Digital Citizenship and Surveillance Society
UK State-Media-Citizen Relations after the Snowden Leaks
 
Skip to content
  • Home
  • Project News
  • About
    • DCSS Project
    • Contact us
    • Project Team
  • Events
    • Final Workshop
    • Surveillance and Citizenship Conference
  • Digital Citizenship
  • Research
    • Civil Society
    • Media
    • Policy
      • Actors
        • GCHQ
        • Independent Reviewer of Terrorism Legislation
        • Intelligence and Security Committee
        • Intelligence Services Commissioner
        • Interception of Communications Commissioner
        • Investigatory Powers Tribunal
        • Law enforcement bodies
        • Special Envoy on Intelligence and Data Sharing
      • Laws/Rules
        • Counter Terrorism and Security Act 2015
        • Data Retention and Investigatory Powers Act 2014
        • Digital Rights Ireland ruling, 2014
        • European Convention on Human Rights
        • Human Rights Act 1998
        • Intelligence Services Act 1994
        • Ruling: Davis and Others vs The Secretary of State for the Home Department
        • Ruling: IPT rulings in Liberty v Others cases
        • Telecommunications Act 1984
        • Wireless Telegraphy Act 2006
      • Powers
        • Access to communications data
        • Breaking into computer systems
        • Decryption
        • Interception of telecommunications
        • Intrusive and targeted surveillance
    • Technology
      • Surveillance Programmes
        • ANT Catalogue
        • BULLRUN
        • FASCIA
        • KARMA POLICE
        • MARINA
        • MUSCULAR
        • OPTIC NERVE
        • PRISM
        • QUANTUM THEORY
        • SKYNET
        • SQUEAKY DOLPHIN
        • TEMPORA
        • XKEYSCORE
      • Counter-Surveillance
      • Glossary
      • Technology Visualisations
  • Resources
    • How to Guides
    • Other Projects
    • Related Reports
    • Web Resources

Tag: VPN

Virtual Private Networks

Purpose: A Virtual Private Network (VPN) network provides secure access to online data by creating a private network with which to access both the public Internet and other internal organisational networks. A VPN uses tunneling protocols thus encrypted data at the sending end and decrypted at the receiving end. VPNs…

Continue reading

4th March 2016 28th November 2018Counter-Surveillance, Technology, Uncategorized IP cloaking, Virtual Private Network, VPN
CU small
This project is hosted at Cardiff University and funded by the ESRC
esrc small
Powered by Tempera & WordPress.