intercept call

intercept call

[¦in·tər·sept ‚ȯl]
(communications)
In telephone practice, routing of a call placed to a disconnected or nonexisting telephone number, to an operator, or to a machine answering device, or to a tone.
References in periodicals archive ?
"Later another RTI query was filed on November 21, 2013, which sought the details of agencies authorised to intercept call and emails.
"When we have an ALS intercept call, the regional paramedic on duty intercepts with us and/or we still have the right to do intercepts with whatever community we need to,'' Deputy Chief Holway said.
The board is scheduled to meet tomorrow to discuss a proposal by a high level committee, which suggested that the regulator should seek powers from the government to intercept calls and electronic communications of those suspected of serious economic offences like insider trading.
But as a panel of cybersecurity experts indicated in a congressional hearing Wednesday, there's no easy way to detect the machines that malicious hackers and foreign snoops can use to secretly intercept calls and texts.
The high court bench in its order observed that the government may authorise any person or persons to intercept calls and messages or to trace calls through any telecommunication system in the context of national security or if there is an apprehension of the commission of any offence.
Justice Athar observed: 'The government to authorise any person or persons to intercept calls and messages or to trace calls through any telecommunication system in the context of national security or in an apprehension of the commission of any offence.
He is best known for his hack of Google Maps in early 2014 that proved to be able to intercept calls to the United States Secret Service and FBI.
British spy planes based in Cyprus and elsewhere in the Middle East are involved in trying to intercept calls between jihadists, along with a UK sub in the Med and GCHQ's listening startion in Cyprus.
These include traditional mobile malware that intercept calls and messages, mobile ransomware that lock user devices in exchange for payment, and mobile banking malware that steal banking credentials.
Investigations probing the Tripoli bombings led security forces to intercept calls between Islamist inmates in Block B and the two suicide bombers who carried out the twin attack, Machnouk said.
Nicknamed "stingrays," the devices are decoy cell towers that capture locations and identities of mobile phone users and can intercept calls and texts, Value Walk reported.