Index[A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [X] [Z] packet filtering Packet Internet Groper (ping) requests packet sniffers packet-switched networks Packeteer packets parental controls 2nd passive intrusion protection systems passports, Internet patches Patriot Act pattern matching peer-to-peer networks 2nd personal firewalls personal information, collecting via websites personal security airport security airport scanners airport terrorist tracking systems Computer Assisted Passenger Prescreening System (CAPPSII) 2nd biometrics fingerprint IDs iris scanning black market credit card money trail cell phones bluebugging bluesnarfing cell phone cloners cell phone snoopers Paris Hilton case study viruses Combined DNA Identification System (CODIS) dangers of DNA profiling gel electrophoresis restriction fragment length polymorphism (RFLP) credit cards black market credit card money trail credit card fraud, detecting identity theft theft of credit card information data mining classification cleaning data dangers of neural networks regression DNA matching government surveillance FBI Carnivore system NSA Echelon system Patriot Act identity theft credit card theft credit repair scams criminal uses for stolen identities mail theft phishing scams protecting against lie detectors 2nd location tracking cell phones handsets receivers satellites radio frequency identification (RFID) RFID readers RFID tags tracking personal information with wiretapping illegal wiretapping legal wiretapping workplace surveillance badges/ID tags cell phones closed-circuit cameras continuous, systematic surveillance GPSs (global positioning systems) Internet use statistics wiretapping pests (instant messaging) phishing 2nd 3rd 4th phishing emails protecting against scams phone calls, tapping [See also electronic surveillance.] illegal wiretapping legal wiretapping PI (pulse induction) piconets PICS (Platform for Internet Content Selection) ping (Packet Internet Groper) requests Platform for Internet Content Selection (PICS) pneumographs polygraphs 2nd polymorphic spyware pop-up killers port probes ports, Internet privacy issues cryptosystems electronic surveillance FBI Carnivore system NSA Echelon system Patriot Act identity theft credit card theft credit repair scams criminal uses for stolen identities mail theft phishing scams protecting against Internet passports lie detectors 2nd RFID (radio frequency identification) RFID readers RFID tags tracking personal information with spyware VPNs (virtual private networks) websites cookies personal profiles sniffers 2nd user activity, tracking web bugs 2nd wiretapping illegal wiretapping legal wiretapping private keys 2nd probe request frames (Wi-Fi) Prolexic protocols IP (Internet Protocol) TCP (Transmission Control Protocol) TCP/IP proxy servers 2nd public keys public-key cryptography pulse induction (PI) |