wiretapping

美 [ˈwaɪərtæpɪŋ]英 [ˈwaɪətæpɪŋ]
  • n.(用秘密连线方法)窃听电话
  • vt.(搭线)窃听;搭线窃听;窃听或偷录
  • wiretap的现在分词

派生词: wiretap v.;wiretap n.

wiretappingwiretapping

noun

U(用秘密连线方法)窃听电话
the act of secretly listening to other people's telephone conversations by attaching a device to the telephone line

wiretapping

频次

  • 1
    VERB 搭线窃听(电话)
    If someone wiretaps your telephone, they attach a special device to the line so that they can secretly listen to your conversations.

    The coach said his club had wiretapped the hotel room of a player during a road trip.

    教练说他的俱乐部曾经窃听了一名开车旅行的运动员所住宾馆房间的电话。

  • ...allegations of wiretapping.

    电话窃听的指控

  1. With his head hung low , Jacksonville 's so-called hackerazzi admits he hacked into the email accounts of celebrities . He faces up to 60 years in prison after pleading guilty to wiretapping and unauthorized access to a computer .

    杰克逊维尔这名所谓的“黑客狗仔”低着头承认他曾经入侵过名人的电邮帐号,并对窃听以及非法入侵电脑等罪行供认不讳。他将面临60年的监禁。

  2. He said wiretapping was a crime and those responsible must be held accountable .

    他表示,窃听属于犯罪行为,那些对此要负责的人必须被追究责任。

  3. But using wiretap is at price of infringing the citizens basic right .

    但监听措施是以侵犯公民基本权利为代价。

  4. The encryption application can prevent important or private information from interception or wiretap on the Internet .

    加密在网络上的作用就是防止有用或私有化信息在网络上被拦截和窃取。

  5. A Precaution of Wiretapping the Data IP Packets in a LAN

    局域网上IP数据包的窃听与防范

  6. The wiretap , the electronic eavesdroppers would have public approval .

    那时,电话窃听,电子窃听将会为社会所认可。

  7. Realization and Prevention of Network Wiretap in LAN

    局域网下网络窃听的实现与防范

  8. Federal wiretapping laws require traditional phone carriers to make their data accessible to law enforcement agencies .

    联邦窃听法要求传统手机运营商向执法部门提供其持有的数据。

  9. Suggestion of Legislative Rules on Wiretapping in China Private Wiretapping of the Criminal Litigation

    我国通讯监听诉讼规则之建构刑事诉讼中私人监听问题研究

  10. We also study the robust wiretap transmission problem for the case with a quality of service constraint at the legitimate receiver .

    我们还研究了目的接收者满足服务质量约束的鲁棒传输窃听信道问题。

  11. Moreover , military communication cables may be distinct targets of wiretap and attacks from the enemy states .

    另外军用通信光缆还有可能成为敌国窃听和攻击的目标。

  12. It is therefore impossible to wiretap , intercept or crack the information transmitted through it .

    因此,不可能对通过量子通讯传输的信息进行窃听、拦截和破解。

  13. Scientists say the quantum key technology , by harnessing quantum entanglement , can the possibility of wiretapping .

    科学家表示,利用了量子纠缠的量子秘钥能够避免窃听解密。

  14. The data of background noise has been set up for the system without wiretapping at temperature in the range of - 35 ~ 55 ℃ .

    记录了无窃听时系统在-35~55℃背景下的噪声数据。

  15. Bush Signs Expanded Wiretap Law U.S. President George Bush has signed legislation expanding the government 's surveillance powers .

    美国总统布什星期四签署了一项扩大政府监控权力的法案。

  16. The threshold of wiretapping detecting is defined by the bend radius of the fiber , the typical value is 8.5 mm .

    以光纤被弯曲的半径来定义窃听检测阈值,典型阈值是85mm。

  17. Sensenbrenner told European law makers today he shares their distaste for over the top wiretapping by the NSA .

    今天,森森布伦纳对欧洲议员表示,他同他们一样,也厌恶国安局的窃听行为。

  18. Mr Bush was eventually forced to ban " enhanced interrogation techniques " and put wiretapping on to a legal footing .

    布什最终被迫禁止“高强度的审讯技术”,并让窃听有法可依。

  19. By security analysis , the protocol can prevent from usual attacks such as wiretapping , playback , counterfeit and so on .

    经安全分析,协议能防止窃听攻击、重放攻击和假冒攻击等常见的各种攻击行为可能造成的安全威胁。

  20. As a result , the application of wiretap has to weight the benefits and values , follow a comparison principle and carry on law rules and regulations .

    因而,监听措施的适用必须进行利益衡量与价值选择。遵循比例原则。进行法律规制。

  21. For the one-way relay wiretap channel , the secrecy performance of relay network with different forward protocol , cooperative protocol and power allocation strategy is investigated .

    针对单向中继窃听信道场景,研究了不同中继转发协议方式、中继协作方式及功率分配策略下的安全性能。

  22. Christopher Chaney pleaded guilty to nine felony counts , including wiretapping and unauthorized access to a computer .

    克里斯多夫·钱尼承认犯有9项重罪,其中包括窃听和未经授权访问他人电脑。

  23. The result proves that there are limitations in the HTTP Digest authentication protocol , which will cause the camouflage attack and wiretapping attack .

    通过严格地逻辑推导,证明了HTTPDigest认证协议存在的不足,以及由此不足产生的伪装和窃听攻击方式。

  24. To verify and characterize the secrecy capability of multiplicative noise , we propose a random beamforming security scheme in MISO wiretap channel .

    为验证并定量刻画乘性噪声保障安全传输的能力,针对MISO窃听信道提出一种随机波束赋形安全机制。

  25. If new tales of government wiretapping and commercial data-gathering continue to make headlines , it seems unlikely security worries will ebb in the near future .

    如果政府窃听和收集商业数据的新消息持续占据头条,短期内公众对安全的担忧就不太可能消退。

  26. The so-called network recording box refers to a network through a remote computer to the provision of recording the location of the box and recording wiretapping functional network equipment .

    所谓网络录音盒是指一种可以通过网络向远程的计算机提供录音盒所在位置的监听以及录音功能的网络设备。

  27. Soon after taking office , Mitterrand formed an anti-terrorist squad that spent much of its time wiretapping political opponents and journalists who might identify them .

    密特朗执政后不久,就建立了反恐小组,小组的大部分时间用于窃听政敌和可能发现他们的记者。

  28. A telephone company cut off an FBI international wiretap after the agency failed to pay its bill on time , according to a US government audit released on Thursday .

    据上周四公布的一份美国政府审计报告,美国联邦调查局由于未及时缴纳电话费,其国际窃听线路被电信公司切断。

  29. Other advanced technical equipment , such as the advanced wiretapping , the radar that can penetrates the leaves and so on will also be installed on the UAV .

    其他一些更先进的技术装备,比如高级窃听装置、穿透树叶的雷达等也将被安装到无人机上。

  30. The WEP protocol is used as a means of data encryption for wireless transmission between two devices , in order to prevent the illegal user wiretapping or intruding wireless networks .

    WEP协议是对在两台设备间无线传输的数据进行加密的方式,用以防止非法用户窃听或侵入无线网络。