Introduction to Computer and Network Surveillance
Computer surveillance is the continuous effort to actively monitor the target device’s activity, key actions and all data being uploaded to the hard drives (internal, external or hidden), while network surveillance is the process of monitoring valuable data being transferred over local computer networks such as LAN or through the Internet.
Entities Involved in Surveillance
The monitoring process can be carried out by a single individual or a group, criminal organizations, governments and large corporations, and is frequently done in a covert manner because it is either not legal or the entity doing the surveillance is trying to avoid raising suspicion.
Omnipresence of Surveillance
Nowadays, the omnipresence of computers, industrial monitors,military touch monitors and network surveillance is undeniable, and almost all of the Internet traffic is monitored at all times.
Impacts on Privacy and Control
Maintaining online privacy is virtually impossible which allows governments and other governing agencies to establish and retain social control, identify and observe potential threats, and most importantly investigate and prevent criminal activity.
Surveillance Programs and Legal Frameworks
Following the advent and implementation of surveillance programs and supervisory structures such as the Total Information Awareness project, innovative monitoring technologies such as high-speed surveillance computers and biometric software, and federal laws such as the Communications Assistance for Law Enforcement Act, governments and large organizations currently possess an unprecedented ability to continuously monitor the activity of all internet users and citizens.
Opposition to Surveillance
Nevertheless, non-governmental organizations such as Reporters without Borders and the Electronic Frontier Foundation are fighting to preserve individual privacy and to maintain the civil rights of citizens.
Role of Hacktivist Groups
Also, the renowned and notorious “hacktivist” group/association “the Anonymous” has hacked multiple governments and their websites in order to reveal to the public the ongoing "draconian surveillance”.
Legal and Moral Concerns
Such non-governmental organizations and vigilante groups are expressing their concern that the movement towards mass surveillance with limited political and personal freedoms is unlawful and immoral which has led to numerous lawsuits such as the “Hepting v. AT&T” United States class-action lawsuit.
Legislation on Surveillance
As the greater part of computer surveillance revolves around the monitoring of Internet traffic, data and behaviour patterns, in 1994 the U.S. passed the “Communications Assistance for Law Enforcement Act” also known as the "Digital Telephony Act” which states that all phone calls and broadband internet traffic (search history, emails, in-app messages, etc.) must be readily accessible for unrestricted, unimpeded, real-time monitoring by the government and its intelligence agencies.
Packet Capture and Monitoring
All data sent over the Internet is divided into smaller segments called “packets”, which can be transported much easier and faster to the target destination, where they are assembled back into a complete file, image, message, etc.
Process of Packet Sniffing
Packet capture or “packet sniffing” is the process of monitoring these exact data segments with the help of a packet capture appliance which instantly seizes the data packets, sifts through the information and looks for important details.
Compliance of Telecommunication Companies
As per the Communications Assistance for Law Enforcement Act, all United States telecommunications companies are forced to implement such packet capture devices and software so that Federal law enforcement and intelligence agencies are able to intercept all of their customers' broadband Internet and voice over Internet protocol (VoIP) traffic.