Computer and network surveillance is the monitoring of computer activity and data stored locally on a computer or data being transferred over computer...
46 KB (5,097 words) - 00:38, 25 July 2025
A computer network is a collection of communicating computers and other devices, such as printers and smart phones. Today almost all computers are connected...
101 KB (11,934 words) - 19:30, 26 July 2025
video surveillance to be manipulated in order to support a conviction to pursue a political agenda. Computer and network surveillance Mass surveillance Sousveillance...
121 KB (13,162 words) - 11:39, 17 July 2025
computer worm is a standalone malware computer program that replicates itself in order to spread to other computers. It often uses a computer network...
24 KB (2,746 words) - 12:35, 11 July 2025
social, economic and political progress in countries across the world. Computer and network surveillance – Monitoring of computer or network activity This...
24 KB (2,119 words) - 08:44, 22 July 2025
Dataveillance (redirect from Data Surveillance (Dataveillance))
dataveillance, and facilitative mechanisms. Unlike computer and network surveillance, which collects data from computer networks and hard drives, dataveillance...
18 KB (2,405 words) - 12:40, 6 July 2024
Cellphone surveillance Closed-circuit television (CCTV) Computer and network surveillance COVID-19 surveillance Data privacy Data retention Discipline and Punish:...
111 KB (12,359 words) - 04:07, 4 August 2025
List of websites blocked in the United Kingdom (section Court ordered implementations targeting copyright and trademark infringement)
Anti-Counterfeiting Trade Agreement (ACTA) Censorship in the United Kingdom Computer and network surveillance Copyright infringement Copyright law of the United Kingdom...
34 KB (1,543 words) - 14:15, 30 July 2025
and their governments that use, misuse, and/or violate IT facilities to achieve national goals. Cyber-arms industry Computer and network surveillance...
18 KB (1,725 words) - 16:02, 28 July 2025
Dragnet Nation (redirect from Dragnet Nation: A Quest for Privacy, Security, and Freedom in a World of Relentless Surveillance)
for privacy, security, and freedom in a world of relentless surveillance is a 2014 book about Computer and network surveillance by Julia Angwin. Angwin...
2 KB (150 words) - 08:40, 18 March 2025
outbound network traffic at the device or local-area-network level A computer and network surveillance device or software, of a variety of types An Internet...
952 bytes (171 words) - 06:51, 21 March 2021
Tempest (codename) (redirect from Tempest (surveillance))
TEMPEST-shielded). Air gap (networking) - air gaps can be breached by TEMPEST-like techniques Computer and network surveillance Computer security MIL-STD-461...
35 KB (4,249 words) - 21:30, 2 August 2025
Educational Rights and Privacy Act (FERPA) – federal privacy law often cited in educational AUPs Computer and network surveillance – institutional enforcement...
14 KB (1,264 words) - 00:27, 16 July 2025
The United States Space Surveillance Network (SSN) detects, tracks, catalogs and identifies artificial objects orbiting Earth, e.g. active/inactive satellites...
33 KB (4,075 words) - 18:27, 22 June 2025
labor Emotional labor Microwork Post-Fordism Post-Marxism Computer and network surveillance Hyperreality Wages for housework Lazzarato, Maurizio (1996)...
9 KB (1,003 words) - 09:54, 28 May 2025
Internet Freedom Consortium Bypassing content-control filters Computer and network surveillance Library resources about Internet censorship in Switzerland...
7 KB (830 words) - 00:04, 25 May 2025
government surveillance projects and related databases throughout the world. ECHELON: A signals intelligence (SIGINT) collection and analysis network operated...
34 KB (3,264 words) - 07:33, 16 July 2025
reports on computer equipment. Monitoring and surveillance agents are often used to monitor complex computer networks to predict when a crash or some other...
1 KB (152 words) - 13:59, 24 July 2023
Closed-circuit television (CCTV), also known as video surveillance, is the use of closed-circuit television cameras to transmit a signal to a specific...
97 KB (9,773 words) - 09:22, 29 June 2025
Tails (operating system) (category Tor (anonymity network))
at preserving privacy and anonymity against surveillance. It connects to the Internet exclusively through the anonymity network Tor. The system is designed...
20 KB (1,664 words) - 01:25, 16 July 2025
through a network, typically as part of an IP video surveillance system. NVRs typically have embedded operating systems. As a more flexible and serviceable...
2 KB (222 words) - 03:34, 22 May 2024
Utah Data Center (category Mass surveillance)
security computer and network surveillance program operated by the NSA, as enabling in-depth surveillance on live Internet communications and stored information...
16 KB (1,568 words) - 02:12, 2 August 2025
layers, leading towards both power and EM side-channel attack immunity. Brute-force attack Computer and network surveillance Covert channel Side effect Wire...
32 KB (3,647 words) - 21:01, 25 July 2025
Intelligence Act (France) (category Mass surveillance)
on computer crimes into computer systems located abroad (article 323-8 of the Criminal Code). The Act also provides chapter on the "surveillance of international...
13 KB (1,579 words) - 10:35, 16 April 2024
Index of cryptography articles (category Cryptography lists and comparisons)
assumption • Computational hardness assumption • Computer insecurity • Computer and network surveillance • COMSEC equipment • Conch (SSH) • Concrete security...
66 KB (2,911 words) - 02:58, 27 July 2025
Internet filter (section Network-based filtering)
content-control software and providers (incl. parental control software) Computer and network surveillance David Burt, a former librarian and advocate for content-control...
42 KB (5,050 words) - 14:39, 26 July 2025
from a failed hard disk is problematic and expensive. Backups are essential Computer and network surveillance – Man in the Middle Loss of anonymity –...
49 KB (5,233 words) - 08:16, 15 June 2025
Computer surveillance in the workplace is the use of computers to monitor activity in a workplace. Computer monitoring is a method of collecting performance...
9 KB (968 words) - 05:21, 25 May 2025
TRENDnet (category Networking companies of the United States)
manufacturer of computer networking products headquartered in Torrance, California, in the United States. It sells networking and surveillance products especially...
3 KB (171 words) - 10:16, 30 January 2025
between "surveillance assets", "surveillance capital", and "surveillance capitalism" and their dependence on a global architecture of computer mediation...
34 KB (3,354 words) - 19:01, 31 July 2025