Knowledge (XXG)

Computer and network surveillance

Source đź“ť

2476: 717:
able to be called using a virtual assistant, the law enforcement would then be able to have access to all the information saved for the device. The device is connected to the home's internet, because of this law enforcement would be the exact location of the individual calling for law enforcement. While the virtual assistance devices are popular, many debates the lack of privacy. The devices are listening to every conversation the owner is having. Even if the owner is not talking to a virtual assistant, the device is still listening to the conversation in hopes that the owner will need assistance, as well as to gather data.
710:. They do so in order to protect the company's assets and to control public communications but most importantly, to make sure that their employees are actively working and being productive. This can emotionally affect people; this is because it can cause emotions like jealousy. A research group states "...we set out to test the prediction that feelings of jealousy lead to 'creeping' on a partner through Facebook, and that women are particularly likely to engage in partner monitoring in response to jealousy". The study shows that women can become jealous of other people when they are in an online group. 2446: 154: 2456: 2466: 2436: 1879: 1865: 1094:, formerly known as MYK-78, is a small hardware chip that the government can install into phones, designed in the nineties. It was intended to secure private communication and data by reading voice messages that are encoded and decode them. The Clipper Chip was designed during the Clinton administration to, “…protect personal safety and national security against a developing information anarchy that fosters criminals, terrorists and foreign foes.” The government portrayed it as the solution to the secret codes or 2530: 2426: 4622: 547: 2506: 2518: 2542: 522: 701:. For instance, systems described as "Web 2.0" have greatly impacted modern society. Tim O’ Reilly, who first explained the concept of "Web 2.0", stated that Web 2.0 provides communication platforms that are "user generated", with self-produced content, motivating more people to communicate with friends online. However, Internet surveillance also has a disadvantage. One researcher from 2573: 2561: 878:. This tactic has the advantage of potentially subjecting multiple computers to surveillance. Viruses often spread to thousands or millions of computers, and leave "backdoors" which are accessible over a network connection, and enable an intruder to remotely install software and execute commands. These viruses and trojans are sometimes developed by government agencies, such as 1218: 2486: 1106:" (CBDTPA) was a bill proposed in the United States Congress. CBDTPA was known as the "Security Systems and Standards Certification Act" (SSSCA) while in draft form and was killed in committee in 2002. Had CBDTPA become law, it would have prohibited technology that could be used to read digital content under copyright (such as music, video, and e-books) without 62:. This monitoring is often carried out covertly and may be completed by governments, corporations, criminal organizations, or individuals. It may or may not be legal and may or may not require authorization from a court or other independent government agencies. Computer and network surveillance programs are widespread today and almost all 1175:, countries whose governments are involved in active, intrusive surveillance of news providers, resulting in grave violations of freedom of information and human rights. Computer and network surveillance is on the increase in these countries. The report also includes a second list of "Corporate Enemies of the Internet", 863:, and/or report back activities in real-time to its operator through the Internet connection. A keylogger is an example of this type of program. Normal keylogging programs store their data on the local hard drive, but some are programmed to automatically transmit data over the network to a remote computer or Web server. 1135:
are different. Surveillance can be performed without censorship, but it is harder to engage in censorship without some forms of surveillance. And even when surveillance does not lead directly to censorship, the widespread knowledge or belief that a person, their computer, or their use of the Internet
800:
and the search phrase used are stored in a database for up to 18 months. Google also scans the content of emails of users of its Gmail webmail service in order to create targeted advertising based on what people are talking about in their personal email correspondences. Google is, by far, the largest
716:
have become socially integrated into many people's lives. Currently, virtual assistants such as Amazon's Alexa or Apple's Siri cannot call 911 or local services. They are constantly listening for command and recording parts of conversations that will help improve algorithms. If the law enforcement is
1027:
IBM researchers have also found that, for most computer keyboards, each key emits a slightly different noise when pressed. The differences are individually identifiable under some conditions, and so it's possible to log key strokes without actually requiring logging software to run on the associated
979:
are currently investing heavily in research involving social network analysis. The intelligence community believes that the biggest threat to the U.S. comes from decentralized, leaderless, geographically dispersed groups. These types of threats are most easily countered by finding important nodes in
666:
There is far too much data gathered by these packet sniffers for human investigators to manually search through. Thus, automated Internet surveillance computers sift through the vast amount of intercepted Internet traffic, filtering out, and reporting to investigators those bits of information which
1036:
device. As the law took into effect in January 2016, it will now require cities to operate with new guidelines in relation to how and when law enforcement use this device. Some legislators and those holding a public office have disagreed with this technology because of the warrantless tracking, but
1031:
In 2015, lawmakers in California passed a law prohibiting any investigative personnel in the state to force businesses to hand over digital communication without a warrant, calling this Electronic Communications Privacy Act. At the same time in California, state senator Jerry Hill introduced a bill
788:
The second component of prevention is determining the ownership of technology resources. The ownership of the firm's networks, servers, computers, files, and e-mail should be explicitly stated. There should be a distinction between an employee's personal electronic devices, which should be limited
2637:
program to preserve its ability to eavesdrop on encrypted communications by influencing and weakening encryption standards, by obtaining master encryption keys, and by gaining access to data before or after it is encrypted either by agreement, by force of law, or by computer network exploitation
992:
The purpose of the SSNA algorithms program is to extend techniques of social network analysis to assist with distinguishing potential terrorist cells from legitimate groups of people ... In order to be successful SSNA will require information on the social interactions of the majority of people
705:
said "Web 2.0 surveillance is directed at large user groups who help to hegemonically produce and reproduce surveillance by providing user-generated (self-produced) content. We can characterize Web 2.0 surveillance as mass self-surveillance". Surveillance companies monitor people while they are
772:
Safeguarding records. Federal legislation requires organizations to protect personal information. Monitoring can determine the extent of compliance with company policies and programs overseeing information security. Monitoring may also deter unlawful appropriation of personal information, and
1186:
Protection of sources is no longer just a matter of journalistic ethics. Journalists should equip themselves with a "digital survival kit" if they are exchanging sensitive information online, storing it on a computer hard-drive or mobile phone. Individuals associated with high-profile rights
1098:
keys that the age of technology created. Thus, this has raised controversy in the public, because the Clipper Chip is thought to have been the next “Big Brother” tool. This led to the failure of the Clipper proposal, even though there have been many attempts to push the agenda.
1183:(U.S.), Gamma (UK and Germany), Hacking Team (Italy), and Trovicor (Germany), companies that sell products that are liable to be used by governments to violate human rights and freedom of information. Neither list is exhaustive and they are likely to be expanded in the future. 739:, which enables the corporation to better tailor their products and/or services to be desirable by their customers. The data can also be sold to other corporations so that they can use it for the aforementioned purpose, or it can be used for direct marketing purposes, such as 3508: 667:
are "interesting", for example, the use of certain words or phrases, visiting certain types of web sites, or communicating via email or chat with a certain individual or group. Billions of dollars per year are spent by agencies such as the
801:
Internet advertising agency—millions of sites place Google's advertising banners and links on their websites in order to earn money from visitors who click on the ads. Each page containing Google advertisements adds, reads, and modifies
768:
Preventing lawsuits. Firms can be held liable for discrimination or employee harassment in the workplace. Organizations can also be involved in infringement suits through employees that distribute copyrighted material over corporate
2763:, codename for studies of unintentional intelligence-bearing signals which, if intercepted and analyzed, may disclose the information transmitted, received, handled, or otherwise processed by any information-processing equipment 993:
around the globe. Since the Defense Department cannot easily distinguish between peaceful citizens and terrorists, it will be necessary for them to gather data on innocent civilians as well as on potential terrorists.
809:
across all of these sites and gather information about their web surfing habits, keeping track of which sites they visit, and what they do when they are on these sites. This information, along with the information
2183: 1524: 734:
of computer activity is very common. The data collected is most often used for marketing purposes or sold to other corporations, but is also regularly shared with government agencies. It can be used as a form of
3232:
Muise, A., Christofides, E., & Demsmarais, S. (2014). " Creeping" or just information seeking? Gender differences in partner monitoring in response to jealousy on Facebook. Personal Relationships, 21(1),
859:, and to monitor the activities of a person using the computer. A surveillance program installed on a computer can search the contents of the hard drive for suspicious data, can monitor computer use, collect 4175: 679:, for the development, purchase, implementation, and operation of systems which intercept and analyze this data, extracting only the information that is useful to law enforcement and intelligence agencies. 655:, all U.S. telecommunications providers are required to install such packet capture technology so that Federal law enforcement and intelligence agencies are able to intercept all of their customers' 491: 2722: 2363: 2565: 2229: 1595: 3608:
Social Networking Sites and the Surveillance Society. A Critical Case Study of the Usage of studiVZ, Facebook, and MySpace by Students in Salzburg in the Context of Electronic Surveillance
905:
connections are most vulnerable to this type of attack. Another source of security cracking is employees giving out information or users using brute force tactics to guess their password.
3325: 1079:
was the first incarnation of secretly installed e-mail monitoring software installed in Internet service providers' networks to log computer communication, including transmitted e-mails.
4022: 1103: 2910: 2353: 697:
The Internet's rapid development has become a primary form of communication. More people are potentially subject to Internet surveillance. There are advantages and disadvantages to
683: 1559: 1784:, a signals intelligence (SIGINT) collection and analysis network operated on behalf of Australia, Canada, New Zealand, the United Kingdom, and the United States, also known as 2475: 2330: 983:
Jason Ethier of Northeastern University, in his study of modern social network analysis, said the following of the Scalable Social Network Analysis Program developed by the
2148: 784:, and business strategies is a major concern. The ease of information transmission and storage makes it imperative to monitor employee actions as part of a broader policy. 743:, where ads are targeted to the user of the search engine by analyzing their search history and emails (if they use free webmail services), which are kept in a database. 2653: 968: 953: 652: 607: 90: 3219: 3983: 1237: 3521: 2658: 1802: 825:
has openly stated that it uses data collected from consumer credit and direct marketing agencies for augmenting the profiles of individuals that it is monitoring.
4216: 1739: 1399: 153: 2510: 1247: 750:
Preventing misuse of resources. Companies can discourage unproductive personal activities such as online shopping or web surfing on company time. Monitoring
1037:
now if a city wants to use this device, it must be heard by a public hearing. Some cities have pulled out of using the StingRay such as Santa Clara County.
4472: 2697: 2455: 2282: 713: 643:
or between any networks takes the form of small chunks called packets, which are routed to their destination and assembled back into a complete message. A
2687: 2325: 2605: 1772:, a means of broadcasting files and Web pages using radio waves, allowing receivers near total immunity from traditional network surveillance techniques. 2886: 2752: 2546: 2445: 1404: 30:
This article is about monitoring of computer and network activity. For information on methods of preventing unauthorized access to computer data, see
1797: 908:
One can also physically place surveillance software on a computer by gaining entry to the place where the computer is stored and install it from a
3663: 2465: 2435: 2378: 2211: 2201: 1842: 1278: 3333: 4324: 3248: 2676: 2522: 2373: 1847: 1778:, a method to maximize the accuracy of queries from statistical databases while minimizing the chances of violating the privacy of individuals. 1759: 726: 4164: 4130: 4026: 3932: 4048: 3619: 3461: 3051: 2163: 2158: 1384: 1242: 976: 1024:, involves reading electromagnetic emanations from computing devices in order to extract data from them at distances of hundreds of meters. 1394: 2960: 2667:, a secret surveillance program by the NSA aimed at surveillance of foreign embassies and diplomatic staff, including those of NATO allies 1187:
organizations, dissident groups, protest groups, or reform groups are urged to take extra precautions to protect their online identities.
1151:
that examines the use of technology that monitors online activity and intercepts electronic communication in order to arrest journalists,
1064:. Some countries like Switzerland and Germany have a legal framework governing the use of such software. Known examples include the Swiss 4086: 2731: 2449: 2358: 2022: 1638: 1009:
With only commercially available equipment, it has been shown that it is possible to monitor computers from a distance by detecting the
299: 3389: 2624: 1544: 1419: 1358: 575: 525: 4280: 3606: 1827: 1732: 1318: 1123: 1075:
Policeware is a software designed to police citizens by monitoring the discussion and interaction of its citizens. Within the U.S.,
3158:
O'Reilly, T. (2005). What is Web 2.0: Design Patterns and Business Models for the Next Generation of Software. O’Reilly Media, 1-5.
2425: 821:
The United States government often gains access to these databases, either by producing a warrant for it, or by simply asking. The
3875: 964:
to extract useful information such as personal interests, friendships and affiliations, wants, beliefs, thoughts, and activities.
765:
Promoting adherence to policies. Online surveillance is one means of verifying employee observance of company networking policies.
686:
to more easily distinguish between peaceful citizens and terrorists. All of the technology has been allegedly installed by German
2244: 2051: 1837: 376: 3714: 3689: 3356: 4477: 2479: 2459: 2125: 1941: 1308: 855:
In addition to monitoring information sent over a computer network, there is also a way to examine data stored on a computer's
822: 309: 4146: 4647: 4304: 2742: 2598: 2534: 2027: 1919: 1817: 1232: 972: 113: 109: 4256:
Yan, W. (2019) Introduction to Intelligent Surveillance: Surveillance Data Capture, Transmission, and Analytics, Springer.
4107: 3987: 4657: 4543: 3113: 2781: 2206: 2061: 1569: 1313: 1083:
is another such application, this time running in a targeted computer in a trojan style and performing keystroke logging.
815: 381: 359: 4612: 3525: 3274: 3076:, Decision, United States Court of Appeals for the District of Columbia Circuit, 9 June 2006. Retrieved 8 September 2013. 2650:, a series of covert, and at times illegal, projects conducted by the FBI aimed at U.S. domestic political organizations 2489: 2056: 1725: 1389: 1328: 1199: 984: 668: 660: 4642: 2748: 2469: 2439: 2178: 2017: 746:
Such type of surveillance is also used to establish business purposes of monitoring, which may include the following:
339: 78: 3775: 4563: 3451: 2736: 1980: 1832: 1822: 1379: 875: 842: 327: 294: 224: 4431: 3087: 2922: 2591: 1554: 1539: 1144: 1107: 1065: 496: 366: 289: 249: 105: 4009: 3069: 1878: 1864: 4365: 4355: 3476: 2727: 2634: 2429: 1869: 1713: 1703: 1679: 1534: 1414: 1374: 644: 239: 2875: 897:
into the computer to gain access over a network. An attacker can then install surveillance software remotely.
647:
intercepts these packets, so that they may be examined and analyzed. Computer technology is needed to perform
4195: 4441: 3492: 2670: 2627:, reports about NSA and its international partners' mass surveillance of foreign nationals and U.S. citizens 2577: 2264: 1674: 1080: 1049: 941: 937: 883: 532: 486: 349: 344: 54:
is the monitoring of computer activity and data stored locally on a computer or data being transferred over
890:
installed by marketing agencies can be used to gain access through the security breaches that they create.
4492: 4319: 3817: 2368: 1353: 1338: 1033: 740: 731: 568: 219: 2485: 120:
society, with limited political and/or personal freedoms. Such fear has led to numerous lawsuits such as
4652: 4273: 3656: 3213: 2173: 1812: 1590: 777: 736: 254: 4621: 3547: 546: 4599: 4594: 4553: 4482: 4340: 2701: 2396: 2287: 1775: 1628: 1623: 1465: 1283: 1076: 1032:
making law enforcement agencies to disclose more information on their usage and information from the
867: 866:
There are multiple ways of installing such software. The most common is remote installation, using a
850: 751: 589: 451: 269: 259: 4127: 3835: 3297: 663:(VoIP) traffic. These technologies can be used both by the intelligence and for illegal activities. 73:, recognize and monitor threats or any suspicious or abnormal activity, and prevent and investigate 4548: 4165:"Trends in transition from classical censorship to Internet censorship: selected country overviews" 3908: 3822: 2806:
Jeske, Daniel R.; Stevens, Nathaniel T.; Tartakovsky, Alexander G.; Wilson, James D. (2018-04-17).
2630: 2153: 2113: 2002: 1936: 1931: 1883: 1659: 1475: 1323: 1208: 1119: 707: 282: 189: 46: 4137:, U.S. Senate bill S.2048, 107th Congress, 2nd session, 21 March 2002. Retrieved 8 September 2013. 4533: 4370: 4350: 2760: 1633: 1152: 1021: 898: 702: 698: 656: 334: 3745:"Social Network Analysis as an Approach to Combat Terrorism: Past, Present, and Future Research" 2968: 2234: 122: 4558: 4512: 4421: 4067: 3937: 3615: 3457: 3176:
Fuchs, C. (2011). Web 2.0, Presumption, and Surveillance. Surveillance & Society, 289-309.
3047: 2829: 2681: 2644:, a U.S. Federal Bureau of Investigation system to monitor email and electronic communications 1807: 1613: 1180: 949: 894: 759: 629:, etc.) be available for unimpeded, real-time monitoring by Federal law enforcement agencies. 626: 561: 466: 436: 354: 264: 184: 134:
has hacked into government websites in protest of what it considers "draconian surveillance".
131: 117: 42: 31: 2936: 2684:, a database containing metadata for hundreds of billions of telephone calls made in the U.S. 1110:(DRM) that prevented access to this material without the permission of the copyright holder. 4573: 4538: 4266: 3827: 3585: 3199: 3043: 2819: 2259: 2249: 2012: 2007: 1914: 1708: 1691: 1470: 1455: 1017: 1014: 945: 648: 636: 614: 599: 314: 234: 214: 63: 55: 4626: 4568: 4507: 4134: 3073: 2641: 2254: 1909: 1696: 1618: 1519: 1509: 1504: 1137: 921: 917: 755: 551: 446: 179: 93:, governments now possess an unprecedented ability to monitor the activities of citizens. 3625: 1060:
In German-speaking countries, spyware used or made by the government is sometimes called
4528: 4502: 4309: 3884: 2709: 2693: 2517: 2307: 1480: 957: 871: 838: 811: 632: 461: 229: 209: 204: 70: 3440:, Staff Report, U.S. Federal Trade Commission, March 2005. Retrieved 7 September 2013. 3438:"Spyware Workshop: Monitoring Software on Your OC: Spywae, Adware, and Other Software" 3437: 3204: 3187: 651:
and sift through intercepted data to look for important/useful information. Under the
4636: 4487: 4406: 4314: 3831: 3364: 2661:(CIPAV), a data gathering tool used by the U.S. Federal Bureau of Investigation (FBI) 1956: 1669: 1069: 793: 501: 456: 426: 404: 194: 4010:
Trojan Horse Resurrected: On the Legality of the Use of Government Spyware (Govware)
4426: 4345: 3722: 2239: 2093: 1854: 1785: 1764: 1686: 1664: 1445: 1128: 1095: 1091: 980:
the network, and removing them. To do this requires a detailed map of the network.
909: 806: 781: 421: 416: 159: 116:, have expressed concern that increasing surveillance of citizens will result in a 97: 86: 82: 38: 17: 3167:
Fuchs, C. (2011). New Media, Web 2.0 and Surveillance. Sociology Compass, 134-147.
2673:, keystroke logging software developed by the U.S. Federal Bureau of Investigation 924:
to the computer. One well-known worm that uses this method of spreading itself is
3853: 1155:, and dissidents. The report includes a list of "State Enemies of the Internet", 4497: 4416: 2713: 2541: 2297: 2168: 1769: 1293: 961: 913: 802: 622: 595: 431: 244: 199: 2876:"Bigger Monster, Weaker Chains: The Growth of an American Surveillance Society" 920:. This method shares a disadvantage with hardware devices in that it requires 4456: 4436: 4401: 2850: 2705: 2647: 2292: 1951: 1753: 1450: 1303: 1132: 1041: 856: 797: 687: 371: 127: 4232: 2833: 4446: 4396: 3803:"Electromagnetic Radiation from Video Display Units: An Eavesdropping Risk?" 3140: 2717: 2529: 2496: 2348: 2302: 2103: 2083: 1997: 1968: 1946: 1654: 1485: 1409: 1348: 1263: 1217: 1010: 902: 846: 611: 1886:
as of 2007, with countries subject to the most data collection shown in red
4249: 3779: 3590: 3573: 3413: 3744: 2664: 2401: 2098: 2046: 1791: 1460: 1288: 860: 640: 635:(also known as "packet sniffing") is the monitoring of data traffic on a 603: 145: 74: 59: 4451: 4360: 4289: 3662:. Northeastern University College of Computer and Information Science. 3614:. Salzburg and Vienna: Forschungsgruppe Unified Theory of Information. 2572: 2130: 2108: 2088: 2073: 1992: 1904: 1781: 1333: 1298: 1273: 1172: 1156: 925: 887: 834: 441: 163: 101: 3013: 2824: 2807: 1756:, a software system that attempts to make network activity untraceable 594:
The vast majority of computer surveillance involves the monitoring of
4411: 4391: 4386: 3961: 3136: 3066: 2560: 2505: 2078: 1429: 1176: 814:, and search engine histories, is stored by Google to use to build a 3909:"Researchers recover typed text using audio recording of keystrokes" 2911:"Anonymous hacks UK government sites over 'draconian surveillance' " 3275:"Time Alexa Takes the Stand Listening Devices Raise Privacy Issues" 2989: 4203: 2041: 1268: 1168: 1160: 1084: 1045: 879: 691: 618: 411: 304: 4258: 3186:
Anthony Denise, Celeste Campos-Castillo, Christine Horne (2017).
706:
focused on work or entertainment. Yet, employers themselves also
2913:, Emil Protalinski, ZDNet, 7 April 2012, retrieved 12 March 2013 2782:"FBI wants widespread monitoring of 'illegal' Internet activity" 1424: 1343: 1164: 399: 4262: 4200:
The Enemies of the Internet Special Edition : Surveillance
1794:, a large-scale cyber spying operation discovered in March 2009 69:
Surveillance allows governments and other agencies to maintain
3249:"Should Smart Devices Be Able to Automatically Call the Cops?" 676: 672: 4049:"The tricky issue of spyware with a badge: meet 'policeware'" 3854:"Electromagnetic Eavesdropping Risks of Flat-Panel Displays" 1052:
includes information about the instructions being executed.
3964:. Blavatnik School of Computer Science, Tel Aviv University 2723:
Spying on United Nations leaders by United States diplomats
3243: 3241: 3239: 3137:"First round in Internet war goes to Iranian intelligence" 2937:"Internet Eavesdropping: A Brave New World of Wiretapping" 1087:, deployed by the FBI, is a multi-purpose spyware/trojan. 886:. More often, however, viruses created by other people or 4128:"Consumer Broadband and Digital Television Promotion Act" 3802: 3509:"Social Engineering Fundamentals, Part I: Hacker Tactics" 948:
information from phone call records such as those in the
4237:, The Citizen Lab, University of Toronto, September 2007 3690:"Pentagon sets its sights on social networking websites" 3574:"Online Social Networking as Participatory Surveillance" 1104:
Consumer Broadband and Digital Television Promotion Act
796:
stores identifying information for each web search. An
4610: 2845: 2843: 3477:"Office workers give away passwords for a cheap pen" 2923:
Hacktivists in the frontline battle for the internet
818:
of the user to deliver better-targeted advertising.
77:
activities. With the advent of programs such as the
4582: 4521: 4465: 4379: 4333: 4297: 4190: 4188: 4234:Everyone's Guide to By-passing Internet Censorship 3390:"Every move you make, Google will be watching you" 3319: 3317: 3154: 3152: 3088:"Government funds chat room surveillance research" 2851:"Is the U.S. Turning Into a Surveillance Society?" 2812:Applied Stochastic Models in Business and Industry 4252:, Free Haven Project, accessed 16 September 2011. 3524:. Antivirus.about.com. 2014-03-03. Archived from 3357:"Debunking Google's log anonymization propaganda" 2961:"CALEA Archive -- Electronic Frontier Foundation" 2654:Communications Assistance For Law Enforcement Act 969:Defense Advanced Research Projects Agency (DARPA) 653:Communications Assistance For Law Enforcement Act 608:Communications Assistance For Law Enforcement Act 91:Communications Assistance For Law Enforcement Act 2730:, code name for information collected under the 2990:"CALEA: The Perils of Wiretapping the Internet" 2935:Diffie, Whitfield; Susan Landau (August 2008). 2659:Computer and Internet Protocol Address Verifier 1803:Internet censorship and surveillance by country 1020:. This form of computer surveillance, known as 989: 776:Safeguarding company assets. The protection of 3984:"Swiss coder publicises government spy Trojan" 3861:4th Workshop on Privacy Enhancing Technologies 3456:. Advances in Information Security. Springer. 2808:"Statistical methods for network surveillance" 2621:Surveillance by the United States government: 2331:Global surveillance disclosures (2013–present) 4274: 4163:Bitso, Constance; Fourie, Ina; Bothma, Theo. 4147:"Censorship is inseparable from surveillance" 3883:, IBM Almaden Research Center, archived from 2599: 1733: 789:and proscribed, and those owned by the firm. 569: 8: 3522:"Stuxnet: How does the Stuxnet worm spread?" 3218:: CS1 maint: multiple names: authors list ( 4217:"When Secrets Aren't Safe With Journalists" 4025:. Ejpd.admin.ch. 2011-11-23. Archived from 3927: 3925: 3923: 3921: 3657:"Current Research in Social Network Theory" 3499:, 3 March 2004. Retrieved 7 September 2013. 3483:, 8 April 2003. Retrieved 7 September 2013. 952:, and internet traffic data gathered under 4281: 4267: 4259: 3715:"Is the NSA reading your MySpace profile?" 2606: 2592: 1859: 1740: 1726: 1194: 967:Many U.S. government agencies such as the 805:on each visitor's computer. These cookies 576: 562: 521: 141: 27:Monitoring of computer or network activity 3821: 3650: 3648: 3646: 3589: 3298:"F.T.C. to Review Online Ads and Privacy" 3203: 2823: 2753:Defense Advanced Research Projects Agency 606:. For example, in the United States, the 3874:Asonov, Dmitri; Agrawal, Rakesh (2004), 3383: 3381: 3018:Electronic Frontier Foundation (website) 2994:Electronic Frontier Foundation (website) 2965:Electronic Frontier Foundation (website) 2745:, an NSA electronic surveillance program 1798:List of government surveillance projects 4617: 3572:Albrechtslund, Anders (March 3, 2008). 3548:"Can Network Theory Thwart Terrorists?" 3114:"FBI turns to broad new wiretap method" 2772: 2379:Mass surveillance in the United Kingdom 1862: 1843:Mass surveillance in the United Kingdom 1646: 1605: 1579: 1493: 1437: 1366: 1255: 1224: 1206: 1149:Special report on Internet surveillance 639:. Data sent between computers over the 144: 4325:Timeline of computer viruses and worms 3355:Soghoian, Chris (September 11, 2008). 3211: 3112:McCullagh, Declan (January 30, 2007). 2688:NSA warrantless surveillance (2001–07) 2677:Mass surveillance in the United States 2374:Mass surveillance in the United States 1848:Mass surveillance in the United States 1760:Computer surveillance in the workplace 936:One common form of surveillance is to 727:Computer surveillance in the workplace 3067:American Council on Education vs. FCC 2326:2005 warrantless surveillance scandal 1044:et al., that even the high frequency 977:Department of Homeland Security (DHS) 7: 3986:. News.techworld.com. Archived from 3040:Law of Internet Security and Privacy 1114:Surveillance as an aid to censorship 3776:"Complete, Unofficial Tempest Page" 3326:"Are we addicted to being watched?" 3014:"CALEA: Frequently Asked Questions" 1639:Surveillance issues in smart cities 4181:from the original on Nov 20, 2023. 4108:"Stanford University Clipper Chip" 3774:McNamara, Joel (4 December 1999). 3511:, Sarah Granger, 18 December 2001. 3388:Joshi, Priyanki (March 21, 2009). 3296:Story, Louise (November 1, 2007). 3086:Hill, Michael (October 11, 2004). 2625:2013 mass surveillance disclosures 1359:Jindalee Operational Radar Network 1136:is under surveillance can lead to 610:mandates that all phone calls and 25: 4590:Computer and network surveillance 3907:Yang, Sarah (14 September 2005), 3546:Keefe, Patrick (March 12, 2006). 3493:"Passwords are passport to theft" 3205:10.1146/annurev-soc-060116-053643 1884:Map of global NSA data collection 1828:Mass surveillance in East Germany 1124:Internet censorship circumvention 754:is one way to reduce unnecessary 166:through a portion of the Internet 83:high-speed surveillance computers 52:Computer and network surveillance 4620: 4196:"Era of the digital mercenaries" 3841:from the original on 2004-04-05. 3324:Butler, Don (January 31, 2009). 2732:President's Surveillance Program 2571: 2559: 2540: 2528: 2516: 2504: 2484: 2474: 2464: 2454: 2444: 2434: 2424: 2023:President's Surveillance Program 1877: 1863: 1838:Mass surveillance in North Korea 1216: 682:Similar systems are now used by 545: 520: 377:Internet Message Access Protocol 152: 4023:"FAQ – Häufig gestellte Fragen" 3713:Kawamoto, Dawn (June 9, 2006). 3669:from the original on 2022-10-09 3188:"Toward a Sociology of Privacy" 2892:from the original on 2022-10-09 1040:And it has also been shown, by 823:Department of Homeland Security 89:software, and laws such as the 4305:Comparison of computer viruses 4250:"Selected Papers in Anonymity" 4068:"FBI's Web Monitoring Exposed" 4047:Jeremy Reimer (20 July 2007). 3960:Adi Shamir & Eran Tromer. 2883:American Civil Liberties Union 2855:American Civil Liberties Union 2743:Terrorist Surveillance Program 2028:Terrorist Surveillance Program 1818:Mass surveillance in Australia 973:National Security Agency (NSA) 938:create maps of social networks 758:and reduce the consumption of 114:American Civil Liberties Union 110:Electronic Frontier Foundation 81:program, technologies such as 1: 4544:Data loss prevention software 4085:Levy, Steven (12 June 1994). 4066:Hopper, D. Ian (4 May 2001). 3852:Kuhn, M.G. (26–28 May 2004). 3655:Ethier, Jason (27 May 2006). 2207:Senate Intelligence Committee 1813:China's Golden Shield Project 1570:Investigatory Powers Act 2016 901:and computers with permanent 382:Simple Mail Transfer Protocol 360:Transmission Control Protocol 3877:Keyboard Acoustic Emanations 3832:10.1016/0167-4048(85)90046-X 3743:Ressler, Steve (July 2006). 3688:Marks, Paul (June 9, 2006). 3453:Computer Viruses and Malware 3332:. canada.com. Archived from 985:Information Awareness Office 669:Information Awareness Office 661:voice over Internet protocol 2749:Total Information Awareness 2184:FISA Amendments Act of 2008 2179:Protect America Act of 2007 2018:Total Information Awareness 340:Hypertext Transfer Protocol 79:Total Information Awareness 4674: 4564:Intrusion detection system 3192:Annual Review of Sociology 3038:Kevin J. Connolly (2003). 2737:Tailored Access Operations 1981:Tailored Access Operations 1833:Mass surveillance in India 1823:Mass surveillance in China 1117: 1005:Monitoring from a distance 843:Trojan (computer security) 832: 773:potential spam or viruses. 724: 587: 328:Information infrastructure 36: 29: 4432:Privacy-invasive software 3749:Homeland Security Affairs 3605:Fuchs, Christian (2009). 3414:"Advertising and Privacy" 2354:Surveillance of reporters 2212:National Security Council 1555:National Intelligence Law 1540:Data Protection Directive 1145:Reporters Without Borders 1108:digital rights management 1066:MiniPanzer and MegaPanzer 812:from their email accounts 367:Internet service provider 106:Reporters Without Borders 4219:, Christopher Soghoian, 4012:, LISS 2013, pp. 419-428 3962:"Acoustic cryptanalysis" 3810:Computers & Security 2728:Stellar Wind (code name) 1870:National Security Agency 1714:Nothing to hide argument 1535:Data Retention Directive 645:packet capture appliance 240:Right to Internet access 4442:Rogue security software 3145:(subscription required) 2739:, NSA's hacking program 942:social networking sites 932:Social network analysis 741:targeted advertisements 708:monitor their employees 487:History of the Internet 350:Internet protocol suite 345:Internet exchange point 4478:Classic Mac OS viruses 4320:List of computer worms 2925:retrieved 17 June 2012 2633:, a highly classified 2369:Insider Threat Program 1354:Mastering the Internet 1056:Policeware and govware 1034:Stingray phone tracker 1002: 732:Corporate surveillance 721:Corporate surveillance 684:Iranian Security dept. 220:Freedom of information 4648:Computer surveillance 3801:Van Eck, Wim (1985). 3591:10.5210/fm.v13i3.2142 3450:Aycock, John (2006). 3418:Google (company page) 2174:Homeland Security Act 2068:Databases, tools etc. 1591:FISA Improvements Act 833:Further information: 778:intellectual property 737:business intelligence 4658:Espionage techniques 4600:Operation: Bot Roast 2885:. January 15, 2003. 2702:Thomas Andrews Drake 2364:UN diplomatic spying 1776:Differential privacy 1624:Secure communication 1466:Southern Cross Cable 851:Backdoor (computing) 752:employee performance 590:Signals intelligence 270:Virtual volunteering 138:Network surveillance 4549:Defensive computing 4466:By operating system 3782:on 1 September 2013 3631:on February 6, 2009 2941:Scientific American 2751:, a project of the 2631:Bullrun (code name) 2235:Hepting v. AT&T 2154:Privacy Act of 1974 1932:Upstream collection 1660:Intelligence agency 1476:Bad Aibling Station 1324:Boundless Informant 1209:Global surveillance 1153:citizen-journalists 1120:Internet censorship 940:based on data from 552:Internet portal 492:Oldest domain names 123:Hepting v. AT&T 47:Global surveillance 18:Online surveillance 4643:Computer forensics 4534:Antivirus software 4380:Malware for profit 4351:Man-in-the-browser 4298:Infectious malware 4133:2012-02-14 at the 3330:The Ottawa Citizen 3094:. Associated Press 3072:2012-09-07 at the 2245:Clapper v. Amnesty 2120:GCHQ collaboration 2114:BOUNDLESSINFORMANT 1634:Call detail record 893:Another method is 829:Malicious software 714:Virtual assistants 703:Uppsala University 699:network monitoring 657:broadband Internet 335:Domain Name System 225:Internet phenomena 66:can be monitored. 4608: 4607: 4559:Internet security 4513:HyperCard viruses 4422:Keystroke logging 4412:Fraudulent dialer 4356:Man-in-the-middle 4223:, 26 October 2011 4149:, Cory Doctorow, 3938:Los Angeles Times 3863:. Toronto: 23–25. 3621:978-3-200-01428-2 3463:978-0-387-30236-2 3394:Business Standard 3053:978-0-7355-4273-0 2825:10.1002/asmb.2326 2682:NSA call database 2616: 2615: 1808:Mass surveillance 1750: 1749: 1614:Mass surveillance 1560:Cybersecurity Law 1181:Blue Coat Systems 950:NSA call database 760:network bandwidth 627:instant messaging 586: 585: 437:Instant messaging 355:Internet Protocol 265:Virtual community 162:visualization of 118:mass surveillance 56:computer networks 43:Mass surveillance 32:computer security 16:(Redirected from 4665: 4625: 4624: 4616: 4574:Network security 4539:Browser security 4283: 4276: 4269: 4260: 4238: 4230: 4224: 4214: 4208: 4207: 4202:. Archived from 4192: 4183: 4182: 4180: 4169: 4160: 4154: 4144: 4138: 4125: 4119: 4118: 4116: 4114: 4104: 4098: 4097: 4095: 4093: 4087:"New York Times" 4082: 4076: 4075: 4063: 4057: 4056: 4044: 4038: 4037: 4035: 4034: 4019: 4013: 4006: 4000: 3999: 3997: 3995: 3990:on 29 April 2014 3980: 3974: 3973: 3971: 3969: 3957: 3951: 3950: 3948: 3946: 3929: 3916: 3915: 3913:UC Berkeley News 3904: 3898: 3897: 3896: 3895: 3889: 3882: 3871: 3865: 3864: 3858: 3849: 3843: 3842: 3840: 3825: 3807: 3798: 3792: 3791: 3789: 3787: 3778:. Archived from 3771: 3765: 3764: 3762: 3760: 3740: 3734: 3733: 3731: 3730: 3721:. Archived from 3710: 3704: 3703: 3701: 3700: 3685: 3679: 3678: 3676: 3674: 3668: 3661: 3652: 3641: 3640: 3638: 3636: 3630: 3624:. Archived from 3613: 3602: 3596: 3595: 3593: 3569: 3563: 3562: 3560: 3558: 3543: 3537: 3536: 3534: 3533: 3518: 3512: 3506: 3500: 3490: 3484: 3479:, John Leyden, 3474: 3468: 3467: 3447: 3441: 3435: 3429: 3428: 3426: 3425: 3410: 3404: 3403: 3401: 3400: 3385: 3376: 3375: 3373: 3372: 3363:. Archived from 3352: 3346: 3345: 3343: 3341: 3321: 3312: 3311: 3309: 3308: 3293: 3287: 3286: 3284: 3282: 3271: 3265: 3264: 3262: 3260: 3245: 3234: 3230: 3224: 3223: 3217: 3209: 3207: 3183: 3177: 3174: 3168: 3165: 3159: 3156: 3147: 3146: 3143:, 28 June 2009. 3134: 3128: 3127: 3125: 3124: 3109: 3103: 3102: 3100: 3099: 3083: 3077: 3064: 3058: 3057: 3044:Aspen Publishers 3035: 3029: 3028: 3026: 3025: 3010: 3004: 3003: 3001: 3000: 2986: 2980: 2979: 2977: 2976: 2967:. Archived from 2957: 2951: 2950: 2948: 2947: 2932: 2926: 2920: 2914: 2908: 2902: 2901: 2899: 2897: 2891: 2880: 2872: 2866: 2865: 2863: 2861: 2847: 2838: 2837: 2827: 2803: 2797: 2796: 2794: 2792: 2777: 2608: 2601: 2594: 2576: 2575: 2564: 2563: 2545: 2544: 2533: 2532: 2521: 2520: 2509: 2508: 2488: 2478: 2468: 2458: 2448: 2438: 2428: 2260:Wikimedia v. NSA 2250:Klayman v. Obama 2149:Safe Streets Act 1881: 1867: 1860: 1742: 1735: 1728: 1709:Stop Watching Us 1580:Proposed changes 1471:Utah Data Center 1220: 1195: 1000: 960:"maps" are then 946:traffic analysis 944:as well as from 649:traffic analysis 615:internet traffic 578: 571: 564: 550: 549: 524: 523: 156: 142: 104:groups, such as 64:Internet traffic 21: 4673: 4672: 4668: 4667: 4666: 4664: 4663: 4662: 4633: 4632: 4631: 4619: 4611: 4609: 4604: 4583:Countermeasures 4578: 4569:Mobile security 4517: 4508:Palm OS viruses 4473:Android malware 4461: 4375: 4371:Zombie computer 4329: 4293: 4287: 4246: 4241: 4231: 4227: 4215: 4211: 4194: 4193: 4186: 4178: 4167: 4162: 4161: 4157: 4145: 4141: 4135:Wayback Machine 4126: 4122: 4112: 4110: 4106: 4105: 4101: 4091: 4089: 4084: 4083: 4079: 4065: 4064: 4060: 4046: 4045: 4041: 4032: 4030: 4021: 4020: 4016: 4007: 4003: 3993: 3991: 3982: 3981: 3977: 3967: 3965: 3959: 3958: 3954: 3944: 3942: 3931: 3930: 3919: 3906: 3905: 3901: 3893: 3891: 3887: 3880: 3873: 3872: 3868: 3856: 3851: 3850: 3846: 3838: 3805: 3800: 3799: 3795: 3785: 3783: 3773: 3772: 3768: 3758: 3756: 3742: 3741: 3737: 3728: 3726: 3712: 3711: 3707: 3698: 3696: 3687: 3686: 3682: 3672: 3670: 3666: 3659: 3654: 3653: 3644: 3634: 3632: 3628: 3622: 3611: 3604: 3603: 3599: 3571: 3570: 3566: 3556: 3554: 3545: 3544: 3540: 3531: 3529: 3520: 3519: 3515: 3507: 3503: 3491: 3487: 3475: 3471: 3464: 3449: 3448: 3444: 3436: 3432: 3423: 3421: 3412: 3411: 3407: 3398: 3396: 3387: 3386: 3379: 3370: 3368: 3354: 3353: 3349: 3339: 3337: 3336:on 22 July 2013 3323: 3322: 3315: 3306: 3304: 3295: 3294: 3290: 3280: 3278: 3273: 3272: 3268: 3258: 3256: 3253:How Stuff Works 3247: 3246: 3237: 3231: 3227: 3210: 3185: 3184: 3180: 3175: 3171: 3166: 3162: 3157: 3150: 3144: 3135: 3131: 3122: 3120: 3111: 3110: 3106: 3097: 3095: 3085: 3084: 3080: 3074:Wayback Machine 3065: 3061: 3054: 3046:. p. 131. 3037: 3036: 3032: 3023: 3021: 3012: 3011: 3007: 2998: 2996: 2988: 2987: 2983: 2974: 2972: 2959: 2958: 2954: 2945: 2943: 2934: 2933: 2929: 2921: 2917: 2909: 2905: 2895: 2893: 2889: 2878: 2874: 2873: 2869: 2859: 2857: 2849: 2848: 2841: 2805: 2804: 2800: 2790: 2788: 2779: 2778: 2774: 2770: 2612: 2583: 2582: 2570: 2558: 2539: 2527: 2515: 2503: 2415: 2407: 2406: 2392: 2384: 2383: 2344: 2336: 2335: 2321: 2313: 2312: 2278: 2270: 2269: 2255:ACLU v. Clapper 2225: 2217: 2216: 2197: 2189: 2188: 2144: 2136: 2135: 1895: 1887: 1868: 1746: 1619:Culture of fear 1596:Other proposals 1525:FISA amendments 1520:USA Freedom Act 1505:UKUSA Agreement 1193: 1138:self-censorship 1126: 1116: 1068:and the German 1058: 1013:emitted by the 1007: 1001: 998: 934: 922:physical access 853: 831: 756:network traffic 729: 723: 592: 582: 544: 539: 538: 515: 507: 506: 482: 474: 473: 395: 387: 386: 330: 320: 319: 285: 275: 274: 175: 167: 140: 49: 37:Main articles: 35: 28: 23: 22: 15: 12: 11: 5: 4671: 4669: 4661: 4660: 4655: 4650: 4645: 4635: 4634: 4630: 4629: 4606: 4605: 4603: 4602: 4597: 4592: 4586: 4584: 4580: 4579: 4577: 4576: 4571: 4566: 4561: 4556: 4551: 4546: 4541: 4536: 4531: 4529:Anti-keylogger 4525: 4523: 4519: 4518: 4516: 4515: 4510: 4505: 4503:Mobile malware 4500: 4495: 4490: 4485: 4480: 4475: 4469: 4467: 4463: 4462: 4460: 4459: 4454: 4449: 4444: 4439: 4434: 4429: 4424: 4419: 4414: 4409: 4404: 4399: 4394: 4389: 4383: 4381: 4377: 4376: 4374: 4373: 4368: 4363: 4358: 4353: 4348: 4343: 4337: 4335: 4331: 4330: 4328: 4327: 4322: 4317: 4312: 4310:Computer virus 4307: 4301: 4299: 4295: 4294: 4288: 4286: 4285: 4278: 4271: 4263: 4254: 4253: 4245: 4244:External links 4242: 4240: 4239: 4225: 4221:New York Times 4209: 4206:on 2013-08-31. 4184: 4155: 4153:, 2 March 2012 4139: 4120: 4099: 4077: 4058: 4039: 4014: 4001: 3975: 3952: 3917: 3899: 3866: 3844: 3823:10.1.1.35.1695 3816:(4): 269–286. 3793: 3766: 3735: 3705: 3680: 3642: 3620: 3597: 3564: 3552:New York Times 3538: 3513: 3501: 3485: 3469: 3462: 3442: 3430: 3405: 3377: 3347: 3313: 3302:New York Times 3288: 3266: 3235: 3225: 3178: 3169: 3160: 3148: 3129: 3104: 3078: 3059: 3052: 3030: 3005: 2981: 2952: 2927: 2915: 2903: 2867: 2839: 2818:(4): 425–445. 2798: 2780:Anne Broache. 2771: 2769: 2766: 2765: 2764: 2758: 2757: 2756: 2746: 2740: 2734: 2725: 2720: 2710:Edward Snowden 2698:William Binney 2694:whistleblowers 2690: 2685: 2679: 2674: 2668: 2662: 2656: 2651: 2645: 2639: 2628: 2614: 2613: 2611: 2610: 2603: 2596: 2588: 2585: 2584: 2581: 2580: 2568: 2555: 2554: 2550: 2549: 2537: 2525: 2513: 2500: 2499: 2493: 2492: 2482: 2472: 2462: 2452: 2442: 2432: 2421: 2420: 2416: 2413: 2412: 2409: 2408: 2405: 2404: 2399: 2393: 2390: 2389: 2386: 2385: 2382: 2381: 2376: 2371: 2366: 2361: 2356: 2351: 2345: 2342: 2341: 2338: 2337: 2334: 2333: 2328: 2322: 2319: 2318: 2315: 2314: 2311: 2310: 2308:Edward Snowden 2305: 2300: 2295: 2290: 2285: 2283:William Binney 2279: 2277:Whistleblowers 2276: 2275: 2272: 2271: 2268: 2267: 2262: 2257: 2252: 2247: 2242: 2237: 2232: 2226: 2223: 2222: 2219: 2218: 2215: 2214: 2209: 2204: 2198: 2195: 2194: 2191: 2190: 2187: 2186: 2181: 2176: 2171: 2166: 2161: 2156: 2151: 2145: 2142: 2141: 2138: 2137: 2134: 2133: 2128: 2122: 2121: 2117: 2116: 2111: 2106: 2101: 2096: 2091: 2086: 2081: 2076: 2070: 2069: 2065: 2064: 2059: 2054: 2049: 2044: 2038: 2037: 2033: 2032: 2031: 2030: 2020: 2015: 2010: 2005: 2000: 1995: 1989: 1988: 1984: 1983: 1977: 1976: 1972: 1971: 1965: 1964: 1960: 1959: 1954: 1949: 1944: 1939: 1934: 1928: 1927: 1923: 1922: 1917: 1912: 1907: 1901: 1900: 1896: 1893: 1892: 1889: 1888: 1882: 1874: 1873: 1858: 1857: 1852: 1851: 1850: 1845: 1840: 1835: 1830: 1825: 1820: 1815: 1805: 1800: 1795: 1789: 1779: 1773: 1767: 1762: 1757: 1748: 1747: 1745: 1744: 1737: 1730: 1722: 1719: 1718: 1717: 1716: 1711: 1706: 1701: 1700: 1699: 1694: 1684: 1683: 1682: 1677: 1672: 1662: 1657: 1649: 1648: 1647:Related topics 1644: 1643: 1642: 1641: 1636: 1631: 1626: 1621: 1616: 1608: 1607: 1603: 1602: 1601: 1600: 1599: 1598: 1593: 1582: 1581: 1577: 1576: 1575: 1574: 1573: 1572: 1564: 1563: 1562: 1557: 1549: 1548: 1547: 1542: 1537: 1529: 1528: 1527: 1522: 1514: 1513: 1512: 1507: 1496: 1495: 1491: 1490: 1489: 1488: 1483: 1481:Dagger Complex 1478: 1473: 1468: 1463: 1458: 1453: 1448: 1440: 1439: 1435: 1434: 1433: 1432: 1427: 1422: 1417: 1412: 1407: 1402: 1397: 1392: 1387: 1382: 1377: 1369: 1368: 1364: 1363: 1362: 1361: 1356: 1351: 1346: 1341: 1336: 1331: 1326: 1321: 1316: 1311: 1306: 1301: 1296: 1291: 1286: 1281: 1276: 1271: 1266: 1258: 1257: 1253: 1252: 1251: 1250: 1245: 1240: 1235: 1227: 1226: 1222: 1221: 1213: 1212: 1204: 1203: 1192: 1189: 1143:In March 2013 1115: 1112: 1057: 1054: 1006: 1003: 996: 958:social network 933: 930: 872:computer virus 839:Computer virus 830: 827: 807:track the user 792:For instance, 786: 785: 774: 770: 766: 763: 722: 719: 633:Packet capture 584: 583: 581: 580: 573: 566: 558: 555: 554: 541: 540: 537: 536: 529: 516: 513: 512: 509: 508: 505: 504: 499: 494: 489: 483: 480: 479: 476: 475: 472: 471: 470: 469: 462:World Wide Web 459: 454: 449: 444: 439: 434: 429: 424: 419: 414: 409: 408: 407: 396: 393: 392: 389: 388: 385: 384: 379: 374: 369: 364: 363: 362: 357: 347: 342: 337: 331: 326: 325: 322: 321: 318: 317: 312: 307: 302: 297: 292: 286: 281: 280: 277: 276: 273: 272: 267: 262: 257: 252: 247: 242: 237: 232: 230:Net neutrality 227: 222: 217: 212: 210:Digital rights 207: 205:Digital divide 202: 197: 192: 187: 182: 176: 173: 172: 169: 168: 157: 149: 148: 139: 136: 71:social control 26: 24: 14: 13: 10: 9: 6: 4: 3: 2: 4670: 4659: 4656: 4654: 4651: 4649: 4646: 4644: 4641: 4640: 4638: 4628: 4623: 4618: 4614: 4601: 4598: 4596: 4593: 4591: 4588: 4587: 4585: 4581: 4575: 4572: 4570: 4567: 4565: 4562: 4560: 4557: 4555: 4552: 4550: 4547: 4545: 4542: 4540: 4537: 4535: 4532: 4530: 4527: 4526: 4524: 4520: 4514: 4511: 4509: 4506: 4504: 4501: 4499: 4496: 4494: 4493:MacOS malware 4491: 4489: 4488:Linux malware 4486: 4484: 4481: 4479: 4476: 4474: 4471: 4470: 4468: 4464: 4458: 4455: 4453: 4450: 4448: 4445: 4443: 4440: 4438: 4435: 4433: 4430: 4428: 4425: 4423: 4420: 4418: 4415: 4413: 4410: 4408: 4407:Form grabbing 4405: 4403: 4400: 4398: 4395: 4393: 4390: 4388: 4385: 4384: 4382: 4378: 4372: 4369: 4367: 4364: 4362: 4359: 4357: 4354: 4352: 4349: 4347: 4344: 4342: 4339: 4338: 4336: 4332: 4326: 4323: 4321: 4318: 4316: 4315:Computer worm 4313: 4311: 4308: 4306: 4303: 4302: 4300: 4296: 4291: 4284: 4279: 4277: 4272: 4270: 4265: 4264: 4261: 4257: 4251: 4248: 4247: 4243: 4236: 4235: 4229: 4226: 4222: 4218: 4213: 4210: 4205: 4201: 4197: 4191: 4189: 4185: 4177: 4173: 4166: 4159: 4156: 4152: 4148: 4143: 4140: 4136: 4132: 4129: 4124: 4121: 4109: 4103: 4100: 4088: 4081: 4078: 4073: 4069: 4062: 4059: 4054: 4050: 4043: 4040: 4029:on 2013-05-06 4028: 4024: 4018: 4015: 4011: 4005: 4002: 3989: 3985: 3979: 3976: 3963: 3956: 3953: 3940: 3939: 3934: 3928: 3926: 3924: 3922: 3918: 3914: 3910: 3903: 3900: 3890:on 2012-02-27 3886: 3879: 3878: 3870: 3867: 3862: 3855: 3848: 3845: 3837: 3833: 3829: 3824: 3819: 3815: 3811: 3804: 3797: 3794: 3781: 3777: 3770: 3767: 3754: 3750: 3746: 3739: 3736: 3725:on 2012-07-20 3724: 3720: 3716: 3709: 3706: 3695: 3694:New Scientist 3691: 3684: 3681: 3665: 3658: 3651: 3649: 3647: 3643: 3627: 3623: 3617: 3610: 3609: 3601: 3598: 3592: 3587: 3583: 3579: 3575: 3568: 3565: 3553: 3549: 3542: 3539: 3528:on 2014-04-15 3527: 3523: 3517: 3514: 3510: 3505: 3502: 3498: 3494: 3489: 3486: 3482: 3478: 3473: 3470: 3465: 3459: 3455: 3454: 3446: 3443: 3439: 3434: 3431: 3419: 3415: 3409: 3406: 3395: 3391: 3384: 3382: 3378: 3367:on 2011-04-29 3366: 3362: 3358: 3351: 3348: 3335: 3331: 3327: 3320: 3318: 3314: 3303: 3299: 3292: 3289: 3276: 3270: 3267: 3254: 3250: 3244: 3242: 3240: 3236: 3229: 3226: 3221: 3215: 3206: 3201: 3197: 3193: 3189: 3182: 3179: 3173: 3170: 3164: 3161: 3155: 3153: 3149: 3142: 3138: 3133: 3130: 3119: 3115: 3108: 3105: 3093: 3089: 3082: 3079: 3075: 3071: 3068: 3063: 3060: 3055: 3049: 3045: 3041: 3034: 3031: 3019: 3015: 3009: 3006: 2995: 2991: 2985: 2982: 2971:on 2009-05-03 2970: 2966: 2962: 2956: 2953: 2942: 2938: 2931: 2928: 2924: 2919: 2916: 2912: 2907: 2904: 2888: 2884: 2877: 2871: 2868: 2856: 2852: 2846: 2844: 2840: 2835: 2831: 2826: 2821: 2817: 2813: 2809: 2802: 2799: 2787: 2783: 2776: 2773: 2767: 2762: 2759: 2754: 2750: 2747: 2744: 2741: 2738: 2735: 2733: 2729: 2726: 2724: 2721: 2719: 2715: 2711: 2707: 2703: 2699: 2695: 2691: 2689: 2686: 2683: 2680: 2678: 2675: 2672: 2671:Magic Lantern 2669: 2666: 2663: 2660: 2657: 2655: 2652: 2649: 2646: 2643: 2640: 2636: 2632: 2629: 2626: 2623: 2622: 2620: 2619: 2618: 2609: 2604: 2602: 2597: 2595: 2590: 2589: 2587: 2586: 2579: 2574: 2569: 2567: 2562: 2557: 2556: 2552: 2551: 2548: 2543: 2538: 2536: 2531: 2526: 2524: 2519: 2514: 2512: 2507: 2502: 2501: 2498: 2495: 2494: 2491: 2487: 2483: 2481: 2477: 2473: 2471: 2467: 2463: 2461: 2457: 2453: 2451: 2447: 2443: 2441: 2437: 2433: 2431: 2427: 2423: 2422: 2419:United States 2418: 2417: 2414:Collaboration 2411: 2410: 2403: 2400: 2398: 2395: 2394: 2388: 2387: 2380: 2377: 2375: 2372: 2370: 2367: 2365: 2362: 2360: 2359:Mail tracking 2357: 2355: 2352: 2350: 2347: 2346: 2340: 2339: 2332: 2329: 2327: 2324: 2323: 2317: 2316: 2309: 2306: 2304: 2301: 2299: 2296: 2294: 2291: 2289: 2286: 2284: 2281: 2280: 2274: 2273: 2266: 2263: 2261: 2258: 2256: 2253: 2251: 2248: 2246: 2243: 2241: 2238: 2236: 2233: 2231: 2228: 2227: 2221: 2220: 2213: 2210: 2208: 2205: 2203: 2200: 2199: 2193: 2192: 2185: 2182: 2180: 2177: 2175: 2172: 2170: 2167: 2165: 2162: 2160: 2157: 2155: 2152: 2150: 2147: 2146: 2140: 2139: 2132: 2129: 2127: 2124: 2123: 2119: 2118: 2115: 2112: 2110: 2107: 2105: 2102: 2100: 2097: 2095: 2092: 2090: 2087: 2085: 2082: 2080: 2077: 2075: 2072: 2071: 2067: 2066: 2063: 2060: 2058: 2055: 2053: 2050: 2048: 2045: 2043: 2040: 2039: 2035: 2034: 2029: 2026: 2025: 2024: 2021: 2019: 2016: 2014: 2011: 2009: 2006: 2004: 2001: 1999: 1996: 1994: 1991: 1990: 1986: 1985: 1982: 1979: 1978: 1974: 1973: 1970: 1967: 1966: 1962: 1961: 1958: 1955: 1953: 1950: 1948: 1945: 1943: 1940: 1938: 1935: 1933: 1930: 1929: 1925: 1924: 1921: 1918: 1916: 1913: 1911: 1908: 1906: 1903: 1902: 1898: 1897: 1891: 1890: 1885: 1880: 1876: 1875: 1871: 1866: 1861: 1856: 1853: 1849: 1846: 1844: 1841: 1839: 1836: 1834: 1831: 1829: 1826: 1824: 1821: 1819: 1816: 1814: 1811: 1810: 1809: 1806: 1804: 1801: 1799: 1796: 1793: 1790: 1788:and Five Eyes 1787: 1783: 1780: 1777: 1774: 1771: 1768: 1766: 1763: 1761: 1758: 1755: 1752: 1751: 1743: 1738: 1736: 1731: 1729: 1724: 1723: 1721: 1720: 1715: 1712: 1710: 1707: 1705: 1702: 1698: 1695: 1693: 1690: 1689: 1688: 1685: 1681: 1678: 1676: 1673: 1671: 1668: 1667: 1666: 1663: 1661: 1658: 1656: 1653: 1652: 1651: 1650: 1645: 1640: 1637: 1635: 1632: 1630: 1627: 1625: 1622: 1620: 1617: 1615: 1612: 1611: 1610: 1609: 1604: 1597: 1594: 1592: 1589: 1588: 1586: 1585: 1584: 1583: 1578: 1571: 1568: 1567: 1565: 1561: 1558: 1556: 1553: 1552: 1550: 1546: 1543: 1541: 1538: 1536: 1533: 1532: 1530: 1526: 1523: 1521: 1518: 1517: 1515: 1511: 1508: 1506: 1503: 1502: 1500: 1499: 1498: 1497: 1492: 1487: 1484: 1482: 1479: 1477: 1474: 1472: 1469: 1467: 1464: 1462: 1459: 1457: 1454: 1452: 1449: 1447: 1444: 1443: 1442: 1441: 1436: 1431: 1428: 1426: 1423: 1421: 1418: 1416: 1413: 1411: 1408: 1406: 1403: 1401: 1398: 1396: 1393: 1391: 1388: 1386: 1383: 1381: 1378: 1376: 1373: 1372: 1371: 1370: 1365: 1360: 1357: 1355: 1352: 1350: 1347: 1345: 1342: 1340: 1337: 1335: 1332: 1330: 1327: 1325: 1322: 1320: 1317: 1315: 1312: 1310: 1307: 1305: 1302: 1300: 1297: 1295: 1292: 1290: 1287: 1285: 1282: 1280: 1277: 1275: 1272: 1270: 1267: 1265: 1262: 1261: 1260: 1259: 1254: 1249: 1246: 1244: 1241: 1239: 1236: 1234: 1231: 1230: 1229: 1228: 1223: 1219: 1215: 1214: 1211: 1210: 1205: 1201: 1197: 1196: 1190: 1188: 1184: 1182: 1178: 1174: 1170: 1166: 1162: 1158: 1154: 1150: 1146: 1141: 1139: 1134: 1130: 1125: 1121: 1113: 1111: 1109: 1105: 1100: 1097: 1096:cryptographic 1093: 1088: 1086: 1082: 1081:Magic Lantern 1078: 1073: 1071: 1070:R2D2 (trojan) 1067: 1063: 1055: 1053: 1051: 1048:emitted by a 1047: 1043: 1038: 1035: 1029: 1025: 1023: 1019: 1016: 1012: 1004: 995: 994: 988: 986: 981: 978: 974: 970: 965: 963: 959: 955: 951: 947: 943: 939: 931: 929: 927: 923: 919: 915: 911: 906: 904: 900: 896: 891: 889: 885: 884:Magic Lantern 881: 877: 873: 870:created by a 869: 864: 862: 858: 852: 848: 844: 840: 836: 828: 826: 824: 819: 817: 813: 808: 804: 799: 795: 794:Google Search 790: 783: 782:trade secrets 779: 775: 771: 767: 764: 761: 757: 753: 749: 748: 747: 744: 742: 738: 733: 728: 720: 718: 715: 711: 709: 704: 700: 695: 693: 689: 685: 680: 678: 674: 670: 664: 662: 658: 654: 650: 646: 642: 638: 634: 630: 628: 624: 620: 616: 613: 609: 605: 601: 597: 596:personal data 591: 579: 574: 572: 567: 565: 560: 559: 557: 556: 553: 548: 543: 542: 535: 534: 530: 528: 527: 518: 517: 511: 510: 503: 502:Protocol Wars 500: 498: 495: 493: 490: 488: 485: 484: 478: 477: 468: 465: 464: 463: 460: 458: 457:Voice over IP 455: 453: 450: 448: 445: 443: 440: 438: 435: 433: 430: 428: 427:File transfer 425: 423: 420: 418: 415: 413: 410: 406: 405:Microblogging 403: 402: 401: 398: 397: 391: 390: 383: 380: 378: 375: 373: 370: 368: 365: 361: 358: 356: 353: 352: 351: 348: 346: 343: 341: 338: 336: 333: 332: 329: 324: 323: 316: 313: 311: 308: 306: 303: 301: 298: 296: 293: 291: 288: 287: 284: 279: 278: 271: 268: 266: 263: 261: 258: 256: 253: 251: 248: 246: 243: 241: 238: 236: 233: 231: 228: 226: 223: 221: 218: 216: 213: 211: 208: 206: 203: 201: 198: 196: 195:Data activism 193: 191: 188: 186: 183: 181: 178: 177: 171: 170: 165: 164:routing paths 161: 155: 151: 150: 147: 143: 137: 135: 133: 129: 125: 124: 119: 115: 111: 107: 103: 99: 94: 92: 88: 84: 80: 76: 72: 67: 65: 61: 57: 53: 48: 44: 40: 33: 19: 4653:Surveillance 4589: 4366:Trojan horse 4346:Clickjacking 4255: 4233: 4228: 4220: 4212: 4204:the original 4199: 4171: 4158: 4151:The Guardian 4150: 4142: 4123: 4113:November 10, 4111:. Retrieved 4102: 4092:November 10, 4090:. Retrieved 4080: 4071: 4061: 4053:Ars Technica 4052: 4042: 4031:. Retrieved 4027:the original 4017: 4008:Basil Cupa, 4004: 3992:. Retrieved 3988:the original 3978: 3966:. Retrieved 3955: 3945:November 10, 3943:. Retrieved 3941:. 2017-08-27 3936: 3912: 3902: 3892:, retrieved 3885:the original 3876: 3869: 3860: 3847: 3813: 3809: 3796: 3784:. Retrieved 3780:the original 3769: 3757:. Retrieved 3752: 3748: 3738: 3727:. Retrieved 3723:the original 3718: 3708: 3697:. Retrieved 3693: 3683: 3671:. Retrieved 3633:. Retrieved 3626:the original 3607: 3600: 3581: 3578:First Monday 3577: 3567: 3555:. Retrieved 3551: 3541: 3530:. Retrieved 3526:the original 3516: 3504: 3497:The Register 3496: 3488: 3481:The Register 3480: 3472: 3452: 3445: 3433: 3422:. Retrieved 3417: 3408: 3397:. Retrieved 3393: 3369:. Retrieved 3365:the original 3360: 3350: 3338:. Retrieved 3334:the original 3329: 3305:. Retrieved 3301: 3291: 3281:November 10, 3279:. Retrieved 3277:. 4 May 2017 3269: 3259:November 10, 3257:. Retrieved 3255:. 2017-07-18 3252: 3228: 3214:cite journal 3195: 3191: 3181: 3172: 3163: 3132: 3121:. Retrieved 3117: 3107: 3096:. Retrieved 3091: 3081: 3062: 3039: 3033: 3022:. Retrieved 3020:. 2007-09-20 3017: 3008: 2997:. Retrieved 2993: 2984: 2973:. Retrieved 2969:the original 2964: 2955: 2944:. Retrieved 2940: 2930: 2918: 2906: 2894:. Retrieved 2882: 2870: 2858:. Retrieved 2854: 2815: 2811: 2801: 2789:. Retrieved 2785: 2775: 2617: 2288:Thomas Drake 2265:US v. Moalin 2240:Jewel v. NSA 2196:Institutions 2094:TRAFFICTHIEF 1872:surveillance 1855:Surveillance 1786:AUSCANNZUKUS 1765:Cyber spying 1687:Human rights 1665:Cryptography 1456:Menwith Hill 1446:The Doughnut 1243:2013–present 1207: 1185: 1148: 1142: 1129:Surveillance 1127: 1101: 1092:Clipper Chip 1089: 1074: 1061: 1059: 1039: 1030: 1026: 1008: 999:Jason Ethier 991: 990: 982: 966: 935: 910:compact disc 907: 892: 865: 854: 820: 791: 787: 745: 730: 712: 696: 690:and Finnish 681: 665: 631: 593: 531: 519: 422:File sharing 160:Opte Project 121: 98:civil rights 95: 68: 58:such as the 51: 50: 39:Surveillance 4498:Macro virus 4483:iOS malware 4457:Web threats 4417:Infostealer 4334:Concealment 3786:7 September 3198:: 249–269. 2714:Thomas Tamm 2320:Publication 2298:Thomas Tamm 2230:ACLU v. NSA 2169:Patriot Act 2143:Legislation 2003:Trailblazer 1770:Datacasting 1294:Stone Ghost 1225:Disclosures 914:floppy disk 623:web traffic 260:Vigilantism 245:Slacktivism 4637:Categories 4522:Protection 4437:Ransomware 4402:Fleeceware 4033:2014-05-17 3968:1 November 3933:"LA Times" 3894:2013-09-08 3729:2009-03-16 3699:2009-03-16 3532:2014-05-17 3424:2009-03-21 3399:2009-03-21 3371:2009-03-21 3307:2009-03-17 3123:2009-03-13 3118:ZDNet News 3098:2009-03-19 3024:2009-03-14 2999:2009-03-14 2975:2009-03-14 2946:2009-03-13 2768:References 2706:Mark Klein 2648:COINTELPRO 2293:Mark Klein 2036:Since 2007 2008:Turbulence 1987:Since 2001 1975:Since 1998 1963:Since 1990 1952:ThinThread 1926:Since 1978 1754:Anonymizer 1704:Satellites 1501:Five Eyes 1451:Fort Meade 1304:Frenchelon 1179:(France), 1133:censorship 1118:See also: 1042:Adi Shamir 1028:computer. 975:, and the 962:data mined 918:thumbdrive 895:"cracking" 857:hard drive 798:IP address 725:See also: 688:Siemens AG 675:, and the 588:See also: 452:Television 372:IP address 283:Governance 190:Censorship 128:hacktivist 112:, and the 87:biometrics 4447:Scareware 4397:Crimeware 3818:CiteSeerX 3759:March 14, 3719:CNET News 3635:March 14, 3361:CNET News 3141:Debkafile 3092:USA Today 2896:March 13, 2860:March 13, 2834:1524-1904 2718:Russ Tice 2642:Carnivore 2638:(hacking) 2497:Five Eyes 2349:Cablegate 2303:Russ Tice 2104:XKeyscore 2084:Main Core 2052:Stateroom 1998:STORMBREW 1969:RAMPART-A 1947:Main Core 1655:Espionage 1486:GCHQ Bude 1410:Five Eyes 1349:RAMPART-A 1284:Carnivore 1264:XKeyscore 1248:Reactions 1147:issued a 1077:Carnivore 1011:radiation 903:broadband 861:passwords 847:Keylogger 803:"cookies" 769:networks. 612:broadband 250:Sociology 200:Democracy 132:Anonymous 4627:Internet 4595:Honeypot 4554:Firewall 4341:Backdoor 4176:Archived 4131:Archived 4072:ABC News 3994:25 March 3836:Archived 3673:15 March 3664:Archived 3557:14 March 3070:Archived 2887:Archived 2791:25 March 2665:Dropmire 2440:CYBERCOM 2402:Metadata 2391:Concepts 2224:Lawsuits 2126:MUSCULAR 2099:DISHFIRE 2047:Dropmire 2013:Genoa II 1942:FAIRVIEW 1915:SHAMROCK 1899:Pre-1978 1894:Programs 1792:GhostNet 1606:Concepts 1461:Pine Gap 1380:R&AW 1367:Agencies 1339:Stingray 1309:Fairview 1289:Dishfire 1279:Sentient 1238:Pre-2013 1200:a series 1198:Part of 1191:See also 997:—  956:. These 868:backdoor 641:Internet 604:Internet 497:Pioneers 447:Shopping 442:Podcasts 394:Services 185:Activism 146:Internet 75:criminal 60:Internet 4452:Spyware 4361:Rootkit 4290:Malware 2761:TEMPEST 2755:(DARPA) 2343:Related 2131:Tempora 2109:ICREACH 2089:MAINWAY 2074:PINWALE 2057:Bullrun 1993:OAKSTAR 1937:BLARNEY 1910:MINARET 1905:ECHELON 1782:ECHELON 1697:Liberty 1692:Privacy 1334:Pinwale 1329:Bullrun 1299:Tempora 1274:ECHELON 1256:Systems 1233:Origins 1173:Vietnam 1157:Bahrain 1062:govware 1022:TEMPEST 1018:monitor 926:Stuxnet 899:Servers 888:spyware 835:Spyware 816:profile 637:network 602:on the 600:traffic 533:Outline 481:History 235:Privacy 215:Freedom 174:General 102:privacy 4613:Portal 4427:Malbot 4392:Botnet 4387:Adware 4292:topics 3820:  3618:  3460:  3420:. 2009 3340:26 May 3233:35-50. 3050:  2832:  2397:SIGINT 2079:MARINA 2062:MYSTIC 1920:PROMIS 1629:SIGINT 1551:China 1510:Lustre 1438:Places 1430:Mossad 1314:MYSTIC 1177:Amesys 1171:, and 971:, the 876:trojan 849:, and 619:emails 514:Guides 467:search 180:Access 130:group 126:. The 108:, the 45:, and 4179:(PDF) 4168:(PDF) 3888:(PDF) 3881:(PDF) 3857:(PDF) 3839:(PDF) 3806:(PDF) 3667:(PDF) 3660:(PDF) 3629:(PDF) 3612:(PDF) 3584:(3). 2890:(PDF) 2879:(PDF) 2553:Other 2042:PRISM 1957:Genoa 1587:U.S. 1516:U.S. 1269:PRISM 1169:Syria 1161:China 1102:The " 1085:CIPAV 1046:noise 954:CALEA 916:, or 880:CIPAV 692:Nokia 526:Index 432:Games 412:Email 400:Blogs 305:ICANN 255:Usage 96:Many 4172:IFLA 4115:2017 4094:2017 3996:2014 3970:2011 3947:2017 3788:2013 3761:2009 3675:2009 3637:2009 3616:ISBN 3559:2009 3458:ISBN 3342:2013 3283:2017 3261:2017 3220:link 3048:ISBN 2898:2009 2862:2009 2830:ISSN 2793:2014 2786:CNET 2692:NSA 2566:DGSE 2547:GCSB 2523:GCHQ 2511:CSEC 2202:FISC 2164:ECPA 2159:FISA 1675:VPNs 1545:GDPR 1494:Laws 1425:GCHQ 1405:DGSE 1400:ASIO 1344:SORM 1319:DCSN 1165:Iran 1131:and 1122:and 1090:The 882:and 659:and 598:and 315:ISOC 310:IETF 300:IANA 100:and 85:and 3828:doi 3755:(2) 3586:doi 3200:doi 2820:doi 2635:NSA 2578:BND 2535:ASD 2490:IAO 2480:DHS 2470:CIA 2460:FBI 2450:DOJ 2430:CSS 1680:TLS 1670:Tor 1566:UK 1531:EU 1420:MSS 1415:FSB 1395:CNI 1390:BND 1385:CSE 1375:NSA 1050:CPU 1015:CRT 874:or 677:FBI 673:NSA 417:Fax 295:NRO 290:IGF 158:An 4639:: 4198:. 4187:^ 4174:. 4170:. 4070:. 4051:. 3935:. 3920:^ 3911:, 3859:. 3834:. 3826:. 3812:. 3808:. 3753:II 3751:. 3747:. 3717:. 3692:. 3645:^ 3582:13 3580:. 3576:. 3550:. 3495:, 3416:. 3392:. 3380:^ 3359:. 3328:. 3316:^ 3300:. 3251:. 3238:^ 3216:}} 3212:{{ 3196:43 3194:. 3190:. 3151:^ 3139:, 3116:. 3090:. 3042:. 3016:. 2992:. 2963:. 2939:. 2881:. 2853:. 2842:^ 2828:. 2816:34 2814:. 2810:. 2784:. 2716:, 2712:, 2708:, 2704:, 2700:, 2696:: 1202:on 1167:, 1163:, 1159:, 1140:. 1072:. 987:: 928:. 912:, 845:, 841:, 837:, 780:, 694:. 671:, 625:, 621:, 41:, 4615:: 4282:e 4275:t 4268:v 4117:. 4096:. 4074:. 4055:. 4036:. 3998:. 3972:. 3949:. 3830:: 3814:4 3790:. 3763:. 3732:. 3702:. 3677:. 3639:. 3594:. 3588:: 3561:. 3535:. 3466:. 3427:. 3402:. 3374:. 3344:. 3310:. 3285:. 3263:. 3222:) 3208:. 3202:: 3126:. 3101:. 3056:. 3027:. 3002:. 2978:. 2949:. 2900:. 2864:. 2836:. 2822:: 2795:. 2607:e 2600:t 2593:v 1741:e 1734:t 1727:v 762:. 617:( 577:e 570:t 563:v 34:. 20:)

Index

Online surveillance
computer security
Surveillance
Mass surveillance
Global surveillance
computer networks
Internet
Internet traffic
social control
criminal
Total Information Awareness
high-speed surveillance computers
biometrics
Communications Assistance For Law Enforcement Act
civil rights
privacy
Reporters Without Borders
Electronic Frontier Foundation
American Civil Liberties Union
mass surveillance
Hepting v. AT&T
hacktivist
Anonymous
Internet
Visualization of Internet routing paths
Opte Project
routing paths
Access
Activism
Censorship

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

↑