Computer and Network Surveillance
Computer and Network Surveillance

Computer surveillance is the continuous effort to actively monitor the target device’s activity, key actions and all data being uploaded to the hard drives (internal, external or hidden), while network surveillance is the process of monitoring valuable data being transferred over local computer networks such as LAN or through the Internet.

The monitoring process can be carried out by a single individual or a group, criminal organizations, governments and large corporations, and is frequently done in a covert manner because its either not legal or the entity doing the surveillance is trying to avoid raising suspicion.

Nowadays, the omnipresence of computer and network surveillance is undeniable, and almost all of the Internet traffic is monitored at all times.
Maintaining online privacy is virtually impossible which allows governments and other governing agencies to establish and retain social control, identify and observe potential threats, and most importantly investigate and prevent criminal activity. Following the advent and implementation of surveillance programs and supervisory structures such as the Total Information Awareness project, innovative monitoring technologies such as high-speed surveillance computers and biometric software, and federal laws such as the Communications Assistance for Law Enforcement Act, governments and large organizations currently possess an unprecedented ability to continuously monitor the activity of all internet users and citizens.

Nevertheless, non-governmental organizations such as Reporters without Borders and the Electronic Frontier Foundation are fighting to preserve individual privacy and to maintain the civil rights of citizens. Also, the renowned and notorious “hacktivist” group/association “the Anonymous” has hacked multiple governments and their websites in order to reveal to the public the ongoing "draconian surveillance”.
Such non-governmental organizations and vigilante groups are expressing their concern that the movement towards mass surveillance with limited political and personal freedoms is unlawful and immoral which has led to numerous lawsuits such as the “Hepting v. AT&T” United States class-action lawsuit.
As the greater part of computer surveillance revolves around the monitoring of Internet traffic, data and behaviour patterns, in 1994 the U.S. passed the “Communications Assistance for Law Enforcement Act” also known as "Digital Telephony Act” which states that all phone calls and broadband internet traffic (search history, emails, in-app messages, etc.) must be readily accessible for unrestricted, unimpeded, real-time monitoring by the government and its intelligence agencies.

All data sent over the Internet is divided into smaller segments called “packets”, which can be transported much easier and faster to the target destination, where they are assembled back into a complete file, image, message, etc. Packet capture or “packet sniffing” is the process of monitoring these exact data segments with the help of a packet capture appliance which instantly seizes the data packets, sifts through the information and looks for important details. As per the Communications Assistance for Law Enforcement Act, all United States telecommunications companies are forced to implement such packet capture devices and software so that Federal law enforcement and intelligence agencies are able to intercept all of their customers' broadband Internet and voice over Internet protocol (VoIP) traffic.