2476:
717:
able to be called using a virtual assistant, the law enforcement would then be able to have access to all the information saved for the device. The device is connected to the home's internet, because of this law enforcement would be the exact location of the individual calling for law enforcement. While the virtual assistance devices are popular, many debates the lack of privacy. The devices are listening to every conversation the owner is having. Even if the owner is not talking to a virtual assistant, the device is still listening to the conversation in hopes that the owner will need assistance, as well as to gather data.
710:. They do so in order to protect the company's assets and to control public communications but most importantly, to make sure that their employees are actively working and being productive. This can emotionally affect people; this is because it can cause emotions like jealousy. A research group states "...we set out to test the prediction that feelings of jealousy lead to 'creeping' on a partner through Facebook, and that women are particularly likely to engage in partner monitoring in response to jealousy". The study shows that women can become jealous of other people when they are in an online group.
2446:
154:
2456:
2466:
2436:
1879:
1865:
1094:, formerly known as MYK-78, is a small hardware chip that the government can install into phones, designed in the nineties. It was intended to secure private communication and data by reading voice messages that are encoded and decode them. The Clipper Chip was designed during the Clinton administration to, “…protect personal safety and national security against a developing information anarchy that fosters criminals, terrorists and foreign foes.” The government portrayed it as the solution to the secret codes or
2530:
2426:
4622:
547:
2506:
2518:
2542:
522:
701:. For instance, systems described as "Web 2.0" have greatly impacted modern society. Tim O’ Reilly, who first explained the concept of "Web 2.0", stated that Web 2.0 provides communication platforms that are "user generated", with self-produced content, motivating more people to communicate with friends online. However, Internet surveillance also has a disadvantage. One researcher from
2573:
2561:
878:. This tactic has the advantage of potentially subjecting multiple computers to surveillance. Viruses often spread to thousands or millions of computers, and leave "backdoors" which are accessible over a network connection, and enable an intruder to remotely install software and execute commands. These viruses and trojans are sometimes developed by government agencies, such as
1218:
2486:
1106:" (CBDTPA) was a bill proposed in the United States Congress. CBDTPA was known as the "Security Systems and Standards Certification Act" (SSSCA) while in draft form and was killed in committee in 2002. Had CBDTPA become law, it would have prohibited technology that could be used to read digital content under copyright (such as music, video, and e-books) without
62:. This monitoring is often carried out covertly and may be completed by governments, corporations, criminal organizations, or individuals. It may or may not be legal and may or may not require authorization from a court or other independent government agencies. Computer and network surveillance programs are widespread today and almost all
1175:, countries whose governments are involved in active, intrusive surveillance of news providers, resulting in grave violations of freedom of information and human rights. Computer and network surveillance is on the increase in these countries. The report also includes a second list of "Corporate Enemies of the Internet",
863:, and/or report back activities in real-time to its operator through the Internet connection. A keylogger is an example of this type of program. Normal keylogging programs store their data on the local hard drive, but some are programmed to automatically transmit data over the network to a remote computer or Web server.
1135:
are different. Surveillance can be performed without censorship, but it is harder to engage in censorship without some forms of surveillance. And even when surveillance does not lead directly to censorship, the widespread knowledge or belief that a person, their computer, or their use of the
Internet
800:
and the search phrase used are stored in a database for up to 18 months. Google also scans the content of emails of users of its Gmail webmail service in order to create targeted advertising based on what people are talking about in their personal email correspondences. Google is, by far, the largest
716:
have become socially integrated into many people's lives. Currently, virtual assistants such as Amazon's Alexa or Apple's Siri cannot call 911 or local services. They are constantly listening for command and recording parts of conversations that will help improve algorithms. If the law enforcement is
1027:
IBM researchers have also found that, for most computer keyboards, each key emits a slightly different noise when pressed. The differences are individually identifiable under some conditions, and so it's possible to log key strokes without actually requiring logging software to run on the associated
979:
are currently investing heavily in research involving social network analysis. The intelligence community believes that the biggest threat to the U.S. comes from decentralized, leaderless, geographically dispersed groups. These types of threats are most easily countered by finding important nodes in
666:
There is far too much data gathered by these packet sniffers for human investigators to manually search through. Thus, automated
Internet surveillance computers sift through the vast amount of intercepted Internet traffic, filtering out, and reporting to investigators those bits of information which
1036:
device. As the law took into effect in
January 2016, it will now require cities to operate with new guidelines in relation to how and when law enforcement use this device. Some legislators and those holding a public office have disagreed with this technology because of the warrantless tracking, but
1031:
In 2015, lawmakers in
California passed a law prohibiting any investigative personnel in the state to force businesses to hand over digital communication without a warrant, calling this Electronic Communications Privacy Act. At the same time in California, state senator Jerry Hill introduced a bill
788:
The second component of prevention is determining the ownership of technology resources. The ownership of the firm's networks, servers, computers, files, and e-mail should be explicitly stated. There should be a distinction between an employee's personal electronic devices, which should be limited
2637:
program to preserve its ability to eavesdrop on encrypted communications by influencing and weakening encryption standards, by obtaining master encryption keys, and by gaining access to data before or after it is encrypted either by agreement, by force of law, or by computer network exploitation
992:
The purpose of the SSNA algorithms program is to extend techniques of social network analysis to assist with distinguishing potential terrorist cells from legitimate groups of people ... In order to be successful SSNA will require information on the social interactions of the majority of people
705:
said "Web 2.0 surveillance is directed at large user groups who help to hegemonically produce and reproduce surveillance by providing user-generated (self-produced) content. We can characterize Web 2.0 surveillance as mass self-surveillance". Surveillance companies monitor people while they are
772:
Safeguarding records. Federal legislation requires organizations to protect personal information. Monitoring can determine the extent of compliance with company policies and programs overseeing information security. Monitoring may also deter unlawful appropriation of personal information, and
1186:
Protection of sources is no longer just a matter of journalistic ethics. Journalists should equip themselves with a "digital survival kit" if they are exchanging sensitive information online, storing it on a computer hard-drive or mobile phone. Individuals associated with high-profile rights
1098:
keys that the age of technology created. Thus, this has raised controversy in the public, because the
Clipper Chip is thought to have been the next “Big Brother” tool. This led to the failure of the Clipper proposal, even though there have been many attempts to push the agenda.
1183:(U.S.), Gamma (UK and Germany), Hacking Team (Italy), and Trovicor (Germany), companies that sell products that are liable to be used by governments to violate human rights and freedom of information. Neither list is exhaustive and they are likely to be expanded in the future.
739:, which enables the corporation to better tailor their products and/or services to be desirable by their customers. The data can also be sold to other corporations so that they can use it for the aforementioned purpose, or it can be used for direct marketing purposes, such as
3508:
667:
are "interesting", for example, the use of certain words or phrases, visiting certain types of web sites, or communicating via email or chat with a certain individual or group. Billions of dollars per year are spent by agencies such as the
801:
Internet advertising agency—millions of sites place Google's advertising banners and links on their websites in order to earn money from visitors who click on the ads. Each page containing Google advertisements adds, reads, and modifies
768:
Preventing lawsuits. Firms can be held liable for discrimination or employee harassment in the workplace. Organizations can also be involved in infringement suits through employees that distribute copyrighted material over corporate
2763:, codename for studies of unintentional intelligence-bearing signals which, if intercepted and analyzed, may disclose the information transmitted, received, handled, or otherwise processed by any information-processing equipment
993:
around the globe. Since the
Defense Department cannot easily distinguish between peaceful citizens and terrorists, it will be necessary for them to gather data on innocent civilians as well as on potential terrorists.
809:
across all of these sites and gather information about their web surfing habits, keeping track of which sites they visit, and what they do when they are on these sites. This information, along with the information
2183:
1524:
734:
of computer activity is very common. The data collected is most often used for marketing purposes or sold to other corporations, but is also regularly shared with government agencies. It can be used as a form of
3232:
Muise, A., Christofides, E., & Demsmarais, S. (2014). " Creeping" or just information seeking? Gender differences in partner monitoring in response to jealousy on
Facebook. Personal Relationships, 21(1),
859:, and to monitor the activities of a person using the computer. A surveillance program installed on a computer can search the contents of the hard drive for suspicious data, can monitor computer use, collect
4175:
679:, for the development, purchase, implementation, and operation of systems which intercept and analyze this data, extracting only the information that is useful to law enforcement and intelligence agencies.
655:, all U.S. telecommunications providers are required to install such packet capture technology so that Federal law enforcement and intelligence agencies are able to intercept all of their customers'
491:
2722:
2363:
2565:
2229:
1595:
3608:
Social
Networking Sites and the Surveillance Society. A Critical Case Study of the Usage of studiVZ, Facebook, and MySpace by Students in Salzburg in the Context of Electronic Surveillance
905:
connections are most vulnerable to this type of attack. Another source of security cracking is employees giving out information or users using brute force tactics to guess their password.
3325:
1079:
was the first incarnation of secretly installed e-mail monitoring software installed in
Internet service providers' networks to log computer communication, including transmitted e-mails.
4022:
1103:
2910:
2353:
697:
The
Internet's rapid development has become a primary form of communication. More people are potentially subject to Internet surveillance. There are advantages and disadvantages to
683:
1559:
1784:, a signals intelligence (SIGINT) collection and analysis network operated on behalf of Australia, Canada, New Zealand, the United Kingdom, and the United States, also known as
2475:
2330:
983:
Jason Ethier of Northeastern University, in his study of modern social network analysis, said the following of the Scalable Social Network Analysis Program developed by the
2148:
784:, and business strategies is a major concern. The ease of information transmission and storage makes it imperative to monitor employee actions as part of a broader policy.
743:, where ads are targeted to the user of the search engine by analyzing their search history and emails (if they use free webmail services), which are kept in a database.
2653:
968:
953:
652:
607:
90:
3219:
3983:
1237:
3521:
2658:
1802:
825:
has openly stated that it uses data collected from consumer credit and direct marketing agencies for augmenting the profiles of individuals that it is monitoring.
4216:
1739:
1399:
153:
2510:
1247:
750:
Preventing misuse of resources. Companies can discourage unproductive personal activities such as online shopping or web surfing on company time. Monitoring
1037:
now if a city wants to use this device, it must be heard by a public hearing. Some cities have pulled out of using the StingRay such as Santa Clara County.
4472:
2697:
2455:
2282:
713:
643:
or between any networks takes the form of small chunks called packets, which are routed to their destination and assembled back into a complete message. A
2687:
2325:
2605:
1772:, a means of broadcasting files and Web pages using radio waves, allowing receivers near total immunity from traditional network surveillance techniques.
2886:
2752:
2546:
2445:
1404:
30:
This article is about monitoring of computer and network activity. For information on methods of preventing unauthorized access to computer data, see
1797:
908:
One can also physically place surveillance software on a computer by gaining entry to the place where the computer is stored and install it from a
3663:
2465:
2435:
2378:
2211:
2201:
1842:
1278:
3333:
4324:
3248:
2676:
2522:
2373:
1847:
1778:, a method to maximize the accuracy of queries from statistical databases while minimizing the chances of violating the privacy of individuals.
1759:
726:
4164:
4130:
4026:
3932:
4048:
3619:
3461:
3051:
2163:
2158:
1384:
1242:
976:
1024:, involves reading electromagnetic emanations from computing devices in order to extract data from them at distances of hundreds of meters.
1394:
2960:
2667:, a secret surveillance program by the NSA aimed at surveillance of foreign embassies and diplomatic staff, including those of NATO allies
1187:
organizations, dissident groups, protest groups, or reform groups are urged to take extra precautions to protect their online identities.
1151:
that examines the use of technology that monitors online activity and intercepts electronic communication in order to arrest journalists,
1064:. Some countries like Switzerland and Germany have a legal framework governing the use of such software. Known examples include the Swiss
4086:
2731:
2449:
2358:
2022:
1638:
1009:
With only commercially available equipment, it has been shown that it is possible to monitor computers from a distance by detecting the
299:
3389:
2624:
1544:
1419:
1358:
575:
525:
4280:
3606:
1827:
1732:
1318:
1123:
1075:
Policeware is a software designed to police citizens by monitoring the discussion and interaction of its citizens. Within the U.S.,
3158:
O'Reilly, T. (2005). What is Web 2.0: Design Patterns and Business Models for the Next Generation of Software. O’Reilly Media, 1-5.
2425:
821:
The United States government often gains access to these databases, either by producing a warrant for it, or by simply asking. The
3875:
964:
to extract useful information such as personal interests, friendships and affiliations, wants, beliefs, thoughts, and activities.
765:
Promoting adherence to policies. Online surveillance is one means of verifying employee observance of company networking policies.
686:
to more easily distinguish between peaceful citizens and terrorists. All of the technology has been allegedly installed by German
2244:
2051:
1837:
376:
3714:
3689:
3356:
4477:
2479:
2459:
2125:
1941:
1308:
855:
In addition to monitoring information sent over a computer network, there is also a way to examine data stored on a computer's
822:
309:
4146:
4647:
4304:
2742:
2598:
2534:
2027:
1919:
1817:
1232:
972:
113:
109:
4256:
Yan, W. (2019) Introduction to Intelligent Surveillance: Surveillance Data Capture, Transmission, and Analytics, Springer.
4107:
3987:
4657:
4543:
3113:
2781:
2206:
2061:
1569:
1313:
1083:
is another such application, this time running in a targeted computer in a trojan style and performing keystroke logging.
815:
381:
359:
4612:
3525:
3274:
3076:, Decision, United States Court of Appeals for the District of Columbia Circuit, 9 June 2006. Retrieved 8 September 2013.
2650:, a series of covert, and at times illegal, projects conducted by the FBI aimed at U.S. domestic political organizations
2489:
2056:
1725:
1389:
1328:
1199:
984:
668:
660:
4642:
2748:
2469:
2439:
2178:
2017:
746:
Such type of surveillance is also used to establish business purposes of monitoring, which may include the following:
339:
78:
3775:
4563:
3451:
2736:
1980:
1832:
1822:
1379:
875:
842:
327:
294:
224:
4431:
3087:
2922:
2591:
1554:
1539:
1144:
1107:
1065:
496:
366:
289:
249:
105:
4009:
3069:
1878:
1864:
4365:
4355:
3476:
2727:
2634:
2429:
1869:
1713:
1703:
1679:
1534:
1414:
1374:
644:
239:
2875:
897:
into the computer to gain access over a network. An attacker can then install surveillance software remotely.
647:
intercepts these packets, so that they may be examined and analyzed. Computer technology is needed to perform
4195:
4441:
3492:
2670:
2627:, reports about NSA and its international partners' mass surveillance of foreign nationals and U.S. citizens
2577:
2264:
1674:
1080:
1049:
941:
937:
883:
532:
486:
349:
344:
54:
is the monitoring of computer activity and data stored locally on a computer or data being transferred over
890:
installed by marketing agencies can be used to gain access through the security breaches that they create.
4492:
4319:
3817:
2368:
1353:
1338:
1033:
740:
731:
568:
219:
2485:
120:
society, with limited political and/or personal freedoms. Such fear has led to numerous lawsuits such as
4652:
4273:
3656:
3213:
2173:
1812:
1590:
777:
736:
254:
4621:
3547:
546:
4599:
4594:
4553:
4482:
4340:
2701:
2396:
2287:
1775:
1628:
1623:
1465:
1283:
1076:
1032:
making law enforcement agencies to disclose more information on their usage and information from the
867:
866:
There are multiple ways of installing such software. The most common is remote installation, using a
850:
751:
589:
451:
269:
259:
4127:
3835:
3297:
663:(VoIP) traffic. These technologies can be used both by the intelligence and for illegal activities.
73:, recognize and monitor threats or any suspicious or abnormal activity, and prevent and investigate
4548:
4165:"Trends in transition from classical censorship to Internet censorship: selected country overviews"
3908:
3822:
2806:
Jeske, Daniel R.; Stevens, Nathaniel T.; Tartakovsky, Alexander G.; Wilson, James D. (2018-04-17).
2630:
2153:
2113:
2002:
1936:
1931:
1883:
1659:
1475:
1323:
1208:
1119:
707:
282:
189:
46:
4137:, U.S. Senate bill S.2048, 107th Congress, 2nd session, 21 March 2002. Retrieved 8 September 2013.
4533:
4370:
4350:
2760:
1633:
1152:
1021:
898:
702:
698:
656:
334:
3745:"Social Network Analysis as an Approach to Combat Terrorism: Past, Present, and Future Research"
2968:
2234:
122:
4558:
4512:
4421:
4067:
3937:
3615:
3457:
3176:
Fuchs, C. (2011). Web 2.0, Presumption, and Surveillance. Surveillance & Society, 289-309.
3047:
2829:
2681:
2644:, a U.S. Federal Bureau of Investigation system to monitor email and electronic communications
1807:
1613:
1180:
949:
894:
759:
629:, etc.) be available for unimpeded, real-time monitoring by Federal law enforcement agencies.
626:
561:
466:
436:
354:
264:
184:
134:
has hacked into government websites in protest of what it considers "draconian surveillance".
131:
117:
42:
31:
2936:
2684:, a database containing metadata for hundreds of billions of telephone calls made in the U.S.
1110:(DRM) that prevented access to this material without the permission of the copyright holder.
4573:
4538:
4266:
3827:
3585:
3199:
3043:
2819:
2259:
2249:
2012:
2007:
1914:
1708:
1691:
1470:
1455:
1017:
1014:
945:
648:
636:
614:
599:
314:
234:
214:
63:
55:
4626:
4568:
4507:
4134:
3073:
2641:
2254:
1909:
1696:
1618:
1519:
1509:
1504:
1137:
921:
917:
755:
551:
446:
179:
93:, governments now possess an unprecedented ability to monitor the activities of citizens.
3625:
1060:
In German-speaking countries, spyware used or made by the government is sometimes called
4528:
4502:
4309:
3884:
2709:
2693:
2517:
2307:
1480:
957:
871:
838:
811:
632:
461:
229:
209:
204:
70:
3440:, Staff Report, U.S. Federal Trade Commission, March 2005. Retrieved 7 September 2013.
3438:"Spyware Workshop: Monitoring Software on Your OC: Spywae, Adware, and Other Software"
3437:
3204:
3187:
651:
and sift through intercepted data to look for important/useful information. Under the
4636:
4487:
4406:
4314:
3831:
3364:
2661:(CIPAV), a data gathering tool used by the U.S. Federal Bureau of Investigation (FBI)
1956:
1669:
1069:
793:
501:
456:
426:
404:
194:
4010:
Trojan Horse Resurrected: On the Legality of the Use of Government Spyware (Govware)
4426:
4345:
3722:
2239:
2093:
1854:
1785:
1764:
1686:
1664:
1445:
1128:
1095:
1091:
980:
the network, and removing them. To do this requires a detailed map of the network.
909:
806:
781:
421:
416:
159:
116:, have expressed concern that increasing surveillance of citizens will result in a
97:
86:
82:
38:
3167:
Fuchs, C. (2011). New Media, Web 2.0 and Surveillance. Sociology Compass, 134-147.
2673:, keystroke logging software developed by the U.S. Federal Bureau of Investigation
924:
to the computer. One well-known worm that uses this method of spreading itself is
3853:
1155:, and dissidents. The report includes a list of "State Enemies of the Internet",
4497:
4416:
2713:
2541:
2297:
2168:
1769:
1293:
961:
913:
802:
622:
595:
431:
244:
199:
2876:"Bigger Monster, Weaker Chains: The Growth of an American Surveillance Society"
920:. This method shares a disadvantage with hardware devices in that it requires
4456:
4436:
4401:
2850:
2705:
2647:
2292:
1951:
1753:
1450:
1303:
1132:
1041:
856:
797:
687:
371:
127:
4232:
2833:
4446:
4396:
3803:"Electromagnetic Radiation from Video Display Units: An Eavesdropping Risk?"
3140:
2717:
2529:
2496:
2348:
2302:
2103:
2083:
1997:
1968:
1946:
1654:
1485:
1409:
1348:
1263:
1217:
1010:
902:
846:
611:
1886:
as of 2007, with countries subject to the most data collection shown in red
4249:
3779:
3590:
3573:
3413:
17:
3744:
2664:
2401:
2098:
2046:
1791:
1460:
1288:
860:
640:
635:(also known as "packet sniffing") is the monitoring of data traffic on a
603:
145:
74:
59:
4451:
4360:
4289:
3662:. Northeastern University College of Computer and Information Science.
3614:. Salzburg and Vienna: Forschungsgruppe Unified Theory of Information.
2572:
2130:
2108:
2088:
2073:
1992:
1904:
1781:
1333:
1298:
1273:
1172:
1156:
925:
887:
834:
441:
163:
101:
3013:
2824:
2807:
1756:, a software system that attempts to make network activity untraceable
594:
The vast majority of computer surveillance involves the monitoring of
4411:
4391:
4386:
3961:
3136:
3066:
2560:
2505:
2078:
1429:
1176:
814:, and search engine histories, is stored by Google to use to build a
3909:"Researchers recover typed text using audio recording of keystrokes"
2911:"Anonymous hacks UK government sites over 'draconian surveillance' "
3275:"Time Alexa Takes the Stand Listening Devices Raise Privacy Issues"
2989:
4203:
2041:
1268:
1168:
1160:
1084:
1045:
879:
691:
618:
411:
304:
4258:
3186:
Anthony Denise, Celeste Campos-Castillo, Christine Horne (2017).
706:
focused on work or entertainment. Yet, employers themselves also
2913:, Emil Protalinski, ZDNet, 7 April 2012, retrieved 12 March 2013
2782:"FBI wants widespread monitoring of 'illegal' Internet activity"
1424:
1343:
1164:
399:
4262:
4200:
The Enemies of the Internet Special Edition : Surveillance
1794:, a large-scale cyber spying operation discovered in March 2009
69:
Surveillance allows governments and other agencies to maintain
3249:"Should Smart Devices Be Able to Automatically Call the Cops?"
676:
672:
4049:"The tricky issue of spyware with a badge: meet 'policeware'"
3854:"Electromagnetic Eavesdropping Risks of Flat-Panel Displays"
1052:
includes information about the instructions being executed.
3964:. Blavatnik School of Computer Science, Tel Aviv University
2723:
Spying on United Nations leaders by United States diplomats
3243:
3241:
3239:
3137:"First round in Internet war goes to Iranian intelligence"
2937:"Internet Eavesdropping: A Brave New World of Wiretapping"
1087:, deployed by the FBI, is a multi-purpose spyware/trojan.
886:. More often, however, viruses created by other people or
4128:"Consumer Broadband and Digital Television Promotion Act"
3802:
3509:"Social Engineering Fundamentals, Part I: Hacker Tactics"
948:
information from phone call records such as those in the
4237:, The Citizen Lab, University of Toronto, September 2007
3690:"Pentagon sets its sights on social networking websites"
3574:"Online Social Networking as Participatory Surveillance"
1104:
Consumer Broadband and Digital Television Promotion Act
796:
stores identifying information for each web search. An
4610:
2845:
2843:
3477:"Office workers give away passwords for a cheap pen"
2923:
Hacktivists in the frontline battle for the internet
818:
of the user to deliver better-targeted advertising.
77:
activities. With the advent of programs such as the
4582:
4521:
4465:
4379:
4333:
4297:
4190:
4188:
4234:Everyone's Guide to By-passing Internet Censorship
3390:"Every move you make, Google will be watching you"
3319:
3317:
3154:
3152:
3088:"Government funds chat room surveillance research"
2851:"Is the U.S. Turning Into a Surveillance Society?"
2812:Applied Stochastic Models in Business and Industry
4252:, Free Haven Project, accessed 16 September 2011.
3524:. Antivirus.about.com. 2014-03-03. Archived from
3357:"Debunking Google's log anonymization propaganda"
2961:"CALEA Archive -- Electronic Frontier Foundation"
2654:Communications Assistance For Law Enforcement Act
969:Defense Advanced Research Projects Agency (DARPA)
653:Communications Assistance For Law Enforcement Act
608:Communications Assistance For Law Enforcement Act
91:Communications Assistance For Law Enforcement Act
2730:, code name for information collected under the
2990:"CALEA: The Perils of Wiretapping the Internet"
2935:Diffie, Whitfield; Susan Landau (August 2008).
2659:Computer and Internet Protocol Address Verifier
1803:Internet censorship and surveillance by country
1020:. This form of computer surveillance, known as
989:
776:Safeguarding company assets. The protection of
3984:"Swiss coder publicises government spy Trojan"
3861:4th Workshop on Privacy Enhancing Technologies
3456:. Advances in Information Security. Springer.
2808:"Statistical methods for network surveillance"
2621:Surveillance by the United States government:
2331:Global surveillance disclosures (2013–present)
4274:
4163:Bitso, Constance; Fourie, Ina; Bothma, Theo.
4147:"Censorship is inseparable from surveillance"
3883:, IBM Almaden Research Center, archived from
2599:
1733:
789:and proscribed, and those owned by the firm.
569:
8:
3522:"Stuxnet: How does the Stuxnet worm spread?"
3218:: CS1 maint: multiple names: authors list (
4217:"When Secrets Aren't Safe With Journalists"
4025:. Ejpd.admin.ch. 2011-11-23. Archived from
3927:
3925:
3923:
3921:
3657:"Current Research in Social Network Theory"
3499:, 3 March 2004. Retrieved 7 September 2013.
3483:, 8 April 2003. Retrieved 7 September 2013.
952:, and internet traffic data gathered under
4281:
4267:
4259:
3715:"Is the NSA reading your MySpace profile?"
2606:
2592:
1859:
1740:
1726:
1194:
967:Many U.S. government agencies such as the
805:on each visitor's computer. These cookies
576:
562:
521:
141:
27:Monitoring of computer or network activity
3821:
3650:
3648:
3646:
3589:
3298:"F.T.C. to Review Online Ads and Privacy"
3203:
2823:
2753:Defense Advanced Research Projects Agency
606:. For example, in the United States, the
3874:Asonov, Dmitri; Agrawal, Rakesh (2004),
3383:
3381:
3018:Electronic Frontier Foundation (website)
2994:Electronic Frontier Foundation (website)
2965:Electronic Frontier Foundation (website)
2745:, an NSA electronic surveillance program
1798:List of government surveillance projects
4617:
3572:Albrechtslund, Anders (March 3, 2008).
3548:"Can Network Theory Thwart Terrorists?"
3114:"FBI turns to broad new wiretap method"
2772:
2379:Mass surveillance in the United Kingdom
1862:
1843:Mass surveillance in the United Kingdom
1646:
1605:
1579:
1493:
1437:
1366:
1255:
1224:
1206:
1149:Special report on Internet surveillance
639:. Data sent between computers over the
144:
4325:Timeline of computer viruses and worms
3355:Soghoian, Chris (September 11, 2008).
3211:
3112:McCullagh, Declan (January 30, 2007).
2688:NSA warrantless surveillance (2001–07)
2677:Mass surveillance in the United States
2374:Mass surveillance in the United States
1848:Mass surveillance in the United States
1760:Computer surveillance in the workplace
936:One common form of surveillance is to
727:Computer surveillance in the workplace
3067:American Council on Education vs. FCC
2326:2005 warrantless surveillance scandal
1044:et al., that even the high frequency
977:Department of Homeland Security (DHS)
7:
3986:. News.techworld.com. Archived from
3040:Law of Internet Security and Privacy
1114:Surveillance as an aid to censorship
3776:"Complete, Unofficial Tempest Page"
3326:"Are we addicted to being watched?"
3014:"CALEA: Frequently Asked Questions"
1639:Surveillance issues in smart cities
4181:from the original on Nov 20, 2023.
4108:"Stanford University Clipper Chip"
3774:McNamara, Joel (4 December 1999).
3511:, Sarah Granger, 18 December 2001.
3388:Joshi, Priyanki (March 21, 2009).
3296:Story, Louise (November 1, 2007).
3086:Hill, Michael (October 11, 2004).
2625:2013 mass surveillance disclosures
1359:Jindalee Operational Radar Network
1136:is under surveillance can lead to
610:mandates that all phone calls and
25:
4590:Computer and network surveillance
3907:Yang, Sarah (14 September 2005),
3546:Keefe, Patrick (March 12, 2006).
3493:"Passwords are passport to theft"
3205:10.1146/annurev-soc-060116-053643
1884:Map of global NSA data collection
1828:Mass surveillance in East Germany
1124:Internet censorship circumvention
754:is one way to reduce unnecessary
166:through a portion of the Internet
83:high-speed surveillance computers
52:Computer and network surveillance
4620:
4196:"Era of the digital mercenaries"
3841:from the original on 2004-04-05.
3324:Butler, Don (January 31, 2009).
2732:President's Surveillance Program
2571:
2559:
2540:
2528:
2516:
2504:
2484:
2474:
2464:
2454:
2444:
2434:
2424:
2023:President's Surveillance Program
1877:
1863:
1838:Mass surveillance in North Korea
1216:
682:Similar systems are now used by
545:
520:
377:Internet Message Access Protocol
152:
4023:"FAQ – Häufig gestellte Fragen"
3713:Kawamoto, Dawn (June 9, 2006).
3669:from the original on 2022-10-09
3188:"Toward a Sociology of Privacy"
2892:from the original on 2022-10-09
1040:And it has also been shown, by
823:Department of Homeland Security
89:software, and laws such as the
4305:Comparison of computer viruses
4250:"Selected Papers in Anonymity"
4068:"FBI's Web Monitoring Exposed"
4047:Jeremy Reimer (20 July 2007).
3960:Adi Shamir & Eran Tromer.
2883:American Civil Liberties Union
2855:American Civil Liberties Union
2743:Terrorist Surveillance Program
2028:Terrorist Surveillance Program
1818:Mass surveillance in Australia
973:National Security Agency (NSA)
938:create maps of social networks
758:and reduce the consumption of
114:American Civil Liberties Union
110:Electronic Frontier Foundation
81:program, technologies such as
1:
4544:Data loss prevention software
4085:Levy, Steven (12 June 1994).
4066:Hopper, D. Ian (4 May 2001).
3852:Kuhn, M.G. (26–28 May 2004).
3655:Ethier, Jason (27 May 2006).
2207:Senate Intelligence Committee
1813:China's Golden Shield Project
1570:Investigatory Powers Act 2016
901:and computers with permanent
382:Simple Mail Transfer Protocol
360:Transmission Control Protocol
3877:Keyboard Acoustic Emanations
3832:10.1016/0167-4048(85)90046-X
3743:Ressler, Steve (July 2006).
3688:Marks, Paul (June 9, 2006).
3453:Computer Viruses and Malware
3332:. canada.com. Archived from
985:Information Awareness Office
669:Information Awareness Office
661:voice over Internet protocol
2749:Total Information Awareness
2184:FISA Amendments Act of 2008
2179:Protect America Act of 2007
2018:Total Information Awareness
340:Hypertext Transfer Protocol
79:Total Information Awareness
4674:
4564:Intrusion detection system
3192:Annual Review of Sociology
3038:Kevin J. Connolly (2003).
2737:Tailored Access Operations
1981:Tailored Access Operations
1833:Mass surveillance in India
1823:Mass surveillance in China
1117:
1005:Monitoring from a distance
843:Trojan (computer security)
832:
773:potential spam or viruses.
724:
587:
328:Information infrastructure
36:
29:
4432:Privacy-invasive software
3749:Homeland Security Affairs
3605:Fuchs, Christian (2009).
3414:"Advertising and Privacy"
2354:Surveillance of reporters
2212:National Security Council
1555:National Intelligence Law
1540:Data Protection Directive
1145:Reporters Without Borders
1108:digital rights management
1066:MiniPanzer and MegaPanzer
812:from their email accounts
367:Internet service provider
106:Reporters Without Borders
4219:, Christopher Soghoian,
4012:, LISS 2013, pp. 419-428
3962:"Acoustic cryptanalysis"
3810:Computers & Security
2728:Stellar Wind (code name)
1870:National Security Agency
1714:Nothing to hide argument
1535:Data Retention Directive
645:packet capture appliance
240:Right to Internet access
4442:Rogue security software
3145:(subscription required)
2739:, NSA's hacking program
942:social networking sites
932:Social network analysis
741:targeted advertisements
708:monitor their employees
487:History of the Internet
350:Internet protocol suite
345:Internet exchange point
4478:Classic Mac OS viruses
4320:List of computer worms
2925:retrieved 17 June 2012
2633:, a highly classified
2369:Insider Threat Program
1354:Mastering the Internet
1056:Policeware and govware
1034:Stingray phone tracker
1002:
732:Corporate surveillance
721:Corporate surveillance
684:Iranian Security dept.
220:Freedom of information
4648:Computer surveillance
3801:Van Eck, Wim (1985).
3591:10.5210/fm.v13i3.2142
3450:Aycock, John (2006).
3418:Google (company page)
2174:Homeland Security Act
2068:Databases, tools etc.
1591:FISA Improvements Act
833:Further information:
778:intellectual property
737:business intelligence
4658:Espionage techniques
4600:Operation: Bot Roast
2885:. January 15, 2003.
2702:Thomas Andrews Drake
2364:UN diplomatic spying
1776:Differential privacy
1624:Secure communication
1466:Southern Cross Cable
851:Backdoor (computing)
752:employee performance
590:Signals intelligence
270:Virtual volunteering
138:Network surveillance
4549:Defensive computing
4466:By operating system
3782:on 1 September 2013
3631:on February 6, 2009
2941:Scientific American
2751:, a project of the
2631:Bullrun (code name)
2235:Hepting v. AT&T
2154:Privacy Act of 1974
1932:Upstream collection
1660:Intelligence agency
1476:Bad Aibling Station
1324:Boundless Informant
1209:Global surveillance
1153:citizen-journalists
1120:Internet censorship
940:based on data from
552:Internet portal
492:Oldest domain names
123:Hepting v. AT&T
47:Global surveillance
4643:Computer forensics
4534:Antivirus software
4380:Malware for profit
4351:Man-in-the-browser
4298:Infectious malware
4133:2012-02-14 at the
3330:The Ottawa Citizen
3094:. Associated Press
3072:2012-09-07 at the
2245:Clapper v. Amnesty
2120:GCHQ collaboration
2114:BOUNDLESSINFORMANT
1634:Call detail record
893:Another method is
829:Malicious software
714:Virtual assistants
703:Uppsala University
699:network monitoring
657:broadband Internet
335:Domain Name System
225:Internet phenomena
66:can be monitored.
4608:
4607:
4559:Internet security
4513:HyperCard viruses
4422:Keystroke logging
4412:Fraudulent dialer
4356:Man-in-the-middle
4223:, 26 October 2011
4149:, Cory Doctorow,
3938:Los Angeles Times
3863:. Toronto: 23–25.
3621:978-3-200-01428-2
3463:978-0-387-30236-2
3394:Business Standard
3053:978-0-7355-4273-0
2825:10.1002/asmb.2326
2682:NSA call database
2616:
2615:
1808:Mass surveillance
1750:
1749:
1614:Mass surveillance
1560:Cybersecurity Law
1181:Blue Coat Systems
950:NSA call database
760:network bandwidth
627:instant messaging
586:
585:
437:Instant messaging
355:Internet Protocol
265:Virtual community
162:visualization of
118:mass surveillance
56:computer networks
43:Mass surveillance
32:computer security
16:(Redirected from
4665:
4625:
4624:
4616:
4574:Network security
4539:Browser security
4283:
4276:
4269:
4260:
4238:
4230:
4224:
4214:
4208:
4207:
4202:. Archived from
4192:
4183:
4182:
4180:
4169:
4160:
4154:
4144:
4138:
4125:
4119:
4118:
4116:
4114:
4104:
4098:
4097:
4095:
4093:
4087:"New York Times"
4082:
4076:
4075:
4063:
4057:
4056:
4044:
4038:
4037:
4035:
4034:
4019:
4013:
4006:
4000:
3999:
3997:
3995:
3990:on 29 April 2014
3980:
3974:
3973:
3971:
3969:
3957:
3951:
3950:
3948:
3946:
3929:
3916:
3915:
3913:UC Berkeley News
3904:
3898:
3897:
3896:
3895:
3889:
3882:
3871:
3865:
3864:
3858:
3849:
3843:
3842:
3840:
3825:
3807:
3798:
3792:
3791:
3789:
3787:
3778:. Archived from
3771:
3765:
3764:
3762:
3760:
3740:
3734:
3733:
3731:
3730:
3721:. Archived from
3710:
3704:
3703:
3701:
3700:
3685:
3679:
3678:
3676:
3674:
3668:
3661:
3652:
3641:
3640:
3638:
3636:
3630:
3624:. Archived from
3613:
3602:
3596:
3595:
3593:
3569:
3563:
3562:
3560:
3558:
3543:
3537:
3536:
3534:
3533:
3518:
3512:
3506:
3500:
3490:
3484:
3479:, John Leyden,
3474:
3468:
3467:
3447:
3441:
3435:
3429:
3428:
3426:
3425:
3410:
3404:
3403:
3401:
3400:
3385:
3376:
3375:
3373:
3372:
3363:. Archived from
3352:
3346:
3345:
3343:
3341:
3321:
3312:
3311:
3309:
3308:
3293:
3287:
3286:
3284:
3282:
3271:
3265:
3264:
3262:
3260:
3245:
3234:
3230:
3224:
3223:
3217:
3209:
3207:
3183:
3177:
3174:
3168:
3165:
3159:
3156:
3147:
3146:
3143:, 28 June 2009.
3134:
3128:
3127:
3125:
3124:
3109:
3103:
3102:
3100:
3099:
3083:
3077:
3064:
3058:
3057:
3044:Aspen Publishers
3035:
3029:
3028:
3026:
3025:
3010:
3004:
3003:
3001:
3000:
2986:
2980:
2979:
2977:
2976:
2967:. Archived from
2957:
2951:
2950:
2948:
2947:
2932:
2926:
2920:
2914:
2908:
2902:
2901:
2899:
2897:
2891:
2880:
2872:
2866:
2865:
2863:
2861:
2847:
2838:
2837:
2827:
2803:
2797:
2796:
2794:
2792:
2777:
2608:
2601:
2594:
2576:
2575:
2564:
2563:
2545:
2544:
2533:
2532:
2521:
2520:
2509:
2508:
2488:
2478:
2468:
2458:
2448:
2438:
2428:
2260:Wikimedia v. NSA
2250:Klayman v. Obama
2149:Safe Streets Act
1881:
1867:
1860:
1742:
1735:
1728:
1709:Stop Watching Us
1580:Proposed changes
1471:Utah Data Center
1220:
1195:
1000:
960:"maps" are then
946:traffic analysis
944:as well as from
649:traffic analysis
615:internet traffic
578:
571:
564:
550:
549:
524:
523:
156:
142:
104:groups, such as
64:Internet traffic
21:
4673:
4672:
4668:
4667:
4666:
4664:
4663:
4662:
4633:
4632:
4631:
4619:
4611:
4609:
4604:
4583:Countermeasures
4578:
4569:Mobile security
4517:
4508:Palm OS viruses
4473:Android malware
4461:
4375:
4371:Zombie computer
4329:
4293:
4287:
4246:
4241:
4231:
4227:
4215:
4211:
4194:
4193:
4186:
4178:
4167:
4162:
4161:
4157:
4145:
4141:
4135:Wayback Machine
4126:
4122:
4112:
4110:
4106:
4105:
4101:
4091:
4089:
4084:
4083:
4079:
4065:
4064:
4060:
4046:
4045:
4041:
4032:
4030:
4021:
4020:
4016:
4007:
4003:
3993:
3991:
3982:
3981:
3977:
3967:
3965:
3959:
3958:
3954:
3944:
3942:
3931:
3930:
3919:
3906:
3905:
3901:
3893:
3891:
3887:
3880:
3873:
3872:
3868:
3856:
3851:
3850:
3846:
3838:
3805:
3800:
3799:
3795:
3785:
3783:
3773:
3772:
3768:
3758:
3756:
3742:
3741:
3737:
3728:
3726:
3712:
3711:
3707:
3698:
3696:
3687:
3686:
3682:
3672:
3670:
3666:
3659:
3654:
3653:
3644:
3634:
3632:
3628:
3622:
3611:
3604:
3603:
3599:
3571:
3570:
3566:
3556:
3554:
3545:
3544:
3540:
3531:
3529:
3520:
3519:
3515:
3507:
3503:
3491:
3487:
3475:
3471:
3464:
3449:
3448:
3444:
3436:
3432:
3423:
3421:
3412:
3411:
3407:
3398:
3396:
3387:
3386:
3379:
3370:
3368:
3354:
3353:
3349:
3339:
3337:
3336:on 22 July 2013
3323:
3322:
3315:
3306:
3304:
3295:
3294:
3290:
3280:
3278:
3273:
3272:
3268:
3258:
3256:
3253:How Stuff Works
3247:
3246:
3237:
3231:
3227:
3210:
3185:
3184:
3180:
3175:
3171:
3166:
3162:
3157:
3150:
3144:
3135:
3131:
3122:
3120:
3111:
3110:
3106:
3097:
3095:
3085:
3084:
3080:
3074:Wayback Machine
3065:
3061:
3054:
3046:. p. 131.
3037:
3036:
3032:
3023:
3021:
3012:
3011:
3007:
2998:
2996:
2988:
2987:
2983:
2974:
2972:
2959:
2958:
2954:
2945:
2943:
2934:
2933:
2929:
2921:
2917:
2909:
2905:
2895:
2893:
2889:
2878:
2874:
2873:
2869:
2859:
2857:
2849:
2848:
2841:
2805:
2804:
2800:
2790:
2788:
2779:
2778:
2774:
2770:
2612:
2583:
2582:
2570:
2558:
2539:
2527:
2515:
2503:
2415:
2407:
2406:
2392:
2384:
2383:
2344:
2336:
2335:
2321:
2313:
2312:
2278:
2270:
2269:
2255:ACLU v. Clapper
2225:
2217:
2216:
2197:
2189:
2188:
2144:
2136:
2135:
1895:
1887:
1868:
1746:
1619:Culture of fear
1596:Other proposals
1525:FISA amendments
1520:USA Freedom Act
1505:UKUSA Agreement
1193:
1138:self-censorship
1126:
1116:
1068:and the German
1058:
1013:emitted by the
1007:
1001:
998:
934:
922:physical access
853:
831:
756:network traffic
729:
723:
592:
582:
544:
539:
538:
515:
507:
506:
482:
474:
473:
395:
387:
386:
330:
320:
319:
285:
275:
274:
175:
167:
140:
49:
37:Main articles:
35:
28:
23:
22:
15:
12:
11:
5:
4671:
4669:
4661:
4660:
4655:
4650:
4645:
4635:
4634:
4630:
4629:
4606:
4605:
4603:
4602:
4597:
4592:
4586:
4584:
4580:
4579:
4577:
4576:
4571:
4566:
4561:
4556:
4551:
4546:
4541:
4536:
4531:
4529:Anti-keylogger
4525:
4523:
4519:
4518:
4516:
4515:
4510:
4505:
4503:Mobile malware
4500:
4495:
4490:
4485:
4480:
4475:
4469:
4467:
4463:
4462:
4460:
4459:
4454:
4449:
4444:
4439:
4434:
4429:
4424:
4419:
4414:
4409:
4404:
4399:
4394:
4389:
4383:
4381:
4377:
4376:
4374:
4373:
4368:
4363:
4358:
4353:
4348:
4343:
4337:
4335:
4331:
4330:
4328:
4327:
4322:
4317:
4312:
4310:Computer virus
4307:
4301:
4299:
4295:
4294:
4288:
4286:
4285:
4278:
4271:
4263:
4254:
4253:
4245:
4244:External links
4242:
4240:
4239:
4225:
4221:New York Times
4209:
4206:on 2013-08-31.
4184:
4155:
4153:, 2 March 2012
4139:
4120:
4099:
4077:
4058:
4039:
4014:
4001:
3975:
3952:
3917:
3899:
3866:
3844:
3823:10.1.1.35.1695
3816:(4): 269–286.
3793:
3766:
3735:
3705:
3680:
3642:
3620:
3597:
3564:
3552:New York Times
3538:
3513:
3501:
3485:
3469:
3462:
3442:
3430:
3405:
3377:
3347:
3313:
3302:New York Times
3288:
3266:
3235:
3225:
3178:
3169:
3160:
3148:
3129:
3104:
3078:
3059:
3052:
3030:
3005:
2981:
2952:
2927:
2915:
2903:
2867:
2839:
2818:(4): 425–445.
2798:
2780:Anne Broache.
2771:
2769:
2766:
2765:
2764:
2758:
2757:
2756:
2746:
2740:
2734:
2725:
2720:
2710:Edward Snowden
2698:William Binney
2694:whistleblowers
2690:
2685:
2679:
2674:
2668:
2662:
2656:
2651:
2645:
2639:
2628:
2614:
2613:
2611:
2610:
2603:
2596:
2588:
2585:
2584:
2581:
2580:
2568:
2555:
2554:
2550:
2549:
2537:
2525:
2513:
2500:
2499:
2493:
2492:
2482:
2472:
2462:
2452:
2442:
2432:
2421:
2420:
2416:
2413:
2412:
2409:
2408:
2405:
2404:
2399:
2393:
2390:
2389:
2386:
2385:
2382:
2381:
2376:
2371:
2366:
2361:
2356:
2351:
2345:
2342:
2341:
2338:
2337:
2334:
2333:
2328:
2322:
2319:
2318:
2315:
2314:
2311:
2310:
2308:Edward Snowden
2305:
2300:
2295:
2290:
2285:
2283:William Binney
2279:
2277:Whistleblowers
2276:
2275:
2272:
2271:
2268:
2267:
2262:
2257:
2252:
2247:
2242:
2237:
2232:
2226:
2223:
2222:
2219:
2218:
2215:
2214:
2209:
2204:
2198:
2195:
2194:
2191:
2190:
2187:
2186:
2181:
2176:
2171:
2166:
2161:
2156:
2151:
2145:
2142:
2141:
2138:
2137:
2134:
2133:
2128:
2122:
2121:
2117:
2116:
2111:
2106:
2101:
2096:
2091:
2086:
2081:
2076:
2070:
2069:
2065:
2064:
2059:
2054:
2049:
2044:
2038:
2037:
2033:
2032:
2031:
2030:
2020:
2015:
2010:
2005:
2000:
1995:
1989:
1988:
1984:
1983:
1977:
1976:
1972:
1971:
1965:
1964:
1960:
1959:
1954:
1949:
1944:
1939:
1934:
1928:
1927:
1923:
1922:
1917:
1912:
1907:
1901:
1900:
1896:
1893:
1892:
1889:
1888:
1882:
1874:
1873:
1858:
1857:
1852:
1851:
1850:
1845:
1840:
1835:
1830:
1825:
1820:
1815:
1805:
1800:
1795:
1789:
1779:
1773:
1767:
1762:
1757:
1748:
1747:
1745:
1744:
1737:
1730:
1722:
1719:
1718:
1717:
1716:
1711:
1706:
1701:
1700:
1699:
1694:
1684:
1683:
1682:
1677:
1672:
1662:
1657:
1649:
1648:
1647:Related topics
1644:
1643:
1642:
1641:
1636:
1631:
1626:
1621:
1616:
1608:
1607:
1603:
1602:
1601:
1600:
1599:
1598:
1593:
1582:
1581:
1577:
1576:
1575:
1574:
1573:
1572:
1564:
1563:
1562:
1557:
1549:
1548:
1547:
1542:
1537:
1529:
1528:
1527:
1522:
1514:
1513:
1512:
1507:
1496:
1495:
1491:
1490:
1489:
1488:
1483:
1481:Dagger Complex
1478:
1473:
1468:
1463:
1458:
1453:
1448:
1440:
1439:
1435:
1434:
1433:
1432:
1427:
1422:
1417:
1412:
1407:
1402:
1397:
1392:
1387:
1382:
1377:
1369:
1368:
1364:
1363:
1362:
1361:
1356:
1351:
1346:
1341:
1336:
1331:
1326:
1321:
1316:
1311:
1306:
1301:
1296:
1291:
1286:
1281:
1276:
1271:
1266:
1258:
1257:
1253:
1252:
1251:
1250:
1245:
1240:
1235:
1227:
1226:
1222:
1221:
1213:
1212:
1204:
1203:
1192:
1189:
1143:In March 2013
1115:
1112:
1057:
1054:
1006:
1003:
996:
958:social network
933:
930:
872:computer virus
839:Computer virus
830:
827:
807:track the user
792:For instance,
786:
785:
774:
770:
766:
763:
722:
719:
633:Packet capture
584:
583:
581:
580:
573:
566:
558:
555:
554:
541:
540:
537:
536:
529:
516:
513:
512:
509:
508:
505:
504:
499:
494:
489:
483:
480:
479:
476:
475:
472:
471:
470:
469:
462:World Wide Web
459:
454:
449:
444:
439:
434:
429:
424:
419:
414:
409:
408:
407:
396:
393:
392:
389:
388:
385:
384:
379:
374:
369:
364:
363:
362:
357:
347:
342:
337:
331:
326:
325:
322:
321:
318:
317:
312:
307:
302:
297:
292:
286:
281:
280:
277:
276:
273:
272:
267:
262:
257:
252:
247:
242:
237:
232:
230:Net neutrality
227:
222:
217:
212:
210:Digital rights
207:
205:Digital divide
202:
197:
192:
187:
182:
176:
173:
172:
169:
168:
157:
149:
148:
139:
136:
71:social control
26:
24:
14:
13:
10:
9:
6:
4:
3:
2:
4670:
4659:
4656:
4654:
4651:
4649:
4646:
4644:
4641:
4640:
4638:
4628:
4623:
4618:
4614:
4601:
4598:
4596:
4593:
4591:
4588:
4587:
4585:
4581:
4575:
4572:
4570:
4567:
4565:
4562:
4560:
4557:
4555:
4552:
4550:
4547:
4545:
4542:
4540:
4537:
4535:
4532:
4530:
4527:
4526:
4524:
4520:
4514:
4511:
4509:
4506:
4504:
4501:
4499:
4496:
4494:
4493:MacOS malware
4491:
4489:
4488:Linux malware
4486:
4484:
4481:
4479:
4476:
4474:
4471:
4470:
4468:
4464:
4458:
4455:
4453:
4450:
4448:
4445:
4443:
4440:
4438:
4435:
4433:
4430:
4428:
4425:
4423:
4420:
4418:
4415:
4413:
4410:
4408:
4407:Form grabbing
4405:
4403:
4400:
4398:
4395:
4393:
4390:
4388:
4385:
4384:
4382:
4378:
4372:
4369:
4367:
4364:
4362:
4359:
4357:
4354:
4352:
4349:
4347:
4344:
4342:
4339:
4338:
4336:
4332:
4326:
4323:
4321:
4318:
4316:
4315:Computer worm
4313:
4311:
4308:
4306:
4303:
4302:
4300:
4296:
4291:
4284:
4279:
4277:
4272:
4270:
4265:
4264:
4261:
4257:
4251:
4248:
4247:
4243:
4236:
4235:
4229:
4226:
4222:
4218:
4213:
4210:
4205:
4201:
4197:
4191:
4189:
4185:
4177:
4173:
4166:
4159:
4156:
4152:
4148:
4143:
4140:
4136:
4132:
4129:
4124:
4121:
4109:
4103:
4100:
4088:
4081:
4078:
4073:
4069:
4062:
4059:
4054:
4050:
4043:
4040:
4029:on 2013-05-06
4028:
4024:
4018:
4015:
4011:
4005:
4002:
3989:
3985:
3979:
3976:
3963:
3956:
3953:
3940:
3939:
3934:
3928:
3926:
3924:
3922:
3918:
3914:
3910:
3903:
3900:
3890:on 2012-02-27
3886:
3879:
3878:
3870:
3867:
3862:
3855:
3848:
3845:
3837:
3833:
3829:
3824:
3819:
3815:
3811:
3804:
3797:
3794:
3781:
3777:
3770:
3767:
3754:
3750:
3746:
3739:
3736:
3725:on 2012-07-20
3724:
3720:
3716:
3709:
3706:
3695:
3694:New Scientist
3691:
3684:
3681:
3665:
3658:
3651:
3649:
3647:
3643:
3627:
3623:
3617:
3610:
3609:
3601:
3598:
3592:
3587:
3583:
3579:
3575:
3568:
3565:
3553:
3549:
3542:
3539:
3528:on 2014-04-15
3527:
3523:
3517:
3514:
3510:
3505:
3502:
3498:
3494:
3489:
3486:
3482:
3478:
3473:
3470:
3465:
3459:
3455:
3454:
3446:
3443:
3439:
3434:
3431:
3419:
3415:
3409:
3406:
3395:
3391:
3384:
3382:
3378:
3367:on 2011-04-29
3366:
3362:
3358:
3351:
3348:
3335:
3331:
3327:
3320:
3318:
3314:
3303:
3299:
3292:
3289:
3276:
3270:
3267:
3254:
3250:
3244:
3242:
3240:
3236:
3229:
3226:
3221:
3215:
3206:
3201:
3197:
3193:
3189:
3182:
3179:
3173:
3170:
3164:
3161:
3155:
3153:
3149:
3142:
3138:
3133:
3130:
3119:
3115:
3108:
3105:
3093:
3089:
3082:
3079:
3075:
3071:
3068:
3063:
3060:
3055:
3049:
3045:
3041:
3034:
3031:
3019:
3015:
3009:
3006:
2995:
2991:
2985:
2982:
2971:on 2009-05-03
2970:
2966:
2962:
2956:
2953:
2942:
2938:
2931:
2928:
2924:
2919:
2916:
2912:
2907:
2904:
2888:
2884:
2877:
2871:
2868:
2856:
2852:
2846:
2844:
2840:
2835:
2831:
2826:
2821:
2817:
2813:
2809:
2802:
2799:
2787:
2783:
2776:
2773:
2767:
2762:
2759:
2754:
2750:
2747:
2744:
2741:
2738:
2735:
2733:
2729:
2726:
2724:
2721:
2719:
2715:
2711:
2707:
2703:
2699:
2695:
2691:
2689:
2686:
2683:
2680:
2678:
2675:
2672:
2671:Magic Lantern
2669:
2666:
2663:
2660:
2657:
2655:
2652:
2649:
2646:
2643:
2640:
2636:
2632:
2629:
2626:
2623:
2622:
2620:
2619:
2618:
2609:
2604:
2602:
2597:
2595:
2590:
2589:
2587:
2586:
2579:
2574:
2569:
2567:
2562:
2557:
2556:
2552:
2551:
2548:
2543:
2538:
2536:
2531:
2526:
2524:
2519:
2514:
2512:
2507:
2502:
2501:
2498:
2495:
2494:
2491:
2487:
2483:
2481:
2477:
2473:
2471:
2467:
2463:
2461:
2457:
2453:
2451:
2447:
2443:
2441:
2437:
2433:
2431:
2427:
2423:
2422:
2419:United States
2418:
2417:
2414:Collaboration
2411:
2410:
2403:
2400:
2398:
2395:
2394:
2388:
2387:
2380:
2377:
2375:
2372:
2370:
2367:
2365:
2362:
2360:
2359:Mail tracking
2357:
2355:
2352:
2350:
2347:
2346:
2340:
2339:
2332:
2329:
2327:
2324:
2323:
2317:
2316:
2309:
2306:
2304:
2301:
2299:
2296:
2294:
2291:
2289:
2286:
2284:
2281:
2280:
2274:
2273:
2266:
2263:
2261:
2258:
2256:
2253:
2251:
2248:
2246:
2243:
2241:
2238:
2236:
2233:
2231:
2228:
2227:
2221:
2220:
2213:
2210:
2208:
2205:
2203:
2200:
2199:
2193:
2192:
2185:
2182:
2180:
2177:
2175:
2172:
2170:
2167:
2165:
2162:
2160:
2157:
2155:
2152:
2150:
2147:
2146:
2140:
2139:
2132:
2129:
2127:
2124:
2123:
2119:
2118:
2115:
2112:
2110:
2107:
2105:
2102:
2100:
2097:
2095:
2092:
2090:
2087:
2085:
2082:
2080:
2077:
2075:
2072:
2071:
2067:
2066:
2063:
2060:
2058:
2055:
2053:
2050:
2048:
2045:
2043:
2040:
2039:
2035:
2034:
2029:
2026:
2025:
2024:
2021:
2019:
2016:
2014:
2011:
2009:
2006:
2004:
2001:
1999:
1996:
1994:
1991:
1990:
1986:
1985:
1982:
1979:
1978:
1974:
1973:
1970:
1967:
1966:
1962:
1961:
1958:
1955:
1953:
1950:
1948:
1945:
1943:
1940:
1938:
1935:
1933:
1930:
1929:
1925:
1924:
1921:
1918:
1916:
1913:
1911:
1908:
1906:
1903:
1902:
1898:
1897:
1891:
1890:
1885:
1880:
1876:
1875:
1871:
1866:
1861:
1856:
1853:
1849:
1846:
1844:
1841:
1839:
1836:
1834:
1831:
1829:
1826:
1824:
1821:
1819:
1816:
1814:
1811:
1810:
1809:
1806:
1804:
1801:
1799:
1796:
1793:
1790:
1788:and Five Eyes
1787:
1783:
1780:
1777:
1774:
1771:
1768:
1766:
1763:
1761:
1758:
1755:
1752:
1751:
1743:
1738:
1736:
1731:
1729:
1724:
1723:
1721:
1720:
1715:
1712:
1710:
1707:
1705:
1702:
1698:
1695:
1693:
1690:
1689:
1688:
1685:
1681:
1678:
1676:
1673:
1671:
1668:
1667:
1666:
1663:
1661:
1658:
1656:
1653:
1652:
1651:
1650:
1645:
1640:
1637:
1635:
1632:
1630:
1627:
1625:
1622:
1620:
1617:
1615:
1612:
1611:
1610:
1609:
1604:
1597:
1594:
1592:
1589:
1588:
1586:
1585:
1584:
1583:
1578:
1571:
1568:
1567:
1565:
1561:
1558:
1556:
1553:
1552:
1550:
1546:
1543:
1541:
1538:
1536:
1533:
1532:
1530:
1526:
1523:
1521:
1518:
1517:
1515:
1511:
1508:
1506:
1503:
1502:
1500:
1499:
1498:
1497:
1492:
1487:
1484:
1482:
1479:
1477:
1474:
1472:
1469:
1467:
1464:
1462:
1459:
1457:
1454:
1452:
1449:
1447:
1444:
1443:
1442:
1441:
1436:
1431:
1428:
1426:
1423:
1421:
1418:
1416:
1413:
1411:
1408:
1406:
1403:
1401:
1398:
1396:
1393:
1391:
1388:
1386:
1383:
1381:
1378:
1376:
1373:
1372:
1371:
1370:
1365:
1360:
1357:
1355:
1352:
1350:
1347:
1345:
1342:
1340:
1337:
1335:
1332:
1330:
1327:
1325:
1322:
1320:
1317:
1315:
1312:
1310:
1307:
1305:
1302:
1300:
1297:
1295:
1292:
1290:
1287:
1285:
1282:
1280:
1277:
1275:
1272:
1270:
1267:
1265:
1262:
1261:
1260:
1259:
1254:
1249:
1246:
1244:
1241:
1239:
1236:
1234:
1231:
1230:
1229:
1228:
1223:
1219:
1215:
1214:
1211:
1210:
1205:
1201:
1197:
1196:
1190:
1188:
1184:
1182:
1178:
1174:
1170:
1166:
1162:
1158:
1154:
1150:
1146:
1141:
1139:
1134:
1130:
1125:
1121:
1113:
1111:
1109:
1105:
1100:
1097:
1096:cryptographic
1093:
1088:
1086:
1082:
1081:Magic Lantern
1078:
1073:
1071:
1070:R2D2 (trojan)
1067:
1063:
1055:
1053:
1051:
1048:emitted by a
1047:
1043:
1038:
1035:
1029:
1025:
1023:
1019:
1016:
1012:
1004:
995:
994:
988:
986:
981:
978:
974:
970:
965:
963:
959:
955:
951:
947:
943:
939:
931:
929:
927:
923:
919:
915:
911:
906:
904:
900:
896:
891:
889:
885:
884:Magic Lantern
881:
877:
873:
870:created by a
869:
864:
862:
858:
852:
848:
844:
840:
836:
828:
826:
824:
819:
817:
813:
808:
804:
799:
795:
794:Google Search
790:
783:
782:trade secrets
779:
775:
771:
767:
764:
761:
757:
753:
749:
748:
747:
744:
742:
738:
733:
728:
720:
718:
715:
711:
709:
704:
700:
695:
693:
689:
685:
680:
678:
674:
670:
664:
662:
658:
654:
650:
646:
642:
638:
634:
630:
628:
624:
620:
616:
613:
609:
605:
601:
597:
596:personal data
591:
579:
574:
572:
567:
565:
560:
559:
557:
556:
553:
548:
543:
542:
535:
534:
530:
528:
527:
518:
517:
511:
510:
503:
502:Protocol Wars
500:
498:
495:
493:
490:
488:
485:
484:
478:
477:
468:
465:
464:
463:
460:
458:
457:Voice over IP
455:
453:
450:
448:
445:
443:
440:
438:
435:
433:
430:
428:
427:File transfer
425:
423:
420:
418:
415:
413:
410:
406:
405:Microblogging
403:
402:
401:
398:
397:
391:
390:
383:
380:
378:
375:
373:
370:
368:
365:
361:
358:
356:
353:
352:
351:
348:
346:
343:
341:
338:
336:
333:
332:
329:
324:
323:
316:
313:
311:
308:
306:
303:
301:
298:
296:
293:
291:
288:
287:
284:
279:
278:
271:
268:
266:
263:
261:
258:
256:
253:
251:
248:
246:
243:
241:
238:
236:
233:
231:
228:
226:
223:
221:
218:
216:
213:
211:
208:
206:
203:
201:
198:
196:
195:Data activism
193:
191:
188:
186:
183:
181:
178:
177:
171:
170:
165:
164:routing paths
161:
155:
151:
150:
147:
143:
137:
135:
133:
129:
125:
124:
119:
115:
111:
107:
103:
99:
94:
92:
88:
84:
80:
76:
72:
67:
65:
61:
57:
53:
48:
44:
40:
33:
19:
4653:Surveillance
4589:
4366:Trojan horse
4346:Clickjacking
4255:
4233:
4228:
4220:
4212:
4204:the original
4199:
4171:
4158:
4151:The Guardian
4150:
4142:
4123:
4113:November 10,
4111:. Retrieved
4102:
4092:November 10,
4090:. Retrieved
4080:
4071:
4061:
4053:Ars Technica
4052:
4042:
4031:. Retrieved
4027:the original
4017:
4008:Basil Cupa,
4004:
3992:. Retrieved
3988:the original
3978:
3966:. Retrieved
3955:
3945:November 10,
3943:. Retrieved
3941:. 2017-08-27
3936:
3912:
3902:
3892:, retrieved
3885:the original
3876:
3869:
3860:
3847:
3813:
3809:
3796:
3784:. Retrieved
3780:the original
3769:
3757:. Retrieved
3752:
3748:
3738:
3727:. Retrieved
3723:the original
3718:
3708:
3697:. Retrieved
3693:
3683:
3671:. Retrieved
3633:. Retrieved
3626:the original
3607:
3600:
3581:
3578:First Monday
3577:
3567:
3555:. Retrieved
3551:
3541:
3530:. Retrieved
3526:the original
3516:
3504:
3497:The Register
3496:
3488:
3481:The Register
3480:
3472:
3452:
3445:
3433:
3422:. Retrieved
3417:
3408:
3397:. Retrieved
3393:
3369:. Retrieved
3365:the original
3360:
3350:
3338:. Retrieved
3334:the original
3329:
3305:. Retrieved
3301:
3291:
3281:November 10,
3279:. Retrieved
3277:. 4 May 2017
3269:
3259:November 10,
3257:. Retrieved
3255:. 2017-07-18
3252:
3228:
3214:cite journal
3195:
3191:
3181:
3172:
3163:
3132:
3121:. Retrieved
3117:
3107:
3096:. Retrieved
3091:
3081:
3062:
3039:
3033:
3022:. Retrieved
3020:. 2007-09-20
3017:
3008:
2997:. Retrieved
2993:
2984:
2973:. Retrieved
2969:the original
2964:
2955:
2944:. Retrieved
2940:
2930:
2918:
2906:
2894:. Retrieved
2882:
2870:
2858:. Retrieved
2854:
2815:
2811:
2801:
2789:. Retrieved
2785:
2775:
2617:
2288:Thomas Drake
2265:US v. Moalin
2240:Jewel v. NSA
2196:Institutions
2094:TRAFFICTHIEF
1872:surveillance
1855:Surveillance
1786:AUSCANNZUKUS
1765:Cyber spying
1687:Human rights
1665:Cryptography
1456:Menwith Hill
1446:The Doughnut
1243:2013–present
1207:
1185:
1148:
1142:
1129:Surveillance
1127:
1101:
1092:Clipper Chip
1089:
1074:
1061:
1059:
1039:
1030:
1026:
1008:
999:Jason Ethier
991:
990:
982:
966:
935:
910:compact disc
907:
892:
865:
854:
820:
791:
787:
745:
730:
712:
696:
690:and Finnish
681:
665:
631:
593:
531:
519:
422:File sharing
160:Opte Project
121:
98:civil rights
95:
68:
58:such as the
51:
50:
39:Surveillance
4498:Macro virus
4483:iOS malware
4457:Web threats
4417:Infostealer
4334:Concealment
3786:7 September
3198:: 249–269.
2714:Thomas Tamm
2320:Publication
2298:Thomas Tamm
2230:ACLU v. NSA
2169:Patriot Act
2143:Legislation
2003:Trailblazer
1770:Datacasting
1294:Stone Ghost
1225:Disclosures
914:floppy disk
623:web traffic
260:Vigilantism
245:Slacktivism
4637:Categories
4522:Protection
4437:Ransomware
4402:Fleeceware
4033:2014-05-17
3968:1 November
3933:"LA Times"
3894:2013-09-08
3729:2009-03-16
3699:2009-03-16
3532:2014-05-17
3424:2009-03-21
3399:2009-03-21
3371:2009-03-21
3307:2009-03-17
3123:2009-03-13
3118:ZDNet News
3098:2009-03-19
3024:2009-03-14
2999:2009-03-14
2975:2009-03-14
2946:2009-03-13
2768:References
2706:Mark Klein
2648:COINTELPRO
2293:Mark Klein
2036:Since 2007
2008:Turbulence
1987:Since 2001
1975:Since 1998
1963:Since 1990
1952:ThinThread
1926:Since 1978
1754:Anonymizer
1704:Satellites
1501:Five Eyes
1451:Fort Meade
1304:Frenchelon
1179:(France),
1133:censorship
1118:See also:
1042:Adi Shamir
1028:computer.
975:, and the
962:data mined
918:thumbdrive
895:"cracking"
857:hard drive
798:IP address
725:See also:
688:Siemens AG
675:, and the
588:See also:
452:Television
372:IP address
283:Governance
190:Censorship
128:hacktivist
112:, and the
87:biometrics
18:Policeware
4447:Scareware
4397:Crimeware
3818:CiteSeerX
3759:March 14,
3719:CNET News
3635:March 14,
3361:CNET News
3141:Debkafile
3092:USA Today
2896:March 13,
2860:March 13,
2834:1524-1904
2718:Russ Tice
2642:Carnivore
2638:(hacking)
2497:Five Eyes
2349:Cablegate
2303:Russ Tice
2104:XKeyscore
2084:Main Core
2052:Stateroom
1998:STORMBREW
1969:RAMPART-A
1947:Main Core
1655:Espionage
1486:GCHQ Bude
1410:Five Eyes
1349:RAMPART-A
1284:Carnivore
1264:XKeyscore
1248:Reactions
1147:issued a
1077:Carnivore
1011:radiation
903:broadband
861:passwords
847:Keylogger
803:"cookies"
769:networks.
612:broadband
250:Sociology
200:Democracy
132:Anonymous
4627:Internet
4595:Honeypot
4554:Firewall
4341:Backdoor
4176:Archived
4131:Archived
4072:ABC News
3994:25 March
3836:Archived
3673:15 March
3664:Archived
3557:14 March
3070:Archived
2887:Archived
2791:25 March
2665:Dropmire
2440:CYBERCOM
2402:Metadata
2391:Concepts
2224:Lawsuits
2126:MUSCULAR
2099:DISHFIRE
2047:Dropmire
2013:Genoa II
1942:FAIRVIEW
1915:SHAMROCK
1899:Pre-1978
1894:Programs
1792:GhostNet
1606:Concepts
1461:Pine Gap
1380:R&AW
1367:Agencies
1339:Stingray
1309:Fairview
1289:Dishfire
1279:Sentient
1238:Pre-2013
1200:a series
1198:Part of
1191:See also
997:—
956:. These
868:backdoor
641:Internet
604:Internet
497:Pioneers
447:Shopping
442:Podcasts
394:Services
185:Activism
146:Internet
75:criminal
60:Internet
4452:Spyware
4361:Rootkit
4290:Malware
2761:TEMPEST
2755:(DARPA)
2343:Related
2131:Tempora
2109:ICREACH
2089:MAINWAY
2074:PINWALE
2057:Bullrun
1993:OAKSTAR
1937:BLARNEY
1910:MINARET
1905:ECHELON
1782:ECHELON
1697:Liberty
1692:Privacy
1334:Pinwale
1329:Bullrun
1299:Tempora
1274:ECHELON
1256:Systems
1233:Origins
1173:Vietnam
1157:Bahrain
1062:govware
1022:TEMPEST
1018:monitor
926:Stuxnet
899:Servers
888:spyware
835:Spyware
816:profile
637:network
602:on the
600:traffic
533:Outline
481:History
235:Privacy
215:Freedom
174:General
102:privacy
4613:Portal
4427:Malbot
4392:Botnet
4387:Adware
4292:topics
3820:
3618:
3460:
3420:. 2009
3340:26 May
3233:35-50.
3050:
2832:
2397:SIGINT
2079:MARINA
2062:MYSTIC
1920:PROMIS
1629:SIGINT
1551:China
1510:Lustre
1438:Places
1430:Mossad
1314:MYSTIC
1177:Amesys
1171:, and
971:, the
876:trojan
849:, and
619:emails
514:Guides
467:search
180:Access
130:group
126:. The
108:, the
45:, and
4179:(PDF)
4168:(PDF)
3888:(PDF)
3881:(PDF)
3857:(PDF)
3839:(PDF)
3806:(PDF)
3667:(PDF)
3660:(PDF)
3629:(PDF)
3612:(PDF)
3584:(3).
2890:(PDF)
2879:(PDF)
2553:Other
2042:PRISM
1957:Genoa
1587:U.S.
1516:U.S.
1269:PRISM
1169:Syria
1161:China
1102:The "
1085:CIPAV
1046:noise
954:CALEA
916:, or
880:CIPAV
692:Nokia
526:Index
432:Games
412:Email
400:Blogs
305:ICANN
255:Usage
96:Many
4172:IFLA
4115:2017
4094:2017
3996:2014
3970:2011
3947:2017
3788:2013
3761:2009
3675:2009
3637:2009
3616:ISBN
3559:2009
3458:ISBN
3342:2013
3283:2017
3261:2017
3220:link
3048:ISBN
2898:2009
2862:2009
2830:ISSN
2793:2014
2786:CNET
2692:NSA
2566:DGSE
2547:GCSB
2523:GCHQ
2511:CSEC
2202:FISC
2164:ECPA
2159:FISA
1675:VPNs
1545:GDPR
1494:Laws
1425:GCHQ
1405:DGSE
1400:ASIO
1344:SORM
1319:DCSN
1165:Iran
1131:and
1122:and
1090:The
882:and
659:and
598:and
315:ISOC
310:IETF
300:IANA
100:and
85:and
3828:doi
3755:(2)
3586:doi
3200:doi
2820:doi
2635:NSA
2578:BND
2535:ASD
2490:IAO
2480:DHS
2470:CIA
2460:FBI
2450:DOJ
2430:CSS
1680:TLS
1670:Tor
1566:UK
1531:EU
1420:MSS
1415:FSB
1395:CNI
1390:BND
1385:CSE
1375:NSA
1050:CPU
1015:CRT
874:or
677:FBI
673:NSA
417:Fax
295:NRO
290:IGF
158:An
4639::
4198:.
4187:^
4174:.
4170:.
4070:.
4051:.
3935:.
3920:^
3911:,
3859:.
3834:.
3826:.
3812:.
3808:.
3753:II
3751:.
3747:.
3717:.
3692:.
3645:^
3582:13
3580:.
3576:.
3550:.
3495:,
3416:.
3392:.
3380:^
3359:.
3328:.
3316:^
3300:.
3251:.
3238:^
3216:}}
3212:{{
3196:43
3194:.
3190:.
3151:^
3139:,
3116:.
3090:.
3042:.
3016:.
2992:.
2963:.
2939:.
2881:.
2853:.
2842:^
2828:.
2816:34
2814:.
2810:.
2784:.
2716:,
2712:,
2708:,
2704:,
2700:,
2696::
1202:on
1167:,
1163:,
1159:,
1140:.
1072:.
987::
928:.
912:,
845:,
841:,
837:,
780:,
694:.
671:,
625:,
621:,
41:,
4615::
4282:e
4275:t
4268:v
4117:.
4096:.
4074:.
4055:.
4036:.
3998:.
3972:.
3949:.
3830::
3814:4
3790:.
3763:.
3732:.
3702:.
3677:.
3639:.
3594:.
3588::
3561:.
3535:.
3466:.
3427:.
3402:.
3374:.
3344:.
3310:.
3285:.
3263:.
3222:)
3208:.
3202::
3126:.
3101:.
3056:.
3027:.
3002:.
2978:.
2949:.
2900:.
2864:.
2836:.
2822::
2795:.
2607:e
2600:t
2593:v
1741:e
1734:t
1727:v
762:.
617:(
577:e
570:t
563:v
34:.
20:)
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.