Digital Citizenship and Surveillance Society
UK State-Media-Citizen Relations after the Snowden Leaks
 
Skip to content
  • Home
  • Project News
  • About
    • DCSS Project
    • Contact us
    • Project Team
  • Events
    • Final Workshop
    • Surveillance and Citizenship Conference
  • Digital Citizenship
  • Research
    • Civil Society
    • Media
    • Policy
      • Actors
        • GCHQ
        • Independent Reviewer of Terrorism Legislation
        • Intelligence and Security Committee
        • Intelligence Services Commissioner
        • Interception of Communications Commissioner
        • Investigatory Powers Tribunal
        • Law enforcement bodies
        • Special Envoy on Intelligence and Data Sharing
      • Laws/Rules
        • Counter Terrorism and Security Act 2015
        • Data Retention and Investigatory Powers Act 2014
        • Digital Rights Ireland ruling, 2014
        • European Convention on Human Rights
        • Human Rights Act 1998
        • Intelligence Services Act 1994
        • Ruling: Davis and Others vs The Secretary of State for the Home Department
        • Ruling: IPT rulings in Liberty v Others cases
        • Telecommunications Act 1984
        • Wireless Telegraphy Act 2006
      • Powers
        • Access to communications data
        • Breaking into computer systems
        • Decryption
        • Interception of telecommunications
        • Intrusive and targeted surveillance
    • Technology
      • Surveillance Programmes
        • ANT Catalogue
        • BULLRUN
        • FASCIA
        • KARMA POLICE
        • MARINA
        • MUSCULAR
        • OPTIC NERVE
        • PRISM
        • QUANTUM THEORY
        • SKYNET
        • SQUEAKY DOLPHIN
        • TEMPORA
        • XKEYSCORE
      • Counter-Surveillance
      • Glossary
      • Technology Visualisations
  • Resources
    • How to Guides
    • Other Projects
    • Related Reports
    • Web Resources

Glossary

  • Application layer
  • Backdoor
  • BIOS
  • Botnet
  • Buffer
  • Ciphertext
  • Command line
  • Content
  • Cryptographic backdoor
  • Cryptography
  • Deep Packet Inspection
  • Domain name system
  • Downstream
  • Encryption
  • Facial recognition
  • Federated Query Mechanism
  • Feed
  • Fibre-optic cable
  • Five Eyes
  • Forward Secrecy
  • Friend-to-Friend
  • Front-end
  • Garlic routing
  • Hypertext Transfer Protocol
  • Internet backbone
  • Link layer
  • Malware
  • Man-in-the-middle
  • Man-on-the-side
  • Metadata
  • Mix network
  • Network layer
  • Onion routing
  • Overlay network
  • Packet injection
  • Pattern-of-life analysis
  • Peer-to-Peer
  • Physical layer
  • Plausible deniability
  • Proxy
  • Pseudo-top-level domain
  • Relay network
  • RST packet spoofing
  • Sentiment analysis
  • Social layer
  • Standard
  • Switch
  • Transport layer
  • Trojan
  • Tunnel routing
  • Upstream

Comments are closed.

CU small
This project is hosted at Cardiff University and funded by the ESRC
esrc small
Powered by Tempera & WordPress.