SUPPORT THE WORK

GetWiki

surveillance

ARTICLE SUBJECTS
aesthetics  →
being  →
complexity  →
database  →
enterprise  →
ethics  →
fiction  →
history  →
internet  →
knowledge  →
language  →
licensing  →
linux  →
logic  →
method  →
news  →
perception  →
philosophy  →
policy  →
purpose  →
religion  →
science  →
sociology  →
software  →
truth  →
unix  →
wiki  →
ARTICLE TYPES
essay  →
feed  →
help  →
system  →
wiki  →
ARTICLE ORIGINS
critical  →
discussion  →
forked  →
imported  →
original  →
surveillance
[ temporary import ]
please note:
- the content below is remote from Wikipedia
- it has been imported raw for GetWiki
{{About|surveillance in espionage|health surveillance|Health surveillance}}{{Redirects here|Electronic surveillance|surveillance of electronic computer systems|Computer and network surveillance}}{{Use mdy dates|date=December 2012}}(File:Surveillance video cameras, Gdynia.jpeg|thumb|Surveillance cameras)Surveillance is the monitoring of behavior, activities, or information for the purpose of influencing, managing or directing. This can include observation from a distance by means of electronic equipment, such as closed-circuit television (CCTV), or interception of electronically transmitted information, such as Internet traffic. It can also include simple technical methods, such as human intelligence gathering and postal interception.Surveillance is used by governments for intelligence gathering, prevention of crime, the protection of a process, person, group or object, or the investigation of crime. It is also used by criminal organizations to plan and commit crimes, and by businesses to gather intelligence on their competitors, suppliers or customers.Surveillance can be viewed as a violation of privacy, and as such is often opposed by civil liberties activists. A liberal democracy may have laws which restrict domestic government and private use of surveillance. Authoritarian governments seldom have any domestic restrictions, and international espionage is common among all types of countries.Concerns have been raised about surveillance with regards to the Internet of things. Where surveillance technology is used for identification, monitoring, location tracking or to gain access to buildings and networks.

Methods

Computer

File:IAO-logo.png|thumb|right|200px| Official seal of the Information Awareness Office – a U.S. agency which developed technologies for mass surveillancemass surveillanceThe vast majority of computer surveillance involves the monitoring of data and traffic on the Internet.NEWS,weblink Internet Eavesdropping: A Brave New World of Wiretapping, Diffie, Whitfield, Susan Landau, August 2008, Scientific American, March 13, 2009, In the United States for example, under the Communications Assistance For Law Enforcement Act, all phone calls and broadband Internet traffic (emails, web traffic, instant messaging, etc.) are required to be available for unimpeded real-time monitoring by federal law enforcement agencies.WEB,weblink CALEA Archive – Electronic Frontier Foundation, Electronic Frontier Foundation (website), March 14, 2009, yes,weblink" title="web.archive.org/web/20090503035053weblink">weblink May 3, 2009, mdy-all, WEB,weblink CALEA: The Perils of Wiretapping the Internet, Electronic Frontier Foundation (website), March 14, 2009, WEB,weblink CALEA: Frequently Asked Questions, Electronic Frontier Foundation (website), March 14, 2009, 2007-09-20, There is far too much data on the Internet for human investigators to manually search through all of it. Therefore, automated Internet surveillance computers sift through the vast amount of intercepted Internet traffic to identify and report to human investigators the traffic that is considered interesting or suspicious. This process is regulated by targeting certain "trigger" words or phrases, visiting certain types of web sites, or communicating via email or online chat with suspicious individuals or groups.NEWS,weblink Government funds chat room surveillance research, Hill, Michael, October 11, 2004, Associated Press, USA Today, March 19, 2009, Billions of dollars per year are spent by agencies, such as the NSA, the FBI and the now-defunct Information Awareness Office, to develop, purchase, implement, and operate systems such as Carnivore, NarusInsight, and ECHELON to intercept and analyze all of this data to only extract the information which is useful to law enforcement and intelligence agencies.NEWS,weblink FBI turns to broad new wiretap method, McCullagh, Declan, January 30, 2007, ZDNet News, September 26, 2014, Computers can be a surveillance target because of the personal data stored on them. If someone is able to install software, such as the FBI's Magic Lantern and CIPAV, on a computer system, they can easily gain unauthorized access to this data. Such software could be installed physically or remotely.MAGAZINE,weblink FBI's Secret Spyware Tracks Down Teen Who Made Bomb Threats, July 18, 2007, Wired Magazine, Another form of computer surveillance, known as van Eck phreaking, involves reading electromagnetic emanations from computing devices in order to extract data from them at distances of hundreds of meters.JOURNAL, Van Eck, Wim, Electromagnetic Radiation from Video Display Units: An Eavesdropping Risk?, Computers & Security, 4, 1985, 269–286,weblink 10.1016/0167-4048(85)90046-X, 4, 10.1.1.35.1695, JOURNAL, Kuhn, M.G., 2004, Electromagnetic Eavesdropping Risks of Flat-Panel Displays, 4th Workshop on Privacy Enhancing Technologies, 23–25,weblink The NSA runs a database known as "Pinwale", which stores and indexes large numbers of emails of both American citizens and foreigners.NEWS,weblink E-Mail Surveillance Renews Concerns in Congress, June 16, 2009, New York Times, A1, June 30, 2009, James, Risen, Eric, Lichtblau, NEWS,weblink Pinwale And The New NSA Revelations, Ambinder, Marc, June 16, 2009, The Atlantic, June 30, 2009, Additionally, the NSA runs a program known as PRISM, which is a data mining system that gives the United States government direct access to information from technology companies. Through accessing this information, the government is able to obtain search history, emails, stored information, live chats, file transfers, and more. This program generated huge controversies in regards to surveillance and privacy, especially from U.S. citizens.NEWS,weblink NSA Prism program taps in to user data of Apple, Google and others, Greenwald; Ewen, Glen; MacAskill, June 6, 2013, The Guardian, February 1, 2017, NEWS,weblink Everything you need to know about PRISM, Sottek, T.C., Kopfstein, Janus, July 17, 2013, The Verge, February 13, 2017,

Telephones

The official and unofficial tapping of telephone lines is widespread. In the United States for instance, the Communications Assistance For Law Enforcement Act (CALEA) requires that all telephone and VoIP communications be available for real-time wiretapping by Federal law enforcement and intelligence agencies. Two major telecommunications companies in the U.S.—AT&T Inc. and Verizon—have contracts with the FBI, requiring them to keep their phone call records easily searchable and accessible for Federal agencies, in return for $1.8 million per year.NEWS,weblink Rogue FBI Letters Hint at Phone Companies' Own Data Mining Programs – Updated, Singel, Ryan, September 10, 2007, Threat Level, Wired, March 19, 2009, Between 2003 and 2005, the FBI sent out more than 140,000 "National Security Letters" ordering phone companies to hand over information about their customers' calling and Internet histories. About half of these letters requested information on U.S. citizens.NEWS,weblink Mueller Orders Audit of 56 FBI Offices for Secret Subpoenas, Roland, Neil, March 20, 2007, Bloomberg News, March 19, 2009, Human agents are not required to monitor most calls. Speech-to-text software creates machine-readable text from intercepted audio, which is then processed by automated call-analysis programs, such as those developed by agencies such as the Information Awareness Office, or companies such as Verint, and Narus, which search for certain words or phrases, to decide whether to dedicate a human agent to the call.NEWS,weblink FBI Plans to Fight Terror With High-Tech Arsenal, Piller, Charles, Eric Lichtblau, July 29, 2002, LA Times, March 14, 2009, Law enforcement and intelligence services in the United Kingdom and the United States possess technology to activate the microphones in cell phones remotely, by accessing phones' diagnostic or maintenance features in order to listen to conversations that take place near the person who holds the phone.WEB,weblink Remotely Eavesdropping on Cell Phone Microphones, Schneier, Bruce, December 5, 2006, Schneier On Security, December 13, 2009, NEWS,weblink FBI taps cell phone mic as eavesdropping tool, McCullagh, Declan, Anne Broache, December 1, 2006, CNet News, March 14, 2009, yes,weblink" title="web.archive.org/web/20131110182623weblink">weblink November 10, 2013, NEWS,weblink Use of mobile helped police keep tabs on suspect, Odell, Mark, August 1, 2005, Financial Times, March 14, 2009, WEB,weblink Telephones, 2001, Western Regional Security Office (NOAA official site), March 22, 2009, NEWS,weblink Can You Hear Me Now?, ABC News: The Blotter, December 13, 2009, yes,weblink" title="web.archive.org/web/20110825102123weblink">weblink August 25, 2011, NEWS,weblink Even if they're off, cellphones allow FBI to listen in, Coughlin, Kevin, December 13, 2006, The Seattle Times, December 14, 2009, The StingRay tracker is an example of one of these tools used to monitor cell phone usage in the United States and the United Kingdom. Originally developed for counterterrorism purposes by the military, they work by broadcasting powerful signals that cause nearby cell phones to transmit their IMSI number, just as they would to normal cell phone towers. Once the phone is connected to the device, there is no way for the user to know that they are being tracked. The operator of the stingray is able to extract information such as location, phone calls, and text messages, but it is widely believed that the capabilities of the StingRay extend much further. A lot of controversy surrounds the StingRay because of its powerful capabilities and the secrecy that surrounds it.JOURNAL, Hampton, Brittany, 2012, From Smartphones to Stingrays: Can the Fourth Amendment Keep up with the Twenty-First Century Note,weblink University of Louisville Law Review, Fifty One, 159–176, Law Journal Library, Mobile phones are also commonly used to collect location data. The geographical location of a mobile phone (and thus the person carrying it) can be determined easily even when the phone is not being used, using a technique known as multilateration to calculate the differences in time for a signal to travel from the cell phone to each of several cell towers near the owner of the phone.NEWS,weblink Tracking a suspect by mobile phone, August 3, 2005, BBC News, March 14, 2009, NEWS,weblink Cell Phone Tracking Can Locate Terrorists – But Only Where It's Legal, Miller, Joshua, March 14, 2009, FOX News, March 14, 2009,weblink" title="web.archive.org/web/20090318002319weblink">weblink March 18, 2009, yes, mdy-all, The legality of such techniques has been questioned in the United States, in particular whether a court warrant is required.JOURNAL, 1092293, Warrantless Location Tracking, 2008, N.Y.U. Law Review, Samuel, Ian, Records for one carrier alone (Sprint), showed that in a given year federal law enforcement agencies requested customer location data 8 million times.NEWS,weblink Threat Level Privacy, Crime and Security Online Feds 'Pinged' Sprint GPS Data 8 Million Times Over a Year, Zetter, Kim, December 1, 2009, Wired Magazine: Threat Level, December 5, 2009, File:Aerial of GCHQ, Cheltenham, Gloucestershire, England 24May2017 arp.jpg|thumb|The headquarters of UK intelligence activities is Government Communications Headquarters, CheltenhamCheltenhamIn response to customers' privacy concerns in the post Edward Snowden era,WEB,weblink Greenstone Digital Library Software, snowdenarchive.cjfe.org, 2017-06-03, Apple's iPhone 6 has been designed to disrupt investigative wiretapping efforts. The phone encrypts e-mails, contacts, and photos with a code generated by a complex mathematical algorithm that is unique to an individual phone, and is inaccessible to Apple.NEWS,weblink Signaling Post-Snowden Era, New iPhone Locks Out N.S.A, Sanger, David, Sep 26, 2014, New York Times, November 1, 2014, The encryption feature on the iPhone 6 has drawn criticism from FBI director James B. Comey and other law enforcement officials since even lawful requests to access user content on the iPhone 6 will result in Apple supplying "gibberish" data that requires law enforcement personnel to either break the code themselves or to get the code from the phone's owner. Because the Snowden leaks demonstrated that American agencies can access phones anywhere in the world, privacy concerns in countries with growing markets for smart phones have intensified, providing a strong incentive for companies like Apple to address those concerns in order to secure their position in the global market.Although the CALEA requires telecommunication companies to build into their systems the ability to carry out a lawful wiretap, the law has not been updated to address the issue of smart phones and requests for access to e-mails and metadata.NEWS,weblink NSA tracking cellphone locations worldwide, Snowden documents show, Gellman, Barton, Dec 4, 2013, The Washington Post, November 1, 2014, The Snowden leaks show that the NSA has been taking advantage of this ambiguity in the law by collecting metadata on "at least hundreds of millions" of "incidental" targets from around the world. The NSA uses an analytic tool known as CO-TRAVELER in order to track people whose movements intersect and to find any hidden connections with persons of interest.The Snowden leaks have also revealed that the British Government Communications Headquarters (GCHQ) can access information collected by the NSA on American citizens. Once the data has been collected, the GCHQ can hold on to it for up to two years. The deadline can be extended with the permission of a "senior UK official".NEWS,weblink British spies can go through Americans' telephone calls and emails without warrant revelas legal challenge in the UK, Nye, James, Oct 26, 2014, Mail Online, November 1, 2014,

Cameras

File:Cairns-Lagoon.JPG|thumb|right|A surveillance camera in Cairns, QueenslandCairns, Queensland(File: Three Surveillance cameras.jpg|thumb|right|Surveillance cameras such as these are installed by the millions in many countries, and are nowadays monitored by automated computer programs instead of humans.)Surveillance cameras are video cameras used for the purpose of observing an area. They are often connected to a recording device or IP network, and may be watched by a security guard or law enforcement officer. Cameras and recording equipment used to be relatively expensive and required human personnel to monitor camera footage, but analysis of footage has been made easier by automated software that organizes digital video footage into a searchable database, and by video analysis software (such as VIRAT and HumanID). The amount of footage is also drastically reduced by motion sensors which only record when motion is detected. With cheaper production techniques, surveillance cameras are simple and inexpensive enough to be used in home security systems, and for everyday surveillance.As of 2016, there are about 350 million surveillance cameras worldwide. About 65% of these cameras are installed in Asia. The growth of CCTV has been slowing in recent years.WEB,weblink Rise of Surveillance Camera Installed Base Slows, 5 May 2016, 5 January 2017, In 2018, China was reported to have a huge surveillance network of over 170 million CCTV cameras with 400 million new cameras expected to be installed in the next three years, many of which use facial recognition technology.NEWS,weblink Smart cameras catch man in 60,000 crowd, 2018-04-13, BBC News, 2018-04-13, en-GB, In the United States, the Department of Homeland Security awards billions of dollars per year in Homeland Security grants for local, state, and federal agencies to install modern video surveillance equipment. For example, the city of Chicago, Illinois, recently used a $5.1 million Homeland Security grant to install an additional 250 surveillance cameras, and connect them to a centralized monitoring center, along with its preexisting network of over 2000 cameras, in a program known as Operation Virtual Shield. Speaking in 2009, Chicago Mayor Richard Daley announced that Chicago would have a surveillance camera on every street corner by the year 2016.NEWS,weblink Surveillance cams help fight crime, city says, Spielman, Fran, February 19, 2009, Chicago Sun Times, March 13, 2009, {{Dead link|date=August 2018 |bot=InternetArchiveBot |fix-attempted=yes }}NEWS,weblink We're Watching: How Chicago Authorities Keep An Eye On The City, Schorn, Daniel, September 6, 2006, CBS News, March 13, 2009, In the United Kingdom, the vast majority of video surveillance cameras are not operated by government bodies, but by private individuals or companies, especially to monitor the interiors of shops and businesses. According to 2011 Freedom of Information Act requests, the total number of local government operated CCTV cameras was around 52,000 over the entirety of the UK.WEB, The Price of Privacy: How local authorities spent £515m on CCTV in four years,weblink Big Brother Watch, 4 February 2015, February 2012, 30, The prevalence of video surveillance in the UK is often overstated due to unreliable estimates being requoted;WEB,weblink FactCheck: how many CCTV cameras?, Channel 4 News, 18 June 2008, 8 May 2009, NEWS, You're being watched: there's one CCTV camera for every 32 people in UK – Research shows 1.85m machines across Britain, most of them indoors and privately operated,weblink 7 January 2017, The Guardian, 2 March 2011, none, ; NEWS, In the press: How the media is reporting the 1.85 million cameras story,weblink 7 January 2017, Security News Desk, 3 March 2011, for example one report in 2002 extrapolated from a very small sample to estimate the number of cameras in the UK at 4.2 million (of which 500,000 in Greater London).WEB,weblink CCTV in London, 22 July 2009, More reliable estimates put the number of private and local government operated cameras in the United Kingdom at around 1.85 million in 2011.WEB,weblink How many cameras are there?, CCTV User Group, 18 June 2008, 8 May 2009,weblink" title="web.archive.org/web/20081023191646weblink">weblink October 23, 2008, yes, mdy-all, In the Netherlands, one example city where there are cameras is The Hague. There, cameras are placed in city districts in which the most illegal activity is concentrated. Examples are the red-light districts and the train stations.WEB,weblink Camera surveillance, Den Haag, December 2, 2016, yes,weblink" title="web.archive.org/web/20161008030841weblink">weblink October 8, 2016, mdy-all, As part of China's Golden Shield Project, several U.S. corporations, including IBM, General Electric, and Honeywell, have been working closely with the Chinese government to install millions of surveillance cameras throughout China, along with advanced video analytics and facial recognition software, which will identify and track individuals everywhere they go. They will be connected to a centralized database and monitoring station, which will, upon completion of the project, contain a picture of the face of every person in China: over 1.3 billion people.NEWS,weblink China's All-Seeing Eye, Klein, Naomi, May 29, 2008, Rolling Stone, March 20, 2009, Lin Jiang Huai, the head of China's "Information Security Technology" office (which is in charge of the project), credits the surveillance systems in the United States and the U.K. as the inspiration for what he is doing with the Golden Shield Project.(File: DSTAMP Controp Camera.jpg|thumb|left|A payload surveillance camera manufactured by Controp and distributed to the U.S. government by ADI Technologies)The Defense Advanced Research Projects Agency (DARPA) is funding a research project called Combat Zones That See that will link up cameras across a city to a centralized monitoring station, identify and track individuals and vehicles as they move through the city, and report "suspicious" activity (such as waving arms, looking side-to-side, standing in a group, etc.).NEWS,weblink Big Brother To See All, Everywhere, July 1, 2003, Associated Press, CBS News, September 26, 2014, At Super Bowl XXXV in January 2001, police in Tampa, Florida, used Identix's facial recognition software, FaceIt, to scan the crowd for potential criminals and terrorists in attendance at the eventWEB, Bonsor, K., How Facial Recognition Systems Work, June 18, 2006,weblink 2001-09-04, (it found 19 people with pending arrest warrants).WEB, McNealy, Scott, Privacy is (Virtually) Dead, December 24, 2006,weblink Governments oftenBOOK,weblink Communication Privacy Management, 9781743332900, Roebuck, Kevin, 2012-10-24, initially claim that cameras are meant to be used for traffic control, but many of them end up using them for general surveillance. For example, Washington, D.C. had 5,000 "traffic" cameras installed under this premise, and then after they were all in place, networked them all together and then granted access to the Metropolitan Police Department, so they could perform "day-to-day monitoring".WEB,weblink WIKILEAKS: Surveillance Cameras Around The Country Are Being Used In A Huge Spy Network, 2016-10-05, The development of centralized networks of CCTV cameras watching public areas – linked to computer databases of people's pictures and identity (biometric data), able to track people's movements throughout the city, and identify whom they have been with – has been argued by some to present a risk to civil liberties.WEB,weblink EPIC Video Surveillance Information Page, EPIC, March 13, 2009, Trapwire is an example of such a network.NEWS, Sarah, Hedgecock,weblink TrapWire: The Less-Than-Advertised System To Spy On Americans, The Daily Beast, August 14, 2012, 2012-09-13, {{clear}}

Social network analysis

File:Kencf0618FacebookNetwork.jpg|thumb|right|A graph of the relationships between users on the social networking site Facebook. Social network analysis enables governments to gather detailed information about peoples' friends, family, and other contacts. Since much of this information is voluntarily made public by the users themselves, it is often consider to be a form of open-source intelligenceopen-source intelligenceOne common form of surveillance is to create maps of social networks based on data from social networking sites such as Facebook, MySpace, Twitter as well as from traffic analysis information from phone call records such as those in the NSA call database,NEWS, Can Network Theory Thwart Terrorists?, Keefe, Patrick, March 12, 2006, New York Times, and others. These social network "maps" are then data mined to extract useful information such as personal interests, friendships & affiliations, wants, beliefs, thoughts, and activities.JOURNAL, Albrechtslund, Anders, March 3, 2008, Online Social Networking as Participatory Surveillance, First Monday, 13, 3,weblink March 14, 2009, BOOK, Fuchs, Christian, Social Networking Sites and the Surveillance Society. A Critical Case Study of the Usage of studiVZ, Facebook, and MySpace by Students in Salzburg in the Context of Electronic Surveillance, Forschungsgruppe Unified Theory of Information, Salzburg and Vienna, 2009, 978-3-200-01428-2,weblink July 28, 2012, WEB,weblink Current Research in Social Network Theory, Ethier, Jason, Northeastern University College of Computer and Information Science, March 15, 2009, bot: unknown,weblink" title="web.archive.org/web/20041116125614weblink">weblink November 16, 2004, mdy-all, Many U.S. government agencies such as the Defense Advanced Research Projects Agency (DARPA), the National Security Agency (NSA), and the Department of Homeland Security (DHS) are investing heavily in research involving social network analysis.NEWS,weblink Pentagon sets its sights on social networking websites, Marks, Paul, June 9, 2006, New Scientist, March 16, 2009, NEWS,weblink Is the NSA reading your MySpace profile?, Kawamoto, Dawn, June 9, 2006, CNET News, March 16, 2009, The intelligence community believes that the biggest threat to U.S. power comes from decentralized, leaderless, geographically dispersed groups of terrorists, subversives, extremists, and dissidents. These types of threats are most easily countered by finding important nodes in the network, and removing them. To do this requires a detailed map of the network.WEB,weblink Current Research in Social Network Theory, Ethier, Jason, Northeastern University College of Computer and Information Science, March 15, 2009, yes,weblink" title="web.archive.org/web/20150226213456weblink">weblink February 26, 2015, JOURNAL, Ressler, Steve, July 2006, Social Network Analysis as an Approach to Combat Terrorism: Past, Present, and Future Research, Homeland Security Affairs, II, 2,weblink March 14, 2009, WEB,weblink DyDAn Research Blog, DyDAn Research Blog (official blog of DyDAn), December 20, 2009, Jason Ethier of Northeastern University, in his study of modern social network analysis, said the following of the Scalable Social Network Analysis Program developed by the Information Awareness Office:AT&T developed a programming language called "Hancock", which is able to sift through enormous databases of phone call and Internet traffic records, such as the NSA call database, and extract "communities of interest"—groups of people who call each other regularly, or groups that regularly visit certain sites on the Internet. AT&T originally built the system to develop "marketing leads",NEWS,weblink AT&T Invents Programming Language for Mass Surveillance, Singel, Ryan, October 29, 2007, Threat Level, Wired, March 19, 2009, but the FBI has regularly requested such information from phone companies such as AT&T without a warrant, and, after using the data, stores all information received in its own databases, regardless of whether or not the information was ever useful in an investigation.NEWS,weblink Legally Questionable FBI Requests for Calling Circle Info More Widespread than Previously Known, Singel, Ryan, October 16, 2007, Threat Level, Wired, March 19, 2009, Some people believe that the use of social networking sites is a form of "participatory surveillance", where users of these sites are essentially performing surveillance on themselves, putting detailed personal information on public websites where it can be viewed by corporations and governments. In 2008, about 20% of employers reported using social networking sites to collect personal data on prospective or current employees.NEWS,weblinkweblink" title="web.archive.org/web/20080923065244weblink">weblink yes, September 23, 2008, One in five employers uses social networks in hiring process, Havenstein, Heather, September 12, 2008, Computer World, March 14, 2009,

Biometric

File:US-VISIT (CBP).jpg|thumb|right|Fingerprints being scanned as part of the US-VISITUS-VISITBiometric surveillance is a technology that measures and analyzes human physical and/or behavioral characteristics for authentication, identification, or screening purposes.BOOK, Woodward, John, Christopher Horn, Julius Gatune, Aryn Thomas, Biometrics: A Look at Facial Recognition, RAND Corporation, 2003, 978-0-8330-3302-4,weblink March 15, 2009, Examples of physical characteristics include fingerprints, DNA, and facial patterns. Examples of mostly behavioral characteristics include gait (a person's manner of walking) or voice.Facial recognition is the use of the unique configuration of a person's facial features to accurately identify them, usually from surveillance video. Both the Department of Homeland Security and DARPA are heavily funding research into facial recognition systems.NEWS,weblink Face recognition next in terror fight, Frank, Thomas, May 10, 2007, USA Today, March 16, 2009, The Information Processing Technology Office ran a program known as Human Identification at a Distance which developed technologies that are capable of identifying a person at up to {{convert|500|ft|m|abbr=on}} by their facial features.Another form of behavioral biometrics, based on affective computing, involves computers recognizing a person's emotional state based on an analysis of their facial expressions, how fast they are talking, the tone and pitch of their voice, their posture, and other behavioral traits. This might be used for instance to see if a person's behavior is suspect (looking around furtively, "tense" or "angry" facial expressions, waving arms, etc.).NEWS,weblinkweblink" title="web.archive.org/web/20071219164859weblink">weblink yes, 2007-12-19, Surveillance Society: New High-Tech Cameras Are Watching You, Vlahos, James, January 2008, Popular Mechanics, March 14, 2009, A more recent development is DNA profiling, which looks at some of the major markers in the body's DNA to produce a match. The FBI is spending $1 billion to build a new biometric database, which will store DNA, facial recognition data, iris/retina (eye) data, fingerprints, palm prints, and other biometric data of people living in the United States. The computers running the database are contained in an underground facility about the size of two American football fields.NEWS,weblink FBI Prepares Vast Database Of Biometrics: $1 Billion Project to Include Images of Irises and Faces, Nakashima, Ellen, December 22, 2007, Washington Post, A01, May 6, 2009, NEWS,weblink FBI wants palm prints, eye scans, tattoo mapping, Arena, Kelly, Carol Cratty, February 4, 2008, CNN, March 14, 2009, NEWS,weblink Lockheed wins $1 billion FBI biometric contract, Gross, Grant, February 13, 2008, IDG News Service, InfoWorld, March 18, 2009, The Los Angeles Police Department is installing automated facial recognition and license plate recognition devices in its squad cars, and providing handheld face scanners, which officers will use to identify people while on patrol.MAGAZINE,weblink LAPD: We Know That Mug, December 26, 2004, Associated Press, Wired Magazine, March 18, 2009, WEB,weblink$31230, LAPD Uses Face Recognition Technology To Fight Crime, Mack, Kelly, NBC4 TV (transcript from Officer.com), December 20, 2009,weblink" title="web.archive.org/web/20100330144142weblink">weblink$31230, March 30, 2010, yes, mdy-all, NEWS,weblink LAPD opens new high-tech crime analysis center, Willon, Phil, September 17, 2009, LA Times, December 20, 2009, Facial thermographs are in development, which allow machines to identify certain emotions in people such as fear or stress, by measuring the temperature generated by blood flow to different parts of the face.NEWS,weblink Can't Hide Your Lying ... Face?, Dotinga, Randy, October 14, 2004, Wired Magazine, March 18, 2009, Law enforcement officers believe that this has potential for them to identify when a suspect is nervous, which might indicate that they are hiding something, lying, or worried about something.In his paper in Ethics and Information Technology, Avi Marciano maps the harms caused by biometric surveillance, traces their theoretical origins, and brings these harms together in one integrative framework to elucidate their cumulative power. Marciano proposes four types of harms: Unauthorized use of bodily information, denial or limitation of access to physical spaces, bodily social sorting, and symbolic ineligibility through construction of marginality and otherness. Biometrics' social power, according to Marciano, derives from three main features: their complexity as "enigmatic technologies", their objective-scientific image, and their increasing agency, particularly in the context of automatic decision-making.

Aerial{{anchor|Aerial surveillance}}

{{Further|Surveillance aircraft}}(File:MicroAirVehicle.jpg|thumb|right|Micro Air Vehicle with attached surveillance camera)Aerial surveillance is the gathering of surveillance, usually visual imagery or video, from an airborne vehicle—such as an unmanned aerial vehicle, helicopter, or spy plane. Military surveillance aircraft use a range of sensors (e.g. radar) to monitor the battlefield.Digital imaging technology, miniaturized computers, and numerous other technological advances over the past decade have contributed to rapid advances in aerial surveillance hardware such as micro-aerial vehicles, forward-looking infrared, and high-resolution imagery capable of identifying objects at extremely long distances. For instance, the MQ-9 Reaper,WEB,weblink MQ-9 Reaper, Boyd, Ryan, en, 2016-10-05, a U.S. drone plane used for domestic operations by the Department of Homeland Security, carries cameras that are capable of identifying an object the size of a milk carton from altitudes of 30,000 feet, and has forward-looking infrared devices that can detect the heat from a human body at distances of up to 60 kilometers.WEB,weblink The Rapid Rise of Federal Surveillance Drones Over America, Friedersdorf, Conor, en-US, 2016-10-05, 2016-03-10, In an earlier instance of commercial aerial surveillance, the Killington Mountain ski resort hired 'eye in the sky' aerial photography of its competitors' parking lots to judge the success of its marketing initiatives as it developed starting in the 1950s.Edwards, Bruce, "Killington co-founder Sargent dead at 83" {{Webarchive|url=https://web.archive.org/web/20150904091030weblink |date=September 4, 2015 }}, Rutland Herald, November 9, 2012. Retrieved December 10, 2012.File:HURT concept drawing.jpg|thumb | right | HART program concept drawing from official IPTO (DARPADARPAThe United States Department of Homeland Security is in the process of testing UAVs to patrol the skies over the United States for the purposes of critical infrastructure protection, border patrol, "transit monitoring", and general surveillance of the U.S. population.NEWS,weblink Drone aircraft may prowl U.S. skies, McCullagh, Declan, March 29, 2006, CNet News, March 14, 2009, Miami-Dade police department ran tests with a vertical take-off and landing UAV from Honeywell, which is planned to be used in SWAT operations.NEWS,weblink US police experiment with Insitu, Honeywell UAVs, Warwick, Graham, June 12, 2007, FlightGlobal.com, March 13, 2009, Houston's police department has been testing fixed-wing UAVs for use in "traffic control".The United Kingdom, as well, is working on plans to build up a fleet of surveillance UAVs ranging from micro-aerial vehicles to full-size drones, to be used by police forces throughout the U.K.NEWS,weblink UK Home Office plans national police UAV fleet, La Franchi, Peter, July 17, 2007, Flight International, March 13, 2009, In addition to their surveillance capabilities, MAVs are capable of carrying tasers for "crowd control", or weapons for killing enemy combatants.NEWS,weblink No Longer Science Fiction: Less Than Lethal & Directed Energy Weapons, February 22, 2005, International Online Defense Magazine, March 15, 2009, Programs such as the Heterogeneous Aerial Reconnaissance Team program developed by DARPA have automated much of the aerial surveillance process. They have developed systems consisting of large teams drone planes that pilot themselves, automatically decide who is "suspicious" and how to go about monitoring them, coordinate their activities with other drones nearby, and notify human operators if something suspicious is occurring. This greatly increases the amount of area that can be continuously monitored, while reducing the number of human operators required. Thus a swarm of automated, self-directing drones can automatically patrol a city and track suspicious individuals, reporting their activities back to a centralized monitoring station.WEB,weblink HART Overview, August 2008, IPTO (DARPA) – Official website, March 15, 2009, yes,weblink" title="web.archive.org/web/20081205233843weblink">weblink December 5, 2008, mdy-all, WEB,weblink BAA 04-05-PIP: Heterogeneous Airborne Reconnaissance Team (HART), December 5, 2003, Information Processing Technology Office (DARPA) – Official Website, March 16, 2009, yes,weblink" title="web.archive.org/web/20081127074930weblink">weblink November 27, 2008, NEWS,weblink DARPA, Northrop Grumman Move Into Next Phase of UAV Control Architecture, Sirak, Michael, Nov 29, 2007, Defense Daily, March 16, 2009, yes,weblink" title="web.archive.org/web/20120309060941weblink">weblink March 9, 2012, In addition, researchers also investigate possibilities of autonomous surveillance by large groups of micro aerial vehicles stabilized by decentralized bio-inspired swarming rules.Saska, M.; Chudoba, J.; Preucil, L.; Thomas, J.; Loianno, G.; Tresnak, A.; Vonasek, V.; Kumar, V. Autonomous Deployment of Swarms of Micro-Aerial Vehicles in Cooperative Surveillance. In Proceedings of 2014 International Conference on Unmanned Aircraft Systems (ICUAS). 2014.Saska, M.; Vakula, J.; Preucil, L. Swarms of Micro Aerial Vehicles Stabilized Under a Visual Relative Localization. In ICRA2014: Proceedings of 2014 IEEE International Conference on Robotics and Automation. 2014.

Corporate

Corporate surveillance is the monitoring of a person or group's behavior by a corporation. The data collected is most often used for marketing purposes or sold to other corporations, but is also regularly shared with government agencies. It can be used as a form of business intelligence, which enables the corporation to better tailor their products and/or services to be desirable by their customers. Although there is a common belief that monitoring can increase productivity, it can also create consequences such as increasing chances of deviant behavior and creating punishments that are not equitable to their actions. Additionally, monitoring can cause resistance and backlash because it insinuates an employer’s suspicion and lack of trust.JOURNAL, Anthony, Denise, 2017, Toward a Sociology of Privacy, Annual Review of Sociology, 43, 1, 249–269, 10.1146/annurev-soc-060116-053643,

Data mining and profiling

Data mining is the application of statistical techniques and programmatic algorithms to discover previously unnoticed relationships within the data. Data profiling in this context is the process of assembling information about a particular individual or group in order to generate a profile â€” that is, a picture of their patterns and behavior. Data profiling can be an extremely powerful tool for psychological and social network analysis. A skilled analyst can discover facts about a person that they might not even be consciously aware of themselves.BOOK, Mireille Hildebrandt, Hildebrandt, Mireille, Serge Gutwirth, Profiling the European Citizen: Cross Disciplinary Perspectives, Springer, Dordrecht, 2008, 978-1-4020-6913-0, Economic (such as credit card purchases) and social (such as telephone calls and emails) transactions in modern society create large amounts of stored data and records. In the past, this data was documented in paper records, leaving a "paper trail", or was simply not documented at all. Correlation of paper-based records was a laborious process—it required human intelligence operators to manually dig through documents, which was time-consuming and incomplete, at best.But today many of these records are electronic, resulting in an "electronic trail". Every use of a bank machine, payment by credit card, use of a phone card, call from home, checked out library book, rented video, or otherwise complete recorded transaction generates an electronic record. Public records—such as birth, court, tax and other records—are increasily being digitized and made available online. In addition, due to laws like CALEA, web traffic and online purchases are also available for profiling. Electronic record-keeping makes data easily collectable, storable, and accessible—so that high-volume, efficient aggregation and analysis is possible at significantly lower costs.Information relating to many of these individual transactions is often easily available because it is generally not guarded in isolation, since the information, such as the title of a movie a person has rented, might not seem sensitive. However, when many such transactions are aggregated they can be used to assemble a detailed profile revealing the actions, habits, beliefs, locations frequented, social connections, and preferences of the individual. This profile is then used, by programs such as ADVISENEWS,weblink US Plans Massive Data Sweep, Clayton, Mark, February 9, 2006, Christian Science Monitor, March 13, 2009, and TALON, to determine whether the person is a military, criminal, or political threat.In addition to its own aggregation and profiling tools, the government is able to access information from third parties â€” for example, banks, credit companies or employers, etc. â€” by requesting access informally, by compelling access through the use of subpoenas or other procedures,WEB,weblink Administrative Subpoenas for the FBI: A Grab for Unchecked Executive Power, Flint, Lara, September 24, 2003, The Center For Democracy & Technology (official site), March 20, 2009, yes,weblink" title="web.archive.org/web/20090308183232weblink">weblink March 8, 2009, or by purchasing data from commercial data aggregators or data brokers. The United States has spent $370 million on its 43 planned fusion centers, which are national network of surveillance centers that are located in over 30 states. The centers will collect and analyze vast amounts of data on U.S. citizens. It will get this data by consolidating personal information from sources such as state driver's licensing agencies, hospital records, criminal records, school records, credit bureaus, banks, etc. – and placing this information in a centralized database that can be accessed from all of the centers, as well as other federal law enforcement and intelligence agencies.WEB,weblink "National Network" of Fusion Centers Raises Specter of COINTELPRO, June 2007, EPIC Spotlight on Surveillance, March 14, 2009, Under United States v. Miller (1976), data held by third parties is generally not subject to Fourth Amendment warrant requirements.

Human operatives

Organizations that have enemies who wish to gather information about the groups' members or activities face the issue of infiltration.NEWS,weblink Information on the Confidential Source in the Auburn Arrests, anonymous, Jan 26, 2006, Portland Indymedia, March 13, 2009, NEWS,weblink Is the Pentagon spying on Americans?, Myers, Lisa, December 14, 2005, NBC Nightly News, msnbc.com, March 13, 2009, In addition to operatives' infiltrating an organization, the surveilling party may exert pressure on certain members of the target organization to act as informants (i.e., to disclose the information they hold on the organization and its members).WEB,weblink The Use of Informants in FBI Domestic Intelligence Investigations, Final Report: Book III, Supplementary Detailed Staff Reports on Intelligence Activities and the Rights of Americans, 225–270, April 23, 1976, U.S. Senate Select Committee to Study Governmental Operations with Respect to Intelligence Activities, March 13, 2009, WEB,weblink Secret Justice: Criminal Informants and America's Underground Legal System {{!, Prison Legal News |website= www.prisonlegalnews.org |access-date= 2016-10-05}}Fielding operatives is very expensive, and for governments with wide-reaching electronic surveillance tools at their disposal the information recovered from operatives can often be obtained from less problematic forms of surveillance such as those mentioned above. Nevertheless, human infiltrators are still common today. For instance, in 2007 documents surfaced showing that the FBI was planning to field a total of 15,000 undercover agents and informants in response to an anti-terrorism directive sent out by George W. Bush in 2004 that ordered intelligence and law enforcement agencies to increase their HUMINT capabilities.WEB,weblink FBI Proposes Building Network of U.S. Informants, Ross, Brian, July 25, 2007, Blotter, ABC News, March 13, 2009,

Satellite imagery

On May 25, 2007 the U.S. Director of National Intelligence Michael McConnell authorized the National Applications Office (NAO) of the Department of Homeland Security to allow local, state, and domestic Federal agencies to access imagery from military intelligence Reconnaissance satellites and Reconnaissance aircraft sensors which can now be used to observe the activities of U.S. citizens. The satellites and aircraft sensors will be able to penetrate cloud cover, detect chemical traces, and identify objects in buildings and "underground bunkers", and will provide real-time video at much higher resolutions than the still-images produced by programs such as Google Earth.WEB,weblink U.S. Reconnaissance Satellites: Domestic Targets, National Security Archive, March 16, 2009, NEWS,weblink U.S. to Expand Domestic Use Of Spy Satellites, Block, Robert, August 15, 2007, Wall Street Journal, March 14, 2009, NEWS,weblink Satellite-Surveillance Program to Begin Despite Privacy Concerns, Gorman, Siobhan, October 1, 2008, The Wall Street Journal, March 16, 2009, NEWS,weblink Fact Sheet: National Applications Office, August 15, 2007, Department of Homeland Security (official website), March 16, 2009, yes,weblink" title="web.archive.org/web/20090311151910weblink">weblink March 11, 2009, mdy, NEWS,weblink Domestic Use of Spy Satellites To Widen, Warrick, Joby, August 16, 2007, Washington Post, A01, March 17, 2009, NEWS,weblink Spy imagery agency watching inside U.S., Shrader, Katherine, September 26, 2004, Associated Press, USA Today, March 17, 2009,

Identification and credentials

(File:Social Security card.jpg|thumb|right|A card containing an identification number)One of the simplest forms of identification is the carrying of credentials. Some nations have an identity card system to aid identification, whilst others are considering it but face public opposition. Other documents, such as passports, driver's licenses, library cards, banking or credit cards are also used to verify identity.If the form of the identity card is "machine-readable", usually using an encoded magnetic stripe or identification number (such as a Social Security number), it corroborates the subject's identifying data. In this case it may create an electronic trail when it is checked and scanned, which can be used in profiling, as mentioned above.

RFID and geolocation devices

(File:RFID hand 1.jpg|thumb|right|Hand with planned insertion point for Verichip device)

RFID tagging

Radio Frequency Identification (RFID) tagging is the use of very small electronic devices (called "RFID tags") which are applied to or incorporated into a product, animal, or person for the purpose of identification and tracking using radio waves. The tags can be read from several meters away. They are extremely inexpensive, costing a few cents per piece, so they can be inserted into many types of everyday products without significantly increasing the price, and can be used to track and identify these objects for a variety of purposes.Some companies appear to be "tagging" their workers by incorporating RFID tags in employee ID badges. Workers in U.K. considered strike action in protest of having themselves tagged; they felt that it was dehumanizing to have all of their movements tracked with RFID chips.NEWS,weblink Two Stories Highlight the RFID Debate, July 19, 2005, RFID Journal, March 23, 2012, {{vague|date=March 2012}} Some critics have expressed fears that people will soon be tracked and scanned everywhere they go. On the other hand, RFID tags in newborn baby ID bracelets put on by hospitals have foiled kidnappings.(File:Paypass chip front.png|thumb|upright|left|RFID chip pulled from new credit card)Verichip is an RFID device produced by a company called Applied Digital Solutions (ADS). Verichip is slightly larger than a grain of rice, and is injected under the skin. The injection reportedly feels similar to receiving a shot. The chip is encased in glass, and stores a "VeriChip Subscriber Number" which the scanner uses to access their personal information, via the Internet, from Verichip Inc.'s database, the "Global VeriChip Subscriber Registry". Thousands of people have already had them inserted.NEWS,weblink Microchips in humans spark privacy debate, Lewan, Todd, July 21, 2007, Associated Press, USA Today, March 17, 2009, In Mexico, for example, 160 workers at the Attorney General's office were required to have the chip injected for identity verification and access control purposes.NEWS,weblink RFID Chips Implanted In Mexican Law-Enforcement Workers, Gardener, W. David, July 15, 2004, Information Week, March 17, 2009, NEWS,weblink Law enforcement in Mexico goes a bit bionic, Campbell, Monica, August 4, 2004, Christian Science Monitor, March 17, 2009, In a 2003 editorial, CNET News.com's chief political correspondent, Declan McCullagh, speculated that, soon, every object that is purchased, and perhaps ID cards, will have RFID devices in them, which would respond with information about people as they walk past scanners (what type of phone they have, what type of shoes they have on, which books they are carrying, what credit cards or membership cards they have, etc.). This information could be used for identification, tracking, or targeted marketing. {{as of|2012}}, this has largely not come to pass.NEWS,weblink RFID Tags: Big Brother in small packages, McCullagh, Declan, January 13, 2003, CNET News, July 24, 2012, {{Clear}}

Global Positioning System

(File:ConstellationGPS.gif|thumb|right|Diagram of GPS satellites orbiting Earth){{see also|GPS tracking}}In the U.S., police have planted hidden GPS tracking devices in people's vehicles to monitor their movements,Lyman, D., Micheal. Criminal Investigation: The Art and the Science. 6th ed. Pearson, 2010. p249 without a warrant.Crowder, Stan, and Turvery E. Brent. Ethical Justice: Applied Issues for Criminal Justice Students and Professionals. 1st ed. Academic Press, 2013. p150. Print. In early 2009, they were arguing in court that they have the right to do this.NEWS,weblink Court Asked To Disallow Warrantless GPS Tracking, Claburn, Thomas, March 4, 2009, Information Week, March 18, 2009, Several cities are running pilot projects to require parolees to wear GPS devices to track their movements when they get out of prison.NEWS,weblink What legal questions are the new chip implants for humans likely to raise?, Hilden, Julie, CNN.com (FindLaw), March 17, 2009, April 16, 2002,

Mobile phones

Mobile phones are also commonly used to collect geolocation data. The geographical location of a powered mobile phone (and thus the person carrying it) can be determined easily (whether it is being used or not), using a technique known as multilateration to calculate the differences in time for a signal to travel from the cell phone to each of several cell towers near the owner of the phone. Dr. Victor KappelerWEB, Kappeler, Victor, Forget the NSA: Police May be a Greater Threat to Privacy,weblink of Eastern Kentucky University indicates that police surveillance is a strong concern, stating the following statistics from 2013:A comparatively new off-the-shelf surveillance device is an IMSI-catcher, a telephone eavesdropping device used to intercept mobile phone traffic and track the movement of mobile phone users. Essentially a "fake" mobile tower acting between the target mobile phone and the service provider's real towers, it is considered a man-in-the-middle (MITM) attack. IMSI-catchers are used in some countries by law enforcement and intelligence agencies, but their use has raised significant civil liberty and privacy concerns and is strictly regulated in some countries.{{citation | chapter=Section 100i – IMS I-Catcher | title=The German Code Of Criminal Procedure | chapter-url=http://www.gesetze-im-internet.de/englisch_stpo/german_code_of_criminal_procedure.pdf | pages=43–44 | year=2014 | access-date=November 27, 2015 | archive-url=https://web.archive.org/web/20150925164238weblink | archive-date=September 25, 2015 | dead-url=yes | df=mdy-all }}

Human microchips

A human microchip implant is an identifying integrated circuit device or RFID transponder encased in silicate glass and implanted in the body of a human being. A subdermal implant typically contains a unique ID number that can be linked to information contained in an external database, such as personal identification, medical history, medications, allergies, and contact information.Several types of microchips have been developed in order to control and monitor certain types of people, such as criminals, political figures and spies,{{Clarify|date=February 2016}} a "killer" tracking chip patent was filed at the German Patent and Trademark Office (DPMA) around May 2009.

Devices

{{See also|United States v. Spy Factory, Inc.}}Covert listening devices and video devices, or "bugs", are hidden electronic devices which are used to capture, record, and/or transmit data to a receiving party such as a law enforcement agency.The U.S. has run numerous domestic intelligence operations, such as COINTELPRO, which have bugged the homes, offices, and vehicles of thousands of U.S. citizens, usually political activists, subversives, and criminals.WEB,weblink COINTELPRO, Wolf, Paul, (online collection of historical documents), March 14, 2009, Law enforcement and intelligence services in the U.K. and the United States possess technology to remotely activate the microphones in cell phones, by accessing the phone's diagnostic/maintenance features, in order to listen to conversations that take place nearby the person who holds the phone.

Postal services

As more people use faxes and e-mail the significance of surveilling the postal system is decreasing, in favor of Internet and telephone surveillance. But interception of post is still an available option for law enforcement and intelligence agencies, in certain circumstances.{{citation needed |date=May 2015}} This is not a common practice, however, and entities like the US Army require high levels of approval to conduct.WEB,weblink U.S. Army Intelligence Activities, 25 May 2015, yes,weblink" title="web.archive.org/web/20150808002021weblink">weblink August 8, 2015, mdy, The U.S. Central Intelligence Agency and Federal Bureau of Investigation have performed twelve separate mail-opening campaigns targeted towards U.S. citizens. In one of these programs, more than 215,000 communications were intercepted, opened, and photographed.WEB,weblink Domestic CIA and FBI Mail Opening Programs, Final Report: Book III, Supplementary Detailed Staff Reports on Intelligence Activities and the Rights of Americans, 559–678, April 23, 1976, U.S. Senate Select Committee to Study Governmental Operations with Respect to Intelligence Activities, March 13, 2009, yes,weblink" title="web.archive.org/web/20110505050256weblink">weblink May 5, 2011, mdy-all, BOOK, Goldstein, Robert, Political Repression in Modern America, University of Illinois Press, 978-0-252-06964-2, Political Repression in Modern America, 2001,

Stakeout

{{Redirect|Stakeout}}A stakeout is the coordinated surveillance of a location or person. Stakeouts are generally performed covertly and for the purpose of gathering evidence related to criminal activity. The term derives from the practice by land surveyors of using survey stakes to measure out an area before the main building project is commenced.

Wildlife

The management of wildlife populations often requires surveillance. This includes, for example surveillance of (1) Invasive speciesJOURNAL, Hauser, Cindy E., McCarthy, Michael A., 2009-07-01, Streamlining 'search and destroy': cost-effective surveillance for invasive species management, Ecology Letters, en, 12, 7, 683–692, 10.1111/j.1461-0248.2009.01323.x, 19453617, 1461-0248, location and abundance for more effective management,JOURNAL, Holden, Matthew H., Nyrop, Jan P., Ellner, Stephen P., 2016-06-01, The economic benefit of time-varying surveillance effort for invasive species management, Journal of Applied Ecology, en, 53, 3, 712–721, 10.1111/1365-2664.12617, 1365-2664, (2) illegal fishers and poachersBOOK,weblink Recent Trends in Monitoring Control and Surveillance Systems for Capture Fisheries, Flewwelling, Peter, Nations, Food and Agriculture Organization of the United, 2003-01-01, Food & Agriculture Org., 9789251048764, en, BOOK, Yang, Rong, Ford, Benjamin, Tambe, Milind, Lemieux, Andrew, 2014-01-01, Adaptive Resource Allocation for Wildlife Protection Against Illegal Poachers,weblink Proceedings of the 2014 International Conference on Autonomous Agents and Multi-agent Systems, AAMAS '14, Richland, SC, International Foundation for Autonomous Agents and Multiagent Systems, 453–460, 9781450327381, to reduce harvest and overexploitation of natural resources, (3) the population abundances of endangered species to decrease the risk of extinction, and (4) wildlife diseases that can damage crops, agriculture and natural populations.JOURNAL, Mörner, T., Obendorf, D. L., Artois, M., Woodford, M. H., 2002-04-01, Surveillance and monitoring of wildlife diseases, Revue Scientifique et Technique (International Office of Epizootics), 21, 1, 67–76, 0253-1933, 11974631, 10.20506/rst.21.1.1321,

Controversy

(File:Bansky one nation under cctv.jpg|thumb|right|Graffiti expressing concern about proliferation of video surveillance)

Support

Supporters of surveillance systems believe that these tools can help protect society from terrorists and criminals. They argue that surveillance can reduce crime by three means: by deterrence, by observation, and by reconstruction. Surveillance can deter by increasing the chance of being caught, and by revealing the modus operandi. This requires a minimal level of invasiveness.Deviant Behaviour – Socially accepted observation of behaviour for security, Jeroen van RestAnother method on how surveillance can be used to fight criminal activity is by linking the information stream obtained from them to a recognition system (for instance, a camera system that has its feed run through a facial recognition system). This can for instance auto-recognize fugitives and direct police to their location.A distinction here has to be made however on the type of surveillance employed. Some people that say support video surveillance in city streets may not support indiscriminate telephone taps and vice versa. Besides the types, the way in how this surveillance is done also matters a lot; i.e. indiscriminate telephone taps are supported by much fewer people than say telephone taps only done to people suspected of engaging in illegal activities.Surveillance can also be used to give human operatives a tactical advantage through improved situational awareness, or through the use of automated processes, i.e. video analytics. Surveillance can help reconstruct an incident and prove guilt through the availability of footage for forensics experts. Surveillance can also influence subjective security if surveillance resources are visible or if the consequences of surveillance can be felt.Some of the surveillance systems (such as the camera system that has its feed run through a facial recognition system mentioned above) can also have other uses besides countering criminal activity. For instance, it can help on retrieving runaway children, abducted or missing adults and mentally disabled people. Other supporters simply believe that there is nothing that can be done about the loss of privacy, and that people must become accustomed to having no privacy. As Sun Microsystems CEO Scott McNealy said: "You have zero privacy anyway. Get over it."NEWS,weblink Sun on Privacy: 'Get Over It', Sprenger, Polly, January 26, 1999, Wired Magazine, March 20, 2009, NEWS,weblink Privacy, Baig, Edward, Marcia Stepanek, Neil Gross, April 5, 1999, Business Week, March 20, 2009, yes,weblink" title="web.archive.org/web/20081017102602weblink">weblink October 17, 2008, mdy, Another common argument is: "If you aren't doing something wrong then you don't have anything to fear." Which follows that if one is engaging in unlawful activities, in which case they do not have a legitimate justification for their privacy. However, if they are following the law the surveillance would not affect them.JOURNAL, Daniel J. Solove, Solove, Daniel, 'I've Got Nothing to Hide' and Other Misunderstandings of Privacy, San Diego Law Review, 2007, 44, 745, 998565,

Opposition

File:UncleSamListensIn.jpg|thumb|upright|An elaborate graffito in Columbus, Ohio, depicting state surveillance of telecommunicationstelecommunicationsWith the advent of programs such as the Total Information Awareness program and ADVISE, technologies such as high speed surveillance computers and biometrics software, and laws such as the Communications Assistance for Law Enforcement Act, governments now possess an unprecedented ability to monitor the activities of their subjects.WEB,weblink Is the U.S. Turning Into a Surveillance Society?, American Civil Liberties Union, March 13, 2009, Many civil rights and privacy groups, such as the Electronic Frontier Foundation and American Civil Liberties Union, have expressed concern that by allowing continual increases in government surveillance of citizens we will end up in a mass surveillance society, with extremely limited, or non-existent political and/or personal freedoms. Fears such as this have led to numerous lawsuits such as Hepting v. AT&T.WEB,weblink Bigger Monster, Weaker Chains: The Growth of an American Surveillance Society, January 15, 2003, American Civil Liberties Union, March 13, 2009, Some critics state that the claim made by supporters should be modified to read: "As long as we do what we're told, we have nothing to fear.". For instance, a person who is part of a political group which opposes the policies of the national government, might not want the government to know their names and what they have been reading, so that the government cannot easily subvert their organization, arrest, or kill them. Other critics state that while a person might not have anything to hide right now, the government might later implement policies that they do wish to oppose, and that opposition might then be impossible due to mass surveillance enabling the government to identify and remove political threats. Further, other critics point to the fact that most people do have things to hide. For example, if a person is looking for a new job, they might not want their current employer to know this. Also if an employer wishes total privacy to watch over their own employee and secure their financial information it may become impossible, and they may not wish to hire those under surveillance. The most concern of detriment is securing the lives of those who live under total surveillance willingly, educating the public to those under peaceful watch while identifying terrorist and those who use the same surveillance systems and mechanisms in opposition to peace, against civilians, and to disclose lives removed from the laws of the land.In addition, a significant risk of private data collection stems from the fact that this risk is too much unknown to be readily assessed today. Storage is cheap enough to have data stored forever, and the models using which it will be analyzed in a decade from now cannot reasonably be foreseen.NEWS,weblink Against the collection of private data: The unknown risk factor, March 8, 2012, In December 2017, the Government of China took steps to oppose widespread surveillance by security-company cameras, webcams, and IP Cameras after tens-of-thousands were made accessible for internet viewing by IT company QihooWEB,weblink Privacy fears over online surveillance footage broadcasts in China, 2017-12-13,

Totalitarianism

(File:Sur-veillance-trafficcam-glog.jpg|thumb|upright|A traffic camera atop a high pole oversees a road in the Canadian city of Toronto)Programs such as the Total Information Awareness program, and laws such as the Communications Assistance For Law Enforcement Act have led many groups to fear that society is moving towards a state of mass surveillance with severely limited personal, social, political freedoms, where dissenting individuals or groups will be strategically removed in COINTELPRO-like purges.Kate Martin, of the Center For National Security Studies said of the use of military spy satellites being used to monitor the activities of U.S. citizens: "They are laying the bricks one at a time for a police state."Some point to the blurring of lines between public and private places, and the privatization of places traditionally seen as public (such as shopping malls and industrial parks) as illustrating the increasing legality of collecting personal information.Marx, G. T., & Muschert, G. W. (2007). Personal information, borders, and the new surveillance studies {{Webarchive|url=https://web.archive.org/web/20170811145820weblink |date=August 11, 2017 }}. Annual Review of Law and Social Science, 3, 375–395. Traveling through many public places such as government offices is hardly optional for most people, yet consumers have little choice but to submit to companies' surveillance practices.Agre, Philip E. (2003), "Your Face is not a bar code: arguments against automatic face recognition in public places". Retrieved November 14, 2004. Surveillance techniques are not created equal; among the many biometric identification technologies, for instance, face recognition requires the least cooperation. Unlike automatic fingerprint reading, which requires an individual to press a finger against a machine, this technique is subtle and requires little to no consent.

Psychological/social effects

{{See also|Hawthorne effect}}Some critics, such as Michel Foucault, believe that in addition to its obvious function of identifying and capturing individuals who are committing undesirable acts, surveillance also functions to create in everyone a feeling of always being watched, so that they become self-policing. This allows the State to control the populace without having to resort to physical force, which is expensive and otherwise problematic.BOOK, Foucault, Michel, Discipline and Punish, Vintage Books, New York, 1979, 201–202, With the development of digital technology, individuals have become increasingly perceptible to one another, as surveillance becomes virtual. Online surveillance is the utilization of the internet to observe one's activity.BOOK, Superconnected: the internet, digital media, and techno-social life, Chayko, Mary, Sage Publications, 2017, New York, NY, Corporations, citizens, and governments participate in tracking others' behaviours for motivations that arise out of business relations, to curiosity, to legality. In her book Superconnected, Chayko differentiates between two types of surveillance: vertical and horizontal. Vertical surveillance occurs when there is a dominant force, such as the government that is attempting to control or regulate the actions of a given society. Such powerful authorities often justify their incursions as a means to protect society from threats of violence or terrorism. Some individuals question when this becomes an infringement on civil rights.Horizontal diverges from vertical surveillance as the tracking shifts from an authoritative source to an everyday figure, such as a friend, coworker, or stranger that is interested in one's mundane activities. Individuals leave traces of information when they are online that reveal their interests and desires of which others observe. While this can allow people to become interconnected and develop social connections online, it can also increase potential risk to harm, such as cyberbullying or censoring/stalking by strangers, reducing privacy.In addition, Simone Browne argues that surveillance wields an immense racializing quality such that it operates as "racializing surveillance." Browne uses racializing surveillance to refer to moments when enactments of surveillance are used to reify boundaries, borders, and bodies along racial lines and where the outcome is discriminatory treatment of those who are negatively racialized by such surveillance. Browne argues racializing surveillance pertains to policing what is “in or out of place.”JOURNAL, Nishiyama, Hidefumi, Surveillance as Race Struggle: On Browne’s Dark Matters,weblink Theory & Event, 20, 1, 2017, 280–285, Johns Hopkins University Press, Project MUSE, BOOK, Browne, Simone, Dark Matters: On the Surveillance of Blackness, October 2, 2015, Duke University Press Books, 978-0822359197, 224,

Privacy

Numerous civil rights groups and privacy groups oppose surveillance as a violation of people's right to privacy. Such groups include: Electronic Privacy Information Center, Electronic Frontier Foundation, American Civil Liberties UnionThere have been several lawsuits such as Hepting v. AT&T and EPIC v. Department of Justice by groups or individuals, opposing certain surveillance activities.Legislative proceedings such as those that took place during the Church Committee, which investigated domestic intelligence programs such as COINTELPRO, have also weighed the pros and cons of surveillance.
Court Cases
People vs. Diaz (2011) was a court case in the realm of cell phone privacy, even though the decision was later overturned. In this case, Gregory Diaz was arrested during a sting operation for attempting to sell ecstasy. During his arrest, police searched Diaz's phone and found more incriminating evidence including SMS text messages and photographs depicting illicit activities. During his trial, Diaz attempted to have the information from his cell phone removed from evidence, but the courts deemed it as lawful and Diaz's appeal was denied on the California State Court level and, later, the Supreme Court level. Just three short years after, this decision was overturned in the case Riley vs. California (2014).WEB,weblink People vs. Diaz, Court of Appeal, Second District, Division 6, California., July 30, 2008, FindLaw, Feb 1, 2017, Riley vs. California (2014) was an extremely vital Supreme Court case in which a man was arrested for his involvement in a drive-by shooting. A few days after the shooting the police made an arrest of the suspect (Riley), and, during the arrest, the police searched him. However, this search was not only of Riley's person, but also the police opened and searched his cell phone, finding pictures of other weapons, drugs, and of Riley showing gang signs. In court, the question arose whether searching the phone was lawful or if the search was protected by the 4th amendment of the constitution. The decision held that the search of Riley's cell phone during the arrest was illegal, and that it was protected by the 4th Amendment.WEB,weblink Riley v. California, California Fourth District Court of Appeal, Jun 25, 2014, Oyez – IIT Chicago-Kent College of Law, February 1, 2013,

Countersurveillance, inverse surveillance, sousveillance

Countersurveillance is the practice of avoiding surveillance or making surveillance difficult. Developments in the late twentieth century have caused counter surveillance to dramatically grow in both scope and complexity, such as the Internet, increasing prevalence of electronic security systems, high-altitude (and possibly armed) UAVs, and large corporate and government computer databases.WEB,weblink The Secrets of Countersurveillance, Security Weekly, June 6, 2007, Inverse surveillance is the practice of the reversal of surveillance on other individuals or groups (e.g., citizens photographing police). Well-known examples are George Holliday's recording of the Rodney King beating and the organization Copwatch, which attempts to monitor police officers to prevent police brutality. Counter-surveillance can be also used in applications to prevent corporate spying, or to track other criminals by certain criminal entities. It can also be used to deter stalking methods used by various entities and organizations.Sousveillance is inverse surveillance, involving the recording by private individuals, rather than government or corporate entities.NEWS
, Birch
, Dave
, The age of sousveillance
, The Guardian
,
,
,
, July 14, 2005
,weblink
, August 6, 2007, London,

Popular culture

In literature

  • George Orwell's novel Nineteen Eighty-Four portrays a fictional totalitarian surveillance society with a very simple (by today's standards) mass surveillance system consisting of human operatives, informants, and two-way "telescreens" in people's homes. Because of the impact of this book, mass-surveillance technologies are commonly called "Orwellian" when they are considered problematic.
  • The novel mistrust highlights the negative effects from the overuse of surveillance at Reflection House. The central character Kerryn installs secret cameras to monitor her housemates – see also Paranoia.
  • The book The Handmaid's Tale, as well as a film and TV series based on it, portray a totalitarian Christian theocracy where all citizens are kept under constant surveillance.
  • In the book The Girl with the Dragon Tattoo, Lisbeth Salander uses computers to get information on people, as well as other common surveillance methods, as a freelancer.
  • David Egger's novel The Circle exhibits a world where a single company called "The Circle" produces all of the latest and highest quality technologies from computers and smartphones, to surveillance cameras known as "See-Change cameras". This company becomes associated with politics when starting a movement where politicians go "transparent" by wearing See-Change cameras on their body to prevent keeping secrets from the public about their daily work activity. In this society, it becomes mandatory to share personal information and experiences because it is The Circle's belief that everyone should have access to all information freely. However, as Eggers illustrates, this takes a toll on the individuals and creates a disruption of power between the governments and the private company. The Circle presents extreme ideologies surrounding mandatory surveillance. Eamon Bailey, one of the Wise Men, or founders of The Circle, believes that possessing the tools to access information about anything or anyone, should be a human right given to all of the world's citizens.BOOK, The Circle, Eggers, David, Alfred A. Knopf, McSweeney's Books, 2013, 978-0-385-35139-3, New York, 288, 290–291, 486, By eliminating all secrets, any behaviour that has been deemed shameful will either become normalized or no longer considered shocking. Negative actions will eventually be eradicated from society altogether, through the fear of being exposed to other citizens This would be achieved in part by everyone going transparent, something that Bailey highly supports, although it's notable that none of the Wise Men ever became transparent themselves. One major goal of The Circle is to have all of the world's information filtered through The Circle, a process they call "Completion". A single, private company would then have full access and control over all information and privacy of individuals and governments. Ty Gospodinov, the first founder of The Circle, has major concerns about the completion of the circle. He warns that this step would give The Circle too much power and control, and would quickly lead to totalitarianism.

In music

Onscreen

See also

Notes

{{reflist|group=Note}}

References

{{reflist|colwidth=30em}}

Further reading

  • Allmer, Thomas (2012). "Towards a Critical Theory of Surveillance in Informational Capitalism". Frankfurt am Main: Peter Lang. {{ISBN|978-3-631-63220-8}}
  • Feldman, Jay. (2011). Manufacturing Hysteria: A History of Scapegoating, Surveillance, and Secrecy in Modern America. New York, NY: Pantheon Books. {{ISBN|0-375-42534-9}}
  • Fuchs, Christian, Kees Boersma, Anders Albrechtslund, and Marisol Sandoval, eds. (2012). "Internet and Surveillance: The Challenges of Web 2.0 and Social Media". New York: Routledge. {{ISBN|978-0-415-89160-8}}
  • Garfinkel, Simson, Database Nation; The Death of Privacy in the 21st Century. O'Reilly & Associates, Inc. {{ISBN|0-596-00105-3}}
  • Gilliom, John Overseers of the Poor: Surveillance, Resistance, and the Limits of Privacy, University Of Chicago Press, {{ISBN|978-0-226-29361-5}}
  • Haque, Akhlaque. (2015). Surveillance, Transparency and Democracy: Public Administration in the Information Age. University of Alabama Press, Tuscaloosa, AL. {{ISBN|978-0-8173-1877-2}}
  • Harris, Shane. (2011). The Watchers: The Rise of America's Surveillance State. London, UK: Penguin Books Ltd. {{ISBN|0-14-311890-0}}
  • Hier, Sean P., & Greenberg, Joshua (Eds.). (2009). Surveillance: Power, Problems, and Politics. Vancouver, CA: UBC Press. {{ISBN|0-7748-1611-2}}
  • Jenkins, Peter Advanced Surveillance Training Manual, Intel Publishing, UK {{ISBN|0-9535378-1-1}}
  • Jenkins, Peter Surveillance Tradecraft, Intel Publishing, UK {{ISBN|978-0-9535378-2-2}}
  • Jensen, Derrick and Draffan, George (2004) Welcome to the Machine: Science, Surveillance, and the Culture of Control Chelsea Green Publishing Company. {{ISBN|978-1-931498-52-4}}
  • Laidler, Keith. (2008). Surveillance Unlimited: How We've Become the Most Watched People on Earth. Cambridge, AU: Icon Books Ltd. {{ISBN|978-1-84046-877-9}}
  • Lyon, David (2001). Surveillance Society: Monitoring in Everyday Life. Philadelphia: Open University Press. {{ISBN|978-0-335-20546-2}}
  • Lyon, David (Ed.). (2006). Theorizing Surveillance: The Panopticon and Beyond. Cullompton, UK: Willan Publishing. {{ISBN|978-1-84392-191-2}}
  • Lyon, David (2007) Surveillance Studies: An Overview. Cambridge: Polity Press. {{ISBN|978-0-7456-3591-0}}
  • Matteralt, Armand. (2010). The Globalization of Surveillance. Cambridge, UK: Polity Press. {{ISBN|0-7456-4511-9}}
  • Parenti, Christian The Soft Cage: Surveillance in America From Slavery to the War on Terror, Basic Books, {{ISBN|978-0-465-05485-5}}
  • Petersen, J.K. (2012) Handbook of Surveillance Technologies, Third Edition, Taylor & Francis: CRC Press, 1020 pp., {{ISBN|978-1-439873-15-1}}
  • Petersen, J.K. (2012) Introduction to Surveillance Studies, Taylor & Francis: CRC Press, 416 pp., {{ISBN|978-1-466555-09-9}}
  • Staples, William G. (2000). Everyday Surveillance: Vigilance and Visibility in Post-Modern Life. Lanham, MD: Rowman & Littlefield Publishers. {{ISBN|0-7425-0077-2}}

General information

Historical information

  • COINTELPRO—FBI counterintelligence programs designed to neutralize political dissidents
  • weblink" title="web.archive.org/web/20140410190734weblink">Reversing the Whispering Gallery of Dionysius – A Short History of Electronic Surveillance in the United States

Legal resources

{{Wiktionary|surveillance}}{{Espionage}}{{Intelligence cycle management}}{{Privacy}}

- content above as imported from Wikipedia
- "surveillance" does not exist on GetWiki (yet)
- time: 7:22pm EDT - Wed, Aug 21 2019
[ this remote article is provided by Wikipedia ]
LATEST EDITS [ see all ]
GETWIKI 09 JUL 2019
Eastern Philosophy
History of Philosophy
GETWIKI 09 MAY 2016
GETWIKI 18 OCT 2015
M.R.M. Parrott
Biographies
GETWIKI 20 AUG 2014
GETWIKI 19 AUG 2014
CONNECT