Back to search
Privacy & Civil LibertiesElectronic Surveillance

Wiretap Act (Title III) — Federal Wiretapping & Electronic Surveillance Law

11 min read·Updated May 12, 2026

Wiretap Act (Title III) — Federal Wiretapping & Electronic Surveillance Law

The federal Wiretap Act (18 U.S.C. §§ 2510–2522), originally enacted as Title III of the Omnibus Crime Control and Safe Streets Act of 1968, is the primary federal law governing real-time interception of the content of communications — phone calls, emails, text messages, and other electronic communications. The Wiretap Act establishes an extraordinarily demanding "super warrant" requirement: the government must demonstrate probable cause that the target is committing one of a specified list of serious crimes, that normal investigative methods have been tried and failed (or are unlikely to succeed or are too dangerous), and that the wiretap will intercept evidence of the crime. Authorization must come from a senior DOJ official (not just any prosecutor) and be approved by a federal judge. Wiretap orders are limited to 30 days and must minimize the interception of innocent conversations. The Act's privacy protections are among the strongest in federal law — far exceeding those of the Pen Register Act (metadata only) and the Stored Communications Act (stored records) — reflecting the deep concern about government eavesdropping that motivated Congress after revelations of warrantless wiretapping during the civil rights era and Vietnam War protests. Violators face up to 5 years imprisonment, and individuals whose communications are illegally intercepted may sue for civil damages. In 2024, federal and state courts authorized approximately 2,800 wiretap orders, overwhelmingly targeting drug trafficking and narcotics offenses. See also the Electronic Communications Privacy Act for the umbrella statute that includes Title III.

Current Law (2026)

ParameterValue
Governing law18 U.S.C. §§ 2510–2522 (Wiretap Act / Title III, 1968; amended 1986, 2001)
StandardProbable cause + exhaustion of alternatives + specificity + DOJ authorization + judicial approval
Duration30 days per order (renewable with fresh showing of probable cause)
Authorized crimesSpecified list of serious federal offenses (18 USC § 2516) — drug trafficking, terrorism, RICO, murder, kidnapping, bribery, fraud, etc.
DOJ authorizationAG, DAG, AAG, or designated officials must personally approve application
MinimizationMust minimize interception of communications not relevant to the investigation
Exclusionary ruleIllegally intercepted communications are inadmissible as evidence (§ 2515)
Criminal penaltyUp to 5 years imprisonment for illegal interception
Civil actionActual damages (minimum $10,000), punitive damages, and attorney fees (§ 2520)
Annual orders~2,800 federal and state wiretap orders per year (2024)
  • 18 U.S.C. § 2511 — Prohibition on interception (makes it a federal crime to intentionally intercept, disclose, or use any wire, oral, or electronic communication; exceptions for law enforcement with court orders, consent, and provider monitoring)
  • 18 U.S.C. § 2515 — Exclusionary rule (no intercepted communication or evidence derived from it may be admitted in any court, grand jury, administrative, or legislative proceeding if obtained in violation of the Act)
  • 18 U.S.C. § 2516 — Authorization for interception (lists the senior DOJ officials who must authorize applications and the specific federal offenses for which wiretaps may be sought)
  • 18 U.S.C. § 2518 — Procedure for interception (the "super warrant" requirements: written application under oath, probable cause, necessity, particularity, minimization, 30-day limit, sealed records, and inventory notice to targets)
  • 18 U.S.C. § 2520 — Civil damages (any person whose communications are illegally intercepted may sue for actual damages of not less than $10,000, or $100/day for each day of violation, plus punitive damages and attorney fees)

How It Works

A wiretap order is the most demanding form of legal process in federal law — far more rigorous than an ordinary search warrant. Under 18 U.S.C. § 2518, the government must demonstrate: probable cause that the target is committing, has committed, or is about to commit a specifically enumerated federal felony; necessity (normal investigative techniques have been tried and failed, are unlikely to succeed, or are too dangerous); particularity (the application must specify the persons, facilities, and communications to be intercepted); and minimization (procedures to prevent interception of innocent conversations must already be in place). The application must be personally authorized by the AG, DAG, or a designated senior DOJ official — not just any AUSA — and then approved by a federal judge for a maximum of 30 days per order, renewable only with a fresh probable cause showing. Wiretaps are available only for the specified serious crimes listed in § 2516: drug trafficking, terrorism, espionage, RICO, murder, kidnapping, bribery, counterfeiting, fraud (wire, bank, mail), money laundering, and firearms trafficking — not any criminal investigation. In practice, approximately 75–80% of all wiretap orders target narcotics offenses.

During an authorized wiretap, agents must minimize interception of communications not related to the investigation — if a call turns to personal matters, agents must stop monitoring — and the authorizing judge reviews minimization compliance, with failure potentially leading to suppression of evidence. The Wiretap Act's exclusionary rule (§ 2515) is broader than the Fourth Amendment's judge-made version: evidence obtained through an illegal wiretap is inadmissible in any proceeding — federal, state, grand jury, administrative, or legislative. Individuals whose communications are illegally intercepted may sue for civil damages under § 2520 (minimum $10,000 per violation or $100 per day, whichever is greater, plus punitive damages and attorney fees). The federal Act sets a floor — states may enact stricter wiretap protections but not weaker ones. California, Illinois, and Massachusetts require all parties to a conversation to consent to recording, stricter than the federal one-party consent standard that applies where only one participant agrees to be recorded.

How It Affects You

If you believe you may be the target of a federal wiretap: If the government seeks to intercept your communications, they must meet the "super warrant" standard — probable cause of a specified serious crime, exhaustion of other investigative methods, senior DOJ authorization, and judicial approval. The bar is genuinely high: of the ~2,800 annual wiretap orders, the overwhelming majority target drug trafficking organizations. The government is not tapping your phone because of a minor dispute.

After the wiretap concludes (or if it's terminated early), the government is required by § 2518(8)(d) to serve you with an inventory notice within 90 days of the order's termination — informing you that your communications were intercepted, the date and duration of the order, whether communications were actually intercepted, and whether communications will be used in a proceeding. This means you will eventually learn you were wiretapped. Your attorney can then file a motion to suppress under § 2515, challenging whether the order was lawfully obtained. Grounds for suppression include: (1) the application failed to establish probable cause; (2) the necessity showing was inadequate (the government didn't actually try conventional methods); (3) the order's descriptions were insufficiently particular; (4) minimization procedures were not followed during the intercept; or (5) the senior DOJ authorization was procedurally defective. Suppression under the Wiretap Act's exclusionary rule is complete — the evidence is inadmissible in any proceeding, not just the criminal case.

If you believe your communications have been illegally intercepted — by the government without a valid order, or by a private party — you have a civil cause of action under § 2520 for actual damages (minimum $10,000 per violation, or $100 per day of violation, whichever is greater), plus punitive damages and attorney fees. The 2-year statute of limitations runs from discovery of the violation. If you're an activist, journalist, or political figure who suspects unlawful government surveillance, the ACLU's Speech, Privacy, and Technology Project (aclu.org/issues/privacy-technology) provides resources and has litigated illegal wiretapping cases.

If you're a private individual concerned about who can intercept your communications: The Wiretap Act's protections extend far beyond government surveillance. Any person who intentionally intercepts your electronic communications without authorization faces up to 5 years in federal prison and civil liability. This covers: a former spouse using spyware to monitor your phone (a common domestic abuse surveillance tool), a stalker intercepting your texts, an employer monitoring communications beyond what consent covers, or a business competitor intercepting your communications.

The most important distinction for everyday purposes: one-party consent vs. all-party consent states. Under the federal Wiretap Act, one party to a conversation may consent to recording it — meaning if you're participating in a call, you can record it without telling the other party, and that recording is legally obtained. But approximately 12 states (California, Colorado, Connecticut, Florida, Illinois, Maryland, Massachusetts, Michigan, Montana, Nevada, New Hampshire, Oregon, Pennsylvania, and Washington) require all parties to consent before a call or conversation may be recorded. Recording a phone call in California without disclosing you're recording — even if you're a participant — violates California Penal Code § 632. If the call is purely in a one-party-consent state, only one party's consent is required. When parties are in different states, the answer is unsettled — use all-party consent rules for safety.

For recording in person: the Wiretap Act's "oral communication" protections cover conversations where participants have a reasonable expectation of privacy. Recording a private conversation in someone's home without consent likely violates the Act; recording a loud argument in a public street likely does not.

If you're an employer setting up employee communications monitoring: The Wiretap Act's exceptions for employer monitoring are narrow, and getting this wrong exposes you to criminal prosecution and civil liability. The legally defensible approaches: (1) Consent — require employees to sign an acknowledgment that communications on company systems may be monitored. Courts have generally upheld monitoring under a "system banner" (a notice that appears when users log in stating communications may be monitored), which courts treat as constructive consent. Make the notice clear and have employees affirmatively acknowledge it. (2) Provider exception — the Act exempts the "provider of a wire or electronic communications service" from the prohibition on monitoring communications transmitted over that service. Courts have interpreted this to cover employers who provide the phone or email system, but the exception is narrow and doesn't permit unlimited content surveillance. (3) Ordinary course of business — monitoring for legitimate business purposes (quality control, security, regulatory compliance) is permitted if employees are on notice. This exception does not cover monitoring of personal calls — tell employees to use their personal devices for personal calls if monitoring is in place.

What's NOT protected: monitoring of personal devices belonging to employees, monitoring of personal accounts (personal Gmail, personal iCloud) even if accessed from company devices, and monitoring without any consent or notice in all-party consent states. If you install software on a company device that intercepts employee personal communications, you face federal Wiretap Act liability even if the device is company-owned. Get legal review of your monitoring policies before deploying them.

If you work in law enforcement investigating serious crimes: Wiretap orders are the most powerful investigative tool in federal law but come at significant cost — both in the procedural requirements to obtain one and in the resources to execute it. A typical federal wiretap costs $100,000–$500,000 or more once you factor in technical setup (working with the carrier's CALEA system), monitoring agents working around the clock in shifts, translators (most drug trafficking wire orders require Spanish or another language), minimization review, and the application process itself.

The necessity showing is the most contested element in wiretap applications. Courts scrutinize whether the government genuinely exhausted conventional methods or is simply preferring wiretap to other techniques. Document your investigative efforts: pen registers and toll records reviewed, informants developed and their limitations, physical surveillance conducted, trash covers executed, grand jury subpoenas served. The more robust your "necessity" documentation, the more defensible the wiretap application. Suppression motions on necessity grounds are common — and losing a suppression motion on a major drug trafficking case because of a weak necessity showing is a serious outcome.

After the order expires, the minimization log and the sealing requirements (§ 2518(8)(a) — recordings must be sealed immediately and retained in secure custody) must be strictly followed. Courts suppress evidence when sealing requirements are not met, even if the underlying interception was lawful.

State Variations

The Wiretap Act sets a federal floor; states may be stricter:

  • All-party consent states (CA, FL, IL, MA, MD, MT, NH, PA, WA, and others) require all parties to consent to recording — the federal Act requires only one party
  • One-party consent states (most states) follow the federal standard — one party's consent is sufficient
  • State wiretap statutes may authorize state judges to issue wiretap orders for state crimes
  • State penalties for illegal wiretapping vary — some states impose felony penalties stricter than federal law
  • State courts may provide broader suppression remedies than the federal exclusionary rule

Implementing Regulations

  • The Wiretap Act (18 U.S.C. §§ 2510–2522) is primarily self-executing — it establishes comprehensive procedural requirements for government interception of wire, oral, and electronic communications through court orders, with DOJ internal authorization requirements built into the statute itself
  • 47 CFR Part 1, Subpart Z — FCC CALEA (Communications Assistance for Law Enforcement Act) regulations requiring telecommunications carriers and broadband providers to design and maintain their systems to support lawful wiretap capabilities, including technical standards for intercept delivery and network architecture requirements
  • 28 CFR Part 23 — DOJ criminal intelligence systems operating policies governing information sharing standards that intersect with wiretap-derived intelligence, including retention, access, and dissemination rules for intelligence gathered through electronic surveillance

Pending Legislation

No standalone Wiretap Act reform bills have been introduced in the 119th Congress. Electronic surveillance provisions appear in broader privacy legislation — see Electronic Surveillance (ECPA).

Recent Developments

The Wiretap Act's framework has been strained by modern communication technologies — encrypted messaging (Signal, WhatsApp), VoIP calls, and communications that transit multiple providers across jurisdictions. The "going dark" debate between law enforcement (which argues encryption blocks lawful wiretaps) and privacy advocates (who argue strong encryption is essential) remains unresolved. The number of authorized wiretap orders has remained relatively stable at 2,500–3,000 per year, with drug offenses dominating. The CLOUD Act (2018) addressed international aspects, clarifying that U.S. providers must comply with wiretap orders for communications stored abroad. Courts continue to address novel questions about the Wiretap Act's application to modern technologies — including location tracking, vehicle telematics, and internet-of-things devices.

  • Salt Typhoon telecom hack and Wiretap Act infrastructure (2024-2025): Chinese state hackers (Salt Typhoon) breached U.S. telecommunications networks — including AT&T, Verizon, and Lumen — and accessed the lawful intercept systems that phone companies are required to maintain under CALEA (the Communications Assistance for Law Enforcement Act, 1994). This meant attackers potentially accessed the infrastructure through which the government conducts wiretaps. The breach prompted emergency security reviews of CALEA compliance systems. Some cybersecurity experts argued the Salt Typhoon hack demonstrated the inherent insecurity of building in wiretap backdoors — a key privacy advocacy argument in the encryption debate.
  • Signal and government official communications (2025): The inadvertent inclusion of a journalist in a Signal chat where Trump administration officials discussed military strikes against Houthi targets exposed how senior officials use end-to-end encrypted commercial apps for sensitive communications. The CISA, FBI, and NSA have recommended Signal for secure communications in response to the Salt Typhoon telecom breach — creating the tension of government officials being told to use encrypted commercial apps that are outside the CALEA intercept framework. The episode renewed debate about whether encrypted commercial apps should be subject to CALEA-style intercept access.
  • Encryption and the "going dark" debate (2025-2026): FBI Director Kash Patel has revived the "going dark" argument, calling for legislation requiring encryption backdoors for lawful access. The Apple-FBI encryption dispute from 2016 (SDNY order requiring Apple to unlock an iPhone) was never resolved by the Supreme Court. A legislative mandate for encryption backdoors would face strong tech industry opposition; security experts argue that backdoors fundamentally undermine encryption security and could be exploited by foreign adversaries (as Salt Typhoon demonstrated with CALEA).
  • Wiretap Act and foreign surveillance overlap: The Wiretap Act governs domestic interception; FISA governs foreign intelligence surveillance. When foreign targets communicate with U.S. persons, the intercept falls into a gray area. Section 702 of FISA authorizes collection of foreign intelligence communications even when they incidentally include U.S. person communications. The FBI's practice of querying Section 702 databases for U.S. person information without a warrant has been a persistent Fourth Amendment and Wiretap Act controversy; reform proposals requiring warrants for U.S. person queries have stalled.

At My Address

See how Wiretap Act (Title III) — Federal Wiretapping & Electronic Surveillance Law plays out in your area

Pull up the federal-data report for any U.S. ZIP — federal spending, environmental risk, hospitals, schools, your reps, all on one page.

Enter your address