Movatterモバイル変換


[0]ホーム

URL:


Jump to content
WikipediaThe Free Encyclopedia
Search

Computer and network surveillance

From Wikipedia, the free encyclopedia
Monitoring of computer or network activity
This article is about monitoring of computer and network activity. For information on methods of preventing unauthorized access to computer data, seecomputer security.

Main articles:Surveillance,Mass surveillance, andGlobal surveillance
Part ofa series on
Forensic science

Computer and network surveillance is the monitoring of computer activity and data stored locally on a computer or data being transferred overcomputer networks such as theInternet. This monitoring is often carried out covertly and may be completed by governments, corporations, criminal organizations, or individuals. It may or may not be legal and may or may not require authorization from a court or other independent government agencies. Computer and network surveillance programs are widespread today, and almost allInternet traffic can be monitored.[1]

Surveillance allows governments and other agencies to maintainsocial control, recognize and monitor threats or any suspicious or abnormal activity,[2] and prevent and investigatecriminal activities. With the advent of programs such as theTotal Information Awareness program, technologies such ashigh-speed surveillance computers andbiometrics software, and laws such as theCommunications Assistance For Law Enforcement Act, governments now possess an unprecedented ability to monitor the activities of citizens.[3]

Manycivil rights andprivacy groups, such asReporters Without Borders, theElectronic Frontier Foundation, and theAmerican Civil Liberties Union, have expressed concern that increasing surveillance of citizens will result in amass surveillance society, with limited political and/or personal freedoms. Such fear has led to numerous lawsuits such asHepting v. AT&T.[3][4] Thehacktivist groupAnonymous has hacked into government websites in protest of what it considers "draconian surveillance".[5][6]

Network surveillance

[edit]
Internet
Visualization of Internet routing paths
AnOpte Project visualization ofrouting paths through a portion of the Internet
iconInternet portal
See also:Signals intelligence

The vast majority of computer surveillance involves the monitoring ofpersonal data andtraffic on theInternet.[7] For example, in the United States, theCommunications Assistance For Law Enforcement Act mandates that all phone calls andbroadbandinternet traffic (emails,web traffic,instant messaging, etc.) be available for unimpeded, real-time monitoring by Federal law enforcement agencies.[8][9][10]

Packet capture (also known as "packet sniffing") is the monitoring of data traffic on anetwork.[11] Data sent between computers over theInternet or between any networks takes the form of small chunks called packets, which are routed to their destination and assembled back into a complete message. Apacket capture appliance intercepts these packets, so that they may be examined and analyzed. Computer technology is needed to performtraffic analysis and sift through intercepted data to look for important/useful information. Under theCommunications Assistance For Law Enforcement Act, all U.S. telecommunications providers are required to install such packet capture technology so that Federal law enforcement and intelligence agencies are able to intercept all of their customers'broadband Internet andvoice over Internet protocol (VoIP) traffic. These technologies can be used both by the intelligence and for illegal activities.[12]

There is far too much data gathered by these packet sniffers for human investigators to manually search through. Thus, automated Internet surveillance computers sift through the vast amount of intercepted Internet traffic, filtering out, and reporting to investigators those bits of information which are "interesting", for example, the use of certain words or phrases, visiting certain types of web sites, or communicating via email or chat with a certain individual or group.[13] Billions of dollars per year are spent by agencies such as theInformation Awareness Office,NSA, and theFBI, for the development, purchase, implementation, and operation of systems which intercept and analyze this data, extracting only the information that is useful to law enforcement and intelligence agencies.[14]

Similar systems are now used byIranian Security dept. to more easily distinguish between peaceful citizens and terrorists. All of the technology has been allegedly installed by GermanSiemens and FinnishNokia.[15]

The Internet's rapid development has become a primary form of communication. More people are potentially subject to Internet surveillance. There are advantages and disadvantages tonetwork monitoring. For instance, systems described as "Web 2.0"[16] have greatly impacted modern society. Tim O’ Reilly, who first explained the concept of "Web 2.0",[16] stated that Web 2.0 provides communication platforms that are "user generated", with self-produced content, motivating more people to communicate with friends online.[17] However, Internet surveillance also has a disadvantage. One researcher fromUppsala University said "Web 2.0 surveillance is directed at large user groups who help to hegemonically produce and reproduce surveillance by providing user-generated (self-produced) content. We can characterize Web 2.0 surveillance as mass self-surveillance".[18] Surveillance companies monitor people while they are focused on work or entertainment. Yet, employers themselves alsomonitor their employees. They do so in order to protect the company's assets and to control public communications but most importantly, to make sure that their employees are actively working and being productive.[19] This can emotionally affect people; this is because it can cause emotions like jealousy. A research group states "...we set out to test the prediction that feelings of jealousy lead to 'creeping' on a partner through Facebook, and that women are particularly likely to engage in partner monitoring in response to jealousy".[20] The study shows that women can become jealous of other people when they are in an online group.

Virtual assistants have become socially integrated into many people's lives. Currently, virtual assistants such as Amazon's Alexa or Apple's Siri cannot call 911 or local services.[21] They are constantly listening for command and recording parts of conversations that will help improve algorithms. If the law enforcement is able to be called using a virtual assistant, the law enforcement would then be able to have access to all the information saved for the device.[21] The device is connected to the home's internet, because of this law enforcement would be the exact location of the individual calling for law enforcement.[21] While the virtual assistance devices are popular, many debates the lack of privacy. The devices are listening to every conversation the owner is having. Even if the owner is not talking to a virtual assistant, the device is still listening to the conversation in hopes that the owner will need assistance, as well as to gather data.[22]

Corporate surveillance

[edit]
See also:Computer surveillance in the workplace

Corporate surveillance of computer activity is very common. The data collected is most often used for marketing purposes or sold to other corporations, but is also regularly shared with government agencies. It can be used as a form ofbusiness intelligence, which enables the corporation to better tailor their products and/or services to be desirable by their customers. The data can also be sold to other corporations so that they can use it for the aforementioned purpose, or it can be used for direct marketing purposes, such astargeted advertisements, where ads are targeted to the user of the search engine by analyzing their search history and emails[23] (if they use free webmail services), which are kept in a database.[24]

Such type of surveillance is also used to establish business purposes of monitoring, which may include the following:

  • Preventing misuse of resources. Companies can discourage unproductive personal activities such as online shopping or web surfing on company time. Monitoringemployee performance is one way to reduce unnecessarynetwork traffic and reduce the consumption ofnetwork bandwidth.
  • Promoting adherence to policies. Online surveillance is one means of verifying employee observance of company networking policies.
  • Preventing lawsuits. Firms can be held liable for discrimination or employee harassment in the workplace. Organizations can also be involved in infringement suits through employees that distribute copyrighted material over corporate networks.
  • Safeguarding records. Federal legislation requires organizations to protect personal information. Monitoring can determine the extent of compliance with company policies and programs overseeing information security. Monitoring may also deter unlawful appropriation of personal information, and potential spam or viruses.
  • Safeguarding company assets. The protection ofintellectual property,trade secrets, and business strategies is a major concern. The ease of information transmission and storage makes it imperative to monitor employee actions as part of a broader policy.

The second component of prevention is determining the ownership of technology resources. The ownership of the firm's networks, servers, computers, files, and e-mail should be explicitly stated. There should be a distinction between an employee's personal electronic devices, which should be limited and proscribed, and those owned by the firm.

For instance,Google Search stores identifying information for each web search. AnIP address and the search phrase used are stored in a database for up to 18 months.[25] Google also scans the content of emails of users of its Gmail webmail service in order to create targeted advertising based on what people are talking about in their personal email correspondences.[26] Google is, by far, the largest Internet advertising agency—millions of sites place Google's advertising banners and links on their websites in order to earn money from visitors who click on the ads. Each page containing Google advertisements adds, reads, and modifies"cookies" on each visitor's computer.[27] These cookiestrack the user across all of these sites and gather information about their web surfing habits, keeping track of which sites they visit, and what they do when they are on these sites. This information, along with the informationfrom their email accounts, and search engine histories, is stored by Google to use to build aprofile of the user to deliver better-targeted advertising.[26]

The United States government often gains access to these databases, either by producing a warrant for it, or by simply asking. TheDepartment of Homeland Security has openly stated that it uses data collected from consumer credit and direct marketing agencies for augmenting the profiles of individuals that it is monitoring.[24]

Malicious software

[edit]
Further information:Spyware,Computer virus,Trojan (computer security),Keylogger, andBackdoor (computing)

In addition to monitoring information sent over a computer network, there is also a way to examine data stored on a computer'shard drive, and to monitor the activities of a person using the computer. A surveillance program installed on a computer can search the contents of the hard drive for suspicious data, can monitor computer use, collectpasswords, and/or report back activities in real-time to its operator through the Internet connection.[28] A keylogger is an example of this type of program. Normal keylogging programs store their data on the local hard drive, but some are programmed to automatically transmit data over the network to a remote computer or Web server.

There are multiple ways of installing such software. The most common is remote installation, using abackdoor created by acomputer virus ortrojan. This tactic has the advantage of potentially subjecting multiple computers to surveillance. Viruses often spread to thousands or millions of computers, and leave "backdoors" which are accessible over a network connection, and enable an intruder to remotely install software and execute commands. These viruses and trojans are sometimes developed by government agencies, such asCIPAV andMagic Lantern. More often, however, viruses created by other people orspyware installed by marketing agencies can be used to gain access through the security breaches that they create.[29]

Another method is"cracking" into the computer to gain access over a network. An attacker can then install surveillance software remotely.Servers and computers with permanentbroadband connections are most vulnerable to this type of attack.[30] Another source of security cracking is employees giving out information or users using brute force tactics to guess their password.[31]

One can also physically place surveillance software on a computer by gaining entry to the place where the computer is stored and install it from acompact disc,floppy disk, orthumbdrive. This method shares a disadvantage with hardware devices in that it requiresphysical access to the computer.[32] One well-known worm that uses this method of spreading itself isStuxnet.[33]

Social network analysis

[edit]

One common form of surveillance is tocreate maps of social networks based on data fromsocial networking sites as well as fromtraffic analysis information from phone call records such as those in theNSA call database,[34] and internet traffic data gathered underCALEA. Thesesocial network "maps" are thendata mined to extract useful information such as personal interests, friendships and affiliations, wants, beliefs, thoughts, and activities.[35][36][37]

Many U.S. government agencies such as theDefense Advanced Research Projects Agency (DARPA), theNational Security Agency (NSA), and theDepartment of Homeland Security (DHS) are currently investing heavily in research involving social network analysis.[38][39] The intelligence community believes that the biggest threat to the U.S. comes from decentralized, leaderless, geographically dispersed groups. These types of threats are most easily countered by finding important nodes in the network, and removing them. To do this requires a detailed map of the network.[37][40]

Jason Ethier of Northeastern University, in his study of modern social network analysis, said the following of the Scalable Social Network Analysis Program developed by theInformation Awareness Office:

The purpose of the SSNA algorithms program is to extend techniques of social network analysis to assist with distinguishing potential terrorist cells from legitimate groups of people ... In order to be successful SSNA will require information on the social interactions of the majority of people around the globe. Since the Defense Department cannot easily distinguish between peaceful citizens and terrorists, it will be necessary for them to gather data on innocent civilians as well as on potential terrorists.

— Jason Ethier[37]

Monitoring from a distance

[edit]

With only commercially available equipment, it has been shown that it is possible to monitor computers from a distance by detecting theradiation emitted by theCRT monitor. This form of computer surveillance, known asTEMPEST, involves reading electromagnetic emanations from computing devices in order to extract data from them at distances of hundreds of meters.[41][42][43]

IBM researchers have also found that, for most computer keyboards, each key emits a slightly different noise when pressed. The differences are individually identifiable under some conditions, and so it's possible to log key strokes without actually requiring logging software to run on the associated computer.[44][45]

In 2015, lawmakers in California passed a law prohibiting any investigative personnel in the state to force businesses to hand over digital communication without a warrant, calling this Electronic Communications Privacy Act.[46] At the same time in California, state senator Jerry Hill introduced a bill making law enforcement agencies to disclose more information on their usage and information from theStingray phone tracker device.[46] As the law took into effect in January 2016, it will now require cities to operate with new guidelines in relation to how and when law enforcement use this device.[46] Some legislators and those holding a public office have disagreed with this technology because of the warrantless tracking, but now if a city wants to use this device, it must be heard by a public hearing.[46] Some cities have pulled out of using the StingRay such as Santa Clara County.

And it has also been shown, byAdi Shamir et al., that even the high frequencynoise emitted by aCPU includes information about the instructions being executed.[47]

Policeware and govware

[edit]

In German-speaking countries, spyware used or made by the government is sometimes calledgovware.[48] Some countries like Switzerland and Germany have a legal framework governing the use of such software.[49][50] Known examples include the SwissMiniPanzer and MegaPanzer and the GermanR2D2 (trojan).

Policeware is a software designed to police citizens by monitoring the discussion and interaction of its citizens.[51] Within the U.S.,Carnivore was the first incarnation of secretly installed e-mail monitoring software installed in Internet service providers' networks to log computer communication, including transmitted e-mails.[52]Magic Lantern is another such application, this time running in a targeted computer in a trojan style and performing keystroke logging.CIPAV, deployed by the FBI, is a multi-purpose spyware/trojan.

TheClipper Chip, formerly known as MYK-78, is a small hardware chip that the government can install into phones, designed in the nineties. It was intended to secure private communication and data by reading voice messages that are encoded and decode them. The Clipper Chip was designed during the Clinton administration to, “...protect personal safety and national security against a developing information anarchy that fosters criminals, terrorists and foreign foes.”[53] The government portrayed it as the solution to the secret codes orcryptographic keys that the age of technology created. Thus, this has raised controversy in the public, because the Clipper Chip is thought to have been the next “Big Brother” tool. This led to the failure of the Clipper proposal, even though there have been many attempts to push the agenda.[54]

The "Consumer Broadband and Digital Television Promotion Act" (CBDTPA) was a bill proposed in the United States Congress. CBDTPA was known as the "Security Systems and Standards Certification Act" (SSSCA) while in draft form and was killed in committee in 2002. Had CBDTPA become law, it would have prohibited technology that could be used to read digital content under copyright (such as music, video, and e-books) withoutdigital rights management (DRM) that prevented access to this material without the permission of the copyright holder.[55]

Surveillance as an aid to censorship

[edit]
See also:Internet censorship andInternet censorship circumvention

Surveillance andcensorship are different. Surveillance can be performed without censorship, but it is harder to engage in censorship without some forms of surveillance.[56] And even when surveillance does not lead directly to censorship, the widespread knowledge or belief that a person, their computer, or their use of the Internet is under surveillance can lead toself-censorship.[57]

In March 2013Reporters Without Borders issued aSpecial report on Internet surveillance that examines the use of technology that monitors online activity and intercepts electronic communication in order to arrest journalists,citizen-journalists, and dissidents. The report includes a list of "State Enemies of the Internet",Bahrain,China,Iran,Syria, andVietnam, countries whose governments are involved in active, intrusive surveillance of news providers, resulting in grave violations of freedom of information and human rights. Computer and network surveillance is on the increase in these countries. The report also includes a second list of "Corporate Enemies of the Internet", includingAmesys (France),Blue Coat Systems (U.S.), Gamma (UK and Germany), Hacking Team (Italy), and Trovicor (Germany), companies that sell products that are liable to be used by governments to violate human rights and freedom of information. Neither list is exhaustive and they are likely to be expanded in the future.[58]

Protection of sources is no longer just a matter of journalistic ethics. Journalists should equip themselves with a "digital survival kit" if they are exchanging sensitive information online, storing it on a computer hard-drive or mobile phone.[58][59] Individuals associated with high-profile rights organizations, dissident groups, protest groups, or reform groups are urged to take extra precautions to protect their online identities.[60]

Countermeasures

[edit]

Countermeasures against surveillance vary based on the type of eavesdropping targeted. Electromagnetic eavesdropping, such as TEMPEST and its derivatives, often requires hardware shielding, such asFaraday cages, to block unintended emissions. To prevent interception of data in transit, encryption is a key defense. When properly implemented withend-to-end encryption, or while using tools such asTor, and provided the device remains uncompromised and free from direct monitoring via electromagnetic analysis, audio recording, or similar methodologies, the content of communication is generally considered secure.

For a number of years, numerous government initiatives have sought toweaken encryption or introduce backdoors for law enforcement access.[61] Privacy advocates and the broader technology industry strongly oppose these measures,[62] arguing that any backdoor would inevitably be discovered and exploited by malicious actors. Such vulnerabilities would endanger everyone's private data[63] while failing to hinder criminals, who could switch to alternative platforms or create their own encrypted systems.

Surveillance remains effective even when encryption is correctly employed, by exploiting metadata that is often accessible to packet sniffers unless countermeasures are applied.[64] This includesDNS queries,IP addresses, phone numbers,URLs, timestamps, and communication durations, which can reveal significant information about user activity and interactions or associations with aperson of interest.

See also

[edit]
Part ofa series on
Global surveillance
Disclosures
Systems
Selected agencies
Places
Laws
Proposed changes
Concepts
Related topics

National Security Agency surveillance
Map of global NSA data collection as of 2007[update], with countries subject to the most data collection shown in red

References

[edit]
  1. ^Broache, Anne."FBI wants widespread monitoring of 'illegal' Internet activity".CNET.Archived from the original on 25 March 2014. Retrieved25 March 2014.
  2. ^Jeske, Daniel R.; Stevens, Nathaniel T.; Tartakovsky, Alexander G.; Wilson, James D. (17 April 2018)."Statistical methods for network surveillance".Applied Stochastic Models in Business and Industry.34 (4):425–445.doi:10.1002/asmb.2326.ISSN 1524-1904.
  3. ^ab"Is the U.S. Turning Into a Surveillance Society?".American Civil Liberties Union. Archived fromthe original on 20 October 2009. Retrieved13 March 2009.
  4. ^Stanley, Jay; Steinhardt, Barry (15 January 2003).Bigger Monster, Weaker Chains: The Growth of an American Surveillance Society(PDF).American Civil Liberties Union (Report). Archived fromthe original(PDF) on 9 October 2022. Retrieved13 March 2009.
  5. ^Protalinski, Emil (7 April 2012)."Anonymous hacks UK government sites over 'draconian surveillance".ZDNet. Archived fromthe original on 10 April 2012. Retrieved12 March 2013.
  6. ^Ball, James (20 April 2012)."Hacktivists in the frontline battle for the internet".The Guardian. Archived fromthe original on 14 March 2018. Retrieved17 June 2012.
  7. ^Diffie, Whitfield; Susan Landau (August 2008)."Internet Eavesdropping: A Brave New World of Wiretapping".Scientific American.Archived from the original on 13 November 2008. Retrieved13 March 2009.
  8. ^"CALEA Archive -- Electronic Frontier Foundation".Electronic Frontier Foundation (website). Archived fromthe original on 3 May 2009. Retrieved14 March 2009.
  9. ^"CALEA: The Perils of Wiretapping the Internet".Electronic Frontier Foundation (website).Archived from the original on 16 March 2009. Retrieved14 March 2009.
  10. ^"CALEA: Frequently Asked Questions".Electronic Frontier Foundation (website). 20 September 2007.Archived from the original on 1 May 2009. Retrieved14 March 2009.
  11. ^Connolly, Kevin J. (2003).Law of Internet Security and Privacy.Aspen Publishers. p. 131.ISBN 978-0-7355-4273-0.
  12. ^American Council on Education vs. FCCArchived 2012-09-07 at theWayback Machine, Decision, United States Court of Appeals for the District of Columbia Circuit, 9 June 2006. Retrieved 8 September 2013.
  13. ^Hill, Michael (11 October 2004)."Government funds chat room surveillance research".USA Today. Associated Press.Archived from the original on 11 May 2010. Retrieved19 March 2009.
  14. ^McCullagh, Declan (30 January 2007)."FBI turns to broad new wiretap method".ZDNet News.Archived from the original on 31 March 2022. Retrieved13 March 2009.
  15. ^"First round in Internet war goes to Iranian intelligence".Debkafile. 28 June 2009.Archived from the original on 21 December 2013. Retrieved8 September 2013.
  16. ^abO'Reilly, T. (2005), "What is Web 2.0: Design Patterns and Business Models for the Next Generation of Software",O’Reilly Media, pp. 1–5
  17. ^Fuchs, C. (2011). "New Media, Web 2.0 and Surveillance".Sociology Compass.5 (2):134–147.doi:10.1111/j.1751-9020.2010.00354.x.
  18. ^Fuchs, C. (2011)."Web 2.0, Presumption, and Surveillance".Surveillance & Society.8 (3):289–309.doi:10.24908/ss.v8i3.4165.
  19. ^Denise, Anthony; Campos-Castillo, Celeste; Horne, Christine (2017)."Toward a Sociology of Privacy".Annual Review of Sociology.43:249–269.doi:10.1146/annurev-soc-060116-053643.
  20. ^Muise, A.; Christofides, E.; Demsmarais, S. (2014). "'Creeping' or just information seeking? Gender differences in partner monitoring in response to jealousy on Facebook".Personal Relationships.21 (1):35–50.doi:10.1111/pere.12014.
  21. ^abc"Should Smart Devices Be Able to Automatically Call the Cops?".How Stuff Works. 18 July 2017. Retrieved10 November 2017.[dead link]
  22. ^"Time Alexa Takes the Stand Listening Devices Raise Privacy Issues".Time. 4 May 2017.Archived from the original on 14 November 2017. Retrieved10 November 2017.
  23. ^Story, Louise (1 November 2007)."F.T.C. to Review Online Ads and Privacy".New York Times.Archived from the original on 24 April 2009. Retrieved17 March 2009.
  24. ^abButler, Don (31 January 2009)."Are we addicted to being watched?".The Ottawa Citizen. canada.com. Archived fromthe original on 22 July 2013. Retrieved26 May 2013.
  25. ^Soghoian, Chris (11 September 2008)."Debunking Google's log anonymization propaganda".CNET News. Archived fromthe original on 29 April 2011. Retrieved21 March 2009.
  26. ^abJoshi, Priyanki (21 March 2009)."Every move you make, Google will be watching you".Business Standard.Archived from the original on 24 March 2009. Retrieved21 March 2009.
  27. ^"Advertising and Privacy".Google (company page). 2009.Archived from the original on 17 March 2009. Retrieved21 March 2009.
  28. ^"Spyware Workshop: Monitoring Software on Your OC: Spywae, Adware, and Other Software"Archived 2010-12-26 at theWayback Machine, Staff Report, U.S. Federal Trade Commission, March 2005. Retrieved 7 September 2013.
  29. ^Aycock, John (2006).Computer Viruses and Malware. Advances in Information Security. Springer.ISBN 978-0-387-30236-2.Archived from the original on 10 April 2013. Retrieved28 August 2017.
  30. ^"Office workers give away passwords for a cheap pen"Archived 2012-10-28 at theWayback Machine, John Leyden,The Register, 8 April 2003. Retrieved 7 September 2013.
  31. ^"Passwords are passport to theft"Archived 2017-07-02 at theWayback Machine,The Register, 3 March 2004. Retrieved 7 September 2013.
  32. ^"Social Engineering Fundamentals, Part I: Hacker Tactics"Archived 2020-04-24 at theWayback Machine, Sarah Granger, 18 December 2001.
  33. ^"Stuxnet: How does the Stuxnet worm spread?". Antivirus.about.com. 3 March 2014. Archived fromthe original on 15 April 2014. Retrieved17 May 2014.
  34. ^Keefe, Patrick (12 March 2006)."Can Network Theory Thwart Terrorists?".New York Times.Archived from the original on 17 June 2013. Retrieved14 March 2009.
  35. ^Albrechtslund, Anders (3 March 2008)."Online Social Networking as Participatory Surveillance".First Monday.13 (3).doi:10.5210/fm.v13i3.2142.
  36. ^Fuchs, Christian (2009).Social Networking Sites and the Surveillance Society. A Critical Case Study of the Usage of studiVZ, Facebook, and MySpace by Students in Salzburg in the Context of Electronic Surveillance(PDF) (Report). ICT&S Center Research Report. Salzburg and Vienna: Forschungsgruppe Unified Theory of Information.ISBN 978-3-200-01428-2. Archived fromthe original(PDF) on 6 February 2009. Retrieved14 March 2009.
  37. ^abcEthier, Jason (27 May 2006)."Current Research in Social Network Theory"(PDF). Northeastern University College of Computer and Information Science.Archived(PDF) from the original on 9 October 2022. Retrieved15 March 2009.[permanent dead link]
  38. ^Marks, Paul (9 June 2006)."Pentagon sets its sights on social networking websites".New Scientist. Retrieved16 March 2009.
  39. ^Kawamoto, Dawn (9 June 2006)."Is the NSA reading your MySpace profile?".CNET News. Archived fromthe original on 20 July 2012. Retrieved16 March 2009.
  40. ^Ressler, Steve (July 2006)."Social Network Analysis as an Approach to Combat Terrorism: Past, Present, and Future Research".Homeland Security Affairs.2 (2).Archived from the original on 10 August 2014. Retrieved14 March 2009.
  41. ^McNamara, Joel (4 December 1999)."Complete, Unofficial Tempest Page". Archived fromthe original on 1 September 2013. Retrieved7 September 2013.
  42. ^Van Eck, Wim (1985)."Electromagnetic Radiation from Video Display Units: An Eavesdropping Risk?"(PDF).Computers & Security.4 (4):269–286.CiteSeerX 10.1.1.35.1695.doi:10.1016/0167-4048(85)90046-X.Archived(PDF) from the original on 5 April 2004.
  43. ^Kuhn, M.G. (26–28 May 2004)."Electromagnetic Eavesdropping Risks of Flat-Panel Displays"(PDF).4th Workshop on Privacy Enhancing Technologies. Toronto:23–25.Archived(PDF) from the original on 6 April 2008. Retrieved21 March 2009.
  44. ^Asonov, Dmitri; Agrawal, Rakesh (2004),Keyboard Acoustic Emanations(PDF), IBM Almaden Research Center, archived fromthe original(PDF) on 27 February 2012, retrieved8 September 2013
  45. ^Yang, Sarah (14 September 2005),"Researchers recover typed text using audio recording of keystrokes",UC Berkeley News,archived from the original on 24 December 2013, retrieved8 September 2013
  46. ^abcd"LA Times".Los Angeles Times. 27 August 2017. Retrieved10 November 2017.
  47. ^Adi Shamir & Eran Tromer."Acoustic cryptanalysis". Blavatnik School of Computer Science, Tel Aviv University. Archived fromthe original on 7 January 2012. Retrieved1 November 2011.
  48. ^"Swiss coder publicises government spy Trojan". News.techworld.com. Archived fromthe original on 29 April 2014. Retrieved25 March 2014.
  49. ^Basil Cupa,Trojan Horse Resurrected: On the Legality of the Use of Government Spyware (Govware)Archived 2014-02-01 at theWayback Machine, LISS 2013, pp. 419-428
  50. ^"FAQ – Häufig gestellte Fragen". Ejpd.admin.ch. 23 November 2011. Archived fromthe original on 6 May 2013. Retrieved17 May 2014.
  51. ^Jeremy Reimer (20 July 2007)."The tricky issue of spyware with a badge: meet 'policeware'".Ars Technica.Archived from the original on 6 November 2012. Retrieved14 June 2017.
  52. ^Hopper, D. Ian (4 May 2001)."FBI's Web Monitoring Exposed".ABC News.Archived from the original on 20 June 2020. Retrieved27 June 2020.
  53. ^Levy, Steven (12 June 1994)."New York Times".Archived from the original on 23 January 2019. Retrieved10 November 2017.
  54. ^"Stanford University Clipper Chip".Archived from the original on 3 March 2019. Retrieved10 November 2017.
  55. ^"Consumer Broadband and Digital Television Promotion Act"Archived 2012-02-14 at theWayback Machine, U.S. Senate bill S.2048, 107th Congress, 2nd session, 21 March 2002. Retrieved 8 September 2013.
  56. ^"Censorship is inseparable from surveillance", Cory Doctorow,The Guardian, 2 March 2012
  57. ^Bitso, Constance; Fourie, Ina; Bothma, Theo."Trends in transition from classical censorship to Internet censorship: selected country overviews"(PDF).IFLA.Archived(PDF) from the original on 20 November 2023.
  58. ^ab"Era of the digital mercenaries".The Enemies of the Internet Special Edition : Surveillance. Archived fromthe original on 31 August 2013.
  59. ^"When Secrets Aren't Safe With Journalists"Archived 2016-07-24 at theWayback Machine, Christopher Soghoian,New York Times, 26 October 2011
  60. ^Everyone's Guide to By-passing Internet CensorshipArchived 2011-09-15 at theWayback Machine, The Citizen Lab, University of Toronto, September 2007
  61. ^Nadeau, Josh (2 May 2024)."Understanding the backdoor debate in cybersecurity".Security Intelligence. Retrieved23 December 2024.
  62. ^"European Court of Human Rights confirms: weakening of encryption can violate the human right to privacy".European Digital Rights (EDRi).Archived from the original on 23 December 2024. Retrieved23 December 2024.
  63. ^"Bad Idea: Encryption Backdoors".CSIS International Security Program (ISP). 19 December 2019.Archived from the original on 23 December 2024. Retrieved23 December 2024.
  64. ^Schneier, Bruce (15 April 2014). "Metadata = Surveillance".IEEE Security & Privacy.12 (2): 84.Bibcode:2014ISPri..12b.-84S.doi:10.1109/MSP.2014.28.

External links

[edit]

Yan, W. (2019) Introduction to Intelligent Surveillance: Surveillance Data Capture, Transmission, and Analytics, Springer.

Malware topics
Infectious malware
Concealment
Malware for profit
By operating system
Protection
Countermeasures
Portal:
Retrieved from "https://en.wikipedia.org/w/index.php?title=Computer_and_network_surveillance&oldid=1321232270"
Categories:
Hidden categories:

[8]ページ先頭

©2009-2025 Movatter.jp