What is required for real-time surveillance of a suspect's computer activity?
A. Blocking data transmissions between a suspect’s computer and a network server. B. Poisoning data transmissions between a suspect’s computer and a network server. C. Preventing data transmissions between a suspect’s computer and a network server. D. Sniffing data transmissions between a suspect’s computer and a network server.