Origins of Telecom – Clandestine Communications

For example, burglars wouldn’t want to make unwanted noises that would draw attention to themselves, but they might need to signal their partners in crime.

Communications Technologies

Below are a few of the early communications technologies used on both sides of the law.

Necessity, they say, is the mother of invention. In the case of organized crime, the need to stay under the radar of authorities required finesse and innovation.

Meanwhile, crime fighters have an ever-present need to catch bad guys and provide admissible evidence of their wrongdoing.

Secret Signals

Secret signals, such as an elaborate knock on the door or animal calls, have long been used by criminals to communicate. The 19th century “father of criminology,” Hanns Gross, described “contact calls,” which were almost always animal imitations, as a means of communication between criminals during the commission of a crime. For example, burglars wouldn’t want to make unwanted noises that would draw attention to themselves, but they might need to signal their partners in crime. By using animal calls, like an owl’s hoot, they could do just that and no one else would think twice about it.

The Black Box – Untraceable Phone Calls

A previously respectable inventor, Walter Shaw, invented a device for the mafia that was called the “black box.” This device allowed callers to make free long distance calls that were untraceable. Not only could criminals discuss their nefarious deals without incurring toll charges, authorities would never be able to trace those calls or prove a phone conversation took place.

The Dictograph

The Dictograph, which arrived in the early 1900s and ushered in the wiretapping era, was a device used to pick up sounds in one room and transmit them to a device in another room. Live stenographers were often stationed in the second room to listen in and transcribe conversations. The Dictograph could be configured two ways: as an intercom in full view or stripped down and hidden to secretly monitor conversations.

Companies like Standard Oil and Westinghouse soon began using the Dictograph as an eavesdropping device as did the US Secret Service and other government agencies. It was later used in legislative offices, recording bribes and other misdeeds. The Dictograph became an important tool among police, private detectives, and lawyers. Because of the potential for being used for evil, the device was not sold to the general public and was available only via a lease or rent, with up to 800 devices reportedly available for rent in Chicago alone. Criminals likely used the Dictograph as well, with blackmail being a logical use case using communications technologies.

Bug Detectors

Whether concerned about law enforcement, political enemies, criminals, or other nations listening in, the wiretapping era created a new need:detection of listening devices. One such device, a “covert transmitter detector,” was patented in the 1960s and was able to detect radio signals emitted from bugs without the need to tune into each specific frequency.

All kinds of gadgets exist today to listen in to or escape detection. Law enforcement officers use “stingray” devices to trick cell phones into connecting to bogus cell phone towers so that they can determine the cell phone’s location and intercept incoming and outgoing communications. Those seeking privacy, including business users, activists, journalists, whistle blowers, and criminals alike have the Tor network, which completely anonymitizes their online communications. Though technology may evolve, it’s an age-old story where tools can be used for good or for evil including communications technologies.— — — — — — — — — — — — — — — — — — — — — — — — — — —

“Clandestine COmmunications.” n.d. http://www.markmirabello.com/uploads/3/9/5/9/395973/clandestinecommunications.pdf

“Dictograph | Definition of Dictograph by Merriam-Webster.” n.d. Accessed November 10, 2017. https://www.merriam-webster.com/dictionary/Dictograph

“HOots, Crows, and Whistles: Criminals Using Animal Calls as Secret Signals.” n.d. Accessed November 10, 2017. https://www.annmarieackermann.com/animal-calls-as-secret-signals

“Patent US2193102 – Dictograph – Google Patents.” n.d. Accessed November 10, 2017. https://www.google.com/patents/US2193102

“Patent US3473127 – Covert Transmitter Detector – Google Patents.” n.d. Accessed November 10, 2017a. https://www.google.com/patents/US3473127

———. “Patent US3473127 – Covert Transmitter Detector – Google Patents.” n.d. Accessed November 10, 2017b. https://www.google.com/patents/US3473127

“Tor: The Good. The Bad. The Anonymous.” n.d. Accessed November 10, 2017. https://www.serviceobjects.com/resources/articles-whitepapers/tor-network-whitepaper

“Turns Out Police Stingray Spy Tools Can Indeed Record Calls | WIRED.” n.d. Accessed November 10, 2017. https://www.wired.com/2015/10/stingray-government-spy-tools-can-record-calls-new-documents-confirm/

“Wiretapping and Electronic Surveillance in America, 1862-1920 – Kerry Segrave – Google Books.” n.d. Accessed November 10, 2017. https://books.google.com/books?id=USZiBAAAQBAJ&pg=PA165&lpg=PA165&dq=wiretapping+detector+invention&source=bl&ots=QBwcvZLVrz&sig=1wnvwRI70ph3vm59R9GoHEABmXE&hl=en&sa=X&ved=0ahUKEwjRhLmyiLXXAhXE0FQKHaCsBfUQ6AEIbTAM#v=onepage&q=wiretapping%20detector%20invention&f=false