Margaret Rouse is an award-winning technical writer and teacher known for her ability to explain complex technical subjects simply to a non-technical, business audience. Over…
Passive surveillance is a concept based around wiretapping and other kinds of surveillance that constantly gather information, rather than actively pursuing targeted results.
Passive surveillance versus active surveillance is part of a growing conversation about privacy and security in the digital world.
Generally, IT professionals and others use the term 'passive surveillance’ to talk about systems and processes that don't proactively go out and gather information, but instead, passively funnel large amounts of neutral information into a system.
In passive surveillance, a lot of what’s gathered, or even all of what’s gathered, may never be used.
In looking at passive surveillance in IT, researchers and others are looking at how a user's privacy may be compromised, even though he or she may not be an active target. One of the best examples is the national security efforts of American agencies in collecting cell phone and Internet information.
For example, studies of smartphone use and passive surveillance systems show that government agencies can collect all sorts of communications information, for example, phone numbers and names of contacts, as well as detailed information about web use and location, all without the users 'doing anything’ with their devices.
This is raising questions about how much information individual users are sending out into the world without any effort at all, or without a real awareness of what kinds of data are 'leaking’ from their smartphones.
Techopedia’s editorial policy is centered on delivering thoroughly researched, accurate, and unbiased content. We uphold strict sourcing standards, and each page undergoes diligent review by our team of top technology experts and seasoned editors. This process ensures the integrity, relevance, and value of our content for our readers.
Margaret is an award-winning technical writer and teacher known for her ability to explain complex technical subjects to a non-technical business audience. Over the past twenty years, her IT definitions have been published by Que in an encyclopedia of technology terms and cited in articles by the New York Times, Time Magazine, USA Today, ZDNet, PC Magazine, and Discovery Magazine. She joined Techopedia in 2011. Margaret's idea of a fun day is helping IT and business professionals learn to speak each other’s highly specialized languages.
What Is a Double VPN? Double VPN is a VPN security feature that transfers your online traffic through two servers...
Michael Simon Editor
What Is an IP Leak? An IP leak occurs when your VPN unintentionally fails to properly mask your IP address,...
What Does Regulatory Compliance Mean? Regulatory compliance is the adherence of an organization to laws and legal regulations that are...
Margaret RouseTechnology Expert
Trending NewsLatest GuidesReviewsTerm of the Day