Get it on Google Play
New! Download Unionpedia on your Android™ device!
Faster access than browser!


Index Eavesdropping

Eavesdropping is secretly or stealthily listening to the private conversation or communications of others without their consent. [1]

27 relations: Communication, Computer and network surveillance, Conversation, Eaves, ECHELON, Email, Espionage, Fiber tapping, Global surveillance disclosures (2013–present), Hampton Court Palace, Henry VIII of England, Katz v. United States, Keystroke logging, Magic (cryptography), Man-in-the-middle attack, Mass surveillance, NSA warrantless surveillance (2001–2007), Opportunistic encryption, People watching, Privacy, Secure communication, Surveillance, Telephone, Telephone tapping, Trojan horse (computing), Ultra, Voice over IP.


Communication (from Latin commūnicāre, meaning "to share") is the act of conveying intended meanings from one entity or group to another through the use of mutually understood signs and semiotic rules.

New!!: Eavesdropping and Communication · See more »

Computer and network surveillance

Computer and network surveillance is the monitoring of computer activity and data stored on a hard drive, or data being transferred over computer networks such as the Internet.

New!!: Eavesdropping and Computer and network surveillance · See more »


Conversation is interactive communication between two or more people.

New!!: Eavesdropping and Conversation · See more »


The eaves are the edges of the roof which overhang the face of a wall and, normally, project beyond the side of a building.

New!!: Eavesdropping and Eaves · See more »


ECHELON, originally a secret government code name, is a surveillance program (signals intelligence/SIGINT collection and analysis network) operated by the US with the aid of four other signatory nations to the UKUSA Security Agreement Given the 5 dialects that use the terms, UKUSA can be pronounced from "You-Q-SA" to "Oo-Coo-SA", AUSCANNZUKUS can be pronounced from "Oz-Can-Zuke-Us" to "Orse-Can-Zoo-Cuss".

New!!: Eavesdropping and ECHELON · See more »


Electronic mail (email or e-mail) is a method of exchanging messages ("mail") between people using electronic devices.

New!!: Eavesdropping and Email · See more »


Espionage or spying, is the act of obtaining secret or confidential information without the permission of the holder of the information.

New!!: Eavesdropping and Espionage · See more »

Fiber tapping

Fiber tapping uses a network tap method that extracts signal from an optical fiber without breaking the connection.

New!!: Eavesdropping and Fiber tapping · See more »

Global surveillance disclosures (2013–present)

Ongoing news reports in the international media have revealed operational details about the United States National Security Agency (NSA) and its international partners' global surveillance of foreign nationals and U.S. citizens.

New!!: Eavesdropping and Global surveillance disclosures (2013–present) · See more »

Hampton Court Palace

Hampton Court Palace is a royal palace in the borough of Richmond upon Thames, London, England, south west and upstream of central London on the River Thames.

New!!: Eavesdropping and Hampton Court Palace · See more »

Henry VIII of England

Henry VIII (28 June 1491 – 28 January 1547) was King of England from 1509 until his death.

New!!: Eavesdropping and Henry VIII of England · See more »

Katz v. United States

Katz v. United States,, was a landmark United States Supreme Court case discussing the nature of the "right to privacy" and the legal definition of a "search" of intangible property, such as electronic-based communications like telephone calls.

New!!: Eavesdropping and Katz v. United States · See more »

Keystroke logging

Keystroke logging, often referred to as keylogging or keyboard capturing, is the action of recording (logging) the keys struck on a keyboard, typically covertly, so that the person using the keyboard is unaware that their actions are being monitored.

New!!: Eavesdropping and Keystroke logging · See more »

Magic (cryptography)

Magic was an Allied cryptanalysis project during World War II.

New!!: Eavesdropping and Magic (cryptography) · See more »

Man-in-the-middle attack

In cryptography and computer security, a man-in-the-middle attack (MITM) is an attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other.

New!!: Eavesdropping and Man-in-the-middle attack · See more »

Mass surveillance

Mass surveillance is the intricate surveillance of an entire or a substantial fraction of a population in order to monitor that group of citizens.

New!!: Eavesdropping and Mass surveillance · See more »

NSA warrantless surveillance (2001–2007)

NSA warrantless surveillance (also commonly referred to as "warrantless-wiretapping" or "-wiretaps") refers to the surveillance of persons within the United States, including United States citizens, during the collection of notionally foreign intelligence by the National Security Agency (NSA) as part of the Terrorist Surveillance Program.

New!!: Eavesdropping and NSA warrantless surveillance (2001–2007) · See more »

Opportunistic encryption

Opportunistic encryption (OE) refers to any system that, when connecting to another system, attempts to encrypt the communications channel, otherwise falling back to unencrypted communications.

New!!: Eavesdropping and Opportunistic encryption · See more »

People watching

People watching or crowd watching is the act of observing people and their interactions, usually without their knowledge.

New!!: Eavesdropping and People watching · See more »


Privacy is the ability of an individual or group to seclude themselves, or information about themselves, and thereby express themselves selectively.

New!!: Eavesdropping and Privacy · See more »

Secure communication

Secure communication is when two entities are communicating and do not want a third party to listen in.

New!!: Eavesdropping and Secure communication · See more »


Surveillance is the monitoring of behavior, activities, or other changing information for the purpose of influencing, managing, directing, or protecting people.

New!!: Eavesdropping and Surveillance · See more »


A telephone, or phone, is a telecommunications device that permits two or more users to conduct a conversation when they are too far apart to be heard directly.

New!!: Eavesdropping and Telephone · See more »

Telephone tapping

Telephone tapping (also wire tapping or wiretapping in American English) is the monitoring of telephone and Internet conversations by a third party, often by covert means.

New!!: Eavesdropping and Telephone tapping · See more »

Trojan horse (computing)

In computing, a Trojan horse, or Trojan, is any malicious computer program which misleads users of its true intent.

New!!: Eavesdropping and Trojan horse (computing) · See more »


Ultra was the designation adopted by British military intelligence in June 1941 for wartime signals intelligence obtained by breaking high-level encrypted enemy radio and teleprinter communications at the Government Code and Cypher School (GC&CS) at Bletchley Park.

New!!: Eavesdropping and Ultra · See more »

Voice over IP

Voice over Internet Protocol (also voice over IP, VoIP or IP telephony) is a methodology and group of technologies for the delivery of voice communications and multimedia sessions over Internet Protocol (IP) networks, such as the Internet.

New!!: Eavesdropping and Voice over IP · See more »

Redirects here:

Eaves dropping, Eavesdrop, Eavesdropped, Eavesdropper, Network eavesdropping.


[1] https://en.wikipedia.org/wiki/Eavesdropping

Hey! We are on Facebook now! »