Jump to content
Main menu
Main menu
move to sidebar
hide
Navigation
Main page
Recent changes
Random page
Help about MediaWiki
Special pages
Niidae Wiki
Search
Search
Appearance
Create account
Log in
Personal tools
Create account
Log in
Pages for logged out editors
learn more
Contributions
Talk
Editing
Surveillance
(section)
Page
Discussion
English
Read
Edit
View history
Tools
Tools
move to sidebar
hide
Actions
Read
Edit
View history
General
What links here
Related changes
Page information
Appearance
move to sidebar
hide
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
===Computer=== [[File:IAO-logo.png|thumb|right|200px| Official seal of the [[Information Awareness Office]] β a U.S. agency which developed technologies for [[mass surveillance]]]] {{Main |Computer surveillance}} {{See also|Profiling (information science)}} The vast majority of computer surveillance involves the monitoring of [[data mining|data]] and [[traffic analysis|traffic]] on the [[Internet]].<ref name="sciam-internet">{{cite news|url=http://www.sciam.com/article.cfm?id=internet-eavesdropping|title=Internet Eavesdropping: A Brave New World of Wiretapping |last=Diffie|first=Whitfield|author2=Susan Landau |date=August 2008|work=Scientific American|access-date=March 13, 2009}}</ref> In the United States for example, under the [[Communications Assistance For Law Enforcement Act]], all phone calls and broadband Internet traffic (emails, web traffic, instant messaging, etc.) are required to be available for unimpeded real-time monitoring by federal law enforcement agencies.<ref name="eff-calea-archive">{{cite web|url=http://w2.eff.org/Privacy/Surveillance/CALEA/?f=archive.html|title=CALEA Archive β Electronic Frontier Foundation|work=Electronic Frontier Foundation (website)|access-date=March 14, 2009|url-status=dead|archive-url=https://web.archive.org/web/20090503035053/http://w2.eff.org/Privacy/Surveillance/CALEA/?f=archive.html|archive-date=May 3, 2009|df=mdy-all}}</ref><ref name="eff-calea-summary">{{cite web|url=https://www.eff.org/issues/calea|title=CALEA: The Perils of Wiretapping the Internet|work=Electronic Frontier Foundation (website)|access-date=March 14, 2009}}</ref><ref name="eff-calea-faq">{{cite web|url=https://www.eff.org/pages/calea-faq|title=CALEA: Frequently Asked Questions|work=Electronic Frontier Foundation (website)|access-date=March 14, 2009|date=2007-09-20}}</ref> There is far too much data on the Internet for human investigators to manually search through all of it. Therefore, automated Internet surveillance computers sift through the vast amount of intercepted Internet traffic to identify and report to human investigators the traffic that is considered interesting or suspicious. This process is regulated by targeting certain "trigger" words or phrases, visiting certain types of web sites, or communicating via [[email]] or online chat with suspicious individuals or groups.<ref name="usatoday-chatroom">{{cite news|url=https://www.usatoday.com/tech/news/surveillance/2004-10-11-chatroom-surv_x.htm|title=Government funds chat room surveillance research|last=Hill|first=Michael|date=October 11, 2004|agency=Associated Press|newspaper=USA Today|access-date=March 19, 2009}}</ref> Billions of dollars per year are spent by agencies, such as the [[NSA]], the [[FBI]] and the now-defunct [[Information Awareness Office]], to develop, purchase, implement, and operate systems such as [[Carnivore (FBI)|Carnivore]], [[Narus (company)|NarusInsight]], and [[ECHELON]] to intercept and analyze all of this data to extract only the information which is useful to law enforcement and intelligence agencies.<ref name="zdnet-fbi">{{cite news|url=https://www.zdnet.com/home-and-office/networking/fbi-turns-to-broad-new-wiretap-method/ |title=FBI turns to broad new wiretap method|last=McCullagh|first=Declan|date=January 30, 2007|work=ZDNet News|access-date=September 26, 2014}}</ref> Computers can be a surveillance target because of the personal data stored on them. If someone is able to install software, such as the FBI's [[Magic Lantern (spyware)|Magic Lantern]] and [[CIPAV]], on a computer system, they can easily gain unauthorized access to this data. Such software could be installed physically or remotely.<ref name="teen-busted-in-wired">{{cite magazine |url = https://www.wired.com/politics/law/news/2007/07/fbi_spyware |title = FBI's Secret Spyware Tracks Down Teen Who Made Bomb Threats |date = July 18, 2007 |magazine = Wired Magazine }}</ref> Another form of computer surveillance, known as [[van Eck phreaking]], involves reading electromagnetic emanations from computing devices in order to extract data from them at distances of hundreds of meters.<ref name="emr">{{cite journal | author=Van Eck, Wim | title=Electromagnetic Radiation from Video Display Units: An Eavesdropping Risk? | journal=Computers & Security | volume=4 | year=1985 | pages=269β286 | url=http://jya.com/emr.pdf |archive-url=https://ghostarchive.org/archive/20221009/http://jya.com/emr.pdf |archive-date=2022-10-09 |url-status=live | doi=10.1016/0167-4048(85)90046-X | issue=4 | citeseerx=10.1.1.35.1695 }}</ref><ref name=Kuhn2004>{{cite journal | author = Kuhn, M.G. | year = 2004 | title = Electromagnetic Eavesdropping Risks of Flat-Panel Displays | journal = 4th Workshop on Privacy Enhancing Technologies | pages = 23β25 | url = http://www.cl.cam.ac.uk/~mgk25/pet2004-fpd.pdf }}</ref> The NSA runs a database known as "[[Pinwale]]", which stores and indexes large numbers of emails of both American citizens and foreigners.<ref name="nytimes-email-surveillance">{{cite news|url=https://www.nytimes.com/2009/06/17/us/17nsa.html?_r=1&pagewanted=2&hp|title=E-Mail Surveillance Renews Concerns in Congress |date=June 16, 2009 |work=[[The New York Times]]|pages=A1|access-date=June 30, 2009 | first1=James | last1=Risen | first2=Eric | last2=Lichtblau}}</ref><ref name="atlantic-pinwale">{{cite news|url=https://www.theatlantic.com/politics/archive/2009/06/pinwale-and-the-new-nsa-revelations/19532/ |title=Pinwale And The New NSA Revelations|last=Ambinder|first=Marc|date=June 16, 2009|work=The Atlantic|access-date=June 30, 2009}}</ref> Additionally, the NSA runs a program known as [[PRISM (surveillance program)|PRISM]], which is a data mining system that gives the United States government direct access to information from [[technology companies]]. Through accessing this information, the government is able to obtain search history, emails, stored information, live chats, file transfers, and more. This program generated huge controversies in regards to surveillance and privacy, especially from U.S. citizens.<ref>{{Cite news|url=http://www.fbcoverup.com/docs/articles/2013-06-06-NSA-Prism-program-taps-in-to-user-data-of-Apple-Google-and-others-The-Guardian-Jun-06-2013.pdf |archive-url=https://ghostarchive.org/archive/20221009/http://www.fbcoverup.com/docs/articles/2013-06-06-NSA-Prism-program-taps-in-to-user-data-of-Apple-Google-and-others-The-Guardian-Jun-06-2013.pdf |archive-date=2022-10-09 |url-status=live|title=NSA Prism program taps in to user data of Apple, Google and others|last1=Greenwald|last2=Ewen|first1=Glen|first2=MacAskill|date=June 6, 2013|work=The Guardian|access-date=February 1, 2017}}</ref><ref>{{Cite news|url=https://www.theverge.com/2013/7/17/4517480/nsa-spying-prism-surveillance-cheat-sheet|title=Everything you need to know about PRISM|last1=Sottek|first1=T.C.|last2=Kopfstein|first2=Janus|date=July 17, 2013|work=The Verge|access-date=February 13, 2017}}</ref>
Summary:
Please note that all contributions to Niidae Wiki may be edited, altered, or removed by other contributors. If you do not want your writing to be edited mercilessly, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource (see
Encyclopedia:Copyrights
for details).
Do not submit copyrighted work without permission!
Cancel
Editing help
(opens in new window)
Search
Search
Editing
Surveillance
(section)
Add topic