal and illegal use of covert audio equipment. 7. I am a private investigator; can I buy and use covert audio? Unfortunately, no – private investigators provide a much needed service to our nation, but the federal law provides no special provision for private investigations. However, if a private investigator is fulfilling a government contract that requires the use of covert audio, there may be some legal allowance for the investigator to use this gear.
  • 4. This potential allowance would also apply to security, military and training contractors. If this allowance is applicable, the purchase would most likely need to be done through the government agency issuing the contract. 8. Is a tiny microphone considered illegal? No. Microphones themselves regardless of their size are completely legal and easily obtained from a variety of legitimate sources. However, as with many things that are legally benign, how they’re used can make them highly illegal. 9. I’m from another country that has no laws regarding audio, can I buy covert audio? It’s possible that you may be able to purchase covert audio in the US and export it to another country. However, US export laws require companies exporting such devices to obtain prior authorization and licensing from federal controlling bodies. United States export laws also dictate that the export of covert audio can only occur to certain countries, organizations and individuals. All parties involved in export of covert audio equipment are criminally liable and because of this, many companies choose not to export any surveillance equipment. 10. If I am a full time police officer; can I purchase covert audio equipment for personal use? Federal law does not allow for the personal purchase, use or possession of covert audio equipment. Any use or purchase must be made in pursuit of official duties as a government agent. However, individuals and non-government organizations donating to government agencies can fund, or in other words pay for, the purchase but the use and possession must be done by the government agency. 11. I provide goods and services to government agencies; can I buy covert audio for resale purposes? Yes. However, prior to any solicitation or purchase a verified contract from a government agency must be received that specifies the need for covert audio equipment. Most providers will require the delivery of such goods to be made directly to the government agency.
  • 5. 12. Can I legally use audio equipment at all? Absolutely! There are hundreds of applications of audio equipment that are completely legitimate and legal. In the realm of security, audio has played a pivotal role in solving cases, providing protection against lawsuits and more. Crooks in the commission of crimes often reveal names and discuss key element or plans to cover their tracks, should they be discovered. When using audio for surveillance purposes there are a couple of important things to keep in mind. First, placement of audio equipment should be done in such a way that no one could reasonably consider it hidden or covert. Secondly, state laws should be studied carefully as most will have specific parameters for how audio is used in the security of a business or home. Generally, states require the property to include conspicuous signs that make others aware that audio surveillance equipment is in use. If you have questions about covert audio surveillance, we encourage you to seek legal counsel prior to the use of audio surveillance. They can provide you with specific information of how the law applies to your specific needs and provide you with a legal avenue for your application. http://www.supercircuits.com/resources/blog/covert-audio-and-the-law
  • 6. 12. Can I legally use audio equipment at all? Absolutely! There are hundreds of applications of audio equipment that are completely legitimate and legal. In the realm of security, audio has played a pivotal role in solving cases, providing protection against lawsuits and more. Crooks in the commission of crimes often reveal names and discuss key element or plans to cover their tracks, should they be discovered. When using audio for surveillance purposes there are a couple of important things to keep in mind. First, placement of audio equipment should be done in such a way that no one could reasonably consider it hidden or covert. Secondly, state laws should be studied carefully as most will have specific parameters for how audio is used in the security of a business or home. Generally, states require the property to include conspicuous signs that make others aware that audio surveillance equipment is in use. If you have questions about covert audio surveillance, we encourage you to seek legal counsel prior to the use of audio surveillance. They can provide you with specific information of how the law applies to your specific needs and provide you with a legal avenue for your application. http://www.supercircuits.com/resources/blog/covert-audio-and-the-law