Types of Surveillance
Mass Surveillance
Bulk collection of communications from entire populations
GovernmentTargeted Surveillance
Specific individuals monitored with advanced tools
IntelligenceCorporate Surveillance
Data harvesting for advertising and profiling
CommercialWorkplace Monitoring
Employee activity tracking and monitoring
EmploymentKnown Programs
PRISMNSA program collecting data from major tech companies
XKEYSCOREReal-time internet traffic analysis system
TemporaGCHQ undersea cable tapping program
PegasusNSO Group spyware for mobile devices
Data Collection Points
Collection Infrastructure
Internet Exchange Points (IXPs)
└── Undersea Cable Taps
└── ISP Cooperation
└── Tech Company Data Requests
└── Endpoint Compromise (Device Hacking)
Protection Strategies
- Use end-to-end encrypted communications
- Route traffic through Tor or trusted VPNs
- Minimize data shared with tech platforms
- Use open-source, auditable software
- Practice compartmentalization of identities
- Keep devices updated and secured