Eavesdropping is the act of secretly or stealthily listening to the private conversation or communications of others without their consent in order to gather information.
The verb eavesdrop is a back-formation from the noun eavesdropper ("a person who eavesdrops"), which was formed from the related noun eavesdrop ("the dripping of water from the eaves of a house; the ground on which such water falls").
An eavesdropper was someone who would hang from the eave of a building so as to hear what is said within. The PBS documentaries Inside the Court of Henry VIII (April 8, 2015) and Secrets of Henry VIII’s Palace (June 30, 2013) include segments that display and discuss "eavedrops", carved wooden figures Henry VIII had built into the eaves (overhanging edges of the beams in the ceiling) of Hampton Court to discourage unwanted gossip or dissension from the King's wishes and rule, to foment paranoia and fear, and demonstrate that everything said there was being overheard; literally, that the walls had ears.
Eavesdropping vectors include telephone lines, cellular networks, email, and other methods of private instant messaging. VoIP communications software is also vulnerable to electronic eavesdropping via infections such as trojans.
Network attacks edit
Network eavesdropping is a network layer attack that focuses on capturing small packets from the network transmitted by other computers and reading the data content in search of any type of information. This type of network attack is generally one of the most effective as a lack of encryption services are used. It is also linked to the collection of metadata.
There is a growing importance of security in communication systems, specifically in wireless technology. The need for security measures at different levels, including software encryption, hardware protection (e.g., trusted platform modules), and even the physical layer using wave-front engineering is as crucial than ever.
See also edit
- Cellphone surveillance
- Computer surveillance
- Covert listening device
- Fiber tapping
- Global surveillance disclosures (2013–present)
- Katz v. United States (1967)
- Keystroke logging
- Listening station
- Magic (cryptography)
- Man-in-the-middle attack
- Mass surveillance
- NSA warrantless surveillance controversy (December 2005 – 2006)
- Opportunistic encryption
- Party line
- People watching
- Secure communication
- Speke Hall, containing a physical eavesdrop for listening to people waiting at the door
- Telephone tapping
- Ultra (cryptography)
- "eavesdrop – Definition of eavesdrop in English by Oxford Dictionaries". Oxford Dictionaries – English. Archived from the original on August 11, 2017. Retrieved September 10, 2023.
- Inside the Court of Henry VIII. Public Broadcasting Service. April 8, 2016.
- Stollznow, Karen (August 7, 2014). "Eavesdropping: etymology, meaning, and some creepy little statues". KarenStollznow.com.
- Garner, p. 550[full citation needed]
- "TeamMentor 3.5". vulnerabilities.teammentor.net. Retrieved September 27, 2019.
- "What Are Eavesdropping Attacks?". Fortinet. Retrieved October 2, 2021.
- Ma, Jianjun; Shrestha, Rabi; Adelberg, Jacob; Yeh, Chia-Yi; Hossain, Zahed; Knightly, Edward; Jornet, Josep Miquel; Mittleman, Daniel M. (November 2018). "Security and eavesdropping in terahertz wireless links". Nature. 563 (7729): 89–93. doi:10.1038/s41586-018-0609-x. ISSN 1476-4687.