CINXE.COM

Computer and network surveillance - Wikipedia

<!DOCTYPE html> <html class="client-nojs vector-feature-language-in-header-enabled vector-feature-language-in-main-page-header-disabled vector-feature-sticky-header-disabled vector-feature-page-tools-pinned-disabled vector-feature-toc-pinned-clientpref-1 vector-feature-main-menu-pinned-disabled vector-feature-limited-width-clientpref-1 vector-feature-limited-width-content-enabled vector-feature-custom-font-size-clientpref-1 vector-feature-appearance-pinned-clientpref-1 vector-feature-night-mode-enabled skin-theme-clientpref-day vector-toc-available" lang="en" dir="ltr"> <head> <meta charset="UTF-8"> <title>Computer and network surveillance - Wikipedia</title> <script>(function(){var className="client-js vector-feature-language-in-header-enabled vector-feature-language-in-main-page-header-disabled vector-feature-sticky-header-disabled vector-feature-page-tools-pinned-disabled vector-feature-toc-pinned-clientpref-1 vector-feature-main-menu-pinned-disabled vector-feature-limited-width-clientpref-1 vector-feature-limited-width-content-enabled vector-feature-custom-font-size-clientpref-1 vector-feature-appearance-pinned-clientpref-1 vector-feature-night-mode-enabled skin-theme-clientpref-day vector-toc-available";var cookie=document.cookie.match(/(?:^|; )enwikimwclientpreferences=([^;]+)/);if(cookie){cookie[1].split('%2C').forEach(function(pref){className=className.replace(new RegExp('(^| )'+pref.replace(/-clientpref-\w+$|[^\w-]+/g,'')+'-clientpref-\\w+( |$)'),'$1'+pref+'$2');});}document.documentElement.className=className;}());RLCONF={"wgBreakFrames":false,"wgSeparatorTransformTable":["",""],"wgDigitTransformTable":["",""],"wgDefaultDateFormat":"dmy", "wgMonthNames":["","January","February","March","April","May","June","July","August","September","October","November","December"],"wgRequestId":"eae08b31-59d9-46c1-b6ae-4e7b51c9c46d","wgCanonicalNamespace":"","wgCanonicalSpecialPageName":false,"wgNamespaceNumber":0,"wgPageName":"Computer_and_network_surveillance","wgTitle":"Computer and network surveillance","wgCurRevisionId":1253177936,"wgRevisionId":1253177936,"wgArticleId":91256,"wgIsArticle":true,"wgIsRedirect":false,"wgAction":"view","wgUserName":null,"wgUserGroups":["*"],"wgCategories":["Webarchive template wayback links","Pages containing links to subscription-only content","CS1 maint: multiple names: authors list","All articles with dead external links","Articles with dead external links from July 2019","Articles with permanently dead external links","Articles with short description","Short description is different from Wikidata","Articles containing potentially dated statements from 2007", "All articles containing potentially dated statements","Computer forensics","Computer surveillance","Surveillance","Espionage techniques"],"wgPageViewLanguage":"en","wgPageContentLanguage":"en","wgPageContentModel":"wikitext","wgRelevantPageName":"Computer_and_network_surveillance","wgRelevantArticleId":91256,"wgIsProbablyEditable":true,"wgRelevantPageIsProbablyEditable":true,"wgRestrictionEdit":[],"wgRestrictionMove":[],"wgNoticeProject":"wikipedia","wgCiteReferencePreviewsActive":false,"wgFlaggedRevsParams":{"tags":{"status":{"levels":1}}},"wgMediaViewerOnClick":true,"wgMediaViewerEnabledByDefault":true,"wgPopupsFlags":0,"wgVisualEditor":{"pageLanguageCode":"en","pageLanguageDir":"ltr","pageVariantFallbacks":"en"},"wgMFDisplayWikibaseDescriptions":{"search":true,"watchlist":true,"tagline":false,"nearby":true},"wgWMESchemaEditAttemptStepOversample":false,"wgWMEPageLength":40000,"wgRelatedArticlesCompat":[],"wgCentralAuthMobileDomain":false,"wgEditSubmitButtonLabelPublish":true, "wgULSPosition":"interlanguage","wgULSisCompactLinksEnabled":false,"wgVector2022LanguageInHeader":true,"wgULSisLanguageSelectorEmpty":false,"wgWikibaseItemId":"Q651476","wgCheckUserClientHintsHeadersJsApi":["brands","architecture","bitness","fullVersionList","mobile","model","platform","platformVersion"],"GEHomepageSuggestedEditsEnableTopics":true,"wgGETopicsMatchModeEnabled":false,"wgGEStructuredTaskRejectionReasonTextInputEnabled":false,"wgGELevelingUpEnabledForUser":false};RLSTATE={"ext.globalCssJs.user.styles":"ready","site.styles":"ready","user.styles":"ready","ext.globalCssJs.user":"ready","user":"ready","user.options":"loading","ext.cite.styles":"ready","skins.vector.search.codex.styles":"ready","skins.vector.styles":"ready","skins.vector.icons":"ready","jquery.makeCollapsible.styles":"ready","ext.wikimediamessages.styles":"ready","ext.visualEditor.desktopArticleTarget.noscript":"ready","ext.uls.interlanguage":"ready","wikibase.client.init":"ready","ext.wikimediaBadges":"ready"} ;RLPAGEMODULES=["ext.cite.ux-enhancements","ext.scribunto.logs","site","mediawiki.page.ready","jquery.makeCollapsible","mediawiki.toc","skins.vector.js","ext.centralNotice.geoIP","ext.centralNotice.startUp","ext.gadget.ReferenceTooltips","ext.gadget.switcher","ext.urlShortener.toolbar","ext.centralauth.centralautologin","mmv.bootstrap","ext.popups","ext.visualEditor.desktopArticleTarget.init","ext.visualEditor.targetLoader","ext.echo.centralauth","ext.eventLogging","ext.wikimediaEvents","ext.navigationTiming","ext.uls.interface","ext.cx.eventlogging.campaigns","ext.cx.uls.quick.actions","wikibase.client.vector-2022","ext.checkUser.clientHints","ext.growthExperiments.SuggestedEditSession","wikibase.sidebar.tracking"];</script> <script>(RLQ=window.RLQ||[]).push(function(){mw.loader.impl(function(){return["user.options@12s5i",function($,jQuery,require,module){mw.user.tokens.set({"patrolToken":"+\\","watchToken":"+\\","csrfToken":"+\\"}); }];});});</script> <link rel="stylesheet" href="/w/load.php?lang=en&amp;modules=ext.cite.styles%7Cext.uls.interlanguage%7Cext.visualEditor.desktopArticleTarget.noscript%7Cext.wikimediaBadges%7Cext.wikimediamessages.styles%7Cjquery.makeCollapsible.styles%7Cskins.vector.icons%2Cstyles%7Cskins.vector.search.codex.styles%7Cwikibase.client.init&amp;only=styles&amp;skin=vector-2022"> <script async="" src="/w/load.php?lang=en&amp;modules=startup&amp;only=scripts&amp;raw=1&amp;skin=vector-2022"></script> <meta name="ResourceLoaderDynamicStyles" content=""> <link rel="stylesheet" href="/w/load.php?lang=en&amp;modules=site.styles&amp;only=styles&amp;skin=vector-2022"> <meta name="generator" content="MediaWiki 1.44.0-wmf.4"> <meta name="referrer" content="origin"> <meta name="referrer" content="origin-when-cross-origin"> <meta name="robots" content="max-image-preview:standard"> <meta name="format-detection" content="telephone=no"> <meta name="viewport" content="width=1120"> <meta property="og:title" content="Computer and network surveillance - Wikipedia"> <meta property="og:type" content="website"> <link rel="preconnect" href="//upload.wikimedia.org"> <link rel="alternate" media="only screen and (max-width: 640px)" href="//en.m.wikipedia.org/wiki/Computer_and_network_surveillance"> <link rel="alternate" type="application/x-wiki" title="Edit this page" href="/w/index.php?title=Computer_and_network_surveillance&amp;action=edit"> <link rel="apple-touch-icon" href="/static/apple-touch/wikipedia.png"> <link rel="icon" href="/static/favicon/wikipedia.ico"> <link rel="search" type="application/opensearchdescription+xml" href="/w/rest.php/v1/search" title="Wikipedia (en)"> <link rel="EditURI" type="application/rsd+xml" href="//en.wikipedia.org/w/api.php?action=rsd"> <link rel="canonical" href="https://en.wikipedia.org/wiki/Computer_and_network_surveillance"> <link rel="license" href="https://creativecommons.org/licenses/by-sa/4.0/deed.en"> <link rel="alternate" type="application/atom+xml" title="Wikipedia Atom feed" href="/w/index.php?title=Special:RecentChanges&amp;feed=atom"> <link rel="dns-prefetch" href="//meta.wikimedia.org" /> <link rel="dns-prefetch" href="//login.wikimedia.org"> </head> <body class="skin--responsive skin-vector skin-vector-search-vue mediawiki ltr sitedir-ltr mw-hide-empty-elt ns-0 ns-subject mw-editable page-Computer_and_network_surveillance rootpage-Computer_and_network_surveillance skin-vector-2022 action-view"><a class="mw-jump-link" href="#bodyContent">Jump to content</a> <div class="vector-header-container"> <header class="vector-header mw-header"> <div class="vector-header-start"> <nav class="vector-main-menu-landmark" aria-label="Site"> <div id="vector-main-menu-dropdown" class="vector-dropdown vector-main-menu-dropdown vector-button-flush-left vector-button-flush-right" > <input type="checkbox" id="vector-main-menu-dropdown-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-main-menu-dropdown" class="vector-dropdown-checkbox " aria-label="Main menu" > <label id="vector-main-menu-dropdown-label" for="vector-main-menu-dropdown-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only " aria-hidden="true" ><span class="vector-icon mw-ui-icon-menu mw-ui-icon-wikimedia-menu"></span> <span class="vector-dropdown-label-text">Main menu</span> </label> <div class="vector-dropdown-content"> <div id="vector-main-menu-unpinned-container" class="vector-unpinned-container"> <div id="vector-main-menu" class="vector-main-menu vector-pinnable-element"> <div class="vector-pinnable-header vector-main-menu-pinnable-header vector-pinnable-header-unpinned" data-feature-name="main-menu-pinned" data-pinnable-element-id="vector-main-menu" data-pinned-container-id="vector-main-menu-pinned-container" data-unpinned-container-id="vector-main-menu-unpinned-container" > <div class="vector-pinnable-header-label">Main menu</div> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-pin-button" data-event-name="pinnable-header.vector-main-menu.pin">move to sidebar</button> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-unpin-button" data-event-name="pinnable-header.vector-main-menu.unpin">hide</button> </div> <div id="p-navigation" class="vector-menu mw-portlet mw-portlet-navigation" > <div class="vector-menu-heading"> Navigation </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="n-mainpage-description" class="mw-list-item"><a href="/wiki/Main_Page" title="Visit the main page [z]" accesskey="z"><span>Main page</span></a></li><li id="n-contents" class="mw-list-item"><a href="/wiki/Wikipedia:Contents" title="Guides to browsing Wikipedia"><span>Contents</span></a></li><li id="n-currentevents" class="mw-list-item"><a href="/wiki/Portal:Current_events" title="Articles related to current events"><span>Current events</span></a></li><li id="n-randompage" class="mw-list-item"><a href="/wiki/Special:Random" title="Visit a randomly selected article [x]" accesskey="x"><span>Random article</span></a></li><li id="n-aboutsite" class="mw-list-item"><a href="/wiki/Wikipedia:About" title="Learn about Wikipedia and how it works"><span>About Wikipedia</span></a></li><li id="n-contactpage" class="mw-list-item"><a href="//en.wikipedia.org/wiki/Wikipedia:Contact_us" title="How to contact Wikipedia"><span>Contact us</span></a></li> </ul> </div> </div> <div id="p-interaction" class="vector-menu mw-portlet mw-portlet-interaction" > <div class="vector-menu-heading"> Contribute </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="n-help" class="mw-list-item"><a href="/wiki/Help:Contents" title="Guidance on how to use and edit Wikipedia"><span>Help</span></a></li><li id="n-introduction" class="mw-list-item"><a href="/wiki/Help:Introduction" title="Learn how to edit Wikipedia"><span>Learn to edit</span></a></li><li id="n-portal" class="mw-list-item"><a href="/wiki/Wikipedia:Community_portal" title="The hub for editors"><span>Community portal</span></a></li><li id="n-recentchanges" class="mw-list-item"><a href="/wiki/Special:RecentChanges" title="A list of recent changes to Wikipedia [r]" accesskey="r"><span>Recent changes</span></a></li><li id="n-upload" class="mw-list-item"><a href="/wiki/Wikipedia:File_upload_wizard" title="Add images or other media for use on Wikipedia"><span>Upload file</span></a></li> </ul> </div> </div> </div> </div> </div> </div> </nav> <a href="/wiki/Main_Page" class="mw-logo"> <img class="mw-logo-icon" src="/static/images/icons/wikipedia.png" alt="" aria-hidden="true" height="50" width="50"> <span class="mw-logo-container skin-invert"> <img class="mw-logo-wordmark" alt="Wikipedia" src="/static/images/mobile/copyright/wikipedia-wordmark-en.svg" style="width: 7.5em; height: 1.125em;"> <img class="mw-logo-tagline" alt="The Free Encyclopedia" src="/static/images/mobile/copyright/wikipedia-tagline-en.svg" width="117" height="13" style="width: 7.3125em; height: 0.8125em;"> </span> </a> </div> <div class="vector-header-end"> <div id="p-search" role="search" class="vector-search-box-vue vector-search-box-collapses vector-search-box-show-thumbnail vector-search-box-auto-expand-width vector-search-box"> <a href="/wiki/Special:Search" class="cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only search-toggle" title="Search Wikipedia [f]" accesskey="f"><span class="vector-icon mw-ui-icon-search mw-ui-icon-wikimedia-search"></span> <span>Search</span> </a> <div class="vector-typeahead-search-container"> <div class="cdx-typeahead-search cdx-typeahead-search--show-thumbnail cdx-typeahead-search--auto-expand-width"> <form action="/w/index.php" id="searchform" class="cdx-search-input cdx-search-input--has-end-button"> <div id="simpleSearch" class="cdx-search-input__input-wrapper" data-search-loc="header-moved"> <div class="cdx-text-input cdx-text-input--has-start-icon"> <input class="cdx-text-input__input" type="search" name="search" placeholder="Search Wikipedia" aria-label="Search Wikipedia" autocapitalize="sentences" title="Search Wikipedia [f]" accesskey="f" id="searchInput" > <span class="cdx-text-input__icon cdx-text-input__start-icon"></span> </div> <input type="hidden" name="title" value="Special:Search"> </div> <button class="cdx-button cdx-search-input__end-button">Search</button> </form> </div> </div> </div> <nav class="vector-user-links vector-user-links-wide" aria-label="Personal tools"> <div class="vector-user-links-main"> <div id="p-vector-user-menu-preferences" class="vector-menu mw-portlet emptyPortlet" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> </ul> </div> </div> <div id="p-vector-user-menu-userpage" class="vector-menu mw-portlet emptyPortlet" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> </ul> </div> </div> <nav class="vector-appearance-landmark" aria-label="Appearance"> <div id="vector-appearance-dropdown" class="vector-dropdown " title="Change the appearance of the page&#039;s font size, width, and color" > <input type="checkbox" id="vector-appearance-dropdown-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-appearance-dropdown" class="vector-dropdown-checkbox " aria-label="Appearance" > <label id="vector-appearance-dropdown-label" for="vector-appearance-dropdown-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only " aria-hidden="true" ><span class="vector-icon mw-ui-icon-appearance mw-ui-icon-wikimedia-appearance"></span> <span class="vector-dropdown-label-text">Appearance</span> </label> <div class="vector-dropdown-content"> <div id="vector-appearance-unpinned-container" class="vector-unpinned-container"> </div> </div> </div> </nav> <div id="p-vector-user-menu-notifications" class="vector-menu mw-portlet emptyPortlet" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> </ul> </div> </div> <div id="p-vector-user-menu-overflow" class="vector-menu mw-portlet" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="pt-sitesupport-2" class="user-links-collapsible-item mw-list-item user-links-collapsible-item"><a data-mw="interface" href="https://donate.wikimedia.org/wiki/Special:FundraiserRedirector?utm_source=donate&amp;utm_medium=sidebar&amp;utm_campaign=C13_en.wikipedia.org&amp;uselang=en" class=""><span>Donate</span></a> </li> <li id="pt-createaccount-2" class="user-links-collapsible-item mw-list-item user-links-collapsible-item"><a data-mw="interface" href="/w/index.php?title=Special:CreateAccount&amp;returnto=Computer+and+network+surveillance" title="You are encouraged to create an account and log in; however, it is not mandatory" class=""><span>Create account</span></a> </li> <li id="pt-login-2" class="user-links-collapsible-item mw-list-item user-links-collapsible-item"><a data-mw="interface" href="/w/index.php?title=Special:UserLogin&amp;returnto=Computer+and+network+surveillance" title="You&#039;re encouraged to log in; however, it&#039;s not mandatory. [o]" accesskey="o" class=""><span>Log in</span></a> </li> </ul> </div> </div> </div> <div id="vector-user-links-dropdown" class="vector-dropdown vector-user-menu vector-button-flush-right vector-user-menu-logged-out" title="Log in and more options" > <input type="checkbox" id="vector-user-links-dropdown-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-user-links-dropdown" class="vector-dropdown-checkbox " aria-label="Personal tools" > <label id="vector-user-links-dropdown-label" for="vector-user-links-dropdown-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only " aria-hidden="true" ><span class="vector-icon mw-ui-icon-ellipsis mw-ui-icon-wikimedia-ellipsis"></span> <span class="vector-dropdown-label-text">Personal tools</span> </label> <div class="vector-dropdown-content"> <div id="p-personal" class="vector-menu mw-portlet mw-portlet-personal user-links-collapsible-item" title="User menu" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="pt-sitesupport" class="user-links-collapsible-item mw-list-item"><a href="https://donate.wikimedia.org/wiki/Special:FundraiserRedirector?utm_source=donate&amp;utm_medium=sidebar&amp;utm_campaign=C13_en.wikipedia.org&amp;uselang=en"><span>Donate</span></a></li><li id="pt-createaccount" class="user-links-collapsible-item mw-list-item"><a href="/w/index.php?title=Special:CreateAccount&amp;returnto=Computer+and+network+surveillance" title="You are encouraged to create an account and log in; however, it is not mandatory"><span class="vector-icon mw-ui-icon-userAdd mw-ui-icon-wikimedia-userAdd"></span> <span>Create account</span></a></li><li id="pt-login" class="user-links-collapsible-item mw-list-item"><a href="/w/index.php?title=Special:UserLogin&amp;returnto=Computer+and+network+surveillance" title="You&#039;re encouraged to log in; however, it&#039;s not mandatory. [o]" accesskey="o"><span class="vector-icon mw-ui-icon-logIn mw-ui-icon-wikimedia-logIn"></span> <span>Log in</span></a></li> </ul> </div> </div> <div id="p-user-menu-anon-editor" class="vector-menu mw-portlet mw-portlet-user-menu-anon-editor" > <div class="vector-menu-heading"> Pages for logged out editors <a href="/wiki/Help:Introduction" aria-label="Learn more about editing"><span>learn more</span></a> </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="pt-anoncontribs" class="mw-list-item"><a href="/wiki/Special:MyContributions" title="A list of edits made from this IP address [y]" accesskey="y"><span>Contributions</span></a></li><li id="pt-anontalk" class="mw-list-item"><a href="/wiki/Special:MyTalk" title="Discussion about edits from this IP address [n]" accesskey="n"><span>Talk</span></a></li> </ul> </div> </div> </div> </div> </nav> </div> </header> </div> <div class="mw-page-container"> <div class="mw-page-container-inner"> <div class="vector-sitenotice-container"> <div id="siteNotice"><!-- CentralNotice --></div> </div> <div class="vector-column-start"> <div class="vector-main-menu-container"> <div id="mw-navigation"> <nav id="mw-panel" class="vector-main-menu-landmark" aria-label="Site"> <div id="vector-main-menu-pinned-container" class="vector-pinned-container"> </div> </nav> </div> </div> <div class="vector-sticky-pinned-container"> <nav id="mw-panel-toc" aria-label="Contents" data-event-name="ui.sidebar-toc" class="mw-table-of-contents-container vector-toc-landmark"> <div id="vector-toc-pinned-container" class="vector-pinned-container"> <div id="vector-toc" class="vector-toc vector-pinnable-element"> <div class="vector-pinnable-header vector-toc-pinnable-header vector-pinnable-header-pinned" data-feature-name="toc-pinned" data-pinnable-element-id="vector-toc" > <h2 class="vector-pinnable-header-label">Contents</h2> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-pin-button" data-event-name="pinnable-header.vector-toc.pin">move to sidebar</button> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-unpin-button" data-event-name="pinnable-header.vector-toc.unpin">hide</button> </div> <ul class="vector-toc-contents" id="mw-panel-toc-list"> <li id="toc-mw-content-text" class="vector-toc-list-item vector-toc-level-1"> <a href="#" class="vector-toc-link"> <div class="vector-toc-text">(Top)</div> </a> </li> <li id="toc-Network_surveillance" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#Network_surveillance"> <div class="vector-toc-text"> <span class="vector-toc-numb">1</span> <span>Network surveillance</span> </div> </a> <ul id="toc-Network_surveillance-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Corporate_surveillance" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#Corporate_surveillance"> <div class="vector-toc-text"> <span class="vector-toc-numb">2</span> <span>Corporate surveillance</span> </div> </a> <ul id="toc-Corporate_surveillance-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Malicious_software" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#Malicious_software"> <div class="vector-toc-text"> <span class="vector-toc-numb">3</span> <span>Malicious software</span> </div> </a> <ul id="toc-Malicious_software-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Social_network_analysis" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#Social_network_analysis"> <div class="vector-toc-text"> <span class="vector-toc-numb">4</span> <span>Social network analysis</span> </div> </a> <ul id="toc-Social_network_analysis-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Monitoring_from_a_distance" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#Monitoring_from_a_distance"> <div class="vector-toc-text"> <span class="vector-toc-numb">5</span> <span>Monitoring from a distance</span> </div> </a> <ul id="toc-Monitoring_from_a_distance-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Policeware_and_govware" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#Policeware_and_govware"> <div class="vector-toc-text"> <span class="vector-toc-numb">6</span> <span>Policeware and govware</span> </div> </a> <ul id="toc-Policeware_and_govware-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Surveillance_as_an_aid_to_censorship" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#Surveillance_as_an_aid_to_censorship"> <div class="vector-toc-text"> <span class="vector-toc-numb">7</span> <span>Surveillance as an aid to censorship</span> </div> </a> <ul id="toc-Surveillance_as_an_aid_to_censorship-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-See_also" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#See_also"> <div class="vector-toc-text"> <span class="vector-toc-numb">8</span> <span>See also</span> </div> </a> <ul id="toc-See_also-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-References" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#References"> <div class="vector-toc-text"> <span class="vector-toc-numb">9</span> <span>References</span> </div> </a> <ul id="toc-References-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-External_links" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#External_links"> <div class="vector-toc-text"> <span class="vector-toc-numb">10</span> <span>External links</span> </div> </a> <ul id="toc-External_links-sublist" class="vector-toc-list"> </ul> </li> </ul> </div> </div> </nav> </div> </div> <div class="mw-content-container"> <main id="content" class="mw-body"> <header class="mw-body-header vector-page-titlebar"> <nav aria-label="Contents" class="vector-toc-landmark"> <div id="vector-page-titlebar-toc" class="vector-dropdown vector-page-titlebar-toc vector-button-flush-left" > <input type="checkbox" id="vector-page-titlebar-toc-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-page-titlebar-toc" class="vector-dropdown-checkbox " aria-label="Toggle the table of contents" > <label id="vector-page-titlebar-toc-label" for="vector-page-titlebar-toc-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only " aria-hidden="true" ><span class="vector-icon mw-ui-icon-listBullet mw-ui-icon-wikimedia-listBullet"></span> <span class="vector-dropdown-label-text">Toggle the table of contents</span> </label> <div class="vector-dropdown-content"> <div id="vector-page-titlebar-toc-unpinned-container" class="vector-unpinned-container"> </div> </div> </div> </nav> <h1 id="firstHeading" class="firstHeading mw-first-heading"><span class="mw-page-title-main">Computer and network surveillance</span></h1> <div id="p-lang-btn" class="vector-dropdown mw-portlet mw-portlet-lang" > <input type="checkbox" id="p-lang-btn-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-p-lang-btn" class="vector-dropdown-checkbox mw-interlanguage-selector" aria-label="Go to an article in another language. Available in 16 languages" > <label id="p-lang-btn-label" for="p-lang-btn-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--action-progressive mw-portlet-lang-heading-16" aria-hidden="true" ><span class="vector-icon mw-ui-icon-language-progressive mw-ui-icon-wikimedia-language-progressive"></span> <span class="vector-dropdown-label-text">16 languages</span> </label> <div class="vector-dropdown-content"> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li class="interlanguage-link interwiki-ar mw-list-item"><a href="https://ar.wikipedia.org/wiki/%D8%AC%D8%A7%D8%B3%D9%88%D8%B3%D9%8A%D8%A9_%D8%B1%D9%82%D9%85%D9%8A%D8%A9" title="جاسوسية رقمية – Arabic" lang="ar" hreflang="ar" data-title="جاسوسية رقمية" data-language-autonym="العربية" data-language-local-name="Arabic" class="interlanguage-link-target"><span>العربية</span></a></li><li class="interlanguage-link interwiki-ca mw-list-item"><a href="https://ca.wikipedia.org/wiki/Monitoratge_(inform%C3%A0tica)" title="Monitoratge (informàtica) – Catalan" lang="ca" hreflang="ca" data-title="Monitoratge (informàtica)" data-language-autonym="Català" data-language-local-name="Catalan" class="interlanguage-link-target"><span>Català</span></a></li><li class="interlanguage-link interwiki-de mw-list-item"><a href="https://de.wikipedia.org/wiki/Online-Durchsuchung" title="Online-Durchsuchung – German" lang="de" hreflang="de" data-title="Online-Durchsuchung" data-language-autonym="Deutsch" data-language-local-name="German" class="interlanguage-link-target"><span>Deutsch</span></a></li><li class="interlanguage-link interwiki-et mw-list-item"><a href="https://et.wikipedia.org/wiki/K%C3%BCberj%C3%A4lgimine" title="Küberjälgimine – Estonian" lang="et" hreflang="et" data-title="Küberjälgimine" data-language-autonym="Eesti" data-language-local-name="Estonian" class="interlanguage-link-target"><span>Eesti</span></a></li><li class="interlanguage-link interwiki-fa mw-list-item"><a href="https://fa.wikipedia.org/wiki/%D9%86%D8%B8%D8%A7%D8%B1%D8%AA_%D8%A8%D8%B1_%D8%B1%D8%A7%DB%8C%D8%A7%D9%86%D9%87_%D9%88_%D8%B4%D8%A8%DA%A9%D9%87" title="نظارت بر رایانه و شبکه – Persian" lang="fa" hreflang="fa" data-title="نظارت بر رایانه و شبکه" data-language-autonym="فارسی" data-language-local-name="Persian" class="interlanguage-link-target"><span>فارسی</span></a></li><li class="interlanguage-link interwiki-id mw-list-item"><a href="https://id.wikipedia.org/wiki/Pengawasan_komputer_dan_jaringan" title="Pengawasan komputer dan jaringan – Indonesian" lang="id" hreflang="id" data-title="Pengawasan komputer dan jaringan" data-language-autonym="Bahasa Indonesia" data-language-local-name="Indonesian" class="interlanguage-link-target"><span>Bahasa Indonesia</span></a></li><li class="interlanguage-link interwiki-he mw-list-item"><a href="https://he.wikipedia.org/wiki/%D7%9E%D7%A2%D7%A7%D7%91_%D7%A2%D7%9C_%D7%9E%D7%97%D7%A9%D7%91%D7%99%D7%9D_%D7%95%D7%A8%D7%A9%D7%AA%D7%95%D7%AA" title="מעקב על מחשבים ורשתות – Hebrew" lang="he" hreflang="he" data-title="מעקב על מחשבים ורשתות" data-language-autonym="עברית" data-language-local-name="Hebrew" class="interlanguage-link-target"><span>עברית</span></a></li><li class="interlanguage-link interwiki-my mw-list-item"><a href="https://my.wikipedia.org/wiki/%E1%80%80%E1%80%BD%E1%80%94%E1%80%BA%E1%80%95%E1%80%BB%E1%80%B0%E1%80%90%E1%80%AC%E1%80%85%E1%80%B1%E1%80%AC%E1%80%84%E1%80%B7%E1%80%BA%E1%80%80%E1%80%BC%E1%80%95%E1%80%BA%E1%80%80%E1%80%BC%E1%80%8A%E1%80%B7%E1%80%BA%E1%80%9B%E1%80%BE%E1%80%AF%E1%80%81%E1%80%BC%E1%80%84%E1%80%BA%E1%80%B8" title="ကွန်ပျူတာစောင့်ကြပ်ကြည့်ရှုခြင်း – Burmese" lang="my" hreflang="my" data-title="ကွန်ပျူတာစောင့်ကြပ်ကြည့်ရှုခြင်း" data-language-autonym="မြန်မာဘာသာ" data-language-local-name="Burmese" class="interlanguage-link-target"><span>မြန်မာဘာသာ</span></a></li><li class="interlanguage-link interwiki-pnb mw-list-item"><a href="https://pnb.wikipedia.org/wiki/%DA%A9%D9%85%D9%BE%DB%8C%D9%88%D9%B9%D8%B1_%D8%B3%D8%B1%D9%88%DB%8C%D9%84%DB%8C%D9%86%D8%B3" title="کمپیوٹر سرویلینس – Western Punjabi" lang="pnb" hreflang="pnb" data-title="کمپیوٹر سرویلینس" data-language-autonym="پنجابی" data-language-local-name="Western Punjabi" class="interlanguage-link-target"><span>پنجابی</span></a></li><li class="interlanguage-link interwiki-pl mw-list-item"><a href="https://pl.wikipedia.org/wiki/Monitoring_pracy_komputera" title="Monitoring pracy komputera – Polish" lang="pl" hreflang="pl" data-title="Monitoring pracy komputera" data-language-autonym="Polski" data-language-local-name="Polish" class="interlanguage-link-target"><span>Polski</span></a></li><li class="interlanguage-link interwiki-pt mw-list-item"><a href="https://pt.wikipedia.org/wiki/Vigil%C3%A2ncia_de_computadores_e_redes" title="Vigilância de computadores e redes – Portuguese" lang="pt" hreflang="pt" data-title="Vigilância de computadores e redes" data-language-autonym="Português" data-language-local-name="Portuguese" class="interlanguage-link-target"><span>Português</span></a></li><li class="interlanguage-link interwiki-ru mw-list-item"><a href="https://ru.wikipedia.org/wiki/%D0%9F%D1%80%D0%BE%D0%B3%D1%80%D0%B0%D0%BC%D0%BC%D0%B0_%D0%BE%D1%82%D1%81%D0%BB%D0%B5%D0%B6%D0%B8%D0%B2%D0%B0%D0%BD%D0%B8%D1%8F" title="Программа отслеживания – Russian" lang="ru" hreflang="ru" data-title="Программа отслеживания" data-language-autonym="Русский" data-language-local-name="Russian" class="interlanguage-link-target"><span>Русский</span></a></li><li class="interlanguage-link interwiki-fi mw-list-item"><a href="https://fi.wikipedia.org/wiki/Verkkovalvonta" title="Verkkovalvonta – Finnish" lang="fi" hreflang="fi" data-title="Verkkovalvonta" data-language-autonym="Suomi" data-language-local-name="Finnish" class="interlanguage-link-target"><span>Suomi</span></a></li><li class="interlanguage-link interwiki-uk mw-list-item"><a href="https://uk.wikipedia.org/wiki/%D0%9C%D0%BE%D0%BD%D1%96%D1%82%D0%BE%D1%80%D0%B8%D0%BD%D0%B3%D0%BE%D0%B2%D1%96_%D0%BF%D1%80%D0%BE%D0%B3%D1%80%D0%B0%D0%BC%D0%BD%D1%96_%D0%BF%D1%80%D0%BE%D0%B4%D1%83%D0%BA%D1%82%D0%B8" title="Моніторингові програмні продукти – Ukrainian" lang="uk" hreflang="uk" data-title="Моніторингові програмні продукти" data-language-autonym="Українська" data-language-local-name="Ukrainian" class="interlanguage-link-target"><span>Українська</span></a></li><li class="interlanguage-link interwiki-ur mw-list-item"><a href="https://ur.wikipedia.org/wiki/%DA%A9%D9%85%D9%BE%DB%8C%D9%88%D9%B9%D8%B1_%D8%B3%D8%B1%D9%88%DB%8C%D9%84%DB%8C%D9%86%D8%B3" title="کمپیوٹر سرویلینس – Urdu" lang="ur" hreflang="ur" data-title="کمپیوٹر سرویلینس" data-language-autonym="اردو" data-language-local-name="Urdu" class="interlanguage-link-target"><span>اردو</span></a></li><li class="interlanguage-link interwiki-vi mw-list-item"><a href="https://vi.wikipedia.org/wiki/Gi%C3%A1m_s%C3%A1t_tr%E1%BB%B1c_tuy%E1%BA%BFn" title="Giám sát trực tuyến – Vietnamese" lang="vi" hreflang="vi" data-title="Giám sát trực tuyến" data-language-autonym="Tiếng Việt" data-language-local-name="Vietnamese" class="interlanguage-link-target"><span>Tiếng Việt</span></a></li> </ul> <div class="after-portlet after-portlet-lang"><span class="wb-langlinks-edit wb-langlinks-link"><a href="https://www.wikidata.org/wiki/Special:EntityPage/Q651476#sitelinks-wikipedia" title="Edit interlanguage links" class="wbc-editpage">Edit links</a></span></div> </div> </div> </div> </header> <div class="vector-page-toolbar"> <div class="vector-page-toolbar-container"> <div id="left-navigation"> <nav aria-label="Namespaces"> <div id="p-associated-pages" class="vector-menu vector-menu-tabs mw-portlet mw-portlet-associated-pages" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="ca-nstab-main" class="selected vector-tab-noicon mw-list-item"><a href="/wiki/Computer_and_network_surveillance" title="View the content page [c]" accesskey="c"><span>Article</span></a></li><li id="ca-talk" class="vector-tab-noicon mw-list-item"><a href="/wiki/Talk:Computer_and_network_surveillance" rel="discussion" title="Discuss improvements to the content page [t]" accesskey="t"><span>Talk</span></a></li> </ul> </div> </div> <div id="vector-variants-dropdown" class="vector-dropdown emptyPortlet" > <input type="checkbox" id="vector-variants-dropdown-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-variants-dropdown" class="vector-dropdown-checkbox " aria-label="Change language variant" > <label id="vector-variants-dropdown-label" for="vector-variants-dropdown-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet" aria-hidden="true" ><span class="vector-dropdown-label-text">English</span> </label> <div class="vector-dropdown-content"> <div id="p-variants" class="vector-menu mw-portlet mw-portlet-variants emptyPortlet" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> </ul> </div> </div> </div> </div> </nav> </div> <div id="right-navigation" class="vector-collapsible"> <nav aria-label="Views"> <div id="p-views" class="vector-menu vector-menu-tabs mw-portlet mw-portlet-views" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="ca-view" class="selected vector-tab-noicon mw-list-item"><a href="/wiki/Computer_and_network_surveillance"><span>Read</span></a></li><li id="ca-edit" class="vector-tab-noicon mw-list-item"><a href="/w/index.php?title=Computer_and_network_surveillance&amp;action=edit" title="Edit this page [e]" accesskey="e"><span>Edit</span></a></li><li id="ca-history" class="vector-tab-noicon mw-list-item"><a href="/w/index.php?title=Computer_and_network_surveillance&amp;action=history" title="Past revisions of this page [h]" accesskey="h"><span>View history</span></a></li> </ul> </div> </div> </nav> <nav class="vector-page-tools-landmark" aria-label="Page tools"> <div id="vector-page-tools-dropdown" class="vector-dropdown vector-page-tools-dropdown" > <input type="checkbox" id="vector-page-tools-dropdown-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-page-tools-dropdown" class="vector-dropdown-checkbox " aria-label="Tools" > <label id="vector-page-tools-dropdown-label" for="vector-page-tools-dropdown-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet" aria-hidden="true" ><span class="vector-dropdown-label-text">Tools</span> </label> <div class="vector-dropdown-content"> <div id="vector-page-tools-unpinned-container" class="vector-unpinned-container"> <div id="vector-page-tools" class="vector-page-tools vector-pinnable-element"> <div class="vector-pinnable-header vector-page-tools-pinnable-header vector-pinnable-header-unpinned" data-feature-name="page-tools-pinned" data-pinnable-element-id="vector-page-tools" data-pinned-container-id="vector-page-tools-pinned-container" data-unpinned-container-id="vector-page-tools-unpinned-container" > <div class="vector-pinnable-header-label">Tools</div> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-pin-button" data-event-name="pinnable-header.vector-page-tools.pin">move to sidebar</button> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-unpin-button" data-event-name="pinnable-header.vector-page-tools.unpin">hide</button> </div> <div id="p-cactions" class="vector-menu mw-portlet mw-portlet-cactions emptyPortlet vector-has-collapsible-items" title="More options" > <div class="vector-menu-heading"> Actions </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="ca-more-view" class="selected vector-more-collapsible-item mw-list-item"><a href="/wiki/Computer_and_network_surveillance"><span>Read</span></a></li><li id="ca-more-edit" class="vector-more-collapsible-item mw-list-item"><a href="/w/index.php?title=Computer_and_network_surveillance&amp;action=edit" title="Edit this page [e]" accesskey="e"><span>Edit</span></a></li><li id="ca-more-history" class="vector-more-collapsible-item mw-list-item"><a href="/w/index.php?title=Computer_and_network_surveillance&amp;action=history"><span>View history</span></a></li> </ul> </div> </div> <div id="p-tb" class="vector-menu mw-portlet mw-portlet-tb" > <div class="vector-menu-heading"> General </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="t-whatlinkshere" class="mw-list-item"><a href="/wiki/Special:WhatLinksHere/Computer_and_network_surveillance" title="List of all English Wikipedia pages containing links to this page [j]" accesskey="j"><span>What links here</span></a></li><li id="t-recentchangeslinked" class="mw-list-item"><a href="/wiki/Special:RecentChangesLinked/Computer_and_network_surveillance" rel="nofollow" title="Recent changes in pages linked from this page [k]" accesskey="k"><span>Related changes</span></a></li><li id="t-upload" class="mw-list-item"><a href="/wiki/Wikipedia:File_Upload_Wizard" title="Upload files [u]" accesskey="u"><span>Upload file</span></a></li><li id="t-specialpages" class="mw-list-item"><a href="/wiki/Special:SpecialPages" title="A list of all special pages [q]" accesskey="q"><span>Special pages</span></a></li><li id="t-permalink" class="mw-list-item"><a href="/w/index.php?title=Computer_and_network_surveillance&amp;oldid=1253177936" title="Permanent link to this revision of this page"><span>Permanent link</span></a></li><li id="t-info" class="mw-list-item"><a href="/w/index.php?title=Computer_and_network_surveillance&amp;action=info" title="More information about this page"><span>Page information</span></a></li><li id="t-cite" class="mw-list-item"><a href="/w/index.php?title=Special:CiteThisPage&amp;page=Computer_and_network_surveillance&amp;id=1253177936&amp;wpFormIdentifier=titleform" title="Information on how to cite this page"><span>Cite this page</span></a></li><li id="t-urlshortener" class="mw-list-item"><a href="/w/index.php?title=Special:UrlShortener&amp;url=https%3A%2F%2Fen.wikipedia.org%2Fwiki%2FComputer_and_network_surveillance"><span>Get shortened URL</span></a></li><li id="t-urlshortener-qrcode" class="mw-list-item"><a href="/w/index.php?title=Special:QrCode&amp;url=https%3A%2F%2Fen.wikipedia.org%2Fwiki%2FComputer_and_network_surveillance"><span>Download QR code</span></a></li> </ul> </div> </div> <div id="p-coll-print_export" class="vector-menu mw-portlet mw-portlet-coll-print_export" > <div class="vector-menu-heading"> Print/export </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="coll-download-as-rl" class="mw-list-item"><a href="/w/index.php?title=Special:DownloadAsPdf&amp;page=Computer_and_network_surveillance&amp;action=show-download-screen" title="Download this page as a PDF file"><span>Download as PDF</span></a></li><li id="t-print" class="mw-list-item"><a href="/w/index.php?title=Computer_and_network_surveillance&amp;printable=yes" title="Printable version of this page [p]" accesskey="p"><span>Printable version</span></a></li> </ul> </div> </div> <div id="p-wikibase-otherprojects" class="vector-menu mw-portlet mw-portlet-wikibase-otherprojects" > <div class="vector-menu-heading"> In other projects </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="t-wikibase" class="wb-otherproject-link wb-otherproject-wikibase-dataitem mw-list-item"><a href="https://www.wikidata.org/wiki/Special:EntityPage/Q651476" title="Structured data on this page hosted by Wikidata [g]" accesskey="g"><span>Wikidata item</span></a></li> </ul> </div> </div> </div> </div> </div> </div> </nav> </div> </div> </div> <div class="vector-column-end"> <div class="vector-sticky-pinned-container"> <nav class="vector-page-tools-landmark" aria-label="Page tools"> <div id="vector-page-tools-pinned-container" class="vector-pinned-container"> </div> </nav> <nav class="vector-appearance-landmark" aria-label="Appearance"> <div id="vector-appearance-pinned-container" class="vector-pinned-container"> <div id="vector-appearance" class="vector-appearance vector-pinnable-element"> <div class="vector-pinnable-header vector-appearance-pinnable-header vector-pinnable-header-pinned" data-feature-name="appearance-pinned" data-pinnable-element-id="vector-appearance" data-pinned-container-id="vector-appearance-pinned-container" data-unpinned-container-id="vector-appearance-unpinned-container" > <div class="vector-pinnable-header-label">Appearance</div> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-pin-button" data-event-name="pinnable-header.vector-appearance.pin">move to sidebar</button> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-unpin-button" data-event-name="pinnable-header.vector-appearance.unpin">hide</button> </div> </div> </div> </nav> </div> </div> <div id="bodyContent" class="vector-body" aria-labelledby="firstHeading" data-mw-ve-target-container> <div class="vector-body-before-content"> <div class="mw-indicators"> </div> <div id="siteSub" class="noprint">From Wikipedia, the free encyclopedia</div> </div> <div id="contentSub"><div id="mw-content-subtitle"></div></div> <div id="mw-content-text" class="mw-body-content"><div class="mw-content-ltr mw-parser-output" lang="en" dir="ltr"><div class="shortdescription nomobile noexcerpt noprint searchaux" style="display:none">Monitoring of computer or network activity</div> <style data-mw-deduplicate="TemplateStyles:r1236090951">.mw-parser-output .hatnote{font-style:italic}.mw-parser-output div.hatnote{padding-left:1.6em;margin-bottom:0.5em}.mw-parser-output .hatnote i{font-style:normal}.mw-parser-output .hatnote+link+.hatnote{margin-top:-0.5em}@media print{body.ns-0 .mw-parser-output .hatnote{display:none!important}}</style><div role="note" class="hatnote navigation-not-searchable">This article is about monitoring of computer and network activity. For information on methods of preventing unauthorized access to computer data, see <a href="/wiki/Computer_security" title="Computer security">computer security</a>.</div> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236090951"><div role="note" class="hatnote navigation-not-searchable">Main articles: <a href="/wiki/Surveillance" title="Surveillance">Surveillance</a>, <a href="/wiki/Mass_surveillance" title="Mass surveillance">Mass surveillance</a>, and <a href="/wiki/Global_surveillance" title="Global surveillance">Global surveillance</a></div> <p><b>Computer and network surveillance</b> is the monitoring of computer activity and data stored locally on a computer or data being transferred over <a href="/wiki/Computer_network" title="Computer network">computer networks</a> such as the <a href="/wiki/Internet" title="Internet">Internet</a>. This monitoring is often carried out covertly and may be completed by governments, corporations, criminal organizations, or individuals. It may or may not be legal and may or may not require authorization from a court or other independent government agencies. Computer and network surveillance programs are widespread today and almost all <a href="/wiki/Internet_traffic" title="Internet traffic">Internet traffic</a> can be monitored.<sup id="cite_ref-1" class="reference"><a href="#cite_note-1"><span class="cite-bracket">&#91;</span>1<span class="cite-bracket">&#93;</span></a></sup> </p><p>Surveillance allows governments and other agencies to maintain <a href="/wiki/Social_control" title="Social control">social control</a>, recognize and monitor threats or any suspicious or abnormal activity,<sup id="cite_ref-2" class="reference"><a href="#cite_note-2"><span class="cite-bracket">&#91;</span>2<span class="cite-bracket">&#93;</span></a></sup> and prevent and investigate <a href="/wiki/Criminal" class="mw-redirect" title="Criminal">criminal</a> activities. With the advent of programs such as the <a href="/wiki/Total_Information_Awareness" title="Total Information Awareness">Total Information Awareness</a> program, technologies such as <a href="/wiki/NarusInsight" class="mw-redirect" title="NarusInsight">high-speed surveillance computers</a> and <a href="/wiki/Surveillance#Biometric" title="Surveillance">biometrics</a> software, and laws such as the <a href="/wiki/Communications_Assistance_For_Law_Enforcement_Act" class="mw-redirect" title="Communications Assistance For Law Enforcement Act">Communications Assistance For Law Enforcement Act</a>, governments now possess an unprecedented ability to monitor the activities of citizens.<sup id="cite_ref-us-surveillance-soc_3-0" class="reference"><a href="#cite_note-us-surveillance-soc-3"><span class="cite-bracket">&#91;</span>3<span class="cite-bracket">&#93;</span></a></sup> </p><p>Many <a href="/wiki/Civil_rights" class="mw-redirect" title="Civil rights">civil rights</a> and <a href="/wiki/Privacy" title="Privacy">privacy</a> groups, such as <a href="/wiki/Reporters_Without_Borders" title="Reporters Without Borders">Reporters Without Borders</a>, the <a href="/wiki/Electronic_Frontier_Foundation" title="Electronic Frontier Foundation">Electronic Frontier Foundation</a>, and the <a href="/wiki/American_Civil_Liberties_Union" title="American Civil Liberties Union">American Civil Liberties Union</a>, have expressed concern that increasing surveillance of citizens will result in a <a href="/wiki/Mass_surveillance" title="Mass surveillance">mass surveillance</a> society, with limited political and/or personal freedoms. Such fear has led to numerous lawsuits such as <i><a href="/wiki/Hepting_v._AT%26T" title="Hepting v. AT&amp;T">Hepting v. AT&amp;T</a></i>.<sup id="cite_ref-us-surveillance-soc_3-1" class="reference"><a href="#cite_note-us-surveillance-soc-3"><span class="cite-bracket">&#91;</span>3<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-bigger-monster_4-0" class="reference"><a href="#cite_note-bigger-monster-4"><span class="cite-bracket">&#91;</span>4<span class="cite-bracket">&#93;</span></a></sup> The <a href="/wiki/Hacktivist" class="mw-redirect" title="Hacktivist">hacktivist</a> group <a href="/wiki/Anonymous_(group)" class="mw-redirect" title="Anonymous (group)">Anonymous</a> has hacked into government websites in protest of what it considers "draconian surveillance".<sup id="cite_ref-5" class="reference"><a href="#cite_note-5"><span class="cite-bracket">&#91;</span>5<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-6" class="reference"><a href="#cite_note-6"><span class="cite-bracket">&#91;</span>6<span class="cite-bracket">&#93;</span></a></sup> </p> <meta property="mw:PageProp/toc" /> <div class="mw-heading mw-heading2"><h2 id="Network_surveillance">Network surveillance</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Computer_and_network_surveillance&amp;action=edit&amp;section=1" title="Edit section: Network surveillance"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <style data-mw-deduplicate="TemplateStyles:r1129693374">.mw-parser-output .hlist dl,.mw-parser-output .hlist ol,.mw-parser-output .hlist ul{margin:0;padding:0}.mw-parser-output .hlist dd,.mw-parser-output .hlist dt,.mw-parser-output .hlist li{margin:0;display:inline}.mw-parser-output .hlist.inline,.mw-parser-output .hlist.inline dl,.mw-parser-output .hlist.inline ol,.mw-parser-output .hlist.inline ul,.mw-parser-output .hlist dl dl,.mw-parser-output .hlist dl ol,.mw-parser-output .hlist dl ul,.mw-parser-output .hlist ol dl,.mw-parser-output .hlist ol ol,.mw-parser-output .hlist ol ul,.mw-parser-output .hlist ul dl,.mw-parser-output .hlist ul ol,.mw-parser-output .hlist ul ul{display:inline}.mw-parser-output .hlist .mw-empty-li{display:none}.mw-parser-output .hlist dt::after{content:": "}.mw-parser-output .hlist dd::after,.mw-parser-output .hlist li::after{content:" · ";font-weight:bold}.mw-parser-output .hlist dd:last-child::after,.mw-parser-output .hlist dt:last-child::after,.mw-parser-output .hlist li:last-child::after{content:none}.mw-parser-output .hlist dd dd:first-child::before,.mw-parser-output .hlist dd dt:first-child::before,.mw-parser-output .hlist dd li:first-child::before,.mw-parser-output .hlist dt dd:first-child::before,.mw-parser-output .hlist dt dt:first-child::before,.mw-parser-output .hlist dt li:first-child::before,.mw-parser-output .hlist li dd:first-child::before,.mw-parser-output .hlist li dt:first-child::before,.mw-parser-output .hlist li li:first-child::before{content:" (";font-weight:normal}.mw-parser-output .hlist dd dd:last-child::after,.mw-parser-output .hlist dd dt:last-child::after,.mw-parser-output .hlist dd li:last-child::after,.mw-parser-output .hlist dt dd:last-child::after,.mw-parser-output .hlist dt dt:last-child::after,.mw-parser-output .hlist dt li:last-child::after,.mw-parser-output .hlist li dd:last-child::after,.mw-parser-output .hlist li dt:last-child::after,.mw-parser-output .hlist li li:last-child::after{content:")";font-weight:normal}.mw-parser-output .hlist ol{counter-reset:listitem}.mw-parser-output .hlist ol>li{counter-increment:listitem}.mw-parser-output .hlist ol>li::before{content:" "counter(listitem)"\a0 "}.mw-parser-output .hlist dd ol>li:first-child::before,.mw-parser-output .hlist dt ol>li:first-child::before,.mw-parser-output .hlist li ol>li:first-child::before{content:" ("counter(listitem)"\a0 "}</style><style data-mw-deduplicate="TemplateStyles:r1246091330">.mw-parser-output .sidebar{width:22em;float:right;clear:right;margin:0.5em 0 1em 1em;background:var(--background-color-neutral-subtle,#f8f9fa);border:1px solid var(--border-color-base,#a2a9b1);padding:0.2em;text-align:center;line-height:1.4em;font-size:88%;border-collapse:collapse;display:table}body.skin-minerva .mw-parser-output .sidebar{display:table!important;float:right!important;margin:0.5em 0 1em 1em!important}.mw-parser-output .sidebar-subgroup{width:100%;margin:0;border-spacing:0}.mw-parser-output .sidebar-left{float:left;clear:left;margin:0.5em 1em 1em 0}.mw-parser-output .sidebar-none{float:none;clear:both;margin:0.5em 1em 1em 0}.mw-parser-output .sidebar-outer-title{padding:0 0.4em 0.2em;font-size:125%;line-height:1.2em;font-weight:bold}.mw-parser-output .sidebar-top-image{padding:0.4em}.mw-parser-output .sidebar-top-caption,.mw-parser-output .sidebar-pretitle-with-top-image,.mw-parser-output .sidebar-caption{padding:0.2em 0.4em 0;line-height:1.2em}.mw-parser-output .sidebar-pretitle{padding:0.4em 0.4em 0;line-height:1.2em}.mw-parser-output .sidebar-title,.mw-parser-output .sidebar-title-with-pretitle{padding:0.2em 0.8em;font-size:145%;line-height:1.2em}.mw-parser-output .sidebar-title-with-pretitle{padding:0.1em 0.4em}.mw-parser-output .sidebar-image{padding:0.2em 0.4em 0.4em}.mw-parser-output .sidebar-heading{padding:0.1em 0.4em}.mw-parser-output .sidebar-content{padding:0 0.5em 0.4em}.mw-parser-output .sidebar-content-with-subgroup{padding:0.1em 0.4em 0.2em}.mw-parser-output .sidebar-above,.mw-parser-output .sidebar-below{padding:0.3em 0.8em;font-weight:bold}.mw-parser-output .sidebar-collapse .sidebar-above,.mw-parser-output .sidebar-collapse .sidebar-below{border-top:1px solid #aaa;border-bottom:1px solid #aaa}.mw-parser-output .sidebar-navbar{text-align:right;font-size:115%;padding:0 0.4em 0.4em}.mw-parser-output .sidebar-list-title{padding:0 0.4em;text-align:left;font-weight:bold;line-height:1.6em;font-size:105%}.mw-parser-output .sidebar-list-title-c{padding:0 0.4em;text-align:center;margin:0 3.3em}@media(max-width:640px){body.mediawiki .mw-parser-output .sidebar{width:100%!important;clear:both;float:none!important;margin-left:0!important;margin-right:0!important}}body.skin--responsive .mw-parser-output .sidebar a>img{max-width:none!important}@media screen{html.skin-theme-clientpref-night .mw-parser-output .sidebar:not(.notheme) .sidebar-list-title,html.skin-theme-clientpref-night .mw-parser-output .sidebar:not(.notheme) .sidebar-title-with-pretitle{background:transparent!important}html.skin-theme-clientpref-night .mw-parser-output .sidebar:not(.notheme) .sidebar-title-with-pretitle a{color:var(--color-progressive)!important}}@media screen and (prefers-color-scheme:dark){html.skin-theme-clientpref-os .mw-parser-output .sidebar:not(.notheme) .sidebar-list-title,html.skin-theme-clientpref-os .mw-parser-output .sidebar:not(.notheme) .sidebar-title-with-pretitle{background:transparent!important}html.skin-theme-clientpref-os .mw-parser-output .sidebar:not(.notheme) .sidebar-title-with-pretitle a{color:var(--color-progressive)!important}}@media print{body.ns-0 .mw-parser-output .sidebar{display:none!important}}</style><table class="sidebar sidebar-collapse nomobile nowraplinks hlist"><tbody><tr><th class="sidebar-title"><a href="/wiki/Internet" title="Internet">Internet</a></th></tr><tr><td class="sidebar-image"><span typeof="mw:File"><a href="/wiki/File:Internet_map_1024_-_transparent,_inverted.png" class="mw-file-description" title="Visualization of Internet routing paths"><img alt="Visualization of Internet routing paths" src="//upload.wikimedia.org/wikipedia/commons/thumb/3/3f/Internet_map_1024_-_transparent%2C_inverted.png/150px-Internet_map_1024_-_transparent%2C_inverted.png" decoding="async" width="150" height="150" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/3/3f/Internet_map_1024_-_transparent%2C_inverted.png/225px-Internet_map_1024_-_transparent%2C_inverted.png 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/3/3f/Internet_map_1024_-_transparent%2C_inverted.png/300px-Internet_map_1024_-_transparent%2C_inverted.png 2x" data-file-width="1280" data-file-height="1280" /></a></span><div class="sidebar-caption">An <a href="/wiki/Opte_Project" title="Opte Project">Opte Project</a> visualization of <a href="/wiki/Routing" title="Routing">routing paths</a> through a portion of the Internet</div></td></tr><tr><td class="sidebar-content"> <div class="sidebar-list mw-collapsible"><div class="sidebar-list-title" style="background:transparent;border-top:1px solid #aaa;text-align:center;color: var(--color-base)">General</div><div class="sidebar-list-content mw-collapsible-content"> <ul><li><a href="/wiki/Internet_access" title="Internet access">Access</a></li> <li><a href="/wiki/Internet_activism" title="Internet activism">Activism</a></li> <li><a href="/wiki/Internet_censorship" title="Internet censorship">Censorship</a></li> <li><a href="/wiki/Data_activism" title="Data activism">Data activism</a></li> <li><a href="/wiki/E-democracy" title="E-democracy">Democracy</a></li> <li><a href="/wiki/Digital_divide" title="Digital divide">Digital divide</a></li> <li><a href="/wiki/Digital_rights" title="Digital rights">Digital rights</a></li> <li><a href="/wiki/Internet_freedom" title="Internet freedom">Freedom</a></li> <li><a href="/wiki/Freedom_of_information" title="Freedom of information">Freedom of information</a></li> <li><a href="/wiki/List_of_Internet_phenomena" title="List of Internet phenomena">Internet phenomena</a></li> <li><a href="/wiki/Net_neutrality" title="Net neutrality">Net neutrality</a></li> <li><a href="/wiki/Internet_privacy" title="Internet privacy">Privacy</a></li> <li><a href="/wiki/Right_to_Internet_access" title="Right to Internet access">Right to Internet access</a></li> <li><a href="/wiki/Slacktivism" title="Slacktivism">Slacktivism</a></li> <li><a href="/wiki/Sociology_of_the_Internet" title="Sociology of the Internet">Sociology</a></li> <li><a href="/wiki/Global_Internet_usage" title="Global Internet usage">Usage</a></li> <li><a href="/wiki/Internet_vigilantism" title="Internet vigilantism">Vigilantism</a></li> <li><a href="/wiki/Virtual_community" title="Virtual community">Virtual community</a></li> <li><a href="/wiki/Virtual_volunteering" title="Virtual volunteering">Virtual volunteering</a></li></ul></div></div></td> </tr><tr><td class="sidebar-content"> <div class="sidebar-list mw-collapsible"><div class="sidebar-list-title" style="background:transparent;border-top:1px solid #aaa;text-align:center;color: var(--color-base)"><a href="/wiki/Internet_governance" title="Internet governance">Governance</a></div><div class="sidebar-list-content mw-collapsible-content"> <ul><li><a href="/wiki/Internet_Governance_Forum" title="Internet Governance Forum">IGF</a></li> <li><a href="/wiki/Regional_Internet_registry#Number_Resource_Organization" title="Regional Internet registry">NRO</a></li> <li><a href="/wiki/Internet_Assigned_Numbers_Authority" title="Internet Assigned Numbers Authority">IANA</a></li> <li><a href="/wiki/ICANN" title="ICANN">ICANN</a></li> <li><a href="/wiki/Internet_Engineering_Task_Force" title="Internet Engineering Task Force">IETF</a></li> <li><a href="/wiki/Internet_Society" title="Internet Society">ISOC</a></li></ul></div></div></td> </tr><tr><td class="sidebar-content"> <div class="sidebar-list mw-collapsible"><div class="sidebar-list-title" style="background:transparent;border-top:1px solid #aaa;text-align:center;color: var(--color-base)"><a href="/wiki/Information_infrastructure" title="Information infrastructure">Information infrastructure</a></div><div class="sidebar-list-content mw-collapsible-content"> <ul><li><a href="/wiki/Domain_Name_System" title="Domain Name System">Domain Name System</a></li> <li><a href="/wiki/Hypertext_Transfer_Protocol" class="mw-redirect" title="Hypertext Transfer Protocol">Hypertext Transfer Protocol</a></li> <li><a href="/wiki/Internet_exchange_point" title="Internet exchange point">Internet exchange point</a></li> <li><a href="/wiki/Internet_protocol_suite" title="Internet protocol suite">Internet protocol suite</a> <ul><li><a href="/wiki/Internet_Protocol" title="Internet Protocol">Internet Protocol</a></li> <li><a href="/wiki/Transmission_Control_Protocol" title="Transmission Control Protocol">Transmission Control Protocol</a></li></ul></li> <li><a href="/wiki/Internet_service_provider" title="Internet service provider">Internet service provider</a></li> <li><a href="/wiki/IP_address" title="IP address">IP address</a></li> <li><a href="/wiki/Internet_Message_Access_Protocol" title="Internet Message Access Protocol">Internet Message Access Protocol</a></li> <li><a href="/wiki/Simple_Mail_Transfer_Protocol" title="Simple Mail Transfer Protocol">Simple Mail Transfer Protocol</a></li></ul></div></div></td> </tr><tr><td class="sidebar-content"> <div class="sidebar-list mw-collapsible"><div class="sidebar-list-title" style="background:transparent;border-top:1px solid #aaa;text-align:center;color: var(--color-base)">Services</div><div class="sidebar-list-content mw-collapsible-content"> <ul><li><a href="/wiki/Blog" title="Blog">Blogs</a> <ul><li><a href="/wiki/Microblogging" title="Microblogging">Microblogging</a></li></ul></li> <li><a href="/wiki/Email" title="Email">Email</a></li> <li><a href="/wiki/Internet_fax" title="Internet fax">Fax</a></li> <li><a href="/wiki/File_sharing" title="File sharing">File sharing</a></li> <li><a href="/wiki/File_transfer" title="File transfer">File transfer</a></li> <li><a href="/wiki/Online_game" title="Online game">Games</a></li> <li><a href="/wiki/Instant_messaging" title="Instant messaging">Instant messaging</a></li> <li><a href="/wiki/Podcast" title="Podcast">Podcasts</a></li> <li><a href="/wiki/Online_shopping" title="Online shopping">Shopping</a></li> <li><a href="/wiki/Streaming_television" title="Streaming television">Television</a></li> <li><a href="/wiki/Voice_over_IP" title="Voice over IP">Voice over IP</a></li> <li><a href="/wiki/World_Wide_Web" title="World Wide Web">World Wide Web</a> <ul><li><a href="/wiki/Web_search_engine" class="mw-redirect" title="Web search engine">search</a></li></ul></li></ul></div></div></td> </tr><tr><td class="sidebar-content"> <div class="sidebar-list mw-collapsible"><div class="sidebar-list-title" style="background:transparent;border-top:1px solid #aaa;text-align:center;color: var(--color-base)">History</div><div class="sidebar-list-content mw-collapsible-content"> <ul><li><a href="/wiki/History_of_the_Internet" title="History of the Internet">History of the Internet</a></li> <li><a href="/wiki/List_of_the_oldest_currently_registered_Internet_domain_names" title="List of the oldest currently registered Internet domain names">Oldest domain names</a></li> <li><a href="/wiki/List_of_Internet_pioneers" title="List of Internet pioneers">Pioneers</a></li> <li><a href="/wiki/Protocol_Wars" title="Protocol Wars">Protocol Wars</a></li></ul></div></div></td> </tr><tr><td class="sidebar-content"> <div class="sidebar-list mw-collapsible"><div class="sidebar-list-title" style="background:transparent;border-top:1px solid #aaa;text-align:center;color: var(--color-base)">Guides</div><div class="sidebar-list-content mw-collapsible-content"> <ul><li><b><span class="noviewer" typeof="mw:File"><span title="List-Class article"><img alt="" src="//upload.wikimedia.org/wikipedia/en/thumb/d/db/Symbol_list_class.svg/16px-Symbol_list_class.svg.png" decoding="async" width="16" height="16" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/en/thumb/d/db/Symbol_list_class.svg/23px-Symbol_list_class.svg.png 1.5x, //upload.wikimedia.org/wikipedia/en/thumb/d/db/Symbol_list_class.svg/31px-Symbol_list_class.svg.png 2x" data-file-width="180" data-file-height="185" /></span></span> <a href="/wiki/Index_of_Internet-related_articles" title="Index of Internet-related articles">Index</a></b></li> <li><b><a href="/wiki/Outline_of_the_Internet" title="Outline of the Internet">Outline</a></b></li></ul></div></div></td> </tr><tr><td class="sidebar-below"> <span class="nowrap"><span class="noviewer" typeof="mw:File"><a href="/wiki/File:Crystal_Clear_app_linneighborhood.svg" class="mw-file-description"><img alt="icon" src="//upload.wikimedia.org/wikipedia/commons/thumb/f/f9/Crystal_Clear_app_linneighborhood.svg/16px-Crystal_Clear_app_linneighborhood.svg.png" decoding="async" width="16" height="16" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/f/f9/Crystal_Clear_app_linneighborhood.svg/24px-Crystal_Clear_app_linneighborhood.svg.png 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/f/f9/Crystal_Clear_app_linneighborhood.svg/32px-Crystal_Clear_app_linneighborhood.svg.png 2x" data-file-width="407" data-file-height="407" /></a></span> </span><a href="/wiki/Portal:Internet" title="Portal:Internet">Internet&#32;portal</a></td></tr><tr><td class="sidebar-navbar"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1129693374"><style data-mw-deduplicate="TemplateStyles:r1239400231">.mw-parser-output .navbar{display:inline;font-size:88%;font-weight:normal}.mw-parser-output .navbar-collapse{float:left;text-align:left}.mw-parser-output .navbar-boxtext{word-spacing:0}.mw-parser-output .navbar ul{display:inline-block;white-space:nowrap;line-height:inherit}.mw-parser-output .navbar-brackets::before{margin-right:-0.125em;content:"[ "}.mw-parser-output .navbar-brackets::after{margin-left:-0.125em;content:" ]"}.mw-parser-output .navbar li{word-spacing:-0.125em}.mw-parser-output .navbar a>span,.mw-parser-output .navbar a>abbr{text-decoration:inherit}.mw-parser-output .navbar-mini abbr{font-variant:small-caps;border-bottom:none;text-decoration:none;cursor:inherit}.mw-parser-output .navbar-ct-full{font-size:114%;margin:0 7em}.mw-parser-output .navbar-ct-mini{font-size:114%;margin:0 4em}html.skin-theme-clientpref-night .mw-parser-output .navbar li a abbr{color:var(--color-base)!important}@media(prefers-color-scheme:dark){html.skin-theme-clientpref-os .mw-parser-output .navbar li a abbr{color:var(--color-base)!important}}@media print{.mw-parser-output .navbar{display:none!important}}</style><div class="navbar plainlinks hlist navbar-mini"><ul><li class="nv-view"><a href="/wiki/Template:Internet" title="Template:Internet"><abbr title="View this template">v</abbr></a></li><li class="nv-talk"><a href="/wiki/Template_talk:Internet" title="Template talk:Internet"><abbr title="Discuss this template">t</abbr></a></li><li class="nv-edit"><a href="/wiki/Special:EditPage/Template:Internet" title="Special:EditPage/Template:Internet"><abbr title="Edit this template">e</abbr></a></li></ul></div></td></tr></tbody></table> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236090951"><div role="note" class="hatnote navigation-not-searchable">See also: <a href="/wiki/Signals_intelligence" title="Signals intelligence">Signals intelligence</a></div> <p>The vast majority of computer surveillance involves the monitoring of <a href="/wiki/Data_mining" title="Data mining">personal data</a> and <a href="/wiki/Traffic_analysis" title="Traffic analysis">traffic</a> on the <a href="/wiki/Internet" title="Internet">Internet</a>.<sup id="cite_ref-sciam-internet_7-0" class="reference"><a href="#cite_note-sciam-internet-7"><span class="cite-bracket">&#91;</span>7<span class="cite-bracket">&#93;</span></a></sup> For example, in the United States, the <a href="/wiki/Communications_Assistance_For_Law_Enforcement_Act" class="mw-redirect" title="Communications Assistance For Law Enforcement Act">Communications Assistance For Law Enforcement Act</a> mandates that all phone calls and <a href="/wiki/Broadband" title="Broadband">broadband</a> <a href="/wiki/Internet_traffic" title="Internet traffic">internet traffic</a> (<a href="/wiki/Email" title="Email">emails</a>, <a href="/wiki/Web_traffic" title="Web traffic">web traffic</a>, <a href="/wiki/Instant_messaging" title="Instant messaging">instant messaging</a>, etc.) be available for unimpeded, real-time monitoring by Federal law enforcement agencies.<sup id="cite_ref-eff-calea-archive_8-0" class="reference"><a href="#cite_note-eff-calea-archive-8"><span class="cite-bracket">&#91;</span>8<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-eff-calea-summary_9-0" class="reference"><a href="#cite_note-eff-calea-summary-9"><span class="cite-bracket">&#91;</span>9<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-eff-calea-faq_10-0" class="reference"><a href="#cite_note-eff-calea-faq-10"><span class="cite-bracket">&#91;</span>10<span class="cite-bracket">&#93;</span></a></sup> </p><p><a href="/wiki/Packet_capture" class="mw-redirect" title="Packet capture">Packet capture</a> (also known as "packet sniffing") is the monitoring of data traffic on a <a href="/wiki/Computer_network" title="Computer network">network</a>.<sup id="cite_ref-11" class="reference"><a href="#cite_note-11"><span class="cite-bracket">&#91;</span>11<span class="cite-bracket">&#93;</span></a></sup> Data sent between computers over the <a href="/wiki/Internet" title="Internet">Internet</a> or between any networks takes the form of small chunks called packets, which are routed to their destination and assembled back into a complete message. A <a href="/wiki/Packet_Capture_Appliance" class="mw-redirect" title="Packet Capture Appliance">packet capture appliance</a> intercepts these packets, so that they may be examined and analyzed. Computer technology is needed to perform <a href="/wiki/Traffic_analysis" title="Traffic analysis">traffic analysis</a> and sift through intercepted data to look for important/useful information. Under the <a href="/wiki/Communications_Assistance_For_Law_Enforcement_Act" class="mw-redirect" title="Communications Assistance For Law Enforcement Act">Communications Assistance For Law Enforcement Act</a>, all U.S. telecommunications providers are required to install such packet capture technology so that Federal law enforcement and intelligence agencies are able to intercept all of their customers' <a href="/wiki/Broadband_Internet" class="mw-redirect" title="Broadband Internet">broadband Internet</a> and <a href="/wiki/Voice_over_Internet_protocol" class="mw-redirect" title="Voice over Internet protocol">voice over Internet protocol</a> (VoIP) traffic. These technologies can be used both by the intelligence and for illegal activities.<sup id="cite_ref-12" class="reference"><a href="#cite_note-12"><span class="cite-bracket">&#91;</span>12<span class="cite-bracket">&#93;</span></a></sup> </p><p>There is far too much data gathered by these packet sniffers for human investigators to manually search through. Thus, automated Internet surveillance computers sift through the vast amount of intercepted Internet traffic, filtering out, and reporting to investigators those bits of information which are "interesting", for example, the use of certain words or phrases, visiting certain types of web sites, or communicating via email or chat with a certain individual or group.<sup id="cite_ref-usatoday-chatroom_13-0" class="reference"><a href="#cite_note-usatoday-chatroom-13"><span class="cite-bracket">&#91;</span>13<span class="cite-bracket">&#93;</span></a></sup> Billions of dollars per year are spent by agencies such as the <a href="/wiki/Information_Awareness_Office" title="Information Awareness Office">Information Awareness Office</a>, <a href="/wiki/NSA" class="mw-redirect" title="NSA">NSA</a>, and the <a href="/wiki/FBI" class="mw-redirect" title="FBI">FBI</a>, for the development, purchase, implementation, and operation of systems which intercept and analyze this data, extracting only the information that is useful to law enforcement and intelligence agencies.<sup id="cite_ref-zdnet-fbi_14-0" class="reference"><a href="#cite_note-zdnet-fbi-14"><span class="cite-bracket">&#91;</span>14<span class="cite-bracket">&#93;</span></a></sup> </p><p>Similar systems are now used by <a href="/wiki/Ministry_of_Intelligence_and_National_Security_of_Iran" class="mw-redirect" title="Ministry of Intelligence and National Security of Iran">Iranian Security dept.</a> to more easily distinguish between peaceful citizens and terrorists. All of the technology has been allegedly installed by German <a href="/wiki/Siemens_AG" class="mw-redirect" title="Siemens AG">Siemens AG</a> and Finnish <a href="/wiki/Nokia" title="Nokia">Nokia</a>.<sup id="cite_ref-15" class="reference"><a href="#cite_note-15"><span class="cite-bracket">&#91;</span>15<span class="cite-bracket">&#93;</span></a></sup> </p><p>The Internet's rapid development has become a primary form of communication. More people are potentially subject to Internet surveillance. There are advantages and disadvantages to <a href="/wiki/Network_monitoring" title="Network monitoring">network monitoring</a>. For instance, systems described as "Web 2.0"<sup id="cite_ref-Reilly,_T._2005_16-0" class="reference"><a href="#cite_note-Reilly,_T._2005-16"><span class="cite-bracket">&#91;</span>16<span class="cite-bracket">&#93;</span></a></sup> have greatly impacted modern society. Tim O’ Reilly, who first explained the concept of "Web 2.0",<sup id="cite_ref-Reilly,_T._2005_16-1" class="reference"><a href="#cite_note-Reilly,_T._2005-16"><span class="cite-bracket">&#91;</span>16<span class="cite-bracket">&#93;</span></a></sup> stated that Web 2.0 provides communication platforms that are "user generated", with self-produced content, motivating more people to communicate with friends online.<sup id="cite_ref-17" class="reference"><a href="#cite_note-17"><span class="cite-bracket">&#91;</span>17<span class="cite-bracket">&#93;</span></a></sup> However, Internet surveillance also has a disadvantage. One researcher from <a href="/wiki/Uppsala_University" title="Uppsala University">Uppsala University</a> said "Web 2.0 surveillance is directed at large user groups who help to hegemonically produce and reproduce surveillance by providing user-generated (self-produced) content. We can characterize Web 2.0 surveillance as mass self-surveillance".<sup id="cite_ref-18" class="reference"><a href="#cite_note-18"><span class="cite-bracket">&#91;</span>18<span class="cite-bracket">&#93;</span></a></sup> Surveillance companies monitor people while they are focused on work or entertainment. Yet, employers themselves also <a href="/wiki/Employee_monitoring" title="Employee monitoring">monitor their employees</a>. They do so in order to protect the company's assets and to control public communications but most importantly, to make sure that their employees are actively working and being productive.<sup id="cite_ref-19" class="reference"><a href="#cite_note-19"><span class="cite-bracket">&#91;</span>19<span class="cite-bracket">&#93;</span></a></sup> This can emotionally affect people; this is because it can cause emotions like jealousy. A research group states "...we set out to test the prediction that feelings of jealousy lead to 'creeping' on a partner through Facebook, and that women are particularly likely to engage in partner monitoring in response to jealousy".<sup id="cite_ref-20" class="reference"><a href="#cite_note-20"><span class="cite-bracket">&#91;</span>20<span class="cite-bracket">&#93;</span></a></sup> The study shows that women can become jealous of other people when they are in an online group. </p><p><a href="/wiki/Virtual_assistant_(artificial_intelligence)" class="mw-redirect" title="Virtual assistant (artificial intelligence)">Virtual assistants</a> have become socially integrated into many people's lives. Currently, virtual assistants such as Amazon's Alexa or Apple's Siri cannot call 911 or local services.<sup id="cite_ref-Smart_Devices_Call_Cops_21-0" class="reference"><a href="#cite_note-Smart_Devices_Call_Cops-21"><span class="cite-bracket">&#91;</span>21<span class="cite-bracket">&#93;</span></a></sup> They are constantly listening for command and recording parts of conversations that will help improve algorithms. If the law enforcement is able to be called using a virtual assistant, the law enforcement would then be able to have access to all the information saved for the device.<sup id="cite_ref-Smart_Devices_Call_Cops_21-1" class="reference"><a href="#cite_note-Smart_Devices_Call_Cops-21"><span class="cite-bracket">&#91;</span>21<span class="cite-bracket">&#93;</span></a></sup> The device is connected to the home's internet, because of this law enforcement would be the exact location of the individual calling for law enforcement.<sup id="cite_ref-Smart_Devices_Call_Cops_21-2" class="reference"><a href="#cite_note-Smart_Devices_Call_Cops-21"><span class="cite-bracket">&#91;</span>21<span class="cite-bracket">&#93;</span></a></sup> While the virtual assistance devices are popular, many debates the lack of privacy. The devices are listening to every conversation the owner is having. Even if the owner is not talking to a virtual assistant, the device is still listening to the conversation in hopes that the owner will need assistance, as well as to gather data.<sup id="cite_ref-22" class="reference"><a href="#cite_note-22"><span class="cite-bracket">&#91;</span>22<span class="cite-bracket">&#93;</span></a></sup> </p> <div class="mw-heading mw-heading2"><h2 id="Corporate_surveillance">Corporate surveillance</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Computer_and_network_surveillance&amp;action=edit&amp;section=2" title="Edit section: Corporate surveillance"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236090951"><div role="note" class="hatnote navigation-not-searchable">See also: <a href="/wiki/Computer_surveillance_in_the_workplace" title="Computer surveillance in the workplace">Computer surveillance in the workplace</a></div> <p><a href="/wiki/Corporate_surveillance" title="Corporate surveillance">Corporate surveillance</a> of computer activity is very common. The data collected is most often used for marketing purposes or sold to other corporations, but is also regularly shared with government agencies. It can be used as a form of <a href="/wiki/Business_intelligence" title="Business intelligence">business intelligence</a>, which enables the corporation to better tailor their products and/or services to be desirable by their customers. The data can also be sold to other corporations so that they can use it for the aforementioned purpose, or it can be used for direct marketing purposes, such as <a href="/wiki/Targeted_advertisement" class="mw-redirect" title="Targeted advertisement">targeted advertisements</a>, where ads are targeted to the user of the search engine by analyzing their search history and emails<sup id="cite_ref-nytimes-onlineads_23-0" class="reference"><a href="#cite_note-nytimes-onlineads-23"><span class="cite-bracket">&#91;</span>23<span class="cite-bracket">&#93;</span></a></sup> (if they use free webmail services), which are kept in a database.<sup id="cite_ref-surv-in-society_24-0" class="reference"><a href="#cite_note-surv-in-society-24"><span class="cite-bracket">&#91;</span>24<span class="cite-bracket">&#93;</span></a></sup> </p><p>Such type of surveillance is also used to establish business purposes of monitoring, which may include the following: </p> <ul><li>Preventing misuse of resources. Companies can discourage unproductive personal activities such as online shopping or web surfing on company time. Monitoring <a href="/wiki/Employee_Performance" class="mw-redirect" title="Employee Performance">employee performance</a> is one way to reduce unnecessary <a href="/wiki/Network_traffic" title="Network traffic">network traffic</a> and reduce the consumption of <a href="/wiki/Network_bandwidth" class="mw-redirect" title="Network bandwidth">network bandwidth</a>.</li> <li>Promoting adherence to policies. Online surveillance is one means of verifying employee observance of company networking policies.</li> <li>Preventing lawsuits. Firms can be held liable for discrimination or employee harassment in the workplace. Organizations can also be involved in infringement suits through employees that distribute copyrighted material over corporate networks.</li> <li>Safeguarding records. Federal legislation requires organizations to protect personal information. Monitoring can determine the extent of compliance with company policies and programs overseeing information security. Monitoring may also deter unlawful appropriation of personal information, and potential spam or viruses.</li> <li>Safeguarding company assets. The protection of <a href="/wiki/Intellectual_property" title="Intellectual property">intellectual property</a>, <a href="/wiki/Trade_secret" title="Trade secret">trade secrets</a>, and business strategies is a major concern. The ease of information transmission and storage makes it imperative to monitor employee actions as part of a broader policy.</li></ul> <p>The second component of prevention is determining the ownership of technology resources. The ownership of the firm's networks, servers, computers, files, and e-mail should be explicitly stated. There should be a distinction between an employee's personal electronic devices, which should be limited and proscribed, and those owned by the firm. </p><p>For instance, <a href="/wiki/Google_Search" title="Google Search">Google Search</a> stores identifying information for each web search. An <a href="/wiki/IP_address" title="IP address">IP address</a> and the search phrase used are stored in a database for up to 18 months.<sup id="cite_ref-cnet-googlelogs_25-0" class="reference"><a href="#cite_note-cnet-googlelogs-25"><span class="cite-bracket">&#91;</span>25<span class="cite-bracket">&#93;</span></a></sup> Google also scans the content of emails of users of its Gmail webmail service in order to create targeted advertising based on what people are talking about in their personal email correspondences.<sup id="cite_ref-joshi_26-0" class="reference"><a href="#cite_note-joshi-26"><span class="cite-bracket">&#91;</span>26<span class="cite-bracket">&#93;</span></a></sup> Google is, by far, the largest Internet advertising agency—millions of sites place Google's advertising banners and links on their websites in order to earn money from visitors who click on the ads. Each page containing Google advertisements adds, reads, and modifies <a href="/wiki/HTTP_cookie" title="HTTP cookie">"cookies"</a> on each visitor's computer.<sup id="cite_ref-google-adprivacy_27-0" class="reference"><a href="#cite_note-google-adprivacy-27"><span class="cite-bracket">&#91;</span>27<span class="cite-bracket">&#93;</span></a></sup> These cookies <a href="/wiki/Web_tracking" title="Web tracking">track the user</a> across all of these sites and gather information about their web surfing habits, keeping track of which sites they visit, and what they do when they are on these sites. This information, along with the information <a href="/wiki/Email_tracking" title="Email tracking">from their email accounts</a>, and search engine histories, is stored by Google to use to build a <a href="/wiki/Profile_(information_science)" class="mw-redirect" title="Profile (information science)">profile</a> of the user to deliver better-targeted advertising.<sup id="cite_ref-joshi_26-1" class="reference"><a href="#cite_note-joshi-26"><span class="cite-bracket">&#91;</span>26<span class="cite-bracket">&#93;</span></a></sup> </p><p>The United States government often gains access to these databases, either by producing a warrant for it, or by simply asking. The <a href="/wiki/Department_of_Homeland_Security" class="mw-redirect" title="Department of Homeland Security">Department of Homeland Security</a> has openly stated that it uses data collected from consumer credit and direct marketing agencies for augmenting the profiles of individuals that it is monitoring.<sup id="cite_ref-surv-in-society_24-1" class="reference"><a href="#cite_note-surv-in-society-24"><span class="cite-bracket">&#91;</span>24<span class="cite-bracket">&#93;</span></a></sup> </p> <div class="mw-heading mw-heading2"><h2 id="Malicious_software">Malicious software</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Computer_and_network_surveillance&amp;action=edit&amp;section=3" title="Edit section: Malicious software"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236090951"><div role="note" class="hatnote navigation-not-searchable">Further information: <a href="/wiki/Spyware" title="Spyware">Spyware</a>, <a href="/wiki/Computer_virus" title="Computer virus">Computer virus</a>, <a href="/wiki/Trojan_(computer_security)" class="mw-redirect" title="Trojan (computer security)">Trojan (computer security)</a>, <a href="/wiki/Keylogger" class="mw-redirect" title="Keylogger">Keylogger</a>, and <a href="/wiki/Backdoor_(computing)" title="Backdoor (computing)">Backdoor (computing)</a></div> <p>In addition to monitoring information sent over a computer network, there is also a way to examine data stored on a computer's <a href="/wiki/Hard_drive" class="mw-redirect" title="Hard drive">hard drive</a>, and to monitor the activities of a person using the computer. A surveillance program installed on a computer can search the contents of the hard drive for suspicious data, can monitor computer use, collect <a href="/wiki/Password" title="Password">passwords</a>, and/or report back activities in real-time to its operator through the Internet connection.<sup id="cite_ref-FTC2005_28-0" class="reference"><a href="#cite_note-FTC2005-28"><span class="cite-bracket">&#91;</span>28<span class="cite-bracket">&#93;</span></a></sup> A keylogger is an example of this type of program. Normal keylogging programs store their data on the local hard drive, but some are programmed to automatically transmit data over the network to a remote computer or Web server. </p><p>There are multiple ways of installing such software. The most common is remote installation, using a <a href="/wiki/Backdoor_(computing)" title="Backdoor (computing)">backdoor</a> created by a <a href="/wiki/Computer_virus" title="Computer virus">computer virus</a> or <a href="/wiki/Trojan_(computer_security)" class="mw-redirect" title="Trojan (computer security)">trojan</a>. This tactic has the advantage of potentially subjecting multiple computers to surveillance. Viruses often spread to thousands or millions of computers, and leave "backdoors" which are accessible over a network connection, and enable an intruder to remotely install software and execute commands. These viruses and trojans are sometimes developed by government agencies, such as <a href="/wiki/CIPAV" class="mw-redirect" title="CIPAV">CIPAV</a> and <a href="/wiki/Magic_Lantern_(spyware)" title="Magic Lantern (spyware)">Magic Lantern</a>. More often, however, viruses created by other people or <a href="/wiki/Spyware" title="Spyware">spyware</a> installed by marketing agencies can be used to gain access through the security breaches that they create.<sup id="cite_ref-29" class="reference"><a href="#cite_note-29"><span class="cite-bracket">&#91;</span>29<span class="cite-bracket">&#93;</span></a></sup> </p><p>Another method is <a href="/wiki/Security_cracking" class="mw-redirect" title="Security cracking">"cracking"</a> into the computer to gain access over a network. An attacker can then install surveillance software remotely. <a href="/wiki/Server_(computing)" title="Server (computing)">Servers</a> and computers with permanent <a href="/wiki/Broadband" title="Broadband">broadband</a> connections are most vulnerable to this type of attack.<sup id="cite_ref-30" class="reference"><a href="#cite_note-30"><span class="cite-bracket">&#91;</span>30<span class="cite-bracket">&#93;</span></a></sup> Another source of security cracking is employees giving out information or users using brute force tactics to guess their password.<sup id="cite_ref-31" class="reference"><a href="#cite_note-31"><span class="cite-bracket">&#91;</span>31<span class="cite-bracket">&#93;</span></a></sup> </p><p>One can also physically place surveillance software on a computer by gaining entry to the place where the computer is stored and install it from a <a href="/wiki/Compact_disc" title="Compact disc">compact disc</a>, <a href="/wiki/Floppy_disk" title="Floppy disk">floppy disk</a>, or <a href="/wiki/USB_flash_drive" title="USB flash drive">thumbdrive</a>. This method shares a disadvantage with hardware devices in that it requires <a href="/wiki/Physical_access" title="Physical access">physical access</a> to the computer.<sup id="cite_ref-32" class="reference"><a href="#cite_note-32"><span class="cite-bracket">&#91;</span>32<span class="cite-bracket">&#93;</span></a></sup> One well-known worm that uses this method of spreading itself is <a href="/wiki/Stuxnet" title="Stuxnet">Stuxnet</a>.<sup id="cite_ref-33" class="reference"><a href="#cite_note-33"><span class="cite-bracket">&#91;</span>33<span class="cite-bracket">&#93;</span></a></sup> </p> <div class="mw-heading mw-heading2"><h2 id="Social_network_analysis">Social network analysis</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Computer_and_network_surveillance&amp;action=edit&amp;section=4" title="Edit section: Social network analysis"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>One common form of surveillance is to <a href="/wiki/Social_network_analysis" title="Social network analysis">create maps of social networks</a> based on data from <a href="/wiki/Social_networking_sites" class="mw-redirect" title="Social networking sites">social networking sites</a> as well as from <a href="/wiki/Traffic_analysis" title="Traffic analysis">traffic analysis</a> information from phone call records such as those in the <a href="/wiki/NSA_call_database" class="mw-redirect" title="NSA call database">NSA call database</a>,<sup id="cite_ref-keefe_34-0" class="reference"><a href="#cite_note-keefe-34"><span class="cite-bracket">&#91;</span>34<span class="cite-bracket">&#93;</span></a></sup> and internet traffic data gathered under <a href="/wiki/Communications_Assistance_For_Law_Enforcement_Act" class="mw-redirect" title="Communications Assistance For Law Enforcement Act">CALEA</a>. These <a href="/wiki/Social_network" title="Social network">social network</a> "maps" are then <a href="/wiki/Data_mining" title="Data mining">data mined</a> to extract useful information such as personal interests, friendships and affiliations, wants, beliefs, thoughts, and activities.<sup id="cite_ref-part-surv_35-0" class="reference"><a href="#cite_note-part-surv-35"><span class="cite-bracket">&#91;</span>35<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-fuchs_36-0" class="reference"><a href="#cite_note-fuchs-36"><span class="cite-bracket">&#91;</span>36<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-ethier_37-0" class="reference"><a href="#cite_note-ethier-37"><span class="cite-bracket">&#91;</span>37<span class="cite-bracket">&#93;</span></a></sup> </p><p>Many U.S. government agencies such as the <a href="/wiki/Defense_Advanced_Research_Projects_Agency_(DARPA)" class="mw-redirect" title="Defense Advanced Research Projects Agency (DARPA)">Defense Advanced Research Projects Agency (DARPA)</a>, the <a href="/wiki/National_Security_Agency_(NSA)" class="mw-redirect" title="National Security Agency (NSA)">National Security Agency (NSA)</a>, and the <a href="/wiki/Department_of_Homeland_Security_(DHS)" class="mw-redirect" title="Department of Homeland Security (DHS)">Department of Homeland Security (DHS)</a> are currently investing heavily in research involving social network analysis.<sup id="cite_ref-pentagon-social-networks_38-0" class="reference"><a href="#cite_note-pentagon-social-networks-38"><span class="cite-bracket">&#91;</span>38<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-nsa-myspace_39-0" class="reference"><a href="#cite_note-nsa-myspace-39"><span class="cite-bracket">&#91;</span>39<span class="cite-bracket">&#93;</span></a></sup> The intelligence community believes that the biggest threat to the U.S. comes from decentralized, leaderless, geographically dispersed groups. These types of threats are most easily countered by finding important nodes in the network, and removing them. To do this requires a detailed map of the network.<sup id="cite_ref-ethier_37-1" class="reference"><a href="#cite_note-ethier-37"><span class="cite-bracket">&#91;</span>37<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-ressler_40-0" class="reference"><a href="#cite_note-ressler-40"><span class="cite-bracket">&#91;</span>40<span class="cite-bracket">&#93;</span></a></sup> </p><p>Jason Ethier of Northeastern University, in his study of modern social network analysis, said the following of the Scalable Social Network Analysis Program developed by the <a href="/wiki/Information_Awareness_Office" title="Information Awareness Office">Information Awareness Office</a>: </p> <style data-mw-deduplicate="TemplateStyles:r1244412712">.mw-parser-output .templatequote{overflow:hidden;margin:1em 0;padding:0 32px}.mw-parser-output .templatequotecite{line-height:1.5em;text-align:left;margin-top:0}@media(min-width:500px){.mw-parser-output .templatequotecite{padding-left:1.6em}}</style><blockquote class="templatequote"><p><i> The purpose of the SSNA algorithms program is to extend techniques of social network analysis to assist with distinguishing potential terrorist cells from legitimate groups of people ... In order to be successful SSNA will require information on the social interactions of the majority of people around the globe. Since the Defense Department cannot easily distinguish between peaceful citizens and terrorists, it will be necessary for them to gather data on innocent civilians as well as on potential terrorists.</i></p><div class="templatequotecite">—&#8202;<cite>Jason Ethier<sup id="cite_ref-ethier_37-2" class="reference"><a href="#cite_note-ethier-37"><span class="cite-bracket">&#91;</span>37<span class="cite-bracket">&#93;</span></a></sup></cite></div></blockquote> <div class="mw-heading mw-heading2"><h2 id="Monitoring_from_a_distance">Monitoring from a distance</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Computer_and_network_surveillance&amp;action=edit&amp;section=5" title="Edit section: Monitoring from a distance"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>With only commercially available equipment, it has been shown that it is possible to monitor computers from a distance by detecting the <a href="/wiki/Radiation" title="Radiation">radiation</a> emitted by the <a href="/wiki/CRT_monitor" class="mw-redirect" title="CRT monitor">CRT monitor</a>. This form of computer surveillance, known as <a href="/wiki/Tempest_(codename)" title="Tempest (codename)">TEMPEST</a>, involves reading electromagnetic emanations from computing devices in order to extract data from them at distances of hundreds of meters.<sup id="cite_ref-41" class="reference"><a href="#cite_note-41"><span class="cite-bracket">&#91;</span>41<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-emr_42-0" class="reference"><a href="#cite_note-emr-42"><span class="cite-bracket">&#91;</span>42<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-Kuhn2004_43-0" class="reference"><a href="#cite_note-Kuhn2004-43"><span class="cite-bracket">&#91;</span>43<span class="cite-bracket">&#93;</span></a></sup> </p><p>IBM researchers have also found that, for most computer keyboards, each key emits a slightly different noise when pressed. The differences are individually identifiable under some conditions, and so it's possible to log key strokes without actually requiring logging software to run on the associated computer.<sup id="cite_ref-Asonov_44-0" class="reference"><a href="#cite_note-Asonov-44"><span class="cite-bracket">&#91;</span>44<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-Berkeley_45-0" class="reference"><a href="#cite_note-Berkeley-45"><span class="cite-bracket">&#91;</span>45<span class="cite-bracket">&#93;</span></a></sup> </p><p>In 2015, lawmakers in California passed a law prohibiting any investigative personnel in the state to force businesses to hand over digital communication without a warrant, calling this Electronic Communications Privacy Act.<sup id="cite_ref-LA_Times_46-0" class="reference"><a href="#cite_note-LA_Times-46"><span class="cite-bracket">&#91;</span>46<span class="cite-bracket">&#93;</span></a></sup> At the same time in California, state senator Jerry Hill introduced a bill making law enforcement agencies to disclose more information on their usage and information from the <a href="/wiki/Stingray_phone_tracker" title="Stingray phone tracker">Stingray phone tracker</a> device.<sup id="cite_ref-LA_Times_46-1" class="reference"><a href="#cite_note-LA_Times-46"><span class="cite-bracket">&#91;</span>46<span class="cite-bracket">&#93;</span></a></sup> As the law took into effect in January 2016, it will now require cities to operate with new guidelines in relation to how and when law enforcement use this device.<sup id="cite_ref-LA_Times_46-2" class="reference"><a href="#cite_note-LA_Times-46"><span class="cite-bracket">&#91;</span>46<span class="cite-bracket">&#93;</span></a></sup> Some legislators and those holding a public office have disagreed with this technology because of the warrantless tracking, but now if a city wants to use this device, it must be heard by a public hearing.<sup id="cite_ref-LA_Times_46-3" class="reference"><a href="#cite_note-LA_Times-46"><span class="cite-bracket">&#91;</span>46<span class="cite-bracket">&#93;</span></a></sup> Some cities have pulled out of using the StingRay such as Santa Clara County. </p><p>And it has also been shown, by <a href="/wiki/Adi_Shamir" title="Adi Shamir">Adi Shamir</a> et al., that even the high frequency <a href="/wiki/Noise" title="Noise">noise</a> emitted by a <a href="/wiki/Central_processing_unit" title="Central processing unit">CPU</a> includes information about the instructions being executed.<sup id="cite_ref-47" class="reference"><a href="#cite_note-47"><span class="cite-bracket">&#91;</span>47<span class="cite-bracket">&#93;</span></a></sup> </p> <div class="mw-heading mw-heading2"><h2 id="Policeware_and_govware">Policeware and govware</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Computer_and_network_surveillance&amp;action=edit&amp;section=6" title="Edit section: Policeware and govware"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>In German-speaking countries, spyware used or made by the government is sometimes called <i>govware</i>.<sup id="cite_ref-48" class="reference"><a href="#cite_note-48"><span class="cite-bracket">&#91;</span>48<span class="cite-bracket">&#93;</span></a></sup> Some countries like Switzerland and Germany have a legal framework governing the use of such software.<sup id="cite_ref-49" class="reference"><a href="#cite_note-49"><span class="cite-bracket">&#91;</span>49<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-50" class="reference"><a href="#cite_note-50"><span class="cite-bracket">&#91;</span>50<span class="cite-bracket">&#93;</span></a></sup> Known examples include the Swiss <a href="/wiki/MiniPanzer_and_MegaPanzer" title="MiniPanzer and MegaPanzer">MiniPanzer and MegaPanzer</a> and the German <a href="/wiki/R2D2_(trojan)" class="mw-redirect" title="R2D2 (trojan)">R2D2 (trojan)</a>. </p><p>Policeware is a software designed to police citizens by monitoring the discussion and interaction of its citizens.<sup id="cite_ref-51" class="reference"><a href="#cite_note-51"><span class="cite-bracket">&#91;</span>51<span class="cite-bracket">&#93;</span></a></sup> Within the U.S., <a href="/wiki/Carnivore_(software)" title="Carnivore (software)">Carnivore</a> was the first incarnation of secretly installed e-mail monitoring software installed in Internet service providers' networks to log computer communication, including transmitted e-mails.<sup id="cite_ref-52" class="reference"><a href="#cite_note-52"><span class="cite-bracket">&#91;</span>52<span class="cite-bracket">&#93;</span></a></sup> <a href="/wiki/Magic_Lantern_(spyware)" title="Magic Lantern (spyware)">Magic Lantern</a> is another such application, this time running in a targeted computer in a trojan style and performing keystroke logging. <a href="/wiki/CIPAV" class="mw-redirect" title="CIPAV">CIPAV</a>, deployed by the FBI, is a multi-purpose spyware/trojan. </p><p>The <a href="/wiki/Clipper_chip" title="Clipper chip">Clipper Chip</a>, formerly known as MYK-78, is a small hardware chip that the government can install into phones, designed in the nineties. It was intended to secure private communication and data by reading voice messages that are encoded and decode them. The Clipper Chip was designed during the Clinton administration to, “…protect personal safety and national security against a developing information anarchy that fosters criminals, terrorists and foreign foes.”<sup id="cite_ref-53" class="reference"><a href="#cite_note-53"><span class="cite-bracket">&#91;</span>53<span class="cite-bracket">&#93;</span></a></sup> The government portrayed it as the solution to the secret codes or <a href="/wiki/Cryptography" title="Cryptography">cryptographic</a> keys that the age of technology created. Thus, this has raised controversy in the public, because the Clipper Chip is thought to have been the next “Big Brother” tool. This led to the failure of the Clipper proposal, even though there have been many attempts to push the agenda.<sup id="cite_ref-54" class="reference"><a href="#cite_note-54"><span class="cite-bracket">&#91;</span>54<span class="cite-bracket">&#93;</span></a></sup> </p><p>The "<a href="/wiki/Consumer_Broadband_and_Digital_Television_Promotion_Act" title="Consumer Broadband and Digital Television Promotion Act">Consumer Broadband and Digital Television Promotion Act</a>" (CBDTPA) was a bill proposed in the United States Congress. CBDTPA was known as the "Security Systems and Standards Certification Act" (SSSCA) while in draft form and was killed in committee in 2002. Had CBDTPA become law, it would have prohibited technology that could be used to read digital content under copyright (such as music, video, and e-books) without <a href="/wiki/Digital_rights_management" title="Digital rights management">digital rights management</a> (DRM) that prevented access to this material without the permission of the copyright holder.<sup id="cite_ref-55" class="reference"><a href="#cite_note-55"><span class="cite-bracket">&#91;</span>55<span class="cite-bracket">&#93;</span></a></sup> </p> <div class="mw-heading mw-heading2"><h2 id="Surveillance_as_an_aid_to_censorship">Surveillance as an aid to censorship</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Computer_and_network_surveillance&amp;action=edit&amp;section=7" title="Edit section: Surveillance as an aid to censorship"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236090951"><div role="note" class="hatnote navigation-not-searchable">See also: <a href="/wiki/Internet_censorship" title="Internet censorship">Internet censorship</a> and <a href="/wiki/Internet_censorship_circumvention" title="Internet censorship circumvention">Internet censorship circumvention</a></div> <p><a href="/wiki/Surveillance" title="Surveillance">Surveillance</a> and <a href="/wiki/Censorship" title="Censorship">censorship</a> are different. Surveillance can be performed without censorship, but it is harder to engage in censorship without some forms of surveillance.<sup id="cite_ref-56" class="reference"><a href="#cite_note-56"><span class="cite-bracket">&#91;</span>56<span class="cite-bracket">&#93;</span></a></sup> And even when surveillance does not lead directly to censorship, the widespread knowledge or belief that a person, their computer, or their use of the Internet is under surveillance can lead to <a href="/wiki/Self-censorship" title="Self-censorship">self-censorship</a>.<sup id="cite_ref-57" class="reference"><a href="#cite_note-57"><span class="cite-bracket">&#91;</span>57<span class="cite-bracket">&#93;</span></a></sup> </p><p>In March 2013 <a href="/wiki/Reporters_Without_Borders" title="Reporters Without Borders">Reporters Without Borders</a> issued a <i>Special report on Internet surveillance</i> that examines the use of technology that monitors online activity and intercepts electronic communication in order to arrest journalists, <a href="/wiki/Citizen_journalism" title="Citizen journalism">citizen-journalists</a>, and dissidents. The report includes a list of "State Enemies of the Internet", <a href="/wiki/Bahrain" title="Bahrain">Bahrain</a>, <a href="/wiki/China" title="China">China</a>, <a href="/wiki/Iran" title="Iran">Iran</a>, <a href="/wiki/Syria" title="Syria">Syria</a>, and <a href="/wiki/Vietnam" title="Vietnam">Vietnam</a>, countries whose governments are involved in active, intrusive surveillance of news providers, resulting in grave violations of freedom of information and human rights. Computer and network surveillance is on the increase in these countries. The report also includes a second list of "Corporate Enemies of the Internet", <a href="/wiki/Amesys" class="mw-redirect" title="Amesys">Amesys</a> (France), <a href="/wiki/Blue_Coat_Systems" title="Blue Coat Systems">Blue Coat Systems</a> (U.S.), Gamma (UK and Germany), Hacking Team (Italy), and Trovicor (Germany), companies that sell products that are liable to be used by governments to violate human rights and freedom of information. Neither list is exhaustive and they are likely to be expanded in the future.<sup id="cite_ref-RSFSRS-March2013_58-0" class="reference"><a href="#cite_note-RSFSRS-March2013-58"><span class="cite-bracket">&#91;</span>58<span class="cite-bracket">&#93;</span></a></sup> </p><p>Protection of sources is no longer just a matter of journalistic ethics. Journalists should equip themselves with a "digital survival kit" if they are exchanging sensitive information online, storing it on a computer hard-drive or mobile phone.<sup id="cite_ref-RSFSRS-March2013_58-1" class="reference"><a href="#cite_note-RSFSRS-March2013-58"><span class="cite-bracket">&#91;</span>58<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-59" class="reference"><a href="#cite_note-59"><span class="cite-bracket">&#91;</span>59<span class="cite-bracket">&#93;</span></a></sup> Individuals associated with high-profile rights organizations, dissident groups, protest groups, or reform groups are urged to take extra precautions to protect their online identities.<sup id="cite_ref-CitizensLab-2007_60-0" class="reference"><a href="#cite_note-CitizensLab-2007-60"><span class="cite-bracket">&#91;</span>60<span class="cite-bracket">&#93;</span></a></sup> </p> <div class="mw-heading mw-heading2"><h2 id="See_also">See also</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Computer_and_network_surveillance&amp;action=edit&amp;section=8" title="Edit section: See also"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1129693374"><style data-mw-deduplicate="TemplateStyles:r1126788409">.mw-parser-output .plainlist ol,.mw-parser-output .plainlist ul{line-height:inherit;list-style:none;margin:0;padding:0}.mw-parser-output .plainlist ol li,.mw-parser-output .plainlist ul li{margin-bottom:0}</style><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1246091330"><table class="sidebar sidebar-collapse nomobile nowraplinks hlist" style="border:1px solid #B2BEB"><tbody><tr><td class="sidebar-pretitle" style="background:#B2BEB5">Part of <a href="/wiki/Category:Global_surveillance" title="Category:Global surveillance">a series</a> on</td></tr><tr><th class="sidebar-title-with-pretitle" style="background:#B2BEB5;font-weight:normal;padding-bottom:0.15em;"><b><a href="/wiki/Global_surveillance" title="Global surveillance">Global surveillance</a></b></th></tr><tr><td class="sidebar-image"><span typeof="mw:File"><a href="/wiki/File:Globe_eye_icon.png" class="mw-file-description"><img src="//upload.wikimedia.org/wikipedia/commons/thumb/0/08/Globe_eye_icon.png/150px-Globe_eye_icon.png" decoding="async" width="150" height="60" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/0/08/Globe_eye_icon.png/225px-Globe_eye_icon.png 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/0/08/Globe_eye_icon.png/300px-Globe_eye_icon.png 2x" data-file-width="1024" data-file-height="410" /></a></span></td></tr><tr><th class="sidebar-heading" style="background:#B2BEB5"> Disclosures</th></tr><tr><td class="sidebar-content"> <ul><li><a href="/wiki/Origins_of_global_surveillance" title="Origins of global surveillance">Origins</a></li> <li><a href="/wiki/Global_surveillance_disclosures_(1970%E2%80%932013)" title="Global surveillance disclosures (1970–2013)">Pre-2013</a></li> <li><a href="/wiki/2010s_global_surveillance_disclosures" title="2010s global surveillance disclosures">2013–present</a></li> <li><a href="/wiki/Reactions_to_global_surveillance_disclosures" title="Reactions to global surveillance disclosures">Reactions</a></li></ul></td> </tr><tr><th class="sidebar-heading" style="background:#B2BEB5"> Systems</th></tr><tr><td class="sidebar-content"> <ul><li><a href="/wiki/XKeyscore" title="XKeyscore">XKeyscore</a></li> <li><a href="/wiki/PRISM" title="PRISM">PRISM</a></li> <li><a href="/wiki/ECHELON" title="ECHELON">ECHELON</a></li> <li><a href="/wiki/Sentient_(intelligence_analysis_system)" title="Sentient (intelligence analysis system)">Sentient</a></li> <li><a href="/wiki/Carnivore_(software)" title="Carnivore (software)">Carnivore</a></li> <li><a href="/wiki/Dishfire" title="Dishfire">Dishfire</a></li> <li><a href="/wiki/Stone_Ghost" title="Stone Ghost">Stone Ghost</a></li> <li><a href="/wiki/Tempora" title="Tempora">Tempora</a></li> <li><a href="/wiki/Frenchelon" title="Frenchelon">Frenchelon</a></li> <li><a href="/wiki/Fairview_(surveillance_program)" title="Fairview (surveillance program)">Fairview</a></li> <li><a href="/wiki/MYSTIC_(surveillance_program)" class="mw-redirect" title="MYSTIC (surveillance program)">MYSTIC</a></li> <li><a href="/wiki/Digital_Collection_System_Network" title="Digital Collection System Network">DCSN</a></li> <li><a href="/wiki/Boundless_Informant" title="Boundless Informant">Boundless Informant</a></li> <li><a href="/wiki/Bullrun_(decryption_program)" title="Bullrun (decryption program)">Bullrun</a></li> <li><a href="/wiki/Pinwale" title="Pinwale">Pinwale</a></li> <li><a href="/wiki/Stingray_phone_tracker" title="Stingray phone tracker">Stingray</a></li> <li><a href="/wiki/SORM" title="SORM">SORM</a></li> <li><a href="/wiki/RAMPART-A" title="RAMPART-A">RAMPART-A</a></li> <li><a href="/wiki/Mastering_the_Internet" title="Mastering the Internet">Mastering the Internet</a></li> <li><a href="/wiki/Jindalee_Operational_Radar_Network" title="Jindalee Operational Radar Network">Jindalee Operational Radar Network</a></li></ul></td> </tr><tr><th class="sidebar-heading" style="background:#B2BEB5"> Selected agencies</th></tr><tr><td class="sidebar-content"> <ul><li><a href="/wiki/Five_Eyes" title="Five Eyes">FVEY</a> <ul><li><a href="/wiki/Australian_Signals_Directorate" title="Australian Signals Directorate">ASD</a></li> <li><a href="/wiki/Communications_Security_Establishment" title="Communications Security Establishment">CSE</a></li> <li><a href="/wiki/Government_Communications_Security_Bureau" title="Government Communications Security Bureau">GCSB</a></li> <li><a href="/wiki/GCHQ" title="GCHQ">GCHQ</a></li> <li><a href="/wiki/National_Security_Agency" title="National Security Agency">NSA</a></li></ul></li> <li><a href="/wiki/Federal_Intelligence_Service" title="Federal Intelligence Service">BND</a></li> <li><a href="/wiki/National_Cyber_and_Crypto_Agency" title="National Cyber and Crypto Agency">BSSN</a></li> <li><a href="/wiki/National_Intelligence_Centre_(Spain)" title="National Intelligence Centre (Spain)">CNI</a></li> <li><a href="/wiki/Defense_Intelligence_Headquarters" title="Defense Intelligence Headquarters">DIH</a></li> <li><a href="/wiki/Directorate-General_for_External_Security" title="Directorate-General for External Security">DGSE</a></li> <li><a href="/wiki/KGB" title="KGB">KGB</a></li> <li><a href="/wiki/Ministry_of_State_Security_(China)" title="Ministry of State Security (China)">MSS</a></li> <li><a href="/wiki/Joint_Sigint_Cyber_Unit" title="Joint Sigint Cyber Unit">JSCU</a></li> <li><a href="/wiki/Special_Communications_Service_of_Russia" title="Special Communications Service of Russia">Spetssvyaz</a></li> <li><a href="/wiki/Unit_8200" title="Unit 8200">Unit 8200</a></li></ul></td> </tr><tr><th class="sidebar-heading" style="background:#B2BEB5"> Places</th></tr><tr><td class="sidebar-content"> <ul><li><a href="/wiki/The_Doughnut" title="The Doughnut">The Doughnut</a></li> <li><a href="/wiki/Fort_Meade" title="Fort Meade">Fort Meade</a></li> <li><a href="/wiki/RAF_Menwith_Hill" title="RAF Menwith Hill">Menwith Hill</a></li> <li><a href="/wiki/Pine_Gap" title="Pine Gap">Pine Gap</a></li> <li><a href="/wiki/Southern_Cross_Cable#Spying_and_interception" title="Southern Cross Cable">Southern Cross Cable</a></li> <li><a href="/wiki/Utah_Data_Center" title="Utah Data Center">Utah Data Center</a></li> <li><a href="/wiki/Bad_Aibling_Station" title="Bad Aibling Station">Bad Aibling Station</a></li> <li><a href="/wiki/Dagger_Complex" title="Dagger Complex">Dagger Complex</a></li> <li><a href="/wiki/GCHQ_Bude" title="GCHQ Bude">GCHQ Bude</a></li></ul></td> </tr><tr><th class="sidebar-heading" style="background:#B2BEB5"> Laws</th></tr><tr><td class="sidebar-content"> <ul><li>Five Eyes <ul><li><a href="/wiki/UKUSA_Agreement" title="UKUSA Agreement">UKUSA Agreement</a></li> <li><a href="/wiki/Lustre_(treaty)" title="Lustre (treaty)">Lustre</a></li></ul></li> <li>U.S. <ul><li><a href="/wiki/USA_Freedom_Act" title="USA Freedom Act">USA Freedom Act</a></li> <li><a href="/wiki/Foreign_Intelligence_Surveillance_Act_of_1978_Amendments_Act_of_2008" class="mw-redirect" title="Foreign Intelligence Surveillance Act of 1978 Amendments Act of 2008">FISA amendments</a></li></ul></li> <li>EU <ul><li><a href="/wiki/Data_Retention_Directive" title="Data Retention Directive">Data Retention Directive</a></li> <li><a href="/wiki/Data_Protection_Directive" title="Data Protection Directive">Data Protection Directive</a></li> <li><a href="/wiki/General_Data_Protection_Regulation" title="General Data Protection Regulation">GDPR</a></li></ul></li> <li>China <ul><li><a href="/wiki/National_Intelligence_Law" class="mw-redirect" title="National Intelligence Law">National Intelligence Law</a></li> <li><a href="/wiki/Cybersecurity_Law_of_the_People%27s_Republic_of_China" title="Cybersecurity Law of the People&#39;s Republic of China">Cybersecurity Law</a></li></ul></li> <li>UK <ul><li><a href="/wiki/Investigatory_Powers_Act_2016" title="Investigatory Powers Act 2016">Investigatory Powers Act 2016</a></li></ul></li></ul></td> </tr><tr><th class="sidebar-heading" style="background:#B2BEB5"> Proposed changes</th></tr><tr><td class="sidebar-content"> <ul><li>U.S. <ul><li><a href="/wiki/FISA_Improvements_Act" title="FISA Improvements Act">FISA Improvements Act</a></li> <li><a href="/wiki/Proposed_reforms_of_mass_surveillance_by_the_United_States" title="Proposed reforms of mass surveillance by the United States">Other proposals</a></li></ul></li></ul></td> </tr><tr><th class="sidebar-heading" style="background:#B2BEB5"> Concepts</th></tr><tr><td class="sidebar-content"> <ul><li><a href="/wiki/Mass_surveillance" title="Mass surveillance">Mass surveillance</a></li> <li><a href="/wiki/Culture_of_fear" title="Culture of fear">Culture of fear</a></li> <li><a href="/wiki/Secure_communication" title="Secure communication">Secure communication</a></li> <li><a href="/wiki/Signals_intelligence" title="Signals intelligence">SIGINT</a></li> <li><a href="/wiki/Call_detail_record" title="Call detail record">Call detail record</a></li> <li><a href="/wiki/Surveillance_issues_in_smart_cities" title="Surveillance issues in smart cities">Surveillance issues in smart cities</a></li></ul></td> </tr><tr><th class="sidebar-heading" style="background:#B2BEB5"> Related topics</th></tr><tr><td class="sidebar-content"> <ul><li><a href="/wiki/Espionage" title="Espionage">Espionage</a></li> <li><a href="/wiki/Intelligence_agency" title="Intelligence agency">Intelligence agency</a></li> <li><a href="/wiki/Cryptography" title="Cryptography">Cryptography</a> <ul><li><a href="/wiki/Tor_(network)" title="Tor (network)">Tor</a></li> <li><a href="/wiki/Virtual_private_network" title="Virtual private network">VPNs</a></li> <li><a href="/wiki/Transport_Layer_Security" title="Transport Layer Security">TLS</a></li></ul></li> <li><a href="/wiki/Human_rights" title="Human rights">Human rights</a> <ul><li><a href="/wiki/Right_to_privacy" title="Right to privacy">Privacy</a></li> <li><a href="/wiki/Civil_liberties" title="Civil liberties">Liberty</a></li></ul></li> <li><a href="/wiki/Reconnaissance_satellite" title="Reconnaissance satellite">Satellites</a></li> <li><a href="/wiki/Stop_Watching_Us" title="Stop Watching Us">Stop Watching Us</a></li> <li><a href="/wiki/Nothing_to_hide_argument" title="Nothing to hide argument">Nothing to hide argument</a></li></ul></td> </tr><tr><td class="sidebar-navbar"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1129693374"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1239400231"><div class="navbar plainlinks hlist navbar-mini"><ul><li class="nv-view"><a href="/wiki/Template:Global_surveillance" title="Template:Global surveillance"><abbr title="View this template">v</abbr></a></li><li class="nv-talk"><a href="/wiki/Template_talk:Global_surveillance" title="Template talk:Global surveillance"><abbr title="Discuss this template">t</abbr></a></li><li class="nv-edit"><a href="/wiki/Special:EditPage/Template:Global_surveillance" title="Special:EditPage/Template:Global surveillance"><abbr title="Edit this template">e</abbr></a></li></ul></div></td></tr></tbody></table> <ul><li><a href="/wiki/Anonymizer" class="mw-redirect" title="Anonymizer">Anonymizer</a>, a software system that attempts to make network activity untraceable</li> <li><a href="/wiki/Computer_surveillance_in_the_workplace" title="Computer surveillance in the workplace">Computer surveillance in the workplace</a></li> <li><a href="/wiki/Cyber_spying" title="Cyber spying">Cyber spying</a></li> <li><a href="/wiki/Datacasting" title="Datacasting">Datacasting</a>, a means of broadcasting files and Web pages using radio waves, allowing receivers near total immunity from traditional network surveillance techniques.</li> <li><a href="/wiki/Differential_privacy" title="Differential privacy">Differential privacy</a>, a method to maximize the accuracy of queries from statistical databases while minimizing the chances of violating the privacy of individuals.</li> <li><a href="/wiki/ECHELON" title="ECHELON">ECHELON</a>, a signals intelligence (SIGINT) collection and analysis network operated on behalf of Australia, Canada, New Zealand, the United Kingdom, and the United States, also known as <a href="/wiki/AUSCANNZUKUS" title="AUSCANNZUKUS">AUSCANNZUKUS</a> and Five Eyes</li> <li><a href="/wiki/GhostNet" title="GhostNet">GhostNet</a>, a large-scale cyber spying operation discovered in March 2009</li> <li><a href="/wiki/List_of_government_surveillance_projects" class="mw-redirect" title="List of government surveillance projects">List of government surveillance projects</a></li> <li><a href="/wiki/Internet_censorship_and_surveillance_by_country" title="Internet censorship and surveillance by country">Internet censorship and surveillance by country</a></li> <li><a href="/wiki/Mass_surveillance" title="Mass surveillance">Mass surveillance</a> <ul><li><a href="/wiki/Golden_Shield_Project" title="Golden Shield Project">China's Golden Shield Project</a></li> <li><a href="/wiki/Mass_surveillance_in_Australia" title="Mass surveillance in Australia">Mass surveillance in Australia</a></li> <li><a href="/wiki/Mass_surveillance_in_China" title="Mass surveillance in China">Mass surveillance in China</a></li> <li><a href="/wiki/Mass_surveillance_in_East_Germany" title="Mass surveillance in East Germany">Mass surveillance in East Germany</a></li> <li><a href="/wiki/Mass_surveillance_in_India" title="Mass surveillance in India">Mass surveillance in India</a></li> <li><a href="/wiki/Mass_surveillance_in_North_Korea" title="Mass surveillance in North Korea">Mass surveillance in North Korea</a></li> <li><a href="/wiki/Mass_surveillance_in_the_United_Kingdom" title="Mass surveillance in the United Kingdom">Mass surveillance in the United Kingdom</a></li> <li><a href="/wiki/Mass_surveillance_in_the_United_States" title="Mass surveillance in the United States">Mass surveillance in the United States</a></li></ul></li> <li><a href="/wiki/Surveillance" title="Surveillance">Surveillance</a></li></ul> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1129693374"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1246091330"><table class="sidebar sidebar-collapse nomobile nowraplinks"><tbody><tr><th class="sidebar-title"><span typeof="mw:File"><a href="/wiki/File:Seal_of_the_U.S._National_Security_Agency.svg" class="mw-file-description"><img src="//upload.wikimedia.org/wikipedia/commons/thumb/8/8d/Seal_of_the_U.S._National_Security_Agency.svg/80px-Seal_of_the_U.S._National_Security_Agency.svg.png" decoding="async" width="80" height="80" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/8/8d/Seal_of_the_U.S._National_Security_Agency.svg/120px-Seal_of_the_U.S._National_Security_Agency.svg.png 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/8/8d/Seal_of_the_U.S._National_Security_Agency.svg/160px-Seal_of_the_U.S._National_Security_Agency.svg.png 2x" data-file-width="718" data-file-height="718" /></a></span><br /><a href="/wiki/National_Security_Agency" title="National Security Agency">National Security Agency</a> surveillance</th></tr><tr><td class="sidebar-image"><span typeof="mw:File"><a href="/wiki/File:Boundless_Informant_data_collection_-_DNI.svg" class="mw-file-description"><img src="//upload.wikimedia.org/wikipedia/commons/thumb/8/89/Boundless_Informant_data_collection_-_DNI.svg/240px-Boundless_Informant_data_collection_-_DNI.svg.png" decoding="async" width="240" height="102" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/8/89/Boundless_Informant_data_collection_-_DNI.svg/360px-Boundless_Informant_data_collection_-_DNI.svg.png 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/8/89/Boundless_Informant_data_collection_-_DNI.svg/480px-Boundless_Informant_data_collection_-_DNI.svg.png 2x" data-file-width="842" data-file-height="358" /></a></span><div class="sidebar-caption"><a href="/wiki/Boundless_Informant" title="Boundless Informant">Map of global NSA data collection</a> as of 2007<sup class="plainlinks noexcerpt noprint asof-tag update" style="display:none;"><a class="external text" href="https://en.wikipedia.org/w/index.php?title=Computer_and_network_surveillance&amp;action=edit">&#91;update&#93;</a></sup>, with countries subject to the most data collection shown in red</div></td></tr><tr><td class="sidebar-content"> <div class="sidebar-list mw-collapsible mw-collapsed"><div class="sidebar-list-title" style="color: var(--color-base)">Programs</div><div class="sidebar-list-content mw-collapsible-content hlist"> <dl><dt>Pre-1978</dt></dl> <ul><li><a href="/wiki/ECHELON" title="ECHELON">ECHELON</a></li> <li><a href="/wiki/Project_MINARET" title="Project MINARET">MINARET</a></li> <li><a href="/wiki/Project_SHAMROCK" title="Project SHAMROCK">SHAMROCK</a></li> <li><a href="/wiki/PROMIS_(intelligence_software)" class="mw-redirect" title="PROMIS (intelligence software)">PROMIS</a></li></ul> <dl><dt>Since 1978</dt></dl> <ul><li><a href="/wiki/Upstream_collection" title="Upstream collection">Upstream collection</a></li> <li><a href="/wiki/Blarney_(code_name)" title="Blarney (code name)">BLARNEY</a></li> <li><a href="/wiki/Fairview_(surveillance_program)" title="Fairview (surveillance program)">FAIRVIEW</a></li> <li><a href="/wiki/Main_Core" title="Main Core">Main Core</a></li> <li><a href="/wiki/ThinThread" title="ThinThread">ThinThread</a></li> <li><a href="/wiki/Project_Genoa" title="Project Genoa">Genoa</a></li></ul> <dl><dt>Since 1990</dt></dl> <ul><li><a href="/wiki/RAMPART-A" title="RAMPART-A">RAMPART-A</a></li></ul> <dl><dt>Since 1998</dt></dl> <ul><li><a href="/wiki/Tailored_Access_Operations" title="Tailored Access Operations">Tailored Access Operations</a></li></ul> <dl><dt>Since 2001</dt></dl> <ul><li><a href="/wiki/OAKSTAR" title="OAKSTAR">OAKSTAR</a></li> <li><a href="/wiki/STORMBREW" title="STORMBREW">STORMBREW</a></li> <li><a href="/wiki/Trailblazer_Project" title="Trailblazer Project">Trailblazer</a></li> <li><a href="/wiki/Turbulence_(NSA)" title="Turbulence (NSA)">Turbulence</a></li> <li><a href="/wiki/Project_Genoa_II" title="Project Genoa II">Genoa II</a></li> <li><a href="/wiki/Total_Information_Awareness" title="Total Information Awareness">Total Information Awareness</a></li> <li><a href="/wiki/President%27s_Surveillance_Program" title="President&#39;s Surveillance Program">President's Surveillance Program</a> <ul><li><a href="/wiki/Terrorist_Surveillance_Program" title="Terrorist Surveillance Program">Terrorist Surveillance Program</a></li></ul></li></ul> <dl><dt>Since 2007</dt></dl> <ul><li><a href="/wiki/PRISM" title="PRISM">PRISM</a></li> <li><a href="/wiki/Dropmire" title="Dropmire">Dropmire</a></li> <li><a href="/wiki/Stateroom_(surveillance_program)" title="Stateroom (surveillance program)">Stateroom</a></li> <li><a href="/wiki/Bullrun_(decryption_program)" title="Bullrun (decryption program)">Bullrun</a></li> <li><a href="/wiki/MYSTIC_(surveillance_program)" class="mw-redirect" title="MYSTIC (surveillance program)">MYSTIC</a></li></ul> <dl><dt>Databases, tools etc.</dt></dl> <ul><li><a href="/wiki/PINWALE" class="mw-redirect" title="PINWALE">PINWALE</a></li> <li><a href="/wiki/MARINA" title="MARINA">MARINA</a></li> <li><a href="/wiki/Main_Core" title="Main Core">Main Core</a></li> <li><a href="/wiki/MAINWAY" title="MAINWAY">MAINWAY</a></li> <li><a href="/wiki/TRAFFICTHIEF" title="TRAFFICTHIEF">TRAFFICTHIEF</a></li> <li><a href="/wiki/Dishfire" title="Dishfire">DISHFIRE</a></li> <li><a href="/wiki/XKeyscore" title="XKeyscore">XKeyscore</a></li> <li><a href="/wiki/ICREACH" title="ICREACH">ICREACH</a></li> <li><a href="/wiki/Boundless_Informant" title="Boundless Informant">BOUNDLESSINFORMANT</a></li></ul> <dl><dt>GCHQ collaboration</dt></dl> <ul><li><a href="/wiki/MUSCULAR_(surveillance_program)" class="mw-redirect" title="MUSCULAR (surveillance program)">MUSCULAR</a></li> <li><a href="/wiki/Tempora" title="Tempora">Tempora</a></li></ul></div></div></td> </tr><tr><td class="sidebar-content"> <div class="sidebar-list mw-collapsible mw-collapsed"><div class="sidebar-list-title" style="color: var(--color-base)">Legislation</div><div class="sidebar-list-content mw-collapsible-content hlist"> <ul><li><a href="/wiki/Omnibus_Crime_Control_and_Safe_Streets_Act_of_1968#Wiretaps" title="Omnibus Crime Control and Safe Streets Act of 1968">Safe Streets Act</a></li> <li><a href="/wiki/Privacy_Act_of_1974" title="Privacy Act of 1974">Privacy Act of 1974</a></li> <li><a href="/wiki/Foreign_Intelligence_Surveillance_Act" title="Foreign Intelligence Surveillance Act">FISA</a></li> <li><a href="/wiki/Electronic_Communications_Privacy_Act" title="Electronic Communications Privacy Act">ECPA</a></li> <li><a href="/wiki/Patriot_Act" title="Patriot Act">Patriot Act</a></li> <li><a href="/wiki/Homeland_Security_Act" class="mw-redirect" title="Homeland Security Act">Homeland Security Act</a></li> <li><a href="/wiki/Protect_America_Act_of_2007" title="Protect America Act of 2007">Protect America Act of 2007</a></li> <li><a href="/wiki/Foreign_Intelligence_Surveillance_Act_of_1978_Amendments_Act_of_2008" class="mw-redirect" title="Foreign Intelligence Surveillance Act of 1978 Amendments Act of 2008">FISA Amendments Act of 2008</a></li></ul></div></div></td> </tr><tr><td class="sidebar-content"> <div class="sidebar-list mw-collapsible mw-collapsed"><div class="sidebar-list-title" style="color: var(--color-base)">Institutions</div><div class="sidebar-list-content mw-collapsible-content hlist"> <ul><li><a href="/wiki/Foreign_Intelligence_Surveillance_Court" class="mw-redirect" title="Foreign Intelligence Surveillance Court">FISC</a></li> <li><a href="/wiki/Senate_Intelligence_Committee" class="mw-redirect" title="Senate Intelligence Committee">Senate Intelligence Committee</a></li> <li><a href="/wiki/United_States_National_Security_Council" title="United States National Security Council">National Security Council</a></li></ul></div></div></td> </tr><tr><td class="sidebar-content"> <div class="sidebar-list mw-collapsible mw-collapsed"><div class="sidebar-list-title" style="color: var(--color-base)">Lawsuits</div><div class="sidebar-list-content mw-collapsible-content hlist"> <ul><li><a href="/wiki/American_Civil_Liberties_Union_v._National_Security_Agency" title="American Civil Liberties Union v. National Security Agency">ACLU v. NSA</a></li> <li><a href="/wiki/Hepting_v._AT%26T" title="Hepting v. AT&amp;T">Hepting v. AT&amp;T</a></li> <li><a href="/wiki/Jewel_v._NSA" class="mw-redirect" title="Jewel v. NSA">Jewel v. NSA</a></li> <li><a href="/wiki/Clapper_v._Amnesty_International" class="mw-redirect" title="Clapper v. Amnesty International">Clapper v. Amnesty</a></li> <li><a href="/wiki/Klayman_v._Obama" title="Klayman v. Obama">Klayman v. Obama</a></li> <li><a href="/wiki/ACLU_v._Clapper" class="mw-redirect" title="ACLU v. Clapper">ACLU v. Clapper</a></li> <li><a href="/wiki/Wikimedia_v._NSA" class="mw-redirect" title="Wikimedia v. NSA">Wikimedia v. NSA</a></li> <li><a href="/wiki/United_States_v._Moalin" title="United States v. Moalin">US v. Moalin</a></li></ul></div></div></td> </tr><tr><td class="sidebar-content"> <div class="sidebar-list mw-collapsible mw-collapsed"><div class="sidebar-list-title" style="color: var(--color-base)">Whistleblowers</div><div class="sidebar-list-content mw-collapsible-content hlist"> <ul><li><a href="/wiki/William_Binney_(U.S._intelligence_official)" class="mw-redirect" title="William Binney (U.S. intelligence official)">William Binney</a></li> <li><a href="/wiki/Thomas_Andrews_Drake" class="mw-redirect" title="Thomas Andrews Drake">Thomas Drake</a></li> <li><a href="/wiki/Mark_Klein" title="Mark Klein">Mark Klein</a></li> <li><a href="/wiki/Thomas_Tamm" title="Thomas Tamm">Thomas Tamm</a></li> <li><a href="/wiki/Russ_Tice" title="Russ Tice">Russ Tice</a></li> <li><a href="/wiki/Edward_Snowden" title="Edward Snowden">Edward Snowden</a></li></ul></div></div></td> </tr><tr><td class="sidebar-content"> <div class="sidebar-list mw-collapsible mw-collapsed"><div class="sidebar-list-title" style="color: var(--color-base)">Publication</div><div class="sidebar-list-content mw-collapsible-content hlist"> <ul><li><a href="/wiki/NSA_warrantless_surveillance_(2001%E2%80%9307)" class="mw-redirect" title="NSA warrantless surveillance (2001–07)">2005 warrantless surveillance scandal</a></li> <li><a href="/wiki/Global_surveillance_disclosures_(2013%E2%80%93present)" class="mw-redirect" title="Global surveillance disclosures (2013–present)">Global surveillance disclosures (2013–present)</a></li></ul></div></div></td> </tr><tr><td class="sidebar-content"> <div class="sidebar-list mw-collapsible mw-collapsed"><div class="sidebar-list-title" style="color: var(--color-base)">Related</div><div class="sidebar-list-content mw-collapsible-content hlist"> <ul><li><a href="/wiki/Cablegate" class="mw-redirect" title="Cablegate">Cablegate</a></li> <li><a href="/wiki/2013_Department_of_Justice_investigations_of_reporters" class="mw-redirect" title="2013 Department of Justice investigations of reporters">Surveillance of reporters</a></li> <li><a href="/wiki/Mail_Isolation_Control_and_Tracking" title="Mail Isolation Control and Tracking">Mail tracking</a></li> <li><a href="/wiki/Spying_on_United_Nations_leaders_by_United_States_diplomats" class="mw-redirect" title="Spying on United Nations leaders by United States diplomats">UN diplomatic spying</a></li> <li><a href="/wiki/Insider_Threat_Program" title="Insider Threat Program">Insider Threat Program</a></li> <li><a href="/wiki/Mass_surveillance_in_the_United_States" title="Mass surveillance in the United States">Mass surveillance in the United States</a></li> <li><a href="/wiki/Mass_surveillance_in_the_United_Kingdom" title="Mass surveillance in the United Kingdom">Mass surveillance in the United Kingdom</a></li></ul></div></div></td> </tr><tr><td class="sidebar-content"> <div class="sidebar-list mw-collapsible mw-collapsed"><div class="sidebar-list-title" style="color: var(--color-base)">Concepts</div><div class="sidebar-list-content mw-collapsible-content hlist"> <ul><li><a href="/wiki/Signals_intelligence" title="Signals intelligence">SIGINT</a></li> <li><a href="/wiki/Metadata" title="Metadata">Metadata</a></li></ul></div></div></td> </tr><tr><td class="sidebar-content"> <div class="sidebar-list mw-collapsible mw-collapsed"><div class="sidebar-list-title" style="color: var(--color-base)">Collaboration</div><div class="sidebar-list-content mw-collapsible-content hlist"> <dl><dt>United States</dt></dl> <ul><li><span typeof="mw:File"><a href="/wiki/File:US-CentralSecurityService-Seal.svg" class="mw-file-description" title="Central Security Service"><img alt="Central Security Service" src="//upload.wikimedia.org/wikipedia/commons/thumb/6/6a/US-CentralSecurityService-Seal.svg/20px-US-CentralSecurityService-Seal.svg.png" decoding="async" width="20" height="20" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/6/6a/US-CentralSecurityService-Seal.svg/30px-US-CentralSecurityService-Seal.svg.png 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/6/6a/US-CentralSecurityService-Seal.svg/40px-US-CentralSecurityService-Seal.svg.png 2x" data-file-width="728" data-file-height="728" /></a></span> <a href="/wiki/Central_Security_Service" title="Central Security Service">CSS</a></li> <li><span typeof="mw:File"><a href="/wiki/File:Seal_of_the_United_States_Cyber_Command.svg" class="mw-file-description" title="United States Cyber Command"><img alt="United States Cyber Command" src="//upload.wikimedia.org/wikipedia/commons/thumb/8/87/Seal_of_the_United_States_Cyber_Command.svg/20px-Seal_of_the_United_States_Cyber_Command.svg.png" decoding="async" width="20" height="20" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/8/87/Seal_of_the_United_States_Cyber_Command.svg/30px-Seal_of_the_United_States_Cyber_Command.svg.png 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/8/87/Seal_of_the_United_States_Cyber_Command.svg/40px-Seal_of_the_United_States_Cyber_Command.svg.png 2x" data-file-width="603" data-file-height="603" /></a></span> <a href="/wiki/United_States_Cyber_Command" title="United States Cyber Command">CYBERCOM</a></li> <li><span typeof="mw:File"><a href="/wiki/File:Seal_of_the_United_States_Department_of_Justice.svg" class="mw-file-description" title="Department of Justice"><img alt="Department of Justice" src="//upload.wikimedia.org/wikipedia/commons/thumb/5/54/Seal_of_the_United_States_Department_of_Justice.svg/20px-Seal_of_the_United_States_Department_of_Justice.svg.png" decoding="async" width="20" height="20" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/5/54/Seal_of_the_United_States_Department_of_Justice.svg/30px-Seal_of_the_United_States_Department_of_Justice.svg.png 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/5/54/Seal_of_the_United_States_Department_of_Justice.svg/40px-Seal_of_the_United_States_Department_of_Justice.svg.png 2x" data-file-width="720" data-file-height="720" /></a></span> <a href="/wiki/United_States_Department_of_Justice" title="United States Department of Justice">DOJ</a></li> <li><span typeof="mw:File"><a href="/wiki/File:Seal_of_the_Federal_Bureau_of_Investigation.svg" class="mw-file-description" title="Federal Bureau of Investigation"><img alt="Federal Bureau of Investigation" src="//upload.wikimedia.org/wikipedia/commons/thumb/d/da/Seal_of_the_Federal_Bureau_of_Investigation.svg/20px-Seal_of_the_Federal_Bureau_of_Investigation.svg.png" decoding="async" width="20" height="21" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/d/da/Seal_of_the_Federal_Bureau_of_Investigation.svg/30px-Seal_of_the_Federal_Bureau_of_Investigation.svg.png 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/d/da/Seal_of_the_Federal_Bureau_of_Investigation.svg/40px-Seal_of_the_Federal_Bureau_of_Investigation.svg.png 2x" data-file-width="699" data-file-height="720" /></a></span> <a href="/wiki/Federal_Bureau_of_Investigation" title="Federal Bureau of Investigation">FBI</a></li> <li><span typeof="mw:File"><a href="/wiki/File:Seal_of_the_Central_Intelligence_Agency.svg" class="mw-file-description" title="Central Intelligence Agency"><img alt="Central Intelligence Agency" src="//upload.wikimedia.org/wikipedia/commons/thumb/2/25/Seal_of_the_Central_Intelligence_Agency.svg/20px-Seal_of_the_Central_Intelligence_Agency.svg.png" decoding="async" width="20" height="20" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/2/25/Seal_of_the_Central_Intelligence_Agency.svg/30px-Seal_of_the_Central_Intelligence_Agency.svg.png 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/2/25/Seal_of_the_Central_Intelligence_Agency.svg/40px-Seal_of_the_Central_Intelligence_Agency.svg.png 2x" data-file-width="510" data-file-height="510" /></a></span> <a href="/wiki/Central_Intelligence_Agency" title="Central Intelligence Agency">CIA</a></li> <li><span typeof="mw:File"><a href="/wiki/File:Seal_of_the_United_States_Department_of_Homeland_Security.svg" class="mw-file-description" title="Department of Homeland Security"><img alt="Department of Homeland Security" src="//upload.wikimedia.org/wikipedia/commons/thumb/8/8a/Seal_of_the_United_States_Department_of_Homeland_Security.svg/20px-Seal_of_the_United_States_Department_of_Homeland_Security.svg.png" decoding="async" width="20" height="20" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/8/8a/Seal_of_the_United_States_Department_of_Homeland_Security.svg/30px-Seal_of_the_United_States_Department_of_Homeland_Security.svg.png 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/8/8a/Seal_of_the_United_States_Department_of_Homeland_Security.svg/40px-Seal_of_the_United_States_Department_of_Homeland_Security.svg.png 2x" data-file-width="247" data-file-height="247" /></a></span> <a href="/wiki/Department_of_Homeland_Security" class="mw-redirect" title="Department of Homeland Security">DHS</a></li> <li><span typeof="mw:File"><a href="/wiki/File:IAO-logo.png" class="mw-file-description" title="Information Awareness Office"><img alt="Information Awareness Office" src="//upload.wikimedia.org/wikipedia/commons/thumb/d/d1/IAO-logo.png/20px-IAO-logo.png" decoding="async" width="20" height="20" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/d/d1/IAO-logo.png/30px-IAO-logo.png 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/d/d1/IAO-logo.png/40px-IAO-logo.png 2x" data-file-width="658" data-file-height="669" /></a></span> <a href="/wiki/Information_Awareness_Office" title="Information Awareness Office">IAO</a></li></ul> <dl><dt><a href="/wiki/Five_Eyes" title="Five Eyes">Five Eyes</a></dt></dl> <ul><li><span class="flagicon"><span class="mw-image-border" typeof="mw:File"><a href="/wiki/Canada" title="Canada"><img alt="Canada" src="//upload.wikimedia.org/wikipedia/commons/thumb/d/d9/Flag_of_Canada_%28Pantone%29.svg/23px-Flag_of_Canada_%28Pantone%29.svg.png" decoding="async" width="23" height="12" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/d/d9/Flag_of_Canada_%28Pantone%29.svg/35px-Flag_of_Canada_%28Pantone%29.svg.png 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/d/d9/Flag_of_Canada_%28Pantone%29.svg/46px-Flag_of_Canada_%28Pantone%29.svg.png 2x" data-file-width="1200" data-file-height="600" /></a></span></span> <a href="/wiki/Communications_Security_Establishment_Canada" class="mw-redirect" title="Communications Security Establishment Canada">CSEC</a></li> <li><span class="flagicon"><span class="mw-image-border" typeof="mw:File"><a href="/wiki/United_Kingdom" title="United Kingdom"><img alt="United Kingdom" src="//upload.wikimedia.org/wikipedia/en/thumb/a/ae/Flag_of_the_United_Kingdom.svg/23px-Flag_of_the_United_Kingdom.svg.png" decoding="async" width="23" height="12" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/en/thumb/a/ae/Flag_of_the_United_Kingdom.svg/35px-Flag_of_the_United_Kingdom.svg.png 1.5x, //upload.wikimedia.org/wikipedia/en/thumb/a/ae/Flag_of_the_United_Kingdom.svg/46px-Flag_of_the_United_Kingdom.svg.png 2x" data-file-width="1200" data-file-height="600" /></a></span></span> <a href="/wiki/Government_Communications_Headquarters" class="mw-redirect" title="Government Communications Headquarters">GCHQ</a></li> <li><span class="flagicon"><span class="mw-image-border" typeof="mw:File"><a href="/wiki/Australia" title="Australia"><img alt="Australia" src="//upload.wikimedia.org/wikipedia/commons/thumb/8/88/Flag_of_Australia_%28converted%29.svg/23px-Flag_of_Australia_%28converted%29.svg.png" decoding="async" width="23" height="12" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/8/88/Flag_of_Australia_%28converted%29.svg/35px-Flag_of_Australia_%28converted%29.svg.png 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/8/88/Flag_of_Australia_%28converted%29.svg/46px-Flag_of_Australia_%28converted%29.svg.png 2x" data-file-width="1280" data-file-height="640" /></a></span></span> <a href="/wiki/Australian_Signals_Directorate" title="Australian Signals Directorate">ASD</a></li> <li><span class="flagicon"><span class="mw-image-border" typeof="mw:File"><a href="/wiki/New_Zealand" title="New Zealand"><img alt="New Zealand" src="//upload.wikimedia.org/wikipedia/commons/thumb/3/3e/Flag_of_New_Zealand.svg/23px-Flag_of_New_Zealand.svg.png" decoding="async" width="23" height="12" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/3/3e/Flag_of_New_Zealand.svg/35px-Flag_of_New_Zealand.svg.png 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/3/3e/Flag_of_New_Zealand.svg/46px-Flag_of_New_Zealand.svg.png 2x" data-file-width="1200" data-file-height="600" /></a></span></span> <a href="/wiki/Government_Communications_Security_Bureau" title="Government Communications Security Bureau">GCSB</a></li></ul> <dl><dt>Other</dt></dl> <ul><li><span class="flagicon"><span class="mw-image-border" typeof="mw:File"><a href="/wiki/France" title="France"><img alt="France" src="//upload.wikimedia.org/wikipedia/en/thumb/c/c3/Flag_of_France.svg/23px-Flag_of_France.svg.png" decoding="async" width="23" height="15" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/en/thumb/c/c3/Flag_of_France.svg/35px-Flag_of_France.svg.png 1.5x, //upload.wikimedia.org/wikipedia/en/thumb/c/c3/Flag_of_France.svg/45px-Flag_of_France.svg.png 2x" data-file-width="900" data-file-height="600" /></a></span></span> <a href="/wiki/Direction_G%C3%A9n%C3%A9rale_de_la_S%C3%A9curit%C3%A9_Ext%C3%A9rieure" class="mw-redirect" title="Direction Générale de la Sécurité Extérieure">DGSE</a></li> <li><span class="flagicon"><span class="mw-image-border" typeof="mw:File"><a href="/wiki/Germany" title="Germany"><img alt="Germany" src="//upload.wikimedia.org/wikipedia/en/thumb/b/ba/Flag_of_Germany.svg/23px-Flag_of_Germany.svg.png" decoding="async" width="23" height="14" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/en/thumb/b/ba/Flag_of_Germany.svg/35px-Flag_of_Germany.svg.png 1.5x, //upload.wikimedia.org/wikipedia/en/thumb/b/ba/Flag_of_Germany.svg/46px-Flag_of_Germany.svg.png 2x" data-file-width="1000" data-file-height="600" /></a></span></span> <a href="/wiki/Bundesnachrichtendienst" class="mw-redirect" title="Bundesnachrichtendienst">BND</a></li></ul></div></div></td> </tr><tr><td class="sidebar-navbar"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1129693374"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1239400231"><div class="navbar plainlinks hlist navbar-mini"><ul><li class="nv-view"><a href="/wiki/Template:NSA_surveillance" title="Template:NSA surveillance"><abbr title="View this template">v</abbr></a></li><li class="nv-talk"><a href="/wiki/Template_talk:NSA_surveillance" title="Template talk:NSA surveillance"><abbr title="Discuss this template">t</abbr></a></li><li class="nv-edit"><a href="/wiki/Special:EditPage/Template:NSA_surveillance" title="Special:EditPage/Template:NSA surveillance"><abbr title="Edit this template">e</abbr></a></li></ul></div></td></tr></tbody></table> <p><span class="anchor" id="United_States"></span> </p> <ul><li>Surveillance by the United States government: <ul><li><a href="/wiki/2013_mass_surveillance_disclosures" class="mw-redirect" title="2013 mass surveillance disclosures">2013 mass surveillance disclosures</a>, reports about NSA and its international partners' mass surveillance of foreign nationals and U.S. citizens</li> <li><a href="/wiki/Bullrun_(code_name)" class="mw-redirect" title="Bullrun (code name)">Bullrun (code name)</a>, a highly classified <a href="/wiki/National_Security_Agency" title="National Security Agency">NSA</a> program to preserve its ability to eavesdrop on encrypted communications by influencing and weakening encryption standards, by obtaining master encryption keys, and by gaining access to data before or after it is encrypted either by agreement, by force of law, or by computer network exploitation (hacking)</li> <li><a href="/wiki/Carnivore_(FBI)" class="mw-redirect" title="Carnivore (FBI)">Carnivore</a>, a U.S. Federal Bureau of Investigation system to monitor email and electronic communications</li> <li><a href="/wiki/COINTELPRO" title="COINTELPRO">COINTELPRO</a>, a series of covert, and at times illegal, projects conducted by the FBI aimed at U.S. domestic political organizations</li> <li><a href="/wiki/Communications_Assistance_For_Law_Enforcement_Act" class="mw-redirect" title="Communications Assistance For Law Enforcement Act">Communications Assistance For Law Enforcement Act</a></li> <li><a href="/wiki/Computer_and_Internet_Protocol_Address_Verifier" title="Computer and Internet Protocol Address Verifier">Computer and Internet Protocol Address Verifier</a> (CIPAV), a data gathering tool used by the U.S. Federal Bureau of Investigation (FBI)</li> <li><a href="/wiki/Dropmire" title="Dropmire">Dropmire</a>, a secret surveillance program by the NSA aimed at surveillance of foreign embassies and diplomatic staff, including those of NATO allies</li> <li><a href="/wiki/Magic_Lantern_(spyware)" title="Magic Lantern (spyware)">Magic Lantern</a>, keystroke logging software developed by the U.S. Federal Bureau of Investigation</li> <li><a href="/wiki/Mass_surveillance_in_the_United_States" title="Mass surveillance in the United States">Mass surveillance in the United States</a></li> <li><a href="/wiki/NSA_call_database" class="mw-redirect" title="NSA call database">NSA call database</a>, a database containing metadata for hundreds of billions of telephone calls made in the U.S.</li> <li><a href="/wiki/NSA_warrantless_surveillance_(2001%E2%80%9307)" class="mw-redirect" title="NSA warrantless surveillance (2001–07)">NSA warrantless surveillance (2001–07)</a></li> <li>NSA <a href="/wiki/Whistleblowers" class="mw-redirect" title="Whistleblowers">whistleblowers</a>: <a href="/wiki/William_Binney_(U.S._intelligence_official)" class="mw-redirect" title="William Binney (U.S. intelligence official)">William Binney</a>, <a href="/wiki/Thomas_Andrews_Drake" class="mw-redirect" title="Thomas Andrews Drake">Thomas Andrews Drake</a>, <a href="/wiki/Mark_Klein" title="Mark Klein">Mark Klein</a>, <a href="/wiki/Edward_Snowden" title="Edward Snowden">Edward Snowden</a>, <a href="/wiki/Thomas_Tamm" title="Thomas Tamm">Thomas Tamm</a>, <a href="/wiki/Russ_Tice" title="Russ Tice">Russ Tice</a></li> <li><a href="/wiki/Spying_on_United_Nations_leaders_by_United_States_diplomats" class="mw-redirect" title="Spying on United Nations leaders by United States diplomats">Spying on United Nations leaders by United States diplomats</a></li> <li><a href="/wiki/Stellar_Wind_(code_name)" class="mw-redirect" title="Stellar Wind (code name)">Stellar Wind (code name)</a>, code name for information collected under the <a href="/wiki/President%27s_Surveillance_Program" title="President&#39;s Surveillance Program">President's Surveillance Program</a></li> <li><a href="/wiki/Tailored_Access_Operations" title="Tailored Access Operations">Tailored Access Operations</a>, NSA's hacking program</li> <li><a href="/wiki/Terrorist_Surveillance_Program" title="Terrorist Surveillance Program">Terrorist Surveillance Program</a>, an NSA electronic surveillance program</li> <li><a href="/wiki/Total_Information_Awareness" title="Total Information Awareness">Total Information Awareness</a>, a project of the <a href="/wiki/Defense_Advanced_Research_Projects_Agency" class="mw-redirect" title="Defense Advanced Research Projects Agency">Defense Advanced Research Projects Agency</a> (DARPA)</li></ul></li> <li><a href="/wiki/Tempest_(codename)" title="Tempest (codename)">TEMPEST</a>, codename for studies of unintentional intelligence-bearing signals which, if intercepted and analyzed, may disclose the information transmitted, received, handled, or otherwise processed by any information-processing equipment</li></ul> <div class="mw-heading mw-heading2"><h2 id="References">References</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Computer_and_network_surveillance&amp;action=edit&amp;section=9" title="Edit section: References"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <style data-mw-deduplicate="TemplateStyles:r1239543626">.mw-parser-output .reflist{margin-bottom:0.5em;list-style-type:decimal}@media screen{.mw-parser-output .reflist{font-size:90%}}.mw-parser-output .reflist .references{font-size:100%;margin-bottom:0;list-style-type:inherit}.mw-parser-output .reflist-columns-2{column-width:30em}.mw-parser-output .reflist-columns-3{column-width:25em}.mw-parser-output .reflist-columns{margin-top:0.3em}.mw-parser-output .reflist-columns ol{margin-top:0}.mw-parser-output .reflist-columns li{page-break-inside:avoid;break-inside:avoid-column}.mw-parser-output .reflist-upper-alpha{list-style-type:upper-alpha}.mw-parser-output .reflist-upper-roman{list-style-type:upper-roman}.mw-parser-output .reflist-lower-alpha{list-style-type:lower-alpha}.mw-parser-output .reflist-lower-greek{list-style-type:lower-greek}.mw-parser-output .reflist-lower-roman{list-style-type:lower-roman}</style><div class="reflist reflist-columns references-column-width" style="column-width: 30em;"> <ol class="references"> <li id="cite_note-1"><span class="mw-cite-backlink"><b><a href="#cite_ref-1">^</a></b></span> <span class="reference-text"><style data-mw-deduplicate="TemplateStyles:r1238218222">.mw-parser-output cite.citation{font-style:inherit;word-wrap:break-word}.mw-parser-output .citation q{quotes:"\"""\"""'""'"}.mw-parser-output .citation:target{background-color:rgba(0,127,255,0.133)}.mw-parser-output .id-lock-free.id-lock-free a{background:url("//upload.wikimedia.org/wikipedia/commons/6/65/Lock-green.svg")right 0.1em center/9px no-repeat}.mw-parser-output .id-lock-limited.id-lock-limited a,.mw-parser-output .id-lock-registration.id-lock-registration a{background:url("//upload.wikimedia.org/wikipedia/commons/d/d6/Lock-gray-alt-2.svg")right 0.1em center/9px no-repeat}.mw-parser-output .id-lock-subscription.id-lock-subscription a{background:url("//upload.wikimedia.org/wikipedia/commons/a/aa/Lock-red-alt-2.svg")right 0.1em center/9px no-repeat}.mw-parser-output .cs1-ws-icon a{background:url("//upload.wikimedia.org/wikipedia/commons/4/4c/Wikisource-logo.svg")right 0.1em center/12px no-repeat}body:not(.skin-timeless):not(.skin-minerva) .mw-parser-output .id-lock-free a,body:not(.skin-timeless):not(.skin-minerva) .mw-parser-output .id-lock-limited a,body:not(.skin-timeless):not(.skin-minerva) .mw-parser-output .id-lock-registration a,body:not(.skin-timeless):not(.skin-minerva) .mw-parser-output .id-lock-subscription a,body:not(.skin-timeless):not(.skin-minerva) .mw-parser-output .cs1-ws-icon a{background-size:contain;padding:0 1em 0 0}.mw-parser-output .cs1-code{color:inherit;background:inherit;border:none;padding:inherit}.mw-parser-output .cs1-hidden-error{display:none;color:var(--color-error,#d33)}.mw-parser-output .cs1-visible-error{color:var(--color-error,#d33)}.mw-parser-output .cs1-maint{display:none;color:#085;margin-left:0.3em}.mw-parser-output .cs1-kern-left{padding-left:0.2em}.mw-parser-output .cs1-kern-right{padding-right:0.2em}.mw-parser-output .citation .mw-selflink{font-weight:inherit}@media screen{.mw-parser-output .cs1-format{font-size:95%}html.skin-theme-clientpref-night .mw-parser-output .cs1-maint{color:#18911f}}@media screen and (prefers-color-scheme:dark){html.skin-theme-clientpref-os .mw-parser-output .cs1-maint{color:#18911f}}</style><cite id="CITEREFAnne_Broache" class="citation web cs1">Anne Broache. <a rel="nofollow" class="external text" href="https://www.cnet.com/news/fbi-wants-widespread-monitoring-of-illegal-internet-activity/">"FBI wants widespread monitoring of 'illegal' Internet activity"</a>. <i>CNET</i><span class="reference-accessdate">. Retrieved <span class="nowrap">25 March</span> 2014</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=CNET&amp;rft.atitle=FBI+wants+widespread+monitoring+of+%27illegal%27+Internet+activity&amp;rft.au=Anne+Broache&amp;rft_id=http%3A%2F%2Fwww.cnet.com%2Fnews%2Ffbi-wants-widespread-monitoring-of-illegal-internet-activity%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AComputer+and+network+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-2"><span class="mw-cite-backlink"><b><a href="#cite_ref-2">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFJeskeStevensTartakovskyWilson2018" class="citation journal cs1">Jeske, Daniel R.; Stevens, Nathaniel T.; Tartakovsky, Alexander G.; Wilson, James D. (2018-04-17). <a rel="nofollow" class="external text" href="https://doi.org/10.1002%2Fasmb.2326">"Statistical methods for network surveillance"</a>. <i>Applied Stochastic Models in Business and Industry</i>. <b>34</b> (4): 425–445. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<span class="id-lock-free" title="Freely accessible"><a rel="nofollow" class="external text" href="https://doi.org/10.1002%2Fasmb.2326">10.1002/asmb.2326</a></span>. <a href="/wiki/ISSN_(identifier)" class="mw-redirect" title="ISSN (identifier)">ISSN</a>&#160;<a rel="nofollow" class="external text" href="https://search.worldcat.org/issn/1524-1904">1524-1904</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Applied+Stochastic+Models+in+Business+and+Industry&amp;rft.atitle=Statistical+methods+for+network+surveillance&amp;rft.volume=34&amp;rft.issue=4&amp;rft.pages=425-445&amp;rft.date=2018-04-17&amp;rft_id=info%3Adoi%2F10.1002%2Fasmb.2326&amp;rft.issn=1524-1904&amp;rft.aulast=Jeske&amp;rft.aufirst=Daniel+R.&amp;rft.au=Stevens%2C+Nathaniel+T.&amp;rft.au=Tartakovsky%2C+Alexander+G.&amp;rft.au=Wilson%2C+James+D.&amp;rft_id=https%3A%2F%2Fdoi.org%2F10.1002%252Fasmb.2326&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AComputer+and+network+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-us-surveillance-soc-3"><span class="mw-cite-backlink">^ <a href="#cite_ref-us-surveillance-soc_3-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-us-surveillance-soc_3-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.aclu.org/privacy/gen/index.html">"Is the U.S. Turning Into a Surveillance Society?"</a>. <i>American Civil Liberties Union</i><span class="reference-accessdate">. Retrieved <span class="nowrap">March 13,</span> 2009</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=American+Civil+Liberties+Union&amp;rft.atitle=Is+the+U.S.+Turning+Into+a+Surveillance+Society%3F&amp;rft_id=https%3A%2F%2Fwww.aclu.org%2Fprivacy%2Fgen%2Findex.html&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AComputer+and+network+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-bigger-monster-4"><span class="mw-cite-backlink"><b><a href="#cite_ref-bigger-monster_4-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.aclu.org/FilesPDFs/aclu_report_bigger_monster_weaker_chains.pdf">"Bigger Monster, Weaker Chains: The Growth of an American Surveillance Society"</a> <span class="cs1-format">(PDF)</span>. <i>American Civil Liberties Union</i>. January 15, 2003. <a rel="nofollow" class="external text" href="https://ghostarchive.org/archive/20221009/https://www.aclu.org/FilesPDFs/aclu_report_bigger_monster_weaker_chains.pdf">Archived</a> <span class="cs1-format">(PDF)</span> from the original on 2022-10-09<span class="reference-accessdate">. Retrieved <span class="nowrap">March 13,</span> 2009</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=American+Civil+Liberties+Union&amp;rft.atitle=Bigger+Monster%2C+Weaker+Chains%3A+The+Growth+of+an+American+Surveillance+Society&amp;rft.date=2003-01-15&amp;rft_id=https%3A%2F%2Fwww.aclu.org%2FFilesPDFs%2Faclu_report_bigger_monster_weaker_chains.pdf&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AComputer+and+network+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-5"><span class="mw-cite-backlink"><b><a href="#cite_ref-5">^</a></b></span> <span class="reference-text"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20120410031723/http://www.zdnet.com/blog/security/anonymous-hacks-uk-government-sites-over-draconian-surveillance/11412">"Anonymous hacks UK government sites over 'draconian surveillance' "</a>, Emil Protalinski, ZDNet, 7 April 2012, retrieved 12 March 2013</span> </li> <li id="cite_note-6"><span class="mw-cite-backlink"><b><a href="#cite_ref-6">^</a></b></span> <span class="reference-text"><a rel="nofollow" class="external text" href="https://www.theguardian.com/technology/2012/apr/20/hacktivists-battle-internet">Hacktivists in the frontline battle for the internet</a> retrieved 17 June 2012</span> </li> <li id="cite_note-sciam-internet-7"><span class="mw-cite-backlink"><b><a href="#cite_ref-sciam-internet_7-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFDiffieSusan_Landau2008" class="citation news cs1">Diffie, Whitfield; Susan Landau (August 2008). <a rel="nofollow" class="external text" href="http://www.sciam.com/article.cfm?id=internet-eavesdropping">"Internet Eavesdropping: A Brave New World of Wiretapping"</a>. <i>Scientific American</i><span class="reference-accessdate">. Retrieved <span class="nowrap">2009-03-13</span></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Scientific+American&amp;rft.atitle=Internet+Eavesdropping%3A+A+Brave+New+World+of+Wiretapping&amp;rft.date=2008-08&amp;rft.aulast=Diffie&amp;rft.aufirst=Whitfield&amp;rft.au=Susan+Landau&amp;rft_id=http%3A%2F%2Fwww.sciam.com%2Farticle.cfm%3Fid%3Dinternet-eavesdropping&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AComputer+and+network+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-eff-calea-archive-8"><span class="mw-cite-backlink"><b><a href="#cite_ref-eff-calea-archive_8-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20090503035053/http://w2.eff.org/Privacy/Surveillance/CALEA/?f=archive.html">"CALEA Archive -- Electronic Frontier Foundation"</a>. <i>Electronic Frontier Foundation (website)</i>. Archived from <a rel="nofollow" class="external text" href="https://w2.eff.org/Privacy/Surveillance/CALEA/?f=archive.html">the original</a> on 2009-05-03<span class="reference-accessdate">. Retrieved <span class="nowrap">2009-03-14</span></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=Electronic+Frontier+Foundation+%28website%29&amp;rft.atitle=CALEA+Archive+--+Electronic+Frontier+Foundation&amp;rft_id=http%3A%2F%2Fw2.eff.org%2FPrivacy%2FSurveillance%2FCALEA%2F%3Ff%3Darchive.html&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AComputer+and+network+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-eff-calea-summary-9"><span class="mw-cite-backlink"><b><a href="#cite_ref-eff-calea-summary_9-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.eff.org/issues/calea">"CALEA: The Perils of Wiretapping the Internet"</a>. <i>Electronic Frontier Foundation (website)</i><span class="reference-accessdate">. Retrieved <span class="nowrap">2009-03-14</span></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=Electronic+Frontier+Foundation+%28website%29&amp;rft.atitle=CALEA%3A+The+Perils+of+Wiretapping+the+Internet&amp;rft_id=https%3A%2F%2Fwww.eff.org%2Fissues%2Fcalea&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AComputer+and+network+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-eff-calea-faq-10"><span class="mw-cite-backlink"><b><a href="#cite_ref-eff-calea-faq_10-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.eff.org/pages/calea-faq">"CALEA: Frequently Asked Questions"</a>. <i>Electronic Frontier Foundation (website)</i>. 2007-09-20<span class="reference-accessdate">. Retrieved <span class="nowrap">2009-03-14</span></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=Electronic+Frontier+Foundation+%28website%29&amp;rft.atitle=CALEA%3A+Frequently+Asked+Questions&amp;rft.date=2007-09-20&amp;rft_id=https%3A%2F%2Fwww.eff.org%2Fpages%2Fcalea-faq&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AComputer+and+network+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-11"><span class="mw-cite-backlink"><b><a href="#cite_ref-11">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFKevin_J._Connolly2003" class="citation book cs1">Kevin J. Connolly (2003). <i>Law of Internet Security and Privacy</i>. <a href="/wiki/Aspen_Publishers" class="mw-redirect" title="Aspen Publishers">Aspen Publishers</a>. p.&#160;131. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-0-7355-4273-0" title="Special:BookSources/978-0-7355-4273-0"><bdi>978-0-7355-4273-0</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=Law+of+Internet+Security+and+Privacy&amp;rft.pages=131&amp;rft.pub=Aspen+Publishers&amp;rft.date=2003&amp;rft.isbn=978-0-7355-4273-0&amp;rft.au=Kevin+J.+Connolly&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AComputer+and+network+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-12"><span class="mw-cite-backlink"><b><a href="#cite_ref-12">^</a></b></span> <span class="reference-text"><a rel="nofollow" class="external text" href="http://www.baller.com/pdfs/ACE.pdf">American Council on Education vs. FCC</a> <a rel="nofollow" class="external text" href="https://web.archive.org/web/20120907032500/http://www.baller.com/pdfs/ACE.pdf">Archived</a> 2012-09-07 at the <a href="/wiki/Wayback_Machine" title="Wayback Machine">Wayback Machine</a>, Decision, United States Court of Appeals for the District of Columbia Circuit, 9 June 2006. Retrieved 8 September 2013.</span> </li> <li id="cite_note-usatoday-chatroom-13"><span class="mw-cite-backlink"><b><a href="#cite_ref-usatoday-chatroom_13-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFHill2004" class="citation news cs1">Hill, Michael (October 11, 2004). <a rel="nofollow" class="external text" href="https://www.usatoday.com/tech/news/surveillance/2004-10-11-chatroom-surv_x.htm">"Government funds chat room surveillance research"</a>. <i>USA Today</i>. Associated Press<span class="reference-accessdate">. Retrieved <span class="nowrap">2009-03-19</span></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=USA+Today&amp;rft.atitle=Government+funds+chat+room+surveillance+research&amp;rft.date=2004-10-11&amp;rft.aulast=Hill&amp;rft.aufirst=Michael&amp;rft_id=https%3A%2F%2Fwww.usatoday.com%2Ftech%2Fnews%2Fsurveillance%2F2004-10-11-chatroom-surv_x.htm&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AComputer+and+network+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-zdnet-fbi-14"><span class="mw-cite-backlink"><b><a href="#cite_ref-zdnet-fbi_14-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFMcCullagh2007" class="citation news cs1">McCullagh, Declan (January 30, 2007). <a rel="nofollow" class="external text" href="https://www.zdnet.com/home-and-office/networking/fbi-turns-to-broad-new-wiretap-method/">"FBI turns to broad new wiretap method"</a>. <i>ZDNet News</i><span class="reference-accessdate">. Retrieved <span class="nowrap">2009-03-13</span></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=ZDNet+News&amp;rft.atitle=FBI+turns+to+broad+new+wiretap+method&amp;rft.date=2007-01-30&amp;rft.aulast=McCullagh&amp;rft.aufirst=Declan&amp;rft_id=https%3A%2F%2Fwww.zdnet.com%2Fhome-and-office%2Fnetworking%2Ffbi-turns-to-broad-new-wiretap-method%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AComputer+and+network+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-15"><span class="mw-cite-backlink"><b><a href="#cite_ref-15">^</a></b></span> <span class="reference-text"><a rel="nofollow" class="external text" href="http://www.debka.com/article/3509/">"First round in Internet war goes to Iranian intelligence"</a>, <a href="/wiki/Debkafile" title="Debkafile">Debkafile</a>, 28 June 2009. <span style="font-size:0.95em; font-size:95%; color: var( --color-subtle, #555 )">(subscription required)</span></span> </li> <li id="cite_note-Reilly,_T._2005-16"><span class="mw-cite-backlink">^ <a href="#cite_ref-Reilly,_T._2005_16-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-Reilly,_T._2005_16-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text">O'Reilly, T. (2005). What is Web 2.0: Design Patterns and Business Models for the Next Generation of Software. O’Reilly Media, 1-5.</span> </li> <li id="cite_note-17"><span class="mw-cite-backlink"><b><a href="#cite_ref-17">^</a></b></span> <span class="reference-text">Fuchs, C. (2011). New Media, Web 2.0 and Surveillance. Sociology Compass, 134-147.</span> </li> <li id="cite_note-18"><span class="mw-cite-backlink"><b><a href="#cite_ref-18">^</a></b></span> <span class="reference-text">Fuchs, C. (2011). Web 2.0, Presumption, and Surveillance. Surveillance &amp; Society, 289-309.</span> </li> <li id="cite_note-19"><span class="mw-cite-backlink"><b><a href="#cite_ref-19">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFAnthony_Denise,_Celeste_Campos-Castillo,_Christine_Horne2017" class="citation journal cs1">Anthony Denise, Celeste Campos-Castillo, Christine Horne (2017). <a rel="nofollow" class="external text" href="https://doi.org/10.1146%2Fannurev-soc-060116-053643">"Toward a Sociology of Privacy"</a>. <i>Annual Review of Sociology</i>. <b>43</b>: 249–269. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<span class="id-lock-free" title="Freely accessible"><a rel="nofollow" class="external text" href="https://doi.org/10.1146%2Fannurev-soc-060116-053643">10.1146/annurev-soc-060116-053643</a></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Annual+Review+of+Sociology&amp;rft.atitle=Toward+a+Sociology+of+Privacy&amp;rft.volume=43&amp;rft.pages=249-269&amp;rft.date=2017&amp;rft_id=info%3Adoi%2F10.1146%2Fannurev-soc-060116-053643&amp;rft.au=Anthony+Denise%2C+Celeste+Campos-Castillo%2C+Christine+Horne&amp;rft_id=https%3A%2F%2Fdoi.org%2F10.1146%252Fannurev-soc-060116-053643&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AComputer+and+network+surveillance" class="Z3988"></span><span class="cs1-maint citation-comment"><code class="cs1-code">{{<a href="/wiki/Template:Cite_journal" title="Template:Cite journal">cite journal</a>}}</code>: CS1 maint: multiple names: authors list (<a href="/wiki/Category:CS1_maint:_multiple_names:_authors_list" title="Category:CS1 maint: multiple names: authors list">link</a>)</span></span> </li> <li id="cite_note-20"><span class="mw-cite-backlink"><b><a href="#cite_ref-20">^</a></b></span> <span class="reference-text">Muise, A., Christofides, E., &amp; Demsmarais, S. (2014). " Creeping" or just information seeking? Gender differences in partner monitoring in response to jealousy on Facebook. Personal Relationships, 21(1), 35-50.</span> </li> <li id="cite_note-Smart_Devices_Call_Cops-21"><span class="mw-cite-backlink">^ <a href="#cite_ref-Smart_Devices_Call_Cops_21-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-Smart_Devices_Call_Cops_21-1"><sup><i><b>b</b></i></sup></a> <a href="#cite_ref-Smart_Devices_Call_Cops_21-2"><sup><i><b>c</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://electronics.howstuffworks.com/gadgets/high-tech-gadgets/should-smart-devices-automatically-call-cops">"Should Smart Devices Be Able to Automatically Call the Cops?"</a>. <i>How Stuff Works</i>. 2017-07-18<span class="reference-accessdate">. Retrieved <span class="nowrap">November 10,</span> 2017</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=How+Stuff+Works&amp;rft.atitle=Should+Smart+Devices+Be+Able+to+Automatically+Call+the+Cops%3F&amp;rft.date=2017-07-18&amp;rft_id=https%3A%2F%2Felectronics.howstuffworks.com%2Fgadgets%2Fhigh-tech-gadgets%2Fshould-smart-devices-automatically-call-cops&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AComputer+and+network+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-22"><span class="mw-cite-backlink"><b><a href="#cite_ref-22">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://time.com/4766611/alexa-takes-the-stand-listening-devices-raise-privacy-issues/">"Time Alexa Takes the Stand Listening Devices Raise Privacy Issues"</a>. 4 May 2017<span class="reference-accessdate">. Retrieved <span class="nowrap">November 10,</span> 2017</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Time+Alexa+Takes+the+Stand+Listening+Devices+Raise+Privacy+Issues&amp;rft.date=2017-05-04&amp;rft_id=https%3A%2F%2Ftime.com%2F4766611%2Falexa-takes-the-stand-listening-devices-raise-privacy-issues%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AComputer+and+network+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-nytimes-onlineads-23"><span class="mw-cite-backlink"><b><a href="#cite_ref-nytimes-onlineads_23-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFStory2007" class="citation news cs1">Story, Louise (November 1, 2007). <a rel="nofollow" class="external text" href="https://www.nytimes.com/2007/11/01/technology/01Privacy.html?_r=1">"F.T.C. to Review Online Ads and Privacy"</a>. <i>New York Times</i><span class="reference-accessdate">. Retrieved <span class="nowrap">2009-03-17</span></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=New+York+Times&amp;rft.atitle=F.T.C.+to+Review+Online+Ads+and+Privacy&amp;rft.date=2007-11-01&amp;rft.aulast=Story&amp;rft.aufirst=Louise&amp;rft_id=https%3A%2F%2Fwww.nytimes.com%2F2007%2F11%2F01%2Ftechnology%2F01Privacy.html%3F_r%3D1&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AComputer+and+network+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-surv-in-society-24"><span class="mw-cite-backlink">^ <a href="#cite_ref-surv-in-society_24-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-surv-in-society_24-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFButler2009" class="citation news cs1">Butler, Don (January 31, 2009). <a rel="nofollow" class="external text" href="https://web.archive.org/web/20130722200908/http://www2.canada.com/ottawacitizen/news/observer/story.html?id=ade6d795-4e7a-4ede-9fc1-f7bf929849c8&amp;p=1">"Are we addicted to being watched?"</a>. <i>The Ottawa Citizen</i>. canada.com. Archived from <a rel="nofollow" class="external text" href="http://www2.canada.com/ottawacitizen/news/observer/story.html?id=ade6d795-4e7a-4ede-9fc1-f7bf929849c8&amp;p=1">the original</a> on 22 July 2013<span class="reference-accessdate">. Retrieved <span class="nowrap">26 May</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=The+Ottawa+Citizen&amp;rft.atitle=Are+we+addicted+to+being+watched%3F&amp;rft.date=2009-01-31&amp;rft.aulast=Butler&amp;rft.aufirst=Don&amp;rft_id=http%3A%2F%2Fwww2.canada.com%2Fottawacitizen%2Fnews%2Fobserver%2Fstory.html%3Fid%3Dade6d795-4e7a-4ede-9fc1-f7bf929849c8%26p%3D1&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AComputer+and+network+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-cnet-googlelogs-25"><span class="mw-cite-backlink"><b><a href="#cite_ref-cnet-googlelogs_25-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFSoghoian2008" class="citation news cs1">Soghoian, Chris (September 11, 2008). <a rel="nofollow" class="external text" href="https://web.archive.org/web/20110429140744/http://news.cnet.com/8301-13739_3-10038963-46.html">"Debunking Google's log anonymization propaganda"</a>. <i>CNET News</i>. Archived from <a rel="nofollow" class="external text" href="http://news.cnet.com/8301-13739_3-10038963-46.html">the original</a> on 2011-04-29<span class="reference-accessdate">. Retrieved <span class="nowrap">2009-03-21</span></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=CNET+News&amp;rft.atitle=Debunking+Google%27s+log+anonymization+propaganda&amp;rft.date=2008-09-11&amp;rft.aulast=Soghoian&amp;rft.aufirst=Chris&amp;rft_id=http%3A%2F%2Fnews.cnet.com%2F8301-13739_3-10038963-46.html&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AComputer+and+network+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-joshi-26"><span class="mw-cite-backlink">^ <a href="#cite_ref-joshi_26-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-joshi_26-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFJoshi2009" class="citation news cs1">Joshi, Priyanki (March 21, 2009). <a rel="nofollow" class="external text" href="http://www.business-standard.com/india/news/every-move-you-make-google-will-be-watching-you/57071/on">"Every move you make, Google will be watching you"</a>. <i>Business Standard</i><span class="reference-accessdate">. Retrieved <span class="nowrap">2009-03-21</span></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Business+Standard&amp;rft.atitle=Every+move+you+make%2C+Google+will+be+watching+you&amp;rft.date=2009-03-21&amp;rft.aulast=Joshi&amp;rft.aufirst=Priyanki&amp;rft_id=http%3A%2F%2Fwww.business-standard.com%2Findia%2Fnews%2Fevery-move-you-make-google-will-be-watching-you%2F57071%2Fon&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AComputer+and+network+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-google-adprivacy-27"><span class="mw-cite-backlink"><b><a href="#cite_ref-google-adprivacy_27-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://www.google.com/privacy_ads.html">"Advertising and Privacy"</a>. <i>Google (company page)</i>. 2009<span class="reference-accessdate">. Retrieved <span class="nowrap">2009-03-21</span></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=Google+%28company+page%29&amp;rft.atitle=Advertising+and+Privacy&amp;rft.date=2009&amp;rft_id=http%3A%2F%2Fwww.google.com%2Fprivacy_ads.html&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AComputer+and+network+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-FTC2005-28"><span class="mw-cite-backlink"><b><a href="#cite_ref-FTC2005_28-0">^</a></b></span> <span class="reference-text"><a rel="nofollow" class="external text" href="https://www.ftc.gov/os/2005/03/050307spywarerpt.pdf">"Spyware Workshop: Monitoring Software on Your OC: Spywae, Adware, and Other Software"</a>, Staff Report, U.S. Federal Trade Commission, March 2005. Retrieved 7 September 2013.</span> </li> <li id="cite_note-29"><span class="mw-cite-backlink"><b><a href="#cite_ref-29">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFAycock,_John2006" class="citation book cs1">Aycock, John (2006). <a rel="nofollow" class="external text" href="https://www.springer.com/computer/security+and+cryptology/book/978-0-387-30236-2"><i>Computer Viruses and Malware</i></a>. Advances in Information Security. Springer. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-0-387-30236-2" title="Special:BookSources/978-0-387-30236-2"><bdi>978-0-387-30236-2</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=Computer+Viruses+and+Malware&amp;rft.series=Advances+in+Information+Security&amp;rft.pub=Springer&amp;rft.date=2006&amp;rft.isbn=978-0-387-30236-2&amp;rft.au=Aycock%2C+John&amp;rft_id=https%3A%2F%2Fwww.springer.com%2Fcomputer%2Fsecurity%2Band%2Bcryptology%2Fbook%2F978-0-387-30236-2&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AComputer+and+network+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-30"><span class="mw-cite-backlink"><b><a href="#cite_ref-30">^</a></b></span> <span class="reference-text"><a rel="nofollow" class="external text" href="https://www.theregister.co.uk/2003/04/18/office_workers_give_away_passwords/">"Office workers give away passwords for a cheap pen"</a>, John Leyden, <i>The Register</i>, 8 April 2003. Retrieved 7 September 2013.</span> </li> <li id="cite_note-31"><span class="mw-cite-backlink"><b><a href="#cite_ref-31">^</a></b></span> <span class="reference-text"><a rel="nofollow" class="external text" href="https://www.theregister.co.uk/2004/03/03/passwords_are_passport_to_theft/">"Passwords are passport to theft"</a>, <i>The Register</i>, 3 March 2004. Retrieved 7 September 2013.</span> </li> <li id="cite_note-32"><span class="mw-cite-backlink"><b><a href="#cite_ref-32">^</a></b></span> <span class="reference-text"><a rel="nofollow" class="external text" href="https://community.broadcom.com/symantecenterprise/communities/community-home/librarydocuments/viewdocument?DocumentKey=891b1f29-e2e7-4484-89c0-a2137ee82f8b&amp;CommunityKey=1ecf5f55-9545-44d6-b0f4-4e4a7f5f5e68&amp;tab=librarydocuments">"Social Engineering Fundamentals, Part I: Hacker Tactics"</a>, Sarah Granger, 18 December 2001.</span> </li> <li id="cite_note-33"><span class="mw-cite-backlink"><b><a href="#cite_ref-33">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20140415062755/http://antivirus.about.com/od/virusdescriptions/f/How-Does-The-Stuxnet-Worm-Spread.htm">"Stuxnet: How does the Stuxnet worm spread?"</a>. Antivirus.about.com. 2014-03-03. Archived from <a rel="nofollow" class="external text" href="http://antivirus.about.com/od/virusdescriptions/f/How-Does-The-Stuxnet-Worm-Spread.htm">the original</a> on 2014-04-15<span class="reference-accessdate">. Retrieved <span class="nowrap">2014-05-17</span></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Stuxnet%3A+How+does+the+Stuxnet+worm+spread%3F&amp;rft.pub=Antivirus.about.com&amp;rft.date=2014-03-03&amp;rft_id=http%3A%2F%2Fantivirus.about.com%2Fod%2Fvirusdescriptions%2Ff%2FHow-Does-The-Stuxnet-Worm-Spread.htm&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AComputer+and+network+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-keefe-34"><span class="mw-cite-backlink"><b><a href="#cite_ref-keefe_34-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFKeefe2006" class="citation news cs1">Keefe, Patrick (March 12, 2006). <a rel="nofollow" class="external text" href="https://www.nytimes.com/2006/03/12/magazine/312wwln_essay.html?_r=0">"Can Network Theory Thwart Terrorists?"</a>. <i>New York Times</i><span class="reference-accessdate">. Retrieved <span class="nowrap">14 March</span> 2009</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=New+York+Times&amp;rft.atitle=Can+Network+Theory+Thwart+Terrorists%3F&amp;rft.date=2006-03-12&amp;rft.aulast=Keefe&amp;rft.aufirst=Patrick&amp;rft_id=https%3A%2F%2Fwww.nytimes.com%2F2006%2F03%2F12%2Fmagazine%2F312wwln_essay.html%3F_r%3D0&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AComputer+and+network+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-part-surv-35"><span class="mw-cite-backlink"><b><a href="#cite_ref-part-surv_35-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFAlbrechtslund2008" class="citation journal cs1">Albrechtslund, Anders (March 3, 2008). <a rel="nofollow" class="external text" href="https://doi.org/10.5210%2Ffm.v13i3.2142">"Online Social Networking as Participatory Surveillance"</a>. <i>First Monday</i>. <b>13</b> (3). <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<span class="id-lock-free" title="Freely accessible"><a rel="nofollow" class="external text" href="https://doi.org/10.5210%2Ffm.v13i3.2142">10.5210/fm.v13i3.2142</a></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=First+Monday&amp;rft.atitle=Online+Social+Networking+as+Participatory+Surveillance&amp;rft.volume=13&amp;rft.issue=3&amp;rft.date=2008-03-03&amp;rft_id=info%3Adoi%2F10.5210%2Ffm.v13i3.2142&amp;rft.aulast=Albrechtslund&amp;rft.aufirst=Anders&amp;rft_id=https%3A%2F%2Fdoi.org%2F10.5210%252Ffm.v13i3.2142&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AComputer+and+network+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-fuchs-36"><span class="mw-cite-backlink"><b><a href="#cite_ref-fuchs_36-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFFuchs2009" class="citation book cs1">Fuchs, Christian (2009). <a rel="nofollow" class="external text" href="https://web.archive.org/web/20090206033642/http://fuchs.icts.sbg.ac.at/SNS_Surveillance_Fuchs.pdf"><i>Social Networking Sites and the Surveillance Society. A Critical Case Study of the Usage of studiVZ, Facebook, and MySpace by Students in Salzburg in the Context of Electronic Surveillance</i></a> <span class="cs1-format">(PDF)</span>. Salzburg and Vienna: Forschungsgruppe Unified Theory of Information. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-3-200-01428-2" title="Special:BookSources/978-3-200-01428-2"><bdi>978-3-200-01428-2</bdi></a>. Archived from <a rel="nofollow" class="external text" href="http://fuchs.icts.sbg.ac.at/SNS_Surveillance_Fuchs.pdf">the original</a> <span class="cs1-format">(PDF)</span> on February 6, 2009<span class="reference-accessdate">. Retrieved <span class="nowrap">March 14,</span> 2009</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=Social+Networking+Sites+and+the+Surveillance+Society.+A+Critical+Case+Study+of+the+Usage+of+studiVZ%2C+Facebook%2C+and+MySpace+by+Students+in+Salzburg+in+the+Context+of+Electronic+Surveillance&amp;rft.place=Salzburg+and+Vienna&amp;rft.pub=Forschungsgruppe+Unified+Theory+of+Information&amp;rft.date=2009&amp;rft.isbn=978-3-200-01428-2&amp;rft.aulast=Fuchs&amp;rft.aufirst=Christian&amp;rft_id=http%3A%2F%2Ffuchs.icts.sbg.ac.at%2FSNS_Surveillance_Fuchs.pdf&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AComputer+and+network+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-ethier-37"><span class="mw-cite-backlink">^ <a href="#cite_ref-ethier_37-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-ethier_37-1"><sup><i><b>b</b></i></sup></a> <a href="#cite_ref-ethier_37-2"><sup><i><b>c</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFEthier2006" class="citation web cs1">Ethier, Jason (27 May 2006). <a rel="nofollow" class="external text" href="http://www.atkinson.yorku.ca/~sosc2410/Social%20Network%20Theory2.pdf">"Current Research in Social Network Theory"</a> <span class="cs1-format">(PDF)</span>. Northeastern University College of Computer and Information Science. <a rel="nofollow" class="external text" href="https://ghostarchive.org/archive/20221009/http://www.atkinson.yorku.ca/~sosc2410/Social%20Network%20Theory2.pdf">Archived</a> <span class="cs1-format">(PDF)</span> from the original on 2022-10-09<span class="reference-accessdate">. Retrieved <span class="nowrap">15 March</span> 2009</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Current+Research+in+Social+Network+Theory&amp;rft.pub=Northeastern+University+College+of+Computer+and+Information+Science&amp;rft.date=2006-05-27&amp;rft.aulast=Ethier&amp;rft.aufirst=Jason&amp;rft_id=http%3A%2F%2Fwww.atkinson.yorku.ca%2F~sosc2410%2FSocial%2520Network%2520Theory2.pdf&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AComputer+and+network+surveillance" class="Z3988"></span><sup class="noprint Inline-Template"><span style="white-space: nowrap;">&#91;<i><a href="/wiki/Wikipedia:Link_rot" title="Wikipedia:Link rot"><span title="&#160;Dead link tagged July 2019">permanent dead link</span></a></i><span style="visibility:hidden; color:transparent; padding-left:2px">&#8205;</span>&#93;</span></sup></span> </li> <li id="cite_note-pentagon-social-networks-38"><span class="mw-cite-backlink"><b><a href="#cite_ref-pentagon-social-networks_38-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFMarks2006" class="citation news cs1">Marks, Paul (June 9, 2006). <a rel="nofollow" class="external text" href="https://www.newscientist.com/article/mg19025556.200?DCMP=NLC-nletter&amp;nsref=mg19025556.200">"Pentagon sets its sights on social networking websites"</a>. <i>New Scientist</i><span class="reference-accessdate">. Retrieved <span class="nowrap">2009-03-16</span></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=New+Scientist&amp;rft.atitle=Pentagon+sets+its+sights+on+social+networking+websites&amp;rft.date=2006-06-09&amp;rft.aulast=Marks&amp;rft.aufirst=Paul&amp;rft_id=https%3A%2F%2Fwww.newscientist.com%2Farticle%2Fmg19025556.200%3FDCMP%3DNLC-nletter%26nsref%3Dmg19025556.200&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AComputer+and+network+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-nsa-myspace-39"><span class="mw-cite-backlink"><b><a href="#cite_ref-nsa-myspace_39-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFKawamoto2006" class="citation news cs1">Kawamoto, Dawn (June 9, 2006). <a rel="nofollow" class="external text" href="https://archive.today/20120720043006/http%3A%2F%2Fnews.cnet.com%2F8301-10784_3-6082047-7.html">"Is the NSA reading your MySpace profile?"</a>. <i>CNET News</i>. Archived from <a rel="nofollow" class="external text" href="http://news.cnet.com/8301-10784_3-6082047-7.html">the original</a> on 2012-07-20<span class="reference-accessdate">. Retrieved <span class="nowrap">2009-03-16</span></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=CNET+News&amp;rft.atitle=Is+the+NSA+reading+your+MySpace+profile%3F&amp;rft.date=2006-06-09&amp;rft.aulast=Kawamoto&amp;rft.aufirst=Dawn&amp;rft_id=http%3A%2F%2Fnews.cnet.com%2F8301-10784_3-6082047-7.html&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AComputer+and+network+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-ressler-40"><span class="mw-cite-backlink"><b><a href="#cite_ref-ressler_40-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFRessler2006" class="citation journal cs1">Ressler, Steve (July 2006). <a rel="nofollow" class="external text" href="http://www.hsaj.org/?fullarticle=2.2.8">"Social Network Analysis as an Approach to Combat Terrorism: Past, Present, and Future Research"</a>. <i>Homeland Security Affairs</i>. <b>II</b> (2)<span class="reference-accessdate">. Retrieved <span class="nowrap">March 14,</span> 2009</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Homeland+Security+Affairs&amp;rft.atitle=Social+Network+Analysis+as+an+Approach+to+Combat+Terrorism%3A+Past%2C+Present%2C+and+Future+Research&amp;rft.volume=II&amp;rft.issue=2&amp;rft.date=2006-07&amp;rft.aulast=Ressler&amp;rft.aufirst=Steve&amp;rft_id=http%3A%2F%2Fwww.hsaj.org%2F%3Ffullarticle%3D2.2.8&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AComputer+and+network+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-41"><span class="mw-cite-backlink"><b><a href="#cite_ref-41">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFMcNamara1999" class="citation web cs1">McNamara, Joel (4 December 1999). <a rel="nofollow" class="external text" href="https://web.archive.org/web/20130901102801/http://www.jammed.com/~jwa/tempest.html">"Complete, Unofficial Tempest Page"</a>. Archived from <a rel="nofollow" class="external text" href="http://www.jammed.com/~jwa/tempest.html">the original</a> on 1 September 2013<span class="reference-accessdate">. Retrieved <span class="nowrap">7 September</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Complete%2C+Unofficial+Tempest+Page&amp;rft.date=1999-12-04&amp;rft.aulast=McNamara&amp;rft.aufirst=Joel&amp;rft_id=http%3A%2F%2Fwww.jammed.com%2F~jwa%2Ftempest.html&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AComputer+and+network+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-emr-42"><span class="mw-cite-backlink"><b><a href="#cite_ref-emr_42-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFVan_Eck,_Wim1985" class="citation journal cs1">Van Eck, Wim (1985). <a rel="nofollow" class="external text" href="http://jya.com/emr.pdf">"Electromagnetic Radiation from Video Display Units: An Eavesdropping Risk?"</a> <span class="cs1-format">(PDF)</span>. <i>Computers &amp; Security</i>. <b>4</b> (4): 269–286. <a href="/wiki/CiteSeerX_(identifier)" class="mw-redirect" title="CiteSeerX (identifier)">CiteSeerX</a>&#160;<span class="id-lock-free" title="Freely accessible"><a rel="nofollow" class="external text" href="https://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.35.1695">10.1.1.35.1695</a></span>. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1016%2F0167-4048%2885%2990046-X">10.1016/0167-4048(85)90046-X</a>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20040405142218/http://jya.com/emr.pdf">Archived</a> <span class="cs1-format">(PDF)</span> from the original on 2004-04-05.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Computers+%26+Security&amp;rft.atitle=Electromagnetic+Radiation+from+Video+Display+Units%3A+An+Eavesdropping+Risk%3F&amp;rft.volume=4&amp;rft.issue=4&amp;rft.pages=269-286&amp;rft.date=1985&amp;rft_id=https%3A%2F%2Fciteseerx.ist.psu.edu%2Fviewdoc%2Fsummary%3Fdoi%3D10.1.1.35.1695%23id-name%3DCiteSeerX&amp;rft_id=info%3Adoi%2F10.1016%2F0167-4048%2885%2990046-X&amp;rft.au=Van+Eck%2C+Wim&amp;rft_id=http%3A%2F%2Fjya.com%2Femr.pdf&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AComputer+and+network+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-Kuhn2004-43"><span class="mw-cite-backlink"><b><a href="#cite_ref-Kuhn2004_43-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFKuhn,_M.G.2004" class="citation journal cs1">Kuhn, M.G. (26–28 May 2004). <a rel="nofollow" class="external text" href="http://www.cl.cam.ac.uk/~mgk25/pet2004-fpd.pdf">"Electromagnetic Eavesdropping Risks of Flat-Panel Displays"</a> <span class="cs1-format">(PDF)</span>. <i>4th Workshop on Privacy Enhancing Technologies</i>. Toronto: 23–25.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=4th+Workshop+on+Privacy+Enhancing+Technologies&amp;rft.atitle=Electromagnetic+Eavesdropping+Risks+of+Flat-Panel+Displays&amp;rft.pages=23-25&amp;rft.date=2004-05-26%2F2004-05-28&amp;rft.au=Kuhn%2C+M.G.&amp;rft_id=http%3A%2F%2Fwww.cl.cam.ac.uk%2F~mgk25%2Fpet2004-fpd.pdf&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AComputer+and+network+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-Asonov-44"><span class="mw-cite-backlink"><b><a href="#cite_ref-Asonov_44-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFAsonovAgrawal2004" class="citation cs2">Asonov, Dmitri; Agrawal, Rakesh (2004), <a rel="nofollow" class="external text" href="https://web.archive.org/web/20120227213345/http://rakesh.agrawal-family.com/papers/ssp04kba.pdf"><i>Keyboard Acoustic Emanations</i></a> <span class="cs1-format">(PDF)</span>, IBM Almaden Research Center, archived from <a rel="nofollow" class="external text" href="http://rakesh.agrawal-family.com/papers/ssp04kba.pdf">the original</a> <span class="cs1-format">(PDF)</span> on 2012-02-27<span class="reference-accessdate">, retrieved <span class="nowrap">2013-09-08</span></span></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=Keyboard+Acoustic+Emanations&amp;rft.pub=IBM+Almaden+Research+Center&amp;rft.date=2004&amp;rft.aulast=Asonov&amp;rft.aufirst=Dmitri&amp;rft.au=Agrawal%2C+Rakesh&amp;rft_id=http%3A%2F%2Frakesh.agrawal-family.com%2Fpapers%2Fssp04kba.pdf&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AComputer+and+network+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-Berkeley-45"><span class="mw-cite-backlink"><b><a href="#cite_ref-Berkeley_45-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFYang2005" class="citation cs2">Yang, Sarah (14 September 2005), <a rel="nofollow" class="external text" href="http://www.berkeley.edu/news/media/releases/2005/09/14_key.shtml">"Researchers recover typed text using audio recording of keystrokes"</a>, <i>UC Berkeley News</i></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=UC+Berkeley+News&amp;rft.atitle=Researchers+recover+typed+text+using+audio+recording+of+keystrokes&amp;rft.date=2005-09-14&amp;rft.aulast=Yang&amp;rft.aufirst=Sarah&amp;rft_id=http%3A%2F%2Fwww.berkeley.edu%2Fnews%2Fmedia%2Freleases%2F2005%2F09%2F14_key.shtml&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AComputer+and+network+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-LA_Times-46"><span class="mw-cite-backlink">^ <a href="#cite_ref-LA_Times_46-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-LA_Times_46-1"><sup><i><b>b</b></i></sup></a> <a href="#cite_ref-LA_Times_46-2"><sup><i><b>c</b></i></sup></a> <a href="#cite_ref-LA_Times_46-3"><sup><i><b>d</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://www.latimes.com/politics/la-pol-sac-cell-phone-surveillance-transparency-law-20170827-htmlstory.html">"LA Times"</a>. <i><a href="/wiki/Los_Angeles_Times" title="Los Angeles Times">Los Angeles Times</a></i>. 2017-08-27<span class="reference-accessdate">. Retrieved <span class="nowrap">November 10,</span> 2017</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=Los+Angeles+Times&amp;rft.atitle=LA+Times&amp;rft.date=2017-08-27&amp;rft_id=http%3A%2F%2Fwww.latimes.com%2Fpolitics%2Fla-pol-sac-cell-phone-surveillance-transparency-law-20170827-htmlstory.html&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AComputer+and+network+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-47"><span class="mw-cite-backlink"><b><a href="#cite_ref-47">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFAdi_Shamir_&amp;_Eran_Tromer" class="citation web cs1">Adi Shamir &amp; Eran Tromer. <a rel="nofollow" class="external text" href="http://tau.ac.il/~tromer/acoustic/">"Acoustic cryptanalysis"</a>. Blavatnik School of Computer Science, Tel Aviv University<span class="reference-accessdate">. Retrieved <span class="nowrap">1 November</span> 2011</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Acoustic+cryptanalysis&amp;rft.pub=Blavatnik+School+of+Computer+Science%2C+Tel+Aviv+University&amp;rft.au=Adi+Shamir+%26+Eran+Tromer&amp;rft_id=http%3A%2F%2Ftau.ac.il%2F~tromer%2Facoustic%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AComputer+and+network+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-48"><span class="mw-cite-backlink"><b><a href="#cite_ref-48">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20140429161233/http://news.techworld.com/security/3200593/swiss-coder-publicises-government-spy-trojan/">"Swiss coder publicises government spy Trojan"</a>. News.techworld.com. Archived from <a rel="nofollow" class="external text" href="http://news.techworld.com/security/3200593/swiss-coder-publicises-government-spy-trojan/">the original</a> on 29 April 2014<span class="reference-accessdate">. Retrieved <span class="nowrap">25 March</span> 2014</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Swiss+coder+publicises+government+spy+Trojan&amp;rft.pub=News.techworld.com&amp;rft_id=http%3A%2F%2Fnews.techworld.com%2Fsecurity%2F3200593%2Fswiss-coder-publicises-government-spy-trojan%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AComputer+and+network+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-49"><span class="mw-cite-backlink"><b><a href="#cite_ref-49">^</a></b></span> <span class="reference-text">Basil Cupa, <a rel="nofollow" class="external text" href="http://www.zora.uzh.ch/81157/1/Cupa_Living_in_Surveillance_Societies_2012.pdf">Trojan Horse Resurrected: On the Legality of the Use of Government Spyware (Govware)</a>, LISS 2013, pp. 419-428</span> </li> <li id="cite_note-50"><span class="mw-cite-backlink"><b><a href="#cite_ref-50">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20130506102113/http://www.ejpd.admin.ch/content/ejpd/de/home/themen/sicherheit/ueberwachung_des_post-/faq_vuepf.faq_3.html">"FAQ – Häufig gestellte Fragen"</a>. Ejpd.admin.ch. 2011-11-23. Archived from <a rel="nofollow" class="external text" href="http://www.ejpd.admin.ch/content/ejpd/de/home/themen/sicherheit/ueberwachung_des_post-/faq_vuepf.faq_3.html">the original</a> on 2013-05-06<span class="reference-accessdate">. Retrieved <span class="nowrap">2014-05-17</span></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=FAQ+%E2%80%93+H%C3%A4ufig+gestellte+Fragen&amp;rft.pub=Ejpd.admin.ch&amp;rft.date=2011-11-23&amp;rft_id=http%3A%2F%2Fwww.ejpd.admin.ch%2Fcontent%2Fejpd%2Fde%2Fhome%2Fthemen%2Fsicherheit%2Fueberwachung_des_post-%2Ffaq_vuepf.faq_3.html&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AComputer+and+network+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-51"><span class="mw-cite-backlink"><b><a href="#cite_ref-51">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFJeremy_Reimer2007" class="citation web cs1">Jeremy Reimer (20 July 2007). <a rel="nofollow" class="external text" href="https://arstechnica.com/news.ars/post/20070719-will-security-firms-avoid-detecting-government-spyware.html">"The tricky issue of spyware with a badge: meet 'policeware'<span class="cs1-kern-right"></span>"</a>. <i>Ars Technica</i>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=Ars+Technica&amp;rft.atitle=The+tricky+issue+of+spyware+with+a+badge%3A+meet+%27policeware%27&amp;rft.date=2007-07-20&amp;rft.au=Jeremy+Reimer&amp;rft_id=https%3A%2F%2Farstechnica.com%2Fnews.ars%2Fpost%2F20070719-will-security-firms-avoid-detecting-government-spyware.html&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AComputer+and+network+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-52"><span class="mw-cite-backlink"><b><a href="#cite_ref-52">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFHopper2001" class="citation news cs1">Hopper, D. Ian (4 May 2001). <a rel="nofollow" class="external text" href="https://abcnews.go.com/Technology/story?id=98591&amp;page=1">"FBI's Web Monitoring Exposed"</a>. <i>ABC News</i>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=ABC+News&amp;rft.atitle=FBI%27s+Web+Monitoring+Exposed&amp;rft.date=2001-05-04&amp;rft.aulast=Hopper&amp;rft.aufirst=D.+Ian&amp;rft_id=https%3A%2F%2Fabcnews.go.com%2FTechnology%2Fstory%3Fid%3D98591%26page%3D1&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AComputer+and+network+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-53"><span class="mw-cite-backlink"><b><a href="#cite_ref-53">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFLevy1994" class="citation news cs1">Levy, Steven (12 June 1994). <a rel="nofollow" class="external text" href="https://www.nytimes.com/1994/06/12/magazine/battle-of-the-clipper-chip.html?pagewanted=all&amp;mcubz=1">"New York Times"</a><span class="reference-accessdate">. Retrieved <span class="nowrap">November 10,</span> 2017</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.atitle=New+York+Times&amp;rft.date=1994-06-12&amp;rft.aulast=Levy&amp;rft.aufirst=Steven&amp;rft_id=https%3A%2F%2Fwww.nytimes.com%2F1994%2F06%2F12%2Fmagazine%2Fbattle-of-the-clipper-chip.html%3Fpagewanted%3Dall%26mcubz%3D1&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AComputer+and+network+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-54"><span class="mw-cite-backlink"><b><a href="#cite_ref-54">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://cs.stanford.edu/people/eroberts/cs201/projects/1995-96/clipper-chip/history.html">"Stanford University Clipper Chip"</a><span class="reference-accessdate">. Retrieved <span class="nowrap">November 10,</span> 2017</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Stanford+University+Clipper+Chip&amp;rft_id=https%3A%2F%2Fcs.stanford.edu%2Fpeople%2Feroberts%2Fcs201%2Fprojects%2F1995-96%2Fclipper-chip%2Fhistory.html&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AComputer+and+network+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-55"><span class="mw-cite-backlink"><b><a href="#cite_ref-55">^</a></b></span> <span class="reference-text"><a rel="nofollow" class="external text" href="https://w2.eff.org/IP/SSSCA_CBDTPA/20020321_s2048_cbdtpa_bill.pdf">"Consumer Broadband and Digital Television Promotion Act"</a> <a rel="nofollow" class="external text" href="https://web.archive.org/web/20120214151257/http://w2.eff.org/IP/SSSCA_CBDTPA/20020321_s2048_cbdtpa_bill.pdf">Archived</a> 2012-02-14 at the <a href="/wiki/Wayback_Machine" title="Wayback Machine">Wayback Machine</a>, U.S. Senate bill S.2048, 107th Congress, 2nd session, 21 March 2002. Retrieved 8 September 2013.</span> </li> <li id="cite_note-56"><span class="mw-cite-backlink"><b><a href="#cite_ref-56">^</a></b></span> <span class="reference-text"><a rel="nofollow" class="external text" href="https://www.theguardian.com/technology/2012/mar/02/censorship-inseperable-from-surveillance">"Censorship is inseparable from surveillance"</a>, Cory Doctorow, <i>The Guardian</i>, 2 March 2012</span> </li> <li id="cite_note-57"><span class="mw-cite-backlink"><b><a href="#cite_ref-57">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFBitsoFourieBothma" class="citation web cs1">Bitso, Constance; Fourie, Ina; Bothma, Theo. <a rel="nofollow" class="external text" href="http://www.ifla.org/files/assets/faife/publications/spotlights/1%20Bitso_Fourie_BothmaTrendsInTransiton.pdf">"Trends in transition from classical censorship to Internet censorship: selected country overviews"</a> <span class="cs1-format">(PDF)</span>. <i>IFLA</i>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20231120101012/https://www.ifla.org/wp-content/uploads/2019/05/assets/faife/publications/spotlights/1%20Bitso_Fourie_BothmaTrendsInTransiton.pdf">Archived</a> <span class="cs1-format">(PDF)</span> from the original on Nov 20, 2023.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=IFLA&amp;rft.atitle=Trends+in+transition+from+classical+censorship+to+Internet+censorship%3A+selected+country+overviews&amp;rft.aulast=Bitso&amp;rft.aufirst=Constance&amp;rft.au=Fourie%2C+Ina&amp;rft.au=Bothma%2C+Theo&amp;rft_id=http%3A%2F%2Fwww.ifla.org%2Ffiles%2Fassets%2Ffaife%2Fpublications%2Fspotlights%2F1%2520Bitso_Fourie_BothmaTrendsInTransiton.pdf&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AComputer+and+network+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-RSFSRS-March2013-58"><span class="mw-cite-backlink">^ <a href="#cite_ref-RSFSRS-March2013_58-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-RSFSRS-March2013_58-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20130831072750/http://surveillance.rsf.org/en/">"Era of the digital mercenaries"</a>. <i>The Enemies of the Internet Special Edition&#160;: Surveillance</i>. Archived from <a rel="nofollow" class="external text" href="http://surveillance.rsf.org/en/">the original</a> on 2013-08-31.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=The+Enemies+of+the+Internet+Special+Edition+%3A+Surveillance&amp;rft.atitle=Era+of+the+digital+mercenaries&amp;rft_id=http%3A%2F%2Fsurveillance.rsf.org%2Fen%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AComputer+and+network+surveillance" class="Z3988"></span></span> </li> <li id="cite_note-59"><span class="mw-cite-backlink"><b><a href="#cite_ref-59">^</a></b></span> <span class="reference-text"><a rel="nofollow" class="external text" href="https://www.nytimes.com/2011/10/27/opinion/without-computer-security-sources-secrets-arent-safe-with-journalists.html?_r=1&amp;">"When Secrets Aren't Safe With Journalists"</a>, Christopher Soghoian, <i>New York Times</i>, 26 October 2011</span> </li> <li id="cite_note-CitizensLab-2007-60"><span class="mw-cite-backlink"><b><a href="#cite_ref-CitizensLab-2007_60-0">^</a></b></span> <span class="reference-text"><a rel="nofollow" class="external text" href="http://www.nartv.org/mirror/circ_guide.pdf"><i>Everyone's Guide to By-passing Internet Censorship</i></a>, The Citizen Lab, University of Toronto, September 2007</span> </li> </ol></div> <div class="mw-heading mw-heading2"><h2 id="External_links">External links</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Computer_and_network_surveillance&amp;action=edit&amp;section=10" title="Edit section: External links"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <ul><li><a rel="nofollow" class="external text" href="http://freehaven.net/anonbib/topic.html">"Selected Papers in Anonymity"</a>, Free Haven Project, accessed 16 September 2011.</li></ul> <p>Yan, W. (2019) Introduction to Intelligent Surveillance: Surveillance Data Capture, Transmission, and Analytics, Springer. </p> <div class="navbox-styles"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1129693374"><style data-mw-deduplicate="TemplateStyles:r1236075235">.mw-parser-output .navbox{box-sizing:border-box;border:1px solid #a2a9b1;width:100%;clear:both;font-size:88%;text-align:center;padding:1px;margin:1em auto 0}.mw-parser-output .navbox .navbox{margin-top:0}.mw-parser-output .navbox+.navbox,.mw-parser-output .navbox+.navbox-styles+.navbox{margin-top:-1px}.mw-parser-output .navbox-inner,.mw-parser-output .navbox-subgroup{width:100%}.mw-parser-output .navbox-group,.mw-parser-output .navbox-title,.mw-parser-output .navbox-abovebelow{padding:0.25em 1em;line-height:1.5em;text-align:center}.mw-parser-output .navbox-group{white-space:nowrap;text-align:right}.mw-parser-output .navbox,.mw-parser-output .navbox-subgroup{background-color:#fdfdfd}.mw-parser-output .navbox-list{line-height:1.5em;border-color:#fdfdfd}.mw-parser-output .navbox-list-with-group{text-align:left;border-left-width:2px;border-left-style:solid}.mw-parser-output tr+tr>.navbox-abovebelow,.mw-parser-output tr+tr>.navbox-group,.mw-parser-output tr+tr>.navbox-image,.mw-parser-output tr+tr>.navbox-list{border-top:2px solid #fdfdfd}.mw-parser-output .navbox-title{background-color:#ccf}.mw-parser-output .navbox-abovebelow,.mw-parser-output .navbox-group,.mw-parser-output .navbox-subgroup .navbox-title{background-color:#ddf}.mw-parser-output .navbox-subgroup .navbox-group,.mw-parser-output .navbox-subgroup .navbox-abovebelow{background-color:#e6e6ff}.mw-parser-output .navbox-even{background-color:#f7f7f7}.mw-parser-output .navbox-odd{background-color:transparent}.mw-parser-output .navbox .hlist td dl,.mw-parser-output .navbox .hlist td ol,.mw-parser-output .navbox .hlist td ul,.mw-parser-output .navbox td.hlist dl,.mw-parser-output .navbox td.hlist ol,.mw-parser-output .navbox td.hlist ul{padding:0.125em 0}.mw-parser-output .navbox .navbar{display:block;font-size:100%}.mw-parser-output .navbox-title .navbar{float:left;text-align:left;margin-right:0.5em}body.skin--responsive .mw-parser-output .navbox-image img{max-width:none!important}@media print{body.ns-0 .mw-parser-output .navbox{display:none!important}}</style></div><div role="navigation" class="navbox" aria-labelledby="Malware_topics" style="padding:3px"><table class="nowraplinks mw-collapsible autocollapse navbox-inner" style="border-spacing:0;background:transparent;color:inherit"><tbody><tr><th scope="col" class="navbox-title" colspan="2"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1129693374"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1239400231"><div class="navbar plainlinks hlist navbar-mini"><ul><li class="nv-view"><a href="/wiki/Template:Malware" title="Template:Malware"><abbr title="View this template">v</abbr></a></li><li class="nv-talk"><a href="/wiki/Template_talk:Malware" title="Template talk:Malware"><abbr title="Discuss this template">t</abbr></a></li><li class="nv-edit"><a href="/wiki/Special:EditPage/Template:Malware" title="Special:EditPage/Template:Malware"><abbr title="Edit this template">e</abbr></a></li></ul></div><div id="Malware_topics" style="font-size:114%;margin:0 4em"><a href="/wiki/Malware" title="Malware">Malware</a> topics</div></th></tr><tr><th scope="row" class="navbox-group" style="width:1%">Infectious malware</th><td class="navbox-list-with-group navbox-list navbox-odd hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Comparison_of_computer_viruses" title="Comparison of computer viruses">Comparison of computer viruses</a></li> <li><a href="/wiki/Computer_virus" title="Computer virus">Computer virus</a></li> <li><a href="/wiki/Computer_worm" title="Computer worm">Computer worm</a></li> <li><a href="/wiki/List_of_computer_worms" title="List of computer worms">List of computer worms</a></li> <li><a href="/wiki/Timeline_of_computer_viruses_and_worms" title="Timeline of computer viruses and worms">Timeline of computer viruses and worms</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Concealment</th><td class="navbox-list-with-group navbox-list navbox-even hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Backdoor_(computing)" title="Backdoor (computing)">Backdoor</a></li> <li><a href="/wiki/Clickjacking" title="Clickjacking">Clickjacking</a></li> <li><a href="/wiki/Man-in-the-browser" title="Man-in-the-browser">Man-in-the-browser</a></li> <li><a href="/wiki/Man-in-the-middle_attack" title="Man-in-the-middle attack">Man-in-the-middle</a></li> <li><a href="/wiki/Rootkit" title="Rootkit">Rootkit</a></li> <li><a href="/wiki/Trojan_horse_(computing)" title="Trojan horse (computing)">Trojan horse</a></li> <li><a href="/wiki/Zombie_(computing)" title="Zombie (computing)">Zombie computer</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Malware for profit</th><td class="navbox-list-with-group navbox-list navbox-odd hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Adware" title="Adware">Adware</a></li> <li><a href="/wiki/Botnet" title="Botnet">Botnet</a></li> <li><a href="/wiki/Crimeware" title="Crimeware">Crimeware</a></li> <li><a href="/wiki/Fleeceware" title="Fleeceware">Fleeceware</a></li> <li><a href="/wiki/Form_grabbing" title="Form grabbing">Form grabbing</a></li> <li><a href="/wiki/Dialer#Fraudulent_dialer" title="Dialer">Fraudulent dialer</a></li> <li><a href="/wiki/Infostealer" title="Infostealer">Infostealer</a></li> <li><a href="/wiki/Keystroke_logging" title="Keystroke logging">Keystroke logging</a></li> <li><a href="/wiki/Internet_bot#Malicious_purposes" title="Internet bot">Malbot</a></li> <li><a href="/wiki/Privacy-invasive_software" title="Privacy-invasive software">Privacy-invasive software</a></li> <li><a href="/wiki/Ransomware" title="Ransomware">Ransomware</a></li> <li><a href="/wiki/Rogue_security_software" title="Rogue security software">Rogue security software</a></li> <li><a href="/wiki/Scareware" title="Scareware">Scareware</a></li> <li><a href="/wiki/Spyware" title="Spyware">Spyware</a></li> <li><a href="/wiki/Web_threat" title="Web threat">Web threats</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">By operating system</th><td class="navbox-list-with-group navbox-list navbox-even hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Category:Android_(operating_system)_malware" title="Category:Android (operating system) malware">Android malware</a></li> <li><a href="/wiki/Category:Classic_Mac_OS_viruses" title="Category:Classic Mac OS viruses">Classic Mac OS viruses</a></li> <li><a href="/wiki/Category:IOS_malware" title="Category:IOS malware">iOS malware</a></li> <li><a href="/wiki/Linux_malware" title="Linux malware">Linux malware</a></li> <li><a href="/wiki/Category:MacOS_malware" title="Category:MacOS malware">MacOS malware</a></li> <li><a href="/wiki/Macro_virus" title="Macro virus">Macro virus</a></li> <li><a href="/wiki/Mobile_malware" title="Mobile malware">Mobile malware</a></li> <li><a href="/wiki/Palm_OS_viruses" title="Palm OS viruses">Palm OS viruses</a></li> <li><a href="/wiki/HyperCard_viruses" class="mw-redirect" title="HyperCard viruses">HyperCard viruses</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Protection</th><td class="navbox-list-with-group navbox-list navbox-odd hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Anti-keylogger" title="Anti-keylogger">Anti-keylogger</a></li> <li><a href="/wiki/Antivirus_software" title="Antivirus software">Antivirus software</a></li> <li><a href="/wiki/Browser_security" title="Browser security">Browser security</a></li> <li><a href="/wiki/Data_loss_prevention_software" title="Data loss prevention software">Data loss prevention software</a></li> <li><a href="/wiki/Defensive_computing" title="Defensive computing">Defensive computing</a></li> <li><a href="/wiki/Firewall_(computing)" title="Firewall (computing)">Firewall</a></li> <li><a href="/wiki/Internet_security" title="Internet security">Internet security</a></li> <li><a href="/wiki/Intrusion_detection_system" title="Intrusion detection system">Intrusion detection system</a></li> <li><a href="/wiki/Mobile_security" title="Mobile security">Mobile security</a></li> <li><a href="/wiki/Network_security" title="Network security">Network security</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Countermeasures</th><td class="navbox-list-with-group navbox-list navbox-even hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a class="mw-selflink selflink">Computer and network surveillance</a></li> <li><a href="/wiki/Honeypot_(computing)" title="Honeypot (computing)">Honeypot</a></li> <li><a href="/wiki/Operation:_Bot_Roast" title="Operation: Bot Roast">Operation: Bot Roast</a></li></ul> </div></td></tr></tbody></table></div> <style data-mw-deduplicate="TemplateStyles:r1130092004">.mw-parser-output .portal-bar{font-size:88%;font-weight:bold;display:flex;justify-content:center;align-items:baseline}.mw-parser-output .portal-bar-bordered{padding:0 2em;background-color:#fdfdfd;border:1px solid #a2a9b1;clear:both;margin:1em auto 0}.mw-parser-output .portal-bar-related{font-size:100%;justify-content:flex-start}.mw-parser-output .portal-bar-unbordered{padding:0 1.7em;margin-left:0}.mw-parser-output .portal-bar-header{margin:0 1em 0 0.5em;flex:0 0 auto;min-height:24px}.mw-parser-output .portal-bar-content{display:flex;flex-flow:row wrap;flex:0 1 auto;padding:0.15em 0;column-gap:1em;align-items:baseline;margin:0;list-style:none}.mw-parser-output .portal-bar-content-related{margin:0;list-style:none}.mw-parser-output .portal-bar-item{display:inline-block;margin:0.15em 0.2em;min-height:24px;line-height:24px}@media screen and (max-width:768px){.mw-parser-output .portal-bar{font-size:88%;font-weight:bold;display:flex;flex-flow:column wrap;align-items:baseline}.mw-parser-output .portal-bar-header{text-align:center;flex:0;padding-left:0.5em;margin:0 auto}.mw-parser-output .portal-bar-related{font-size:100%;align-items:flex-start}.mw-parser-output .portal-bar-content{display:flex;flex-flow:row wrap;align-items:center;flex:0;column-gap:1em;border-top:1px solid #a2a9b1;margin:0 auto;list-style:none}.mw-parser-output .portal-bar-content-related{border-top:none;margin:0;list-style:none}}.mw-parser-output .navbox+link+.portal-bar,.mw-parser-output .navbox+style+.portal-bar,.mw-parser-output .navbox+link+.portal-bar-bordered,.mw-parser-output .navbox+style+.portal-bar-bordered,.mw-parser-output .sister-bar+link+.portal-bar,.mw-parser-output .sister-bar+style+.portal-bar,.mw-parser-output .portal-bar+.navbox-styles+.navbox,.mw-parser-output .portal-bar+.navbox-styles+.sister-bar{margin-top:-1px}</style><div class="portal-bar noprint metadata noviewer portal-bar-bordered" role="navigation" aria-label="Portals"><span class="portal-bar-header"><a href="/wiki/Wikipedia:Contents/Portals" title="Wikipedia:Contents/Portals">Portal</a>:</span><ul class="portal-bar-content"><li class="portal-bar-item"><span class="nowrap"><span typeof="mw:File"><a href="/wiki/File:Crystal_Clear_app_linneighborhood.svg" class="mw-file-description"><img alt="icon" src="//upload.wikimedia.org/wikipedia/commons/thumb/f/f9/Crystal_Clear_app_linneighborhood.svg/19px-Crystal_Clear_app_linneighborhood.svg.png" decoding="async" width="19" height="19" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/f/f9/Crystal_Clear_app_linneighborhood.svg/29px-Crystal_Clear_app_linneighborhood.svg.png 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/f/f9/Crystal_Clear_app_linneighborhood.svg/38px-Crystal_Clear_app_linneighborhood.svg.png 2x" data-file-width="407" data-file-height="407" /></a></span> </span><a href="/wiki/Portal:Internet" title="Portal:Internet">Internet</a></li></ul></div> <!-- NewPP limit report Parsed by mw‐web.codfw.main‐f69cdc8f6‐mhg5j Cached time: 20241122144722 Cache expiry: 2592000 Reduced expiry: false Complications: [vary‐revision‐sha1, show‐toc] CPU time usage: 0.998 seconds Real time usage: 1.258 seconds Preprocessor visited node count: 4462/1000000 Post‐expand include size: 156908/2097152 bytes Template argument size: 3982/2097152 bytes Highest expansion depth: 18/100 Expensive parser function count: 17/500 Unstrip recursion depth: 1/20 Unstrip post‐expand size: 206492/5000000 bytes Lua time usage: 0.574/10.000 seconds Lua memory usage: 7221982/52428800 bytes Number of Wikibase entities loaded: 1/400 --> <!-- Transclusion expansion time report (%,ms,calls,template) 100.00% 1026.666 1 -total 46.64% 478.797 1 Template:Reflist 19.29% 197.995 3 Template:Sidebar_with_collapsible_lists 19.11% 196.241 20 Template:Cite_web 12.93% 132.762 1 Template:Internet 9.22% 94.667 1 Template:Short_description 7.77% 79.800 12 Template:Cite_news 6.33% 64.974 1 Template:NSA_surveillance 5.89% 60.461 2 Template:Pagetype 4.75% 48.730 1 Template:Dead_link --> <!-- Saved in parser cache with key enwiki:pcache:idhash:91256-0!canonical and timestamp 20241122144722 and revision id 1253177936. Rendering was triggered because: page-view --> </div><!--esi <esi:include src="/esitest-fa8a495983347898/content" /> --><noscript><img src="https://login.wikimedia.org/wiki/Special:CentralAutoLogin/start?type=1x1" alt="" width="1" height="1" style="border: none; position: absolute;"></noscript> <div class="printfooter" data-nosnippet="">Retrieved from "<a dir="ltr" href="https://en.wikipedia.org/w/index.php?title=Computer_and_network_surveillance&amp;oldid=1253177936">https://en.wikipedia.org/w/index.php?title=Computer_and_network_surveillance&amp;oldid=1253177936</a>"</div></div> <div id="catlinks" class="catlinks" data-mw="interface"><div id="mw-normal-catlinks" class="mw-normal-catlinks"><a href="/wiki/Help:Category" title="Help:Category">Categories</a>: <ul><li><a href="/wiki/Category:Computer_forensics" title="Category:Computer forensics">Computer forensics</a></li><li><a href="/wiki/Category:Computer_surveillance" title="Category:Computer surveillance">Computer surveillance</a></li><li><a href="/wiki/Category:Surveillance" title="Category:Surveillance">Surveillance</a></li><li><a href="/wiki/Category:Espionage_techniques" title="Category:Espionage techniques">Espionage techniques</a></li></ul></div><div id="mw-hidden-catlinks" class="mw-hidden-catlinks mw-hidden-cats-hidden">Hidden categories: <ul><li><a href="/wiki/Category:Webarchive_template_wayback_links" title="Category:Webarchive template wayback links">Webarchive template wayback links</a></li><li><a href="/wiki/Category:Pages_containing_links_to_subscription-only_content" title="Category:Pages containing links to subscription-only content">Pages containing links to subscription-only content</a></li><li><a href="/wiki/Category:CS1_maint:_multiple_names:_authors_list" title="Category:CS1 maint: multiple names: authors list">CS1 maint: multiple names: authors list</a></li><li><a href="/wiki/Category:All_articles_with_dead_external_links" title="Category:All articles with dead external links">All articles with dead external links</a></li><li><a href="/wiki/Category:Articles_with_dead_external_links_from_July_2019" title="Category:Articles with dead external links from July 2019">Articles with dead external links from July 2019</a></li><li><a href="/wiki/Category:Articles_with_permanently_dead_external_links" title="Category:Articles with permanently dead external links">Articles with permanently dead external links</a></li><li><a href="/wiki/Category:Articles_with_short_description" title="Category:Articles with short description">Articles with short description</a></li><li><a href="/wiki/Category:Short_description_is_different_from_Wikidata" title="Category:Short description is different from Wikidata">Short description is different from Wikidata</a></li><li><a href="/wiki/Category:Articles_containing_potentially_dated_statements_from_2007" title="Category:Articles containing potentially dated statements from 2007">Articles containing potentially dated statements from 2007</a></li><li><a href="/wiki/Category:All_articles_containing_potentially_dated_statements" title="Category:All articles containing potentially dated statements">All articles containing potentially dated statements</a></li></ul></div></div> </div> </main> </div> <div class="mw-footer-container"> <footer id="footer" class="mw-footer" > <ul id="footer-info"> <li id="footer-info-lastmod"> This page was last edited on 24 October 2024, at 18:27<span class="anonymous-show">&#160;(UTC)</span>.</li> <li id="footer-info-copyright">Text is available under the <a href="/wiki/Wikipedia:Text_of_the_Creative_Commons_Attribution-ShareAlike_4.0_International_License" title="Wikipedia:Text of the Creative Commons Attribution-ShareAlike 4.0 International License">Creative Commons Attribution-ShareAlike 4.0 License</a>; additional terms may apply. By using this site, you agree to the <a href="https://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Terms_of_Use" class="extiw" title="foundation:Special:MyLanguage/Policy:Terms of Use">Terms of Use</a> and <a href="https://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Privacy_policy" class="extiw" title="foundation:Special:MyLanguage/Policy:Privacy policy">Privacy Policy</a>. Wikipedia® is a registered trademark of the <a rel="nofollow" class="external text" href="https://wikimediafoundation.org/">Wikimedia Foundation, Inc.</a>, a non-profit organization.</li> </ul> <ul id="footer-places"> <li id="footer-places-privacy"><a href="https://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Privacy_policy">Privacy policy</a></li> <li id="footer-places-about"><a href="/wiki/Wikipedia:About">About Wikipedia</a></li> <li id="footer-places-disclaimers"><a href="/wiki/Wikipedia:General_disclaimer">Disclaimers</a></li> <li id="footer-places-contact"><a href="//en.wikipedia.org/wiki/Wikipedia:Contact_us">Contact Wikipedia</a></li> <li id="footer-places-wm-codeofconduct"><a href="https://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Universal_Code_of_Conduct">Code of Conduct</a></li> <li id="footer-places-developers"><a href="https://developer.wikimedia.org">Developers</a></li> <li id="footer-places-statslink"><a href="https://stats.wikimedia.org/#/en.wikipedia.org">Statistics</a></li> <li id="footer-places-cookiestatement"><a href="https://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Cookie_statement">Cookie statement</a></li> <li id="footer-places-mobileview"><a href="//en.m.wikipedia.org/w/index.php?title=Computer_and_network_surveillance&amp;mobileaction=toggle_view_mobile" class="noprint stopMobileRedirectToggle">Mobile view</a></li> </ul> <ul id="footer-icons" class="noprint"> <li id="footer-copyrightico"><a href="https://wikimediafoundation.org/" class="cdx-button cdx-button--fake-button cdx-button--size-large cdx-button--fake-button--enabled"><img src="/static/images/footer/wikimedia-button.svg" width="84" height="29" alt="Wikimedia Foundation" loading="lazy"></a></li> <li id="footer-poweredbyico"><a href="https://www.mediawiki.org/" class="cdx-button cdx-button--fake-button cdx-button--size-large cdx-button--fake-button--enabled"><img src="/w/resources/assets/poweredby_mediawiki.svg" alt="Powered by MediaWiki" width="88" height="31" loading="lazy"></a></li> </ul> </footer> </div> </div> </div> <div class="vector-settings" id="p-dock-bottom"> <ul></ul> </div><script>(RLQ=window.RLQ||[]).push(function(){mw.config.set({"wgHostname":"mw-web.codfw.main-f69cdc8f6-vnstb","wgBackendResponseTime":155,"wgPageParseReport":{"limitreport":{"cputime":"0.998","walltime":"1.258","ppvisitednodes":{"value":4462,"limit":1000000},"postexpandincludesize":{"value":156908,"limit":2097152},"templateargumentsize":{"value":3982,"limit":2097152},"expansiondepth":{"value":18,"limit":100},"expensivefunctioncount":{"value":17,"limit":500},"unstrip-depth":{"value":1,"limit":20},"unstrip-size":{"value":206492,"limit":5000000},"entityaccesscount":{"value":1,"limit":400},"timingprofile":["100.00% 1026.666 1 -total"," 46.64% 478.797 1 Template:Reflist"," 19.29% 197.995 3 Template:Sidebar_with_collapsible_lists"," 19.11% 196.241 20 Template:Cite_web"," 12.93% 132.762 1 Template:Internet"," 9.22% 94.667 1 Template:Short_description"," 7.77% 79.800 12 Template:Cite_news"," 6.33% 64.974 1 Template:NSA_surveillance"," 5.89% 60.461 2 Template:Pagetype"," 4.75% 48.730 1 Template:Dead_link"]},"scribunto":{"limitreport-timeusage":{"value":"0.574","limit":"10.000"},"limitreport-memusage":{"value":7221982,"limit":52428800},"limitreport-logs":"table#1 {\n [\"size\"] = \"tiny\",\n}\n"},"cachereport":{"origin":"mw-web.codfw.main-f69cdc8f6-mhg5j","timestamp":"20241122144722","ttl":2592000,"transientcontent":false}}});});</script> <script type="application/ld+json">{"@context":"https:\/\/schema.org","@type":"Article","name":"Computer and network surveillance","url":"https:\/\/en.wikipedia.org\/wiki\/Computer_and_network_surveillance","sameAs":"http:\/\/www.wikidata.org\/entity\/Q651476","mainEntity":"http:\/\/www.wikidata.org\/entity\/Q651476","author":{"@type":"Organization","name":"Contributors to Wikimedia projects"},"publisher":{"@type":"Organization","name":"Wikimedia Foundation, Inc.","logo":{"@type":"ImageObject","url":"https:\/\/www.wikimedia.org\/static\/images\/wmf-hor-googpub.png"}},"datePublished":"2002-09-25T13:43:55Z","dateModified":"2024-10-24T18:27:34Z","headline":"act of performing surveillance of computer or network activity, in order to maintain internal and social control, recognize and monitor threats"}</script> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10