Eavesdropping
From Wikipedia, the free encyclopedia
This article does not cite any references or sources. (January 2008) Please help improve this article by adding citations to reliable sources. Unverifiable material may be challenged and removed. |
Eavesdropping is the act of surreptitiously listening to a private conversation.
Contents |
[edit] History
Ancient Anglo-Saxon law punished eavesdroppers, who skulked in the eavesdrip of another's home, with a fine; the eavesdrip was also sometimes called the eavesdrop. Eavesdrop also means a small low visibility hole near the entrance to a building (generally under the eaves) which would allow the occupants to listen in on the conversation of people awaiting admission to the house. Typically this would allow the occupant to be prepared for unfriendly visitors.
[edit] Techniques
Eavesdropping can also be done over telephone lines (wiretapping), email, instant messaging, and other methods of communication considered private. (If a message is publicly broadcast, witnessing it does not count as eavesdropping.)
In ancient China, it is said that to prevent eavesdropping when discussing important matters, soldiers would instead draw the characters on hands or papers. This is where the superstition of the "black dot" on a piece of paper comes from.
The Canadian heroine Laura Secord is famous for having eavesdropped on the plans of the American army and delivering this information to the British during the War of 1812.
[edit] Eavesdropping in fiction
Eavesdropping is something of a clichéd plot device in fiction, allowing the hero or villain to gain vital information by deliberately or accidentally overhearing a conversation. For instance, in "Letting In the Jungle" by Rudyard Kipling, Mowgli overhears the hunter Buldeo telling some men that Mowgli's adopted mother Messua is about to be executed, so Mowgli sets about rescuing her.
[edit] See also
- Computer surveillance
- ECHELON
- Espionage
- Magic (cryptography)
- Man-in-the-middle attack
- Katz v. United States (1967)
- NSA warrantless surveillance controversy (December 2005-2006)
- Opportunistic encryption
- Privacy
- Secure communication
- Surveillance
- Telephone tapping
- Fiber tapping
- Ultra
- Keystroke logging
|