Not Signed-In
Which clippings match 'Communications Monitoring' keyword pg.1 of 1
20 SEPTEMBER 2014

Horizon: The defenders of anonymity on the internet

"Yet while anonymity offers a potential bulwark against surveillance, for those who do not wish to be watched, it has also helped in the development of that part of the online world known as the dark web.

Sites on the dark web like Silk Road have used Tor technology to hide their location and yet still be available to users who wish to visit them.

The dark web has now become a focus for law enforcement officers who believe it is facilitating a variety of illegal activities including financial crime and child abuse."

(Mike Radford, 3 September 2014, BBC News)

Fig.1 "Inside the Dark Web" 2014, television programme, BBC Two – Horizon, Series 51, Episode 4, first broadcast: 3 September 2014.

1
2

3

TAGS

2014 • anonymising networks • anonymity • anonymous communication • anonymous protocol • anonymous system • anonymous web browsing • BBC Twobitcoin • black market • Chelsea Manning • child abusecommunications monitoring • controversial technology • crime evasion • criminal actscryptographycybercrime • dark internet • dark web • data securityDavid Chaum • deep web • deepnet • detection • digital realm • dissidents • distributed filesharing network • distributed network • Edward Snowden • encryption • file sharing • financial crime • free market economy • GCHQ • government agencies • hidden network • hidden web • Horizon (BBC TV series) • I2P • information flowsinformation retrieval • information use • Internet • Interpol • invisible web • Jacob Appelbaum • Joss Wright • Julian Assangelaw enforcement • Mix Network • monitoring • National Security Agency • NSAonline activities • online marketplace • online space • Oxford Internet Institute • privacy and security • search engines • Silk Road (marketplace) • surface web • surveillancetelecommunicationsTim Berners-LeeTortraffic analysis • Troels Oerting • US Naval Research Laboratory Tor • Wikileaksworld wide web

CONTRIBUTOR

Simon Perkins
21 AUGUST 2013

Controversial Aotearoa New Zealand surveillance laws pass

"The controversial spy laws have been passed by Parliament by 61 votes to 59. The laws were drafted in the wake of a succession of blunders by New Zealand's foreign intelligence agency, the Government Communications Security Bureau, which included illegally spying on German internet entrepreneur Kim Dotcom. Earlier, Prime Minister John Key acknowledged new surveillance laws have 'alarmed' some people but blames the Government's opponents for stoking their fears. Legislation giving the GCSB the power to spy on New Zealanders was debated in Parliament today ahead of being passed into law."

(Tracy Watkins, 21 August 2013, Fairfax NZ News)

1

CONTRIBUTOR

Simon Perkins
27 APRIL 2005

ECHELON: Global Surveillance System

"Echelon is a system used by the United States National Security Agency (NSA) to intercept and process international communications passing via communications satellites. It is one part of a global surveillance systems that is now over 50 years old. Other parts of the same system intercept messages from the Internet, from undersea cables, from radio transmissions, from secret equipment installed inside embassies, or use orbiting satellites to monitor signals anywhere on the earth's surface. The system includes stations run by Britain [at Menwith Hill], Canada, Australia [near Geraldton] and New Zealand [at Waihope], in addition to those operated by the United States. Although some Australian and British stations do the same job as America's Echelon sites, they are not necessarily called 'Echelon' stations. But they all form part of the same integrated global network using the same equipment and methods to extract information and intelligence illicitly from millions of messages every day, all over the world."

(Duncan Campbell)

1

TAGS

Aotearoa New Zealand • AUSCANNZUKUS • AustraliaCanadacold warcommunications monitoring • Duncan Campbell • ECHELON • Five Eyes • Geraldton • global electronic and signals intelligenceglobal networkGovernment Communications Security Bureau (GCSB)intelligence agencies • intelligence gathering network • intercept • learning as a network • Menwith Hill • nodenodes and connectionsNorth AmericaNSAsecuritysignals interceptionsurveillanceUK • Waihope
11 NOVEMBER 2003

CarnivorePE: Data Networks Surveillance Tool

This programme is a surveillance tool for data networks based on the programme DCS1000 that was developed by the FBI to perform electronic wiretaps. CarnivorePE listens to all Internet traffic (email, web surfing, etc.) on a specific local network and animates, diagnoses, or interprets the network traffic.

1

Sign-In

Sign-In to Folksonomy

Can't access your account?

New to Folksonomy?

Sign-Up or learn more.