{"id":2140,"date":"2006-01-27T12:07:55","date_gmt":"2006-01-27T12:07:55","guid":{"rendered":"http:\/\/zmetro.com\/?p=2140"},"modified":"2006-01-27T12:07:55","modified_gmt":"2006-01-27T12:07:55","slug":"state_electroni","status":"publish","type":"post","link":"http:\/\/www.zmetro.com\/?p=2140","title":{"rendered":"State Electronic Surveillance Laws"},"content":{"rendered":"<p><a href=\"http:\/\/www.ncsl.org\/programs\/lis\/CIP\/surveillance.htm\">National Conference of State Legislatures<\/a>:<\/p>\n<blockquote><p><i>Electronic surveillance is also examined in a <a href=\"\/programs\/press\/2002\/issues\/surveillance.htm\">brief<\/a><br \/>\nthat is part of NCSL&#8217;s series, &#8220;<a href=\"\/programs\/press\/2002\/t-briefs.htm\">States<br \/>\nRespond to Terrorism<\/a>,&#8221; which surveys states&#8217; efforts to protect democracy<br \/>\nfrom future terrorist attacks.<\/p>\n<p>Electronic Surveillance involves the traditional laws on wiretapping&#8211;any<br \/>\ninterception of a telephone transmission by accessing the telephone signal<br \/>\nitself&#8211;and eavesdropping&#8211;listening in on conversations without the consent<br \/>\nof the parties.<\/p>\n<p>Following the tragedies of September 11, there is <a href=\"http:\/\/www.harrisinteractive.com\/harris_poll\/index.asp?PID=260\">growing<br \/>\nsupport<\/a> to give law enforcement agencies more power to tap into private<br \/>\ncommunications to thwart further acts of terrorism by monitoring private<br \/>\nelectronic communications. State and federal policymakers face the challenge<br \/>\nof balancing security needs via electronic surveillance against the potential<br \/>\nerosion of individual privacy.<\/i><\/p><\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>National Conference of State Legislatures: Electronic surveillance is also examined in a brief that is part of NCSL&#8217;s series, &#8220;States Respond to Terrorism,&#8221; which surveys states&#8217; efforts to protect democracy from future terrorist attacks. Electronic Surveillance involves the traditional laws on wiretapping&#8211;any interception of a telephone transmission by accessing the telephone signal itself&#8211;and eavesdropping&#8211;listening in [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[14,9],"tags":[],"_links":{"self":[{"href":"http:\/\/www.zmetro.com\/index.php?rest_route=\/wp\/v2\/posts\/2140"}],"collection":[{"href":"http:\/\/www.zmetro.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.zmetro.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.zmetro.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/www.zmetro.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2140"}],"version-history":[{"count":0,"href":"http:\/\/www.zmetro.com\/index.php?rest_route=\/wp\/v2\/posts\/2140\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.zmetro.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2140"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.zmetro.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2140"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.zmetro.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2140"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}