Surveillance Methods
   HOME

TheInfoList



OR:

Surveillance tools are all means technological provided and used by the surveillance industry,
police The police are a constituted body of persons empowered by a state, with the aim to enforce the law, to ensure the safety, health and possessions of citizens, and to prevent crime and civil disorder. Their lawful powers include arrest and t ...
or
military intelligence Military intelligence is a military discipline that uses information collection and analysis approaches to provide guidance and direction to assist commanders in their decisions. This aim is achieved by providing an assessment of data from a ...
, and
national security National security, or national defence, is the security and defence of a sovereign state, including its citizens, economy, and institutions, which is regarded as a duty of government. Originally conceived as protection against military atta ...
institutions that enable individual
surveillance Surveillance is the monitoring of behavior, many activities, or information for the purpose of information gathering, influencing, managing or directing. This can include observation from a distance by means of electronic equipment, such as c ...
and
mass surveillance Mass surveillance is the intricate surveillance of an entire or a substantial fraction of a population in order to monitor that group of citizens. The surveillance is often carried out by local and federal governments or governmental organizati ...
. Steven Ashley in 2008 listed the following components used for surveillance: *Primarily electronic **Digital still and video cameras (
CCTV Closed-circuit television (CCTV), also known as video surveillance, is the use of video cameras to transmit a signal to a specific place, on a limited set of monitors. It differs from broadcast television in that the signal is not openly t ...
s) **
GPS The Global Positioning System (GPS), originally Navstar GPS, is a Radionavigation-satellite service, satellite-based radionavigation system owned by the United States government and operated by the United States Space Force. It is one of t ...
s for
tracking Tracking may refer to: Science and technology Computing * Tracking, in computer graphics, in match moving (insertion of graphics into footage) * Tracking, composing music with music tracker software * Eye tracking, measuring the position of t ...
** Electronic toll takers **
Computer surveillance Computer and network surveillance is the monitoring of computer activity and data stored locally on a computer or data being transferred over computer networks such as the Internet. This monitoring is often carried out covertly and may be comple ...
** Phone tapping **
Cell phone monitoring Mobile phone tracking is a process for identifying the location of a mobile phone, whether stationary or moving. Localization may be effected by a number of technologies, such as the multilateration of radio signals between (several) cell towers ...
**
Voice The human voice consists of sound made by a human being using the vocal tract, including talking, singing, laughing, crying, screaming, shouting, humming or yelling. The human voice frequency is specifically a part of human sound production in ...
, facial features, walking gait and other biometric characteristics **
Covert listening device A covert listening device, more commonly known as a bug or a wire, is usually a combination of a miniature radio transmitter with a microphone. The use of bugs, called bugging, or wiretapping is a common technique in surveillance, espionage and ...
s or "bugs", tiny, hidden microphone and short-range radio transmitter **
directional microphone A microphone, colloquially called a mic or mike (), is a transducer that converts sound into an electrical signal. Microphones are used in many applications such as telephones, hearing aids, public address systems for concert halls and public ...
s *primarily chemical ** Artificial noses **Chemical markers like
UV marker An ultraviolet (UV) marker is a pen whose marks are fluorescent but transparent: the marks can be seen only under an ultraviolet light. They are commonly used in security situations to identify belongings or to prevent the reproduction of unautho ...
s **DNA sensors:
Biochip In molecular biology, biochips are engineered substrates ("miniaturized laboratories") that can host large numbers of simultaneous biochemical reactions. One of the goals of biochip technology is to efficiently screen large numbers of biological a ...
etc., for screening tiniest traces of body material *Other **Airplanes,
unmanned aerial vehicles An unmanned aerial vehicle (UAV), commonly known as a drone, is an aircraft without any human pilot, crew, or passengers on board. UAVs are a component of an unmanned aircraft system (UAS), which includes adding a ground-based controller ...
and satellites **
Night-vision goggles A night-vision device (NVD), also known as a night optical/observation device (NOD), night-vision goggle (NVG), is an optoelectronic device that allows visualization of images in low levels of light, improving the user's night vision. The dev ...
or
telescope A telescope is a device used to observe distant objects by their emission, absorption, or reflection of electromagnetic radiation. Originally meaning only an optical instrument using lenses, curved mirrors, or a combination of both to observe ...
s **Laser beam bounced off a window to record vibrations in the pane from conversations in the room **Discarded items containing personal information, like ***phone bills, ***credit-card statements and ***computer hard drives (using digital forensics) The electronic means, especially when combined with Internet features (
ubiquitous computing Ubiquitous computing (or "ubicomp") is a concept in software engineering, hardware engineering and computer science where computing is made to appear anytime and everywhere. In contrast to desktop computing, ubiquitous computing can occur using a ...
,
IoT The Internet of things (IoT) describes physical objects (or groups of such objects) with sensors, processing ability, software and other technologies that connect and exchange data with other devices and systems over the Internet or other com ...
) and enhanced by
artificial intelligence Artificial intelligence (AI) is intelligence—perceiving, synthesizing, and inferring information—demonstrated by machines, as opposed to intelligence displayed by animals and humans. Example tasks in which this is done include speech re ...
analysis methods readily lend themselves to mass surveillance. This is why countersurveillance measures like
anonymization Data anonymization is a type of information sanitization whose intent is privacy protection. It is the process of removing personally identifiable information from data sets, so that the people whom the data describe remain anonymous. Overv ...
and end-to-end encryption have become critical. Devices like chemical markers, on the other hand are more suited and in fact designed mainly for monitoring individuals.


See also

* Global surveillance disclosures (2013–present) * List of government mass surveillance projects *
National Applications Office The National Applications Office (NAO) was a United States Department of Homeland Security program that provided local, state, and federal officials extensive access to spy-satellite imagery. It had access to military satellites to observe the Uni ...
* Surveillance Detection Unit


References


External links


pdf
* {{cite web , title=Digital Surveillance: Tools of the Spy Trade , website=Scientific American , doi=10.1038/scientificamerican0908-70 , url=https://www.scientificamerican.com/article/digital-surveillance-tools-of-the-spy-trade/ , ref={{sfnref , Scientific American , access-date=August 11, 2020 Mass surveillance Mass surveillance industry