Talk:Computer and network surveillance

Wiki Education Foundation-supported course assignment
This article was the subject of a Wiki Education Foundation-supported course assignment, between 14 January 2020 and 28 April 2020. Further details are available on the course page. Student editor(s): ValentinaEspinosa-Gil. Peer reviewers: Chughes117.

Above undated message substituted from Template:Dashboard.wikiedu.org assignment by PrimeBOT (talk) 19:24, 17 January 2022 (UTC)

Wiki Education Foundation-supported course assignment
This article was the subject of a Wiki Education Foundation-supported course assignment, between 2 September 2020 and 11 December 2020. Further details are available on the course page. Student editor(s): Cwilley16.

Above undated message substituted from Template:Dashboard.wikiedu.org assignment by PrimeBOT (talk) 19:24, 17 January 2022 (UTC)

Wiki Education Foundation-supported course assignment
This article was the subject of a Wiki Education Foundation-supported course assignment, between 2 September 2021 and 9 December 2021. Further details are available on the course page. Student editor(s): Arianna.fr. Peer reviewers: Rcahill25, Meabarbedoreggina.

Above undated message substituted from Template:Dashboard.wikiedu.org assignment by PrimeBOT (talk) 19:24, 17 January 2022 (UTC)

Wiki Education Foundation-supported course assignment
This article was the subject of a Wiki Education Foundation-supported course assignment, between 10 January 2019 and 30 April 2019. Further details are available on the course page. Student editor(s): Mabate01. Peer reviewers: Leslie boudreau, J lucciano.

Above undated message substituted from Template:Dashboard.wikiedu.org assignment by PrimeBOT (talk) 18:14, 16 January 2022 (UTC)

Fibre optics
Just as a note, the article says that fire optics can't be tapped without detection. Fibre optic cables can be read without breaking into the core. By stripping of the sheath and bending the fibre at the right angle, enough signal passes straight on to be detected by sensitive equipment. —Preceding unsigned comment added by 86.155.90.96 (talk) 18:55, 22 November 2008 (UTC)


 * ✅. I'm not sure when the change was made or by whom, but the article no longer mentions fibre optics. --Jeff Ogden (W163) (talk) 12:22, 26 August 2013 (UTC)

Merge with tracking software?
Tracking software is, it seems to me, a subset of this topic. As such, I would be opposed to a merge, however much such a merger might appeal to a sense of tidiness. ww 15:15, 15 February 2006 (UTC)


 * I would like to argue the merger. In order to utilize tracking software there needs to be a particular item (ex: a user ID for a person) to track while eavesdropping doesn't necessarily require something to pickup in transit whether it be words or an elctronic current (unless silence or all zeros are considered).  [Sean Paul McMahon:seanpaulmcmahon@yahoo.com]


 * ❌. The only comments were 2 oppose. Merger template removed from the article, end of May 06. ww 03:53, 30 May 2006 (UTC)


 * Tracking software is now and has been for some time, a disambiguation page that lists many related articles. --Jeff Ogden (W163) (talk) 15:22, 26 August 2013 (UTC)

Strengths
The implication of surveillance definition in wikipedia by this author is considered as clear and understandable, user friendly. The key concept being discussed is logically available for users to adapt and concern with the meaning. By providing hyperlinks connecting to computer based knowledge lead to easier way in finding information without having to go browsing from page one to the end just to find little information, in doubt. The used of web 2.0 which allows other Wikipedia users to add up references, editing existing topics and rate certain topics made it more believable and reliable.

The author also classifies the information by breaking the contents into specific genre of texts uploaded. —Preceding unsigned comment added by Halyza (talk • contribs) 05:48, 2 September 2008 (UTC)

Is almost all Internet traffic closely monitored for clues of illegal activity?
Is the following statement from the article's lead really true?
 * … almost all Internet traffic is closely monitored for clues of illegal activity.

Is there on-going real-time monitoring of "almost all Internet traffic" or is there just the potential for such monitoring? There isn't a source given for this statement and I don't see it covered elsewhere in the body of the article. --Jeff Ogden (W163) (talk) 12:13, 26 August 2013 (UTC)


 * I changed this to read:
 * … almost all Internet traffic is or could potentially be monitored for clues to illegal activity.
 * --Jeff Ogden (W163) (talk) 22:16, 8 September 2013 (UTC)


 * I suspect that even this weaker statement is no longer true. Is there a reference to support that statement (or contradict it)? My understanding is that most Internet traffic now uses HTTPS, which as a side effect makes it practically impossible for anyone to monitor the contents of messages for illegal activity. Unless somehow traffic analysis is enough for these clues? --DavidCary (talk) 03:53, 27 March 2020 (UTC)

Edward Snowden revelations update?
I am about to remove an "update" template from the top of the article that said:
 * Parts of this article (those related to the Edward Snowden revelations) are outdated. Please update this article to reflect recent events or newly available information. (August 2013)

I don't find anything in the article about Edward Snowden to update. Perhaps this was a call to add information about the Edward Snowden revelations to the article. I'm not sure that such an addition is needed since the Edward Snowden revelations are well covered in other Wikipedia articles. I did add a number of links to the See also section of the article that link to articles about "Surveillance by the United States government" including some that cover the Edward Snowden revelations. --Jeff Ogden (W163) (talk) 00:38, 27 August 2013 (UTC)

External links modified
Hello fellow Wikipedians,

I have just modified 2 external links on Computer and network surveillance. Please take a moment to review my edit. If you have any questions, or need the bot to ignore the links, or the page altogether, please visit this simple FaQ for additional information. I made the following changes:
 * Added archive https://web.archive.org/web/20120907032500/http://www.baller.com/pdfs/ACE.pdf to http://www.baller.com/pdfs/ACE.pdf
 * Added archive https://web.archive.org/web/20130506102113/http://www.ejpd.admin.ch/content/ejpd/de/home/themen/sicherheit/ueberwachung_des_post-/faq_vuepf.faq_3.html to http://www.ejpd.admin.ch/content/ejpd/de/home/themen/sicherheit/ueberwachung_des_post-/faq_vuepf.faq_3.html

When you have finished reviewing my changes, you may follow the instructions on the template below to fix any issues with the URLs.

Cheers.— InternetArchiveBot  (Report bug) 21:02, 11 August 2017 (UTC)

Article Suggestions
I have articulated some suggestions that could be used to improve this article further. Some of the sentences written in this article don’t have a source cited, but the majority of the ones that do have appropriate and reliable references. They include sources like the New York Times, Times Magazine, USA TODAY and academic sources such as databases. The problem that I noticed was that almost every one of the cited sources are very outdated. Some don’t even exist anymore (I have noted which ones those are). Nothing is plagiarized or close paraphrased and everything in this article relates to the topic. The article is neutral, but I did notice a sentence that was more of an opinion rather than a fact. In the section titled Corporate Surveillance, in the paragraph under the bullet points the opinion is “There should be a distinction between an employee's personal electronic devices, which should be limited and proscribed, and those owned by the firm.” Mabate01 (talk) 14:45, 20 February 2019 (UTC)

Malicious Code
There’s a term called Malicious Code, harmful computer code or web script, that is created to cause harm to a computer's system. Malicious code can take on multiple forms such as, ActiveX controls, Java Applets, plug-ins and more. When the code gets inside the computer it can infect mail servers and be disguised as a mail attachment. It can also spread easily throughout other networked computer.

NCCIC. “Security Tip (ST18-004).” "Plan, Do, Check, Act" | US-CERT, 28 Sept. 2018, www.us-cert.gov/ncas/tips/ST18-271.

“Malicious Code.” CA Veracode, 21 Dec. 2018, www.veracode.com/security/malicious-code.

Kaspersky. “What Is Malicious Code?” Usa.kaspersky.com, usa.kaspersky.com/resource-center/definitions/malicious-code.

Techopedia. “What Is Malicious Code? - Definition from Techopedia.” Techopedia.com, www.techopedia.com/definition/4014/malicious-code.

“Malicious Code Information.” Spyware Statistics, 27 Feb. 2019, www3.safenet-inc.com/csrt/malicious-code-more.aspx.

“Malicious Code Protection.” Nd.gov - The Official Portal for North Dakota State Government, 10 July 2018, www.nd.gov/itd/services/it-security/malicious-code-protection. Mabate01 (talk) 02:27, 28 February 2019 (UTC)

Peer Review to Malicious Code addition MAbate
I thought this was good but the first link didn't work and the second led to the google search but the first result was your source so you should fix that. I didn't see any writing issues though but remember to match a sentence or part to each source and this addition would go great as a sub section to the malicious software section! J lucciano (talk) 20:25, 25 March 2019 (UTC)Justin Lucciano

Hello! I wanted to inform anyone who read this that this is my input on how this article can be improved. Thank you!

Citations:

–Some of the references are appropriate. Although, the sources are very outdated. Citation 31 goes back to 2001.

–The most recent source was from 2017 which was source 18.

-Making sure the reader is getting information that is up to date is very important. Information changes throughout the years. Some references seem a bit odd. Writers use a website called the “Electronic Frontier Foundation”, citation seven. It seemed a bit out of place compared to other websites that they used. The layout is very messy and just doesn’t seem reliable.

–Source 24 and 51 doesn't work

–Everything is relevant in the article topic. I was able to learn new things about security for users online. Writers made it very clear and it was easy to understand.

–The only thing that distracted me was the layout for some of the sites. If a site has a clean layout, it’s easy for me to read the information on the website but if everything is compacted together and just leads to more links, I'll lose interest. Source 51 is just very difficult to read. The background makes it difficult to read the text.

Neutrality of Sources:

–Websites are very neutral and just state facts on what's going on in America and what we can do to prevent those from exploiting the internet.

–Most links to websites for sources didn’t work so the ones that did work weren’t biased.

–Article is short but gets to the point.

Arianna Arianna.fr (talk) 22:26, 13 October 2021 (UTC)

Wikipedia Article Draft
Computer and network surveillance is the action to monitor unusual activity on computers and data that is being transferred through the internet. The process of this allows the government to monitor unusual activity so they can later investigate suspicious activity. Illegal corporations are able to monitor behavior but for other reasons such as hacking into individuals' personal information on their phones or computers. Installing software and buying electronics allows people to monitor everything you do online which leads to a digital footprint.

''References

1. Computer and Network Surveillance, https://www.interelectronix.com/computer-and-network-surveillance.html.

2. Charles, Aaron. “Computer Surveillance Techniques.” Small Business - Chron.com, Chron.com, 21 Nov. 2017, https://smallbusiness.chron.com/computer-surveillance-techniques-50593.html.

3. Kifleswing. “Apple IPhones Can Be Hacked with Spyware Even If You Don't Click on a Link, Amnesty International Says.” CNBC, CNBC, 19 July 2021, https://www.cnbc.com/2021/07/19/apple-iphones-can-be-hacked-even-if-the-user-never-clicks-a-link-amnesty-international-says.html.

4. Reyes, Natalie. “What Is a Digital Footprint? Definition - Management - Pitfalls.” What Is a Digital Footprint? Definition - Management - Pitfalls, Reputation X, 14 Oct. 2021, https://blog.reputationx.com/digital-footprint.

Arianna.fr (talk) 00:31, 18 October 2021