27 relations: Communication, Computer and network surveillance, Conversation, Eaves, ECHELON, Email, Espionage, Fiber tapping, Global surveillance disclosures (2013–present), Hampton Court Palace, Henry VIII of England, Katz v. United States, Keystroke logging, Magic (cryptography), Man-in-the-middle attack, Mass surveillance, NSA warrantless surveillance (2001–2007), Opportunistic encryption, People watching, Privacy, Secure communication, Surveillance, Telephone, Telephone tapping, Trojan horse (computing), Ultra, Voice over IP.
Communication (from Latin commūnicāre, meaning "to share") is the act of conveying intended meanings from one entity or group to another through the use of mutually understood signs and semiotic rules.
Computer and network surveillance is the monitoring of computer activity and data stored on a hard drive, or data being transferred over computer networks such as the Internet.
Conversation is interactive communication between two or more people.
The eaves are the edges of the roof which overhang the face of a wall and, normally, project beyond the side of a building.
ECHELON, originally a secret government code name, is a surveillance program (signals intelligence/SIGINT collection and analysis network) operated by the US with the aid of four other signatory nations to the UKUSA Security Agreement Given the 5 dialects that use the terms, UKUSA can be pronounced from "You-Q-SA" to "Oo-Coo-SA", AUSCANNZUKUS can be pronounced from "Oz-Can-Zuke-Us" to "Orse-Can-Zoo-Cuss".
Electronic mail (email or e-mail) is a method of exchanging messages ("mail") between people using electronic devices.
Espionage or spying, is the act of obtaining secret or confidential information without the permission of the holder of the information.
Fiber tapping uses a network tap method that extracts signal from an optical fiber without breaking the connection.
Ongoing news reports in the international media have revealed operational details about the United States National Security Agency (NSA) and its international partners' global surveillance of foreign nationals and U.S. citizens.
Hampton Court Palace is a royal palace in the borough of Richmond upon Thames, London, England, south west and upstream of central London on the River Thames.
Henry VIII (28 June 1491 – 28 January 1547) was King of England from 1509 until his death.
Katz v. United States,, was a landmark United States Supreme Court case discussing the nature of the "right to privacy" and the legal definition of a "search" of intangible property, such as electronic-based communications like telephone calls.
Keystroke logging, often referred to as keylogging or keyboard capturing, is the action of recording (logging) the keys struck on a keyboard, typically covertly, so that the person using the keyboard is unaware that their actions are being monitored.
Magic was an Allied cryptanalysis project during World War II.
In cryptography and computer security, a man-in-the-middle attack (MITM) is an attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other.
Mass surveillance is the intricate surveillance of an entire or a substantial fraction of a population in order to monitor that group of citizens.
NSA warrantless surveillance (also commonly referred to as "warrantless-wiretapping" or "-wiretaps") refers to the surveillance of persons within the United States, including United States citizens, during the collection of notionally foreign intelligence by the National Security Agency (NSA) as part of the Terrorist Surveillance Program.
Opportunistic encryption (OE) refers to any system that, when connecting to another system, attempts to encrypt the communications channel, otherwise falling back to unencrypted communications.
People watching or crowd watching is the act of observing people and their interactions, usually without their knowledge.
Privacy is the ability of an individual or group to seclude themselves, or information about themselves, and thereby express themselves selectively.
Secure communication is when two entities are communicating and do not want a third party to listen in.
Surveillance is the monitoring of behavior, activities, or other changing information for the purpose of influencing, managing, directing, or protecting people.
A telephone, or phone, is a telecommunications device that permits two or more users to conduct a conversation when they are too far apart to be heard directly.
Telephone tapping (also wire tapping or wiretapping in American English) is the monitoring of telephone and Internet conversations by a third party, often by covert means.
In computing, a Trojan horse, or Trojan, is any malicious computer program which misleads users of its true intent.
Ultra was the designation adopted by British military intelligence in June 1941 for wartime signals intelligence obtained by breaking high-level encrypted enemy radio and teleprinter communications at the Government Code and Cypher School (GC&CS) at Bletchley Park.
Voice over Internet Protocol (also voice over IP, VoIP or IP telephony) is a methodology and group of technologies for the delivery of voice communications and multimedia sessions over Internet Protocol (IP) networks, such as the Internet.