Jump to content
 







Main menu
   


Navigation  



Main page
Contents
Current events
Random article
About Wikipedia
Contact us
Donate
 




Contribute  



Help
Learn to edit
Community portal
Recent changes
Upload file
 








Search  

































Create account

Log in
 









Create account
 Log in
 




Pages for logged out editors learn more  



Contributions
Talk
 



















Contents

   



(Top)
 


1 Etymology  





2 Techniques  





3 Network attacks  





4 Security  





5 See also  





6 References  





7 External links  














Eavesdropping






العربية
Deutsch
Ελληνικά
Español
فارسی
Français

Հայերեն
ि
Bahasa Indonesia
עברית


Norsk bokmål
Norsk nynorsk

Português
Suomi
Svenska
Türkçe
Українська
Tiếng Vit

 

Edit links
 









Article
Talk
 

















Read
Edit
View history
 








Tools
   


Actions  



Read
Edit
View history
 




General  



What links here
Related changes
Upload file
Special pages
Permanent link
Page information
Cite this page
Get shortened URL
Download QR code
Wikidata item
 




Print/export  



Download as PDF
Printable version
 




In other projects  



Wikimedia Commons
 
















Appearance
   

 






From Wikipedia, the free encyclopedia
 


Cardinals eavesdropping in the Vatican. A painting by Henri Adolphe Laissement [fr], 1895

Eavesdropping is the act of secretly or stealthily listening to the private conversation or communications of others without their consent in order to gather information.

Etymology[edit]

The verb eavesdrop is a back-formation from the noun eavesdropper ("a person who eavesdrops"), which was formed from the related noun eavesdrop ("the dripping of water from the eaves of a house; the ground on which such water falls").[1]

An eavesdropper was someone who would hang from the eave of a building so as to hear what is said within. The PBS documentaries Inside the Court of Henry VIII (April 8, 2015)[2] and Secrets of Henry VIII’s Palace (June 30, 2013) include segments that display and discuss "eavedrops", carved wooden figures Henry VIII had built into the eaves (overhanging edges of the beams in the ceiling) of Hampton Court to discourage unwanted gossip or dissension from the King's wishes and rule, to foment paranoia and fear,[2] and demonstrate that everything said there was being overheard; literally, that the walls had ears.[3]

Techniques[edit]

Eavesdropping vectors include telephone lines, cellular networks, email, and other methods of private instant messaging. Devices that support VoIP and other communication software are also vulnerable to electronic eavesdropping by computer viruses categorized as trojan viruses or more broadly as spyware.[4]

Network attacks[edit]

Network eavesdropping is a network layer attack that focuses on capturing small packets from the network transmitted by other computers and reading the data content in search of any type of information.[5] This type of network attack is generally one of the most effective as a lack of encryption services are used and when the connection between the two endpoints are weak and not secure.[6][7] It is also linked to the collection of metadata.

Security[edit]

There is a growing importance of security in communication systems, specifically in wireless technology. The need for security measures at different levels, including software encryption, hardware protection (e.g., trusted platform modules), and even the physical layer using wave-front engineering is as crucial than ever.[8]

Researchers have expressed the importance of addressing the privacy concerns from eavesdropping attacks because they impact the rights of users and the ability to have confidence in the devices as well as the entire Internet. Ensuring that users have trust and confidence in their Internet activities so users continue to engage actively in the system and share data.[9]

See also[edit]

  • Computer surveillance
  • Covert listening device
  • ECHELON
  • Espionage
  • Fiber tapping
  • Global surveillance disclosures (2013–present)
  • Katz v. United States (1967)
  • Keystroke logging
  • Listening station
  • Magic (cryptography)
  • Man-in-the-middle attack
  • Mass surveillance
  • NSA warrantless surveillance controversy (December 2005 – 2006)
  • Opportunistic encryption
  • Party line
  • People watching
  • Privacy
  • Secure communication
  • Speke Hall, containing a physical eavesdrop for listening to people waiting at the door
  • Surveillance
  • Telephone tapping
  • Ultra (cryptography)
  • References[edit]

    1. ^ "eavesdrop – Definition of eavesdrop in English by Oxford Dictionaries". Oxford Dictionaries – English. Archived from the original on August 11, 2017. Retrieved September 10, 2023.
  • ^ a b Inside the Court of Henry VIII. Public Broadcasting Service. April 8, 2016.
  • ^ Stollznow, Karen (August 7, 2014). "Eavesdropping: etymology, meaning, and some creepy little statues". KarenStollznow.com. Archived from the original on July 28, 2018. Retrieved June 23, 2016.
  • ^ Garner, p. 550[full citation needed]
  • ^ "TeamMentor 3.5". vulnerabilities.teammentor.net. Archived from the original on September 27, 2019. Retrieved September 27, 2019.
  • ^ "What Are Eavesdropping Attacks?". Fortinet. Retrieved October 2, 2021.
  • ^ "What Are Eavesdropping Attacks & How To Prevent Them". Verizon Enterprise. Retrieved May 3, 2024.
  • ^ Ma, Jianjun; Shrestha, Rabi; Adelberg, Jacob; Yeh, Chia-Yi; Hossain, Zahed; Knightly, Edward; Jornet, Josep Miquel; Mittleman, Daniel M. (November 2018). "Security and eavesdropping in terahertz wireless links". Nature. 563 (7729): 89–93. Bibcode:2018Natur.563...89M. doi:10.1038/s41586-018-0609-x. ISSN 1476-4687. PMID 30323288. S2CID 53085137.
  • ^ Anajemba, Joseph Henry; Iwendi, Celestine; Razzak, Imran; Ansere, James Adu; Okpalaoguchi, Izuchukwu Michael (2022). "A Counter-Eavesdropping Technique for Optimized Privacy of Wireless Industrial IoT Communications". IEEE Transactions on Industrial Informatics. 18 (9): 6445–6454. doi:10.1109/TII.2021.3140109. Retrieved February 9, 2024.
  • External links[edit]


    Retrieved from "https://en.wikipedia.org/w/index.php?title=Eavesdropping&oldid=1221980865"

    Categories: 
    Espionage techniques
    Fiction
    Plot (narrative)
    Hidden categories: 
    All articles with incomplete citations
    Articles with incomplete citations from June 2014
    Articles with short description
    Short description is different from Wikidata
    Use mdy dates from September 2023
    Commons category link is on Wikidata
     



    This page was last edited on 3 May 2024, at 04:22 (UTC).

    Text is available under the Creative Commons Attribution-ShareAlike License 4.0; additional terms may apply. By using this site, you agree to the Terms of Use and Privacy Policy. Wikipedia® is a registered trademark of the Wikimedia Foundation, Inc., a non-profit organization.



    Privacy policy

    About Wikipedia

    Disclaimers

    Contact Wikipedia

    Code of Conduct

    Developers

    Statistics

    Cookie statement

    Mobile view



    Wikimedia Foundation
    Powered by MediaWiki