Is Someone Listening? #NSA #PRISM
The ability to intercept traffic on a networking device is built into the devices themselves. It’s called a “mirror” or “span” port, and copies all traffic on one or more (or all) ports to that port for analysis through a separate device. As with any technology, it can be used for good (network shaping, or searching for malware) or evil (unconstitutional surveillance).