Knowledge

Surveillance

Source đź“ť

2107:"transparent" by wearing See-Change cameras on their body to prevent keeping secrets from the public about their daily work activity. In this society, it becomes mandatory to share personal information and experiences because it is The Circle's belief that everyone should have access to all information freely. However, as Eggers illustrates, this takes a toll on the individuals and creates a disruption of power between the governments and the private company. The Circle presents extreme ideologies surrounding mandatory surveillance. Eamon Bailey, one of the Wise Men, or founders of The Circle, believes that possessing the tools to access information about anything or anyone, should be a human right given to all of the world's citizens. By eliminating all secrets, any behaviour that has been deemed shameful will either become normalized or no longer considered shocking. Negative actions will eventually be eradicated from society altogether, through the fear of being exposed to other citizens This would be achieved in part by everyone going transparent, something that Bailey highly supports, although none of the Wise Men ever became transparent themselves. One major goal of The Circle is to have all of the world's information filtered through The Circle, a process they call "Completion". A single, private company would then have full access and control over all information and privacy of individuals and governments. Ty Gospodinov, the first founder of The Circle, has major concerns about the completion of the circle. He warns that this step would give The Circle too much power and control, and would quickly lead to 98: 380: 1697: 886:, Avi Marciano maps the harms caused by biometric surveillance, traces their theoretical origins, and brings these harms together in one integrative framework to elucidate their cumulative power. Marciano proposes four types of harms: Unauthorized use of bodily information, denial or limitation of access to physical spaces, bodily social sorting, and symbolic ineligibility through construction of marginality and otherness. Biometrics' social power, according to Marciano, derives from three main features: their complexity as "enigmatic technologies", their objective-scientific image, and their increasing agency, particularly in the context of automatic decision-making. 1688:." That is, one does not have a right to privacy regarding illegal activities, while those following the law suffer no harm from surveillance and so have no standing to object to it. Beyond the heroically self-serving identification of what is wrong with what is illegal, the ethical fly in this ointment is the tacit premise that the individual has no duty to preserve the health of the state—the antithesis of the principle that only the consent of the governed can adequately serve as the moral foundation of a (just) state and warrant the vast gulf between its power (and agency) and that of the individual. 90: 1038:
operators if something suspicious is occurring. This greatly increases the amount of area that can be continuously monitored, while reducing the number of human operators required. Thus a swarm of automated, self-directing drones can automatically patrol a city and track suspicious individuals, reporting their activities back to a centralized monitoring station. In addition, researchers also investigate possibilities of autonomous surveillance by large groups of micro aerial vehicles stabilized by decentralized bio-inspired swarming rules.
1127:, which are national network of surveillance centers that are located in over 30 states. The centers will collect and analyze vast amounts of data on U.S. citizens. It will get this data by consolidating personal information from sources such as state driver's licensing agencies, hospital records, criminal records, school records, credit bureaus, banks, etc.—and placing this information in a centralized database that can be accessed from all of the centers, as well as other federal law enforcement and intelligence agencies. 1793: 1379:(RFID) tagging is the use of very small electronic devices (called "RFID tags") which are applied to or incorporated into a product, animal, or person for the purpose of identification and tracking using radio waves. The tags can be read from several meters away. They are extremely inexpensive, costing a few cents per piece, so they can be inserted into many types of everyday products without significantly increasing the price, and can be used to track and identify these objects for a variety of purposes. 1630: 476: 794:, and extract "communities of interest"—groups of people who call each other regularly, or groups that regularly visit certain sites on the Internet. AT&T originally built the system to develop "marketing leads", but the FBI has regularly requested such information from phone companies such as AT&T without a warrant, and, after using the data, stores all information received in its own databases, regardless of whether or not the information was ever useful in an investigation. 674: 1769:
names and what they have been reading, so that the government cannot easily subvert their organization, arrest, or kill them. Other critics state that while a person might not have anything to hide right now, the government might later implement policies that they do wish to oppose, and that opposition might then be impossible due to mass surveillance enabling the government to identify and remove political threats. Further, other critics point to the fact that most people
360:, just as they would to normal cell phone towers. Once the phone is connected to the device, there is no way for the user to know that they are being tracked. The operator of the stingray is able to extract information such as location, phone calls, and text messages, but it is widely believed that the capabilities of the StingRay extend much further. A lot of controversy surrounds the StingRay because of its powerful capabilities and the secrecy that surrounds it. 1477:(PSR) is a class of radar sensors that monitor activity surrounding or on critical infrastructure areas such as airports, seaports, military installations, national borders, refineries and other critical industry and the like. Such radars are characterized by their ability to detect movement at ground level of targets such as an individual walking or crawling towards a facility. Such radars typically have ranges of several hundred metres to over 10 kilometres. 8792: 1057:, which enables the corporation to better tailor their products and/or services to be desirable by their customers. Although there is a common belief that monitoring can increase productivity, it can also create consequences such as increasing chances of deviant behavior and creating punishments that are not equitable to their actions. Additionally, monitoring can cause resistance and backlash because it insinuates an employer's suspicion and lack of trust. 52: 959: 807: 1369: 1705: 905: 1449:. The chip is encased in glass, and stores a "VeriChip Subscriber Number" which the scanner uses to access their personal information, via the Internet, from Verichip Inc.'s database, the "Global VeriChip Subscriber Registry". Thousands of people have already had them inserted. In Mexico, for example, 160 workers at the Attorney General's office were required to have the chip injected for identity verification and 465: 7307: 857:, which looks at some of the major markers in the body's DNA to produce a match. The FBI is spending $ 1 billion to build a new biometric database, which will store DNA, facial recognition data, iris/retina (eye) data, fingerprints, palm prints, and other biometric data of people living in the United States. The computers running the database are contained in an underground facility about the size of two 1414: 287:, which is a data mining system that gives the United States government direct access to information from technology companies. Through accessing this information, the government is able to obtain search history, emails, stored information, live chats, file transfers, and more. This program generated huge controversies in regards to surveillance and privacy, especially from U.S. citizens. 1850:, believe that in addition to its obvious function of identifying and capturing individuals who are committing undesirable acts, surveillance also functions to create in everyone a feeling of always being watched, so that they become self-policing. This allows the State to control the populace without having to resort to physical force, which is expensive and otherwise problematic. 200: 850:, involves computers recognizing a person's emotional state based on an analysis of their facial expressions, how fast they are talking, the tone and pitch of their voice, their posture, and other behavioral traits. This might be used for instance to see if a person's behavior is suspect (looking around furtively, "tense" or "angry" facial expressions, waving arms, etc.). 1621:(IoT), is a network of physical devices. These devices can collect data to one another without human intervention. IoTs can be used for identification, monitoring, location tracking, and health tracking. While IoTs can be used as time-saving tools that make activities simpler, they raise the concern of government surveillance and privacy regarding how data will be used. 1952:
text messages and photographs depicting illicit activities. During his trial, Diaz attempted to have the information from his cell phone removed from evidence, but the courts deemed it as lawful and Diaz's appeal was denied on the California State Court level and, later, the Supreme Court level. Just three short years after, this decision was overturned in the case
1970:
his cell phone, finding pictures of other weapons, drugs, and of Riley showing gang signs. In court, the question arose whether searching the phone was lawful or if the search was protected by the 4th amendment of the constitution. The decision held that the search of Riley's cell phone during the arrest was illegal, and that it was protected by the 4th Amendment.
1095:". Every use of a bank machine, payment by credit card, use of a phone card, call from home, checked out library book, rented video, or otherwise complete recorded transaction generates an electronic record. Public records—such as birth, court, tax and other records—are increasingly being digitized and made available online. In addition, due to laws like 507:). The amount of footage is also drastically reduced by motion sensors which record only when motion is detected. With cheaper production techniques, surveillance cameras are simple and inexpensive enough to be used in home security systems, and for everyday surveillance. Video cameras are one of the most common methods of surveillance. 3472: 650:, but many of them end up using them for general surveillance. For example, Washington, D.C. had 5,000 "traffic" cameras installed under this premise, and then after they were all in place, networked them all together and then granted access to the Metropolitan Police Department, so they could perform "day-to-day monitoring". 1122:
In addition to its own aggregation and profiling tools, the government is able to access information from third parties—for example, banks, credit companies or employers, etc.—by requesting access informally, by compelling access through the use of subpoenas or other procedures, or by purchasing data
442:
has been taking advantage of this ambiguity in the law by collecting metadata on "at least hundreds of millions" of "incidental" targets from around the world. The NSA uses an analytic tool known as CO-TRAVELER in order to track people whose movements intersect and to find any hidden connections with
1969:
case in which a man was arrested for his involvement in a drive-by shooting. A few days after the shooting the police made an arrest of the suspect (Riley), and, during the arrest, the police searched him. However, this search was not only of Riley's person, but also the police opened and searched
1862:
differentiates between two types of surveillance: vertical and horizontal. Vertical surveillance occurs when there is a dominant force, such as the government that is attempting to control or regulate the actions of a given society. Such powerful authorities often justify their incursions as a means
797:
Some people believe that the use of social networking sites is a form of "participatory surveillance", where users of these sites are essentially performing surveillance on themselves, putting detailed personal information on public websites where it can be viewed by corporations and governments. In
874:
are in development, which allow machines to identify certain emotions in people such as fear or stress, by measuring the temperature generated by blood flow to different parts of the face. Law enforcement officers believe that this has potential for them to identify when a suspect is nervous, which
2106:
exhibits a world where a single company called "The Circle" produces all of the latest and highest quality technologies from computers and smartphones, to surveillance cameras known as "See-Change cameras". This company becomes associated with politics when starting a movement where politicians go
1878:
argues that surveillance wields an immense racializing quality such that it operates as "racializing surveillance." Browne uses racializing surveillance to refer to moments when enactments of surveillance are used to reify boundaries, borders, and bodies along racial lines and where the outcome is
1866:
Horizontal diverges from vertical surveillance as the tracking shifts from an authoritative source to an everyday figure, such as a friend, coworker, or stranger that is interested in one's mundane activities. Individuals leave traces of information when they are online that reveal their interests
1823:
Some point to the blurring of lines between public and private places, and the privatization of places traditionally seen as public (such as shopping malls and industrial parks) as illustrating the increasing legality of collecting personal information. Traveling through many public places such as
1223:
sensors which can now be used to observe the activities of U.S. citizens. The satellites and aircraft sensors will be able to penetrate cloud cover, detect chemical traces, and identify objects in buildings and "underground bunkers", and will provide real-time video at much higher resolutions than
568:
requests, the total number of local government operated CCTV cameras was around 52,000 over the entirety of the UK. The prevalence of video surveillance in the UK is often overstated due to unreliable estimates being requoted; for example one report in 2002 extrapolated from a very small sample to
1951:
was a court case in the realm of cell phone privacy, even though the decision was later overturned. In this case, Gregory Diaz was arrested during a sting operation for attempting to sell ecstasy. During his arrest, police searched Diaz's phone and found more incriminating evidence including SMS
1773:
have things to hide. For example, if a person is looking for a new job, they might not want their current employer to know this. Also if an employer wishes total privacy to watch over their own employee and secure their financial information it may become impossible, and they may not wish to hire
1562:
As more people use faxes and e-mail the significance of surveilling the postal system is decreasing, in favor of Internet and telephone surveillance. But interception of post is still an available option for law enforcement and intelligence agencies, in certain circumstances. This is not a common
1768:
Some critics state that the claim made by supporters should be modified to read: "As long as we do what we're told, we have nothing to fear." For instance, a person who is part of a political group which opposes the policies of the national government, might not want the government to know their
1553:
Law enforcement and intelligence services in the U.K. and the United States possess technology to remotely activate the microphones in cell phones, by accessing the phone's diagnostic/maintenance features, in order to listen to conversations that take place nearby the person who holds the phone.
1394:
In a 2003 editorial, CNET News.com's chief political correspondent, Declan McCullagh, speculated that, soon, every object that is purchased, and perhaps ID cards, will have RFID devices in them, which would respond with information about people as they walk past scanners (what type of phone they
611:
and facial recognition software, which will identify and track individuals everywhere they go. They will be connected to a centralized database and monitoring station, which will, upon completion of the project, contain a picture of the face of every person in China: over 1.3 billion people. Lin
1853:
With the development of digital technology, individuals have become increasingly perceptible to one another, as surveillance becomes virtual. Online surveillance is the utilization of the internet to observe one's activity. Corporations, citizens, and governments participate in tracking others'
1672:
Some of the surveillance systems (such as the camera system that has its feed run through a facial recognition system mentioned above) can also have other uses besides countering criminal activity. For instance, it can help in retrieving runaway children, abducted or missing adults and mentally
1657:
Another method on how surveillance can be used to fight criminal activity is by linking the information stream obtained from them to a recognition system (for instance, a camera system that has its feed run through a facial recognition system). This can for instance auto-recognize fugitives and
1494: 779:
The purpose of the SSNA algorithms program is to extend techniques of social network analysis to assist with distinguishing potential terrorist cells from legitimate groups of people.... In order to be successful SSNA will require information on the social interactions of the majority of people
347:
Law enforcement and intelligence services in the United Kingdom and the United States possess technology to activate the microphones in cell phones remotely, by accessing phones' diagnostic or maintenance features in order to listen to conversations that take place near the person who holds the
239:
There is far too much data on the Internet for human investigators to manually search through all of it. Therefore, automated Internet surveillance computers sift through the vast amount of intercepted Internet traffic to identify and report to human investigators the traffic that is considered
1037:
have automated much of the aerial surveillance process. They have developed systems consisting of large teams drone planes that pilot themselves, automatically decide who is "suspicious" and how to go about monitoring them, coordinate their activities with other drones nearby, and notify human
407:
feature on the iPhone 6 has drawn criticism from FBI director James B. Comey and other law enforcement officials since even lawful requests to access user content on the iPhone 6 will result in Apple supplying "gibberish" data that requires law enforcement personnel to either break the code
1170:
at their disposal, rather than gathering the sort of information which operatives can provide, may use less problematic forms of surveillance—such as those mentioned above. Nevertheless, the use of human infiltrators remains common. For instance, in 2007 documents surfaced showing that the
408:
themselves or to get the code from the phone's owner. Because the Snowden leaks demonstrated that American agencies can access phones anywhere in the world, privacy concerns in countries with growing markets for smart phones have intensified, providing a strong incentive for companies like
1304:
Of the 321,545 law enforcement requests made to Verizon, 54,200 of these requests were for "content" or "location" information—not just cell phone numbers or IP addresses. Content information included the actual text of messages, emails and the wiretapping of voice or messaging content in
1661:
A distinction here has to be made however on the type of surveillance employed. Some people that support video surveillance in city streets may not support indiscriminate telephone taps and vice versa. Besides the types, the way in which this surveillance is done also matters a lot; i.e.
824:
Biometric surveillance is a technology that measures and analyzes human physical and/or behavioral characteristics for authentication, identification, or screening purposes. Examples of physical characteristics include fingerprints, DNA, and facial patterns. Examples of mostly behavioral
240:
interesting or suspicious. This process is regulated by targeting certain "trigger" words or phrases, visiting certain types of web sites, or communicating via email or online chat with suspicious individuals or groups. Billions of dollars per year are spent by agencies, such as the
355:
tracker is an example of one of these tools used to monitor cell phone usage in the United States and the United Kingdom. Originally developed for counterterrorism purposes by the military, they work by broadcasting powerful signals that cause nearby cell phones to transmit their
5290:
Physical surveillance is the act of making observations of people, vehicles, or the activities occurring at specific locations. Physical surveillance may take place either at a fixed location, which is known as a stakeout, or in a continually moving situation, referred to as a
1102:
Information relating to many of these individual transactions is often easily available because it is generally not guarded in isolation, since the information, such as the title of a movie a person has rented, might not seem sensitive. However, when many such transactions are
5095:
Saska, M.; Chudoba, J.; Preucil, L.; Thomas, J.; Loianno, G.; Tresnak, A.; Vonasek, V.; Kumar, V. Autonomous Deployment of Swarms of Micro-Aerial Vehicles in Cooperative Surveillance. In Proceedings of 2014 International Conference on Unmanned Aircraft Systems (ICUAS).
1291:
Mobile carrier antennas are also commonly used to collect geolocation data on mobile phones. The geographical location of a powered mobile phone (and thus the person carrying it) can be determined easily (whether it is being used or not), using a technique known as
1052:
Corporate surveillance is the monitoring of a person or group's behavior by a corporation. The data collected is most often used for marketing purposes or sold to other corporations, but is also regularly shared with government agencies. It can be used as a form of
1669:. Surveillance can help reconstruct an incident and prove guilt through the availability of footage for forensics experts. Surveillance can also influence subjective security if surveillance resources are visible or if the consequences of surveillance can be felt. 1437:
Several types of microchips have been developed in order to control and monitor certain types of people, such as criminals, political figures and spies, a "killer" tracking chip patent was filed at the German Patent and Trademark Office (DPMA) around May 2009.
1981:
is the practice of avoiding surveillance or making surveillance difficult. Developments in the late twentieth century have caused counter surveillance to dramatically grow in both scope and complexity, such as the Internet, increasing prevalence of electronic
1390:
to have all of their movements tracked with RFID chips. Some critics have expressed fears that people will soon be tracked and scanned everywhere they go. On the other hand, RFID tags in newborn baby ID bracelets put on by hospitals have foiled kidnappings.
631:
that will link up cameras across a city to a centralized monitoring station, identify and track individuals and vehicles as they move through the city, and report "suspicious" activity (such as waving arms, looking side-to-side, standing in a group, etc.).
1456:
Implantable microchips have also been used in healthcare settings, but ethnographic researchers have identified a number of ethical problems with such uses; these problems include unequal treatment, diminished trust, and possible endangerment of patients.
1072:
in this context is the process of assembling information about a particular individual or group in order to generate a profile â€” that is, a picture of their patterns and behavior. Data profiling can be an extremely powerful tool for psychological and
1099:, web traffic and online purchases are also available for profiling. Electronic record-keeping makes data easily collectable, storable, and accessible—so that high-volume, efficient aggregation and analysis is possible at significantly lower costs. 612:
Jiang Huai, the head of China's "Information Security Technology" office (which is in charge of the project), credits the surveillance systems in the United States and the U.K. as the inspiration for what he is doing with the Golden Shield Project.
537:, Illinois, recently used a $ 5.1 million Homeland Security grant to install an additional 250 surveillance cameras, and connect them to a centralized monitoring center, along with its preexisting network of over 2000 cameras, in a program known as 418:
has made several moves to emphasize their concern for privacy, in order to appeal to more consumers. In 2011, Apple stopped the use of permanent device identifiers, and in 2019, they banned the ability of third parties to track on children’s apps.
135:
for intelligence gathering, including espionage, prevention of crime, the protection of a process, person, group or object, or the investigation of crime. It is also used by criminal organizations to plan and commit crimes, and by businesses to
495:. Cameras and recording equipment used to be relatively expensive and required human personnel to monitor camera footage, but analysis of footage has been made easier by automated software that organizes digital video footage into a searchable 7193:"Special Issue on Surveillance Capitalism – nine articles analyzing financial, social, political, legal, historical, security and other aspects of US and international surveillance and spying programs and their relation to capitalism" 2012:. Counter-surveillance can be also used in applications to prevent corporate spying, or to track other criminals by certain criminal entities. It can also be used to deter stalking methods used by various entities and organizations. 363:
Mobile phones are also commonly used to collect location data. The geographical location of a mobile phone (and thus the person carrying it) can be determined easily even when the phone is not being used, using a technique known as
450:(GCHQ) can access information collected by the NSA on American citizens. Once the data has been collected, the GCHQ can hold on to it for up to two years. The deadline can be extended with the permission of a "senior UK official". 321:—have contracts with the FBI, requiring them to keep their phone call records easily searchable and accessible for Federal agencies, in return for $ 1.8 million per year. Between 2003 and 2005, the FBI sent out more than 140,000 " 1088:", or was simply not documented at all. Correlation of paper-based records was a laborious process—it required human intelligence operators to manually dig through documents, which was time-consuming and incomplete, at best. 693:
enables governments to gather detailed information about peoples' friends, family, and other contacts. Since much of this information is voluntarily made public by the users themselves, it is often considered to be a form of
2595: 3503: 752:(DHS) are investing heavily in research involving social network analysis. The intelligence community believes that the biggest threat to U.S. power comes from decentralized, leaderless, geographically dispersed groups of 2970: 2051:
system consisting of human operatives, informants, and two-way "telescreens" in people's homes. Because of the impact of this book, mass-surveillance technologies are commonly called "Orwellian" when they are considered
1819:
Kate Martin, of the Center For National Security Studies said of the use of military spy satellites being used to monitor the activities of U.S. citizens: "They are laying the bricks one at a time for a police state."
780:
around the globe. Since the Defense Department cannot easily distinguish between peaceful citizens and terrorists, it will be necessary for them to gather data on innocent civilians as well as on potential terrorists.
1444:
is an RFID device produced by a company called Applied Digital Solutions (ADS). Verichip is slightly larger than a grain of rice, and is injected under the skin. The injection reportedly feels similar to receiving a
1152:
may surreptitiously track and report on the movements and contacts of a person of interest. Such following by one or more people may provide useful in formation in relatively densely populated urban environments.
181:
is by definition covert and typically illegal according to the rules of the observed party, whereas most types of surveillance are overt and are considered legal or legitimate by state authorities. International
6155: 564:, the vast majority of video surveillance cameras are not operated by government bodies, but by private individuals or companies, especially to monitor the interiors of shops and businesses. According to 2011 1433:
typically contains a unique ID number that can be linked to information contained in an external database, such as personal identification, medical history, medications, allergies, and contact information.
7231: 2302:, is about British government trying to brainwash people by media, obtain their support by fearmongering, monitor them by mass surveillance devices, and suppress or kill any political or social objection. 1650:. They argue that surveillance can reduce crime by three means: by deterrence, by observation, and by reconstruction. Surveillance can deter by increasing the chance of being caught, and by revealing the 313:(CALEA) requires that all telephone and VoIP communications be available for real-time wiretapping by Federal law enforcement and intelligence agencies. Two major telecommunications companies in the U.S.— 1824:
government offices is hardly optional for most people, yet consumers have little choice but to submit to companies' surveillance practices. Surveillance techniques are not created equal; among the many
236:, all phone calls and broadband Internet traffic (emails, web traffic, instant messaging, etc.) are required to be available for unimpeded real-time monitoring by federal law enforcement agencies. 1832:
requires the least cooperation. Unlike automatic fingerprint reading, which requires an individual to press a finger against a machine, this technique is subtle and requires little to no consent.
8310: 1479:
Alternate technologies include laser-based systems. These have the potential for very high target position accuracy, however they are less effective in the presence of fog and other obscurants.
5865: 4727: 1395:
have, what type of shoes they have on, which books they are carrying, what credit cards or membership cards they have, etc.). This information could be used for identification, tracking, or
931:
Digital imaging technology, miniaturized computers, and numerous other technological advances over the past decade have contributed to rapid advances in aerial surveillance hardware such as
1574:
have performed twelve separate mail-opening campaigns targeted towards U.S. citizens. In one of these programs, more than 215,000 communications were intercepted, opened, and photographed.
403:
efforts. The phone encrypts e-mails, contacts, and photos with a code generated by a complex mathematical algorithm that is unique to an individual phone, and is inaccessible to Apple. The
4200:
Social Networking Sites and the Surveillance Society. A Critical Case Study of the Usage of studiVZ, Facebook, and MySpace by Students in Salzburg in the Context of Electronic Surveillance
576:
In the Netherlands, one example city where there are cameras is The Hague. There, cameras are placed in city districts in which the most illegal activity is concentrated. Examples are the
616: 1237: 8419: 510:
As of 2016, there are about 350 million surveillance cameras worldwide. About 65% of these cameras are installed in Asia. The growth of CCTV has been slowing in recent years. In 2018,
275:, on a computer system, they can easily gain unauthorized access to this data. Such software could be installed physically or remotely. Another form of computer surveillance, known as 6920:
Fuchs, Christian, Kees Boersma, Anders Albrechtslund, and Marisol Sandoval, eds. (2012). "Internet and Surveillance: The Challenges of Web 2.0 and Social Media". New York: Routledge.
1867:
and desires of which others observe. While this can allow people to become interconnected and develop social connections online, it can also increase potential risk to harm, such as
1271:), it corroborates the subject's identifying data. In this case it may create an electronic trail when it is checked and scanned, which can be used in profiling, as mentioned above. 1300:
near the owner of the phone. Dr. Victor Kappeler of Eastern Kentucky University indicates that police surveillance is a strong concern, stating the following statistics from 2013:
1673:
disabled people. Other supporters simply believe that there is nothing that can be done about the loss of privacy, and that people must become accustomed to having no privacy. As
2959: 6343: 1879:
discriminatory treatment of those who are negatively racialized by such surveillance. Browne argues racializing surveillance pertains to policing what is "in or out of place."
831:
is the use of the unique configuration of a person's facial features to accurately identify them, usually from surveillance video. Both the Department of Homeland Security and
1990:, and large corporate and government computer databases. Other examples include encrypted messenger apps such as Signal and privacy cryptocurrencies such as Monero and ZCash. 955:
ski resort hired 'eye in the sky' aerial photography of its competitors' parking lots to judge the success of its marketing initiatives as it developed starting in the 1950s.
325:" ordering phone companies to hand over information about their customers' calling and Internet histories. About half of these letters requested information on U.S. citizens. 5823:
Monahan, Torin; Fisher, Jill A. (2010). "Implanting inequality: Empirical evidence of social and ethical risks of implantable radio-frequency identification (RFID) devices".
430:
companies to build into their systems the ability to carry out a lawful wiretap, the law has not been updated to address the issue of smart phones and requests for access to
279:, involves reading electromagnetic emanations from computing devices in order to extract data from them at distances of hundreds of meters. The NSA runs a database known as " 4865: 771:
Jason Ethier of Northeastern University, in his study of modern social network analysis, said the following of the Scalable Social Network Analysis Program developed by the
643:
facial recognition software, FaceIt, to scan the crowd for potential criminals and terrorists in attendance at the event (it found 19 people with pending arrest warrants).
332:
software creates machine-readable text from intercepted audio, which is then processed by automated call-analysis programs, such as those developed by agencies such as the
4488: 2476:
Greenleaf, Richard E. (2018). "Historiography of the Mexican Inquisition: Evolution of Interpretations and Methodologies". In Perry, Mary Elizabeth; Cruz, Anne J. (eds.).
1531:
and video devices, or "bugs", are hidden electronic devices which are used to capture, record, and/or transmit data to a receiving party such as a law enforcement agency.
8414: 4967: 3130: 6673: 6152: 1360:, a global messaging system. The data showed that millions of secret tracking commands originated from Saudi in a duration of four-months, starting from November 2019. 4670: 514:
to have a huge surveillance network of over 170 million CCTV cameras with 400 million new cameras expected to be installed in the next three years, many of which use
372:
near the owner of the phone. The legality of such techniques has been questioned in the United States, in particular whether a court warrant is required. Records for
7988: 3833:"You're being watched: there's one CCTV camera for every 32 people in UK – Research shows 1.85m machines across Britain, most of them indoors and privately operated" 790:
AT&T developed a programming language called "Hancock", which is able to sift through enormous databases of phone call and Internet traffic records, such as the
1665:
Surveillance can also be used to give human operatives a tactical advantage through improved situational awareness, or through the use of automated processes, i.e.
1511:
tracking devices in people's vehicles to monitor their movements, without a warrant. In early 2009, they were arguing in court that they have the right to do this.
768:. These types of threats are most easily countered by finding important nodes in the network, and removing them. To do this requires a detailed map of the network. 8464: 8201: 5590: 3935: 3806: 951:
devices that can detect the heat from a human body at distances of up to 60 kilometers (37 mi). In an earlier instance of commercial aerial surveillance, the
7752: 7207:
ACLU, "The Surveillance-Industrial Complex: How the American Government Is Conscripting Businesses and Individuals in the Construction of a Surveillance Society"
5767: 479:
Surveillance cameras such as these are installed by the millions in many countries, and are nowadays monitored by automated computer programs instead of humans.
6961:
Haque, Akhlaque. (2015). Surveillance, Transparency and Democracy: Public Administration in the Information Age. University of Alabama Press, Tuscaloosa, AL.
3774: 5356: 3965: 8479: 8360: 7998: 4272: 4835: 1662:
indiscriminate telephone taps are supported by much fewer people than say telephone taps done only to people suspected of engaging in illegal activities.
1159:
In addition to operatives' infiltrating an organization, the surveilling party may exert pressure on certain members of the target organization to act as
483:
Surveillance cameras, or security cameras, are video cameras used for the purpose of observing an area. They are often connected to a recording device or
6054:. U.S. Senate Select Committee to Study Governmental Operations with Respect to Intelligence Activities. April 23, 1976. pp. 559–678. Archived from 6328: 6303: 8691: 7216: 1137: 1080:
Economic (such as credit card purchases) and social (such as telephone calls and emails) transactions in modern society create large amounts of stored
8399: 4246: 4119: 3445: 1805: 1736: 1096: 553:, which is an interconnected system of sensors including 18,000 CCTV cameras used for continual surveillance of the city by both police officers and 423: 310: 233: 97: 3696: 8656: 8595: 8484: 6541: 5941: 4735: 4584: 1996:
is the practice of the reversal of surveillance on other individuals or groups (e.g., citizens photographing police). Well-known examples include
6545: 5271:. Security and Professional Intelligence Education Series (3 ed.). Lanham, Maryland: Rowman & Littlefield (published 2019). p. 57. 2244:
portrays a society wherein people are drugged with sedatives and antidepressants, and have surveillance cameras watching them everywhere they go.
1156:
Organizations that have enemies who wish to gather information about the groups' members or activities face the issue of potential infiltration.
573:). More reliable estimates put the number of private and local government operated cameras in the United Kingdom at around 1.85 million in 2011. 5066: 657:
data), able to track people's movements throughout the city, and identify whom they have been with—has been argued by some to present a risk to
3279: 554: 4916: 4217: 3721:
Levine, E. S.; Tisch, Jessica; Tasso, Anthony; Joy, Michael (February 2017). "The New York City Police Department's Domain Awareness System".
3222: 1759:
society, with extremely limited, or non-existent political and/or personal freedoms. Fears such as this have led to numerous lawsuits such as
653:
The development of centralized networks of CCTV cameras watching public areas—linked to computer databases of people's pictures and identity (
267:
Computers can be a surveillance target because of the personal data stored on them. If someone is able to install software, such as the FBI's
8350: 4942: 600: 4993: 3409: 283:", which stores and indexes large numbers of emails of both American citizens and foreigners. Additionally, the NSA runs a program known as 8429: 8131: 7795: 5915: 4344: 947:, carries cameras that are capable of identifying an object the size of a milk carton from altitudes of 30,000 feet (9.1 km), and has 3850: 2672: 7778: 7745: 7650: 5625: 5337:. U.S. Senate Select Committee to Study Governmental Operations with Respect to Intelligence Activities. April 23, 1976. pp. 225–270 2323:
is about using U.S. citizens' data to search their background and surveillance devices to capture everyone that is identified as "enemy".
1068:
is the application of statistical techniques and programmatic algorithms to discover previously unnoticed relationships within the data.
992:", and general surveillance of the U.S. population. Miami-Dade police department ran tests with a vertical take-off and landing UAV from 121: 7275: 1514:
Several cities are running pilot projects to require parolees to wear GPS devices to track their movements when they get out of prison.
264:
to intercept and analyze all of this data to extract only the information which is useful to law enforcement and intelligence agencies.
6647: 6368: 6044: 1863:
to protect society from threats of violence or terrorism. Some individuals question when this becomes an infringement on civil rights.
376:
carrier alone (Sprint), showed that in a given year federal law enforcement agencies requested customer location data 8 million times.
7293: 3192: 2551: 2162:
surveillance to distinguish between people who are genetically engineered "superior" humans and genetically natural "inferior" humans.
8194: 7835: 5487: 5029: 1593:
is the coordinated surveillance of a location or person. Stakeouts are generally performed covertly and for the purpose of gathering
1267:
If the form of the identity card is "machine-readable", usually using an encoded magnetic stripe or identification number (such as a
741: 624: 1812:
with severely limited personal, social, political freedoms, where dissenting individuals or groups will be strategically removed in
1175:
planned to field a total of 15,000 undercover agents and informants in response to an anti-terrorism directive (issued by President
737:
to extract useful information such as personal interests, friendships & affiliations, wants, beliefs, thoughts, and activities.
8439: 8355: 8345: 7232:
ICO. (September 2006). "A Report on the Surveillance Society for the Information Commissioner by the Surveillance Studies Network".
1030: 966: 962: 836: 2933: 843:
which developed technologies that are capable of identifying a person at up to 500 ft (150 m) by their facial features.
798:
2008, about 20% of employers reported using social networking sites to collect personal data on prospective or current employees.
6351: 6199: 3749: 1777:
In December 2017, the Government of China took steps to oppose widespread surveillance by security-company cameras, webcams, and
1382:
Some companies appear to be "tagging" their workers by incorporating RFID tags in employee ID badges. Workers in U.K. considered
5209: 4496: 4313: 4287: 3330: 8023: 7993: 7738: 7633: 7589: 6600: 6081: 4519: 447: 384: 3138: 2332:
explores the potential for video surveillance to be manipulated in order to support a conviction to pursue a political agenda.
8671: 8176: 7211: 7151: 7137: 7123: 7067: 7053: 7039: 7011: 6966: 6956: 6925: 6831: 6775: 6095: 5166: 4529: 4211: 2435: 1896: 868:
devices in its squad cars, and providing handheld face scanners, which officers will use to identify people while on patrol.
6012: 8494: 8300: 7825: 7584: 6621: 5680: 5521: 4678: 2146: 912:
Aerial surveillance is the gathering of surveillance, usually visual imagery or video, from an airborne vehicle—such as an
6699: 5576: 4862: 2787: 2584: 2482:. Center for Medieval and Renaissance Studies, UCLA. Vol. 24. Berleley: University of California Press. p. 260. 8836: 8651: 8459: 8449: 8409: 7339: 4558: 3908: 1755:, have expressed concern that by allowing continual increases in government surveillance of citizens we will end up in a 17: 5601: 4615: 3939: 3810: 3613: 8391: 8365: 8325: 7769: 6887: 6499: 3883: 3049: 2996: 2407: 2392: 2020:
is inverse surveillance, involving the recording by private individuals, rather than government or corporate entities.
1966: 1523: 1333:, but their use has raised significant civil liberty and privacy concerns and is strictly regulated in some countries. 985: 865: 840: 504: 5775: 108:
is the monitoring of behavior, many activities, or information for the purpose of information gathering, influencing,
8568: 8489: 8474: 8370: 8234: 7485: 7250:"The NSA Files (Dozens of articles about the U.S. National Security Agency and its spying and surveillance programs)" 7165: 7095: 7081: 6994: 6980: 6942: 6915: 6421: 5276: 2621: 2524: 2487: 2460: 2342: 1198: 989: 883: 379: 38: 1248:
system to aid identification, whilst others are considering it but face public opposition. Other documents, such as
8257: 8126: 8118: 7520: 7445: 6052:
Final Report: Book III, Supplementary Detailed Staff Reports on Intelligence Activities and the Rights of Americans
5550: 5335:
Final Report: Book III, Supplementary Detailed Staff Reports on Intelligence Activities and the Rights of Americans
4088: 3781: 1077:. A skilled analyst can discover facts about a person that they might not even be consciously aware of themselves. 7239: 3973: 8444: 8375: 8340: 8136: 6793: 3075: 2760: 2070: 1571: 1317:
device used to intercept mobile phone traffic and track the movement of mobile phone users. Essentially a "fake"
1209: 981: 944: 749: 565: 526: 3832: 2904: 619:
A payload surveillance camera manufactured by Controp and distributed to the U.S. government by ADI Technologies
533:
for local, state, and federal agencies to install modern video surveillance equipment. For example, the city of
8666: 8646: 8600: 8563: 8469: 8424: 8067: 7892: 7807: 7387: 7179: 7109: 7025: 6901: 6873: 6859: 6845: 2204: 1904: 1900: 1752: 1748: 1376: 6292: 1696: 1123:
from commercial data aggregators or data brokers. The United States has spent $ 370 million on its 43 planned
1107:
they can be used to assemble a detailed profile revealing the actions, habits, beliefs, locations frequented,
8826: 8573: 8404: 8379: 7761: 7311: 4461: 4061: 3529: 3022: 2126: 1922: 604: 6146: 3253: 939:, and high-resolution imagery capable of identifying objects at extremely long distances. For instance, the 8434: 6087: 3385:"Threat Level Privacy, Crime and Security Online Feds 'Pinged' Sprint GPS Data 8 Million Times Over a Year" 2387: 2078:
uses computers to get information on people, as well as other common surveillance methods, as a freelancer.
1474: 1467: 1205: 772: 678: 357: 333: 284: 249: 204: 5997:
Rooney, Julie Lynn (2017). "Going Postal: Analyzing the Abuse of Mail Covers Under the Fourth Amendment".
8454: 8184: 5714: 2402: 2372: 2220: 2200: 1801: 1720: 1567: 6812: 5949: 1854:
behaviours for motivations that arise out of business relations, to curiosity, to legality. In her book
131:
Surveillance is used by citizens, for instance for protecting their neighborhoods. It is widely used by
8841: 5462: 5125: 4592: 3101: 2382: 1000:
operations. Houston's police department has been testing fixed-wing UAVs for use in "traffic control".
871: 511: 112:, or directing. This can include observation from a distance by means of electronic equipment, such as 344:, which search for certain words or phrases, to decide whether to dedicate a human agent to the call. 8821: 8686: 8630: 8610: 8335: 8295: 6725: 5330: 4616:"FBI Prepares Vast Database Of Biometrics: $ 1 Billion Project to Include Images of Irises and Faces" 3750:"New NYPD surveillance cameras to cover stretch of Upper East Side not easily reached by patrol cars" 3164: 2307: 2102: 1739:, governments now possess an unprecedented ability to monitor the activities of their subjects. Many 1583: 1508: 1408: 828: 515: 459: 113: 5651: 5239: 5074: 4198: 3280:"From Smartphones to Stingrays: Can the Fourth Amendment Keep up with the Twenty-First Century Note" 8831: 8099: 7830: 6674:"Dark web finds bitcoin increasingly more of a problem than a help, tries other digital currencies" 5382: 3230: 2864: 2851: 1685: 1348:
of exploiting global mobile telecom network weaknesses to spy on its citizens traveling around the
1322: 1296:
to calculate the differences in time for a signal to travel from the cell phone to each of several
1216: 1192: 1149: 948: 936: 899: 745: 695: 538: 530: 368:
to calculate the differences in time for a signal to travel from the cell phone to each of several
322: 5109:. In ICRA2014: Proceedings of 2014 IEEE International Conference on Robotics and Automation. 2014. 5004: 3417: 1321:
acting between the target mobile phone and the service provider's real towers, it is considered a
8681: 8676: 8548: 8330: 8151: 8141: 8089: 7820: 7470: 7440: 7332: 7172:
Introduction to Intelligent Surveillance: Surveillance Data Capture, Transmission, and Analytics
5439: 4462:"Legally Questionable FBI Requests for Calling Circle Info More Widespread than Previously Known" 3995: 2367: 2328: 2288: 2212: 2208: 2196: 1987: 1528: 1357: 1244:
One of the simplest forms of identification is the carrying of credentials. Some nations have an
1220: 1132: 1108: 1074: 1012: 984:
is in the process of testing UAVs to patrol the skies over the United States for the purposes of
913: 858: 706: 702: 690: 550: 492: 268: 6413: 5357:"Secret Justice: Criminal Informants and America's Underground Legal System | Prison Legal News" 4700: 4434: 4376:"Social Network Analysis as an Approach to Combat Terrorism: Past, Present, and Future Research" 4352: 3548: 2680: 8722: 8320: 8315: 8262: 8166: 8104: 8084: 8033: 7790: 4787: 4758: 2846: 2167: 2057: 1326: 1268: 1201: 1047: 879: 352: 7212:
Balkin, Jack M. (2008). "The Constitution in the National Surveillance State", Yale Law School
6908:
Manufacturing Hysteria: A History of Scapegoating, Surveillance, and Secrecy in Modern America
6516: 6364: 5866:
Plextek’s Blighter B400 series radars improve perimeter security at London’s Heathrow Airport
3369: 2812: 8816: 8701: 8272: 8227: 8053: 7719: 6245: 2644: 2538:
accounts and inventories alike are generally within the area of surveillance of the auditor .
2357: 2283: 2172: 1908: 1895:
groups oppose surveillance as a violation of people's right to privacy. Such groups include:
1563:
practice, however, and entities like the US Army require high levels of approval to conduct.
1213: 1054: 1008: 932: 925: 921: 895: 628: 584: 215: 6389:"Your Face is not a bar code: arguments against automatic face recognition in public places" 6055: 1538:, which have bugged the homes, offices, and vehicles of thousands of U.S. citizens, usually 8520: 8305: 8156: 8094: 7980: 7936: 7921: 7870: 7815: 7645: 7628: 7601: 7364: 5495: 5154: 5040: 4018: 3200: 2039: 1993: 1446: 1104: 647: 640: 137: 5408: 5217: 3549:"This is everything Edward Snowden revealed in one year of unprecedented top-secret leaks" 1642:
Supporters of surveillance systems believe that these tools can help protect society from
1352:. The data shared by the whistleblower in support of the claims, showed that a systematic 171:
may have laws that seek to restrict governmental and private use of surveillance, whereas
8: 8737: 8605: 8590: 8540: 8277: 8189: 8063: 7880: 7853: 7707: 7611: 7359: 7206: 6514: 5526: 5106: 4620: 4062:"WIKILEAKS: Surveillance Cameras Around The Country Are Being Used In A Huge Spy Network" 2249: 1978: 1959: 1539: 1330: 1253: 952: 847: 300: 125: 62: 31: 6173: 545:
announced that Chicago would have a surveillance camera on every street corner by 2016.
8777: 8161: 8146: 8038: 8013: 7951: 7902: 7887: 7596: 7563: 7537: 7515: 7510: 7480: 7465: 7325: 7269: 6605: 6585: 6406: 6135: 5972: 5848: 4146: 3635: 3595: 3450: 2909: 2501:
Studies are based partially on Inquisition surveillance of foreigners and Protestants.
2291: 2192: 1916: 1761: 1713: 1618: 1396: 1167: 577: 469: 296: 7226: 6207: 5798: 5183: 5139: 5120: 1700:
Surveillance lamppost brought down in Hong Kong by citizens fearing state surveillance
89: 69: 8851: 8747: 8530: 8003: 7712: 7381: 7175: 7161: 7147: 7133: 7119: 7105: 7091: 7077: 7063: 7049: 7035: 7021: 7007: 6990: 6976: 6962: 6952: 6938: 6930: 6921: 6911: 6897: 6883: 6869: 6855: 6841: 6827: 6771: 6535: 6495: 6417: 6241: 6127: 6091: 5876: 5840: 5272: 5162: 4644: 4525: 4266: 4207: 3587: 3384: 3365: 3338: 2860: 2559: 2520: 2483: 2456: 2431: 2397: 2347: 2232: 2216: 2048: 1809: 1756: 1598: 1430: 1314: 1245: 1166:
Fielding operatives is very expensive, and governments with wide-reaching electronic
1092: 1007:, as well, is working on plans to build up a fleet of surveillance UAVs ranging from 791: 726: 682: 427: 276: 208: 6767: 6388: 5852: 5434: 4535: 3300: 1111:, and preferences of the individual. This profile is then used, by programs such as 8846: 8795: 8661: 8620: 8558: 8510: 8267: 8220: 8058: 8008: 7677: 7409: 6807: 6360: 6229: 5832: 5265:
Prunckun, Hank (April 12, 2019) . "Clandestine and Covert Sources of Information".
5134: 4321: 4177: 4066: 3730: 3599: 3579: 2856: 2362: 2270: 2075: 2009: 1983: 1930: 1841: 1829: 1674: 1163:(i.e., to disclose the information they hold on the organization and its members). 1116: 722: 592: 542: 225: 117: 27:
Monitoring something for the purposes of influencing, protecting, or suppressing it
7249: 6648:"Why some cyber criminals are ditching bitcoin for a cryptocurrency called monero" 3473:"Are iPhones Really Better for Privacy? Comparative Study of iOS and Android Apps" 1796:
A traffic camera atop a high pole oversees a road in the Canadian city of Toronto.
1179:
in 2004) that ordered intelligence and law-enforcement agencies to increase their
875:
might indicate that they are hiding something, lying, or worried about something.
569:
estimate the number of cameras in the UK at 4.2 million (of which 500,000 were in
412:
to address those concerns in order to secure their position in the global market.
8525: 8515: 7946: 7875: 7697: 7672: 7606: 7568: 7505: 7243: 6999: 6401: 6159: 6019: 5266: 4887: 4869: 3662: 2882: 2514: 2477: 2108: 1847: 1666: 1293: 1280: 864:
The Los Angeles Police Department is installing automated facial recognition and
658: 636: 608: 365: 341: 257: 253: 164: 5688: 4813: 4517: 3566:
Crocco, Marco; Cristani, Marco; Trucco, Andrea; Murino, Vittorio (May 2, 2016).
2061:, as well as a film and TV series based on it, portray a totalitarian Christian 1792: 1781:
after tens-of-thousands were made accessible for internet viewing by IT company
1119:, to determine whether the person is a military, criminal, or political threat. 1084:
and records. In the past, this data was documented in paper records, leaving a "
8762: 8742: 8615: 8043: 7863: 7375: 7197: 6293:"Bigger Monster, Weaker Chains: The Growth of an American Surveillance Society" 5902:
Ethical Justice: Applied Issues for Criminal Justice Students and Professionals
5107:
Swarms of Micro Aerial Vehicles Stabilized Under a Visual Relative Localization
3775:"The Price of Privacy: How local authorities spent £515m on CCTV in four years" 3023:"Rogue FBI Letters Hint at Phone Companies' Own Data Mining Programs – Updated" 2299: 2295: 2224: 2082: 1945: 1651: 1629: 1450: 1426: 1387: 1176: 1124: 1069: 1004: 730: 561: 488: 396: 329: 6465: 6264: 5836: 3912: 3688: 8810: 8732: 8727: 8625: 8585: 8580: 7961: 7941: 7926: 7655: 7623: 7525: 7500: 7419: 7272:—FBI counterintelligence programs designed to neutralize political dissidents 7217:
Bibo, Didier and Delmas-Marty, "The State and Surveillance: Fear and Control"
6487: 6232:(2007). "'I've Got Nothing to Hide' and Other Misunderstandings of Privacy". 6131: 5741: 4040: 3876: 3591: 2563: 2479:
Cultural Encounters: The Impact of the Inquisition in Spain and the New World
2352: 2316: 2275: 2122: 2088: 2034: 2016: 1875: 1868: 1678: 1606: 1602: 1383: 1349: 1341: 1023: 1018:
In addition to their surveillance capabilities, MAVs are capable of carrying
978: 854: 546: 522: 475: 306: 305:
The official and unofficial tapping of telephone lines is widespread. In the
172: 7088:
Surveillance and Security: Technological Politics and Power in Everyday Life
5942:"What legal questions are the new chip implants for humans likely to raise?" 5210:"Administrative Subpoenas for the FBI: A Grab for Unchecked Executive Power" 2832:"Electromagnetic Radiation from Video Display Units: An Eavesdropping Risk?" 1212:
to allow local, state, and domestic Federal agencies to access imagery from
8772: 8553: 8048: 7956: 7897: 7490: 7475: 7414: 7399: 7392: 7254: 6760: 6730: 6515:
Court of Appeal, Second District, Division 6, California. (July 30, 2008).
6153:
Deviant Behaviour – Socially accepted observation of behaviour for security
5844: 4968:"No Longer Science Fiction: Less Than Lethal & Directed Energy Weapons" 4840: 3734: 2262: 2187: 2044: 1973: 1888: 1740: 1728: 1502: 1345: 1337: 1310: 1257: 1225: 673: 314: 7730: 6949:
Overseers of the Poor: Surveillance, Resistance, and the Limits of Privacy
6558: 5304: 5067:"DARPA, Northrop Grumman Move Into Next Phase of UAV Control Architecture" 4182: 4165: 4144:
Keefe, Patrick (March 12, 2006). "Can Network Theory Thwart Terrorists?".
2136:
song "Hymn of Acxiom" is about corporate data collection and surveillance.
159:
A byproduct of surveillance is that it can unjustifiably violate people's
8767: 8287: 7858: 7692: 7558: 7404: 7004:
Welcome to the Machine: Science, Surveillance, and the Culture of Control
6560: 6446: 4375: 4096: 3851:"In the press: How the media is reporting the 1.85 million cameras story" 3567: 2312: 2254: 2228: 2133: 2097: 2001: 1997: 1859: 1633:
Graffiti expressing concern about the proliferation of video surveillance
1543: 1421:
A human microchip implant is an identifying integrated circuit device or
1297: 1261: 1085: 1065: 940: 757: 734: 400: 369: 221: 168: 7236: 7130:
The Soft Cage: Surveillance in America From Slavery to the War on Terror
6139: 6115: 5652:"Saudi Spies Tracked Phones Using Flaws the FCC Failed to Fix for Years" 1686:
If you aren't doing something wrong then you don't have anything to fear
646:
Governments often initially claim that cameras are meant to be used for
615: 30:
This article is about surveillance in security. Not to be confused with
8752: 7931: 7687: 7667: 7660: 7640: 7547: 4405: 4206:. Salzburg and Vienna: Forschungsgruppe Unified Theory of Information. 3331:"Cell Phone Tracking Can Locate Terrorists – But Only Where It's Legal" 2320: 2092: 1934: 1813: 1808:
have led many groups to fear that society is moving towards a state of
1643: 1535: 1236: 1160: 958: 917: 819: 765: 761: 753: 484: 415: 409: 404: 388: 149: 132: 116:(CCTV), or interception of electronically transmitted information like 6476:(1). Johns Hopkins University Press: 280–285 – via Project MUSE. 2733: 825:
characteristics include gait (a person's manner of walking) or voice.
220:
The vast majority of computer surveillance involves the monitoring of
8717: 7912: 7907: 7845: 7682: 7495: 7424: 7348: 7221: 6824:
Towards a Critical Theory of Surveillance in Informational Capitalism
4518:
Woodward, John; Christopher Horn; Julius Gatune; Aryn Thomas (2003).
2159: 2062: 1825: 1778: 1647: 1547: 1368: 1318: 993: 654: 596: 183: 178: 141: 6329:"Privacy fears over online surveillance footage broadcasts in China" 3583: 3504:"NSA tracking cellphone locations worldwide, Snowden documents show" 2960:"NSA Prism program taps in to user data of Apple, Google and others" 1926:
by groups or individuals, opposing certain surveillance activities.
1704: 1534:
The U.S. has run numerous domestic intelligence operations, such as
7916: 7530: 7158:
Everyday Surveillance: Vigilance and Visibility in Post-Modern Life
6451:
Superconnected: the internet, digital media, and techno-social life
5331:"The Use of Informants in FBI Domestic Intelligence Investigations" 5240:""National Network" of Fusion Centers Raises Specter of COINTELPRO" 5037:
Information Processing Technology Office (DARPA) – Official Website
4349:
Northeastern University College of Computer and Information Science
4251:
Northeastern University College of Computer and Information Science
3497: 3495: 3493: 2705: 2377: 2240: 2005: 1709: 1594: 1493: 1441: 1249: 811: 710: 686: 662: 496: 435: 229: 109: 5463:"Satellite-Surveillance Program to Begin Despite Privacy Concerns" 5030:"BAA 04-05-PIP: Heterogeneous Airborne Reconnaissance Team (HART)" 904: 835:
are heavily funding research into facial recognition systems. The
37:"Electronic surveillance" redirects here. Not to be confused with 8243: 7616: 7278:– A Short History of Electronic Surveillance in the United States 6866:
Predict and Surveil: Data, Discretion, and the Future of Policing
6344:"Personal Information, Borders, and the New Surveillance Studies" 3689:"We're Watching: How Chicago Authorities Keep An Eye On The City" 2154: 1929:
Legislative proceedings such as those that took place during the
1892: 1744: 1091:
But today many of these records are electronic, resulting in an "
806: 718: 714: 534: 431: 399:
era, Apple's iPhone 6 has been designed to disrupt investigative
318: 280: 261: 160: 153: 3490: 1609:
to measure out an area before the main building project begins.
928:
use a range of sensors (e.g. radar) to monitor the battlefield.
464: 7306: 6850:
Ball, Kirstie, Kevin D. Haggerty, and David Lyon, eds. (2012).
5159:
Profiling the European Citizen: Cross Disciplinary Perspectives
4120:"TrapWire: The Less-Than-Advertised System To Spy On Americans" 1724: 1353: 1180: 1136:(1976), data held by third parties is generally not subject to 1112: 570: 337: 252:, to develop, purchase, implement, and operate systems such as 145: 68:
Please try to keep recent events in historical perspective and
4585:"Surveillance Society: New High-Tech Cameras Are Watching You" 4489:"One in five employers uses social networks in hiring process" 3780:. Big Brother Watch. February 2012. p. 30. Archived from 1413: 1386:
in protest of having themselves tagged; they felt that it was
1356:
campaign was being run by the kingdom exploiting the flaws of
1279:
This section refers to methods that involve the monitoring of
549:
received a $ 350 million grant towards the development of the
8757: 6601:"One of the Last Bastions of Digital Privacy Is Under Threat" 6197: 5825:
International Journal of Technology Assessment in Health Care
4435:"AT&T Invents Programming Language for Mass Surveillance" 3050:"Mueller Orders Audit of 56 FBI Offices for Secret Subpoenas" 2813:"FBI's Secret Spyware Tracks Down Teen Who Made Bomb Threats" 2258: 1782: 1034: 1019: 970: 832: 500: 272: 7317: 7288: 7192: 6559:
California Fourth District Court of Appeal (June 25, 2014).
4836:"The Rapid Rise of Federal Surveillance Drones Over America" 4750: 4453: 2883:"Electromagnetic Eavesdropping Risks of Flat-Panel Displays" 2622:"The Unresolved Equation of Espionage and International Law" 1933:, which investigated domestic intelligence programs such as 1309:
A comparatively new off-the-shelf surveillance device is an
8696: 6198:
Baig, Edward; Marcia Stepanek; Neil Gross (April 5, 1999).
5626:"Revealed: Saudis suspected of phone spying campaign in US" 5577:"Forget the NSA: Police May be a Greater Threat to Privacy" 3439: 3437: 3435: 2176: 2125:' song "I Am The Owl" is about government surveillance and 1422: 1325:(MITM) attack. IMSI-catchers are used in some countries by 1081: 997: 199: 8212: 6700:"Coinbase considers adding five new coins to its platform" 5323: 3565: 3067: 2896: 2645:"Internet Eavesdropping: A Brave New World of Wiretapping" 2552:"Stallman: How Much Surveillance Can Democracy Withstand?" 6935:
Database Nation; The Death of Privacy in the 21st Century
6766:. New York: Alfred A. Knopf, McSweeney's Books. pp.  6466:"Surveillance as Race Struggle: On Browne's Dark Matters" 5768:"RFID Chips Implanted In Mexican Law-Enforcement Workers" 5454: 5214:
The Center For Democracy & Technology (official site)
5153: 2831: 2182: 1172: 943:, a U.S. drone plane used for domestic operations by the 725:
information from phone call records such as those in the
588: 439: 245: 241: 140:
on criminals, their competitors, suppliers or customers.
5401: 4288:"Pentagon sets its sights on social networking websites" 4279: 4166:"Online Social Networking as Participatory Surveillance" 3446:"Signaling Post-Snowden Era, New iPhone Locks Out N.S.A" 3432: 3254:"Even if they're off, cellphones allow FBI to listen in" 2207:") and hidden microphones worn by operatives (e.g., in " 2065:
where all citizens are kept under constant surveillance.
1974:
Countersurveillance, inverse surveillance, sousveillance
120:. It can also include simple technical methods, such as 101:
Surveillance Camera to support the Washington, DC Police
8202:
Counterintelligence and counter-terrorism organizations
6985:
Hier, Sean P., & Greenberg, Joshua (Eds.). (2009).
6259: 6257: 6255: 3324: 3322: 2008:, which attempts to monitor police officers to prevent 1937:, have also weighed the pros and cons of surveillance. 603:
to install millions of surveillance cameras throughout
395:
In response to customers' privacy concerns in the post
7294:
Guide to lawful intercept legislation around the world
7114:
Monahan, Torin, and David Murakami Wood, eds. (2018).
6973:
The Watchers: The Rise of America's Surveillance State
5374: 5296: 4728:"LAPD Uses Face Recognition Technology To Fight Crime" 3530:"GCHQ views data without a warrant, government admits" 2171:, the police and government intelligence agencies use 1871:
or censoring/stalking by strangers, reducing privacy.
446:
The Snowden leaks have also revealed that the British
6622:"Edward Snowden Explains How To Reclaim Your Privacy" 6073: 5708: 5706: 3959: 3957: 3360:
Samuel, Ian (2008). "Warrantless Location Tracking".
3286:. Fifty One: 159–176 – via Law Journal Library. 3197:
Western Regional Security Office (NOAA official site)
3128: 1417:
Hand with planned insertion point for Verichip device
701:
One common form of surveillance is to create maps of
328:
Human agents are not required to monitor most calls.
7144:
Handbook of Surveillance Technologies, Third Edition
6394: 6252: 6037: 5907: 5790: 3319: 3245: 3129:
McCullagh, Declan; Anne Broache (December 1, 2006).
3093: 3073: 3041: 2805: 2700: 2698: 2450: 7160:. Lanham, MD: Rowman & Littlefield Publishers. 7018:
Under Surveillance: Being Watched in Modern America
6838:
iSpy: Surveillance and Power in the Interactive Era
5232: 4781: 4779: 3720: 3295: 3293: 3014: 2667: 2665: 1712:in Columbus, Ohio, depicting state surveillance of 1681:said: "You have zero privacy anyway. Get over it." 908:
Micro Air Vehicle with attached surveillance camera
175:governments seldom have any domestic restrictions. 8692:International Association of Privacy Professionals 7046:Theorizing Surveillance: The Panopticon and Beyond 6759: 6405: 6287: 6285: 6265:"Is the U.S. Turning Into a Surveillance Society?" 5916:"Court Asked To Disallow Warrantless GPS Tracking" 5703: 5675: 5673: 5492:Department of Homeland Security (official website) 5480: 5409:"U.S. Reconnaissance Satellites: Domestic Targets" 5383:"FBI Proposes Building Network of U.S. Informants" 4917:"US police experiment with Insitu, Honeywell UAVs" 4671:"Lockheed wins $ 1 billion FBI biometric contract" 4645:"FBI wants palm prints, eye scans, tattoo mapping" 3954: 3614:"Rise of Surveillance Camera Installed Base Slows" 3165:"Use of mobile helped police keep tabs on suspect" 3102:"Remotely Eavesdropping on Cell Phone Microphones" 3076:"FBI Plans to Fight Terror With High-Tech Arsenal" 2761:"Government funds chat room surveillance research" 2642: 1015:, to be used by police forces throughout the U.K. 383:The headquarters of UK intelligence activities is 7032:Surveillance Society: Monitoring in Everyday Life 6335: 5759: 5426: 5201: 4662: 4642: 4607: 4253:. Archived from the original on November 16, 2004 3074:Piller, Charles; Eric Lichtblau (July 29, 2002). 2958:Greenwald, Glen; Ewen, MacAskill (June 6, 2013). 2905:"E-Mail Surveillance Renews Concerns in Congress" 2752: 2695: 2428:Surveillance Society: Monitoring in Everyday Life 2191:regularly portrays the FBI's surveillance of the 1806:Communications Assistance For Law Enforcement Act 1737:Communications Assistance for Law Enforcement Act 1654:. This requires a minimal level of invasiveness. 1399:. As of 2021, this has largely not come to pass. 1231: 311:Communications Assistance for Law Enforcement Act 234:Communications Assistance For Law Enforcement Act 207:– a U.S. agency which developed technologies for 186:seems to be common among all types of countries. 8808: 8657:Computer Professionals for Social Responsibility 5964: 5542: 5515: 5513: 4943:"UK Home Office plans national police UAV fleet" 4876:, November 9, 2012. Retrieved December 10, 2012. 4776: 4759:"LAPD opens new high-tech crime analysis center" 4636: 4576: 4271:: CS1 maint: bot: original URL status unknown ( 3911:. CCTV User Group. June 18, 2008. Archived from 3290: 3158: 3156: 2995:Sottek, T.C.; Kopfstein, Janus (July 17, 2013). 2925: 2728: 2726: 2673:"CALEA Archive – Electronic Frontier Foundation" 2662: 846:Another form of behavioral biometrics, based on 639:in January 2001, police in Tampa, Florida, used 6282: 5933: 5889:Criminal Investigation: The Art and the Science 5733: 5670: 5435:"U.S. to Expand Domestic Use Of Spy Satellites" 4879: 4719: 4643:Arena, Kelly; Carol Cratty (February 4, 2008). 4550: 4081: 3809:. Channel 4 News. June 18, 2008. Archived from 3716: 3714: 3663:"Surveillance cams help fight crime, city says" 3215: 3131:"FBI taps cell phone mic as eavesdropping tool" 2994: 2903:Risen, James; Lichtblau, Eric (June 16, 2009). 2706:"CALEA: The Perils of Wiretapping the Internet" 2643:Diffie, Whitfield; Susan Landau (August 2008). 1835: 1582:"Stakeout" redirects here. For other uses, see 1429:and implanted in the body of a human being. A 7276:Reversing the Whispering Gallery of Dionysius 6880:Dark Matters: On the Surveillance of Blackness 6492:Dark Matters: On the Surveillance of Blackness 6383: 6381: 6228: 6165: 6116:"Privacy in the Age of the Internet of Things" 5816: 5147: 4910: 4908: 3376: 3124: 3122: 2902: 2890:4th Workshop on Privacy Enhancing Technologies 1224:the still-images produced by programs such as 232:. In the United States for example, under the 8228: 7746: 7333: 7146:, Taylor & Francis: CRC Press, 1020 pp., 6191: 5904:. 1st ed. Academic Press, 2013. p150. Print. 5822: 5799:"Law enforcement in Mexico goes a bit bionic" 5510: 5058: 5022: 4986: 4163: 3680: 3187: 3185: 3153: 2957: 2723: 2636: 2451:Monahan, Torin; Murakami Wood, David (2018). 627:(DARPA) is funding a research project called 6840:. Lawrence, KS: University Press of Kansas. 6540:: CS1 maint: multiple names: authors list ( 6494:. Duke University Press Books. p. 224. 6341: 6045:"Domestic CIA and FBI Mail Opening Programs" 5268:Methods of Inquiry for Intelligence Analysis 4934: 4833: 4410:DyDAn Research Blog (official blog of DyDAn) 4159: 4157: 3825: 3747: 3711: 2829: 1488: 1060: 1026:", or weapons for killing enemy combatants. 7760: 7104:. New Brunswick: Rutgers University Press. 6987:Surveillance: Power, Problems, and Politics 6378: 5977:(online collection of historical documents) 5715:"Microchips in humans spark privacy debate" 4905: 4511: 4345:"Current Research in Social Network Theory" 4305: 4247:"Current Research in Social Network Theory" 3119: 2199:" placed in strategic locations (e.g., in " 1828:identification technologies, for instance, 8235: 8221: 7753: 7739: 7340: 7326: 6892:Coleman, Roy, and Michael McCahill. 2011. 6852:Routledge Handbook of Surveillance Studies 6544:) CS1 maint: numeric names: authors list ( 6342:Marx, Gary T.; Muschert, Glenn W. (2007). 5742:"RFID Tags: Big Brother in small packages" 5488:"Fact Sheet: National Applications Office" 5175: 4960: 4940: 4863:"Killington co-founder Sargent dead at 83" 4693: 4487:Havenstein, Heather (September 12, 2008). 4486: 4480: 4428: 4426: 4398: 4314:"Is the NSA reading your MySpace profile?" 4089:"EPIC Video Surveillance Information Page" 3998:. CBS News. Associated Press. July 1, 2003 3353: 3182: 2880: 1240:A card containing an identification number 810:Fingerprints being scanned as part of the 740:Many U.S. government agencies such as the 681:of the relationships between users on the 668: 499:, and by video analysis software (such as 7263: 6463: 6365:10.1146/annurev.lawsocsci.3.081806.112824 6079: 5739: 5551:"Spy imagery agency watching inside U.S." 5549:Shrader, Katherine (September 26, 2004). 5522:"Domestic Use of Spy Satellites To Widen" 5138: 4885: 4613: 4240: 4238: 4181: 4154: 4117: 3988: 3654: 3636:"Smart cameras catch man in 60,000 crowd" 3568:"Audio Surveillance: A Systematic Review" 2997:"Everything you need to know about PRISM" 2850: 2785: 2779: 2550:Stallman, Richard M. (October 14, 2013). 2475: 2179:operations and for surveillance purposes. 1914:There have been several lawsuits such as 1402: 742:Defense Advanced Research Projects Agency 625:Defense Advanced Research Projects Agency 6400: 6171: 6113: 5796: 5765: 5264: 4521:Biometrics: A Look at Facial Recognition 4336: 4311: 3748:Parascandola, Rocco (October 24, 2018). 3660: 3251: 3099: 2931: 2874: 2738:Electronic Frontier Foundation (website) 2710:Electronic Frontier Foundation (website) 2677:Electronic Frontier Foundation (website) 2549: 2512: 2047:surveillance society with a very simple 1791: 1719:With the advent of programs such as the 1703: 1695: 1628: 1601:. The term derives from the practice by 1507:In the U.S., police have planted hidden 1497:Diagram of GPS satellites orbiting Earth 1492: 1412: 1367: 1235: 1031:Heterogeneous Aerial Reconnaissance Team 957: 903: 837:Information Processing Technology Office 805: 672: 614: 474: 463: 378: 198: 96: 88: 8167:Scientific & Technical intelligence 7034:. Philadelphia: Open University Press. 6645: 6352:Annual Review of Law and Social Science 5913: 5681:"Two Stories Highlight the RFID Debate" 5548: 5519: 5181: 5118: 4914: 4785: 4559:"Face recognition next in terror fight" 4423: 4373: 4367: 4164:Albrechtslund, Anders (March 3, 2008). 4032: 3767: 3606: 3501: 3277: 2788:"FBI turns to broad new wiretap method" 2430:. Philadelphia: Open University Press. 1372:RFID chip pulled from a new credit card 587:, several U.S. corporations, including 529:awards billions of dollars per year in 14: 8809: 7590:Chinese espionage in the United States 7185: 7102:Surveillance in the Time of Insecurity 6757: 6753: 6751: 6749: 6598: 6565:Oyez – IIT Chicago-Kent College of Law 6486: 6445: 6441: 6439: 6437: 6435: 6433: 6109: 6107: 6083:Political Repression in Modern America 5996: 5939: 5740:McCullagh, Declan (January 13, 2003). 5600:, 2014, pp. 43–44, archived from 5460: 5305:"Is the Pentagon spying on Americans?" 4834:Friedersdorf, Conor (March 10, 2016). 4756: 4614:Nakashima, Ellen (December 22, 2007). 4582: 4459: 4432: 4235: 4016: 4010: 3686: 3443: 3382: 3359: 3328: 3047: 3020: 2786:McCullagh, Declan (January 30, 2007). 2619: 1483: 965:program concept drawing from official 448:Government Communications Headquarters 385:Government Communications Headquarters 8672:Electronic Privacy Information Center 8216: 7734: 7321: 7118:. New York: Oxford University Press. 7048:. Cullompton, UK: Willan Publishing. 7020:. Austin: University of Texas Press. 6868:. New York: Oxford University Press. 6723: 6671: 5900:Crowder, Stan, and Turvery E. Brent. 5712: 5598:The German Code Of Criminal Procedure 5432: 5302: 5207: 5064: 4972:International Online Defense Magazine 4888:"Drone aircraft may prowl U.S. skies" 4732:NBC4 TV (transcript from Officer.com) 4707:. Associated Press. December 26, 2004 4668: 4556: 4285: 4196: 4190: 4143: 4137: 4019:"How Facial Recognition Systems Work" 3963: 3699:from the original on February 6, 2009 3410:"Greenstone Digital Library Software" 3252:Coughlin, Kevin (December 13, 2006). 3162: 2934:"Pinwale And The New NSA Revelations" 2870:from the original on October 9, 2022. 2626:Michigan Journal of International Law 2601:from the original on November 9, 2020 2455:. New York: Oxford University Press. 1986:, high-altitude (and possibly armed) 1897:Electronic Privacy Information Center 1612: 1283:through the aid of wireless signals. 599:, have been working closely with the 144:organizations charged with detecting 7989:By alliances, nations and industries 7585:Chinese intelligence activity abroad 6646:Sigalos, MacKenzie (June 13, 2021). 6586:"The Secrets of Countersurveillance" 6412:. New York: Vintage Books. pp.  6309:from the original on October 9, 2022 6172:Sprenger, Polly (January 26, 1999). 5766:Gardener, W. David (July 15, 2004). 5574: 5380: 5065:Sirak, Michael (November 29, 2007). 4886:McCullagh, Declan (March 29, 2006). 4223:from the original on October 9, 2022 4118:Hedgecock, Sarah (August 14, 2012). 3996:"Big Brother To See All, Everywhere" 3933: 3889:from the original on October 9, 2022 3687:Schorn, Daniel (September 6, 2006). 3661:Spielman, Fran (February 19, 2009). 3527: 3502:Gellman, Barton (December 4, 2013). 3444:Sanger, David (September 26, 2014). 3301:"Tracking a suspect by mobile phone" 3100:Schneier, Bruce (December 5, 2006). 2976:from the original on October 9, 2022 2758: 2425: 2147:List of films featuring surveillance 1274: 1186: 45: 8652:Center for Democracy and Technology 7651:Interpersonal (HUMINT) intelligence 6746: 6697: 6619: 6430: 6104: 6013:"U.S. Army Intelligence Activities" 5797:Campbell, Monica (August 4, 2004). 5461:Gorman, Siobhan (October 1, 2008). 5105:Saska, M.; Vakula, J.; Preucil, L. 4941:La Franchi, Peter (July 17, 2007). 4786:Dotinga, Randy (October 14, 2004). 4757:Willon, Phil (September 17, 2009). 4038: 3807:"FactCheck: how many CCTV cameras?" 3546: 3284:University of Louisville Law Review 3021:Singel, Ryan (September 10, 2007). 2823: 2734:"CALEA: Frequently Asked Questions" 1143: 24: 7282: 7203:(Volume 66, Number 3, July–August) 7006:Chelsea Green Publishing Company. 6937:. O'Reilly & Associates, Inc. 6787: 6453:. New York, NY: Sage Publications. 5208:Flint, Lara (September 24, 2003). 5182:Clayton, Mark (February 9, 2006). 5039:. December 5, 2003. Archived from 4669:Gross, Grant (February 13, 2008). 4342: 4244: 2759:Hill, Michael (October 11, 2004). 2519:. R.T. Edwards, Inc. p. 102. 2408:Surveillance in the Ottoman Empire 2393:The Age of Surveillance Capitalism 2195:. Audio devices they use include " 2023: 1787: 1557: 1524:United States v. Spy Factory, Inc. 1264:are also used to verify identity. 986:critical infrastructure protection 841:Human Identification at a Distance 541:. Speaking in 2009, Chicago Mayor 438:. The Snowden leaks show that the 156:carry out a form of surveillance. 25: 8863: 7486:Computer and network surveillance 7299: 7074:The Globalization of Surveillance 7060:Surveillance Studies: An Overview 6975:. London, UK: Penguin Books Ltd. 6882:. Durham: Duke University Press. 6826:. Frankfurt am Main: Peter Lang. 6672:Cheng, Evelyn (August 29, 2017). 5914:Claburn, Thomas (March 4, 2009). 5520:Warrick, Joby (August 16, 2007). 5494:. August 15, 2007. Archived from 5433:Block, Robert (August 15, 2007). 5303:Myers, Lisa (December 14, 2005). 5140:10.1146/annurev-soc-060116-053643 4915:Warwick, Graham (June 12, 2007). 4788:"Can't Hide Your Lying ... Face?" 4460:Singel, Ryan (October 16, 2007). 4433:Singel, Ryan (October 29, 2007). 3329:Miller, Joshua (March 14, 2009). 2343:Computer and network surveillance 1729:high speed surveillance computers 1658:direct police to their location. 1199:Director of National Intelligence 996:, which is planned to be used in 884:Ethics and Information Technology 665:is an example of such a network. 152:may also carry out surveillance. 39:Computer and network surveillance 8791: 8790: 8258:Right of access to personal data 7521:Short-range agent communications 7305: 6910:. New York, NY: Pantheon Books. 6717: 6691: 6665: 6639: 6620:Lee, Micah (November 12, 2015). 6613: 6592: 6588:. Security Weekly. June 6, 2007. 6578: 6552: 6508: 6480: 6457: 6321: 6222: 6005: 5990: 5970: 5940:Hilden, Julie (April 16, 2002). 5894: 5881: 5870: 5859: 5644: 5618: 5583: 5568: 5349: 5258: 4811: 4725: 4017:Bonsor, K. (September 4, 2001). 3528:Ball, James (October 29, 2014). 3477:csu-sfsu.primo.exlibrisgroup.com 3383:Zetter, Kim (December 1, 2009). 2932:Ambinder, Marc (June 16, 2009). 2516:Principles of Audit Surveillance 2231:") and video cameras (e.g., in " 2028: 1466:This section is an excerpt from 1286: 50: 8137:Words of estimative probability 7999:Operational platforms by nation 7076:. Cambridge, UK: Polity Press. 6951:, University Of Chicago Press, 6896:. Thousand Oaks, Calif.: Sage. 6599:Angwin, Julia (June 13, 2023). 6174:"Sun on Privacy: 'Get Over It'" 5687:. July 19, 2005. Archived from 5121:"Toward a Sociology of Privacy" 5112: 5099: 5089: 5001:IPTO (DARPA) – Official website 4855: 4827: 4805: 4312:Kawamoto, Dawn (June 9, 2006). 4111: 4054: 3927: 3901: 3869: 3799: 3741: 3628: 3559: 3540: 3521: 3465: 3402: 3271: 3048:Roland, Neil (March 20, 2007). 2988: 2951: 2620:Radsan, A. John (Spring 2007). 2071:The Girl with the Dragon Tattoo 1735:software, and laws such as the 1572:Federal Bureau of Investigation 1363: 1210:Department of Homeland Security 982:Department of Homeland Security 945:Department of Homeland Security 750:Department of Homeland Security 555:artificial intelligence systems 527:Department of Homeland Security 8667:Electronic Frontier Foundation 8647:American Civil Liberties Union 8601:Privacy-enhancing technologies 7116:Surveillance Studies: A Reader 6391:. Retrieved November 14, 2004. 6300:American Civil Liberties Union 6269:American Civil Liberties Union 5591:"Section 100i – IMS I-Catcher" 5244:EPIC Spotlight on Surveillance 4583:Vlahos, James (January 2008). 4557:Frank, Thomas (May 10, 2007). 3163:Odell, Mark (August 1, 2005). 2613: 2577: 2543: 2506: 2469: 2453:Surveillance Studies: A Reader 2444: 2419: 1940: 1905:American Civil Liberties Union 1901:Electronic Frontier Foundation 1804:program, and laws such as the 1753:American Civil Liberties Union 1749:Electronic Frontier Foundation 1732: 1624: 1377:Radio-frequency identification 1232:Identification and credentials 13: 1: 7347: 6724:Birch, Dave (July 14, 2005). 6698:Ell, Kellie (July 13, 2018). 5891:. 6th ed. Pearson, 2010. p249 5713:Lewan, Todd (July 21, 2007). 5381:Ross, Brian (July 25, 2007). 5184:"US Plans Massive Data Sweep" 5003:. August 2008. Archived from 4041:"Privacy is (Virtually) Dead" 3964:Klein, Naomi (May 29, 2008). 3909:"How many cameras are there?" 2585:"The Psychology of Espionage" 2413: 2211:") and informants (e.g., in " 2158:portrays a society that uses 2004:beating and the organization 1923:EPIC v. Department of Justice 1691: 1684:Another common argument is: " 1336:In March 2020, British daily 853:A more recent development is 516:facial recognition technology 290: 72:related to non-recent events. 63:slanted towards recent events 7156:Staples, William G. (2000). 7086:Monahan, Torin, ed. (2006). 6989:. Vancouver, CA: UBC Press. 6813:Resources in other libraries 6464:Nishiyama, Hidefumi (2017). 6114:Williams, Jamie Lee (2016). 6088:University of Illinois Press 4374:Ressler, Steve (July 2006). 4286:Marks, Paul (June 9, 2006). 3389:Wired Magazine: Threat Level 2861:10.1016/0167-4048(85)90046-X 2388:PRISM (surveillance program) 1836:Psychological/social effects 1475:Perimeter surveillance radar 1468:Perimeter surveillance radar 1344:, accused the government of 1206:National Applications Office 1041: 801: 773:Information Awareness Office 334:Information Awareness Office 250:Information Awareness Office 205:Information Awareness Office 122:human intelligence gathering 7: 8392:Data protection authorities 8242: 8185:Intelligence cycle security 7072:Matteralt, Armand. (2010). 7062:. Cambridge: Polity Press. 7044:Lyon, David (Ed.). (2006). 7002:and Draffan, George (2004) 4677:. InfoWorld. Archived from 2592:The Psychology of Espionage 2403:Surveillance in New Zealand 2373:Surveillance system monitor 2336: 2253:portrays the monitoring of 2223:"). Visual devices include 2205:Mr. Ruggerio's Neighborhood 2201:I Dream of Jeannie Cusamano 2140: 2115: 1802:Total Information Awareness 1721:Total Information Awareness 1577: 1568:Central Intelligence Agency 1340:, based on the claims of a 194: 163:and is often criticized by 10: 8868: 8837:Law enforcement techniques 8596:Social networking services 7242:February 21, 2009, at the 7237:Privacy Information Center 6726:"The age of sousveillance" 6158:December 23, 2014, at the 6080:Goldstein, Robert (2001). 5126:Annual Review of Sociology 4868:September 4, 2015, at the 3278:Hampton, Brittany (2012). 2383:Participatory surveillance 2144: 1882: 1839: 1774:those under surveillance. 1637: 1581: 1521: 1517: 1500: 1465: 1406: 1197:On May 25, 2007, the U.S. 1190: 1045: 893: 817: 566:Freedom of Information Act 487:, and may be watched by a 457: 453: 294: 213: 189: 36: 29: 8786: 8710: 8687:Global Network Initiative 8639: 8631:Virtual assistant privacy 8611:Privacy-invasive software 8539: 8503: 8390: 8286: 8250: 8175: 8117: 8077: 8022: 7979: 7844: 7806: 7786: 7777: 7768: 7577: 7546: 7456: 7433: 7355: 7016:Lewis, Randolph. (2017). 6808:Resources in your library 5837:10.1017/S0266462310001133 5803:Christian Science Monitor 5413:National Security Archive 5188:Christian Science Monitor 5157:; Serge Gutwirth (2008). 4380:Homeland Security Affairs 4197:Fuchs, Christian (2009). 2513:Cardwell, Harvey (2005). 2274:portrays many methods of 1584:Stakeout (disambiguation) 1489:Global Positioning System 1409:Microchip implant (human) 1217:Reconnaissance satellites 1061:Data mining and profiling 889: 866:license plate recognition 468:A surveillance camera in 460:Closed-circuit television 323:National Security Letters 114:closed-circuit television 7100:Monahan, Torin. (2010). 6894:Surveillance & Crime 6878:Browne, Simone. (2015). 6836:Andrejevic, Mark. 2007. 6822:Allmer, Thomas. (2012). 6387:Agre, Philip E. (2003), 5119:Anthony, Denise (2017). 4701:"LAPD: We Know That Mug" 3966:"China's All-Seeing Eye" 2839:Computers & Security 1529:Covert listening devices 1460: 1193:Reconnaissance satellite 949:forward-looking infrared 937:forward-looking infrared 900:Wide-area motion imagery 859:American football fields 746:National Security Agency 696:open-source intelligence 580:and the train stations. 539:Operation Virtual Shield 531:Homeland Security grants 8682:Future of Privacy Forum 8677:European Digital Rights 8152:Intelligence assessment 8142:All-source intelligence 7762:Intelligence management 7471:Covert listening device 7441:Intelligence assessment 7258:. London. June 8, 2013. 7174:. Springer Publishers. 7090:. New York: Routledge. 6971:Harris, Shane. (2011). 6947:Gilliom, John. (2001). 6864:Brayne, Sarah. (2020). 6854:. New York: Routledge. 5467:The Wall Street Journal 5440:The Wall Street Journal 5361:www.prisonlegalnews.org 5161:. Dordrecht: Springer. 3414:snowdenarchive.cjfe.org 2368:Surveillance capitalism 2292:political thriller film 1727:, technologies such as 1425:transponder encased in 1315:telephone eavesdropping 1221:Reconnaissance aircraft 1133:United States v. Miller 1075:social network analysis 914:unmanned aerial vehicle 839:ran a program known as 707:social networking sites 691:Social network analysis 669:Social network analysis 551:Domain Awareness System 493:law enforcement officer 336:, or companies such as 8723:Cellphone surveillance 8640:Advocacy organizations 8263:Expectation of privacy 7836:Operational techniques 7791:Special reconnaissance 7264:Historical information 7227:EPIC Privacy Resources 7142:Petersen, J.K. (2012) 6906:Feldman, Jay. (2011). 6758:Eggers, David (2013). 3735:10.1287/inte.2016.0860 3223:"Can You Hear Me Now?" 3199:. 2001. Archived from 2326:The British TV series 2185:'s crime-drama series 1846:Some critics, such as 1797: 1716: 1701: 1634: 1498: 1418: 1403:RFID tagging on humans 1373: 1307: 1269:Social Security number 1241: 1140:warrant requirements. 1048:Corporate surveillance 974: 909: 815: 788: 698: 620: 607:, along with advanced 480: 472: 392: 211: 102: 94: 8702:Privacy International 8273:Right to be forgotten 7720:Targeted surveillance 7222:EFF Privacy Resources 6561:"Riley v. California" 6408:Discipline and Punish 5999:Vanderbilt Law Review 5607:on September 25, 2015 5155:Hildebrandt, Mireille 4499:on September 23, 2008 4406:"DyDAn Research Blog" 4183:10.5210/fm.v13i3.2142 3936:"Camera surveillance" 3787:on September 23, 2015 3572:ACM Computing Surveys 3227:ABC News: The Blotter 2830:Van Eck, Wim (1985). 2358:Surveillance aircraft 2173:micro aerial vehicles 2043:portrays a fictional 1909:Privacy International 1800:Programs such as the 1795: 1707: 1699: 1632: 1496: 1416: 1371: 1331:intelligence agencies 1302: 1239: 1214:military intelligence 1055:business intelligence 1033:program developed by 1029:Programs such as the 1009:micro-aerial vehicles 961: 933:micro-aerial vehicles 926:surveillance aircraft 907: 896:Surveillance aircraft 894:Further information: 809: 777: 676: 629:Combat Zones That See 618: 585:Golden Shield Project 478: 467: 443:persons of interest. 382: 216:Computer surveillance 203:Official seal of the 202: 100: 92: 8827:Espionage techniques 8157:Medical intelligence 8127:Competing hypotheses 7937:Industrial espionage 7922:Denial and deception 7646:Industrial espionage 7446:competing hypotheses 7314:at Wikimedia Commons 7030:Lyon, David (2001). 6331:. December 13, 2017. 6302:. January 15, 2003. 6234:San Diego Law Review 5887:Lyman, D., Micheal. 5046:on November 27, 2008 4947:Flight International 4595:on December 19, 2007 4538:on September 8, 2013 4524:. RAND Corporation. 4355:on February 26, 2015 4099:on February 25, 2009 3141:on November 10, 2013 3106:Schneier On Security 2740:. September 20, 2007 2426:Lyon, David (2001). 2225:hidden still cameras 2129:of political groups. 2040:Nineteen Eighty-Four 2000:'s recording of the 1994:Inverse surveillance 1961:Riley vs. California 1954:Riley vs. California 1747:groups, such as the 729:, and others. These 248:and the now-defunct 93:Surveillance cameras 8738:Global surveillance 8606:Privacy engineering 8591:Personal identifier 8541:Information privacy 8278:Post-mortem privacy 8190:Counterintelligence 8105:Technical (TECHINT) 8100:Open-source (OSINT) 8090:Geospatial (GEOINT) 8064:Casualty estimation 7186:General information 7128:Parenti, Christian 7058:Lyon, David (2007) 6490:(October 2, 2015). 6374:on August 11, 2017. 6210:on October 17, 2008 5691:on December 7, 2012 5527:The Washington Post 5010:on December 5, 2008 4974:. February 22, 2005 4621:The Washington Post 3915:on October 23, 2008 3508:The Washington Post 3203:on November 6, 2013 2881:Kuhn, M.G. (2004). 2649:Scientific American 2250:The Lives of Others 2058:The Handmaid's Tale 1979:Countersurveillance 1917:Hepting v. AT&T 1762:Hepting v. AT&T 1540:political activists 1484:Geolocation devices 953:Killington Mountain 872:Facial thermographs 848:affective computing 705:based on data from 583:As part of China's 578:red-light districts 301:Lawful interception 138:gather intelligence 126:postal interception 32:Health surveillance 18:Police surveillance 8778:Personality rights 8162:Military geography 8147:Basic intelligence 8085:Financial (FININT) 8026:signature (MASINT) 7952:One-way voice link 7888:Concealment device 7597:Cold War espionage 7564:Front organization 7538:Surveillance tools 7516:Phone surveillance 7511:One-way voice link 7466:Concealment device 6606:The New York Times 6470:Theory & Event 5721:. Associated Press 5575:Kappeler, Victor. 5556:. Associated Press 4147:The New York Times 3942:on October 8, 2016 3855:Security News Desk 3451:The New York Times 3420:on January 4, 2022 3233:on August 25, 2011 2910:The New York Times 2767:. Associated Press 2308:Enemy of the State 2276:audio surveillance 2193:DiMeo Crime Family 2127:social engineering 1967:U.S. Supreme Court 1798: 1717: 1714:telecommunications 1702: 1635: 1619:Internet of Things 1613:Internet of things 1499: 1419: 1397:targeted marketing 1374: 1242: 1168:surveillance tools 1109:social connections 990:transit monitoring 988:, border patrol, " 975: 973:) official website 910: 829:Facial recognition 816: 699: 621: 601:Chinese government 512:China was reported 481: 473: 470:Cairns, Queensland 393: 309:for instance, the 297:Phone surveillance 212: 103: 95: 8842:National security 8804: 8803: 8748:Mass surveillance 8210: 8209: 8113: 8112: 8004:Direction finding 7994:In modern history 7975: 7974: 7728: 7727: 7382:Agent provocateur 7310:Media related to 7152:978-1-439873-15-1 7138:978-0-465-05485-5 7124:978-0-190-29782-4 7068:978-0-7456-3591-0 7054:978-1-84392-191-2 7040:978-0-335-20546-2 7012:978-1-931498-52-4 6967:978-0-8173-1877-2 6957:978-0-226-29361-5 6931:Garfinkel, Simson 6926:978-0-415-89160-8 6832:978-3-631-63220-8 6794:Library resources 6777:978-0-385-35139-3 6517:"People vs. Diaz" 6162:, Jeroen van Rest 6097:978-0-252-06964-2 6025:on August 8, 2015 5946:CNN.com (FindLaw) 5778:on April 12, 2009 5498:on March 11, 2009 5168:978-1-4020-6913-0 4738:on March 30, 2010 4589:Popular Mechanics 4531:978-0-8330-3302-4 4213:978-3-200-01428-2 3976:on March 26, 2009 3667:Chicago Sun Times 3362:N.Y.U. Law Review 3341:on March 18, 2009 3258:The Seattle Times 2437:978-0-335-20546-2 2398:Vulkan files leak 2348:Mass surveillance 2265:'s secret police. 2257:by agents of the 2233:Long Term Parking 2217:Proshai, Livushka 2049:mass surveillance 1810:mass surveillance 1757:mass surveillance 1599:criminal activity 1431:subdermal implant 1323:man-in-the-middle 1275:Wireless tracking 1254:driver's licenses 1202:Michael McConnell 1187:Satellite imagery 792:NSA call database 727:NSA call database 683:social networking 428:telecommunication 277:van Eck phreaking 209:mass surveillance 87: 86: 16:(Redirected from 8859: 8822:Crime prevention 8794: 8793: 8662:Data Privacy Lab 8621:Privacy software 8268:Right to privacy 8237: 8230: 8223: 8214: 8213: 8009:Traffic analysis 7981:Signals (SIGINT) 7816:Asset recruiting 7784: 7783: 7775: 7774: 7755: 7748: 7741: 7732: 7731: 7342: 7335: 7328: 7319: 7318: 7309: 7259: 7202: 7170:Yan, W. (2019). 6782: 6781: 6770:, 290–291, 486. 6765: 6755: 6744: 6743: 6741: 6739: 6721: 6715: 6714: 6712: 6710: 6695: 6689: 6688: 6686: 6684: 6669: 6663: 6662: 6660: 6658: 6643: 6637: 6636: 6634: 6632: 6617: 6611: 6610: 6596: 6590: 6589: 6582: 6576: 6575: 6573: 6571: 6556: 6550: 6549: 6539: 6531: 6529: 6527: 6512: 6506: 6505: 6484: 6478: 6477: 6461: 6455: 6454: 6443: 6428: 6427: 6411: 6402:Foucault, Michel 6398: 6392: 6385: 6376: 6375: 6373: 6367:. Archived from 6348: 6339: 6333: 6332: 6325: 6319: 6318: 6316: 6314: 6308: 6297: 6289: 6280: 6279: 6277: 6275: 6261: 6250: 6249: 6226: 6220: 6219: 6217: 6215: 6206:. Archived from 6195: 6189: 6188: 6186: 6184: 6169: 6163: 6150: 6144: 6143: 6111: 6102: 6101: 6077: 6071: 6070: 6068: 6066: 6060: 6049: 6041: 6035: 6034: 6032: 6030: 6024: 6018:. Archived from 6017: 6009: 6003: 6002: 6001:. 70: 1627–1662. 5994: 5988: 5987: 5985: 5983: 5968: 5962: 5961: 5959: 5957: 5948:. Archived from 5937: 5931: 5930: 5928: 5926: 5920:Information Week 5911: 5905: 5898: 5892: 5885: 5879: 5874: 5868: 5863: 5857: 5856: 5820: 5814: 5813: 5811: 5809: 5794: 5788: 5787: 5785: 5783: 5774:. Archived from 5772:Information Week 5763: 5757: 5756: 5754: 5752: 5737: 5731: 5730: 5728: 5726: 5710: 5701: 5700: 5698: 5696: 5677: 5668: 5667: 5665: 5663: 5658:. March 29, 2020 5648: 5642: 5641: 5639: 5637: 5632:. March 29, 2020 5622: 5616: 5615: 5614: 5612: 5606: 5595: 5587: 5581: 5580: 5572: 5566: 5565: 5563: 5561: 5546: 5540: 5539: 5537: 5535: 5517: 5508: 5507: 5505: 5503: 5484: 5478: 5477: 5475: 5473: 5458: 5452: 5451: 5449: 5447: 5430: 5424: 5423: 5421: 5419: 5405: 5399: 5398: 5396: 5394: 5378: 5372: 5371: 5369: 5367: 5353: 5347: 5346: 5344: 5342: 5327: 5321: 5320: 5318: 5316: 5309:NBC Nightly News 5300: 5294: 5293: 5287: 5285: 5262: 5256: 5255: 5253: 5251: 5236: 5230: 5229: 5227: 5225: 5220:on March 8, 2009 5216:. Archived from 5205: 5199: 5198: 5196: 5194: 5179: 5173: 5172: 5151: 5145: 5144: 5142: 5116: 5110: 5103: 5097: 5093: 5087: 5086: 5084: 5082: 5077:on March 9, 2012 5073:. Archived from 5062: 5056: 5055: 5053: 5051: 5045: 5034: 5026: 5020: 5019: 5017: 5015: 5009: 4998: 4990: 4984: 4983: 4981: 4979: 4964: 4958: 4957: 4955: 4953: 4938: 4932: 4931: 4929: 4927: 4921:FlightGlobal.com 4912: 4903: 4902: 4900: 4898: 4883: 4877: 4861:Edwards, Bruce, 4859: 4853: 4852: 4850: 4848: 4831: 4825: 4824: 4822: 4820: 4809: 4803: 4802: 4800: 4798: 4783: 4774: 4773: 4771: 4769: 4754: 4748: 4747: 4745: 4743: 4734:. Archived from 4723: 4717: 4716: 4714: 4712: 4697: 4691: 4690: 4688: 4686: 4681:on June 17, 2008 4675:IDG News Service 4666: 4660: 4659: 4657: 4655: 4640: 4634: 4633: 4631: 4629: 4611: 4605: 4604: 4602: 4600: 4591:. Archived from 4580: 4574: 4573: 4571: 4569: 4554: 4548: 4547: 4545: 4543: 4534:. Archived from 4515: 4509: 4508: 4506: 4504: 4495:. Archived from 4484: 4478: 4477: 4475: 4473: 4457: 4451: 4450: 4448: 4446: 4430: 4421: 4420: 4418: 4416: 4402: 4396: 4395: 4393: 4391: 4371: 4365: 4364: 4362: 4360: 4351:. Archived from 4340: 4334: 4333: 4331: 4329: 4324:on July 20, 2012 4320:. Archived from 4309: 4303: 4302: 4300: 4298: 4283: 4277: 4276: 4270: 4262: 4260: 4258: 4242: 4233: 4232: 4230: 4228: 4222: 4205: 4194: 4188: 4187: 4185: 4161: 4152: 4151: 4141: 4135: 4134: 4132: 4130: 4115: 4109: 4108: 4106: 4104: 4095:. Archived from 4085: 4079: 4078: 4076: 4074: 4067:Business Insider 4058: 4052: 4051: 4049: 4047: 4039:McNealy, Scott. 4036: 4030: 4029: 4027: 4025: 4014: 4008: 4007: 4005: 4003: 3992: 3986: 3985: 3983: 3981: 3972:. Archived from 3961: 3952: 3951: 3949: 3947: 3938:. Archived from 3931: 3925: 3924: 3922: 3920: 3905: 3899: 3898: 3896: 3894: 3888: 3881: 3877:"CCTV in London" 3873: 3867: 3866: 3864: 3862: 3847: 3846: 3844: 3829: 3823: 3822: 3820: 3818: 3803: 3797: 3796: 3794: 3792: 3786: 3779: 3771: 3765: 3764: 3762: 3760: 3745: 3739: 3738: 3718: 3709: 3708: 3706: 3704: 3684: 3678: 3677: 3675: 3673: 3658: 3652: 3651: 3649: 3647: 3642:. April 13, 2018 3632: 3626: 3625: 3623: 3621: 3610: 3604: 3603: 3563: 3557: 3556: 3553:Business Insider 3544: 3538: 3537: 3525: 3519: 3518: 3516: 3514: 3499: 3488: 3487: 3485: 3483: 3469: 3463: 3462: 3460: 3458: 3441: 3430: 3429: 3427: 3425: 3416:. Archived from 3406: 3400: 3399: 3397: 3395: 3380: 3374: 3373: 3357: 3351: 3350: 3348: 3346: 3337:. Archived from 3326: 3317: 3316: 3314: 3312: 3307:. August 3, 2005 3297: 3288: 3287: 3275: 3269: 3268: 3266: 3264: 3249: 3243: 3242: 3240: 3238: 3229:. Archived from 3219: 3213: 3212: 3210: 3208: 3189: 3180: 3179: 3177: 3175: 3160: 3151: 3150: 3148: 3146: 3137:. Archived from 3126: 3117: 3116: 3114: 3112: 3097: 3091: 3090: 3088: 3086: 3071: 3065: 3064: 3062: 3060: 3045: 3039: 3038: 3036: 3034: 3018: 3012: 3011: 3009: 3007: 2992: 2986: 2985: 2983: 2981: 2975: 2964: 2955: 2949: 2948: 2946: 2944: 2929: 2923: 2922: 2920: 2918: 2900: 2894: 2893: 2887: 2878: 2872: 2871: 2869: 2854: 2836: 2827: 2821: 2820: 2819:. July 18, 2007. 2809: 2803: 2802: 2800: 2798: 2783: 2777: 2776: 2774: 2772: 2756: 2750: 2749: 2747: 2745: 2730: 2721: 2720: 2718: 2716: 2702: 2693: 2692: 2690: 2688: 2679:. Archived from 2669: 2660: 2659: 2657: 2655: 2640: 2634: 2633: 2617: 2611: 2610: 2608: 2606: 2600: 2589: 2581: 2575: 2574: 2572: 2570: 2547: 2541: 2540: 2535: 2533: 2510: 2504: 2503: 2498: 2496: 2473: 2467: 2466: 2448: 2442: 2441: 2423: 2363:Surveillance art 2311:a 1998 American 2271:The Conversation 2076:Lisbeth Salander 2010:police brutality 1984:security systems 1931:Church Committee 1842:Hawthorne effect 1830:face recognition 1675:Sun Microsystems 1281:tracking devices 1144:Human operatives 1138:Fourth Amendment 1093:electronic trail 786: 733:"maps" are then 723:traffic analysis 721:as well as from 593:General Electric 391:, England (2017) 118:Internet traffic 82: 79: 73: 70:add more content 54: 53: 46: 21: 8867: 8866: 8862: 8861: 8860: 8858: 8857: 8856: 8832:Law enforcement 8807: 8806: 8805: 8800: 8782: 8706: 8635: 8535: 8499: 8386: 8380:amended in 2020 8282: 8246: 8241: 8211: 8206: 8171: 8109: 8095:Imagery (IMINT) 8073: 8034:Electro-optical 8025: 8024:Measurement and 8018: 7971: 7947:Numbers station 7876:Black operation 7840: 7802: 7764: 7759: 7729: 7724: 7698:Sting operation 7607:Black operation 7573: 7569:Limited hangout 7551: 7542: 7506:Numbers station 7458: 7452: 7429: 7369: 7351: 7346: 7302: 7289:EFF Legal Cases 7285: 7283:Legal resources 7266: 7248: 7244:Wayback Machine 7191: 7188: 7132:, Basic Books, 7000:Jensen, Derrick 6819: 6818: 6817: 6802: 6801: 6797: 6790: 6788:Further reading 6785: 6778: 6756: 6747: 6737: 6735: 6722: 6718: 6708: 6706: 6696: 6692: 6682: 6680: 6670: 6666: 6656: 6654: 6644: 6640: 6630: 6628: 6618: 6614: 6597: 6593: 6584: 6583: 6579: 6569: 6567: 6557: 6553: 6533: 6532: 6525: 6523: 6513: 6509: 6502: 6485: 6481: 6462: 6458: 6444: 6431: 6424: 6399: 6395: 6386: 6379: 6371: 6346: 6340: 6336: 6327: 6326: 6322: 6312: 6310: 6306: 6295: 6291: 6290: 6283: 6273: 6271: 6263: 6262: 6253: 6227: 6223: 6213: 6211: 6196: 6192: 6182: 6180: 6170: 6166: 6160:Wayback Machine 6151: 6147: 6112: 6105: 6098: 6078: 6074: 6064: 6062: 6058: 6047: 6043: 6042: 6038: 6028: 6026: 6022: 6015: 6011: 6010: 6006: 5995: 5991: 5981: 5979: 5969: 5965: 5955: 5953: 5952:on May 18, 2009 5938: 5934: 5924: 5922: 5912: 5908: 5899: 5895: 5886: 5882: 5875: 5871: 5864: 5860: 5821: 5817: 5807: 5805: 5795: 5791: 5781: 5779: 5764: 5760: 5750: 5748: 5738: 5734: 5724: 5722: 5711: 5704: 5694: 5692: 5679: 5678: 5671: 5661: 5659: 5650: 5649: 5645: 5635: 5633: 5624: 5623: 5619: 5610: 5608: 5604: 5593: 5589: 5588: 5584: 5573: 5569: 5559: 5557: 5547: 5543: 5533: 5531: 5518: 5511: 5501: 5499: 5486: 5485: 5481: 5471: 5469: 5459: 5455: 5445: 5443: 5431: 5427: 5417: 5415: 5407: 5406: 5402: 5392: 5390: 5379: 5375: 5365: 5363: 5355: 5354: 5350: 5340: 5338: 5329: 5328: 5324: 5314: 5312: 5301: 5297: 5283: 5281: 5279: 5263: 5259: 5249: 5247: 5238: 5237: 5233: 5223: 5221: 5206: 5202: 5192: 5190: 5180: 5176: 5169: 5152: 5148: 5117: 5113: 5104: 5100: 5094: 5090: 5080: 5078: 5063: 5059: 5049: 5047: 5043: 5032: 5028: 5027: 5023: 5013: 5011: 5007: 4996: 4994:"HART Overview" 4992: 4991: 4987: 4977: 4975: 4966: 4965: 4961: 4951: 4949: 4939: 4935: 4925: 4923: 4913: 4906: 4896: 4894: 4884: 4880: 4870:Wayback Machine 4860: 4856: 4846: 4844: 4832: 4828: 4818: 4816: 4810: 4806: 4796: 4794: 4784: 4777: 4767: 4765: 4755: 4751: 4741: 4739: 4724: 4720: 4710: 4708: 4699: 4698: 4694: 4684: 4682: 4667: 4663: 4653: 4651: 4641: 4637: 4627: 4625: 4612: 4608: 4598: 4596: 4581: 4577: 4567: 4565: 4555: 4551: 4541: 4539: 4532: 4516: 4512: 4502: 4500: 4485: 4481: 4471: 4469: 4458: 4454: 4444: 4442: 4431: 4424: 4414: 4412: 4404: 4403: 4399: 4389: 4387: 4372: 4368: 4358: 4356: 4343:Ethier, Jason. 4341: 4337: 4327: 4325: 4310: 4306: 4296: 4294: 4284: 4280: 4264: 4263: 4256: 4254: 4245:Ethier, Jason. 4243: 4236: 4226: 4224: 4220: 4214: 4203: 4195: 4191: 4162: 4155: 4142: 4138: 4128: 4126: 4124:The Daily Beast 4116: 4112: 4102: 4100: 4087: 4086: 4082: 4072: 4070: 4060: 4059: 4055: 4045: 4043: 4037: 4033: 4023: 4021: 4015: 4011: 4001: 3999: 3994: 3993: 3989: 3979: 3977: 3962: 3955: 3945: 3943: 3932: 3928: 3918: 3916: 3907: 3906: 3902: 3892: 3890: 3886: 3879: 3875: 3874: 3870: 3860: 3858: 3857:. March 3, 2011 3849: 3842: 3840: 3839:. March 2, 2011 3831: 3830: 3826: 3816: 3814: 3813:on May 11, 2010 3805: 3804: 3800: 3790: 3788: 3784: 3777: 3773: 3772: 3768: 3758: 3756: 3754:nydailynews.com 3746: 3742: 3719: 3712: 3702: 3700: 3685: 3681: 3671: 3669: 3659: 3655: 3645: 3643: 3634: 3633: 3629: 3619: 3617: 3612: 3611: 3607: 3584:10.1145/2871183 3564: 3560: 3547:Szoldra, Paul. 3545: 3541: 3526: 3522: 3512: 3510: 3500: 3491: 3481: 3479: 3471: 3470: 3466: 3456: 3454: 3442: 3433: 3423: 3421: 3408: 3407: 3403: 3393: 3391: 3381: 3377: 3358: 3354: 3344: 3342: 3327: 3320: 3310: 3308: 3299: 3298: 3291: 3276: 3272: 3262: 3260: 3250: 3246: 3236: 3234: 3221: 3220: 3216: 3206: 3204: 3191: 3190: 3183: 3173: 3171: 3169:Financial Times 3161: 3154: 3144: 3142: 3127: 3120: 3110: 3108: 3098: 3094: 3084: 3082: 3072: 3068: 3058: 3056: 3046: 3042: 3032: 3030: 3019: 3015: 3005: 3003: 2993: 2989: 2979: 2977: 2973: 2962: 2956: 2952: 2942: 2940: 2930: 2926: 2916: 2914: 2901: 2897: 2885: 2879: 2875: 2867: 2834: 2828: 2824: 2811: 2810: 2806: 2796: 2794: 2784: 2780: 2770: 2768: 2757: 2753: 2743: 2741: 2732: 2731: 2724: 2714: 2712: 2704: 2703: 2696: 2686: 2684: 2671: 2670: 2663: 2653: 2651: 2641: 2637: 2618: 2614: 2604: 2602: 2598: 2587: 2583: 2582: 2578: 2568: 2566: 2548: 2544: 2531: 2529: 2527: 2511: 2507: 2494: 2492: 2490: 2474: 2470: 2463: 2449: 2445: 2438: 2424: 2420: 2416: 2339: 2298:and written by 2168:Minority Report 2149: 2143: 2118: 2109:totalitarianism 2031: 2026: 2024:Popular culture 1998:George Holliday 1976: 1947:People vs. Diaz 1943: 1885: 1848:Michel Foucault 1844: 1838: 1790: 1788:Totalitarianism 1694: 1667:video analytics 1640: 1627: 1615: 1587: 1580: 1560: 1558:Postal services 1526: 1520: 1505: 1491: 1486: 1481: 1480: 1471: 1463: 1411: 1405: 1366: 1327:law enforcement 1294:multilateration 1289: 1277: 1234: 1204:authorized the 1195: 1189: 1146: 1063: 1050: 1044: 902: 892: 822: 804: 787: 784: 748:(NSA), and the 703:social networks 671: 659:civil liberties 648:traffic control 637:Super Bowl XXXV 609:video analytics 462: 456: 366:multilateration 303: 295:Main articles: 293: 218: 197: 192: 165:civil liberties 83: 77: 74: 67: 55: 51: 42: 35: 28: 23: 22: 15: 12: 11: 5: 8865: 8855: 8854: 8849: 8844: 8839: 8834: 8829: 8824: 8819: 8802: 8801: 8799: 8798: 8787: 8784: 8783: 8781: 8780: 8775: 8770: 8765: 8763:Search warrant 8760: 8755: 8750: 8745: 8743:Identity theft 8740: 8735: 8730: 8725: 8720: 8714: 8712: 8708: 8707: 8705: 8704: 8699: 8694: 8689: 8684: 8679: 8674: 8669: 8664: 8659: 8654: 8649: 8643: 8641: 8637: 8636: 8634: 8633: 8628: 8623: 8618: 8616:Privacy policy 8613: 8608: 8603: 8598: 8593: 8588: 8583: 8578: 8577: 8576: 8571: 8566: 8556: 8551: 8545: 8543: 8537: 8536: 8534: 8533: 8528: 8523: 8518: 8513: 8507: 8505: 8501: 8500: 8498: 8497: 8495:United Kingdom 8492: 8487: 8482: 8477: 8472: 8467: 8462: 8457: 8452: 8447: 8442: 8437: 8432: 8427: 8422: 8417: 8412: 8410:European Union 8407: 8402: 8396: 8394: 8388: 8387: 8385: 8384: 8383: 8382: 8368: 8366:United Kingdom 8363: 8358: 8353: 8348: 8343: 8338: 8333: 8328: 8326:European Union 8323: 8318: 8313: 8308: 8303: 8298: 8292: 8290: 8284: 8283: 8281: 8280: 8275: 8270: 8265: 8260: 8254: 8252: 8248: 8247: 8240: 8239: 8232: 8225: 8217: 8208: 8207: 8205: 8204: 8199: 8198: 8197: 8187: 8181: 8179: 8173: 8172: 8170: 8169: 8164: 8159: 8154: 8149: 8144: 8139: 8134: 8132:Target-centric 8129: 8123: 8121: 8115: 8114: 8111: 8110: 8108: 8107: 8102: 8097: 8092: 8087: 8081: 8079: 8075: 8074: 8072: 8071: 8061: 8056: 8054:Radiofrequency 8051: 8046: 8041: 8036: 8030: 8028: 8020: 8019: 8017: 8016: 8011: 8006: 8001: 7996: 7991: 7985: 7983: 7977: 7976: 7973: 7972: 7970: 7969: 7964: 7959: 7954: 7949: 7944: 7939: 7934: 7929: 7924: 7919: 7910: 7905: 7900: 7895: 7890: 7885: 7884: 7883: 7873: 7868: 7867: 7866: 7861: 7850: 7848: 7842: 7841: 7839: 7838: 7833: 7828: 7823: 7818: 7812: 7810: 7804: 7803: 7801: 7800: 7799: 7798: 7787: 7781: 7779:Human (HUMINT) 7772: 7766: 7765: 7758: 7757: 7750: 7743: 7735: 7726: 7725: 7723: 7722: 7717: 7716: 7715: 7710: 7700: 7695: 7690: 7685: 7680: 7675: 7670: 7665: 7664: 7663: 7658: 7648: 7643: 7638: 7637: 7636: 7631: 7621: 7620: 7619: 7614: 7604: 7599: 7594: 7593: 7592: 7581: 7579: 7575: 7574: 7572: 7571: 7566: 7561: 7555: 7553: 7544: 7543: 7541: 7540: 7535: 7534: 7533: 7523: 7518: 7513: 7508: 7503: 7498: 7493: 7488: 7483: 7478: 7473: 7468: 7462: 7460: 7459:communications 7454: 7453: 7451: 7450: 7449: 7448: 7437: 7435: 7431: 7430: 7428: 7427: 7422: 7417: 7412: 7407: 7402: 7397: 7396: 7395: 7385: 7378: 7376:Agent handling 7372: 7370: 7368: 7367: 7362: 7356: 7353: 7352: 7345: 7344: 7337: 7330: 7322: 7316: 7315: 7301: 7300:External links 7298: 7297: 7296: 7291: 7284: 7281: 7280: 7279: 7273: 7265: 7262: 7261: 7260: 7246: 7234: 7229: 7224: 7219: 7214: 7209: 7204: 7198:Monthly Review 7187: 7184: 7183: 7182: 7168: 7154: 7140: 7126: 7112: 7098: 7084: 7070: 7056: 7042: 7028: 7014: 6997: 6983: 6969: 6959: 6945: 6928: 6918: 6904: 6890: 6888:978-0822359197 6876: 6862: 6848: 6834: 6816: 6815: 6810: 6804: 6803: 6792: 6791: 6789: 6786: 6784: 6783: 6776: 6745: 6716: 6690: 6664: 6638: 6612: 6591: 6577: 6551: 6507: 6501:978-0822359197 6500: 6488:Browne, Simone 6479: 6456: 6429: 6422: 6393: 6377: 6334: 6320: 6281: 6251: 6230:Solove, Daniel 6221: 6190: 6178:Wired Magazine 6164: 6145: 6103: 6096: 6072: 6061:on May 5, 2011 6036: 6004: 5989: 5963: 5932: 5906: 5893: 5880: 5869: 5858: 5831:(4): 370–376. 5815: 5789: 5758: 5732: 5702: 5669: 5643: 5617: 5582: 5567: 5541: 5530:. pp. A01 5509: 5479: 5453: 5425: 5400: 5373: 5348: 5322: 5295: 5277: 5257: 5231: 5200: 5174: 5167: 5146: 5133:(1): 249–269. 5111: 5098: 5088: 5057: 5021: 4985: 4959: 4933: 4904: 4878: 4854: 4826: 4804: 4792:Wired Magazine 4775: 4749: 4718: 4705:Wired Magazine 4692: 4661: 4635: 4624:. pp. A01 4606: 4575: 4549: 4530: 4510: 4493:Computer World 4479: 4452: 4422: 4397: 4366: 4335: 4304: 4278: 4234: 4212: 4189: 4153: 4136: 4110: 4080: 4053: 4031: 4009: 3987: 3953: 3926: 3900: 3868: 3824: 3798: 3766: 3740: 3710: 3679: 3653: 3627: 3605: 3558: 3539: 3520: 3489: 3464: 3431: 3401: 3375: 3352: 3318: 3289: 3270: 3244: 3214: 3181: 3152: 3118: 3092: 3066: 3054:Bloomberg News 3040: 3013: 2987: 2950: 2924: 2895: 2873: 2852:10.1.1.35.1695 2845:(4): 269–286. 2822: 2817:Wired Magazine 2804: 2778: 2751: 2722: 2694: 2683:on May 3, 2009 2661: 2635: 2612: 2576: 2542: 2525: 2505: 2488: 2468: 2461: 2443: 2436: 2417: 2415: 2412: 2411: 2410: 2405: 2400: 2395: 2390: 2385: 2380: 2375: 2370: 2365: 2360: 2355: 2350: 2345: 2338: 2335: 2334: 2333: 2324: 2303: 2300:the Wachowskis 2296:James McTeigue 2284:V for Vendetta 2279: 2266: 2245: 2236: 2180: 2163: 2145:Main article: 2142: 2139: 2138: 2137: 2130: 2117: 2114: 2113: 2112: 2095: 2083:V for Vendetta 2079: 2066: 2053: 2030: 2027: 2025: 2022: 1975: 1972: 1942: 1939: 1884: 1881: 1856:Superconnected 1837: 1834: 1816:-like purges. 1789: 1786: 1693: 1690: 1652:modus operandi 1639: 1636: 1626: 1623: 1614: 1611: 1603:land surveyors 1579: 1576: 1559: 1556: 1519: 1516: 1490: 1487: 1485: 1482: 1472: 1464: 1462: 1459: 1451:access control 1427:silicate glass 1407:Main article: 1404: 1401: 1365: 1362: 1288: 1285: 1276: 1273: 1233: 1230: 1191:Main article: 1188: 1185: 1183:capabilities. 1177:George W. Bush 1145: 1142: 1125:fusion centers 1070:Data profiling 1062: 1059: 1046:Main article: 1043: 1040: 1005:United Kingdom 891: 888: 818:Main article: 803: 800: 782: 731:social network 670: 667: 571:Greater London 562:United Kingdom 489:security guard 458:Main article: 455: 452: 397:Edward Snowden 330:Speech-to-text 292: 289: 214:Main article: 196: 193: 191: 188: 85: 84: 61:appears to be 58: 56: 49: 26: 9: 6: 4: 3: 2: 8864: 8853: 8850: 8848: 8845: 8843: 8840: 8838: 8835: 8833: 8830: 8828: 8825: 8823: 8820: 8818: 8815: 8814: 8812: 8797: 8789: 8788: 8785: 8779: 8776: 8774: 8771: 8769: 8766: 8764: 8761: 8759: 8756: 8754: 8751: 8749: 8746: 8744: 8741: 8739: 8736: 8734: 8733:Eavesdropping 8731: 8729: 8728:Data security 8726: 8724: 8721: 8719: 8716: 8715: 8713: 8709: 8703: 8700: 8698: 8695: 8693: 8690: 8688: 8685: 8683: 8680: 8678: 8675: 8673: 8670: 8668: 8665: 8663: 8660: 8658: 8655: 8653: 8650: 8648: 8645: 8644: 8642: 8638: 8632: 8629: 8627: 8626:Secret ballot 8624: 8622: 8619: 8617: 8614: 8612: 8609: 8607: 8604: 8602: 8599: 8597: 8594: 8592: 8589: 8587: 8586:Personal data 8584: 8582: 8579: 8575: 8572: 8570: 8567: 8565: 8562: 8561: 8560: 8557: 8555: 8552: 8550: 8547: 8546: 8544: 8542: 8538: 8532: 8529: 8527: 8524: 8522: 8519: 8517: 8514: 8512: 8509: 8508: 8506: 8502: 8496: 8493: 8491: 8488: 8486: 8483: 8481: 8478: 8476: 8473: 8471: 8468: 8466: 8463: 8461: 8458: 8456: 8453: 8451: 8448: 8446: 8443: 8441: 8438: 8436: 8433: 8431: 8428: 8426: 8423: 8421: 8418: 8416: 8413: 8411: 8408: 8406: 8403: 8401: 8398: 8397: 8395: 8393: 8389: 8381: 8377: 8374: 8373: 8372: 8371:United States 8369: 8367: 8364: 8362: 8359: 8357: 8354: 8352: 8349: 8347: 8344: 8342: 8339: 8337: 8334: 8332: 8329: 8327: 8324: 8322: 8319: 8317: 8314: 8312: 8309: 8307: 8304: 8302: 8299: 8297: 8294: 8293: 8291: 8289: 8285: 8279: 8276: 8274: 8271: 8269: 8266: 8264: 8261: 8259: 8256: 8255: 8253: 8249: 8245: 8238: 8233: 8231: 8226: 8224: 8219: 8218: 8215: 8203: 8200: 8196: 8195:organizations 8193: 8192: 8191: 8188: 8186: 8183: 8182: 8180: 8178: 8177:Dissemination 8174: 8168: 8165: 8163: 8160: 8158: 8155: 8153: 8150: 8148: 8145: 8143: 8140: 8138: 8135: 8133: 8130: 8128: 8125: 8124: 8122: 8120: 8116: 8106: 8103: 8101: 8098: 8096: 8093: 8091: 8088: 8086: 8083: 8082: 8080: 8076: 8069: 8065: 8062: 8060: 8057: 8055: 8052: 8050: 8047: 8045: 8042: 8040: 8037: 8035: 8032: 8031: 8029: 8027: 8021: 8015: 8012: 8010: 8007: 8005: 8002: 8000: 7997: 7995: 7992: 7990: 7987: 7986: 7984: 7982: 7978: 7968: 7965: 7963: 7962:Steganography 7960: 7958: 7955: 7953: 7950: 7948: 7945: 7943: 7942:Interrogation 7940: 7938: 7935: 7933: 7930: 7928: 7927:Eavesdropping 7925: 7923: 7920: 7918: 7914: 7911: 7909: 7906: 7904: 7901: 7899: 7896: 7894: 7891: 7889: 7886: 7882: 7879: 7878: 7877: 7874: 7872: 7869: 7865: 7862: 7860: 7857: 7856: 7855: 7852: 7851: 7849: 7847: 7843: 7837: 7834: 7832: 7831:Direct action 7829: 7827: 7826:Covert action 7824: 7822: 7819: 7817: 7814: 7813: 7811: 7809: 7805: 7797: 7796:organizations 7794: 7793: 7792: 7789: 7788: 7785: 7782: 7780: 7776: 7773: 7771: 7767: 7763: 7756: 7751: 7749: 7744: 7742: 7737: 7736: 7733: 7721: 7718: 7714: 7711: 7709: 7706: 7705: 7704: 7701: 7699: 7696: 7694: 7691: 7689: 7686: 7684: 7681: 7679: 7676: 7674: 7671: 7669: 7666: 7662: 7659: 7657: 7656:interrogation 7654: 7653: 7652: 7649: 7647: 7644: 7642: 7639: 7635: 7632: 7630: 7627: 7626: 7625: 7624:Eavesdropping 7622: 7618: 7615: 7613: 7610: 7609: 7608: 7605: 7603: 7600: 7598: 7595: 7591: 7588: 7587: 7586: 7583: 7582: 7580: 7576: 7570: 7567: 7565: 7562: 7560: 7557: 7556: 7554: 7549: 7545: 7539: 7536: 7532: 7529: 7528: 7527: 7526:Steganography 7524: 7522: 7519: 7517: 7514: 7512: 7509: 7507: 7504: 7502: 7501:Invisible ink 7499: 7497: 7494: 7492: 7489: 7487: 7484: 7482: 7479: 7477: 7474: 7472: 7469: 7467: 7464: 7463: 7461: 7455: 7447: 7444: 7443: 7442: 7439: 7438: 7436: 7432: 7426: 7423: 7421: 7420:Sleeper agent 7418: 7416: 7413: 7411: 7408: 7406: 7403: 7401: 7398: 7394: 7391: 7390: 7389: 7386: 7384: 7383: 7379: 7377: 7374: 7373: 7371: 7366: 7363: 7361: 7358: 7357: 7354: 7350: 7343: 7338: 7336: 7331: 7329: 7324: 7323: 7320: 7313: 7308: 7304: 7303: 7295: 7292: 7290: 7287: 7286: 7277: 7274: 7271: 7268: 7267: 7257: 7256: 7251: 7247: 7245: 7241: 7238: 7235: 7233: 7230: 7228: 7225: 7223: 7220: 7218: 7215: 7213: 7210: 7208: 7205: 7200: 7199: 7194: 7190: 7189: 7181: 7177: 7173: 7169: 7167: 7166:0-7425-0077-2 7163: 7159: 7155: 7153: 7149: 7145: 7141: 7139: 7135: 7131: 7127: 7125: 7121: 7117: 7113: 7111: 7107: 7103: 7099: 7097: 7096:9780415953931 7093: 7089: 7085: 7083: 7082:0-7456-4511-9 7079: 7075: 7071: 7069: 7065: 7061: 7057: 7055: 7051: 7047: 7043: 7041: 7037: 7033: 7029: 7027: 7023: 7019: 7015: 7013: 7009: 7005: 7001: 6998: 6996: 6995:0-7748-1611-2 6992: 6988: 6984: 6982: 6981:0-14-311890-0 6978: 6974: 6970: 6968: 6964: 6960: 6958: 6954: 6950: 6946: 6944: 6943:0-596-00105-3 6940: 6936: 6932: 6929: 6927: 6923: 6919: 6917: 6916:0-375-42534-9 6913: 6909: 6905: 6903: 6899: 6895: 6891: 6889: 6885: 6881: 6877: 6875: 6871: 6867: 6863: 6861: 6857: 6853: 6849: 6847: 6843: 6839: 6835: 6833: 6829: 6825: 6821: 6820: 6814: 6811: 6809: 6806: 6805: 6800: 6795: 6779: 6773: 6769: 6764: 6763: 6754: 6752: 6750: 6733: 6732: 6727: 6720: 6705: 6701: 6694: 6679: 6675: 6668: 6653: 6649: 6642: 6627: 6626:The Intercept 6623: 6616: 6608: 6607: 6602: 6595: 6587: 6581: 6566: 6562: 6555: 6547: 6543: 6537: 6522: 6518: 6511: 6503: 6497: 6493: 6489: 6483: 6475: 6471: 6467: 6460: 6452: 6448: 6442: 6440: 6438: 6436: 6434: 6425: 6423:9780394727677 6419: 6415: 6410: 6409: 6403: 6397: 6390: 6384: 6382: 6370: 6366: 6362: 6358: 6354: 6353: 6345: 6338: 6330: 6324: 6305: 6301: 6294: 6288: 6286: 6270: 6266: 6260: 6258: 6256: 6247: 6243: 6239: 6235: 6231: 6225: 6209: 6205: 6204:Business Week 6201: 6194: 6179: 6175: 6168: 6161: 6157: 6154: 6149: 6141: 6137: 6133: 6129: 6125: 6121: 6117: 6110: 6108: 6099: 6093: 6089: 6085: 6084: 6076: 6057: 6053: 6046: 6040: 6021: 6014: 6008: 6000: 5993: 5978: 5974: 5967: 5951: 5947: 5943: 5936: 5921: 5917: 5910: 5903: 5897: 5890: 5884: 5878: 5877:Radartutorial 5873: 5867: 5862: 5854: 5850: 5846: 5842: 5838: 5834: 5830: 5826: 5819: 5804: 5800: 5793: 5777: 5773: 5769: 5762: 5747: 5743: 5736: 5720: 5716: 5709: 5707: 5690: 5686: 5682: 5676: 5674: 5657: 5653: 5647: 5631: 5627: 5621: 5603: 5599: 5592: 5586: 5578: 5571: 5555: 5552: 5545: 5529: 5528: 5523: 5516: 5514: 5497: 5493: 5489: 5483: 5468: 5464: 5457: 5442: 5441: 5436: 5429: 5414: 5410: 5404: 5388: 5384: 5377: 5362: 5358: 5352: 5336: 5332: 5326: 5310: 5306: 5299: 5292: 5284:September 13, 5280: 5278:9781538125885 5274: 5270: 5269: 5261: 5245: 5241: 5235: 5219: 5215: 5211: 5204: 5189: 5185: 5178: 5170: 5164: 5160: 5156: 5150: 5141: 5136: 5132: 5128: 5127: 5122: 5115: 5108: 5102: 5092: 5076: 5072: 5071:Defense Daily 5068: 5061: 5042: 5038: 5031: 5025: 5006: 5002: 4995: 4989: 4973: 4969: 4963: 4948: 4944: 4937: 4922: 4918: 4911: 4909: 4893: 4889: 4882: 4875: 4871: 4867: 4864: 4858: 4843: 4842: 4837: 4830: 4815: 4814:"MQ-9 Reaper" 4808: 4793: 4789: 4782: 4780: 4764: 4760: 4753: 4737: 4733: 4729: 4726:Mack, Kelly. 4722: 4706: 4702: 4696: 4680: 4676: 4672: 4665: 4650: 4646: 4639: 4623: 4622: 4617: 4610: 4594: 4590: 4586: 4579: 4564: 4560: 4553: 4537: 4533: 4527: 4523: 4522: 4514: 4498: 4494: 4490: 4483: 4467: 4463: 4456: 4440: 4436: 4429: 4427: 4411: 4407: 4401: 4385: 4381: 4377: 4370: 4354: 4350: 4346: 4339: 4323: 4319: 4315: 4308: 4293: 4292:New Scientist 4289: 4282: 4274: 4268: 4252: 4248: 4241: 4239: 4219: 4215: 4209: 4202: 4201: 4193: 4184: 4179: 4175: 4171: 4167: 4160: 4158: 4149: 4148: 4140: 4129:September 13, 4125: 4121: 4114: 4098: 4094: 4090: 4084: 4069: 4068: 4063: 4057: 4042: 4035: 4020: 4013: 4002:September 26, 3997: 3991: 3975: 3971: 3970:Rolling Stone 3967: 3960: 3958: 3941: 3937: 3930: 3914: 3910: 3904: 3885: 3878: 3872: 3856: 3852: 3838: 3834: 3828: 3812: 3808: 3802: 3783: 3776: 3770: 3755: 3751: 3744: 3736: 3732: 3728: 3724: 3717: 3715: 3698: 3694: 3690: 3683: 3668: 3664: 3657: 3641: 3637: 3631: 3616:. May 5, 2016 3615: 3609: 3601: 3597: 3593: 3589: 3585: 3581: 3577: 3573: 3569: 3562: 3554: 3550: 3543: 3535: 3531: 3524: 3509: 3505: 3498: 3496: 3494: 3482:September 22, 3478: 3474: 3468: 3453: 3452: 3447: 3440: 3438: 3436: 3419: 3415: 3411: 3405: 3390: 3386: 3379: 3371: 3367: 3363: 3356: 3340: 3336: 3332: 3325: 3323: 3306: 3302: 3296: 3294: 3285: 3281: 3274: 3259: 3255: 3248: 3232: 3228: 3224: 3218: 3202: 3198: 3194: 3188: 3186: 3170: 3166: 3159: 3157: 3140: 3136: 3132: 3125: 3123: 3107: 3103: 3096: 3081: 3077: 3070: 3055: 3051: 3044: 3028: 3024: 3017: 3002: 2998: 2991: 2972: 2968: 2961: 2954: 2939: 2935: 2928: 2913:. pp. A1 2912: 2911: 2906: 2899: 2891: 2884: 2877: 2866: 2862: 2858: 2853: 2848: 2844: 2840: 2833: 2826: 2818: 2814: 2808: 2797:September 26, 2793: 2789: 2782: 2766: 2762: 2755: 2739: 2735: 2729: 2727: 2711: 2707: 2701: 2699: 2682: 2678: 2674: 2668: 2666: 2650: 2646: 2639: 2632:(3): 595–623. 2631: 2627: 2623: 2616: 2597: 2593: 2586: 2580: 2565: 2561: 2557: 2553: 2546: 2539: 2528: 2526:9781930217133 2522: 2518: 2517: 2509: 2502: 2491: 2489:9780520301245 2485: 2481: 2480: 2472: 2464: 2462:9780190297824 2458: 2454: 2447: 2439: 2433: 2429: 2422: 2418: 2409: 2406: 2404: 2401: 2399: 2396: 2394: 2391: 2389: 2386: 2384: 2381: 2379: 2376: 2374: 2371: 2369: 2366: 2364: 2361: 2359: 2356: 2354: 2353:Sousveillance 2351: 2349: 2346: 2344: 2341: 2340: 2331: 2330: 2325: 2322: 2318: 2317:thriller film 2314: 2310: 2309: 2304: 2301: 2297: 2293: 2290: 2286: 2285: 2280: 2277: 2273: 2272: 2267: 2264: 2260: 2256: 2252: 2251: 2246: 2243: 2242: 2237: 2234: 2230: 2226: 2222: 2218: 2214: 2210: 2206: 2202: 2198: 2194: 2190: 2189: 2184: 2181: 2178: 2174: 2170: 2169: 2165:In the movie 2164: 2161: 2157: 2156: 2151: 2150: 2148: 2135: 2131: 2128: 2124: 2123:Dead Kennedys 2120: 2119: 2110: 2105: 2104: 2099: 2098:David Egger's 2096: 2094: 2090: 2089:graphic novel 2086: 2084: 2080: 2077: 2073: 2072: 2067: 2064: 2060: 2059: 2054: 2050: 2046: 2042: 2041: 2036: 2035:George Orwell 2033: 2032: 2029:In literature 2021: 2019: 2018: 2017:Sousveillance 2013: 2011: 2007: 2003: 1999: 1995: 1991: 1989: 1985: 1980: 1971: 1968: 1964: 1962: 1957: 1955: 1950: 1948: 1938: 1936: 1932: 1927: 1925: 1924: 1919: 1918: 1912: 1910: 1906: 1902: 1898: 1894: 1890: 1880: 1877: 1876:Simone Browne 1874:In addition, 1872: 1870: 1869:cyberbullying 1864: 1861: 1857: 1851: 1849: 1843: 1833: 1831: 1827: 1821: 1817: 1815: 1811: 1807: 1803: 1794: 1785: 1784: 1780: 1775: 1772: 1766: 1764: 1763: 1758: 1754: 1750: 1746: 1742: 1738: 1734: 1730: 1726: 1722: 1715: 1711: 1708:An elaborate 1706: 1698: 1689: 1687: 1682: 1680: 1679:Scott McNealy 1676: 1670: 1668: 1663: 1659: 1655: 1653: 1649: 1645: 1631: 1622: 1620: 1610: 1608: 1607:survey stakes 1604: 1600: 1596: 1592: 1585: 1575: 1573: 1569: 1564: 1555: 1551: 1549: 1545: 1541: 1537: 1532: 1530: 1525: 1515: 1512: 1510: 1504: 1495: 1478: 1476: 1469: 1458: 1454: 1452: 1448: 1443: 1439: 1435: 1432: 1428: 1424: 1415: 1410: 1400: 1398: 1392: 1389: 1385: 1384:strike action 1380: 1378: 1370: 1361: 1359: 1355: 1351: 1350:United States 1347: 1343: 1342:whistleblower 1339: 1334: 1332: 1328: 1324: 1320: 1316: 1312: 1306: 1301: 1299: 1295: 1287:Mobile phones 1284: 1282: 1272: 1270: 1265: 1263: 1260:, banking or 1259: 1258:library cards 1255: 1251: 1247: 1246:identity card 1238: 1229: 1227: 1222: 1218: 1215: 1211: 1208:(NAO) of the 1207: 1203: 1200: 1194: 1184: 1182: 1178: 1174: 1169: 1164: 1162: 1157: 1154: 1151: 1141: 1139: 1135: 1134: 1128: 1126: 1120: 1118: 1114: 1110: 1106: 1100: 1098: 1094: 1089: 1087: 1083: 1078: 1076: 1071: 1067: 1058: 1056: 1049: 1039: 1036: 1032: 1027: 1025: 1024:crowd control 1021: 1016: 1014: 1011:to full-size 1010: 1006: 1001: 999: 995: 991: 987: 983: 980: 979:United States 972: 968: 964: 960: 956: 954: 950: 946: 942: 938: 934: 929: 927: 923: 919: 915: 906: 901: 897: 887: 885: 881: 876: 873: 869: 867: 862: 860: 856: 855:DNA profiling 851: 849: 844: 842: 838: 834: 830: 826: 821: 813: 808: 799: 795: 793: 781: 776: 774: 769: 767: 763: 759: 755: 751: 747: 744:(DARPA), the 743: 738: 736: 732: 728: 724: 720: 716: 712: 708: 704: 697: 692: 688: 684: 680: 675: 666: 664: 660: 656: 651: 649: 644: 642: 638: 633: 630: 626: 617: 613: 610: 606: 602: 598: 594: 590: 586: 581: 579: 574: 572: 567: 563: 558: 556: 552: 548: 547:New York City 544: 543:Richard Daley 540: 536: 532: 528: 524: 523:United States 519: 517: 513: 508: 506: 502: 498: 494: 490: 486: 477: 471: 466: 461: 451: 449: 444: 441: 437: 433: 429: 425: 422:Although the 420: 417: 413: 411: 406: 402: 398: 390: 386: 381: 377: 375: 371: 367: 361: 359: 354: 349: 345: 343: 339: 335: 331: 326: 324: 320: 316: 315:AT&T Inc. 312: 308: 307:United States 302: 298: 288: 286: 282: 278: 274: 270: 269:Magic Lantern 265: 263: 259: 255: 251: 247: 243: 237: 235: 231: 227: 223: 217: 210: 206: 201: 187: 185: 180: 176: 174: 173:authoritarian 170: 166: 162: 157: 155: 151: 147: 143: 139: 134: 129: 127: 123: 119: 115: 111: 107: 99: 91: 81: 71: 66: 64: 59:This article 57: 48: 47: 44: 40: 33: 19: 8817:Surveillance 8773:Human rights 8288:Privacy laws 7967:Surveillance 7966: 7957:Resident spy 7898:Cryptography 7703:Surveillance 7702: 7491:Cyber spying 7476:Cryptography 7415:Resident spy 7400:Double agent 7380: 7312:Surveillance 7255:The Guardian 7253: 7196: 7171: 7157: 7143: 7129: 7115: 7101: 7087: 7073: 7059: 7045: 7031: 7017: 7003: 6986: 6972: 6948: 6934: 6907: 6893: 6879: 6865: 6851: 6837: 6823: 6799:Surveillance 6798: 6761: 6736:. Retrieved 6731:The Guardian 6729: 6719: 6707:. Retrieved 6703: 6693: 6681:. Retrieved 6677: 6667: 6655:. Retrieved 6651: 6641: 6629:. Retrieved 6625: 6615: 6604: 6594: 6580: 6568:. Retrieved 6564: 6554: 6524:. Retrieved 6520: 6510: 6491: 6482: 6473: 6469: 6459: 6450: 6447:Chayko, Mary 6407: 6396: 6369:the original 6356: 6350: 6337: 6323: 6311:. Retrieved 6299: 6272:. Retrieved 6268: 6237: 6233: 6224: 6212:. Retrieved 6208:the original 6203: 6193: 6181:. Retrieved 6177: 6167: 6148: 6126:(4): 14–22. 6123: 6120:Human Rights 6119: 6082: 6075: 6063:. Retrieved 6056:the original 6051: 6039: 6027:. Retrieved 6020:the original 6007: 5998: 5992: 5980:. Retrieved 5976: 5973:"COINTELPRO" 5971:Wolf, Paul. 5966: 5954:. Retrieved 5950:the original 5945: 5935: 5923:. Retrieved 5919: 5909: 5901: 5896: 5888: 5883: 5872: 5861: 5828: 5824: 5818: 5806:. Retrieved 5802: 5792: 5780:. Retrieved 5776:the original 5771: 5761: 5749:. Retrieved 5745: 5735: 5723:. Retrieved 5718: 5693:. Retrieved 5689:the original 5685:RFID Journal 5684: 5660:. Retrieved 5655: 5646: 5634:. Retrieved 5630:The Guardian 5629: 5620: 5611:November 27, 5609:, retrieved 5602:the original 5597: 5585: 5570: 5558:. Retrieved 5553: 5544: 5532:. Retrieved 5525: 5500:. Retrieved 5496:the original 5491: 5482: 5470:. Retrieved 5466: 5456: 5444:. Retrieved 5438: 5428: 5416:. Retrieved 5412: 5403: 5391:. Retrieved 5386: 5376: 5364:. Retrieved 5360: 5351: 5339:. Retrieved 5334: 5325: 5313:. Retrieved 5308: 5298: 5289: 5282:. Retrieved 5267: 5260: 5248:. Retrieved 5243: 5234: 5222:. Retrieved 5218:the original 5213: 5203: 5191:. Retrieved 5187: 5177: 5158: 5149: 5130: 5124: 5114: 5101: 5091: 5079:. Retrieved 5075:the original 5070: 5060: 5048:. Retrieved 5041:the original 5036: 5024: 5012:. Retrieved 5005:the original 5000: 4988: 4976:. Retrieved 4971: 4962: 4950:. Retrieved 4946: 4936: 4924:. Retrieved 4920: 4895:. Retrieved 4891: 4881: 4873: 4857: 4845:. Retrieved 4841:The Atlantic 4839: 4829: 4817:. Retrieved 4812:Boyd, Ryan. 4807: 4795:. Retrieved 4791: 4768:December 20, 4766:. Retrieved 4762: 4752: 4742:December 20, 4740:. Retrieved 4736:the original 4731: 4721: 4709:. Retrieved 4704: 4695: 4683:. Retrieved 4679:the original 4674: 4664: 4652:. Retrieved 4648: 4638: 4626:. Retrieved 4619: 4609: 4597:. Retrieved 4593:the original 4588: 4578: 4566:. Retrieved 4562: 4552: 4540:. Retrieved 4536:the original 4520: 4513: 4501:. Retrieved 4497:the original 4492: 4482: 4470:. Retrieved 4466:Threat Level 4465: 4455: 4443:. Retrieved 4439:Threat Level 4438: 4415:December 20, 4413:. Retrieved 4409: 4400: 4388:. Retrieved 4383: 4379: 4369: 4357:. Retrieved 4353:the original 4348: 4338: 4326:. Retrieved 4322:the original 4317: 4307: 4295:. Retrieved 4291: 4281: 4255:. Retrieved 4250: 4225:. Retrieved 4199: 4192: 4173: 4170:First Monday 4169: 4145: 4139: 4127:. Retrieved 4123: 4113: 4101:. Retrieved 4097:the original 4092: 4083: 4071:. Retrieved 4065: 4056: 4046:December 24, 4044:. Retrieved 4034: 4022:. Retrieved 4012: 4000:. Retrieved 3990: 3978:. Retrieved 3974:the original 3969: 3944:. Retrieved 3940:the original 3929: 3917:. Retrieved 3913:the original 3903: 3891:. Retrieved 3871: 3859:. Retrieved 3854: 3841:. Retrieved 3837:The Guardian 3836: 3827: 3815:. Retrieved 3811:the original 3801: 3789:. Retrieved 3782:the original 3769: 3757:. Retrieved 3753: 3743: 3729:(1): 70–84. 3726: 3722: 3701:. Retrieved 3692: 3682: 3670:. Retrieved 3666: 3656: 3644:. Retrieved 3639: 3630: 3618:. Retrieved 3608: 3575: 3571: 3561: 3552: 3542: 3534:The Guardian 3533: 3523: 3511:. Retrieved 3507: 3480:. Retrieved 3476: 3467: 3455:. Retrieved 3449: 3422:. Retrieved 3418:the original 3413: 3404: 3392:. Retrieved 3388: 3378: 3361: 3355: 3343:. Retrieved 3339:the original 3334: 3309:. Retrieved 3304: 3283: 3273: 3263:December 14, 3261:. Retrieved 3257: 3247: 3237:December 13, 3235:. Retrieved 3231:the original 3226: 3217: 3205:. Retrieved 3201:the original 3196: 3193:"Telephones" 3172:. Retrieved 3168: 3143:. Retrieved 3139:the original 3134: 3111:December 13, 3109:. Retrieved 3105: 3095: 3083:. Retrieved 3079: 3069: 3057:. Retrieved 3053: 3043: 3031:. Retrieved 3027:Threat Level 3026: 3016: 3006:February 13, 3004:. Retrieved 3000: 2990: 2978:. Retrieved 2967:The Guardian 2966: 2953: 2941:. Retrieved 2938:The Atlantic 2937: 2927: 2915:. Retrieved 2908: 2898: 2889: 2876: 2842: 2838: 2825: 2816: 2807: 2795:. Retrieved 2791: 2781: 2769:. Retrieved 2764: 2754: 2742:. Retrieved 2737: 2713:. Retrieved 2709: 2685:. Retrieved 2681:the original 2676: 2652:. Retrieved 2648: 2638: 2629: 2625: 2615: 2603:. Retrieved 2591: 2579: 2567:. Retrieved 2555: 2545: 2537: 2530:. Retrieved 2515: 2508: 2500: 2493:. Retrieved 2478: 2471: 2452: 2446: 2427: 2421: 2327: 2319:directed by 2306: 2294:directed by 2282: 2269: 2248: 2239: 2221:Members Only 2188:The Sopranos 2186: 2166: 2153: 2101: 2081: 2069: 2068:In the book 2056: 2052:problematic. 2045:totalitarian 2038: 2015: 2014: 1992: 1977: 1960: 1958: 1953: 1946: 1944: 1928: 1921: 1915: 1913: 1889:civil rights 1886: 1873: 1865: 1855: 1852: 1845: 1822: 1818: 1799: 1776: 1770: 1767: 1760: 1741:civil rights 1723:program and 1718: 1683: 1671: 1664: 1660: 1656: 1641: 1616: 1590: 1588: 1565: 1561: 1552: 1533: 1527: 1513: 1506: 1503:GPS tracking 1473: 1455: 1440: 1436: 1420: 1393: 1388:dehumanizing 1381: 1375: 1364:RFID tagging 1346:Saudi Arabia 1338:The Guardian 1335: 1319:mobile tower 1311:IMSI-catcher 1308: 1303: 1290: 1278: 1266: 1262:credit cards 1243: 1226:Google Earth 1196: 1165: 1158: 1155: 1147: 1131: 1129: 1121: 1101: 1090: 1079: 1064: 1051: 1028: 1017: 1002: 976: 930: 911: 877: 870: 863: 852: 845: 827: 823: 796: 789: 785:Jason Ethier 778: 770: 739: 700: 652: 645: 634: 622: 582: 575: 559: 520: 509: 482: 445: 421: 414: 394: 373: 362: 350: 346: 327: 304: 266: 258:NarusInsight 238: 219: 177: 158: 130: 106:Surveillance 105: 104: 75: 60: 43: 8768:Wiretapping 8480:Switzerland 8465:South Korea 8455:Philippines 8445:Netherlands 8440:Isle of Man 8361:Switzerland 8341:New Zealand 8039:Geophysical 7821:Cell system 7808:Clandestine 7693:Stay-behind 7602:Recruitment 7559:Canary trap 7457:Devices and 7405:Field agent 6709:October 31, 6683:October 31, 6657:October 31, 6631:October 31, 6570:February 1, 6526:February 1, 6359:: 375–395. 5246:. June 2007 3946:December 2, 3791:February 4, 3759:November 1, 3578:(4): 1–46. 3513:November 1, 3457:November 1, 3394:December 5, 2980:February 1, 2329:The Capture 2255:East Berlin 2229:Pax Soprana 2227:(e.g., in " 2134:Vienna Teng 2091:written by 2002:Rodney King 1941:Court cases 1891:groups and 1860:Mary Chayko 1625:Controversy 1597:related to 1544:subversives 1298:cell towers 1086:paper trail 1066:Data mining 941:MQ-9 Reaper 924:. Military 758:subversives 401:wiretapping 370:cell towers 358:IMSI number 169:Democracies 167:activists. 133:governments 8811:Categories 8753:Panopticon 8376:California 8251:Principles 8068:earthquake 7932:False flag 7770:Collection 7688:Sexpionage 7668:COINTELPRO 7661:safe house 7641:False flag 7578:Operations 7552:techniques 7548:Tradecraft 7270:COINTELPRO 7180:3030107124 7110:0813547652 7026:1477312439 6902:1847873537 6874:0190684097 6860:1138026026 6846:0700616861 6762:The Circle 5656:TechCrunch 5389:. ABC News 5366:October 5, 5311:. NBC News 4872:, Rutland 4847:October 5, 4819:October 5, 4073:October 5, 3934:Den Haag. 3861:January 7, 3843:January 7, 3723:Interfaces 3620:January 5, 2792:ZDNet News 2605:October 1, 2414:References 2321:Tony Scott 2305:The movie 2281:The movie 2268:The movie 2247:The movie 2238:The movie 2103:The Circle 2093:Alan Moore 2087:a British 1935:COINTELPRO 1840:See also: 1814:COINTELPRO 1779:IP cameras 1733:biometrics 1692:Opposition 1644:terrorists 1536:COINTELPRO 1522:See also: 1501:See also: 1453:purposes. 1305:real-time. 1161:informants 1105:aggregated 918:helicopter 820:Biometrics 766:dissidents 762:extremists 754:terrorists 735:data mined 485:IP network 405:encryption 389:Cheltenham 291:Telephones 150:heterodoxy 8718:Anonymity 8554:Financial 8531:Workplace 8521:Education 8430:Indonesia 8400:Australia 8356:Sri Lanka 8351:Singapore 8296:Australia 8059:Materials 7913:Defection 7908:Dead drop 7881:black bag 7846:Espionage 7612:black bag 7496:Dead drop 7425:Spymaster 7349:Espionage 6738:August 6, 6313:March 13, 6274:March 13, 6214:March 20, 6200:"Privacy" 6183:March 20, 6132:0046-8185 6065:March 13, 5982:March 14, 5956:March 17, 5925:March 18, 5808:March 17, 5782:March 17, 5746:CNET News 5725:March 17, 5719:USA Today 5695:March 23, 5662:March 29, 5636:March 29, 5560:March 17, 5554:USA Today 5534:March 17, 5502:March 16, 5472:March 16, 5446:March 14, 5418:March 16, 5393:March 13, 5341:March 13, 5315:March 13, 5250:March 14, 5224:March 20, 5193:March 13, 5081:March 16, 5050:March 16, 5014:March 15, 4978:March 15, 4952:March 13, 4926:March 13, 4897:March 14, 4892:CNet News 4797:March 18, 4711:March 18, 4685:March 18, 4654:March 14, 4599:March 14, 4568:March 16, 4563:USA Today 4542:March 15, 4503:March 14, 4472:March 19, 4445:March 19, 4390:March 14, 4359:March 15, 4328:March 16, 4318:CNET News 4297:March 16, 4257:March 15, 4103:March 13, 3980:March 20, 3703:March 13, 3672:March 13, 3646:April 13, 3592:0360-0300 3345:March 14, 3311:March 14, 3207:March 22, 3174:March 14, 3145:March 14, 3135:CNet News 3085:March 14, 3059:March 19, 3033:March 19, 3001:The Verge 2847:CiteSeerX 2771:March 19, 2765:USA Today 2744:March 14, 2715:March 14, 2687:March 14, 2654:March 13, 2569:April 15, 2564:1059-1028 2532:March 14, 2495:March 14, 2289:dystopian 2287:, a 2005 2160:biometric 2152:The film 2063:theocracy 2055:The book 2037:'s novel 1887:Numerous 1826:biometric 1648:criminals 1605:of using 1566:The U.S. 1548:criminals 1250:passports 1042:Corporate 994:Honeywell 922:spy plane 880:his paper 802:Biometric 655:biometric 641:Identix's 597:Honeywell 426:requires 254:Carnivore 184:espionage 179:Espionage 142:Religious 78:June 2024 8852:Security 8796:Category 8711:See also 8564:Facebook 8559:Internet 8511:Consumer 8485:Thailand 8119:Analysis 7917:Turncoat 7864:handling 7678:SHAMROCK 7531:microdot 7434:Analysis 7240:Archived 6734:. London 6536:cite web 6449:(2017). 6404:(1979). 6304:Archived 6156:Archived 6140:26423456 5853:12365071 5845:20923593 5751:July 24, 4866:Archived 4763:LA Times 4267:cite web 4227:July 28, 4218:Archived 4024:June 18, 3893:July 22, 3884:Archived 3697:Archived 3693:CBS News 3640:BBC News 3335:FOX News 3305:BBC News 3080:LA Times 2971:Archived 2943:June 30, 2917:June 30, 2892:: 23–25. 2865:Archived 2596:Archived 2378:Trapwire 2337:See also 2241:THX-1138 2213:Funhouse 2209:Rat Pack 2141:Onscreen 2116:In music 2006:Copwatch 1956:(2014). 1710:graffito 1595:evidence 1591:stakeout 1578:Stakeout 1442:Verichip 812:US-VISIT 783:—  711:Facebook 709:such as 687:Facebook 663:Trapwire 497:database 436:metadata 353:StingRay 230:Internet 195:Computer 154:Auditors 110:managing 8847:Privacy 8574:Twitter 8526:Medical 8516:Digital 8435:Ireland 8420:Germany 8405:Denmark 8331:Germany 8321:England 8316:Denmark 8244:Privacy 8066: ( 8044:Nuclear 8014:TEMPEST 7673:MINARET 7617:wetwork 7201:. 2014. 6521:FindLaw 6240:: 745. 5387:Blotter 4468:. Wired 4441:. Wired 3600:6128808 3424:June 3, 3370:1092293 3029:. Wired 2219:" and " 2203:" and " 2155:Gattaca 1893:privacy 1883:Privacy 1745:privacy 1638:Support 1518:Devices 814:program 719:Twitter 715:MySpace 560:In the 535:Chicago 521:In the 505:HumanID 454:Cameras 432:e-mails 348:phone. 319:Verizon 281:Pinwale 262:ECHELON 228:on the 226:traffic 190:Methods 161:privacy 8569:Google 8490:Turkey 8475:Sweden 8460:Poland 8450:Norway 8415:France 8346:Russia 8306:Canada 8301:Brazil 7903:Cutout 7854:Agents 7708:Global 7634:MASINT 7629:SIGINT 7481:Cutout 7365:Assets 7360:Agents 7178:  7164:  7150:  7136:  7122:  7108:  7094:  7080:  7066:  7052:  7038:  7024:  7010:  6993:  6979:  6965:  6955:  6941:  6924:  6914:  6900:  6886:  6872:  6858:  6844:  6830:  6796:about 6774:  6498:  6420:  6416:–202. 6246:998565 6244:  6138:  6130:  6094:  6029:25 May 5851:  5843:  5275:  5165:  4874:Herald 4628:May 6, 4528:  4210:  3919:May 8, 3817:May 8, 3598:  3590:  3368:  2849:  2562:  2523:  2486:  2459:  2434:  2313:action 2261:, the 2100:novel 1965:was a 1963:(2014) 1949:(2011) 1725:ADVISE 1546:, and 1354:spying 1181:HUMINT 1130:Under 1113:ADVISE 1020:tasers 1013:drones 890:Aerial 764:, and 595:, and 525:, the 340:, and 338:Verint 260:, and 244:, the 146:heresy 8758:PRISM 8581:Email 8504:Areas 8470:Spain 8425:India 8336:Ghana 8311:China 8078:Other 8049:Radar 7893:Cover 7871:Asset 7859:field 7393:Agent 7388:Cover 6372:(PDF) 6347:(PDF) 6307:(PDF) 6296:(PDF) 6136:JSTOR 6059:(PDF) 6048:(PDF) 6023:(PDF) 6016:(PDF) 5849:S2CID 5605:(PDF) 5594:(PDF) 5291:tail. 5096:2014. 5044:(PDF) 5033:(PDF) 5008:(PDF) 4997:(PDF) 4221:(PDF) 4204:(PDF) 4176:(3). 3887:(PDF) 3880:(PDF) 3785:(PDF) 3778:(PDF) 3596:S2CID 2974:(PDF) 2963:(PDF) 2886:(PDF) 2868:(PDF) 2835:(PDF) 2599:(PDF) 2588:(PDF) 2556:Wired 2259:Stasi 1783:Qihoo 1461:Radar 1117:TALON 1097:CALEA 1035:DARPA 1022:for " 971:DARPA 920:, or 833:DARPA 685:site 679:graph 605:China 501:VIRAT 424:CALEA 416:Apple 410:Apple 342:Narus 285:PRISM 273:CIPAV 8697:NOYB 7713:Mass 7683:FVEY 7410:Mole 7176:ISBN 7162:ISBN 7148:ISBN 7134:ISBN 7120:ISBN 7106:ISBN 7092:ISBN 7078:ISBN 7064:ISBN 7050:ISBN 7036:ISBN 7022:ISBN 7008:ISBN 6991:ISBN 6977:ISBN 6963:ISBN 6953:ISBN 6939:ISBN 6922:ISBN 6912:ISBN 6898:ISBN 6884:ISBN 6870:ISBN 6856:ISBN 6842:ISBN 6828:ISBN 6772:ISBN 6740:2007 6711:2023 6704:CNBC 6685:2023 6678:CNBC 6659:2023 6652:CNBC 6633:2023 6572:2013 6546:link 6542:link 6528:2017 6496:ISBN 6418:ISBN 6315:2009 6276:2009 6242:SSRN 6216:2009 6185:2009 6128:ISSN 6092:ISBN 6067:2009 6031:2015 5984:2009 5958:2009 5927:2009 5841:PMID 5810:2009 5784:2009 5753:2012 5727:2009 5697:2012 5664:2020 5638:2020 5613:2015 5562:2009 5536:2009 5504:2009 5474:2009 5448:2009 5420:2009 5395:2009 5368:2016 5343:2009 5317:2009 5286:2022 5273:ISBN 5252:2009 5226:2009 5195:2009 5163:ISBN 5083:2009 5052:2009 5016:2009 4980:2009 4954:2009 4928:2009 4899:2009 4849:2016 4821:2016 4799:2009 4770:2009 4744:2009 4713:2009 4687:2009 4656:2009 4630:2009 4601:2009 4570:2009 4544:2009 4526:ISBN 4505:2009 4474:2009 4447:2009 4417:2009 4392:2009 4361:2009 4330:2009 4299:2009 4273:link 4259:2009 4229:2012 4208:ISBN 4131:2012 4105:2009 4093:EPIC 4075:2016 4048:2006 4026:2006 4004:2014 3982:2009 3948:2016 3921:2009 3895:2009 3863:2017 3845:2017 3819:2009 3793:2015 3761:2019 3705:2009 3674:2009 3648:2018 3622:2017 3588:ISSN 3515:2014 3484:2023 3459:2014 3426:2017 3396:2009 3366:SSRN 3347:2009 3313:2009 3265:2009 3239:2009 3209:2009 3176:2009 3147:2009 3113:2009 3087:2009 3061:2009 3035:2009 3008:2017 2982:2017 2945:2009 2919:2009 2799:2014 2773:2009 2746:2009 2717:2009 2689:2009 2656:2009 2607:2022 2571:2020 2560:ISSN 2534:2020 2521:ISBN 2497:2020 2484:ISBN 2457:ISBN 2432:ISBN 2215:", " 2197:bugs 2177:SWAT 2132:The 2121:The 1988:UAVs 1920:and 1907:and 1751:and 1743:and 1731:and 1677:CEO 1646:and 1617:The 1570:and 1447:shot 1423:RFID 1329:and 1313:, a 1219:and 1150:tail 1115:and 1082:data 1003:The 998:SWAT 977:The 967:IPTO 963:HART 898:and 623:The 503:and 434:and 351:The 317:and 299:and 271:and 224:and 222:data 148:and 124:and 8549:Law 7550:and 6768:288 6414:201 6361:doi 5833:doi 5135:doi 4649:CNN 4386:(2) 4178:doi 3731:doi 3580:doi 2857:doi 2263:GDR 2235:"). 2183:HBO 2175:in 1509:GPS 1358:SS7 1173:FBI 882:in 878:In 635:At 589:IBM 491:or 440:NSA 374:one 246:FBI 242:NSA 8813:: 8378:, 7915:/ 7252:. 7195:. 6933:, 6748:^ 6728:. 6702:. 6676:. 6650:. 6624:. 6603:. 6563:. 6538:}} 6534:{{ 6519:. 6474:20 6472:. 6468:. 6432:^ 6380:^ 6355:. 6349:. 6298:. 6284:^ 6267:. 6254:^ 6238:44 6236:. 6202:. 6176:. 6134:. 6124:41 6122:. 6118:. 6106:^ 6090:. 6086:. 6050:. 5975:. 5944:. 5918:. 5847:. 5839:. 5829:26 5827:. 5801:. 5770:. 5744:. 5717:. 5705:^ 5683:. 5672:^ 5654:. 5628:. 5596:, 5524:. 5512:^ 5490:. 5465:. 5437:. 5411:. 5385:. 5359:. 5333:. 5307:. 5288:. 5242:. 5212:. 5186:. 5131:43 5129:. 5123:. 5069:. 5035:. 4999:. 4970:. 4945:. 4919:. 4907:^ 4890:. 4838:. 4790:. 4778:^ 4761:. 4730:. 4703:. 4673:. 4647:. 4618:. 4587:. 4561:. 4491:. 4464:. 4437:. 4425:^ 4408:. 4384:II 4382:. 4378:. 4347:. 4316:. 4290:. 4269:}} 4265:{{ 4249:. 4237:^ 4216:. 4174:13 4172:. 4168:. 4156:^ 4122:. 4091:. 4064:. 3968:. 3956:^ 3882:. 3853:. 3848:; 3835:. 3752:. 3727:47 3725:. 3713:^ 3695:. 3691:. 3665:. 3638:. 3594:. 3586:. 3576:48 3574:. 3570:. 3551:. 3532:. 3506:. 3492:^ 3475:. 3448:. 3434:^ 3412:. 3387:. 3364:. 3333:. 3321:^ 3303:. 3292:^ 3282:. 3256:. 3225:. 3195:. 3184:^ 3167:. 3155:^ 3133:. 3121:^ 3104:. 3078:. 3052:. 3025:. 2999:. 2969:. 2965:. 2936:. 2907:. 2888:. 2863:. 2855:. 2841:. 2837:. 2815:. 2790:. 2763:. 2736:. 2725:^ 2708:. 2697:^ 2675:. 2664:^ 2647:. 2630:28 2628:. 2624:. 2594:. 2590:. 2558:. 2554:. 2536:. 2499:. 2074:, 1911:. 1903:, 1899:, 1858:, 1771:do 1765:. 1589:A 1550:. 1542:, 1256:, 1252:, 1228:. 1148:A 935:, 916:, 861:. 775:: 760:, 756:, 717:, 713:, 689:. 677:A 661:. 591:, 557:. 518:. 387:, 256:, 128:. 8236:e 8229:t 8222:v 8070:) 7754:e 7747:t 7740:v 7341:e 7334:t 7327:v 6780:. 6742:. 6713:. 6687:. 6661:. 6635:. 6609:. 6574:. 6548:) 6530:. 6504:. 6426:. 6363:: 6357:3 6317:. 6278:. 6248:. 6218:. 6187:. 6142:. 6100:. 6069:. 6033:. 5986:. 5960:. 5929:. 5855:. 5835:: 5812:. 5786:. 5755:. 5729:. 5699:. 5666:. 5640:. 5579:. 5564:. 5538:. 5506:. 5476:. 5450:. 5422:. 5397:. 5370:. 5345:. 5319:. 5254:. 5228:. 5197:. 5171:. 5143:. 5137:: 5085:. 5054:. 5018:. 4982:. 4956:. 4930:. 4901:. 4851:. 4823:. 4801:. 4772:. 4746:. 4715:. 4689:. 4658:. 4632:. 4603:. 4572:. 4546:. 4507:. 4476:. 4449:. 4419:. 4394:. 4363:. 4332:. 4301:. 4275:) 4261:. 4231:. 4186:. 4180:: 4150:. 4133:. 4107:. 4077:. 4050:. 4028:. 4006:. 3984:. 3950:. 3923:. 3897:. 3865:. 3821:. 3795:. 3763:. 3737:. 3733:: 3707:. 3676:. 3650:. 3624:. 3602:. 3582:: 3555:. 3536:. 3517:. 3486:. 3461:. 3428:. 3398:. 3372:. 3349:. 3315:. 3267:. 3241:. 3211:. 3178:. 3149:. 3115:. 3089:. 3063:. 3037:. 3010:. 2984:. 2947:. 2921:. 2859:: 2843:4 2801:. 2775:. 2748:. 2719:. 2691:. 2658:. 2609:. 2573:. 2465:. 2440:. 2315:- 2278:. 2111:. 2085:, 1586:. 1470:. 969:( 80:) 76:( 65:. 41:. 34:. 20:)

Index

Police surveillance
Health surveillance
Computer and network surveillance
slanted towards recent events
add more content


managing
closed-circuit television
Internet traffic
human intelligence gathering
postal interception
governments
gather intelligence
Religious
heresy
heterodoxy
Auditors
privacy
civil liberties
Democracies
authoritarian
Espionage
espionage

Information Awareness Office
mass surveillance
Computer surveillance
data
traffic

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

↑