When.com Web Search

  1. Ads

    related to: email spy equipment

Search results

  1. Results From The WOW.Com Content Network
  2. Carnivore (software) - Wikipedia

    en.wikipedia.org/wiki/Carnivore_(software)

    Carnivore, later renamed DCS1000, was a system implemented by the Federal Bureau of Investigation (FBI) that was designed to monitor email and electronic communications. It used a customizable packet sniffer that could monitor all of a target user's Internet traffic. Carnivore was implemented in October 1997.

  3. Category:Espionage devices - Wikipedia

    en.wikipedia.org/wiki/Category:Espionage_devices

    Main page; Contents; Current events; Random article; About Wikipedia; Contact us; Pages for logged out editors learn more

  4. Covert listening device - Wikipedia

    en.wikipedia.org/wiki/Covert_listening_device

    The use of bugs, called bugging, or wiretapping is a common technique in surveillance, espionage and police investigations. Self-contained electronic covert listening devices came into common use with intelligence agencies in the 1950s, when technology allowed for a suitable transmitter to be built into a relatively small package.

  5. Room 641A - Wikipedia

    en.wikipedia.org/wiki/Room_641A

    Room 641A is a telecommunication interception facility operated by AT&T for the U.S. National Security Agency, as part of its warrantless surveillance program as authorized by the Patriot Act. The facility commenced operations in 2003 and its purpose was publicly revealed by AT&T technician Mark Klein in 2006.

  6. The Thing (listening device) - Wikipedia

    en.wikipedia.org/wiki/The_Thing_(listening_device)

    The device, embedded in a carved wooden plaque of the Great Seal of the United States, was used by the Soviet government to spy on the US. On August 4, 1945, several weeks before the end of World War II , a delegation from the Young Pioneer Organization of the Soviet Union presented the bugged carving to Ambassador Harriman, as a "gesture of ...

  7. Stingray phone tracker - Wikipedia

    en.wikipedia.org/wiki/Stingray_phone_tracker

    For example, if visual surveillance is being conducted on a group of protestors, [23] a StingRay can be used to download the IMSI or equivalent identifier from each phone within the protest area. After identifying the phones, locating and tracking operations can be conducted, and service providers can be forced to turn over account information ...