• Computer and network surveillance is the monitoring of computer activity and data stored locally on a computer or data being transferred over computer...
    46 KB (5,097 words) - 00:38, 25 July 2025
  • Thumbnail for Computer network
    A computer network is a collection of communicating computers and other devices, such as printers and smart phones. Today almost all computers are connected...
    101 KB (11,934 words) - 19:30, 26 July 2025
  • Thumbnail for Surveillance
    video surveillance to be manipulated in order to support a conviction to pursue a political agenda. Computer and network surveillance Mass surveillance Sousveillance...
    121 KB (13,162 words) - 11:39, 17 July 2025
  • Thumbnail for Computer worm
    computer worm is a standalone malware computer program that replicates itself in order to spread to other computers. It often uses a computer network...
    24 KB (2,746 words) - 12:35, 11 July 2025
  • social, economic and political progress in countries across the world. Computer and network surveillance – Monitoring of computer or network activity  This...
    24 KB (2,119 words) - 08:44, 22 July 2025
  • Thumbnail for Dataveillance
    dataveillance, and facilitative mechanisms. Unlike computer and network surveillance, which collects data from computer networks and hard drives, dataveillance...
    18 KB (2,405 words) - 12:40, 6 July 2024
  • Thumbnail for Mass surveillance
    Cellphone surveillance Closed-circuit television (CCTV) Computer and network surveillance COVID-19 surveillance Data privacy Data retention Discipline and Punish:...
    111 KB (12,359 words) - 04:07, 4 August 2025
  • Anti-Counterfeiting Trade Agreement (ACTA) Censorship in the United Kingdom Computer and network surveillance Copyright infringement Copyright law of the United Kingdom...
    34 KB (1,543 words) - 14:15, 30 July 2025
  • and their governments that use, misuse, and/or violate IT facilities to achieve national goals. Cyber-arms industry Computer and network surveillance...
    18 KB (1,725 words) - 16:02, 28 July 2025
  • for privacy, security, and freedom in a world of relentless surveillance is a 2014 book about Computer and network surveillance by Julia Angwin. Angwin...
    2 KB (150 words) - 08:40, 18 March 2025
  • outbound network traffic at the device or local-area-network level A computer and network surveillance device or software, of a variety of types An Internet...
    952 bytes (171 words) - 06:51, 21 March 2021
  • Thumbnail for Tempest (codename)
    TEMPEST-shielded). Air gap (networking) - air gaps can be breached by TEMPEST-like techniques Computer and network surveillance Computer security MIL-STD-461...
    35 KB (4,249 words) - 21:30, 2 August 2025
  • Educational Rights and Privacy Act (FERPA) – federal privacy law often cited in educational AUPs Computer and network surveillance – institutional enforcement...
    14 KB (1,264 words) - 00:27, 16 July 2025
  • Thumbnail for United States Space Surveillance Network
    The United States Space Surveillance Network (SSN) detects, tracks, catalogs and identifies artificial objects orbiting Earth, e.g. active/inactive satellites...
    33 KB (4,075 words) - 18:27, 22 June 2025
  • labor Emotional labor Microwork Post-Fordism Post-Marxism Computer and network surveillance Hyperreality Wages for housework Lazzarato, Maurizio (1996)...
    9 KB (1,003 words) - 09:54, 28 May 2025
  • Internet Freedom Consortium Bypassing content-control filters Computer and network surveillance Library resources about Internet censorship in Switzerland...
    7 KB (830 words) - 00:04, 25 May 2025
  • Thumbnail for List of government mass surveillance projects
    government surveillance projects and related databases throughout the world. ECHELON: A signals intelligence (SIGINT) collection and analysis network operated...
    34 KB (3,264 words) - 07:33, 16 July 2025
  • reports on computer equipment. Monitoring and surveillance agents are often used to monitor complex computer networks to predict when a crash or some other...
    1 KB (152 words) - 13:59, 24 July 2023
  • Thumbnail for Closed-circuit television
    Closed-circuit television (CCTV), also known as video surveillance, is the use of closed-circuit television cameras to transmit a signal to a specific...
    97 KB (9,773 words) - 09:22, 29 June 2025
  • Thumbnail for Tails (operating system)
    Tails (operating system) (category Tor (anonymity network))
    at preserving privacy and anonymity against surveillance. It connects to the Internet exclusively through the anonymity network Tor. The system is designed...
    20 KB (1,664 words) - 01:25, 16 July 2025
  • Thumbnail for Network video recorder
    through a network, typically as part of an IP video surveillance system. NVRs typically have embedded operating systems. As a more flexible and serviceable...
    2 KB (222 words) - 03:34, 22 May 2024
  • Thumbnail for Utah Data Center
    Utah Data Center (category Mass surveillance)
    security computer and network surveillance program operated by the NSA, as enabling in-depth surveillance on live Internet communications and stored information...
    16 KB (1,568 words) - 02:12, 2 August 2025
  • layers, leading towards both power and EM side-channel attack immunity. Brute-force attack Computer and network surveillance Covert channel Side effect Wire...
    32 KB (3,647 words) - 21:01, 25 July 2025
  • Intelligence Act (France) (category Mass surveillance)
    on computer crimes into computer systems located abroad (article 323-8 of the Criminal Code). The Act also provides chapter on the "surveillance of international...
    13 KB (1,579 words) - 10:35, 16 April 2024
  • Index of cryptography articles (category Cryptography lists and comparisons)
    assumption • Computational hardness assumption • Computer insecurity • Computer and network surveillance • COMSEC equipment • Conch (SSH) • Concrete security...
    66 KB (2,911 words) - 02:58, 27 July 2025
  • content-control software and providers (incl. parental control software) Computer and network surveillance David Burt, a former librarian and advocate for content-control...
    42 KB (5,050 words) - 14:39, 26 July 2025
  • from a failed hard disk is problematic and expensive. Backups are essential Computer and network surveillance – Man in the Middle Loss of anonymity –...
    49 KB (5,233 words) - 08:16, 15 June 2025
  • Computer surveillance in the workplace is the use of computers to monitor activity in a workplace. Computer monitoring is a method of collecting performance...
    9 KB (968 words) - 05:21, 25 May 2025
  • TRENDnet (category Networking companies of the United States)
    manufacturer of computer networking products headquartered in Torrance, California, in the United States. It sells networking and surveillance products especially...
    3 KB (171 words) - 10:16, 30 January 2025
  • between "surveillance assets", "surveillance capital", and "surveillance capitalism" and their dependence on a global architecture of computer mediation...
    34 KB (3,354 words) - 19:01, 31 July 2025