Surveillance Tools
   HOME

TheInfoList



OR:

Surveillance tools are all means technological provided and used by the
surveillance industry The mass surveillance industry is a multibillion-dollar industry that has undergone phenomenal growth since 2001. According to data provided by ''The Wall Street Journal'', the retail market for surveillance tools has grown from "nearly zero" in 2 ...
,
police The police are a constituted body of persons empowered by a state, with the aim to enforce the law, to ensure the safety, health and possessions of citizens, and to prevent crime and civil disorder. Their lawful powers include arrest and t ...
or
military intelligence Military intelligence is a military discipline that uses information collection and analysis approaches to provide guidance and direction to assist commanders in their decisions. This aim is achieved by providing an assessment of data from a ...
, and
national security National security, or national defence, is the security and defence of a sovereign state, including its citizens, economy, and institutions, which is regarded as a duty of government. Originally conceived as protection against military atta ...
institutions that enable individual
surveillance Surveillance is the monitoring of behavior, many activities, or information for the purpose of information gathering, influencing, managing or directing. This can include observation from a distance by means of electronic equipment, such as c ...
and
mass surveillance Mass surveillance is the intricate surveillance of an entire or a substantial fraction of a population in order to monitor that group of citizens. The surveillance is often carried out by local and federal governments or governmental organizati ...
. Steven Ashley in 2008 listed the following components used for surveillance: *Primarily electronic **Digital still and video cameras (
CCTV Closed-circuit television (CCTV), also known as video surveillance, is the use of video cameras to transmit a signal to a specific place, on a limited set of monitors. It differs from broadcast television in that the signal is not openly t ...
s) **
GPS The Global Positioning System (GPS), originally Navstar GPS, is a Radionavigation-satellite service, satellite-based radionavigation system owned by the United States government and operated by the United States Space Force. It is one of t ...
s for
tracking Tracking may refer to: Science and technology Computing * Tracking, in computer graphics, in match moving (insertion of graphics into footage) * Tracking, composing music with music tracker software * Eye tracking, measuring the position of t ...
** Electronic toll takers **
Computer surveillance Computer and network surveillance is the monitoring of computer activity and data stored locally on a computer or data being transferred over computer networks such as the Internet. This monitoring is often carried out covertly and may be comple ...
**
Phone tapping Telephone tapping (also wire tapping or wiretapping in American English) is the monitoring of telephone and Internet-based conversations by a third party, often by covert means. The wire tap received its name because, historically, the monitorin ...
** Cell phone monitoring **
Voice The human voice consists of sound made by a human being using the vocal tract, including talking, singing, laughing, crying, screaming, shouting, humming or yelling. The human voice frequency is specifically a part of human sound production in ...
, facial features, walking gait and other
biometric Biometrics are body measurements and calculations related to human characteristics. Biometric authentication (or realistic authentication) is used in computer science as a form of identification and access control. It is also used to identify in ...
characteristics **
Covert listening device A covert listening device, more commonly known as a bug or a wire, is usually a combination of a miniature radio transmitter with a microphone. The use of bugs, called bugging, or wiretapping is a common technique in surveillance, espionage and ...
s or "bugs", tiny, hidden microphone and short-range radio transmitter **
directional microphone A microphone, colloquially called a mic or mike (), is a transducer that converts sound into an electrical signal. Microphones are used in many applications such as telephones, hearing aids, public address systems for concert halls and public ...
s *primarily chemical **
Artificial nose An electronic nose is an electronic sensing device intended to detect odors or flavors. The expression "electronic sensing" refers to the capability of reproducing human senses using sensor arrays and pattern recognition systems. Since 1982, res ...
s **Chemical markers like
UV marker An ultraviolet (UV) marker is a pen whose marks are fluorescent but transparent: the marks can be seen only under an ultraviolet light. They are commonly used in security situations to identify belongings or to prevent the reproduction of unautho ...
s **DNA sensors: Biochip etc., for screening tiniest traces of body material *Other **Airplanes,
unmanned aerial vehicles An unmanned aerial vehicle (UAV), commonly known as a drone, is an aircraft without any human pilot, crew, or passengers on board. UAVs are a component of an unmanned aircraft system (UAS), which includes adding a ground-based controller ...
and satellites **
Night-vision goggles A night-vision device (NVD), also known as a night optical/observation device (NOD), night-vision goggle (NVG), is an optoelectronic device that allows visualization of images in low levels of light, improving the user's night vision. The dev ...
or
telescope A telescope is a device used to observe distant objects by their emission, absorption, or reflection of electromagnetic radiation. Originally meaning only an optical instrument using lenses, curved mirrors, or a combination of both to observe ...
s **Laser beam bounced off a window to record vibrations in the pane from conversations in the room **Discarded items containing
personal information Personal data, also known as personal information or personally identifiable information (PII), is any information related to an identifiable person. The abbreviation PII is widely accepted in the United States, but the phrase it abbreviates ha ...
, like ***phone bills, ***credit-card statements and ***computer hard drives (using
digital forensics Digital forensics (sometimes known as digital forensic science) is a branch of forensic science encompassing the recovery, investigation, examination and analysis of material found in digital devices, often in relation to mobile devices and co ...
) The electronic means, especially when combined with Internet features (
ubiquitous computing Ubiquitous computing (or "ubicomp") is a concept in software engineering, hardware engineering and computer science where computing is made to appear anytime and everywhere. In contrast to desktop computing, ubiquitous computing can occur using a ...
, IoT) and enhanced by
artificial intelligence Artificial intelligence (AI) is intelligence—perceiving, synthesizing, and inferring information—demonstrated by machines, as opposed to intelligence displayed by animals and humans. Example tasks in which this is done include speech re ...
analysis methods readily lend themselves to mass surveillance. This is why
countersurveillance Countersurveillance refers to measures that are usually undertaken by the public to prevent surveillance, including covert surveillance. Countersurveillance may include electronic methods such as technical surveillance counter-measures, which is ...
measures like
anonymization Data anonymization is a type of information sanitization whose intent is privacy protection. It is the process of removing personally identifiable information from data sets, so that the people whom the data describe remain anonymous. Overv ...
and
end-to-end encryption End-to-end encryption (E2EE) is a system of communication where only the communicating users can read the messages. In principle, it prevents potential eavesdroppers – including telecom providers, Internet providers, malicious actors, and even ...
have become critical. Devices like chemical markers, on the other hand are more suited and in fact designed mainly for monitoring individuals.


See also

*
Global surveillance disclosures (2013–present) Ongoing news reports in the international media have revealed operational details about the Anglophone cryptographic agencies' global surveillance of both foreign and domestic nationals. The reports mostly emanate from a cache of top secret ...
* List of government mass surveillance projects * National Applications Office * Surveillance Detection Unit


References


External links


pdf
* {{cite web , title=Digital Surveillance: Tools of the Spy Trade , website=Scientific American , doi=10.1038/scientificamerican0908-70 , url=https://www.scientificamerican.com/article/digital-surveillance-tools-of-the-spy-trade/ , ref={{sfnref , Scientific American , access-date=August 11, 2020 Mass surveillance Mass surveillance industry