Useful Links
Computer Science
Cybersecurity
Surveillance and Privacy
1. Foundations of Surveillance and Privacy
2. Technologies of Surveillance
3. Actors in Surveillance
4. Impacts and Consequences of Surveillance
5. Privacy Protection Technologies
6. Legal and Regulatory Frameworks
7. Ethical Dimensions and Future Challenges
Technologies of Surveillance
Network and Communications Surveillance
Internet Traffic Monitoring
Packet Sniffing
Passive Packet Capture
Active Network Probing
Protocol Analysis
Legal and Illegal Applications
Deep Packet Inspection
Content Analysis Techniques
Application Layer Inspection
Censorship Applications
Quality of Service Management
Network Flow Analysis
Traffic Pattern Recognition
Bandwidth Monitoring
Communication Mapping
Anomaly Detection
Telecommunications Interception
Traditional Wiretapping
Analog Telephone Interception
Digital Telephone Systems
Legal Authorization Processes
Technical Implementation
Mobile Communications Surveillance
Cell Tower Interception
IMSI Catchers
SMS and MMS Monitoring
Location Tracking via Cellular
Internet Communications Monitoring
Email Interception
Instant Messaging Surveillance
Voice over IP Monitoring
Video Call Interception
Metadata Collection and Analysis
Communication Metadata
Call Detail Records
Email Headers
Web Browsing Logs
Social Media Interactions
Location Metadata
Cell Tower Data
GPS Coordinates
Wi-Fi Access Points
Bluetooth Beacons
Device Metadata
Hardware Identifiers
Software Configurations
Network Interfaces
Operating System Information
Data-Centric Surveillance
Big Data Analytics
Data Warehousing
Structured Data Storage
Unstructured Data Management
Data Integration Techniques
Real-time Processing
Machine Learning Applications
Supervised Learning Models
Unsupervised Learning Techniques
Deep Learning Networks
Natural Language Processing
Pattern Recognition
Behavioral Pattern Detection
Anomaly Identification
Trend Analysis
Correlation Discovery
Predictive Analytics
Risk Assessment Models
Credit Scoring
Insurance Risk Evaluation
Criminal Recidivism Prediction
Terrorism Risk Assessment
Behavioral Prediction
Consumer Behavior Modeling
Political Preference Prediction
Health Outcome Forecasting
Social Interaction Prediction
Social Network Analysis
Relationship Mapping
Contact Networks
Communication Patterns
Influence Networks
Community Detection
Graph Analytics
Centrality Measures
Clustering Algorithms
Path Analysis
Network Evolution
Web Tracking Technologies
Browser-Based Tracking
HTTP Cookies
Session Cookies
Persistent Cookies
Third-Party Cookies
Secure Cookies
Browser Fingerprinting
Canvas Fingerprinting
WebGL Fingerprinting
Audio Fingerprinting
Font Detection
Web Storage Technologies
Local Storage
Session Storage
IndexedDB
Web SQL
Cross-Device Tracking
Deterministic Matching
Probabilistic Matching
Device Graphs
Identity Resolution
Physical and Biometric Surveillance
Video Surveillance Systems
Closed-Circuit Television
Analog CCTV Systems
Digital IP Cameras
Wireless Camera Networks
Cloud-Based Video Storage
Advanced Video Analytics
Motion Detection
Object Recognition
Behavior Analysis
Crowd Monitoring
Biometric Identification Systems
Facial Recognition Technology
2D Facial Recognition
3D Facial Recognition
Thermal Facial Recognition
Facial Expression Analysis
Fingerprint Recognition
Optical Scanning
Capacitive Scanning
Ultrasonic Scanning
Minutiae Matching
Iris and Retina Recognition
Iris Pattern Analysis
Retinal Blood Vessel Mapping
Near-Infrared Imaging
Template Matching
Voice Recognition
Speaker Identification
Voice Authentication
Emotional State Detection
Language Identification
Gait Analysis
Motion Capture Systems
Video-Based Gait Recognition
Wearable Sensor Analysis
Behavioral Biometrics
Emerging Biometric Technologies
DNA Analysis
Genetic Fingerprinting
Familial DNA Searching
Phenotyping
Ancestry Inference
Behavioral Biometrics
Keystroke Dynamics
Mouse Movement Patterns
Signature Dynamics
Smartphone Usage Patterns
Location and Movement Surveillance
Satellite-Based Tracking
Global Positioning System
GPS Signal Analysis
Assisted GPS
Differential GPS
Real-Time Kinematic GPS
Alternative Satellite Systems
GLONASS
Galileo
BeiDou
Regional Systems
Terrestrial Location Technologies
Cellular Network Positioning
Cell Tower Triangulation
Enhanced Cell ID
Time Difference of Arrival
Angle of Arrival
Wi-Fi Positioning
Access Point Mapping
Signal Strength Analysis
Fingerprinting Techniques
Indoor Positioning
Bluetooth Tracking
Beacon Networks
Proximity Detection
Asset Tracking
Contact Tracing
Vehicle Tracking Systems
Automatic License Plate Recognition
Optical Character Recognition
Database Matching
Real-Time Alerts
Historical Analysis
Vehicle Telematics
On-Board Diagnostics
Fleet Management Systems
Insurance Telematics
Connected Car Data
Radio Frequency Identification
Passive RFID Systems
Active RFID Systems
Near Field Communication
Ultra-High Frequency Systems
Software and Endpoint Surveillance
Malware-Based Surveillance
Spyware
Commercial Spyware
Government Spyware
Stalkerware
Adware with Tracking
Remote Access Tools
Legitimate Remote Access
Malicious RATs
Command and Control
Data Exfiltration
Rootkits
Kernel-Level Rootkits
Bootkit Technology
Firmware Rootkits
Detection Evasion
System Monitoring Tools
Keystroke Logging
Hardware Keyloggers
Software Keyloggers
Kernel-Level Logging
Network-Based Logging
Screen Capture
Screenshot Tools
Screen Recording
Remote Desktop Monitoring
Activity Logging
Application Monitoring
Usage Tracking
Performance Monitoring
Security Monitoring
Compliance Monitoring
Mobile Device Surveillance
Mobile Spyware
iOS Surveillance Tools
Android Surveillance Tools
Cross-Platform Solutions
Zero-Click Exploits
Mobile Device Management
Enterprise MDM Solutions
Parental Control Software
Location Tracking Apps
Remote Wipe Capabilities
Previous
1. Foundations of Surveillance and Privacy
Go to top
Next
3. Actors in Surveillance