Electronic Mass Surveillance of EU Citizens

< Back to TermBases


Key terms with definitions

This information, together with all references, is available in IATE. If you wish to alert the IATE team about a terminological problem related to this procedure, please email us.

backdoor loophole deliberately left in an encryption algorithm to enable interested parties (e.g. security or police agencies) to decipher traffic encoded with it

backdoor access access to data held by organisations without having to formally ask them to hand it over

buddy list list of people a user is connected to via an instant messaging service or other social network

data confiscation, confiscation of data appropriation of data by copying or removing it

Data Intercept Technology Unit, DITU FBI organisation responsible for intercepting telephone calls and emails of terrorists and foreign intelligence targets inside the United States

deep packet injection addition of data into an internet stream (the NSA and GCHQ are alleged to do it to send code to targets’ computers that causes them to be infected with spyware as part of an operation codenamed QuantumInsert)

deep packet inspection communications surveillance tools that are able to monitor the traffic of network data that is sent over the Internet at all seven layers of the OSI Reference Model of Internet communication, which includes the surveillance of content data

Dial Number Recognition NSA term for content sent across the internet

digital footprint compilation of content on the Internet that can be associated with a person and, thus, potentially available to anyone performing a search on that person

duty of secrecy duty of a professional not to disclose confidential information about another party to others

echelon interception system global network of electronic spy stations that can eavesdrop on telephones, faxes and computers

encryption reversible logical or numerical operation designed to hide the information contained in the file so that it can be extracted only by those who have the key

Five Eyes, UKUSA post-war secret intelligence partnership between the US and UK as “first” parties, Canada/Australia/New Zealand as second parties, and other nations

Foreign Intelligence Surveillance Act, FISA sets out procedures for physical and electronic surveillance and collection of foreign intelligence information

full take tapping into internet backbone cables and collecting all the traffic for a certain period of time

hop degree of separation along a chain of contacts

humint NSA term for information gathered from people rather than machines

Intelligence and Security Committee of Parliament, ISC established by the Intelligence Services Act 1994 to examine the policy, administration and expenditure of the UK’s Security Service, Secret Intelligence Service (SIS), and the Government Communications Headquarters (GCHQ)

Keyhole generic code name for US remote-sensing satellites within the US strategic air force

link analysis in network theory, link analysis is a data-analysis technique used to evaluate relationships (connections) between nodes (has been used for investigation of criminal activity, computer security analysis, search engine optimization, market research and medical research)

metadata data that defines and describes other data

Office of the Director of National Intelligence, ODNI head of the US intelligence community, in charge of 17 organisations and agencies including the NSA, FBI and CIA

originator control access control policy that requires recipients to gain originator’s approval for re-dissemination of disseminated digital object

PRISM programme surveillance system launched in 2007 by the US National Security Agency which allows the organisation to “receive” emails, video clips, photos, voice and video calls, social networking details, logins and other data held by a range of US internet firms

probable cause in the US, reasonable basis for believing that a crime may have been committed (for arrest) and that evidence of the crime is present in the place to be searched (for search)

reasonable suspicion in the US, standard used in criminal procedure, more relaxed than probable cause, that can justify less-intrusive searches

third party rule any received/shared intelligence cannot be shared with any other service or country

Tshwane principles, Global Principles on National Security and the Right to Information principles providing guidance to those engaged in drafting, revising, or implementing laws or provisions relating to the state’s authority to withhold information on national security grounds or to punish the disclosure of such information

upstream programme collection of communications on fibre cables and infrastructure as data flows past

US person a citizen of the USA or someone located within its borders

wire tapping interception of telephone conversations

< Back to TermFolders’ list

Language/Country-specific material

Разузнавателни ведомства на САЩ

Ordbog – Datatilsynet
Sammenskrevet udgave af persondataloven

Glossar zur NSA-Affäre (Edward Snowden zur NSA National Security Agency)
Glossar für Internet-Sicherheit (Westfälische Hochschule)
Detektei Pool

Ελληνική νομοθεσία για την προστασία προσωπικών δεδομένων
Ευρωπαϊκή νομοθεσία για την προστασία προσωπικών δεδομένων (από την AΠΔΠX)
Ευρωπαϊκή νομοθεσία για την προστασία προσωπικών δεδομένων και επεξήγηση κάποιων όρων (από το europa.eu)
Γλωσσάρι μονόγλωσσο
Γλωσσάρι EL-EN

European Commission data protection glossary
European Data Protection Supervisor Glossary
Data Protection Act 1998, UK legislation
Electronic Surveillance in a Digital Age, (July 1995, Glossary on p. 71)
National Information Systems Security (INFOSEC) Glossary, National Security Agency, USA

Glosario, Agencia española de protección de datos
Glosario protección de datos (pdf)

Isikuandmete kaitse seadus
Elektroonilise side seadus
Andmekaitse ja infoturbe seletussõnastik (AKIT)

Loi relative à la lutte contre le terrorisme

2011. évi CXII. törvény az információs önrendelkezési jogról és az információszabadságról
Nemzeti Adatvédelmi és Információszabadság Hatóság

Glossario – Garante per la protezione dei dati personali

Comissão Nacional de Protecção de Dados, Legislação Nacional
SeguratNet Glossário

“signalspaning” Computer Sweden Språkwebb
Regeringens proposition 2006/07:63 “En anpassad försvarsunderrättelseverksamhet”

< Back to TermFolders´ list