What is required for real-time surveillance of a suspect's computer activity?

A. Blocking data transmissions between a suspect’s computer and a network server.
B. Poisoning data transmissions between a suspect’s computer and a network server.
C. Preventing data transmissions between a suspect’s computer and a network server.
D. Sniffing data transmissions between a suspect’s computer and a network server.