History
In the middle of the 1970s, the AmericanHyper-surveillance technology
Facial recognition systems
Constructed through computer programs, facial recognition systems analyze images and biometrics of human faces for the purpose of identification. Compared to other facial systems, recognition software has been used for surveillance and security. Alongside public video cameras, they can be used in a passive structure. Therefore, facial recognition software can be used without the knowledge or consent of a person. Practically, this technology can be used in state centers, offices, and workplaces. State departments possess photographs of constituents and utilize this information as a resource alongside public surveillance tools to create a system of identification and tracking.Mobile tracking systems
Use of Hyper-surveillance
A consumer technology that has created hyper surveillance technology isReferences
{{reflist, refs= {{Cite web, last=Ohm, first=Paul, date=November 1, 2018, title=The Many Revolutions of Carpenter, url=https://osf.io/preprints/lawarxiv/bsedj/, url-status=live, archive-url=, archive-date=, access-date=2020-12-09, website=osf.io {{Citation, last=Capers, first=I. Bennett, title=Citizenship Talk, date=2019, url=https://www.cambridge.org/core/books/cambridge-handbook-of-policing-in-the-united-states/citizenship-talk/FEB9CAC4EC34467A2274AFC371AF42CA, work=The Cambridge Handbook of Policing in the United States, pages=473–490, editor-last=Miller, editor-first=Eric J., series=Cambridge Law Handbooks, place=Cambridge, publisher=Cambridge University Press, isbn=978-1-108-42055-6, access-date=2020-12-09, editor2-last=Lave, editor2-first=Tamara Rice {{Cite journal, last1=Campos-Manzo, first1=Ana Lilia, last2=Flores, first2=Marisol, last3=Pérez, first3=Denise, last4=Halpert, first4=Zoe, last5=Zevallos, first5=Kevin, date=2020-07-01, title=Unjustified: Youth of Color Navigating Police Presence Across Sociospatial Environments, url=https://doi.org/10.1177/2153368717741346, journal=Race and Justice, language=en, volume=10, issue=3, pages=297–319, doi=10.1177/2153368717741346, s2cid=158363063 , issn=2153-3687 {{Citation, last=Glover, first=Karen S., title=Citizenship, hyper-surveillance, and double-consciousness: Racial profiling as panoptic governance, date=2008-01-01, url=https://doi.org/10.1016/S1521-6136(07)00211-4, work=Surveillance and Governance: Crime Control and Beyond, volume=10, pages=241–256, editor-last=Deflem, editor-first=Mathieu, series=Sociology of Crime, Law and Deviance, publisher=Emerald Group Publishing Limited, doi=10.1016/S1521-6136(07)00211-4, isbn=978-0-7623-1416-4, access-date=2020-12-09, editor2-last=T. Ulmer, editor2-first=Jeffrey {{Cite journal, last=Gidaris, first=Constantine, date=2020-03-01, title=The Carceral Airport, url=https://www.ingentaconnect.com/content/intellect/public/2020/00000030/00000060/art00007;jsessionid=831l24nqsppu.x-ic-live-01, journal=Public, volume=30, issue=60, pages=76–91, doi=10.1386/public_00007_7, s2cid=216160207 {{Cite web, title=UCLA professor explains hyper-surveillance of black males, url=https://www.statepress.com/article/2015/04/ucla-professor-explains-hyper-surveillance-of-black-males, access-date=2020-12-09, website=The Arizona State Press {{Cite web, last=Reed, first=Andrew, date=2019-10-24, title=Reed '21: Preventing a new era of hyper-surveillance, url=https://www.browndailyherald.com/2019/10/24/preventing-new-era-hyper-surveillance/, access-date=2020-12-09, website=Brown Daily Herald, language=en-US {{Cite journal, last=Jeffries, first=Fiona, date=2011-04-01, title=Saying Something: The Location of Social Movements in the Surveillance Society, url=https://doi.org/10.1080/14742837.2011.562362, journal=Social Movement Studies, volume=10, issue=2, pages=175–190, doi=10.1080/14742837.2011.562362, s2cid=145635074 , issn=1474-2837 {{Cite web, last=Odella, first=Francesca, date=, title=Privacy Awareness and the Networking Generation, url=https://www.igi-global.com/gateway/chapter/213856, url-status=live, archive-url=, archive-date=, access-date=2020-12-09, website=, language=English {{Cite web, last=Pina, first=Pedro, date=, title=Electronic Surveillance, Privacy and Enforcement of Intellectual Property Rights : A Digital Panopticon?, url=https://www.igi-global.com/gateway/chapter/60988, url-status=live, archive-url=, archive-date=, access-date=2020-12-09, website=, language=English {{Cite web, date=2020-04-23, title=Facial Recognition » Avigilon, url=https://www.avigilon.com/products/ai-video-analytics/facial-recognition, access-date=2020-12-09, website=www.avigilon.com, language=en {{Cite web, title=SSRN Electronic Library, url=https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3273483, access-date=2020-12-09, website=papers.ssrn.com, ssrn=3273483 {{Cite book, last=Wilcox, first=Walter M., title=Quantum Principles & Particles , date=2019-08-23, chapter=Quantum Particle Scattering, chapter-url=https://www.taylorfrancis.com/, access-date=2020-12-09, website=Quantum Principles and Particles, Second Edition, pages=429–487 , language=en, doi=10.1201/b22285-11, isbn=9781138090439 , s2cid=203041991 {{Cite journal, last1=Zhang, first1=Y., last2=Li, first2=M., last3=Dong, first3=Z. Y., last4=Meng, first4=K., date=June 2019, title=Probabilistic anomaly detection approach for data-driven wind turbine condition monitoring, journal=CSEE Journal of Power and Energy Systems, volume=5, issue=2, pages=149–158, doi=10.17775/CSEEJPES.2019.00010, issn=2096-0042, doi-access=free {{Cite journal, last=Giroux, first=Henry A., date=2015-03-04, title=Totalitarian Paranoia in the Post-Orwellian Surveillance State, url=https://doi.org/10.1080/09502386.2014.917118, journal=Cultural Studies, volume=29, issue=2, pages=108–140, doi=10.1080/09502386.2014.917118, s2cid=143580193 , issn=0950-2386 {{Cite journal, last1=Timan, first1=Tjerk, last2=Albrechtslund, first2=Anders, date=2018-06-01, title=Surveillance, Self and Smartphones: Tracking Practices in the Nightlife, url= , journal=Science and Engineering Ethics, language=en, volume=24, issue=3, pages=853–870, doi=10.1007/s11948-015-9691-8, issn=1471-5546, pmc=5972155, pmid=26319296 {{Cite journal, last=Wittenberg, first=David, date=1970-01-01, title=Seeing around the next corner, url=http://www.liverpooluniversitypress.co.uk/journals/article/21002, access-date=2020-12-09, journal=Science Fiction Film & Television, volume=12 , issue=2 , pages=195–223 , language=en, doi=10.3828/sfftv.2019.12, s2cid=198622264 {{Cite journal, last=Peters, first=Najarian, date=2020-01-01, title=The Right to Be and Become: Black Home-Educators as Child Privacy Protectors, url=https://repository.law.umich.edu/mjrl/vol25/iss1/3, journal=Michigan Journal of Race and Law, volume=25, issue=1, pages=21–60, doi=10.36643/mjrl.25.1.issn=1095-2721, doi-access=free Surveillance Crime prevention Facial recognition software Law enforcement Law enforcement techniques Mass surveillance National security Privacy Security