Eavesdropping is the act of secretly or stealthily listening to the private conversation or communications of others without their consent in order to gather information.
Etymology
The verb ''eavesdrop'' is a back-formation from the noun ''eavesdropper'' ("a person who eavesdrops"), which was formed from the related noun ''eavesdrop'' ("the dripping of water from the
eaves
The eaves are the edges of the roof which overhang the face of a wall and, normally, project beyond the side of a building. The eaves form an overhang to throw water clear of the walls and may be highly decorated as part of an architectural styl ...
of a house; the ground on which such water falls").
An eavesdropper was someone who would hang from the
eave
The eaves are the edges of the roof which overhang the face of a wall and, normally, project beyond the side of a building. The eaves form an overhang to throw water clear of the walls and may be highly decorated as part of an architectural styl ...
of a building so as to hear what is said within. The PBS documentaries ''Inside the Court of Henry VIII'' (April 8, 2015)
and ''Secrets of Henry VIII’s Palace'' (June 30, 2013) include segments that display and discuss "eavedrops", carved wooden figures
Henry VIII
Henry VIII (28 June 149128 January 1547) was King of England from 22 April 1509 until his death in 1547. Henry is best known for his six marriages, and for his efforts to have his first marriage (to Catherine of Aragon) annulled. His disa ...
had built into the
eaves
The eaves are the edges of the roof which overhang the face of a wall and, normally, project beyond the side of a building. The eaves form an overhang to throw water clear of the walls and may be highly decorated as part of an architectural styl ...
(overhanging edges of the beams in the ceiling) of
Hampton Court
Hampton Court Palace is a Grade I listed royal palace in the London Borough of Richmond upon Thames, southwest and upstream of central London on the River Thames. The building of the palace began in 1514 for Cardinal Thomas Wolsey, the chief ...
to discourage unwanted gossip or dissension from the King's wishes and rule, to foment paranoia and fear,
and demonstrate that everything said there was being overheard; literally, that the walls had ears.
Techniques
Eavesdropping vectors include
telephone
A telephone is a telecommunications device that permits two or more users to conduct a conversation when they are too far apart to be easily heard directly. A telephone converts sound, typically and most efficiently the human voice, into e ...
lines,
cellular network
A cellular network or mobile network is a communication network where the link to and from end nodes is wireless. The network is distributed over land areas called "cells", each served by at least one fixed-location transceiver (typically thre ...
s,
email
Electronic mail (email or e-mail) is a method of exchanging messages ("mail") between people using electronic devices. Email was thus conceived as the electronic ( digital) version of, or counterpart to, mail, at a time when "mail" meant ...
, and other methods of private instant messaging.
VoIP
Voice over Internet Protocol (VoIP), also called IP telephony, is a method and group of technologies for the delivery of voice communications and multimedia sessions over Internet Protocol (IP) networks, such as the Internet. The terms Internet t ...
communications software is also vulnerable to electronic eavesdropping via infections such as
trojans
Trojan or Trojans may refer to:
* Of or from the ancient city of Troy
* Trojan language, the language of the historical Trojans
Arts and entertainment Music
* ''Les Troyens'' ('The Trojans'), an opera by Berlioz, premiered part 1863, part 1890 ...
.
[Garner, p. 550]
Network attacks
Network eavesdropping
Network eavesdropping, also known as eavesdropping attack, sniffing attack, or snooping attack, is a method that retrieves user information through the internet. This attack happens on electronic devices like computers and smartphones. This netwo ...
is a network layer attack that focuses on capturing small ''packets'' from the network transmitted by other computers and reading the data content in search of any type of information. This type of network attack is generally one of the most effective as a lack of encryption services are used.
It is also linked to the collection of metadata.
See also
*
Cellphone surveillance
Cellphone surveillance (also known as cellphone spying) may involve tracking, bugging, monitoring, eavesdropping, and recording conversations and text messages on mobile phones. It also encompasses the monitoring of people's movements, which can b ...
*
Computer surveillance
Computer and network surveillance is the monitoring of computer activity and data stored locally on a computer or data being transferred over computer networks such as the Internet. This monitoring is often carried out covertly and may be comple ...
*
Covert listening device
A covert listening device, more commonly known as a bug or a wire, is usually a combination of a miniature radio transmitter with a microphone. The use of bugs, called bugging, or wiretapping is a common technique in surveillance, espionage and ...
*
ECHELON
ECHELON, originally a secret government code name, is a surveillance program (signals intelligence/SIGINT collection and analysis network) operated by the five signatory states to the UKUSA Security Agreement:Given the 5 dialects that use ...
*
Espionage
Espionage, spying, or intelligence gathering is the act of obtaining secret or confidential information (intelligence) from non-disclosed sources or divulging of the same without the permission of the holder of the information for a tangibl ...
*
Fiber tapping
Fiber tapping uses a network tap method that extracts signal from an optical fiber without breaking the connection. Tapping of optical fiber allows diverting some of the signal being transmitted in the core of the fiber into another fiber or a ...
*
Global surveillance disclosures (2013–present)
Ongoing news reports in the international media have revealed operational details about the Anglophone cryptographic agencies' global surveillance of both foreign and domestic nationals. The reports mostly emanate from a cache of top secret ...
* ''
Katz v. United States
''Katz v. United States'', 389 U.S. 347 (1967), was a landmark decision of the U.S. Supreme Court in which the Court redefined what constitutes a "search" or "seizure" with regard to the protections of the Fourth Amendment to the U.S. Constitution ...
'' (1967)
*
Keystroke logging
Keystroke logging, often referred to as keylogging or keyboard capturing, is the action of recording (logging) the keys struck on a keyboard, typically covertly, so that a person using the keyboard is unaware that their actions are being monitored ...
*
Listening station
A radio listening station (also: listening post, radio intercept station or wireless intercept station, W/T station for wireless telegraphy) is a facility used for military reconnaissance, especially telecommunications reconnaissance (also kno ...
*
Magic (cryptography)
Magic was an Allied cryptanalysis project during World War II. It involved the United States Army's Signals Intelligence Service (SIS) and the United States Navy's Communication Special Unit.
Codebreaking
Magic was set up to combine the US gov ...
*
Man-in-the-middle attack
In cryptography and computer security, a man-in-the-middle, monster-in-the-middle, machine-in-the-middle, monkey-in-the-middle, meddler-in-the-middle, manipulator-in-the-middle (MITM), person-in-the-middle (PITM) or adversary-in-the-middle (AiTM) ...
*
Mass surveillance
Mass surveillance is the intricate surveillance of an entire or a substantial fraction of a population in order to monitor that group of citizens. The surveillance is often carried out by local and federal governments or governmental organizati ...
*
NSA warrantless surveillance controversy
The National Security Agency (NSA) is a national-level intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence (DNI). The NSA is responsible for global monitoring, collectio ...
(December 2005 – 2006)
*
Opportunistic encryption
Opportunistic encryption (OE) refers to any system that, when connecting to another system, attempts to encrypt communications channels, otherwise falling back to unencrypted communications. This method requires no pre-arrangement between the two ...
*
Party line
*
People watching
People-watching or crowd watching is the act of observing people and their interactions as a subconscious doing. It involves picking up on idiosyncrasies to try to interpret or guess at another person's story, interactions, and relationships with ...
*
Privacy
Privacy (, ) is the ability of an individual or group to seclude themselves or information about themselves, and thereby express themselves selectively.
The domain of privacy partially overlaps with security, which can include the concepts of a ...
*
Secure communication
Secure communication is when two entities are communicating and do not want a third party to listen in. For this to be the case, the entities need to communicate in a way that is unsusceptible to eavesdropping or interception. Secure communication ...
*
Speke Hall
Speke Hall is a wood-framed wattle-and-daub Tudor manor house in Speke, Liverpool, England. It is one of the finest surviving examples of its kind. It is owned by the National Trust and is a Grade I listed building.
History
Construction of t ...
, containing a physical eavesdrop for listening to people waiting at the door
*
Surveillance
Surveillance is the monitoring of behavior, many activities, or information for the purpose of information gathering, influencing, managing or directing. This can include observation from a distance by means of electronic equipment, such as c ...
*
Telephone tapping
Telephone tapping (also wire tapping or wiretapping in American English) is the monitoring of telephone and Internet-based conversations by a third party, often by covert means. The wire tap received its name because, historically, the monitorin ...
*
Ultra
adopted by British military intelligence in June 1941 for wartime signals intelligence obtained by breaking high-level encrypted enemy radio and teleprinter communications at the Government Code and Cypher School (GC&CS) at Bletchley Park. '' ...
References
External links
*
*
{{intelligence cycle management
Espionage techniques
Fiction
Plot (narrative)