fbpx
Wikipedia

Surveillance

Surveillance is the monitoring of behavior, many activities, or information for the purpose of information gathering, influencing, managing or directing.[1][2] This can include observation from a distance by means of electronic equipment, such as closed-circuit television (CCTV), or interception of electronically transmitted information like Internet traffic. It can also include simple technical methods, such as human intelligence gathering and postal interception.

Surveillance cameras
Surveillance Camera to support the Washington DC Police

Surveillance is used by citizens for protecting their neighborhoods. And by governments for intelligence gathering - including espionage, prevention of crime, the protection of a process, person, group or object, or the investigation of crime. It is also used by criminal organizations to plan and commit crimes, and by businesses to gather intelligence on criminals, their competitors, suppliers or customers. Religious organisations charged with detecting heresy and heterodoxy may also carry out surveillance.[3]Auditors carry out a form of surveillance.[4]

A byproduct of surveillance is that it can unjustifiably violate people's privacy and is often criticized by civil liberties activists.[5] Liberal democracies may have laws that seek to restrict governmental and private use of surveillance, whereas authoritarian governments seldom have any domestic restrictions.

Espionage is by definition covert and typically illegal according to the rules of the observed party, whereas most types of surveillance are overt and are considered legitimate. International espionage seems to be common among all types of countries.[6][7]

Methods

Computer

 
Official seal of the Information Awareness Office – a U.S. agency which developed technologies for mass surveillance

The vast majority of computer surveillance involves the monitoring of data and traffic on the Internet.[8] In the United States for example, under the Communications Assistance For Law Enforcement Act, all phone calls and broadband Internet traffic (emails, web traffic, instant messaging, etc.) are required to be available for unimpeded real-time monitoring by federal law enforcement agencies.[9][10][11]

There is far too much data on the Internet for human investigators to manually search through all of it. Therefore, automated Internet surveillance computers sift through the vast amount of intercepted Internet traffic to identify and report to human investigators the traffic that is considered interesting or suspicious. This process is regulated by targeting certain "trigger" words or phrases, visiting certain types of web sites, or communicating via email or online chat with suspicious individuals or groups.[12] Billions of dollars per year are spent by agencies, such as the NSA, the FBI and the now-defunct Information Awareness Office, to develop, purchase, implement, and operate systems such as Carnivore, NarusInsight, and ECHELON to intercept and analyze all of this data to extract only the information which is useful to law enforcement and intelligence agencies.[13]

Computers can be a surveillance target because of the personal data stored on them. If someone is able to install software, such as the FBI's Magic Lantern and CIPAV, on a computer system, they can easily gain unauthorized access to this data. Such software could be installed physically or remotely.[14] Another form of computer surveillance, known as van Eck phreaking, involves reading electromagnetic emanations from computing devices in order to extract data from them at distances of hundreds of meters.[15][16] The NSA runs a database known as "Pinwale", which stores and indexes large numbers of emails of both American citizens and foreigners.[17][18] Additionally, the NSA runs a program known as PRISM, which is a data mining system that gives the United States government direct access to information from technology companies. Through accessing this information, the government is able to obtain search history, emails, stored information, live chats, file transfers, and more. This program generated huge controversies in regards to surveillance and privacy, especially from U.S. citizens.[19][20]

Telephones

The official and unofficial tapping of telephone lines is widespread. In the United States for instance, the Communications Assistance For Law Enforcement Act (CALEA) requires that all telephone and VoIP communications be available for real-time wiretapping by Federal law enforcement and intelligence agencies.[9][10][11] Two major telecommunications companies in the U.S.—AT&T Inc. and Verizon—have contracts with the FBI, requiring them to keep their phone call records easily searchable and accessible for Federal agencies, in return for $1.8 million per year.[21] Between 2003 and 2005, the FBI sent out more than 140,000 "National Security Letters" ordering phone companies to hand over information about their customers' calling and Internet histories. About half of these letters requested information on U.S. citizens.[22]

Human agents are not required to monitor most calls. Speech-to-text software creates machine-readable text from intercepted audio, which is then processed by automated call-analysis programs, such as those developed by agencies such as the Information Awareness Office, or companies such as Verint, and Narus, which search for certain words or phrases, to decide whether to dedicate a human agent to the call.[23]

Law enforcement and intelligence services in the United Kingdom and the United States possess technology to activate the microphones in cell phones remotely, by accessing phones' diagnostic or maintenance features in order to listen to conversations that take place near the person who holds the phone.[24][25][26][27][28][29]

The StingRay tracker is an example of one of these tools used to monitor cell phone usage in the United States and the United Kingdom. Originally developed for counterterrorism purposes by the military, they work by broadcasting powerful signals that cause nearby cell phones to transmit their IMSI number, just as they would to normal cell phone towers. Once the phone is connected to the device, there is no way for the user to know that they are being tracked. The operator of the stingray is able to extract information such as location, phone calls, and text messages, but it is widely believed that the capabilities of the StingRay extend much further. A lot of controversy surrounds the StingRay because of its powerful capabilities and the secrecy that surrounds it.[30]

Mobile phones are also commonly used to collect location data. The geographical location of a mobile phone (and thus the person carrying it) can be determined easily even when the phone is not being used, using a technique known as multilateration to calculate the differences in time for a signal to travel from the cell phone to each of several cell towers near the owner of the phone.[31][32] The legality of such techniques has been questioned in the United States, in particular whether a court warrant is required.[33] Records for one carrier alone (Sprint), showed that in a given year federal law enforcement agencies requested customer location data 8 million times.[34]

 
The headquarters of UK intelligence activities is Government Communications Headquarters, Cheltenham, England (2017)

In response to customers' privacy concerns in the post Edward Snowden era,[35] Apple's iPhone 6 has been designed to disrupt investigative wiretapping efforts. The phone encrypts e-mails, contacts, and photos with a code generated by a complex mathematical algorithm that is unique to an individual phone, and is inaccessible to Apple.[36] The encryption feature on the iPhone 6 has drawn criticism from FBI director James B. Comey and other law enforcement officials since even lawful requests to access user content on the iPhone 6 will result in Apple supplying "gibberish" data that requires law enforcement personnel to either break the code themselves or to get the code from the phone's owner.[36] Because the Snowden leaks demonstrated that American agencies can access phones anywhere in the world, privacy concerns in countries with growing markets for smart phones have intensified, providing a strong incentive for companies like Apple to address those concerns in order to secure their position in the global market.[36]

Although the CALEA requires telecommunication companies to build into their systems the ability to carry out a lawful wiretap, the law has not been updated to address the issue of smart phones and requests for access to e-mails and metadata.[37] The Snowden leaks show that the NSA has been taking advantage of this ambiguity in the law by collecting metadata on "at least hundreds of millions" of "incidental" targets from around the world.[37] The NSA uses an analytic tool known as CO-TRAVELER in order to track people whose movements intersect and to find any hidden connections with persons of interest.[37]

The Snowden leaks have also revealed that the British Government Communications Headquarters (GCHQ) can access information collected by the NSA on American citizens. Once the data has been collected, the GCHQ can hold on to it for up to two years. The deadline can be extended with the permission of a "senior UK official".[38][39]

Cameras

 
A surveillance camera in Cairns, Queensland
 
Surveillance cameras such as these are installed by the millions in many countries, and are nowadays monitored by automated computer programs instead of humans.

Surveillance cameras, or security cameras, are video cameras used for the purpose of observing an area. They are often connected to a recording device or IP network, and may be watched by a security guard or law enforcement officer. Cameras and recording equipment used to be relatively expensive and required human personnel to monitor camera footage, but analysis of footage has been made easier by automated software that organizes digital video footage into a searchable database, and by video analysis software (such as VIRAT and HumanID). The amount of footage is also drastically reduced by motion sensors which record only when motion is detected. With cheaper production techniques, surveillance cameras are simple and inexpensive enough to be used in home security systems, and for everyday surveillance. Video cameras are one of the most common methods of surveillance.[40]

As of 2016, there are about 350 million surveillance cameras worldwide. About 65% of these cameras are installed in Asia. The growth of CCTV has been slowing in recent years.[41] In 2018, China was reported to have a huge surveillance network of over 170 million CCTV cameras with 400 million new cameras expected to be installed in the next three years, many of which use facial recognition technology.[42]

In the United States, the Department of Homeland Security awards billions of dollars per year in Homeland Security grants for local, state, and federal agencies to install modern video surveillance equipment. For example, the city of Chicago, Illinois, recently used a $5.1 million Homeland Security grant to install an additional 250 surveillance cameras, and connect them to a centralized monitoring center, along with its preexisting network of over 2000 cameras, in a program known as Operation Virtual Shield. Speaking in 2009, Chicago Mayor Richard Daley announced that Chicago would have a surveillance camera on every street corner by 2016.[43][44] New York City received a $350 million grant towards the development of the Domain Awareness System,[45] which is an interconnected system of sensors including 18,000 CCTV cameras used for continual surveillance of the city[46] by both police officers and artificial intelligence systems.[45]

In the United Kingdom, the vast majority of video surveillance cameras are not operated by government bodies, but by private individuals or companies, especially to monitor the interiors of shops and businesses. According to 2011 Freedom of Information Act requests, the total number of local government operated CCTV cameras was around 52,000 over the entirety of the UK.[47] The prevalence of video surveillance in the UK is often overstated due to unreliable estimates being requoted;[48][49] for example one report in 2002 extrapolated from a very small sample to estimate the number of cameras in the UK at 4.2 million (of which 500,000 were in Greater London).[50] More reliable estimates put the number of private and local government operated cameras in the United Kingdom at around 1.85 million in 2011.[51]

In the Netherlands, one example city where there are cameras is The Hague. There, cameras are placed in city districts in which the most illegal activity is concentrated. Examples are the red-light districts and the train stations.[52]

As part of China's Golden Shield Project, several U.S. corporations, including IBM, General Electric, and Honeywell, have been working closely with the Chinese government to install millions of surveillance cameras throughout China, along with advanced video analytics and facial recognition software, which will identify and track individuals everywhere they go. They will be connected to a centralized database and monitoring station, which will, upon completion of the project, contain a picture of the face of every person in China: over 1.3 billion people.[53] Lin Jiang Huai, the head of China's "Information Security Technology" office (which is in charge of the project), credits the surveillance systems in the United States and the U.K. as the inspiration for what he is doing with the Golden Shield Project.[53]

 
A payload surveillance camera manufactured by Controp and distributed to the U.S. government by ADI Technologies

The Defense Advanced Research Projects Agency (DARPA) is funding a research project called Combat Zones That See that will link up cameras across a city to a centralized monitoring station, identify and track individuals and vehicles as they move through the city, and report "suspicious" activity (such as waving arms, looking side-to-side, standing in a group, etc.).[54]

At Super Bowl XXXV in January 2001, police in Tampa, Florida, used Identix's facial recognition software, FaceIt, to scan the crowd for potential criminals and terrorists in attendance at the event[55] (it found 19 people with pending arrest warrants).[56]

Governments often[57] initially claim that cameras are meant to be used for traffic control, but many of them end up using them for general surveillance. For example, Washington, D.C. had 5,000 "traffic" cameras installed under this premise, and then after they were all in place, networked them all together and then granted access to the Metropolitan Police Department, so they could perform "day-to-day monitoring".[58]

The development of centralized networks of CCTV cameras watching public areas – linked to computer databases of people's pictures and identity (biometric data), able to track people's movements throughout the city, and identify whom they have been with – has been argued by some to present a risk to civil liberties.[59] Trapwire is an example of such a network.[60]

Social network analysis

 
A graph of the relationships between users on the social networking site Facebook. Social network analysis enables governments to gather detailed information about peoples' friends, family, and other contacts. Since much of this information is voluntarily made public by the users themselves, it is often considered to be a form of open-source intelligence

One common form of surveillance is to create maps of social networks based on data from social networking sites such as Facebook, MySpace, Twitter as well as from traffic analysis information from phone call records such as those in the NSA call database,[61] and others. These social network "maps" are then data mined to extract useful information such as personal interests, friendships & affiliations, wants, beliefs, thoughts, and activities.[62][63][64]

Many U.S. government agencies such as the Defense Advanced Research Projects Agency (DARPA), the National Security Agency (NSA), and the Department of Homeland Security (DHS) are investing heavily in research involving social network analysis.[65][66] The intelligence community believes that the biggest threat to U.S. power comes from decentralized, leaderless, geographically dispersed groups of terrorists, subversives, extremists, and dissidents. These types of threats are most easily countered by finding important nodes in the network, and removing them. To do this requires a detailed map of the network.[67][68][69]

Jason Ethier of Northeastern University, in his study of modern social network analysis, said the following of the Scalable Social Network Analysis Program developed by the Information Awareness Office:

The purpose of the SSNA algorithms program is to extend techniques of social network analysis to assist with distinguishing potential terrorist cells from legitimate groups of people.... In order to be successful SSNA will require information on the social interactions of the majority of people around the globe. Since the Defense Department cannot easily distinguish between peaceful citizens and terrorists, it will be necessary for them to gather data on innocent civilians as well as on potential terrorists.

— Jason Ethier[64]

AT&T developed a programming language called "Hancock", which is able to sift through enormous databases of phone call and Internet traffic records, such as the NSA call database, and extract "communities of interest"—groups of people who call each other regularly, or groups that regularly visit certain sites on the Internet. AT&T originally built the system to develop "marketing leads",[70] but the FBI has regularly requested such information from phone companies such as AT&T without a warrant,[70] and, after using the data, stores all information received in its own databases, regardless of whether or not the information was ever useful in an investigation.[71]

Some people believe that the use of social networking sites is a form of "participatory surveillance", where users of these sites are essentially performing surveillance on themselves, putting detailed personal information on public websites where it can be viewed by corporations and governments.[62] In 2008, about 20% of employers reported using social networking sites to collect personal data on prospective or current employees.[72]

Biometric

 
Fingerprints being scanned as part of the US-VISIT program

Biometric surveillance is a technology that measures and analyzes human physical and/or behavioral characteristics for authentication, identification, or screening purposes.[73] Examples of physical characteristics include fingerprints, DNA, and facial patterns. Examples of mostly behavioral characteristics include gait (a person's manner of walking) or voice.

Facial recognition is the use of the unique configuration of a person's facial features to accurately identify them, usually from surveillance video. Both the Department of Homeland Security and DARPA are heavily funding research into facial recognition systems.[74] The Information Processing Technology Office ran a program known as Human Identification at a Distance which developed technologies that are capable of identifying a person at up to 500 ft (150 m) by their facial features.

Another form of behavioral biometrics, based on affective computing, involves computers recognizing a person's emotional state based on an analysis of their facial expressions, how fast they are talking, the tone and pitch of their voice, their posture, and other behavioral traits. This might be used for instance to see if a person's behavior is suspect (looking around furtively, "tense" or "angry" facial expressions, waving arms, etc.).[75]

A more recent development is DNA profiling, which looks at some of the major markers in the body's DNA to produce a match. The FBI is spending $1 billion to build a new biometric database, which will store DNA, facial recognition data, iris/retina (eye) data, fingerprints, palm prints, and other biometric data of people living in the United States. The computers running the database are contained in an underground facility about the size of two American football fields.[76][77][78]

The Los Angeles Police Department is installing automated facial recognition and license plate recognition devices in its squad cars, and providing handheld face scanners, which officers will use to identify people while on patrol.[79][80][81]

Facial thermographs are in development, which allow machines to identify certain emotions in people such as fear or stress, by measuring the temperature generated by blood flow to different parts of the face.[82] Law enforcement officers believe that this has potential for them to identify when a suspect is nervous, which might indicate that they are hiding something, lying, or worried about something.[82]

In his paper in Ethics and Information Technology, Avi Marciano maps the harms caused by biometric surveillance, traces their theoretical origins, and brings these harms together in one integrative framework to elucidate their cumulative power. Marciano proposes four types of harms: Unauthorized use of bodily information, denial or limitation of access to physical spaces, bodily social sorting, and symbolic ineligibility through construction of marginality and otherness. Biometrics' social power, according to Marciano, derives from three main features: their complexity as "enigmatic technologies", their objective-scientific image, and their increasing agency, particularly in the context of automatic decision-making.

Aerial

 
Micro Air Vehicle with attached surveillance camera

Aerial surveillance is the gathering of surveillance, usually visual imagery or video, from an airborne vehicle—such as an unmanned aerial vehicle, helicopter, or spy plane. Military surveillance aircraft use a range of sensors (e.g. radar) to monitor the battlefield.

Digital imaging technology, miniaturized computers, and numerous other technological advances over the past decade have contributed to rapid advances in aerial surveillance hardware such as micro-aerial vehicles, forward-looking infrared, and high-resolution imagery capable of identifying objects at extremely long distances. For instance, the MQ-9 Reaper,[83] a U.S. drone plane used for domestic operations by the Department of Homeland Security, carries cameras that are capable of identifying an object the size of a milk carton from altitudes of 30,000 feet (9.1 km), and has forward-looking infrared devices that can detect the heat from a human body at distances of up to 60 kilometers (37 mi).[84] In an earlier instance of commercial aerial surveillance, the Killington Mountain ski resort hired 'eye in the sky' aerial photography of its competitors' parking lots to judge the success of its marketing initiatives as it developed starting in the 1950s.[85]

 
HART program concept drawing from official IPTO (DARPA) official website

The United States Department of Homeland Security is in the process of testing UAVs to patrol the skies over the United States for the purposes of critical infrastructure protection, border patrol, "transit monitoring", and general surveillance of the U.S. population.[86] Miami-Dade police department ran tests with a vertical take-off and landing UAV from Honeywell, which is planned to be used in SWAT operations.[87] Houston's police department has been testing fixed-wing UAVs for use in "traffic control".[87]

The United Kingdom, as well, is working on plans to build up a fleet of surveillance UAVs ranging from micro-aerial vehicles to full-size drones, to be used by police forces throughout the U.K.[88]

In addition to their surveillance capabilities, MAVs are capable of carrying tasers for "crowd control", or weapons for killing enemy combatants.[89]

Programs such as the Heterogeneous Aerial Reconnaissance Team program developed by DARPA have automated much of the aerial surveillance process. They have developed systems consisting of large teams drone planes that pilot themselves, automatically decide who is "suspicious" and how to go about monitoring them, coordinate their activities with other drones nearby, and notify human operators if something suspicious is occurring. This greatly increases the amount of area that can be continuously monitored, while reducing the number of human operators required. Thus a swarm of automated, self-directing drones can automatically patrol a city and track suspicious individuals, reporting their activities back to a centralized monitoring station.[90][91][92] In addition, researchers also investigate possibilities of autonomous surveillance by large groups of micro aerial vehicles stabilized by decentralized bio-inspired swarming rules.[93][94]

Corporate

Corporate surveillance is the monitoring of a person or group's behavior by a corporation. The data collected is most often used for marketing purposes or sold to other corporations, but is also regularly shared with government agencies. It can be used as a form of business intelligence, which enables the corporation to better tailor their products and/or services to be desirable by their customers. Although there is a common belief that monitoring can increase productivity, it can also create consequences such as increasing chances of deviant behavior and creating punishments that are not equitable to their actions. Additionally, monitoring can cause resistance and backlash because it insinuates an employer's suspicion and lack of trust.[95]

Data mining and profiling

Data mining is the application of statistical techniques and programmatic algorithms to discover previously unnoticed relationships within the data. Data profiling in this context is the process of assembling information about a particular individual or group in order to generate a profile — that is, a picture of their patterns and behavior. Data profiling can be an extremely powerful tool for psychological and social network analysis. A skilled analyst can discover facts about a person that they might not even be consciously aware of themselves.[96]

Economic (such as credit card purchases) and social (such as telephone calls and emails) transactions in modern society create large amounts of stored data and records. In the past, this data was documented in paper records, leaving a "paper trail", or was simply not documented at all. Correlation of paper-based records was a laborious process—it required human intelligence operators to manually dig through documents, which was time-consuming and incomplete, at best.

But today many of these records are electronic, resulting in an "electronic trail". Every use of a bank machine, payment by credit card, use of a phone card, call from home, checked out library book, rented video, or otherwise complete recorded transaction generates an electronic record. Public records—such as birth, court, tax and other records—are increasingly being digitized and made available online. In addition, due to laws like CALEA, web traffic and online purchases are also available for profiling. Electronic record-keeping makes data easily collectable, storable, and accessible—so that high-volume, efficient aggregation and analysis is possible at significantly lower costs.

Information relating to many of these individual transactions is often easily available because it is generally not guarded in isolation, since the information, such as the title of a movie a person has rented, might not seem sensitive. However, when many such transactions are aggregated they can be used to assemble a detailed profile revealing the actions, habits, beliefs, locations frequented, social connections, and preferences of the individual. This profile is then used, by programs such as ADVISE[97] and TALON, to determine whether the person is a military, criminal, or political threat.

In addition to its own aggregation and profiling tools, the government is able to access information from third parties — for example, banks, credit companies or employers, etc. — by requesting access informally, by compelling access through the use of subpoenas or other procedures,[98] or by purchasing data from commercial data aggregators or data brokers. The United States has spent $370 million on its 43 planned fusion centers, which are national network of surveillance centers that are located in over 30 states. The centers will collect and analyze vast amounts of data on U.S. citizens. It will get this data by consolidating personal information from sources such as state driver's licensing agencies, hospital records, criminal records, school records, credit bureaus, banks, etc. – and placing this information in a centralized database that can be accessed from all of the centers, as well as other federal law enforcement and intelligence agencies.[99]

Under United States v. Miller (1976), data held by third parties is generally not subject to Fourth Amendment warrant requirements.

Human operatives

A tail may surreptitiously track and report on the movements and contacts of a person of interest. Such following by one or more people may provide useful in formation in relatively densely populated urban environments.[100]

Organizations that have enemies who wish to gather information about the groups' members or activities face the issue of potential infiltration.[101]

In addition to operatives' infiltrating an organization, the surveilling party may exert pressure on certain members of the target organization to act as informants (i.e., to disclose the information they hold on the organization and its members).[102][103]

Fielding operatives is very expensive, and governments with wide-reaching electronic surveillance tools at their disposal, rather than gathering the sort of information which operatives can provide, may use less problematic forms of surveillance - such as those mentioned above. Nevertheless, the use of human infiltrators remains common. For instance, in 2007 documents surfaced showing that the FBI planned to field a total of 15,000 undercover agents and informants in response to an anti-terrorism directive (issued by President George W. Bush in 2004) that ordered intelligence and law-enforcement agencies to increase their HUMINT capabilities.[104]

Satellite imagery

On May 25, 2007, the U.S. Director of National Intelligence Michael McConnell authorized the National Applications Office (NAO) of the Department of Homeland Security to allow local, state, and domestic Federal agencies to access imagery from military intelligence Reconnaissance satellites and Reconnaissance aircraft sensors which can now be used to observe the activities of U.S. citizens. The satellites and aircraft sensors will be able to penetrate cloud cover, detect chemical traces, and identify objects in buildings and "underground bunkers", and will provide real-time video at much higher resolutions than the still-images produced by programs such as Google Earth.[105][106][107][108][109][110]

Identification and credentials

 
A card containing an identification number

One of the simplest forms of identification is the carrying of credentials. Some nations have an identity card system to aid identification, whilst others are considering it but face public opposition. Other documents, such as passports, driver's licenses, library cards, banking or credit cards are also used to verify identity.

If the form of the identity card is "machine-readable", usually using an encoded magnetic stripe or identification number (such as a Social Security number), it corroborates the subject's identifying data. In this case it may create an electronic trail when it is checked and scanned, which can be used in profiling, as mentioned above.

Wireless Tracking

This section refers to methods that involve the monitoring of tracking devices through the aid of wireless signals.

Mobile phones

Mobile carrier antennas are also commonly used to collect geolocation data on mobile phones. The geographical location of a powered mobile phone (and thus the person carrying it) can be determined easily (whether it is being used or not), using a technique known as multilateration to calculate the differences in time for a signal to travel from the cell phone to each of several cell towers near the owner of the phone.[31][32] Dr. Victor Kappeler[111] of Eastern Kentucky University indicates that police surveillance is a strong concern, stating the following statistics from 2013:

Of the 321,545 law enforcement requests made to Verizon, 54,200 of these requests were for "content" or "location" information—not just cell phone numbers or IP addresses. Content information included the actual text of messages, emails and the wiretapping of voice or messaging content in real-time.

A comparatively new off-the-shelf surveillance device is an IMSI-catcher, a telephone eavesdropping device used to intercept mobile phone traffic and track the movement of mobile phone users. Essentially a "fake" mobile tower acting between the target mobile phone and the service provider's real towers, it is considered a man-in-the-middle (MITM) attack. IMSI-catchers are used in some countries by law enforcement and intelligence agencies, but their use has raised significant civil liberty and privacy concerns and is strictly regulated in some countries.[112]

In March 2020, British daily The Guardian, based on the claims of a whistleblower, accused the government of Saudi Arabia of exploiting global mobile telecom network weaknesses to spy on its citizens traveling around the United States.[113] The data shared by the whistleblower in support of the claims, showed that a systematic spying campaign was being run by the kingdom exploiting the flaws of SS7, a global messaging system. The data showed that millions of secret tracking commands originated from Saudi in a duration of four-months, starting from November 2019.[114]

RFID tagging

 
RFID chip pulled from a new credit card

Radio Frequency Identification (RFID) tagging is the use of very small electronic devices (called "RFID tags") which are applied to or incorporated into a product, animal, or person for the purpose of identification and tracking using radio waves. The tags can be read from several meters away. They are extremely inexpensive, costing a few cents per piece, so they can be inserted into many types of everyday products without significantly increasing the price, and can be used to track and identify these objects for a variety of purposes.

Some companies appear to be "tagging" their workers by incorporating RFID tags in employee ID badges. Workers in U.K. considered strike action in protest of having themselves tagged; they felt that it was dehumanizing to have all of their movements tracked with RFID chips.[115][vague] Some critics have expressed fears that people will soon be tracked and scanned everywhere they go.[116] On the other hand, RFID tags in newborn baby ID bracelets put on by hospitals have foiled kidnappings.[115]

In a 2003 editorial, CNET News.com's chief political correspondent, Declan McCullagh, speculated that, soon, every object that is purchased, and perhaps ID cards, will have RFID devices in them, which would respond with information about people as they walk past scanners (what type of phone they have, what type of shoes they have on, which books they are carrying, what credit cards or membership cards they have, etc.). This information could be used for identification, tracking, or targeted marketing. As of 2021, this has largely not come to pass.[117]

RFID tagging on humans

 
Hand with planned insertion point for Verichip device

A human microchip implant is an identifying integrated circuit device or RFID transponder encased in silicate glass and implanted in the body of a human being. A subdermal implant typically contains a unique ID number that can be linked to information contained in an external database, such as personal identification, medical history, medications, allergies, and contact information.

Several types of microchips have been developed in order to control and monitor certain types of people, such as criminals, political figures and spies,[clarification needed] a "killer" tracking chip patent was filed at the German Patent and Trademark Office (DPMA) around May 2009.

Verichip is an RFID device produced by a company called Applied Digital Solutions (ADS). Verichip is slightly larger than a grain of rice, and is injected under the skin. The injection reportedly feels similar to receiving a shot. The chip is encased in glass, and stores a "VeriChip Subscriber Number" which the scanner uses to access their personal information, via the Internet, from Verichip Inc.'s database, the "Global VeriChip Subscriber Registry". Thousands of people have already had them inserted.[116] In Mexico, for example, 160 workers at the Attorney General's office were required to have the chip injected for identity verification and access control purposes.[118][119]

Implantable microchips have also been used in healthcare settings, but ethnographic researchers have identified a number of ethical problems with such uses; these problems include unequal treatment, diminished trust, and possible endangerment of patients.[120]

Radar

Perimeter surveillance radar (PSR) is a class of radar sensors that monitor activity surrounding or on critical infrastructure areas such as airports,[121] seaports, military installations, national borders, refineries and other critical industry and the like. Such radars are characterized by their ability to detect movement at ground level of targets such as an individual walking or crawling towards a facility. Such radars typically have ranges of several hundred metres to over 10 kilometres.[122]

Alternate technologies include laser-based systems. These have the potential for very high target position accuracy, however they are less effective in the presence of fog and other obscurants.

Geolocation devices

Global Positioning System

 
Diagram of GPS satellites orbiting Earth

In the U.S., police have planted hidden GPS tracking devices in people's vehicles to monitor their movements,[123] without a warrant.[124] In early 2009, they were arguing in court that they have the right to do this.[125]

Several cities are running pilot projects to require parolees to wear GPS devices to track their movements when they get out of prison.[126]

Devices

Covert listening devices and video devices, or "bugs", are hidden electronic devices which are used to capture, record, and/or transmit data to a receiving party such as a law enforcement agency.

The U.S. has run numerous domestic intelligence operations, such as COINTELPRO, which have bugged the homes, offices, and vehicles of thousands of U.S. citizens, usually political activists, subversives, and criminals.[127]

Law enforcement and intelligence services in the U.K. and the United States possess technology to remotely activate the microphones in cell phones, by accessing the phone's diagnostic/maintenance features, in order to listen to conversations that take place nearby the person who holds the phone.[25][26][27]

Postal services

As more people use faxes and e-mail the significance of surveilling the postal system is decreasing, in favor of Internet and telephone surveillance. But interception of post is still an available option for law enforcement and intelligence agencies, in certain circumstances.[128] This is not a common practice, however, and entities like the US Army require high levels of approval to conduct.[129]

The U.S. Central Intelligence Agency and Federal Bureau of Investigation have performed twelve separate mail-opening campaigns targeted towards U.S. citizens. In one of these programs, more than 215,000 communications were intercepted, opened, and photographed.[130][131]

Stakeout

A stakeout is the coordinated surveillance of a location or person. Stakeouts are generally performed covertly and for the purpose of gathering evidence related to criminal activity. The term derives from the practice by land surveyors of using survey stakes to measure out an area before the main building project begins.

Internet of things

The Internet of Things (IoT) is a term that refers to the future of technology in which data can be collected without human and computer interaction. IoTs can be used for identification, monitoring, location tracking, and health tracking.[132] While IoTs have the benefit of being a time-saving tool that makes activities simpler, they raise the concern of government surveillance and privacy regarding how data will be used.[132]

Controversy

 
Graffiti expressing concern about the proliferation of video surveillance

Support

Supporters of surveillance systems believe that these tools can help protect society from terrorists and criminals. They argue that surveillance can reduce crime by three means: by deterrence, by observation, and by reconstruction. Surveillance can deter by increasing the chance of being caught, and by revealing the modus operandi. This requires a minimal level of invasiveness.[133]

Another method on how surveillance can be used to fight criminal activity is by linking the information stream obtained from them to a recognition system (for instance, a camera system that has its feed run through a facial recognition system). This can for instance auto-recognize fugitives and direct police to their location.

A distinction here has to be made however on the type of surveillance employed. Some people that say support video surveillance in city streets may not support indiscriminate telephone taps and vice versa. Besides the types, the way in how this surveillance is done also matters a lot; i.e. indiscriminate telephone taps are supported by much fewer people than say telephone taps done only to people suspected of engaging in illegal activities.

Surveillance can also be used to give human operatives a tactical advantage through improved situational awareness, or through the use of automated processes, i.e. video analytics. Surveillance can help reconstruct an incident and prove guilt through the availability of footage for forensics experts. Surveillance can also influence subjective security if surveillance resources are visible or if the consequences of surveillance can be felt.

Some of the surveillance systems (such as the camera system that has its feed run through a facial recognition system mentioned above) can also have other uses besides countering criminal activity. For instance, it can help on retrieving runaway children, abducted or missing adults and mentally disabled people. Other supporters simply believe that there is nothing that can be done about the loss of privacy, and that people must become accustomed to having no privacy. As Sun Microsystems CEO Scott McNealy said: "You have zero privacy anyway. Get over it."[134][135]

Another common argument is: "If you aren't doing something wrong then you don't have anything to fear." Which follows that if one is engaging in unlawful activities, in which case they do not have a legitimate justification for their privacy. However, if they are following the law the surveillance would not affect them.[136]

Opposition

 
Surveillance lamppost brought down in Hong Kong by citizens fearing state surveillance
 
An elaborate graffito in Columbus, Ohio, depicting state surveillance of telecommunications

With the advent of programs such as the Total Information Awareness program and ADVISE, technologies such as high speed surveillance computers and biometrics software, and laws such as the Communications Assistance for Law Enforcement Act, governments now possess an unprecedented ability to monitor the activities of their subjects.[137] Many civil rights and privacy groups, such as the Electronic Frontier Foundation and American Civil Liberties Union, have expressed concern that by allowing continual increases in government surveillance of citizens we will end up in a mass surveillance society, with extremely limited, or non-existent political and/or personal freedoms. Fears such as this have led to numerous lawsuits such as Hepting v. AT&T.[137][138]

Some critics state that the claim made by supporters should be modified to read: "As long as we do what we're told, we have nothing to fear.". For instance, a person who is part of a political group which opposes the policies of the national government, might not want the government to know their names and what they have been reading, so that the government cannot easily subvert their organization, arrest, or kill them. Other critics state that while a person might not have anything to hide right now, the government might later implement policies that they do wish to oppose, and that opposition might then be impossible due to mass surveillance enabling the government to identify and remove political threats. Further, other critics point to the fact that most people do have things to hide. For example, if a person is looking for a new job, they might not want their current employer to know this. Also if an employer wishes total privacy to watch over their own employee and secure their financial information it may become impossible, and they may not wish to hire those under surveillance.

In December 2017, the Government of China took steps to oppose widespread surveillance by security-company cameras, webcams, and IP cameras after tens-of-thousands were made accessible for internet viewing by IT company Qihoo[139]

Totalitarianism

 
A traffic camera atop a high pole oversees a road in the Canadian city of Toronto

Programs such as the Total Information Awareness program, and laws such as the Communications Assistance For Law Enforcement Act have led many groups to fear that society is moving towards a state of mass surveillance with severely limited personal, social, political freedoms, where dissenting individuals or groups will be strategically removed in COINTELPRO-like purges.[137][138]

Kate Martin, of the Center For National Security Studies said of the use of military spy satellites being used to monitor the activities of U.S. citizens: "They are laying the bricks one at a time for a police state."[109]

Some point to the blurring of lines between public and private places, and the privatization of places traditionally seen as public (such as shopping malls and industrial parks) as illustrating the increasing legality of collecting personal information.[140] Traveling through many public places such as government offices is hardly optional for most people, yet consumers have little choice but to submit to companies' surveillance practices.[141] Surveillance techniques are not created equal; among the many biometric identification technologies, for instance, face recognition requires the least cooperation. Unlike automatic fingerprint reading, which requires an individual to press a finger against a machine, this technique is subtle and requires little to no consent.[141]

Psychological/social effects

Some critics, such as Michel Foucault, believe that in addition to its obvious function of identifying and capturing individuals who are committing undesirable acts, surveillance also functions to create in everyone a feeling of always being watched, so that they become self-policing. This allows the State to control the populace without having to resort to physical force, which is expensive and otherwise problematic.[142]

With the development of digital technology, individuals have become increasingly perceptible to one another, as surveillance becomes virtual. Online surveillance is the utilization of the internet to observe one's activity.[143] Corporations, citizens, and governments participate in tracking others' behaviours for motivations that arise out of business relations, to curiosity, to legality. In her book Superconnected, Mary Chayko differentiates between two types of surveillance: vertical and horizontal.[143] Vertical surveillance occurs when there is a dominant force, such as the government that is attempting to control or regulate the actions of a given society. Such powerful authorities often justify their incursions as a means to protect society from threats of violence or terrorism. Some individuals question when this becomes an infringement on civil rights.[143]

Horizontal diverges from vertical surveillance as the tracking shifts from an authoritative source to an everyday figure, such as a friend, coworker, or stranger that is interested in one's mundane activities.[143] Individuals leave traces of information when they are online that reveal their interests and desires of which others observe. While this can allow people to become interconnected and develop social connections online, it can also increase potential risk to harm, such as cyberbullying or censoring/stalking by strangers, reducing privacy.[143]

In addition, Simone Browne argues that surveillance wields an immense racializing quality such that it operates as "racializing surveillance." Browne uses racializing surveillance to refer to moments when enactments of surveillance are used to reify boundaries, borders, and bodies along racial lines and where the outcome is discriminatory treatment of those who are negatively racialized by such surveillance. Browne argues racializing surveillance pertains to policing what is "in or out of place."[144][145]

Privacy

Numerous civil rights groups and privacy groups oppose surveillance as a violation of people's right to privacy. Such groups include: Electronic Privacy Information Center, Electronic Frontier Foundation, American Civil Liberties Union and Privacy International.

There have been several lawsuits such as Hepting v. AT&T and EPIC v. Department of Justice by groups or individuals, opposing certain surveillance activities.

Legislative proceedings such as those that took place during the Church Committee, which investigated domestic intelligence programs such as COINTELPRO, have also weighed the pros and cons of surveillance.

Court cases

People vs. Diaz (2011) was a court case in the realm of cell phone privacy, even though the decision was later overturned. In this case, Gregory Diaz was arrested during a sting operation for attempting to sell ecstasy. During his arrest, police searched Diaz's phone and found more incriminating evidence including SMS text messages and photographs depicting illicit activities. During his trial, Diaz attempted to have the information from his cell phone removed from evidence, but the courts deemed it as lawful and Diaz's appeal was denied on the California State Court level and, later, the Supreme Court level. Just three short years after, this decision was overturned in the case Riley vs. California (2014).[146]

Riley vs. California (2014) was a U.S. Supreme Court case in which a man was arrested for his involvement in a drive-by shooting. A few days after the shooting the police made an arrest of the suspect (Riley), and, during the arrest, the police searched him. However, this search was not only of Riley's person, but also the police opened and searched his cell phone, finding pictures of other weapons, drugs, and of Riley showing gang signs. In court, the question arose whether searching the phone was lawful or if the search was protected by the 4th amendment of the constitution. The decision held that the search of Riley's cell phone during the arrest was illegal, and that it was protected by the 4th Amendment.[147]

Countersurveillance, inverse surveillance, sousveillance

Countersurveillance is the practice of avoiding surveillance or making surveillance difficult. Developments in the late twentieth century have caused counter surveillance to dramatically grow in both scope and complexity, such as the Internet, increasing prevalence of electronic security systems, high-altitude (and possibly armed) UAVs, and large corporate and government computer databases.[148]

Inverse surveillance is the practice of the reversal of surveillance on other individuals or groups (e.g., citizens photographing police). Well-known examples include George Holliday's recording of the Rodney King beating and the organization Copwatch, which attempts to monitor police officers to prevent police brutality. Counter-surveillance can be also used in applications to prevent corporate spying, or to track other criminals by certain criminal entities. It can also be used to deter stalking methods used by various entities and organizations.

Sousveillance is inverse surveillance, involving the recording by private individuals, rather than government or corporate entities.[149]

Popular culture

In literature

  • George Orwell's novel Nineteen Eighty-Four portrays a fictional totalitarian surveillance society with a very simple mass surveillance system consisting of human operatives, informants, and two-way "telescreens" in people's homes. Because of the impact of this book, mass-surveillance technologies are commonly called "Orwellian" when they are considered problematic.
  • The novel mistrust highlights the negative effects from the overuse of surveillance at Reflection House. The central character Kerryn installs secret cameras to monitor her housemates – see also Paranoia.
  • The book The Handmaid's Tale, as well as a film and TV series based on it, portray a totalitarian Christian theocracy where all citizens are kept under constant surveillance.
  • In the book The Girl with the Dragon Tattoo, Lisbeth Salander uses computers to get information on people, as well as other common surveillance methods, as a freelancer.
  • V for Vendetta, a British graphic novel written by Alan Moore
  • David Egger's novel The Circle exhibits a world where a single company called "The Circle" produces all of the latest and highest quality technologies from computers and smartphones, to surveillance cameras known as "See-Change cameras". This company becomes associated with politics when starting a movement where politicians go "transparent" by wearing See-Change cameras on their body to prevent keeping secrets from the public about their daily work activity. In this society, it becomes mandatory to share personal information and experiences because it is The Circle's belief that everyone should have access to all information freely. However, as Eggers illustrates, this takes a toll on the individuals and creates a disruption of power between the governments and the private company. The Circle presents extreme ideologies surrounding mandatory surveillance. Eamon Bailey, one of the Wise Men, or founders of The Circle, believes that possessing the tools to access information about anything or anyone, should be a human right given to all of the world's citizens.[150] By eliminating all secrets, any behaviour that has been deemed shameful will either become normalized or no longer considered shocking. Negative actions will eventually be eradicated from society altogether, through the fear of being exposed to other citizens[150] This would be achieved in part by everyone going transparent, something that Bailey highly supports, although it's notable that none of the Wise Men ever became transparent themselves. One major goal of The Circle is to have all of the world's information filtered through The Circle, a process they call "Completion".[150] A single, private company would then have full access and control over all information and privacy of individuals and governments. Ty Gospodinov, the first founder of The Circle, has major concerns about the completion of the circle. He warns that this step would give The Circle too much power and control, and would quickly lead to totalitarianism.

In music

Onscreen

See also

References

  1. ^ Lyon, David (2001). Surveillance Society: Monitoring in Everyday Life. Philadelphia: Open University Press. ISBN 978-0-335-20546-2.
  2. ^ Monahan, Torin; Murakami Wood, David (2018). Surveillance Studies: A Reader. New York: Oxford University Press. ISBN 9780190297824.
  3. ^ Greenleaf, Richard E. (2018). "Historiography of the Mexican Inquisition: Evolution of Interpretations and Methodologies". In Perry, Mary Elizabeth; Cruz, Anne J. (eds.). Cultural Encounters: The Impact of the Inquisition in Spain and the New World. Center for Medieval and Renaissance Studies, UCLA. Vol. 24. Berleley: University of California Press. p. 260. ISBN 9780520301245. Retrieved March 14, 2020. Studies [...] are based partially on Inquisition surveillance of foreigners and Protestants.
  4. ^ Cardwell, Harvey (2005). Principles of Audit Surveillance. R.T. Edwards, Inc. p. 102. ISBN 9781930217133. Retrieved March 14, 2020. [...] accounts and inventories alike are generally within the area of surveillance of the auditor [...].
  5. ^ Stallman, Richard M. (October 14, 2013). "Stallman: How Much Surveillance Can Democracy Withstand?". Wired. ISSN 1059-1028. Retrieved April 15, 2020.
  6. ^ "The Psychology of Espionage" (PDF). The Psychology of Espionage. (PDF) from the original on November 9, 2020. Retrieved October 1, 2022.
  7. ^ Radsan, A. John (Spring 2007). "The Unresolved Equation of Espionage and International Law". Michigan Journal of International Law. 28 (3): 595–623.
  8. ^ Diffie, Whitfield; Susan Landau (August 2008). "Internet Eavesdropping: A Brave New World of Wiretapping". Scientific American. Retrieved March 13, 2009.
  9. ^ a b . Electronic Frontier Foundation (website). Archived from the original on May 3, 2009. Retrieved March 14, 2009.
  10. ^ a b "CALEA: The Perils of Wiretapping the Internet". Electronic Frontier Foundation (website). Retrieved March 14, 2009.
  11. ^ a b "CALEA: Frequently Asked Questions". Electronic Frontier Foundation (website). September 20, 2007. Retrieved March 14, 2009.
  12. ^ Hill, Michael (October 11, 2004). "Government funds chat room surveillance research". USA Today. Associated Press. Retrieved March 19, 2009.
  13. ^ McCullagh, Declan (January 30, 2007). "FBI turns to broad new wiretap method". ZDNet News. Retrieved September 26, 2014.
  14. ^ "FBI's Secret Spyware Tracks Down Teen Who Made Bomb Threats". Wired Magazine. July 18, 2007.
  15. ^ Van Eck, Wim (1985). "Electromagnetic Radiation from Video Display Units: An Eavesdropping Risk?" (PDF). Computers & Security. 4 (4): 269–286. CiteSeerX 10.1.1.35.1695. doi:10.1016/0167-4048(85)90046-X. Archived (PDF) from the original on October 9, 2022.
  16. ^ Kuhn, M.G. (2004). "Electromagnetic Eavesdropping Risks of Flat-Panel Displays" (PDF). 4th Workshop on Privacy Enhancing Technologies: 23–25.
  17. ^ Risen, James; Lichtblau, Eric (June 16, 2009). "E-Mail Surveillance Renews Concerns in Congress". The New York Times. pp. A1. Retrieved June 30, 2009.
  18. ^ Ambinder, Marc (June 16, 2009). "Pinwale And The New NSA Revelations". The Atlantic. Retrieved June 30, 2009.
  19. ^ Greenwald; Ewen, Glen; MacAskill (June 6, 2013). "NSA Prism program taps in to user data of Apple, Google and others" (PDF). The Guardian. Archived (PDF) from the original on October 9, 2022. Retrieved February 1, 2017.{{cite news}}: CS1 maint: multiple names: authors list (link)
  20. ^ Sottek, T.C.; Kopfstein, Janus (July 17, 2013). "Everything you need to know about PRISM". The Verge. Retrieved February 13, 2017.
  21. ^ Singel, Ryan (September 10, 2007). "Rogue FBI Letters Hint at Phone Companies' Own Data Mining Programs – Updated". Threat Level. Wired. Retrieved March 19, 2009.
  22. ^ Roland, Neil (March 20, 2007). "Mueller Orders Audit of 56 FBI Offices for Secret Subpoenas". Bloomberg News. Retrieved March 19, 2009.
  23. ^ Piller, Charles; Eric Lichtblau (July 29, 2002). "FBI Plans to Fight Terror With High-Tech Arsenal". LA Times. Retrieved March 14, 2009.
  24. ^ Schneier, Bruce (December 5, 2006). "Remotely Eavesdropping on Cell Phone Microphones". Schneier On Security. Retrieved December 13, 2009.
  25. ^ a b McCullagh, Declan; Anne Broache (December 1, 2006). . CNet News. Archived from the original on November 10, 2013. Retrieved March 14, 2009.
  26. ^ a b Odell, Mark (August 1, 2005). "Use of mobile helped police keep tabs on suspect". Financial Times. Retrieved March 14, 2009.
  27. ^ a b . Western Regional Security Office (NOAA official site). 2001. Archived from the original on November 6, 2013. Retrieved March 22, 2009.
  28. ^ . ABC News: The Blotter. Archived from the original on August 25, 2011. Retrieved December 13, 2009.
  29. ^ Coughlin, Kevin (December 13, 2006). "Even if they're off, cellphones allow FBI to listen in". The Seattle Times. Retrieved December 14, 2009.
  30. ^ Hampton, Brittany (2012). "From Smartphones to Stingrays: Can the Fourth Amendment Keep up with the Twenty-First Century Note". University of Louisville Law Review. Fifty One: 159–176 – via Law Journal Library.
  31. ^ a b "Tracking a suspect by mobile phone". BBC News. August 3, 2005. Retrieved March 14, 2009.
  32. ^ a b Miller, Joshua (March 14, 2009). . FOX News. Archived from the original on March 18, 2009. Retrieved March 14, 2009.
  33. ^ Samuel, Ian (2008). "Warrantless Location Tracking". N.Y.U. Law Review. SSRN 1092293.
  34. ^ Zetter, Kim (December 1, 2009). "Threat Level Privacy, Crime and Security Online Feds 'Pinged' Sprint GPS Data 8 Million Times Over a Year". Wired Magazine: Threat Level. Retrieved December 5, 2009.
  35. ^ . snowdenarchive.cjfe.org. Archived from the original on January 4, 2022. Retrieved June 3, 2017.
  36. ^ a b c Sanger, David (September 26, 2014). "Signaling Post-Snowden Era, New iPhone Locks Out N.S.A". The New York Times. Retrieved November 1, 2014.
  37. ^ a b c Gellman, Barton (December 4, 2013). "NSA tracking cellphone locations worldwide, Snowden documents show". The Washington Post. Retrieved November 1, 2014.
  38. ^ Ball, James (October 29, 2014). "GCHQ views data without a warrant, government admits". The Guardian.
  39. ^ Szoldra, Paul. "This is everything Edward Snowden revealed in one year of unprecedented top-secret leaks". Business Insider.
  40. ^ Crocco, Marco; Cristani, Marco; Trucco, Andrea; Murino, Vittorio (May 2, 2016). "Audio Surveillance: A Systematic Review". ACM Computing Surveys. 48 (4): 1–46. doi:10.1145/2871183. ISSN 0360-0300. S2CID 6128808.
  41. ^ "Rise of Surveillance Camera Installed Base Slows". May 5, 2016. Retrieved January 5, 2017.
  42. ^ "Smart cameras catch man in 60,000 crowd". BBC News. April 13, 2018. Retrieved April 13, 2018.
  43. ^ Spielman, Fran (February 19, 2009). "Surveillance cams help fight crime, city says". Chicago Sun Times. Retrieved March 13, 2009.[permanent dead link]
  44. ^ Schorn, Daniel (September 6, 2006). . CBS News. Archived from the original on February 6, 2009. Retrieved March 13, 2009.
  45. ^ a b Levine, E. S.; Tisch, Jessica; Tasso, Anthony; Joy, Michael (February 2017). "The New York City Police Department's Domain Awareness System". Interfaces. 47 (1): 70–84. doi:10.1287/inte.2016.0860.
  46. ^ Parascandola, Rocco. "New NYPD surveillance cameras to cover stretch of Upper East Side not easily reached by patrol cars". nydailynews.com. Retrieved November 1, 2019.
  47. ^ (PDF). Big Brother Watch. February 2012. p. 30. Archived from the original (PDF) on September 23, 2015. Retrieved February 4, 2015.
  48. ^ . Channel 4 News. June 18, 2008. Archived from the original on May 11, 2010. Retrieved May 8, 2009.
  49. ^ "You're being watched: there's one CCTV camera for every 32 people in UK – Research shows 1.85m machines across Britain, most of them indoors and privately operated". The Guardian. March 2, 2011. Retrieved January 7, 2017; "In the press: How the media is reporting the 1.85 million cameras story". Security News Desk. March 3, 2011. Retrieved January 7, 2017.
  50. ^ "CCTV in London" (PDF). Archived (PDF) from the original on October 9, 2022. Retrieved July 22, 2009.
  51. ^ . CCTV User Group. June 18, 2008. Archived from the original on October 23, 2008. Retrieved May 8, 2009.
  52. ^ Den Haag. . Archived from the original on October 8, 2016. Retrieved December 2, 2016.
  53. ^ a b Klein, Naomi (May 29, 2008). . Rolling Stone. Archived from the original on March 26, 2009. Retrieved March 20, 2009.
  54. ^ "Big Brother To See All, Everywhere". CBS News. Associated Press. July 1, 2003. Retrieved September 26, 2014.
  55. ^ Bonsor, K. (September 4, 2001). "How Facial Recognition Systems Work". Retrieved June 18, 2006.
  56. ^ McNealy, Scott. "Privacy is (Virtually) Dead". Retrieved December 24, 2006.
  57. ^ Roebuck, Kevin (October 24, 2012). Communication Privacy Management. ISBN 9781743332900.
  58. ^ "WIKILEAKS: Surveillance Cameras Around The Country Are Being Used In A Huge Spy Network". Business Insider. Retrieved October 5, 2016.
  59. ^ . EPIC. Archived from the original on February 25, 2009. Retrieved March 13, 2009.
  60. ^ Hedgecock, Sarah (August 14, 2012). "TrapWire: The Less-Than-Advertised System To Spy On Americans". The Daily Beast. Retrieved September 13, 2012.
  61. ^ Keefe, Patrick (March 12, 2006). "Can Network Theory Thwart Terrorists?". The New York Times.
  62. ^ a b Albrechtslund, Anders (March 3, 2008). "Online Social Networking as Participatory Surveillance". First Monday. 13 (3). doi:10.5210/fm.v13i3.2142.
  63. ^ Fuchs, Christian (2009). Social Networking Sites and the Surveillance Society. A Critical Case Study of the Usage of studiVZ, Facebook, and MySpace by Students in Salzburg in the Context of Electronic Surveillance (PDF). Salzburg and Vienna: Forschungsgruppe Unified Theory of Information. ISBN 978-3-200-01428-2. Archived (PDF) from the original on October 9, 2022. Retrieved July 28, 2012.
  64. ^ a b Ethier, Jason. . Northeastern University College of Computer and Information Science. Archived from the original on November 16, 2004. Retrieved March 15, 2009.{{cite web}}: CS1 maint: bot: original URL status unknown (link)
  65. ^ Marks, Paul (June 9, 2006). "Pentagon sets its sights on social networking websites". New Scientist. Retrieved March 16, 2009.
  66. ^ Kawamoto, Dawn (June 9, 2006). "Is the NSA reading your MySpace profile?". CNET News. Archived from the original on July 20, 2012. Retrieved March 16, 2009.
  67. ^ Ethier, Jason. . Northeastern University College of Computer and Information Science. Archived from the original on February 26, 2015. Retrieved March 15, 2009.
  68. ^ Ressler, Steve (July 2006). "Social Network Analysis as an Approach to Combat Terrorism: Past, Present, and Future Research". Homeland Security Affairs. II (2). Retrieved March 14, 2009.
  69. ^ "DyDAn Research Blog". DyDAn Research Blog (official blog of DyDAn). Retrieved December 20, 2009.
  70. ^ a b Singel, Ryan (October 29, 2007). "AT&T Invents Programming Language for Mass Surveillance". Threat Level. Wired. Retrieved March 19, 2009.
  71. ^ Singel, Ryan (October 16, 2007). "Legally Questionable FBI Requests for Calling Circle Info More Widespread than Previously Known". Threat Level. Wired. Retrieved March 19, 2009.
  72. ^ Havenstein, Heather (September 12, 2008). . Computer World. Archived from the original on September 23, 2008. Retrieved March 14, 2009.
  73. ^ Woodward, John; Christopher Horn; Julius Gatune; Aryn Thomas (2003). . RAND Corporation. ISBN 978-0-8330-3302-4. Archived from the original on September 8, 2013. Retrieved March 15, 2009.
  74. ^ Frank, Thomas (May 10, 2007). "Face recognition next in terror fight". USA Today. Retrieved March 16, 2009.
  75. ^ Vlahos, James (January 2008). . Popular Mechanics. Archived from the original on December 19, 2007. Retrieved March 14, 2009.
  76. ^ Nakashima, Ellen (December 22, 2007). "FBI Prepares Vast Database Of Biometrics: $1 Billion Project to Include Images of Irises and Faces". The Washington Post. pp. A01. Retrieved May 6, 2009.
  77. ^ Arena, Kelly; Carol Cratty (February 4, 2008). "FBI wants palm prints, eye scans, tattoo mapping". CNN. Retrieved March 14, 2009.
  78. ^ Gross, Grant (February 13, 2008). . IDG News Service. InfoWorld. Archived from the original on June 17, 2008. Retrieved March 18, 2009.
  79. ^ "LAPD: We Know That Mug". Wired Magazine. Associated Press. December 26, 2004. Retrieved March 18, 2009.
  80. ^ Mack, Kelly. . NBC4 TV (transcript from Officer.com). Archived from the original on March 30, 2010. Retrieved December 20, 2009.
  81. ^ Willon, Phil (September 17, 2009). "LAPD opens new high-tech crime analysis center". LA Times. Retrieved December 20, 2009.
  82. ^ a b Dotinga, Randy (October 14, 2004). "Can't Hide Your Lying ... Face?". Wired Magazine. Retrieved March 18, 2009.
  83. ^ Boyd, Ryan. "MQ-9 Reaper". Retrieved October 5, 2016.
  84. ^ Friedersdorf, Conor (March 10, 2016). "The Rapid Rise of Federal Surveillance Drones Over America". The Atlantic. Retrieved October 5, 2016.
  85. ^ Edwards, Bruce, "Killington co-founder Sargent dead at 83" September 4, 2015, at the Wayback Machine, Rutland Herald, November 9, 2012. Retrieved December 10, 2012.
  86. ^ McCullagh, Declan (March 29, 2006). "Drone aircraft may prowl U.S. skies". CNet News. Retrieved March 14, 2009.
  87. ^ a b Warwick, Graham (June 12, 2007). "US police experiment with Insitu, Honeywell UAVs". FlightGlobal.com. Retrieved March 13, 2009.
  88. ^ La Franchi, Peter (July 17, 2007). "UK Home Office plans national police UAV fleet". Flight International. Retrieved March 13, 2009.
  89. ^ "No Longer Science Fiction: Less Than Lethal & Directed Energy Weapons". International Online Defense Magazine. February 22, 2005. Retrieved March 15, 2009.
  90. ^ (PDF). IPTO (DARPA) – Official website. August 2008. Archived from the original (PDF) on December 5, 2008. Retrieved March 15, 2009.
  91. ^ (PDF). Information Processing Technology Office (DARPA) – Official Website. December 5, 2003. Archived from the original (PDF) on November 27, 2008. Retrieved March 16, 2009.
  92. ^ Sirak, Michael (November 29, 2007). . Defense Daily. Archived from the original on March 9, 2012. Retrieved March 16, 2009.
  93. ^ Saska, M.; Chudoba, J.; Preucil, L.; Thomas, J.; Loianno, G.; Tresnak, A.; Vonasek, V.; Kumar, V. Autonomous Deployment of Swarms of Micro-Aerial Vehicles in Cooperative Surveillance. In Proceedings of 2014 International Conference on Unmanned Aircraft Systems (ICUAS). 2014.
  94. ^ Saska, M.; Vakula, J.; Preucil, L. Swarms of Micro Aerial Vehicles Stabilized Under a Visual Relative Localization. In ICRA2014: Proceedings of 2014 IEEE International Conference on Robotics and Automation. 2014.
  95. ^ Anthony, Denise (2017). "Toward a Sociology of Privacy". Annual Review of Sociology. 43 (1): 249–269. doi:10.1146/annurev-soc-060116-053643.
  96. ^ Hildebrandt, Mireille; Serge Gutwirth (2008). Profiling the European Citizen: Cross Disciplinary Perspectives. Dordrecht: Springer. ISBN 978-1-4020-6913-0.
  97. ^ Clayton, Mark (February 9, 2006). "US Plans Massive Data Sweep". Christian Science Monitor. Retrieved March 13, 2009.
  98. ^ Flint, Lara (September 24, 2003). . The Center For Democracy & Technology (official site). Archived from the original on March 8, 2009. Retrieved March 20, 2009.
  99. ^ ""National Network" of Fusion Centers Raises Specter of COINTELPRO". EPIC Spotlight on Surveillance. June 2007. Retrieved March 14, 2009.
  100. ^ Prunckun, Hank (April 12, 2019) [2010]. "Clandestine and Covert Sources of Information". Methods of Inquiry for Intelligence Analysis. Security and Professional Intelligence Education Series (3 ed.). Lanham, Maryland: Rowman & Littlefield (published 2019). p. 57. ISBN 9781538125885. Retrieved September 13, 2022. Physical surveillance is the act of making observations of people, vehicles, or the activities occurring at specific locations. [...] Physical surveillance may take place either at a fixed location, which is known as a stakeout, or in a continually moving situation, referred to as a tail.
  101. ^ Myers, Lisa (December 14, 2005). "Is the Pentagon spying on Americans?". NBC Nightly News. NBC News. Retrieved March 13, 2009.
  102. ^ "The Use of Informants in FBI Domestic Intelligence Investigations". Final Report: Book III, Supplementary Detailed Staff Reports on Intelligence Activities and the Rights of Americans. U.S. Senate Select Committee to Study Governmental Operations with Respect to Intelligence Activities. April 23, 1976. pp. 225–270. Retrieved March 13, 2009.
  103. ^ "Secret Justice: Criminal Informants and America's Underground Legal System | Prison Legal News". www.prisonlegalnews.org. Retrieved October 5, 2016.
  104. ^ Ross, Brian (July 25, 2007). "FBI Proposes Building Network of U.S. Informants". Blotter. ABC News. Retrieved March 13, 2009.
  105. ^ "U.S. Reconnaissance Satellites: Domestic Targets". National Security Archive. Retrieved March 16, 2009.
  106. ^ Block, Robert (August 15, 2007). "U.S. to Expand Domestic Use Of Spy Satellites". The Wall Street Journal. Retrieved March 14, 2009.
  107. ^ Gorman, Siobhan (October 1, 2008). "Satellite-Surveillance Program to Begin Despite Privacy Concerns". The Wall Street Journal. Retrieved March 16, 2009.
  108. ^ . Department of Homeland Security (official website). August 15, 2007. Archived from the original on March 11, 2009. Retrieved March 16, 2009.
  109. ^ a b Warrick, Joby (August 16, 2007). "Domestic Use of Spy Satellites To Widen". The Washington Post. pp. A01. Retrieved March 17, 2009.
  110. ^ Shrader, Katherine (September 26, 2004). "Spy imagery agency watching inside U.S." USA Today. Associated Press. Retrieved March 17, 2009.
  111. ^ Kappeler, Victor. "Forget the NSA: Police May be a Greater Threat to Privacy".
  112. ^ (PDF), The German Code Of Criminal Procedure, 2014, pp. 43–44, archived from the original (PDF) on September 25, 2015, retrieved November 27, 2015
  113. ^ "Revealed: Saudis suspected of phone spying campaign in US". The Guardian. March 29, 2020. Retrieved March 29, 2020.
  114. ^ "Saudi Spies Tracked Phones Using Flaws the FCC Failed to Fix for Years". TechCrunch. March 29, 2020. Retrieved March 29, 2020.
  115. ^ a b "Two Stories Highlight the RFID Debate". RFID Journal. July 19, 2005. Retrieved March 23, 2012.
  116. ^ a b Lewan, Todd (July 21, 2007). "Microchips in humans spark privacy debate". USA Today. Associated Press. Retrieved March 17, 2009.
  117. ^ McCullagh, Declan (January 13, 2003). "RFID Tags: Big Brother in small packages". CNET News. Retrieved July 24, 2012.
  118. ^ Gardener, W. David (July 15, 2004). . Information Week. Archived from the original on April 12, 2009. Retrieved March 17, 2009.
  119. ^ Campbell, Monica (August 4, 2004). "Law enforcement in Mexico goes a bit bionic". Christian Science Monitor. Retrieved March 17, 2009.
  120. ^ Monahan, Torin; Fisher, Jill A. (2010). "Implanting inequality: Empirical evidence of social and ethical risks of implantable radio-frequency identification (RFID) devices". International Journal of Technology Assessment in Health Care. 26 (4): 370–376. doi:10.1017/S0266462310001133. PMID 20923593. S2CID 12365071.
  121. ^ Plextek’s Blighter B400 series radars improve perimeter security at London’s Heathrow Airport
  122. ^ Radartutorial
  123. ^ Lyman, D., Micheal. Criminal Investigation: The Art and the Science. 6th ed. Pearson, 2010. p249
  124. ^ Crowder, Stan, and Turvery E. Brent. Ethical Justice: Applied Issues for Criminal Justice Students and Professionals. 1st ed. Academic Press, 2013. p150. Print.
  125. ^ Claburn, Thomas (March 4, 2009). "Court Asked To Disallow Warrantless GPS Tracking". Information Week. Retrieved March 18, 2009.
  126. ^ Wolf, Paul. "COINTELPRO". (online collection of historical documents). Retrieved March 14, 2009.
  127. ^ Rooney, Julie Lynn (2017). "Going Postal: Analyzing the Abuse of Mail Covers Under the Fourth Amendment". Vanderbilt Law Review. 70[5]: 1627–1662.
  128. ^ (PDF). Archived from the original (PDF) on August 8, 2015. Retrieved 25 May 2015.
  129. ^ (PDF). Final Report: Book III, Supplementary Detailed Staff Reports on Intelligence Activities and the Rights of Americans. U.S. Senate Select Committee to Study Governmental Operations with Respect to Intelligence Activities. April 23, 1976. pp. 559–678. Archived from the original (PDF) on May 5, 2011. Retrieved March 13, 2009.
  130. ^ Goldstein, Robert (2001). Political Repression in Modern America. University of Illinois Press. ISBN 978-0-252-06964-2.
  131. ^ a b Williams, Jamie Lee (2016). "Privacy in the Age of the Internet of Things". Human Rights. 41 (4): 14–22. ISSN 0046-8185. JSTOR 26423456.
  132. ^ Deviant Behaviour – Socially accepted observation of behaviour for security, Jeroen van Rest
  133. ^ Sprenger, Polly (January 26, 1999). "Sun on Privacy: 'Get Over It'". Wired Magazine. Retrieved March 20, 2009.
  134. ^ Baig, Edward; Marcia Stepanek; Neil Gross (April 5, 1999). . Business Week. Archived from the original on October 17, 2008. Retrieved March 20, 2009.
  135. ^ Solove, Daniel (2007). "'I've Got Nothing to Hide' and Other Misunderstandings of Privacy". San Diego Law Review. 44: 745. SSRN 998565.
  136. ^ a b c "Is the U.S. Turning Into a Surveillance Society?". American Civil Liberties Union. Retrieved March 13, 2009.
  137. ^ a b "Bigger Monster, Weaker Chains: The Growth of an American Surveillance Society" (PDF). American Civil Liberties Union. January 15, 2003. Archived (PDF) from the original on October 9, 2022. Retrieved March 13, 2009.
  138. ^ "Privacy fears over online surveillance footage broadcasts in China". December 13, 2017.
  139. ^ Marx, Gary T.; Muschert, Glenn W. (2007). (PDF). Annual Review of Law and Social Science. 3: 375–395. doi:10.1146/annurev.lawsocsci.3.081806.112824. Archived from the original (PDF) on August 11, 2017.
  140. ^ a b Agre, Philip E. (2003), "Your Face is not a bar code: arguments against automatic face recognition in public places". Retrieved November 14, 2004.
  141. ^ Foucault, Michel (1979). Discipline and Punish. New York: Vintage Books. pp. 201–202. ISBN 9780394727677.
  142. ^ a b c d e Chayko, Mary (2017). Superconnected: the internet, digital media, and techno-social life. New York, NY: Sage Publications.
  143. ^ Nishiyama, Hidefumi (2017). "Surveillance as Race Struggle: On Browne's Dark Matters". Theory & Event. Johns Hopkins University Press. 20 (1): 280–285 – via Project MUSE.
  144. ^ Browne, Simone (October 2, 2015). Dark Matters: On the Surveillance of Blackness. Duke University Press Books. p. 224. ISBN 978-0822359197.
  145. ^ Court of Appeal, Second District, Division 6, California. (July 30, 2008). "People vs. Diaz". FindLaw. Retrieved February 1, 2017.{{cite web}}: CS1 maint: multiple names: authors list (link)
  146. ^ California Fourth District Court of Appeal (June 25, 2014). "Riley v. California". Oyez – IIT Chicago-Kent College of Law. Retrieved February 1, 2013.
  147. ^ "The Secrets of Countersurveillance". Security Weekly. June 6, 2007.
  148. ^ Birch, Dave (July 14, 2005). "The age of sousveillance". The Guardian. London. Retrieved August 6, 2007.
  149. ^ a b c Eggers, David (2013). The Circle. New York: Alfred A. Knopf, McSweeney's Books. pp. 288, 290–291, 486. ISBN 978-0-385-35139-3.

Further reading

  • Allmer, Thomas. (2012). Towards a Critical Theory of Surveillance in Informational Capitalism. Frankfurt am Main: Peter Lang. ISBN 978-3-631-63220-8
  • Andrejevic, Mark. 2007. iSpy: Surveillance and Power in the Interactive Era. Lawrence, KS: University Press of Kansas. ISBN 0700616861
  • Ball, Kirstie, Kevin D. Haggerty, and David Lyon, eds. (2012). Routledge Handbook of Surveillance Studies. New York: Routledge. ISBN 1138026026
  • Brayne, Sarah. (2020). Predict and Surveil: Data, Discretion, and the Future of Policing. New York: Oxford University Press. ISBN 0190684097
  • Browne, Simone. (2015). Dark Matters: On the Surveillance of Blackness. Durham: Duke University Press. ISBN 978-0822359197
  • Coleman, Roy, and Michael McCahill. 2011. Surveillance & Crime. Thousand Oaks, Calif.: Sage. ISBN 1847873537
  • Feldman, Jay. (2011). Manufacturing Hysteria: A History of Scapegoating, Surveillance, and Secrecy in Modern America. New York, NY: Pantheon Books. ISBN 0-375-42534-9
  • Fuchs, Christian, Kees Boersma, Anders Albrechtslund, and Marisol Sandoval, eds. (2012). "Internet and Surveillance: The Challenges of Web 2.0 and Social Media". New York: Routledge. ISBN 978-0-415-89160-8
  • Garfinkel, Simson, Database Nation; The Death of Privacy in the 21st Century. O'Reilly & Associates, Inc. ISBN 0-596-00105-3
  • Gilliom, John. (2001). Overseers of the Poor: Surveillance, Resistance, and the Limits of Privacy, University Of Chicago Press, ISBN 978-0-226-29361-5
  • Haque, Akhlaque. (2015). Surveillance, Transparency and Democracy: Public Administration in the Information Age. University of Alabama Press, Tuscaloosa, AL. ISBN 978-0-8173-1877-2
  • Harris, Shane. (2011). The Watchers: The Rise of America's Surveillance State. London, UK: Penguin Books Ltd. ISBN 0-14-311890-0
  • Hier, Sean P., & Greenberg, Joshua (Eds.). (2009). Surveillance: Power, Problems, and Politics. Vancouver, CA: UBC Press. ISBN 0-7748-1611-2
  • Jensen, Derrick and Draffan, George (2004) Welcome to the Machine: Science, Surveillance, and the Culture of Control Chelsea Green Publishing Company. ISBN 978-1-931498-52-4
  • Lewis, Randolph. (2017). Under Surveillance: Being Watched in Modern America. Austin: University of Texas Press. ISBN 1477312439
  • Lyon, David (2001). Surveillance Society: Monitoring in Everyday Life. Philadelphia: Open University Press. ISBN 978-0-335-20546-2
  • Lyon, David (Ed.). (2006). Theorizing Surveillance: The Panopticon and Beyond. Cullompton, UK: Willan Publishing. ISBN 978-1-84392-191-2
  • Lyon, David (2007) Surveillance Studies: An Overview. Cambridge: Polity Press. ISBN 978-0-7456-3591-0
  • Matteralt, Armand. (2010). The Globalization of Surveillance. Cambridge, UK: Polity Press. ISBN 0-7456-4511-9
  • Monahan, Torin, ed. (2006). Surveillance and Security: Technological Politics and Power in Everyday Life. New York: Routledge. ISBN 9780415953931
  • Monahan, Torin. (2010). Surveillance in the Time of Insecurity. New Brunswick: Rutgers University Press. ISBN 0813547652
  • Monahan, Torin, and David Murakami Wood, eds. (2018). Surveillance Studies: A Reader. New York: Oxford University Press. ISBN 978-0-190-29782-4
  • Parenti, Christian The Soft Cage: Surveillance in America From Slavery to the War on Terror, Basic Books, ISBN 978-0-465-05485-5
  • Petersen, J.K. (2012) Handbook of Surveillance Technologies, Third Edition, Taylor & Francis: CRC Press, 1020 pp., ISBN 978-1-439873-15-1
  • Staples, William G. (2000). Everyday Surveillance: Vigilance and Visibility in Post-Modern Life. Lanham, MD: Rowman & Littlefield Publishers. ISBN 0-7425-0077-2
  • Yan, W. (2019). Introduction to Intelligent Surveillance: Surveillance Data Capture, Transmission, and Analytics . Springer Publishers. ISBN 3030107124

General information

  • "Special Issue on Surveillance Capitalism – nine articles analyzing financial, social, political, legal, historical, security and other aspects of US and international surveillance and spying programs and their relation to capitalism". Monthly Review. 2014. (Volume 66, Number 3, July–August)
  • ACLU, "The Surveillance-Industrial Complex: How the American Government Is Conscripting Businesses and Individuals in the Construction of a Surveillance Society"
  • Balkin, Jack M. (2008). "The Constitution in the National Surveillance State", Yale Law School
  • EFF Privacy Resources
  • EPIC Privacy Resources
  • Privacy Information Center February 21, 2009, at the Wayback Machine
  • "The NSA Files (Dozens of articles about the U.S. National Security Agency and its spying and surveillance programs)". The Guardian. London. June 8, 2013.

Historical information

  • COINTELPRO—FBI counterintelligence programs designed to neutralize political dissidents
  • – A Short History of Electronic Surveillance in the United States

Legal resources

  • EFF Legal Cases

External links

  •   Media related to Surveillance at Wikimedia Commons

surveillance, this, article, about, surveillance, security, health, surveillance, health, surveillance, electronic, surveillance, redirects, here, surveillance, electronic, computer, systems, computer, network, surveillance, monitoring, behavior, many, activit. This article is about surveillance in security For health surveillance see Health surveillance Electronic surveillance redirects here For surveillance of electronic computer systems see Computer and network surveillance Surveillance is the monitoring of behavior many activities or information for the purpose of information gathering influencing managing or directing 1 2 This can include observation from a distance by means of electronic equipment such as closed circuit television CCTV or interception of electronically transmitted information like Internet traffic It can also include simple technical methods such as human intelligence gathering and postal interception Surveillance cameras Surveillance Camera to support the Washington DC Police Surveillance is used by citizens for protecting their neighborhoods And by governments for intelligence gathering including espionage prevention of crime the protection of a process person group or object or the investigation of crime It is also used by criminal organizations to plan and commit crimes and by businesses to gather intelligence on criminals their competitors suppliers or customers Religious organisations charged with detecting heresy and heterodoxy may also carry out surveillance 3 Auditors carry out a form of surveillance 4 A byproduct of surveillance is that it can unjustifiably violate people s privacy and is often criticized by civil liberties activists 5 Liberal democracies may have laws that seek to restrict governmental and private use of surveillance whereas authoritarian governments seldom have any domestic restrictions Espionage is by definition covert and typically illegal according to the rules of the observed party whereas most types of surveillance are overt and are considered legitimate International espionage seems to be common among all types of countries 6 7 Contents 1 Methods 1 1 Computer 1 2 Telephones 1 3 Cameras 1 4 Social network analysis 1 5 Biometric 1 6 Aerial 1 7 Corporate 1 8 Data mining and profiling 1 9 Human operatives 1 10 Satellite imagery 1 11 Identification and credentials 1 12 Wireless Tracking 1 12 1 Mobile phones 1 12 2 RFID tagging 1 12 3 RFID tagging on humans 1 13 Radar 1 14 Geolocation devices 1 14 1 Global Positioning System 1 15 Devices 1 16 Postal services 1 17 Stakeout 1 18 Internet of things 2 Controversy 2 1 Support 2 2 Opposition 2 2 1 Totalitarianism 2 2 2 Psychological social effects 2 2 3 Privacy 2 2 4 Court cases 3 Countersurveillance inverse surveillance sousveillance 4 Popular culture 4 1 In literature 4 2 In music 4 3 Onscreen 5 See also 6 References 7 Further reading 7 1 General information 7 2 Historical information 7 3 Legal resources 8 External linksMethods EditComputer Edit Official seal of the Information Awareness Office a U S agency which developed technologies for mass surveillance Main article Computer surveillance The vast majority of computer surveillance involves the monitoring of data and traffic on the Internet 8 In the United States for example under the Communications Assistance For Law Enforcement Act all phone calls and broadband Internet traffic emails web traffic instant messaging etc are required to be available for unimpeded real time monitoring by federal law enforcement agencies 9 10 11 There is far too much data on the Internet for human investigators to manually search through all of it Therefore automated Internet surveillance computers sift through the vast amount of intercepted Internet traffic to identify and report to human investigators the traffic that is considered interesting or suspicious This process is regulated by targeting certain trigger words or phrases visiting certain types of web sites or communicating via email or online chat with suspicious individuals or groups 12 Billions of dollars per year are spent by agencies such as the NSA the FBI and the now defunct Information Awareness Office to develop purchase implement and operate systems such as Carnivore NarusInsight and ECHELON to intercept and analyze all of this data to extract only the information which is useful to law enforcement and intelligence agencies 13 Computers can be a surveillance target because of the personal data stored on them If someone is able to install software such as the FBI s Magic Lantern and CIPAV on a computer system they can easily gain unauthorized access to this data Such software could be installed physically or remotely 14 Another form of computer surveillance known as van Eck phreaking involves reading electromagnetic emanations from computing devices in order to extract data from them at distances of hundreds of meters 15 16 The NSA runs a database known as Pinwale which stores and indexes large numbers of emails of both American citizens and foreigners 17 18 Additionally the NSA runs a program known as PRISM which is a data mining system that gives the United States government direct access to information from technology companies Through accessing this information the government is able to obtain search history emails stored information live chats file transfers and more This program generated huge controversies in regards to surveillance and privacy especially from U S citizens 19 20 Telephones Edit Main articles Phone surveillance and Lawful interception The official and unofficial tapping of telephone lines is widespread In the United States for instance the Communications Assistance For Law Enforcement Act CALEA requires that all telephone and VoIP communications be available for real time wiretapping by Federal law enforcement and intelligence agencies 9 10 11 Two major telecommunications companies in the U S AT amp T Inc and Verizon have contracts with the FBI requiring them to keep their phone call records easily searchable and accessible for Federal agencies in return for 1 8 million per year 21 Between 2003 and 2005 the FBI sent out more than 140 000 National Security Letters ordering phone companies to hand over information about their customers calling and Internet histories About half of these letters requested information on U S citizens 22 Human agents are not required to monitor most calls Speech to text software creates machine readable text from intercepted audio which is then processed by automated call analysis programs such as those developed by agencies such as the Information Awareness Office or companies such as Verint and Narus which search for certain words or phrases to decide whether to dedicate a human agent to the call 23 Law enforcement and intelligence services in the United Kingdom and the United States possess technology to activate the microphones in cell phones remotely by accessing phones diagnostic or maintenance features in order to listen to conversations that take place near the person who holds the phone 24 25 26 27 28 29 The StingRay tracker is an example of one of these tools used to monitor cell phone usage in the United States and the United Kingdom Originally developed for counterterrorism purposes by the military they work by broadcasting powerful signals that cause nearby cell phones to transmit their IMSI number just as they would to normal cell phone towers Once the phone is connected to the device there is no way for the user to know that they are being tracked The operator of the stingray is able to extract information such as location phone calls and text messages but it is widely believed that the capabilities of the StingRay extend much further A lot of controversy surrounds the StingRay because of its powerful capabilities and the secrecy that surrounds it 30 Mobile phones are also commonly used to collect location data The geographical location of a mobile phone and thus the person carrying it can be determined easily even when the phone is not being used using a technique known as multilateration to calculate the differences in time for a signal to travel from the cell phone to each of several cell towers near the owner of the phone 31 32 The legality of such techniques has been questioned in the United States in particular whether a court warrant is required 33 Records for one carrier alone Sprint showed that in a given year federal law enforcement agencies requested customer location data 8 million times 34 The headquarters of UK intelligence activities is Government Communications Headquarters Cheltenham England 2017 In response to customers privacy concerns in the post Edward Snowden era 35 Apple s iPhone 6 has been designed to disrupt investigative wiretapping efforts The phone encrypts e mails contacts and photos with a code generated by a complex mathematical algorithm that is unique to an individual phone and is inaccessible to Apple 36 The encryption feature on the iPhone 6 has drawn criticism from FBI director James B Comey and other law enforcement officials since even lawful requests to access user content on the iPhone 6 will result in Apple supplying gibberish data that requires law enforcement personnel to either break the code themselves or to get the code from the phone s owner 36 Because the Snowden leaks demonstrated that American agencies can access phones anywhere in the world privacy concerns in countries with growing markets for smart phones have intensified providing a strong incentive for companies like Apple to address those concerns in order to secure their position in the global market 36 Although the CALEA requires telecommunication companies to build into their systems the ability to carry out a lawful wiretap the law has not been updated to address the issue of smart phones and requests for access to e mails and metadata 37 The Snowden leaks show that the NSA has been taking advantage of this ambiguity in the law by collecting metadata on at least hundreds of millions of incidental targets from around the world 37 The NSA uses an analytic tool known as CO TRAVELER in order to track people whose movements intersect and to find any hidden connections with persons of interest 37 The Snowden leaks have also revealed that the British Government Communications Headquarters GCHQ can access information collected by the NSA on American citizens Once the data has been collected the GCHQ can hold on to it for up to two years The deadline can be extended with the permission of a senior UK official 38 39 Cameras Edit Main article Closed circuit television A surveillance camera in Cairns Queensland Surveillance cameras such as these are installed by the millions in many countries and are nowadays monitored by automated computer programs instead of humans Surveillance cameras or security cameras are video cameras used for the purpose of observing an area They are often connected to a recording device or IP network and may be watched by a security guard or law enforcement officer Cameras and recording equipment used to be relatively expensive and required human personnel to monitor camera footage but analysis of footage has been made easier by automated software that organizes digital video footage into a searchable database and by video analysis software such as VIRAT and HumanID The amount of footage is also drastically reduced by motion sensors which record only when motion is detected With cheaper production techniques surveillance cameras are simple and inexpensive enough to be used in home security systems and for everyday surveillance Video cameras are one of the most common methods of surveillance 40 As of 2016 there are about 350 million surveillance cameras worldwide About 65 of these cameras are installed in Asia The growth of CCTV has been slowing in recent years 41 In 2018 China was reported to have a huge surveillance network of over 170 million CCTV cameras with 400 million new cameras expected to be installed in the next three years many of which use facial recognition technology 42 In the United States the Department of Homeland Security awards billions of dollars per year in Homeland Security grants for local state and federal agencies to install modern video surveillance equipment For example the city of Chicago Illinois recently used a 5 1 million Homeland Security grant to install an additional 250 surveillance cameras and connect them to a centralized monitoring center along with its preexisting network of over 2000 cameras in a program known as Operation Virtual Shield Speaking in 2009 Chicago Mayor Richard Daley announced that Chicago would have a surveillance camera on every street corner by 2016 43 44 New York City received a 350 million grant towards the development of the Domain Awareness System 45 which is an interconnected system of sensors including 18 000 CCTV cameras used for continual surveillance of the city 46 by both police officers and artificial intelligence systems 45 In the United Kingdom the vast majority of video surveillance cameras are not operated by government bodies but by private individuals or companies especially to monitor the interiors of shops and businesses According to 2011 Freedom of Information Act requests the total number of local government operated CCTV cameras was around 52 000 over the entirety of the UK 47 The prevalence of video surveillance in the UK is often overstated due to unreliable estimates being requoted 48 49 for example one report in 2002 extrapolated from a very small sample to estimate the number of cameras in the UK at 4 2 million of which 500 000 were in Greater London 50 More reliable estimates put the number of private and local government operated cameras in the United Kingdom at around 1 85 million in 2011 51 In the Netherlands one example city where there are cameras is The Hague There cameras are placed in city districts in which the most illegal activity is concentrated Examples are the red light districts and the train stations 52 As part of China s Golden Shield Project several U S corporations including IBM General Electric and Honeywell have been working closely with the Chinese government to install millions of surveillance cameras throughout China along with advanced video analytics and facial recognition software which will identify and track individuals everywhere they go They will be connected to a centralized database and monitoring station which will upon completion of the project contain a picture of the face of every person in China over 1 3 billion people 53 Lin Jiang Huai the head of China s Information Security Technology office which is in charge of the project credits the surveillance systems in the United States and the U K as the inspiration for what he is doing with the Golden Shield Project 53 A payload surveillance camera manufactured by Controp and distributed to the U S government by ADI Technologies The Defense Advanced Research Projects Agency DARPA is funding a research project called Combat Zones That See that will link up cameras across a city to a centralized monitoring station identify and track individuals and vehicles as they move through the city and report suspicious activity such as waving arms looking side to side standing in a group etc 54 At Super Bowl XXXV in January 2001 police in Tampa Florida used Identix s facial recognition software FaceIt to scan the crowd for potential criminals and terrorists in attendance at the event 55 it found 19 people with pending arrest warrants 56 Governments often 57 initially claim that cameras are meant to be used for traffic control but many of them end up using them for general surveillance For example Washington D C had 5 000 traffic cameras installed under this premise and then after they were all in place networked them all together and then granted access to the Metropolitan Police Department so they could perform day to day monitoring 58 The development of centralized networks of CCTV cameras watching public areas linked to computer databases of people s pictures and identity biometric data able to track people s movements throughout the city and identify whom they have been with has been argued by some to present a risk to civil liberties 59 Trapwire is an example of such a network 60 Social network analysis Edit A graph of the relationships between users on the social networking site Facebook Social network analysis enables governments to gather detailed information about peoples friends family and other contacts Since much of this information is voluntarily made public by the users themselves it is often considered to be a form of open source intelligence One common form of surveillance is to create maps of social networks based on data from social networking sites such as Facebook MySpace Twitter as well as from traffic analysis information from phone call records such as those in the NSA call database 61 and others These social network maps are then data mined to extract useful information such as personal interests friendships amp affiliations wants beliefs thoughts and activities 62 63 64 Many U S government agencies such as the Defense Advanced Research Projects Agency DARPA the National Security Agency NSA and the Department of Homeland Security DHS are investing heavily in research involving social network analysis 65 66 The intelligence community believes that the biggest threat to U S power comes from decentralized leaderless geographically dispersed groups of terrorists subversives extremists and dissidents These types of threats are most easily countered by finding important nodes in the network and removing them To do this requires a detailed map of the network 67 68 69 Jason Ethier of Northeastern University in his study of modern social network analysis said the following of the Scalable Social Network Analysis Program developed by the Information Awareness Office The purpose of the SSNA algorithms program is to extend techniques of social network analysis to assist with distinguishing potential terrorist cells from legitimate groups of people In order to be successful SSNA will require information on the social interactions of the majority of people around the globe Since the Defense Department cannot easily distinguish between peaceful citizens and terrorists it will be necessary for them to gather data on innocent civilians as well as on potential terrorists Jason Ethier 64 AT amp T developed a programming language called Hancock which is able to sift through enormous databases of phone call and Internet traffic records such as the NSA call database and extract communities of interest groups of people who call each other regularly or groups that regularly visit certain sites on the Internet AT amp T originally built the system to develop marketing leads 70 but the FBI has regularly requested such information from phone companies such as AT amp T without a warrant 70 and after using the data stores all information received in its own databases regardless of whether or not the information was ever useful in an investigation 71 Some people believe that the use of social networking sites is a form of participatory surveillance where users of these sites are essentially performing surveillance on themselves putting detailed personal information on public websites where it can be viewed by corporations and governments 62 In 2008 about 20 of employers reported using social networking sites to collect personal data on prospective or current employees 72 Biometric Edit Fingerprints being scanned as part of the US VISIT program Main article Biometrics Biometric surveillance is a technology that measures and analyzes human physical and or behavioral characteristics for authentication identification or screening purposes 73 Examples of physical characteristics include fingerprints DNA and facial patterns Examples of mostly behavioral characteristics include gait a person s manner of walking or voice Facial recognition is the use of the unique configuration of a person s facial features to accurately identify them usually from surveillance video Both the Department of Homeland Security and DARPA are heavily funding research into facial recognition systems 74 The Information Processing Technology Office ran a program known as Human Identification at a Distance which developed technologies that are capable of identifying a person at up to 500 ft 150 m by their facial features Another form of behavioral biometrics based on affective computing involves computers recognizing a person s emotional state based on an analysis of their facial expressions how fast they are talking the tone and pitch of their voice their posture and other behavioral traits This might be used for instance to see if a person s behavior is suspect looking around furtively tense or angry facial expressions waving arms etc 75 A more recent development is DNA profiling which looks at some of the major markers in the body s DNA to produce a match The FBI is spending 1 billion to build a new biometric database which will store DNA facial recognition data iris retina eye data fingerprints palm prints and other biometric data of people living in the United States The computers running the database are contained in an underground facility about the size of two American football fields 76 77 78 The Los Angeles Police Department is installing automated facial recognition and license plate recognition devices in its squad cars and providing handheld face scanners which officers will use to identify people while on patrol 79 80 81 Facial thermographs are in development which allow machines to identify certain emotions in people such as fear or stress by measuring the temperature generated by blood flow to different parts of the face 82 Law enforcement officers believe that this has potential for them to identify when a suspect is nervous which might indicate that they are hiding something lying or worried about something 82 In his paper in Ethics and Information Technology Avi Marciano maps the harms caused by biometric surveillance traces their theoretical origins and brings these harms together in one integrative framework to elucidate their cumulative power Marciano proposes four types of harms Unauthorized use of bodily information denial or limitation of access to physical spaces bodily social sorting and symbolic ineligibility through construction of marginality and otherness Biometrics social power according to Marciano derives from three main features their complexity as enigmatic technologies their objective scientific image and their increasing agency particularly in the context of automatic decision making Aerial Edit Further information Surveillance aircraft Micro Air Vehicle with attached surveillance camera Aerial surveillance is the gathering of surveillance usually visual imagery or video from an airborne vehicle such as an unmanned aerial vehicle helicopter or spy plane Military surveillance aircraft use a range of sensors e g radar to monitor the battlefield Digital imaging technology miniaturized computers and numerous other technological advances over the past decade have contributed to rapid advances in aerial surveillance hardware such as micro aerial vehicles forward looking infrared and high resolution imagery capable of identifying objects at extremely long distances For instance the MQ 9 Reaper 83 a U S drone plane used for domestic operations by the Department of Homeland Security carries cameras that are capable of identifying an object the size of a milk carton from altitudes of 30 000 feet 9 1 km and has forward looking infrared devices that can detect the heat from a human body at distances of up to 60 kilometers 37 mi 84 In an earlier instance of commercial aerial surveillance the Killington Mountain ski resort hired eye in the sky aerial photography of its competitors parking lots to judge the success of its marketing initiatives as it developed starting in the 1950s 85 HART program concept drawing from official IPTO DARPA official website The United States Department of Homeland Security is in the process of testing UAVs to patrol the skies over the United States for the purposes of critical infrastructure protection border patrol transit monitoring and general surveillance of the U S population 86 Miami Dade police department ran tests with a vertical take off and landing UAV from Honeywell which is planned to be used in SWAT operations 87 Houston s police department has been testing fixed wing UAVs for use in traffic control 87 The United Kingdom as well is working on plans to build up a fleet of surveillance UAVs ranging from micro aerial vehicles to full size drones to be used by police forces throughout the U K 88 In addition to their surveillance capabilities MAVs are capable of carrying tasers for crowd control or weapons for killing enemy combatants 89 Programs such as the Heterogeneous Aerial Reconnaissance Team program developed by DARPA have automated much of the aerial surveillance process They have developed systems consisting of large teams drone planes that pilot themselves automatically decide who is suspicious and how to go about monitoring them coordinate their activities with other drones nearby and notify human operators if something suspicious is occurring This greatly increases the amount of area that can be continuously monitored while reducing the number of human operators required Thus a swarm of automated self directing drones can automatically patrol a city and track suspicious individuals reporting their activities back to a centralized monitoring station 90 91 92 In addition researchers also investigate possibilities of autonomous surveillance by large groups of micro aerial vehicles stabilized by decentralized bio inspired swarming rules 93 94 Corporate Edit Main article Corporate surveillance Corporate surveillance is the monitoring of a person or group s behavior by a corporation The data collected is most often used for marketing purposes or sold to other corporations but is also regularly shared with government agencies It can be used as a form of business intelligence which enables the corporation to better tailor their products and or services to be desirable by their customers Although there is a common belief that monitoring can increase productivity it can also create consequences such as increasing chances of deviant behavior and creating punishments that are not equitable to their actions Additionally monitoring can cause resistance and backlash because it insinuates an employer s suspicion and lack of trust 95 Data mining and profiling Edit Data mining is the application of statistical techniques and programmatic algorithms to discover previously unnoticed relationships within the data Data profiling in this context is the process of assembling information about a particular individual or group in order to generate a profile that is a picture of their patterns and behavior Data profiling can be an extremely powerful tool for psychological and social network analysis A skilled analyst can discover facts about a person that they might not even be consciously aware of themselves 96 Economic such as credit card purchases and social such as telephone calls and emails transactions in modern society create large amounts of stored data and records In the past this data was documented in paper records leaving a paper trail or was simply not documented at all Correlation of paper based records was a laborious process it required human intelligence operators to manually dig through documents which was time consuming and incomplete at best But today many of these records are electronic resulting in an electronic trail Every use of a bank machine payment by credit card use of a phone card call from home checked out library book rented video or otherwise complete recorded transaction generates an electronic record Public records such as birth court tax and other records are increasingly being digitized and made available online In addition due to laws like CALEA web traffic and online purchases are also available for profiling Electronic record keeping makes data easily collectable storable and accessible so that high volume efficient aggregation and analysis is possible at significantly lower costs Information relating to many of these individual transactions is often easily available because it is generally not guarded in isolation since the information such as the title of a movie a person has rented might not seem sensitive However when many such transactions are aggregated they can be used to assemble a detailed profile revealing the actions habits beliefs locations frequented social connections and preferences of the individual This profile is then used by programs such as ADVISE 97 and TALON to determine whether the person is a military criminal or political threat In addition to its own aggregation and profiling tools the government is able to access information from third parties for example banks credit companies or employers etc by requesting access informally by compelling access through the use of subpoenas or other procedures 98 or by purchasing data from commercial data aggregators or data brokers The United States has spent 370 million on its 43 planned fusion centers which are national network of surveillance centers that are located in over 30 states The centers will collect and analyze vast amounts of data on U S citizens It will get this data by consolidating personal information from sources such as state driver s licensing agencies hospital records criminal records school records credit bureaus banks etc and placing this information in a centralized database that can be accessed from all of the centers as well as other federal law enforcement and intelligence agencies 99 Under United States v Miller 1976 data held by third parties is generally not subject to Fourth Amendment warrant requirements Human operatives Edit A tail may surreptitiously track and report on the movements and contacts of a person of interest Such following by one or more people may provide useful in formation in relatively densely populated urban environments 100 Organizations that have enemies who wish to gather information about the groups members or activities face the issue of potential infiltration 101 In addition to operatives infiltrating an organization the surveilling party may exert pressure on certain members of the target organization to act as informants i e to disclose the information they hold on the organization and its members 102 103 Fielding operatives is very expensive and governments with wide reaching electronic surveillance tools at their disposal rather than gathering the sort of information which operatives can provide may use less problematic forms of surveillance such as those mentioned above Nevertheless the use of human infiltrators remains common For instance in 2007 documents surfaced showing that the FBI planned to field a total of 15 000 undercover agents and informants in response to an anti terrorism directive issued by President George W Bush in 2004 that ordered intelligence and law enforcement agencies to increase their HUMINT capabilities 104 Satellite imagery Edit Main article Reconnaissance satellite On May 25 2007 the U S Director of National Intelligence Michael McConnell authorized the National Applications Office NAO of the Department of Homeland Security to allow local state and domestic Federal agencies to access imagery from military intelligence Reconnaissance satellites and Reconnaissance aircraft sensors which can now be used to observe the activities of U S citizens The satellites and aircraft sensors will be able to penetrate cloud cover detect chemical traces and identify objects in buildings and underground bunkers and will provide real time video at much higher resolutions than the still images produced by programs such as Google Earth 105 106 107 108 109 110 Identification and credentials Edit A card containing an identification number One of the simplest forms of identification is the carrying of credentials Some nations have an identity card system to aid identification whilst others are considering it but face public opposition Other documents such as passports driver s licenses library cards banking or credit cards are also used to verify identity If the form of the identity card is machine readable usually using an encoded magnetic stripe or identification number such as a Social Security number it corroborates the subject s identifying data In this case it may create an electronic trail when it is checked and scanned which can be used in profiling as mentioned above Wireless Tracking Edit This section refers to methods that involve the monitoring of tracking devices through the aid of wireless signals Mobile phones Edit Mobile carrier antennas are also commonly used to collect geolocation data on mobile phones The geographical location of a powered mobile phone and thus the person carrying it can be determined easily whether it is being used or not using a technique known as multilateration to calculate the differences in time for a signal to travel from the cell phone to each of several cell towers near the owner of the phone 31 32 Dr Victor Kappeler 111 of Eastern Kentucky University indicates that police surveillance is a strong concern stating the following statistics from 2013 Of the 321 545 law enforcement requests made to Verizon 54 200 of these requests were for content or location information not just cell phone numbers or IP addresses Content information included the actual text of messages emails and the wiretapping of voice or messaging content in real time A comparatively new off the shelf surveillance device is an IMSI catcher a telephone eavesdropping device used to intercept mobile phone traffic and track the movement of mobile phone users Essentially a fake mobile tower acting between the target mobile phone and the service provider s real towers it is considered a man in the middle MITM attack IMSI catchers are used in some countries by law enforcement and intelligence agencies but their use has raised significant civil liberty and privacy concerns and is strictly regulated in some countries 112 In March 2020 British daily The Guardian based on the claims of a whistleblower accused the government of Saudi Arabia of exploiting global mobile telecom network weaknesses to spy on its citizens traveling around the United States 113 The data shared by the whistleblower in support of the claims showed that a systematic spying campaign was being run by the kingdom exploiting the flaws of SS7 a global messaging system The data showed that millions of secret tracking commands originated from Saudi in a duration of four months starting from November 2019 114 RFID tagging Edit RFID chip pulled from a new credit card Radio Frequency Identification RFID tagging is the use of very small electronic devices called RFID tags which are applied to or incorporated into a product animal or person for the purpose of identification and tracking using radio waves The tags can be read from several meters away They are extremely inexpensive costing a few cents per piece so they can be inserted into many types of everyday products without significantly increasing the price and can be used to track and identify these objects for a variety of purposes Some companies appear to be tagging their workers by incorporating RFID tags in employee ID badges Workers in U K considered strike action in protest of having themselves tagged they felt that it was dehumanizing to have all of their movements tracked with RFID chips 115 vague Some critics have expressed fears that people will soon be tracked and scanned everywhere they go 116 On the other hand RFID tags in newborn baby ID bracelets put on by hospitals have foiled kidnappings 115 In a 2003 editorial CNET News com s chief political correspondent Declan McCullagh speculated that soon every object that is purchased and perhaps ID cards will have RFID devices in them which would respond with information about people as they walk past scanners what type of phone they have what type of shoes they have on which books they are carrying what credit cards or membership cards they have etc This information could be used for identification tracking or targeted marketing As of 2021 update this has largely not come to pass 117 RFID tagging on humans Edit Main article Microchip implant human Hand with planned insertion point for Verichip device A human microchip implant is an identifying integrated circuit device or RFID transponder encased in silicate glass and implanted in the body of a human being A subdermal implant typically contains a unique ID number that can be linked to information contained in an external database such as personal identification medical history medications allergies and contact information Several types of microchips have been developed in order to control and monitor certain types of people such as criminals political figures and spies clarification needed a killer tracking chip patent was filed at the German Patent and Trademark Office DPMA around May 2009 Verichip is an RFID device produced by a company called Applied Digital Solutions ADS Verichip is slightly larger than a grain of rice and is injected under the skin The injection reportedly feels similar to receiving a shot The chip is encased in glass and stores a VeriChip Subscriber Number which the scanner uses to access their personal information via the Internet from Verichip Inc s database the Global VeriChip Subscriber Registry Thousands of people have already had them inserted 116 In Mexico for example 160 workers at the Attorney General s office were required to have the chip injected for identity verification and access control purposes 118 119 Implantable microchips have also been used in healthcare settings but ethnographic researchers have identified a number of ethical problems with such uses these problems include unequal treatment diminished trust and possible endangerment of patients 120 Radar Edit This section is an excerpt from Perimeter surveillance radar edit Perimeter surveillance radar PSR is a class of radar sensors that monitor activity surrounding or on critical infrastructure areas such as airports 121 seaports military installations national borders refineries and other critical industry and the like Such radars are characterized by their ability to detect movement at ground level of targets such as an individual walking or crawling towards a facility Such radars typically have ranges of several hundred metres to over 10 kilometres 122 Alternate technologies include laser based systems These have the potential for very high target position accuracy however they are less effective in the presence of fog and other obscurants Geolocation devices Edit Global Positioning System Edit Diagram of GPS satellites orbiting Earth See also GPS tracking In the U S police have planted hidden GPS tracking devices in people s vehicles to monitor their movements 123 without a warrant 124 In early 2009 they were arguing in court that they have the right to do this 125 Several cities are running pilot projects to require parolees to wear GPS devices to track their movements when they get out of prison 126 Devices Edit See also United States v Spy Factory Inc Covert listening devices and video devices or bugs are hidden electronic devices which are used to capture record and or transmit data to a receiving party such as a law enforcement agency The U S has run numerous domestic intelligence operations such as COINTELPRO which have bugged the homes offices and vehicles of thousands of U S citizens usually political activists subversives and criminals 127 Law enforcement and intelligence services in the U K and the United States possess technology to remotely activate the microphones in cell phones by accessing the phone s diagnostic maintenance features in order to listen to conversations that take place nearby the person who holds the phone 25 26 27 Postal services Edit As more people use faxes and e mail the significance of surveilling the postal system is decreasing in favor of Internet and telephone surveillance But interception of post is still an available option for law enforcement and intelligence agencies in certain circumstances 128 This is not a common practice however and entities like the US Army require high levels of approval to conduct 129 The U S Central Intelligence Agency and Federal Bureau of Investigation have performed twelve separate mail opening campaigns targeted towards U S citizens In one of these programs more than 215 000 communications were intercepted opened and photographed 130 131 Stakeout Edit Stakeout redirects here For other uses see Stakeout disambiguation A stakeout is the coordinated surveillance of a location or person Stakeouts are generally performed covertly and for the purpose of gathering evidence related to criminal activity The term derives from the practice by land surveyors of using survey stakes to measure out an area before the main building project begins Internet of things Edit The Internet of Things IoT is a term that refers to the future of technology in which data can be collected without human and computer interaction IoTs can be used for identification monitoring location tracking and health tracking 132 While IoTs have the benefit of being a time saving tool that makes activities simpler they raise the concern of government surveillance and privacy regarding how data will be used 132 Controversy Edit Graffiti expressing concern about the proliferation of video surveillance Support Edit Supporters of surveillance systems believe that these tools can help protect society from terrorists and criminals They argue that surveillance can reduce crime by three means by deterrence by observation and by reconstruction Surveillance can deter by increasing the chance of being caught and by revealing the modus operandi This requires a minimal level of invasiveness 133 Another method on how surveillance can be used to fight criminal activity is by linking the information stream obtained from them to a recognition system for instance a camera system that has its feed run through a facial recognition system This can for instance auto recognize fugitives and direct police to their location A distinction here has to be made however on the type of surveillance employed Some people that say support video surveillance in city streets may not support indiscriminate telephone taps and vice versa Besides the types the way in how this surveillance is done also matters a lot i e indiscriminate telephone taps are supported by much fewer people than say telephone taps done only to people suspected of engaging in illegal activities Surveillance can also be used to give human operatives a tactical advantage through improved situational awareness or through the use of automated processes i e video analytics Surveillance can help reconstruct an incident and prove guilt through the availability of footage for forensics experts Surveillance can also influence subjective security if surveillance resources are visible or if the consequences of surveillance can be felt Some of the surveillance systems such as the camera system that has its feed run through a facial recognition system mentioned above can also have other uses besides countering criminal activity For instance it can help on retrieving runaway children abducted or missing adults and mentally disabled people Other supporters simply believe that there is nothing that can be done about the loss of privacy and that people must become accustomed to having no privacy As Sun Microsystems CEO Scott McNealy said You have zero privacy anyway Get over it 134 135 Another common argument is If you aren t doing something wrong then you don t have anything to fear Which follows that if one is engaging in unlawful activities in which case they do not have a legitimate justification for their privacy However if they are following the law the surveillance would not affect them 136 Opposition Edit Surveillance lamppost brought down in Hong Kong by citizens fearing state surveillance An elaborate graffito in Columbus Ohio depicting state surveillance of telecommunications With the advent of programs such as the Total Information Awareness program and ADVISE technologies such as high speed surveillance computers and biometrics software and laws such as the Communications Assistance for Law Enforcement Act governments now possess an unprecedented ability to monitor the activities of their subjects 137 Many civil rights and privacy groups such as the Electronic Frontier Foundation and American Civil Liberties Union have expressed concern that by allowing continual increases in government surveillance of citizens we will end up in a mass surveillance society with extremely limited or non existent political and or personal freedoms Fears such as this have led to numerous lawsuits such as Hepting v AT amp T 137 138 Some critics state that the claim made by supporters should be modified to read As long as we do what we re told we have nothing to fear For instance a person who is part of a political group which opposes the policies of the national government might not want the government to know their names and what they have been reading so that the government cannot easily subvert their organization arrest or kill them Other critics state that while a person might not have anything to hide right now the government might later implement policies that they do wish to oppose and that opposition might then be impossible due to mass surveillance enabling the government to identify and remove political threats Further other critics point to the fact that most people do have things to hide For example if a person is looking for a new job they might not want their current employer to know this Also if an employer wishes total privacy to watch over their own employee and secure their financial information it may become impossible and they may not wish to hire those under surveillance In December 2017 the Government of China took steps to oppose widespread surveillance by security company cameras webcams and IP cameras after tens of thousands were made accessible for internet viewing by IT company Qihoo 139 Totalitarianism Edit A traffic camera atop a high pole oversees a road in the Canadian city of Toronto Programs such as the Total Information Awareness program and laws such as the Communications Assistance For Law Enforcement Act have led many groups to fear that society is moving towards a state of mass surveillance with severely limited personal social political freedoms where dissenting individuals or groups will be strategically removed in COINTELPRO like purges 137 138 Kate Martin of the Center For National Security Studies said of the use of military spy satellites being used to monitor the activities of U S citizens They are laying the bricks one at a time for a police state 109 Some point to the blurring of lines between public and private places and the privatization of places traditionally seen as public such as shopping malls and industrial parks as illustrating the increasing legality of collecting personal information 140 Traveling through many public places such as government offices is hardly optional for most people yet consumers have little choice but to submit to companies surveillance practices 141 Surveillance techniques are not created equal among the many biometric identification technologies for instance face recognition requires the least cooperation Unlike automatic fingerprint reading which requires an individual to press a finger against a machine this technique is subtle and requires little to no consent 141 Psychological social effects Edit See also Hawthorne effect Some critics such as Michel Foucault believe that in addition to its obvious function of identifying and capturing individuals who are committing undesirable acts surveillance also functions to create in everyone a feeling of always being watched so that they become self policing This allows the State to control the populace without having to resort to physical force which is expensive and otherwise problematic 142 With the development of digital technology individuals have become increasingly perceptible to one another as surveillance becomes virtual Online surveillance is the utilization of the internet to observe one s activity 143 Corporations citizens and governments participate in tracking others behaviours for motivations that arise out of business relations to curiosity to legality In her book Superconnected Mary Chayko differentiates between two types of surveillance vertical and horizontal 143 Vertical surveillance occurs when there is a dominant force such as the government that is attempting to control or regulate the actions of a given society Such powerful authorities often justify their incursions as a means to protect society from threats of violence or terrorism Some individuals question when this becomes an infringement on civil rights 143 Horizontal diverges from vertical surveillance as the tracking shifts from an authoritative source to an everyday figure such as a friend coworker or stranger that is interested in one s mundane activities 143 Individuals leave traces of information when they are online that reveal their interests and desires of which others observe While this can allow people to become interconnected and develop social connections online it can also increase potential risk to harm such as cyberbullying or censoring stalking by strangers reducing privacy 143 In addition Simone Browne argues that surveillance wields an immense racializing quality such that it operates as racializing surveillance Browne uses racializing surveillance to refer to moments when enactments of surveillance are used to reify boundaries borders and bodies along racial lines and where the outcome is discriminatory treatment of those who are negatively racialized by such surveillance Browne argues racializing surveillance pertains to policing what is in or out of place 144 145 Privacy Edit Numerous civil rights groups and privacy groups oppose surveillance as a violation of people s right to privacy Such groups include Electronic Privacy Information Center Electronic Frontier Foundation American Civil Liberties Union and Privacy International There have been several lawsuits such as Hepting v AT amp T and EPIC v Department of Justice by groups or individuals opposing certain surveillance activities Legislative proceedings such as those that took place during the Church Committee which investigated domestic intelligence programs such as COINTELPRO have also weighed the pros and cons of surveillance Court cases Edit People vs Diaz 2011 was a court case in the realm of cell phone privacy even though the decision was later overturned In this case Gregory Diaz was arrested during a sting operation for attempting to sell ecstasy During his arrest police searched Diaz s phone and found more incriminating evidence including SMS text messages and photographs depicting illicit activities During his trial Diaz attempted to have the information from his cell phone removed from evidence but the courts deemed it as lawful and Diaz s appeal was denied on the California State Court level and later the Supreme Court level Just three short years after this decision was overturned in the case Riley vs California 2014 146 Riley vs California 2014 was a U S Supreme Court case in which a man was arrested for his involvement in a drive by shooting A few days after the shooting the police made an arrest of the suspect Riley and during the arrest the police searched him However this search was not only of Riley s person but also the police opened and searched his cell phone finding pictures of other weapons drugs and of Riley showing gang signs In court the question arose whether searching the phone was lawful or if the search was protected by the 4th amendment of the constitution The decision held that the search of Riley s cell phone during the arrest was illegal and that it was protected by the 4th Amendment 147 Countersurveillance inverse surveillance sousveillance EditCountersurveillance is the practice of avoiding surveillance or making surveillance difficult Developments in the late twentieth century have caused counter surveillance to dramatically grow in both scope and complexity such as the Internet increasing prevalence of electronic security systems high altitude and possibly armed UAVs and large corporate and government computer databases 148 Inverse surveillance is the practice of the reversal of surveillance on other individuals or groups e g citizens photographing police Well known examples include George Holliday s recording of the Rodney King beating and the organization Copwatch which attempts to monitor police officers to prevent police brutality Counter surveillance can be also used in applications to prevent corporate spying or to track other criminals by certain criminal entities It can also be used to deter stalking methods used by various entities and organizations Sousveillance is inverse surveillance involving the recording by private individuals rather than government or corporate entities 149 Popular culture EditIn literature Edit George Orwell s novel Nineteen Eighty Four portrays a fictional totalitarian surveillance society with a very simple mass surveillance system consisting of human operatives informants and two way telescreens in people s homes Because of the impact of this book mass surveillance technologies are commonly called Orwellian when they are considered problematic The novel mistrust highlights the negative effects from the overuse of surveillance at Reflection House The central character Kerryn installs secret cameras to monitor her housemates see also Paranoia The book The Handmaid s Tale as well as a film and TV series based on it portray a totalitarian Christian theocracy where all citizens are kept under constant surveillance In the book The Girl with the Dragon Tattoo Lisbeth Salander uses computers to get information on people as well as other common surveillance methods as a freelancer V for Vendetta a British graphic novel written by Alan Moore David Egger s novel The Circle exhibits a world where a single company called The Circle produces all of the latest and highest quality technologies from computers and smartphones to surveillance cameras known as See Change cameras This company becomes associated with politics when starting a movement where politicians go transparent by wearing See Change cameras on their body to prevent keeping secrets from the public about their daily work activity In this society it becomes mandatory to share personal information and experiences because it is The Circle s belief that everyone should have access to all information freely However as Eggers illustrates this takes a toll on the individuals and creates a disruption of power between the governments and the private company The Circle presents extreme ideologies surrounding mandatory surveillance Eamon Bailey one of the Wise Men or founders of The Circle believes that possessing the tools to access information about anything or anyone should be a human right given to all of the world s citizens 150 By eliminating all secrets any behaviour that has been deemed shameful will either become normalized or no longer considered shocking Negative actions will eventually be eradicated from society altogether through the fear of being exposed to other citizens 150 This would be achieved in part by everyone going transparent something that Bailey highly supports although it s notable that none of the Wise Men ever became transparent themselves One major goal of The Circle is to have all of the world s information filtered through The Circle a process they call Completion 150 A single private company would then have full access and control over all information and privacy of individuals and governments Ty Gospodinov the first founder of The Circle has major concerns about the completion of the circle He warns that this step would give The Circle too much power and control and would quickly lead to totalitarianism In music Edit The Dead Kennedys song I Am The Owl is about government surveillance and social engineering of political groups The Vienna Teng song Hymn of Acxiom is about corporate data collection and surveillance Onscreen Edit Main article List of films featuring surveillance The film Gattaca portrays a society that uses biometric surveillance to distinguish between people who are genetically engineered superior humans and genetically natural inferior humans In the movie Minority Report the police and government intelligence agencies use micro aerial vehicles in SWAT operations and for surveillance purposes HBO s crime drama series The Sopranos regularly portrays the FBI s surveillance of the DiMeo Crime Family Audio devices they use include bugs placed in strategic locations e g in I Dream of Jeannie Cusamano and Mr Ruggerio s Neighborhood and hidden microphones worn by operatives e g in Rat Pack and informants e g in Funhouse Proshai Livushka and Members Only Visual devices include hidden still cameras e g in Pax Soprana and video cameras e g in Long Term Parking The movie THX 1138 portrays a society wherein people are drugged with sedatives and antidepressants and have surveillance cameras watching them everywhere they go The movie The Lives of Others portrays the monitoring of East Berlin by agents of the Stasi the GDR s secret police The movie The Conversation portrays many methods of audio surveillance The movie V for Vendetta a 2005 dystopian political thriller film directed by James McTeigue and written by the Wachowskis is about British government trying to brainwash people by media obtain their support by fearmongering monitor them by mass surveillance devices and suppress or kill any political or social objection The movie Enemy of the State a 1998 American action thriller film directed by Tony Scott is about using U S citizens data to search their background and surveillance devices to capture everyone that is identified as enemy The British TV series The Capture explores the potential for video surveillance to be manipulated in order to support a conviction to pursue a political agenda See also EditComputer and network surveillance Mass surveillance Sousveillance Surveillance art Surveillance capitalism Surveillance system monitor Trapwire Participatory surveillance PRISM surveillance program The Age of Surveillance Capitalism Data MiningReferences Edit Lyon David 2001 Surveillance Society Monitoring in Everyday Life Philadelphia Open University Press ISBN 978 0 335 20546 2 Monahan Torin Murakami Wood David 2018 Surveillance Studies A Reader New York Oxford University Press ISBN 9780190297824 Greenleaf Richard E 2018 Historiography of the Mexican Inquisition Evolution of Interpretations and Methodologies In Perry Mary Elizabeth Cruz Anne J eds Cultural Encounters The Impact of the Inquisition in Spain and the New World Center for Medieval and Renaissance Studies UCLA Vol 24 Berleley University of California Press p 260 ISBN 9780520301245 Retrieved March 14 2020 Studies are based partially on Inquisition surveillance of foreigners and Protestants Cardwell Harvey 2005 Principles of Audit Surveillance R T Edwards Inc p 102 ISBN 9781930217133 Retrieved March 14 2020 accounts and inventories alike are generally within the area of surveillance of the auditor Stallman Richard M October 14 2013 Stallman How Much Surveillance Can Democracy Withstand Wired ISSN 1059 1028 Retrieved April 15 2020 The Psychology of Espionage PDF The Psychology of Espionage Archived PDF from the original on November 9 2020 Retrieved October 1 2022 Radsan A John Spring 2007 The Unresolved Equation of Espionage and International Law Michigan Journal of International Law 28 3 595 623 Diffie Whitfield Susan Landau August 2008 Internet Eavesdropping A Brave New World of Wiretapping Scientific American Retrieved March 13 2009 a b CALEA Archive Electronic Frontier Foundation Electronic Frontier Foundation website Archived from the original on May 3 2009 Retrieved March 14 2009 a b CALEA The Perils of Wiretapping the Internet Electronic Frontier Foundation website Retrieved March 14 2009 a b CALEA Frequently Asked Questions Electronic Frontier Foundation website September 20 2007 Retrieved March 14 2009 Hill Michael October 11 2004 Government funds chat room surveillance research USA Today Associated Press Retrieved March 19 2009 McCullagh Declan January 30 2007 FBI turns to broad new wiretap method ZDNet News Retrieved September 26 2014 FBI s Secret Spyware Tracks Down Teen Who Made Bomb Threats Wired Magazine July 18 2007 Van Eck Wim 1985 Electromagnetic Radiation from Video Display Units An Eavesdropping Risk PDF Computers amp Security 4 4 269 286 CiteSeerX 10 1 1 35 1695 doi 10 1016 0167 4048 85 90046 X Archived PDF from the original on October 9 2022 Kuhn M G 2004 Electromagnetic Eavesdropping Risks of Flat Panel Displays PDF 4th Workshop on Privacy Enhancing Technologies 23 25 Risen James Lichtblau Eric June 16 2009 E Mail Surveillance Renews Concerns in Congress The New York Times pp A1 Retrieved June 30 2009 Ambinder Marc June 16 2009 Pinwale And The New NSA Revelations The Atlantic Retrieved June 30 2009 Greenwald Ewen Glen MacAskill June 6 2013 NSA Prism program taps in to user data of Apple Google and others PDF The Guardian Archived PDF from the original on October 9 2022 Retrieved February 1 2017 a href Template Cite news html title Template Cite news cite news a CS1 maint multiple names authors list link Sottek T C Kopfstein Janus July 17 2013 Everything you need to know about PRISM The Verge Retrieved February 13 2017 Singel Ryan September 10 2007 Rogue FBI Letters Hint at Phone Companies Own Data Mining Programs Updated Threat Level Wired Retrieved March 19 2009 Roland Neil March 20 2007 Mueller Orders Audit of 56 FBI Offices for Secret Subpoenas Bloomberg News Retrieved March 19 2009 Piller Charles Eric Lichtblau July 29 2002 FBI Plans to Fight Terror With High Tech Arsenal LA Times Retrieved March 14 2009 Schneier Bruce December 5 2006 Remotely Eavesdropping on Cell Phone Microphones Schneier On Security Retrieved December 13 2009 a b McCullagh Declan Anne Broache December 1 2006 FBI taps cell phone mic as eavesdropping tool CNet News Archived from the original on November 10 2013 Retrieved March 14 2009 a b Odell Mark August 1 2005 Use of mobile helped police keep tabs on suspect Financial Times Retrieved March 14 2009 a b Telephones Western Regional Security Office NOAA official site 2001 Archived from the original on November 6 2013 Retrieved March 22 2009 Can You Hear Me Now ABC News The Blotter Archived from the original on August 25 2011 Retrieved December 13 2009 Coughlin Kevin December 13 2006 Even if they re off cellphones allow FBI to listen in The Seattle Times Retrieved December 14 2009 Hampton Brittany 2012 From Smartphones to Stingrays Can the Fourth Amendment Keep up with the Twenty First Century Note University of Louisville Law Review Fifty One 159 176 via Law Journal Library a b Tracking a suspect by mobile phone BBC News August 3 2005 Retrieved March 14 2009 a b Miller Joshua March 14 2009 Cell Phone Tracking Can Locate Terrorists But Only Where It s Legal FOX News Archived from the original on March 18 2009 Retrieved March 14 2009 Samuel Ian 2008 Warrantless Location Tracking N Y U Law Review SSRN 1092293 Zetter Kim December 1 2009 Threat Level Privacy Crime and Security Online Feds Pinged Sprint GPS Data 8 Million Times Over a Year Wired Magazine Threat Level Retrieved December 5 2009 Greenstone Digital Library Software snowdenarchive cjfe org Archived from the original on January 4 2022 Retrieved June 3 2017 a b c Sanger David September 26 2014 Signaling Post Snowden Era New iPhone Locks Out N S A The New York Times Retrieved November 1 2014 a b c Gellman Barton December 4 2013 NSA tracking cellphone locations worldwide Snowden documents show The Washington Post Retrieved November 1 2014 Ball James October 29 2014 GCHQ views data without a warrant government admits The Guardian Szoldra Paul This is everything Edward Snowden revealed in one year of unprecedented top secret leaks Business Insider Crocco Marco Cristani Marco Trucco Andrea Murino Vittorio May 2 2016 Audio Surveillance A Systematic Review ACM Computing Surveys 48 4 1 46 doi 10 1145 2871183 ISSN 0360 0300 S2CID 6128808 Rise of Surveillance Camera Installed Base Slows May 5 2016 Retrieved January 5 2017 Smart cameras catch man in 60 000 crowd BBC News April 13 2018 Retrieved April 13 2018 Spielman Fran February 19 2009 Surveillance cams help fight crime city says Chicago Sun Times Retrieved March 13 2009 permanent dead link Schorn Daniel September 6 2006 We re Watching How Chicago Authorities Keep An Eye On The City CBS News Archived from the original on February 6 2009 Retrieved March 13 2009 a b Levine E S Tisch Jessica Tasso Anthony Joy Michael February 2017 The New York City Police Department s Domain Awareness System Interfaces 47 1 70 84 doi 10 1287 inte 2016 0860 Parascandola Rocco New NYPD surveillance cameras to cover stretch of Upper East Side not easily reached by patrol cars nydailynews com Retrieved November 1 2019 The Price of Privacy How local authorities spent 515m on CCTV in four years PDF Big Brother Watch February 2012 p 30 Archived from the original PDF on September 23 2015 Retrieved February 4 2015 FactCheck how many CCTV cameras Channel 4 News June 18 2008 Archived from the original on May 11 2010 Retrieved May 8 2009 You re being watched there s one CCTV camera for every 32 people in UK Research shows 1 85m machines across Britain most of them indoors and privately operated The Guardian March 2 2011 Retrieved January 7 2017 In the press How the media is reporting the 1 85 million cameras story Security News Desk March 3 2011 Retrieved January 7 2017 CCTV in London PDF Archived PDF from the original on October 9 2022 Retrieved July 22 2009 How many cameras are there CCTV User Group June 18 2008 Archived from the original on October 23 2008 Retrieved May 8 2009 Den Haag Camera surveillance Archived from the original on October 8 2016 Retrieved December 2 2016 a b Klein Naomi May 29 2008 China s All Seeing Eye Rolling Stone Archived from the original on March 26 2009 Retrieved March 20 2009 Big Brother To See All Everywhere CBS News Associated Press July 1 2003 Retrieved September 26 2014 Bonsor K September 4 2001 How Facial Recognition Systems Work Retrieved June 18 2006 McNealy Scott Privacy is Virtually Dead Retrieved December 24 2006 Roebuck Kevin October 24 2012 Communication Privacy Management ISBN 9781743332900 WIKILEAKS Surveillance Cameras Around The Country Are Being Used In A Huge Spy Network Business Insider Retrieved October 5 2016 EPIC Video Surveillance Information Page EPIC Archived from the original on February 25 2009 Retrieved March 13 2009 Hedgecock Sarah August 14 2012 TrapWire The Less Than Advertised System To Spy On Americans The Daily Beast Retrieved September 13 2012 Keefe Patrick March 12 2006 Can Network Theory Thwart Terrorists The New York Times a b Albrechtslund Anders March 3 2008 Online Social Networking as Participatory Surveillance First Monday 13 3 doi 10 5210 fm v13i3 2142 Fuchs Christian 2009 Social Networking Sites and the Surveillance Society A Critical Case Study of the Usage of studiVZ Facebook and MySpace by Students in Salzburg in the Context of Electronic Surveillance PDF Salzburg and Vienna Forschungsgruppe Unified Theory of Information ISBN 978 3 200 01428 2 Archived PDF from the original on October 9 2022 Retrieved July 28 2012 a b Ethier Jason Current Research in Social Network Theory Northeastern University College of Computer and Information Science Archived from the original on November 16 2004 Retrieved March 15 2009 a href Template Cite web html title Template Cite web cite web a CS1 maint bot original URL status unknown link Marks Paul June 9 2006 Pentagon sets its sights on social networking websites New Scientist Retrieved March 16 2009 Kawamoto Dawn June 9 2006 Is the NSA reading your MySpace profile CNET News Archived from the original on July 20 2012 Retrieved March 16 2009 Ethier Jason Current Research in Social Network Theory Northeastern University College of Computer and Information Science Archived from the original on February 26 2015 Retrieved March 15 2009 Ressler Steve July 2006 Social Network Analysis as an Approach to Combat Terrorism Past Present and Future Research Homeland Security Affairs II 2 Retrieved March 14 2009 DyDAn Research Blog DyDAn Research Blog official blog of DyDAn Retrieved December 20 2009 a b Singel Ryan October 29 2007 AT amp T Invents Programming Language for Mass Surveillance Threat Level Wired Retrieved March 19 2009 Singel Ryan October 16 2007 Legally Questionable FBI Requests for Calling Circle Info More Widespread than Previously Known Threat Level Wired Retrieved March 19 2009 Havenstein Heather September 12 2008 One in five employers uses social networks in hiring process Computer World Archived from the original on September 23 2008 Retrieved March 14 2009 Woodward John Christopher Horn Julius Gatune Aryn Thomas 2003 Biometrics A Look at Facial Recognition RAND Corporation ISBN 978 0 8330 3302 4 Archived from the original on September 8 2013 Retrieved March 15 2009 Frank Thomas May 10 2007 Face recognition next in terror fight USA Today Retrieved March 16 2009 Vlahos James January 2008 Surveillance Society New High Tech Cameras Are Watching You Popular Mechanics Archived from the original on December 19 2007 Retrieved March 14 2009 Nakashima Ellen December 22 2007 FBI Prepares Vast Database Of Biometrics 1 Billion Project to Include Images of Irises and Faces The Washington Post pp A01 Retrieved May 6 2009 Arena Kelly Carol Cratty February 4 2008 FBI wants palm prints eye scans tattoo mapping CNN Retrieved March 14 2009 Gross Grant February 13 2008 Lockheed wins 1 billion FBI biometric contract IDG News Service InfoWorld Archived from the original on June 17 2008 Retrieved March 18 2009 LAPD We Know That Mug Wired Magazine Associated Press December 26 2004 Retrieved March 18 2009 Mack Kelly LAPD Uses Face Recognition Technology To Fight Crime NBC4 TV transcript from Officer com Archived from the original on March 30 2010 Retrieved December 20 2009 Willon Phil September 17 2009 LAPD opens new high tech crime analysis center LA Times Retrieved December 20 2009 a b Dotinga Randy October 14 2004 Can t Hide Your Lying Face Wired Magazine Retrieved March 18 2009 Boyd Ryan MQ 9 Reaper Retrieved October 5 2016 Friedersdorf Conor March 10 2016 The Rapid Rise of Federal Surveillance Drones Over America The Atlantic Retrieved October 5 2016 Edwards Bruce Killington co founder Sargent dead at 83 Archived September 4 2015 at the Wayback Machine Rutland Herald November 9 2012 Retrieved December 10 2012 McCullagh Declan March 29 2006 Drone aircraft may prowl U S skies CNet News Retrieved March 14 2009 a b Warwick Graham June 12 2007 US police experiment with Insitu Honeywell UAVs FlightGlobal com Retrieved March 13 2009 La Franchi Peter July 17 2007 UK Home Office plans national police UAV fleet Flight International Retrieved March 13 2009 No Longer Science Fiction Less Than Lethal amp Directed Energy Weapons International Online Defense Magazine February 22 2005 Retrieved March 15 2009 HART Overview PDF IPTO DARPA Official website August 2008 Archived from the original PDF on December 5 2008 Retrieved March 15 2009 BAA 04 05 PIP Heterogeneous Airborne Reconnaissance Team HART PDF Information Processing Technology Office DARPA Official Website December 5 2003 Archived from the original PDF on November 27 2008 Retrieved March 16 2009 Sirak Michael November 29 2007 DARPA Northrop Grumman Move Into Next Phase of UAV Control Architecture Defense Daily Archived from the original on March 9 2012 Retrieved March 16 2009 Saska M Chudoba J Preucil L Thomas J Loianno G Tresnak A Vonasek V Kumar V Autonomous Deployment of Swarms of Micro Aerial Vehicles in Cooperative Surveillance In Proceedings of 2014 International Conference on Unmanned Aircraft Systems ICUAS 2014 Saska M Vakula J Preucil L Swarms of Micro Aerial Vehicles Stabilized Under a Visual Relative Localization In ICRA2014 Proceedings of 2014 IEEE International Conference on Robotics and Automation 2014 Anthony Denise 2017 Toward a Sociology of Privacy Annual Review of Sociology 43 1 249 269 doi 10 1146 annurev soc 060116 053643 Hildebrandt Mireille Serge Gutwirth 2008 Profiling the European Citizen Cross Disciplinary Perspectives Dordrecht Springer ISBN 978 1 4020 6913 0 Clayton Mark February 9 2006 US Plans Massive Data Sweep Christian Science Monitor Retrieved March 13 2009 Flint Lara September 24 2003 Administrative Subpoenas for the FBI A Grab for Unchecked Executive Power The Center For Democracy amp Technology official site Archived from the original on March 8 2009 Retrieved March 20 2009 National Network of Fusion Centers Raises Specter of COINTELPRO EPIC Spotlight on Surveillance June 2007 Retrieved March 14 2009 Prunckun Hank April 12 2019 2010 Clandestine and Covert Sources of Information Methods of Inquiry for Intelligence Analysis Security and Professional Intelligence Education Series 3 ed Lanham Maryland Rowman amp Littlefield published 2019 p 57 ISBN 9781538125885 Retrieved September 13 2022 Physical surveillance is the act of making observations of people vehicles or the activities occurring at specific locations Physical surveillance may take place either at a fixed location which is known as a stakeout or in a continually moving situation referred to as a tail Myers Lisa December 14 2005 Is the Pentagon spying on Americans NBC Nightly News NBC News Retrieved March 13 2009 The Use of Informants in FBI Domestic Intelligence Investigations Final Report Book III Supplementary Detailed Staff Reports on Intelligence Activities and the Rights of Americans U S Senate Select Committee to Study Governmental Operations with Respect to Intelligence Activities April 23 1976 pp 225 270 Retrieved March 13 2009 Secret Justice Criminal Informants and America s Underground Legal System Prison Legal News www prisonlegalnews org Retrieved October 5 2016 Ross Brian July 25 2007 FBI Proposes Building Network of U S Informants Blotter ABC News Retrieved March 13 2009 U S Reconnaissance Satellites Domestic Targets National Security Archive Retrieved March 16 2009 Block Robert August 15 2007 U S to Expand Domestic Use Of Spy Satellites The Wall Street Journal Retrieved March 14 2009 Gorman Siobhan October 1 2008 Satellite Surveillance Program to Begin Despite Privacy Concerns The Wall Street Journal Retrieved March 16 2009 Fact Sheet National Applications Office Department of Homeland Security official website August 15 2007 Archived from the original on March 11 2009 Retrieved March 16 2009 a b Warrick Joby August 16 2007 Domestic Use of Spy Satellites To Widen The Washington Post pp A01 Retrieved March 17 2009 Shrader Katherine September 26 2004 Spy imagery agency watching inside U S USA Today Associated Press Retrieved March 17 2009 Kappeler Victor Forget the NSA Police May be a Greater Threat to Privacy Section 100i IMS I Catcher PDF The German Code Of Criminal Procedure 2014 pp 43 44 archived from the original PDF on September 25 2015 retrieved November 27 2015 Revealed Saudis suspected of phone spying campaign in US The Guardian March 29 2020 Retrieved March 29 2020 Saudi Spies Tracked Phones Using Flaws the FCC Failed to Fix for Years TechCrunch March 29 2020 Retrieved March 29 2020 a b Two Stories Highlight the RFID Debate RFID Journal July 19 2005 Retrieved March 23 2012 a b Lewan Todd July 21 2007 Microchips in humans spark privacy debate USA Today Associated Press Retrieved March 17 2009 McCullagh Declan January 13 2003 RFID Tags Big Brother in small packages CNET News Retrieved July 24 2012 Gardener W David July 15 2004 RFID Chips Implanted In Mexican Law Enforcement Workers Information Week Archived from the original on April 12 2009 Retrieved March 17 2009 Campbell Monica August 4 2004 Law enforcement in Mexico goes a bit bionic Christian Science Monitor Retrieved March 17 2009 Monahan Torin Fisher Jill A 2010 Implanting inequality Empirical evidence of social and ethical risks of implantable radio frequency identification RFID devices International Journal of Technology Assessment in Health Care 26 4 370 376 doi 10 1017 S0266462310001133 PMID 20923593 S2CID 12365071 Plextek s Blighter B400 series radars improve perimeter security at London s Heathrow Airport Radartutorial Lyman D Micheal Criminal Investigation The Art and the Science 6th ed Pearson 2010 p249 Crowder Stan and Turvery E Brent Ethical Justice Applied Issues for Criminal Justice Students and Professionals 1st ed Academic Press 2013 p150 Print Claburn Thomas March 4 2009 Court Asked To Disallow Warrantless GPS Tracking Information Week Retrieved March 18 2009 Hilden Julie April 16 2002 What legal questions are the new chip implants for humans likely to raise CNN com FindLaw Archived from the original on May 18 2009 Retrieved March 17 2009 Wolf Paul COINTELPRO online collection of historical documents Retrieved March 14 2009 Rooney Julie Lynn 2017 Going Postal Analyzing the Abuse of Mail Covers Under the Fourth Amendment Vanderbilt Law Review 70 5 1627 1662 U S Army Intelligence Activities PDF Archived from the original PDF on August 8 2015 Retrieved 25 May 2015 Domestic CIA and FBI Mail Opening Programs PDF Final Report Book III Supplementary Detailed Staff Reports on Intelligence Activities and the Rights of Americans U S Senate Select Committee to Study Governmental Operations with Respect to Intelligence Activities April 23 1976 pp 559 678 Archived from the original PDF on May 5 2011 Retrieved March 13 2009 Goldstein Robert 2001 Political Repression in Modern America University of Illinois Press ISBN 978 0 252 06964 2 a b Williams Jamie Lee 2016 Privacy in the Age of the Internet of Things Human Rights 41 4 14 22 ISSN 0046 8185 JSTOR 26423456 Deviant Behaviour Socially accepted observation of behaviour for security Jeroen van Rest Sprenger Polly January 26 1999 Sun on Privacy Get Over It Wired Magazine Retrieved March 20 2009 Baig Edward Marcia Stepanek Neil Gross April 5 1999 Privacy Business Week Archived from the original on October 17 2008 Retrieved March 20 2009 Solove Daniel 2007 I ve Got Nothing to Hide and Other Misunderstandings of Privacy San Diego Law Review 44 745 SSRN 998565 a b c Is the U S Turning Into a Surveillance Society American Civil Liberties Union Retrieved March 13 2009 a b Bigger Monster Weaker Chains The Growth of an American Surveillance Society PDF American Civil Liberties Union January 15 2003 Archived PDF from the original on October 9 2022 Retrieved March 13 2009 Privacy fears over online surveillance footage broadcasts in China December 13 2017 Marx Gary T Muschert Glenn W 2007 Personal Information Borders and the New Surveillance Studies PDF Annual Review of Law and Social Science 3 375 395 doi 10 1146 annurev lawsocsci 3 081806 112824 Archived from the original PDF on August 11 2017 a b Agre Philip E 2003 Your Face is not a bar code arguments against automatic face recognition in public places Retrieved November 14 2004 Foucault Michel 1979 Discipline and Punish New York Vintage Books pp 201 202 ISBN 9780394727677 a b c d e Chayko Mary 2017 Superconnected the internet digital media and techno social life New York NY Sage Publications Nishiyama Hidefumi 2017 Surveillance as Race Struggle On Browne s Dark Matters Theory amp Event Johns Hopkins University Press 20 1 280 285 via Project MUSE Browne Simone October 2 2015 Dark Matters On the Surveillance of Blackness Duke University Press Books p 224 ISBN 978 0822359197 Court of Appeal Second District Division 6 California July 30 2008 People vs Diaz FindLaw Retrieved February 1 2017 a href Template Cite web html title Template Cite web cite web a CS1 maint multiple names authors list link California Fourth District Court of Appeal June 25 2014 Riley v California Oyez IIT Chicago Kent College of Law Retrieved February 1 2013 The Secrets of Countersurveillance Security Weekly June 6 2007 Birch Dave July 14 2005 The age of sousveillance The Guardian London Retrieved August 6 2007 a b c Eggers David 2013 The Circle New York Alfred A Knopf McSweeney s Books pp 288 290 291 486 ISBN 978 0 385 35139 3 Further reading EditAllmer Thomas 2012 Towards a Critical Theory of Surveillance in Informational Capitalism Frankfurt am Main Peter Lang ISBN 978 3 631 63220 8 Andrejevic Mark 2007 iSpy Surveillance and Power in the Interactive Era Lawrence KS University Press of Kansas ISBN 0700616861 Ball Kirstie Kevin D Haggerty and David Lyon eds 2012 Routledge Handbook of Surveillance Studies New York Routledge ISBN 1138026026 Brayne Sarah 2020 Predict and Surveil Data Discretion and the Future of Policing New York Oxford University Press ISBN 0190684097 Browne Simone 2015 Dark Matters On the Surveillance of Blackness Durham Duke University Press ISBN 978 0822359197 Coleman Roy and Michael McCahill 2011 Surveillance amp Crime Thousand Oaks Calif Sage ISBN 1847873537 Feldman Jay 2011 Manufacturing Hysteria A History of Scapegoating Surveillance and Secrecy in Modern America New York NY Pantheon Books ISBN 0 375 42534 9 Fuchs Christian Kees Boersma Anders Albrechtslund and Marisol Sandoval eds 2012 Internet and Surveillance The Challenges of Web 2 0 and Social Media New York Routledge ISBN 978 0 415 89160 8 Garfinkel Simson Database Nation The Death of Privacy in the 21st Century O Reilly amp Associates Inc ISBN 0 596 00105 3 Gilliom John 2001 Overseers of the Poor Surveillance Resistance and the Limits of Privacy University Of Chicago Press ISBN 978 0 226 29361 5 Haque Akhlaque 2015 Surveillance Transparency and Democracy Public Administration in the Information Age University of Alabama Press Tuscaloosa AL ISBN 978 0 8173 1877 2 Harris Shane 2011 The Watchers The Rise of America s Surveillance State London UK Penguin Books Ltd ISBN 0 14 311890 0 Hier Sean P amp Greenberg Joshua Eds 2009 Surveillance Power Problems and Politics Vancouver CA UBC Press ISBN 0 7748 1611 2 Jensen Derrick and Draffan George 2004 Welcome to the Machine Science Surveillance and the Culture of Control Chelsea Green Publishing Company ISBN 978 1 931498 52 4 Lewis Randolph 2017 Under Surveillance Being Watched in Modern America Austin University of Texas Press ISBN 1477312439 Lyon David 2001 Surveillance Society Monitoring in Everyday Life Philadelphia Open University Press ISBN 978 0 335 20546 2 Lyon David Ed 2006 Theorizing Surveillance The Panopticon and Beyond Cullompton UK Willan Publishing ISBN 978 1 84392 191 2 Lyon David 2007 Surveillance Studies An Overview Cambridge Polity Press ISBN 978 0 7456 3591 0 Matteralt Armand 2010 The Globalization of Surveillance Cambridge UK Polity Press ISBN 0 7456 4511 9 Monahan Torin ed 2006 Surveillance and Security Technological Politics and Power in Everyday Life New York Routledge ISBN 9780415953931 Monahan Torin 2010 Surveillance in the Time of Insecurity New Brunswick Rutgers University Press ISBN 0813547652 Monahan Torin and David Murakami Wood eds 2018 Surveillance Studies A Reader New York Oxford University Press ISBN 978 0 190 29782 4 Parenti Christian The Soft Cage Surveillance in America From Slavery to the War on Terror Basic Books ISBN 978 0 465 05485 5 Petersen J K 2012 Handbook of Surveillance Technologies Third Edition Taylor amp Francis CRC Press 1020 pp ISBN 978 1 439873 15 1 Staples William G 2000 Everyday Surveillance Vigilance and Visibility in Post Modern Life Lanham MD Rowman amp Littlefield Publishers ISBN 0 7425 0077 2 Yan W 2019 Introduction to Intelligent Surveillance Surveillance Data Capture Transmission and Analytics Springer Publishers ISBN 3030107124General information Edit Special Issue on Surveillance Capitalism nine articles analyzing financial social political legal historical security and other aspects of US and international surveillance and spying programs and their relation to capitalism Monthly Review 2014 Volume 66 Number 3 July August ACLU The Surveillance Industrial Complex How the American Government Is Conscripting Businesses and Individuals in the Construction of a Surveillance Society Balkin Jack M 2008 The Constitution in the National Surveillance State Yale Law School Bibo Didier and Delmas Marty The State and Surveillance Fear and Control EFF Privacy Resources EPIC Privacy Resources ICO September 2006 A Report on the Surveillance Society for the Information Commissioner by the Surveillance Studies Network Privacy Information Center Archived February 21 2009 at the Wayback Machine The NSA Files Dozens of articles about the U S National Security Agency and its spying and surveillance programs The Guardian London June 8 2013 Historical information Edit COINTELPRO FBI counterintelligence programs designed to neutralize political dissidents Reversing the Whispering Gallery of Dionysius A Short History of Electronic Surveillance in the United StatesLegal resources Edit EFF Legal Cases Guide to lawful intercept legislation around the worldExternal links Edit Look up surveillance in Wiktionary the free dictionary Wikiquote has quotations related to Surveillance Media related to Surveillance at Wikimedia Commons Retrieved from https en wikipedia org w index php title Surveillance amp oldid 1127722093, wikipedia, wiki, book, books, library,

article

, read, download, free, free download, mp3, video, mp4, 3gp, jpg, jpeg, gif, png, picture, music, song, movie, book, game, games.