• Computer and network surveillance is the monitoring of computer activity and data stored locally on a computer or data being transferred over computer...
    46 KB (5,098 words) - 17:25, 28 May 2025
  • Thumbnail for Computer network
    A computer network is a collection of communicating computers and other devices, such as printers and smart phones. In order to communicate, the computers...
    97 KB (11,568 words) - 01:40, 15 June 2025
  • Thumbnail for Computer worm
    computer worm is a standalone malware computer program that replicates itself in order to spread to other computers. It often uses a computer network...
    24 KB (2,746 words) - 17:13, 16 June 2025
  • Thumbnail for Surveillance
    video surveillance to be manipulated in order to support a conviction to pursue a political agenda. Computer and network surveillance Mass surveillance Sousveillance...
    121 KB (13,160 words) - 15:15, 24 May 2025
  • Thumbnail for Dataveillance
    dataveillance, and facilitative mechanisms. Unlike computer and network surveillance, which collects data from computer networks and hard drives, dataveillance...
    18 KB (2,405 words) - 12:40, 6 July 2024
  • social, economic and political progress in countries across the world. Computer and network surveillance – Monitoring of computer or network activity  This...
    24 KB (2,086 words) - 23:43, 24 May 2025
  • Thumbnail for Mass surveillance
    Cellphone surveillance Closed-circuit television (CCTV) Computer and network surveillance COVID-19 surveillance Data privacy Data retention Discipline and Punish:...
    111 KB (12,314 words) - 02:45, 11 June 2025
  • Thumbnail for United States Space Surveillance Network
    The United States Space Surveillance Network (SSN) detects, tracks, catalogs and identifies artificial objects orbiting Earth, e.g. active/inactive satellites...
    33 KB (4,075 words) - 11:51, 1 May 2025
  • manipulate, or move computer data, such as computers, data networks, and all devices connected to or included in said networks, such as routers and switches. All...
    18 KB (1,725 words) - 19:07, 26 March 2025
  • Thumbnail for Tempest (codename)
    TEMPEST-shielded). Air gap (networking) - air gaps can be breached by TEMPEST-like techniques Computer and network surveillance Computer security MIL-STD-461...
    35 KB (4,247 words) - 20:02, 24 May 2025
  • Computer surveillance in the workplace is the use of computers to monitor activity in a workplace. Computer monitoring is a method of collecting performance...
    9 KB (968 words) - 05:21, 25 May 2025
  • outbound network traffic at the device or local-area-network level A computer and network surveillance device or software, of a variety of types An Internet...
    952 bytes (171 words) - 06:51, 21 March 2021
  • reports on computer equipment. Monitoring and surveillance agents are often used to monitor complex computer networks to predict when a crash or some other...
    1 KB (152 words) - 13:59, 24 July 2023
  • Anti-Counterfeiting Trade Agreement (ACTA) Censorship in the United Kingdom Computer and network surveillance Copyright infringement Copyright in the United Kingdom Child...
    34 KB (1,540 words) - 21:53, 30 January 2025
  • labor Emotional labor Microwork Post-Fordism Post-Marxism Computer and network surveillance Hyperreality Wages for housework Lazzarato, Maurizio (1996)...
    9 KB (1,003 words) - 09:54, 28 May 2025
  • Educational Rights and Privacy Act (FERPA) – federal privacy law often cited in educational AUPs Computer and network surveillance – institutional enforcement...
    14 KB (1,263 words) - 15:45, 7 June 2025
  • Internet Freedom Consortium Bypassing content-control filters Computer and network surveillance Library resources about Internet censorship in Switzerland...
    7 KB (830 words) - 00:04, 25 May 2025
  • Thumbnail for Closed-circuit television
    Closed-circuit television (CCTV), also known as video surveillance, is the use of closed-circuit television cameras to transmit a signal to a specific...
    97 KB (9,773 words) - 17:19, 12 June 2025
  • layers, leading towards both power and EM side-channel attack immunity. Brute-force attack Computer and network surveillance Covert channel Side effect Wire...
    31 KB (3,588 words) - 14:14, 13 June 2025
  • Thumbnail for Network video recorder
    through a network, typically as part of an IP video surveillance system. NVRs typically have embedded operating systems. As a more flexible and serviceable...
    2 KB (222 words) - 03:34, 22 May 2024
  • Index of cryptography articles (category Cryptography lists and comparisons)
    assumption • Computational hardness assumption • Computer insecurity • Computer and network surveillance • COMSEC equipment • Conch (SSH) • Concrete security...
    67 KB (2,932 words) - 23:20, 16 May 2025
  • Health network surveillance is a practice of health information management involving a combination of security, privacy and regulatory compliance with...
    4 KB (500 words) - 15:04, 17 July 2024
  • Thumbnail for Utah Data Center
    Utah Data Center (category Mass surveillance)
    security computer and network surveillance program operated by the NSA, as enabling in-depth surveillance on live Internet communications and stored information...
    16 KB (1,568 words) - 01:21, 9 June 2025
  • great reporting and allows you to assign users with different roles.” Comparison of time-tracking software Computer and network surveillance "How Introverts...
    6 KB (505 words) - 15:08, 3 January 2023
  • between "surveillance assets", "surveillance capital", and "surveillance capitalism" and their dependence on a global architecture of computer mediation...
    33 KB (3,296 words) - 22:58, 11 April 2025
  • Thumbnail for List of government mass surveillance projects
    government surveillance projects and related databases throughout the world. ECHELON: A signals intelligence (SIGINT) collection and analysis network operated...
    34 KB (3,264 words) - 15:41, 14 February 2025
  • TRENDnet (category Networking companies of the United States)
    manufacturer of computer networking products headquartered in Torrance, California, in the United States. It sells networking and surveillance products especially...
    3 KB (171 words) - 10:16, 30 January 2025
  • TURBINE (US government project) (category Computer surveillance)
    management and control of a large surveillance network. The NSA has built an infrastructure which enables it to covertly hack into computers on a mass...
    8 KB (727 words) - 15:17, 28 March 2025
  • Thumbnail for Closed-circuit television camera
    image quality. Network cameras can be used for very cheap surveillance solutions (requiring one network camera, some Ethernet cabling, and one PC), or to...
    8 KB (1,055 words) - 02:33, 4 June 2025
  • content-control software and providers (incl. parental control software) Computer and network surveillance David Burt, a former librarian and advocate for content-control...
    42 KB (5,053 words) - 16:16, 8 May 2025