Staking Out
   HOME

TheInfoList



OR:

Surveillance is the monitoring of behavior, many activities, or information for the purpose of information gathering, influencing,
managing Management (or managing) is the administration of organizations, whether businesses, nonprofit organizations, or a government bodies through business administration, nonprofit management, or the political science sub-field of public administra ...
, or directing. This can include observation from a distance by means of electronic equipment, such as
closed-circuit television Closed-circuit television (CCTV), also known as video surveillance, is the use of closed-circuit television cameras to transmit a signal to a specific place on a limited set of monitors. It differs from broadcast television in that the signa ...
(CCTV), or interception of electronically transmitted information like
Internet traffic Internet traffic is the flow of data within the entire Internet, or in certain network links of its constituent networks. Common traffic measurements are total volume, in units of multiples of the byte, or as transmission rates in bytes per cert ...
. Increasingly,
governments A government is the system or group of people governing an organized community, generally a state. In the case of its broad associative definition, government normally consists of legislature, executive, and judiciary. Government is a m ...
may also obtain consumer data through the purchase of online information, effectively expanding surveillance capabilities through commercially available digital records. It can also include simple technical methods, such as human intelligence gathering and
postal interception Postal interception is the act of retrieving another person's mail for the purpose of either ensuring that the mail is not delivered to the recipient, or to spy on them. For instance, the American Central Intelligence Agency (CIA) and Federal Bu ...
. Surveillance is used by citizens, for instance for protecting their neighborhoods. It is widely used by
government A government is the system or group of people governing an organized community, generally a State (polity), state. In the case of its broad associative definition, government normally consists of legislature, executive (government), execu ...
s for intelligence gathering, including espionage, prevention of crime, the protection of a process, person, group or object, or the investigation of crime. It is also used by criminal organizations to plan and commit crimes, and by businesses to gather intelligence on criminals, their competitors, suppliers or customers.
Religious Religion is a range of social- cultural systems, including designated behaviors and practices, morals, beliefs, worldviews, texts, sanctified places, prophecies, ethics, or organizations, that generally relate humanity to supernatural ...
organizations charged with detecting
heresy Heresy is any belief or theory that is strongly at variance with established beliefs or customs, particularly the accepted beliefs or religious law of a religious organization. A heretic is a proponent of heresy. Heresy in Heresy in Christian ...
and
heterodoxy In religion, heterodoxy (from Ancient Greek: , + , ) means "any opinions or doctrines at variance with an official or orthodox position". ''Heterodoxy'' is also an ecclesiastical jargon term, defined in various ways by different religions and ...
may also carry out surveillance.
Auditor An auditor is a person or a firm appointed by a company to execute an audit.Practical Auditing, Kul Narsingh Shrestha, 2012, Nabin Prakashan, Nepal To act as an auditor, a person should be certified by the regulatory authority of accounting an ...
s carry out a form of surveillance. Surveillance can unjustifiably violate people's
privacy Privacy (, ) is the ability of an individual or group to seclude themselves or information about themselves, and thereby express themselves selectively. The domain of privacy partially overlaps with security, which can include the concepts of a ...
and is often criticized by
civil liberties Civil liberties are guarantees and freedoms that governments commit not to abridge, either by constitution, legislation, or judicial interpretation, without due process. Though the scope of the term differs between countries, civil liberties of ...
activists.
Democracies Democracy (from , ''dēmos'' 'people' and ''kratos'' 'rule') is a form of government in which political power is vested in the people or the population of a state. Under a minimalist definition of democracy, rulers are elected through competitiv ...
may have laws that seek to restrict governmental and private use of surveillance, whereas
authoritarian Authoritarianism is a political system characterized by the rejection of political plurality, the use of strong central power to preserve the political ''status quo'', and reductions in democracy, separation of powers, civil liberties, and ...
governments seldom have any domestic restrictions.
Espionage Espionage, spying, or intelligence gathering, as a subfield of the intelligence field, is the act of obtaining secret or confidential information ( intelligence). A person who commits espionage on a mission-specific contract is called an ...
is by definition covert and typically illegal according to the rules of the observed party, whereas most types of surveillance are overt and are considered legal or legitimate by state authorities. International
espionage Espionage, spying, or intelligence gathering, as a subfield of the intelligence field, is the act of obtaining secret or confidential information ( intelligence). A person who commits espionage on a mission-specific contract is called an ...
seems to be common among all types of countries.


Methods


Computer

The vast majority of computer surveillance involves the monitoring of
data Data ( , ) are a collection of discrete or continuous values that convey information, describing the quantity, quality, fact, statistics, other basic units of meaning, or simply sequences of symbols that may be further interpreted for ...
and
traffic Traffic is the movement of vehicles and pedestrians along land routes. Traffic laws govern and regulate traffic, while rules of the road include traffic laws and informal rules that may have developed over time to facilitate the orderly an ...
on the
Internet The Internet (or internet) is the Global network, global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a internetworking, network of networks ...
. In the United States for example, under the Communications Assistance For Law Enforcement Act, all phone calls and broadband Internet traffic (emails, web traffic, instant messaging, etc.) are required to be available for unimpeded real-time monitoring by federal law enforcement agencies. There is far too much data on the Internet for human investigators to manually search through all of it. Therefore, automated Internet surveillance computers sift through the vast amount of intercepted Internet traffic to identify and report to human investigators the traffic that is considered interesting or suspicious. This process is regulated by targeting certain "trigger" words or phrases, visiting certain types of web sites, or communicating via
email Electronic mail (usually shortened to email; alternatively hyphenated e-mail) is a method of transmitting and receiving Digital media, digital messages using electronics, electronic devices over a computer network. It was conceived in the ...
or online chat with suspicious individuals or groups. Billions of dollars per year are spent by agencies, such as the
NSA The National Security Agency (NSA) is an intelligence agency of the United States Department of Defense, under the authority of the director of national intelligence (DNI). The NSA is responsible for global monitoring, collection, and proces ...
, the
FBI The Federal Bureau of Investigation (FBI) is the domestic Intelligence agency, intelligence and Security agency, security service of the United States and Federal law enforcement in the United States, its principal federal law enforcement ag ...
and the now-defunct
Information Awareness Office The Information Awareness Office (IAO) was established by the United States Defense Advanced Research Projects Agency (DARPA) in January 2002 to bring together several DARPA projects focused on applying surveillance and information technology ...
, to develop, purchase, implement, and operate systems such as
Carnivore A carnivore , or meat-eater (Latin, ''caro'', genitive ''carnis'', meaning meat or "flesh" and ''vorare'' meaning "to devour"), is an animal or plant Plants are the eukaryotes that form the Kingdom (biology), kingdom Plantae; they ar ...
, NarusInsight, and
ECHELON Echelon may refer to: * A level formation ** A level or rank in an organization, profession, or society ** A military sub-subunit smaller than a company but larger than a platoon ** Echelon formation, a step-like arrangement of units * ECHELO ...
to intercept and analyze all of this data to extract only the information which is useful to law enforcement and intelligence agencies. Computers can be a surveillance target because of the personal data stored on them. If someone is able to install software, such as the FBI's
Magic Lantern The magic lantern, also known by its Latin name , is an early type of image projector that uses pictures—paintings, prints, or photographs—on transparent plates (usually made of glass), one or more lens (optics), lenses, and a light source. ...
and CIPAV, on a computer system, they can easily gain unauthorized access to this data. Such software could be installed physically or remotely. Another form of computer surveillance, known as
van Eck phreaking Van Eck phreaking, also known as Van Eck radiation, is a form of network eavesdropping in which special equipment is used for a side-channel attack on the electromagnetic emissions of electronic devices. While electromagnetic emissions are prese ...
, involves reading electromagnetic emanations from computing devices in order to extract data from them at distances of hundreds of meters. The NSA runs a database known as " Pinwale", which stores and indexes large numbers of emails of both American citizens and foreigners. Additionally, the NSA runs a program known as
PRISM PRISM is a code name for a program under which the United States National Security Agency (NSA) collects internet communications from various U.S. internet companies. The program is also known by the SIGAD . PRISM collects stored internet ...
, which is a data mining system that gives the United States government direct access to information from
technology companies A technology company (or tech company) is a company that focuses primarily on the manufacturing, support, research and development of—most commonly computing, telecommunication and consumer electronics–based—technology-intensive products and ...
. Through accessing this information, the government is able to obtain search history, emails, stored information, live chats, file transfers, and more. This program generated huge controversies in regards to surveillance and privacy, especially from U.S. citizens.


Telephones

The official and unofficial tapping of telephone lines is widespread. In the
United States The United States of America (USA), also known as the United States (U.S.) or America, is a country primarily located in North America. It is a federal republic of 50 U.S. state, states and a federal capital district, Washington, D.C. The 48 ...
for instance, the Communications Assistance for Law Enforcement Act (CALEA) requires that all telephone and VoIP communications be available for real-time wiretapping by Federal law enforcement and intelligence agencies. Two major
telecommunications companies A telecommunications company is a kind of electronic communications service provider, more precisely a telecommunications service provider (TSP), that provides telecommunications services such as telephony and data communications access. Many t ...
in the U.S.— AT&T Inc. and
Verizon Verizon Communications Inc. ( ), is an American telecommunications company headquartered in New York City. It is the world's second-largest telecommunications company by revenue and its mobile network is the largest wireless carrier in the ...
—have contracts with the FBI, requiring them to keep their phone call records easily searchable and accessible for Federal agencies, in return for $1.8 million per year. Between 2003 and 2005, the FBI sent out more than 140,000 " National Security Letters" ordering phone companies to hand over information about their customers' calling and Internet histories. About half of these letters requested information on U.S. citizens. Human agents are not required to monitor most calls.
Speech-to-text Speech recognition is an interdisciplinary subfield of computer science and computational linguistics that develops Methodology, methodologies and technologies that enable the recognition and translation of spoken language into text by computers. ...
software creates machine-readable text from intercepted audio, which is then processed by automated call-analysis programs, such as those developed by agencies such as the
Information Awareness Office The Information Awareness Office (IAO) was established by the United States Defense Advanced Research Projects Agency (DARPA) in January 2002 to bring together several DARPA projects focused on applying surveillance and information technology ...
, or companies such as
Verint Verint Systems Inc. is a Melville, New York–based technology company that sells products and services for customer experience (CX) automation. The company offers an open platform, applications, and bots that incorporate artificial intelligence ...
, and Narus, which search for certain words or phrases, to decide whether to dedicate a human agent to the call. Law enforcement and intelligence services in the United Kingdom and the United States possess technology to activate the microphones in cell phones remotely, by accessing phones' diagnostic or maintenance features in order to listen to conversations that take place near the person who holds the phone. The
StingRay Stingrays are a group of sea Batoidea, rays, a type of cartilaginous fish. They are classified in the suborder Myliobatoidei of the order Myliobatiformes and consist of eight families: Hexatrygonidae (sixgill stingray), Plesiobatidae (deepwate ...
tracker is an example of one of these tools used to monitor cell phone usage in the United States and the United Kingdom. Originally developed for counterterrorism purposes by the military, they work by broadcasting powerful signals that cause nearby cell phones to transmit their IMSI number, just as they would to normal cell phone towers. Once the phone is connected to the device, there is no way for the user to know that they are being tracked. The operator of the stingray is able to extract information such as location, phone calls, and text messages, but it is widely believed that the capabilities of the StingRay extend much further. A lot of controversy surrounds the StingRay because of its powerful capabilities and the secrecy that surrounds it. Mobile phones are also commonly used to collect location data. The geographical location of a mobile phone (and thus the person carrying it) can be determined easily even when the phone is not being used, using a technique known as
multilateration Trilateration is the use of distances (or "ranges") for determining the unknown position coordinates of a point of interest, often around Earth ( geopositioning). When more than three distances are involved, it may be called multilateration, f ...
to calculate the differences in time for a signal to travel from the cell phone to each of several
cell towers A cell site, cell phone tower, cell base tower, or cellular base station is a cellular-enabled mobile device site where antennas and electronic communications equipment are placed (typically on a radio mast, tower, or other raised structure) ...
near the owner of the phone. The legality of such techniques has been questioned in the United States, in particular whether a court warrant is required. Records for ''one'' carrier alone (Sprint), showed that in a given year federal law enforcement agencies requested customer location data 8 million times. In response to customers' privacy concerns in the post
Edward Snowden Edward Joseph Snowden (born June 21, 1983) is a former National Security Agency (NSA) intelligence contractor and whistleblower who leaked classified documents revealing the existence of global surveillance programs. Born in 1983 in Elizabeth ...
era, Apple's iPhone 6 has been designed to disrupt investigative
wiretapping Wiretapping, also known as wire tapping or telephone tapping, is the monitoring of telephone and Internet-based conversations by a third party, often by covert means. The wire tap received its name because, historically, the monitoring connecti ...
efforts. The phone encrypts e-mails, contacts, and photos with a code generated by a complex mathematical algorithm that is unique to an individual phone, and is inaccessible to Apple. The
encryption In Cryptography law, cryptography, encryption (more specifically, Code, encoding) is the process of transforming information in a way that, ideally, only authorized parties can decode. This process converts the original representation of the inf ...
feature on the iPhone 6 has drawn criticism from FBI director James B. Comey and other law enforcement officials since even lawful requests to access user content on the iPhone 6 will result in Apple supplying "gibberish" data that requires law enforcement personnel to either break the code themselves or to get the code from the phone's owner. Because the Snowden leaks demonstrated that American agencies can access phones anywhere in the world, privacy concerns in countries with growing markets for smart phones have intensified, providing a strong incentive for companies like
Apple An apple is a round, edible fruit produced by an apple tree (''Malus'' spp.). Fruit trees of the orchard or domestic apple (''Malus domestica''), the most widely grown in the genus, are agriculture, cultivated worldwide. The tree originated ...
to address those concerns in order to secure their position in the global market.
Apple An apple is a round, edible fruit produced by an apple tree (''Malus'' spp.). Fruit trees of the orchard or domestic apple (''Malus domestica''), the most widely grown in the genus, are agriculture, cultivated worldwide. The tree originated ...
has made several moves to emphasize their concern for privacy, in order to appeal to more consumers. In 2011, Apple stopped the use of permanent device identifiers, and in 2019, they banned the ability of third parties to track on children's apps. Although the CALEA requires telecommunications companies to build into their systems the ability to carry out a lawful wiretap, the law has not been updated to address the issue of smart phones and requests for access to
e-mails Electronic mail (usually shortened to email; alternatively hyphenated e-mail) is a method of transmitting and receiving digital messages using electronic devices over a computer network. It was conceived in the late–20th century as the ...
and
metadata Metadata (or metainformation) is "data that provides information about other data", but not the content of the data itself, such as the text of a message or the image itself. There are many distinct types of metadata, including: * Descriptive ...
. The Snowden leaks show that the
NSA The National Security Agency (NSA) is an intelligence agency of the United States Department of Defense, under the authority of the director of national intelligence (DNI). The NSA is responsible for global monitoring, collection, and proces ...
has been taking advantage of this ambiguity in the law by collecting metadata on "at least hundreds of millions" of "incidental" targets from around the world. The NSA uses an analytic tool known as CO-TRAVELER in order to track people whose movements intersect and to find any hidden connections with persons of interest. The Snowden leaks have also revealed that the British
Government Communications Headquarters Government Communications Headquarters (GCHQ) is an intelligence and security organisation responsible for providing signals intelligence (SIGINT) and information assurance (IA) to the government and armed forces of the United Kingdom. Primari ...
(GCHQ) can access information collected by the NSA on American citizens. Once the data has been collected, the GCHQ can hold on to it for up to two years. The deadline can be extended with the permission of a "senior UK official".


Cameras

Surveillance cameras, or security cameras, are video cameras used for the purpose of observing an area. They are often connected to a recording device or
IP network The Internet protocol suite, commonly known as TCP/IP, is a framework for organizing the communication protocols used in the Internet and similar computer networks according to functional criteria. The foundational protocols in the suite are ...
, and may be watched by a
security guard A security guard (also known as a security inspector, security officer, factory guard, or protective agent) is a person employed by a government or private party to protect the employing party's assets (property, people, equipment, money, etc.) ...
or
law enforcement officer A law enforcement officer (LEO), or police officer or peace officer in North American English, is a public-sector or private-sector employee whose duties primarily involve the enforcement of laws, protecting life & property, keeping the peace, ...
. Cameras and recording equipment used to be relatively expensive and required human personnel to monitor camera footage, but analysis of footage has been made easier by automated software that organizes digital video footage into a searchable
database In computing, a database is an organized collection of data or a type of data store based on the use of a database management system (DBMS), the software that interacts with end users, applications, and the database itself to capture and a ...
, and by video analysis software (such as VIRAT and HumanID). The amount of footage is also drastically reduced by motion sensors which record only when motion is detected. With cheaper production techniques, surveillance cameras are simple and inexpensive enough to be used in home security systems, and for everyday surveillance. Video cameras are one of the most common methods of surveillance. As of 2016, there are about 350 million surveillance cameras worldwide. About 65% of these cameras are installed in Asia. The growth of CCTV has been slowing in recent years. In 2018, China was reported to have a huge surveillance network of over 170 million CCTV cameras with 400 million new cameras expected to be installed in the next three years, many of which use facial recognition technology. In the
United States The United States of America (USA), also known as the United States (U.S.) or America, is a country primarily located in North America. It is a federal republic of 50 U.S. state, states and a federal capital district, Washington, D.C. The 48 ...
, the
Department of Homeland Security The United States Department of Homeland Security (DHS) is the U.S. federal executive department responsible for public security, roughly comparable to the interior, home, or public security ministries in other countries. Its missions invol ...
awards billions of dollars per year in Homeland Security grants for local, state, and federal agencies to install modern video surveillance equipment. For example, the city of
Chicago Chicago is the List of municipalities in Illinois, most populous city in the U.S. state of Illinois and in the Midwestern United States. With a population of 2,746,388, as of the 2020 United States census, 2020 census, it is the List of Unite ...
, Illinois, recently used a $5.1 million Homeland Security grant to install an additional 250 surveillance cameras, and connect them to a centralized monitoring center, along with its preexisting network of over 2000 cameras, in a program known as
Operation Virtual Shield Operation Virtual Shield is a program implemented by Chicago, IL mayor Richard M. Daley, which created the most extensive video surveillance network in the United States by linking more than 3000 surveillance cameras to a centralized monitoring s ...
. Speaking in 2009, Chicago Mayor Richard Daley announced that Chicago would have a surveillance camera on every street corner by 2016.
New York City New York, often called New York City (NYC), is the most populous city in the United States, located at the southern tip of New York State on one of the world's largest natural harbors. The city comprises five boroughs, each coextensive w ...
received a $350 million grant towards the development of the Domain Awareness System, which is an interconnected system of sensors including 18,000 CCTV cameras used for continual surveillance of the city by both police officers and artificial intelligence systems. In the
United Kingdom The United Kingdom of Great Britain and Northern Ireland, commonly known as the United Kingdom (UK) or Britain, is a country in Northwestern Europe, off the coast of European mainland, the continental mainland. It comprises England, Scotlan ...
, the vast majority of video surveillance cameras are not operated by government bodies, but by private individuals or companies, especially to monitor the interiors of shops and businesses. According to 2011
Freedom of Information Act Freedom of Information Act may refer to the following legislations in different jurisdictions which mandate the national government to disclose certain data to the general public upon request: * Freedom of Information Act (United States) of 1966 * F ...
requests, the total number of local government operated CCTV cameras was around 52,000 over the entirety of the UK. The prevalence of video surveillance in the UK is often overstated due to unreliable estimates being requoted;; for example one report in 2002 extrapolated from a very small sample to estimate the number of cameras in the UK at 4.2 million (of which 500,000 were in
Greater London Greater London is an administrative area in England, coterminous with the London region, containing most of the continuous urban area of London. It contains 33 local government districts: the 32 London boroughs, which form a Ceremonial count ...
). More reliable estimates put the number of private and local government operated cameras in the United Kingdom at around 1.85 million in 2011. In the Netherlands, one example city where there are cameras is The Hague. There, cameras are placed in city districts in which the most illegal activity is concentrated. Examples are the
red-light district A red-light district or pleasure district is a part of an urban area where a concentration of prostitution and sex industry, sex-oriented businesses, such as sex shops, strip clubs, and adult theaters, are found. In most cases, red-light district ...
s and the train stations. As part of China's
Golden Shield Project The Golden Shield Project (), also named National Public Security Work Informational Project, is the Chinese nationwide network-security fundamental constructional project by the e-government of the People's Republic of China. This project i ...
, several U.S. corporations, including
IBM International Business Machines Corporation (using the trademark IBM), nicknamed Big Blue, is an American Multinational corporation, multinational technology company headquartered in Armonk, New York, and present in over 175 countries. It is ...
,
General Electric General Electric Company (GE) was an American Multinational corporation, multinational Conglomerate (company), conglomerate founded in 1892, incorporated in the New York (state), state of New York and headquartered in Boston. Over the year ...
, and
Honeywell Honeywell International Inc. is an American publicly traded, multinational conglomerate corporation headquartered in Charlotte, North Carolina. It primarily operates in four areas of business: aerospace, building automation, industrial automa ...
, have been working closely with the
Chinese government The government of the People's Republic of China is based on a system of people's congress within the parameters of a Unitary state, unitary communist state, in which the ruling Chinese Communist Party (CCP) enacts its policies through people's ...
to install millions of surveillance cameras throughout
China China, officially the People's Republic of China (PRC), is a country in East Asia. With population of China, a population exceeding 1.4 billion, it is the list of countries by population (United Nations), second-most populous country after ...
, along with advanced
video analytics Video content analysis or video content analytics (VCA), also known as video analysis or video analytics (VA), is the capability of automatically analyzing video to detect and determine temporal and spatial events. This technical capability is used ...
and facial recognition software, which will identify and track individuals everywhere they go. They will be connected to a centralized database and monitoring station, which will, upon completion of the project, contain a picture of the face of every person in China: over 1.3 billion people. Lin Jiang Huai, the head of China's "Information Security Technology" office (which is in charge of the project), credits the surveillance systems in the United States and the U.K. as the inspiration for what he is doing with the Golden Shield Project. The
Defense Advanced Research Projects Agency The Defense Advanced Research Projects Agency (DARPA) is a research and development agency of the United States Department of Defense responsible for the development of emerging technologies for use by the military. Originally known as the Adva ...
(DARPA) is funding a research project called Combat Zones That See that will link up cameras across a city to a centralized monitoring station, identify and track individuals and vehicles as they move through the city, and report "suspicious" activity (such as waving arms, looking side-to-side, standing in a group, etc.). At
Super Bowl XXXV Super Bowl XXXV was an American football game between the American Football Conference (AFC) champion 2000 Baltimore Ravens season, Baltimore Ravens and the National Football Conference (NFC) champion 2000 New York Giants season, New York Giant ...
in January 2001, police in Tampa, Florida, used Identix's facial recognition software, FaceIt, to scan the crowd for potential criminals and terrorists in attendance at the event (it found 19 people with pending arrest warrants). Governments often initially claim that cameras are meant to be used for
traffic control Traffic management is a key branch within logistics. It concerns the planning, control and purchasing of transport services needed to physically move vehicles (for example aircraft, road vehicles, rolling stock and watercraft) and freight. Traff ...
, but many of them end up using them for general surveillance. For example, Washington, D.C. had 5,000 "traffic" cameras installed under this premise, and then after they were all in place, networked them all together and then granted access to the Metropolitan Police Department, so they could perform "day-to-day monitoring". The development of centralized networks of CCTV cameras watching public areas—linked to computer databases of people's pictures and identity (
biometric Biometrics are body measurements and calculations related to human characteristics and features. Biometric authentication (or realistic authentication) is used in computer science as a form of identification and access control. It is also used t ...
data), able to track people's movements throughout the city, and identify whom they have been with—has been argued by some to present a risk to
civil liberties Civil liberties are guarantees and freedoms that governments commit not to abridge, either by constitution, legislation, or judicial interpretation, without due process. Though the scope of the term differs between countries, civil liberties of ...
. Trapwire is an example of such a network.


Social network analysis

One common form of surveillance is to create maps of
social networks A social network is a social structure consisting of a set of social actors (such as individuals or organizations), networks of dyadic ties, and other social interactions between actors. The social network perspective provides a set of meth ...
based on data from
social networking sites A social networking service (SNS), or social networking site, is a type of online social media platform which people use to build social networks or social relationships with other people who share similar personal or career content, interests ...
such as
Facebook Facebook is a social media and social networking service owned by the American technology conglomerate Meta Platforms, Meta. Created in 2004 by Mark Zuckerberg with four other Harvard College students and roommates, Eduardo Saverin, Andre ...
,
MySpace Myspace (formerly stylized as MySpace, currently myspace; and sometimes my␣, with an elongated Whitespace character#Substitute images, open box symbol) is a social networking service based in the United States. Launched on August 1, 2003, it w ...
,
Twitter Twitter, officially known as X since 2023, is an American microblogging and social networking service. It is one of the world's largest social media platforms and one of the most-visited websites. Users can share short text messages, image ...
as well as from
traffic analysis Traffic analysis is the process of intercepting and examining messages in order to deduce information from patterns in communication. It can be performed even when the messages are encrypted. In general, the greater the number of messages observ ...
information from phone call records such as those in the NSA call database, and others. These
social network A social network is a social structure consisting of a set of social actors (such as individuals or organizations), networks of Dyad (sociology), dyadic ties, and other Social relation, social interactions between actors. The social network per ...
"maps" are then data mined to extract useful information such as personal interests, friendships & affiliations, wants, beliefs, thoughts, and activities. Many U.S. government agencies such as the
Defense Advanced Research Projects Agency The Defense Advanced Research Projects Agency (DARPA) is a research and development agency of the United States Department of Defense responsible for the development of emerging technologies for use by the military. Originally known as the Adva ...
(DARPA), the
National Security Agency The National Security Agency (NSA) is an intelligence agency of the United States Department of Defense, under the authority of the director of national intelligence (DNI). The NSA is responsible for global monitoring, collection, and proces ...
(NSA), and the
Department of Homeland Security The United States Department of Homeland Security (DHS) is the U.S. federal executive department responsible for public security, roughly comparable to the interior, home, or public security ministries in other countries. Its missions invol ...
(DHS) are investing heavily in research involving social network analysis. The intelligence community believes that the biggest threat to U.S. power comes from decentralized, leaderless, geographically dispersed groups of
terrorists Terrorism, in its broadest sense, is the use of violence against non-combatants to achieve political or ideological aims. The term is used in this regard primarily to refer to intentional violence during peacetime or in the context of war aga ...
, subversives, extremists, and
dissidents A dissident is a person who actively challenges an established political or religious system, doctrine, belief, policy, or institution. In a religious context, the word has been used since the 18th century, and in the political sense since the 2 ...
. These types of threats are most easily countered by finding important nodes in the network, and removing them. To do this requires a detailed map of the network. Jason Ethier of Northeastern University, in his study of modern social network analysis, said the following of the Scalable Social Network Analysis Program developed by the
Information Awareness Office The Information Awareness Office (IAO) was established by the United States Defense Advanced Research Projects Agency (DARPA) in January 2002 to bring together several DARPA projects focused on applying surveillance and information technology ...
: AT&T developed a programming language called "Hancock", which is able to sift through enormous databases of phone call and Internet traffic records, such as the NSA call database, and extract "communities of interest"—groups of people who call each other regularly, or groups that regularly visit certain sites on the Internet. AT&T originally built the system to develop "marketing leads", but the FBI has regularly requested such information from phone companies such as AT&T without a warrant, and, after using the data, stores all information received in its own databases, regardless of whether or not the information was ever useful in an investigation. Some people believe that the use of social networking sites is a form of "participatory surveillance", where users of these sites are essentially performing surveillance on themselves, putting detailed personal information on public websites where it can be viewed by corporations and governments. In 2008, about 20% of employers reported using social networking sites to collect personal data on prospective or current employees.


Biometric

Biometric surveillance is a technology that measures and analyzes human physical and/or behavioral characteristics for authentication, identification, or screening purposes. Examples of physical characteristics include fingerprints, DNA, and facial patterns. Examples of mostly behavioral characteristics include gait (a person's manner of walking) or voice.
Facial recognition Facial recognition or face recognition may refer to: *Face detection, often a step done before facial recognition *Face perception, the process by which the human brain understands and interprets the face *Pareidolia, which involves, in part, seein ...
is the use of the unique configuration of a person's facial features to accurately identify them, usually from surveillance video. Both the Department of Homeland Security and
DARPA The Defense Advanced Research Projects Agency (DARPA) is a research and development agency of the United States Department of Defense responsible for the development of emerging technologies for use by the military. Originally known as the Adva ...
are heavily funding research into facial recognition systems. The
Information Processing Technology Office The Information Processing Techniques Office (IPTO), originally "Command and Control Research",Lyon, Matthew; Hafner, Katie (1999-08-19). ''Where Wizards Stay Up Late: The Origins Of The Internet'' (p. 39). Simon & Schuster. Kindle Edition. was par ...
ran a program known as
Human Identification at a Distance The Information Awareness Office (IAO) was established by the United States Defense Advanced Research Projects Agency (DARPA) in January 2002 to bring together several DARPA projects focused on applying surveillance and information technology ...
which developed technologies that are capable of identifying a person at up to by their facial features. Another form of behavioral biometrics, based on
affective computing Affective computing is the study and development of systems and devices that can recognize, interpret, process, and simulate human affects. It is an interdisciplinary field spanning computer science, psychology, and cognitive science. While som ...
, involves computers recognizing a person's emotional state based on an analysis of their facial expressions, how fast they are talking, the tone and pitch of their voice, their posture, and other behavioral traits. This might be used for instance to see if a person's behavior is suspect (looking around furtively, "tense" or "angry" facial expressions, waving arms, etc.). A more recent development is
DNA profiling DNA profiling (also called DNA fingerprinting and genetic fingerprinting) is the process of determining an individual's deoxyribonucleic acid (DNA) characteristics. DNA analysis intended to identify a species, rather than an individual, is cal ...
, which looks at some of the major markers in the body's DNA to produce a match. The FBI is spending $1 billion to build a new biometric database, which will store DNA, facial recognition data, iris/retina (eye) data, fingerprints, palm prints, and other biometric data of people living in the United States. The computers running the database are contained in an underground facility about the size of two
American football field The rectangular field of play used for American football games measures long between the goal lines, and (53.3 yards) wide. The field may be made of grass or artificial turf. In addition, there are two end zones on each end of the field, ext ...
s. The Los Angeles Police Department is installing automated facial recognition and
license plate recognition Automatic number-plate recognition (ANPR; see also #Other names, other names below) is a technology that uses optical character recognition on images to read vehicle registration plates to create vehicle location data. It can use existing clos ...
devices in its squad cars, and providing handheld face scanners, which officers will use to identify people while on patrol.
Facial thermographs
are in development, which allow machines to identify certain emotions in people such as fear or stress, by measuring the temperature generated by blood flow to different parts of the face. Law enforcement officers believe that this has potential for them to identify when a suspect is nervous, which might indicate that they are hiding something, lying, or worried about something. I
his paper
in
Ethics and Information Technology ''Ethics and Information Technology'' is a quarterly peer-reviewed scientific journal covering the intersection between moral philosophy and the field of information and communications technology. It was established in 1999 by Jeroen van den Hoven ...
, Avi Marciano maps the harms caused by biometric surveillance, traces their theoretical origins, and brings these harms together in one integrative framework to elucidate their cumulative power. Marciano proposes four types of harms: Unauthorized use of bodily information, denial or limitation of access to physical spaces, bodily social sorting, and symbolic ineligibility through construction of marginality and otherness. Biometrics' social power, according to Marciano, derives from three main features: their complexity as "enigmatic technologies", their objective-scientific image, and their increasing agency, particularly in the context of automatic decision-making.


Aerial

Aerial surveillance is the gathering of surveillance, usually visual imagery or video, from an airborne vehicle—such as an
unmanned aerial vehicle An unmanned aerial vehicle (UAV) or unmanned aircraft system (UAS), commonly known as a drone, is an aircraft with no human pilot, crew, or passengers onboard, but rather is controlled remotely or is autonomous.De Gruyter Handbook of Dron ...
,
helicopter A helicopter is a type of rotorcraft in which Lift (force), lift and thrust are supplied by horizontally spinning Helicopter rotor, rotors. This allows the helicopter to VTOL, take off and land vertically, to hover (helicopter), hover, and ...
, or spy plane. Military
surveillance aircraft Surveillance aircraft are aircraft used for surveillance. They are primarily operated by military forces and government agencies in roles including intelligence gathering, maritime patrol, battlefield and airspace surveillance, observation (e. ...
use a range of sensors (e.g. radar) to monitor the battlefield. Digital imaging technology, miniaturized computers, and numerous other technological advances over the past decade have contributed to rapid advances in aerial surveillance hardware such as micro-aerial vehicles,
forward-looking infrared Forward-looking infrared (FLIR) cameras, typically used on military and civilian aircraft, use a thermographic camera that senses infrared radiation. The sensors installed in forward-looking infrared cameras, as well as those of other therma ...
, and high-resolution imagery capable of identifying objects at extremely long distances. For instance, the
MQ-9 Reaper The General Atomics MQ-9 Reaper (sometimes called Predator B) is an unmanned aerial vehicle (UAV, one component of an unmanned aircraft system (UAS)) capable of remotely controlled or autonomous flight operations, developed by General Atomi ...
, a U.S. drone plane used for domestic operations by the
Department of Homeland Security The United States Department of Homeland Security (DHS) is the U.S. federal executive department responsible for public security, roughly comparable to the interior, home, or public security ministries in other countries. Its missions invol ...
, carries cameras that are capable of identifying an object the size of a milk carton from altitudes of , and has
forward-looking infrared Forward-looking infrared (FLIR) cameras, typically used on military and civilian aircraft, use a thermographic camera that senses infrared radiation. The sensors installed in forward-looking infrared cameras, as well as those of other therma ...
devices that can detect the heat from a human body at distances of up to . In an earlier instance of commercial aerial surveillance, the Killington Mountain ski resort hired 'eye in the sky' aerial photography of its competitors' parking lots to judge the success of its marketing initiatives as it developed starting in the 1950s. The
United States The United States of America (USA), also known as the United States (U.S.) or America, is a country primarily located in North America. It is a federal republic of 50 U.S. state, states and a federal capital district, Washington, D.C. The 48 ...
Department of Homeland Security The United States Department of Homeland Security (DHS) is the U.S. federal executive department responsible for public security, roughly comparable to the interior, home, or public security ministries in other countries. Its missions invol ...
is in the process of testing UAVs to patrol the skies over the United States for the purposes of
critical infrastructure protection In the U.S., critical infrastructure protection (CIP) is a concept that relates to the preparedness and response to serious incidents that involve the critical infrastructure of a region or the nation. The American Presidential directive PDD-63 o ...
, border patrol, " transit monitoring", and general surveillance of the U.S. population. Miami-Dade police department ran tests with a vertical take-off and landing UAV from
Honeywell Honeywell International Inc. is an American publicly traded, multinational conglomerate corporation headquartered in Charlotte, North Carolina. It primarily operates in four areas of business: aerospace, building automation, industrial automa ...
, which is planned to be used in
SWAT A SWAT (''Special Weapons and Tactics'') team is a generic term for a police tactical unit within the United States, though the term has also been used by other nations. SWAT units are generally trained, equipped, and deployed to res ...
operations. Houston's police department has been testing fixed-wing UAVs for use in "traffic control". The
United Kingdom The United Kingdom of Great Britain and Northern Ireland, commonly known as the United Kingdom (UK) or Britain, is a country in Northwestern Europe, off the coast of European mainland, the continental mainland. It comprises England, Scotlan ...
, as well, is working on plans to build up a fleet of surveillance UAVs ranging from micro-aerial vehicles to full-size drones, to be used by police forces throughout the U.K. In addition to their surveillance capabilities, MAVs are capable of carrying
taser Taser (stylized in all caps) is a line of handheld conducted energy devices (CED) sold by Axon Enterprise (formerly Taser International). The device fires two small barbed darts intended to puncture the skin and remain attached to the targe ...
s for "
crowd control Crowd control is a public security practice in which large crowds are managed in order to prevent the outbreak of crowd crushes, affray, fights involving drunk and disorderly people or riots. Crowd crushes in particular can cause many hundre ...
", or weapons for killing enemy combatants. Programs such as the Heterogeneous Aerial Reconnaissance Team program developed by
DARPA The Defense Advanced Research Projects Agency (DARPA) is a research and development agency of the United States Department of Defense responsible for the development of emerging technologies for use by the military. Originally known as the Adva ...
have automated much of the aerial surveillance process. They have developed systems consisting of large teams drone planes that pilot themselves, automatically decide who is "suspicious" and how to go about monitoring them, coordinate their activities with other drones nearby, and notify human operators if something suspicious is occurring. This greatly increases the amount of area that can be continuously monitored, while reducing the number of human operators required. Thus a swarm of automated, self-directing drones can automatically patrol a city and track suspicious individuals, reporting their activities back to a centralized monitoring station. In addition, researchers also investigate possibilities of autonomous surveillance by large groups of micro aerial vehicles stabilized by decentralized bio-inspired swarming rules.


Corporate

Corporate surveillance is the monitoring of a person or group's behavior by a corporation. The data collected is most often used for marketing purposes or sold to other corporations, but is also regularly shared with government agencies. It can be used as a form of
business intelligence Business intelligence (BI) consists of strategies, methodologies, and technologies used by enterprises for data analysis and management of business information. Common functions of BI technologies include Financial reporting, reporting, online an ...
, which enables the corporation to better tailor their products and/or services to be desirable by their customers. Although there is a common belief that monitoring can increase productivity, it can also create consequences such as increasing chances of deviant behavior and creating punishments that are not equitable to their actions. Additionally, monitoring can cause resistance and backlash because it insinuates an employer's suspicion and lack of trust.


Data mining and profiling

Data mining Data mining is the process of extracting and finding patterns in massive data sets involving methods at the intersection of machine learning, statistics, and database systems. Data mining is an interdisciplinary subfield of computer science and ...
is the application of statistical techniques and programmatic algorithms to discover previously unnoticed relationships within the data.
Data profiling Data profiling is the process of examining the data available from an existing information source (e.g. a database or a file) and collecting statistics or informative summaries about that data. The purpose of these statistics may be to: # Find ou ...
in this context is the process of assembling information about a particular individual or group in order to generate a profile — that is, a picture of their patterns and behavior. Data profiling can be an extremely powerful tool for psychological and
social network analysis Social network analysis (SNA) is the process of investigating social structures through the use of networks and graph theory. It characterizes networked structures in terms of ''nodes'' (individual actors, people, or things within the network) ...
. A skilled analyst can discover facts about a person that they might not even be consciously aware of themselves. Economic (such as credit card purchases) and social (such as telephone calls and emails) transactions in modern society create large amounts of stored
data Data ( , ) are a collection of discrete or continuous values that convey information, describing the quantity, quality, fact, statistics, other basic units of meaning, or simply sequences of symbols that may be further interpreted for ...
and records. In the past, this data was documented in paper records, leaving a "
paper trail ''Paper Trail'' is the sixth studio album by American rapper T.I., released September 30, 2008, on Grand Hustle Records and Atlantic Records. He began to write songs for the album as he awaited trial for federal weapons and possession charges ...
", or was simply not documented at all. Correlation of paper-based records was a laborious process—it required human intelligence operators to manually dig through documents, which was time-consuming and incomplete, at best. But today many of these records are electronic, resulting in an " electronic trail". Every use of a bank machine, payment by credit card, use of a phone card, call from home, checked out library book, rented video, or otherwise complete recorded transaction generates an electronic record. Public records—such as birth, court, tax and other records—are increasingly being digitized and made available online. In addition, due to laws like CALEA, web traffic and online purchases are also available for profiling. Electronic record-keeping makes data easily collectable, storable, and accessible—so that high-volume, efficient aggregation and analysis is possible at significantly lower costs. Information relating to many of these individual transactions is often easily available because it is generally not guarded in isolation, since the information, such as the title of a movie a person has rented, might not seem sensitive. However, when many such transactions are aggregated they can be used to assemble a detailed profile revealing the actions, habits, beliefs, locations frequented, social connections, and preferences of the individual. This profile is then used, by programs such as
ADVISE ADVISE (Analysis, Dissemination, Visualization, Insight, and Semantic Enhancement) is a research and development program within the United States Department of Homeland Security (DHS) Threat and Vulnerability Testing and Assessment (TVTA) portfoli ...
and TALON, to determine whether the person is a military, criminal, or political threat. In addition to its own aggregation and profiling tools, the government is able to access information from third parties—for example, banks, credit companies or employers, etc.—by requesting access informally, by compelling access through the use of subpoenas or other procedures, or by purchasing data from commercial data aggregators or data brokers. The United States has spent $370 million on its 43 planned fusion centers, which are national network of surveillance centers that are located in over 30 states. The centers will collect and analyze vast amounts of data on U.S. citizens. It will get this data by consolidating personal information from sources such as state driver's licensing agencies, hospital records, criminal records, school records, credit bureaus, banks, etc.—and placing this information in a centralized database that can be accessed from all of the centers, as well as other federal law enforcement and intelligence agencies. Under '' United States v. Miller'' (1976), data held by third parties is generally not subject to Fourth Amendment warrant requirements.


Human operatives

A tail may surreptitiously track and report on the movements and contacts of a person of interest. Such following by one or more people may provide useful in formation in relatively densely populated urban environments. Organizations that have enemies who wish to gather information about the groups' members or activities face the issue of potential infiltration. In addition to operatives' infiltrating an organization, the surveilling party may exert pressure on certain members of the target organization to act as
informants An informant (also called an informer or, as a slang term, a "snitch", "rat", "canary", "stool pigeon", "stoolie", "tout" or "grass", among other terms) is a person who provides privileged information, or (usually damaging) information inten ...
(i.e., to disclose the information they hold on the organization and its members). Fielding operatives is very expensive, and governments with wide-reaching electronic surveillance tools at their disposal, rather than gathering the sort of information which operatives can provide, may use less problematic forms of surveillance—such as those mentioned above. Nevertheless, the use of human infiltrators remains common. For instance, in 2007 documents surfaced showing that the
FBI The Federal Bureau of Investigation (FBI) is the domestic Intelligence agency, intelligence and Security agency, security service of the United States and Federal law enforcement in the United States, its principal federal law enforcement ag ...
planned to field a total of 15,000 undercover agents and informants in response to an anti-terrorism directive (issued by President
George W. Bush George Walker Bush (born July 6, 1946) is an American politician and businessman who was the 43rd president of the United States from 2001 to 2009. A member of the Bush family and the Republican Party (United States), Republican Party, he i ...
in 2004) that ordered intelligence and law-enforcement agencies to increase their
HUMINT Human intelligence (HUMINT, pronounced ) is intelligence-gathering by means of human sources and interpersonal communication. It is distinct from more technical intelligence-gathering disciplines, such as signals intelligence (SIGINT), imager ...
capabilities. In some
home invasion A home invasion, also called a hot prowl burglary, is a sub-type of burglary (or in some jurisdictions, a separately defined crime) in which an offender unlawfully enters into a building residence while the occupants are inside. The overarching i ...
cases, thieves may use " casing surveillance” to determine if a victim's property such as a collection of
firearm A firearm is any type of gun that uses an explosive charge and is designed to be readily carried and operated by an individual. The term is legally defined further in different countries (see legal definitions). The first firearms originate ...
s are worth stealing.


Satellite imagery

On May 25, 2007, the U.S.
Director of National Intelligence The director of national intelligence (DNI) is a Cabinet of the United States#Current Cabinet and Cabinet-rank officials, cabinet-level Federal government of the United States, United States government intelligence and security official. The p ...
Michael McConnell authorized the National Applications Office (NAO) of the
Department of Homeland Security The United States Department of Homeland Security (DHS) is the U.S. federal executive department responsible for public security, roughly comparable to the interior, home, or public security ministries in other countries. Its missions invol ...
to allow local, state, and domestic Federal agencies to access imagery from
military intelligence Military intelligence is a military discipline that uses information collection and analysis List of intelligence gathering disciplines, approaches to provide guidance and direction to assist Commanding officer, commanders in decision making pr ...
Reconnaissance satellite A reconnaissance satellite or intelligence satellite (commonly, although unofficially, referred to as a spy satellite) is an Earth observation satellite or communications satellite deployed for military or intelligence applications. The ...
s and
Reconnaissance aircraft A reconnaissance aircraft (colloquially, a spy plane) is a military aircraft designed or adapted to perform aerial reconnaissance with roles including collection of imagery intelligence (including using Aerial photography, photography), signals ...
sensors which can now be used to observe the activities of U.S. citizens. The satellites and aircraft sensors will be able to penetrate cloud cover, detect chemical traces, and identify objects in buildings and "underground bunkers", and will provide real-time video at much higher resolutions than the still-images produced by programs such as
Google Earth Google Earth is a web mapping, web and computer program created by Google that renders a 3D computer graphics, 3D representation of Earth based primarily on satellite imagery. The program maps the Earth by superimposition, superimposing satelli ...
.


Identification and credentials

One of the simplest forms of identification is the carrying of credentials. Some nations have an
identity card An identity document (abbreviated as ID) is a documentation, document proving a person's Identity (social science), identity. If the identity document is a plastic card it is called an ''identity card'' (abbreviated as ''IC'' or ''ID card''). ...
system to aid identification, whilst others are considering it but face public opposition. Other documents, such as
passport A passport is an official travel document issued by a government that certifies a person's identity and nationality for international travel. A passport allows its bearer to enter and temporarily reside in a foreign country, access local aid ...
s,
driver's license A driver's license, driving licence, or driving permit is a legal authorization, or the official document confirming such an authorization, for a specific individual to operate one or more types of motorized vehicles—such as motorcycles, ca ...
s,
library card A library card can refer to several Plastic card, cards traditionally used for the management of books and patrons in a library. In its most common use, a library card serves similar functions as a corporate membership card. A person who holds a ...
s, banking or credit cards are also used to verify identity. If the form of the identity card is "machine-readable", usually using an encoded magnetic stripe or identification number (such as a
Social Security number In the United States, a Social Security number (SSN) is a nine-digit number issued to United States nationality law, U.S. citizens, Permanent residence (United States), permanent residents, and temporary (working) residents under section 205(c)(2 ...
), it corroborates the subject's identifying data. In this case it may create an electronic trail when it is checked and scanned, which can be used in profiling, as mentioned above.


Wireless tracking

This section refers to methods that involve the monitoring of
tracking device A tracking system or locating system is used for tracking persons or objects that do not stay in a fixed location, and supplying a time-ordered sequence of positions (track). Applications A myriad of tracking systems exist. Some are 'lag ...
s through the aid of wireless signals.


Mobile phones

Mobile carrier antennas are also commonly used to collect geolocation data on mobile phones. The geographical location of a powered mobile phone (and thus the person carrying it) can be determined easily (whether it is being used or not), using a technique known as
multilateration Trilateration is the use of distances (or "ranges") for determining the unknown position coordinates of a point of interest, often around Earth ( geopositioning). When more than three distances are involved, it may be called multilateration, f ...
to calculate the differences in time for a signal to travel from the cell phone to each of several
cell towers A cell site, cell phone tower, cell base tower, or cellular base station is a cellular-enabled mobile device site where antennas and electronic communications equipment are placed (typically on a radio mast, tower, or other raised structure) ...
near the owner of the phone. Dr. Victor Kappeler of Eastern Kentucky University indicates that police surveillance is a strong concern, stating the following statistics from 2013: A comparatively new off-the-shelf surveillance device is an
IMSI-catcher An international mobile subscriber identity (IMSI) catcher is a telephone eavesdropping device used for intercepting mobile phone traffic and tracking location data of mobile phone users. Essentially a "fake" mobile tower acting between the targ ...
, a telephone eavesdropping device used to intercept mobile phone traffic and track the movement of mobile phone users. Essentially a "fake" mobile tower acting between the target mobile phone and the service provider's real towers, it is considered a
man-in-the-middle In cryptography and computer security, a man-in-the-middle (MITM) attack, or on-path attack, is a cyberattack where the attacker secretly relays and possibly alters the communications between two parties who believe that they are directly communi ...
(MITM) attack. IMSI-catchers are used in some countries by
law enforcement Law enforcement is the activity of some members of the government or other social institutions who act in an organized manner to enforce the law by investigating, deterring, rehabilitating, or punishing people who violate the rules and norms gove ...
and
intelligence agencies An intelligence agency is a government agency responsible for the collection, analysis, and exploitation of information in support of law enforcement, national security, military, public safety, and foreign policy objectives. Means of inf ...
, but their use has raised significant civil liberty and privacy concerns and is strictly regulated in some countries. In March 2020, British daily
The Guardian ''The Guardian'' is a British daily newspaper. It was founded in Manchester in 1821 as ''The Manchester Guardian'' and changed its name in 1959, followed by a move to London. Along with its sister paper, ''The Guardian Weekly'', ''The Guardi ...
, based on the claims of a
whistleblower Whistleblowing (also whistle-blowing or whistle blowing) is the activity of a person, often an employee, revealing information about activity within a private or public organization that is deemed illegal, immoral, illicit, unsafe, unethical or ...
, accused the government of
Saudi Arabia Saudi Arabia, officially the Kingdom of Saudi Arabia (KSA), is a country in West Asia. Located in the centre of the Middle East, it covers the bulk of the Arabian Peninsula and has a land area of about , making it the List of Asian countries ...
of exploiting global mobile telecom network weaknesses to spy on its citizens traveling around the
United States The United States of America (USA), also known as the United States (U.S.) or America, is a country primarily located in North America. It is a federal republic of 50 U.S. state, states and a federal capital district, Washington, D.C. The 48 ...
. The data shared by the whistleblower in support of the claims, showed that a systematic
spying Espionage, spying, or intelligence gathering, as a subfield of the intelligence field, is the act of obtaining secret or Confidentiality, confidential information (Intelligence (information), intelligence). A person who commits espionage on ...
campaign was being run by the kingdom exploiting the flaws of SS7, a global messaging system. The data showed that millions of secret tracking commands originated from Saudi in a duration of four-months, starting from November 2019.


RFID tagging

Radio-frequency identification Radio-frequency identification (RFID) uses electromagnetic fields to automatically Automatic identification system, identify and Tracking system, track tags attached to objects. An RFID system consists of a tiny radio transponder called a tag, ...
(RFID) tagging is the use of very small electronic devices (called "RFID tags") which are applied to or incorporated into a product, animal, or person for the purpose of identification and tracking using radio waves. The tags can be read from several meters away. They are extremely inexpensive, costing a few cents per piece, so they can be inserted into many types of everyday products without significantly increasing the price, and can be used to track and identify these objects for a variety of purposes. Some companies appear to be "tagging" their workers by incorporating RFID tags in employee ID badges. Workers in U.K. considered
strike action Strike action, also called labor strike, labour strike in British English, or simply strike, is a work stoppage caused by the mass refusal of employees to Working class, work. A strike usually takes place in response to employee grievances. Str ...
in protest of having themselves tagged; they felt that it was dehumanizing to have all of their movements tracked with RFID chips. Some critics have expressed fears that people will soon be tracked and scanned everywhere they go. On the other hand, RFID tags in newborn baby ID bracelets put on by hospitals have foiled kidnappings. In a 2003 editorial, CNET News.com's chief political correspondent, Declan McCullagh, speculated that, soon, every object that is purchased, and perhaps ID cards, will have RFID devices in them, which would respond with information about people as they walk past scanners (what type of phone they have, what type of shoes they have on, which books they are carrying, what credit cards or membership cards they have, etc.). This information could be used for identification, tracking, or targeted marketing. , this has largely not come to pass.


RFID tagging on humans

A human microchip implant is an identifying integrated circuit device or
RFID Radio-frequency identification (RFID) uses electromagnetic fields to automatically identify and track tags attached to objects. An RFID system consists of a tiny radio transponder called a tag, a radio receiver, and a transmitter. When tri ...
transponder encased in
silicate glass Glass is an amorphous ( non-crystalline) solid. Because it is often transparent and chemically inert, glass has found widespread practical, technological, and decorative use in window panes, tableware, and optics. Some common objects made o ...
and implanted in the body of a human being. A
subdermal implant A subdermal implant is a body modification placed under the skin, allowing the body to heal over the implant and creating a raised design. Such implants fall under the broad category of body modification. Many subdermal implants are made out of si ...
typically contains a unique ID number that can be linked to information contained in an external database, such as personal identification, medical history, medications, allergies, and contact information. Several types of microchips have been developed in order to control and monitor certain types of people, such as criminals, political figures and spies, a "killer" tracking chip patent was filed at the German Patent and Trademark Office (DPMA) around May 2009. Verichip is an RFID device produced by a company called Applied Digital Solutions (ADS). Verichip is slightly larger than a grain of rice, and is injected under the skin. The injection reportedly feels similar to receiving a
shot Shot may refer to: Arts, entertainment, and media * ''Shot'' (album), by The Jesus Lizard *''Shot, Illusion, New God'', an EP by Gruntruck *'' Shot Rev 2.0'', a video album by The Sisters of Mercy * "Shot" (song), by The Rasmus * ''Shot'' (2017 ...
. The chip is encased in glass, and stores a "VeriChip Subscriber Number" which the scanner uses to access their personal information, via the Internet, from Verichip Inc.'s database, the "Global VeriChip Subscriber Registry". Thousands of people have already had them inserted. In Mexico, for example, 160 workers at the Attorney General's office were required to have the chip injected for identity verification and
access control In physical security and information security, access control (AC) is the action of deciding whether a subject should be granted or denied access to an object (for example, a place or a resource). The act of ''accessing'' may mean consuming ...
purposes. Implantable microchips have also been used in healthcare settings, but ethnographic researchers have identified a number of ethical problems with such uses; these problems include unequal treatment, diminished trust, and possible endangerment of patients.


Radar


Geolocation devices


Global Positioning System

In the U.S., police have planted hidden
GPS The Global Positioning System (GPS) is a satellite-based hyperbolic navigation system owned by the United States Space Force and operated by Mission Delta 31. It is one of the global navigation satellite systems (GNSS) that provide geol ...
tracking devices in people's vehicles to monitor their movements, without a warrant. In early 2009, they were arguing in court that they have the right to do this. Several cities are running pilot projects to require parolees to wear GPS devices to track their movements when they get out of prison.


Devices

Covert listening device A covert listening device, more commonly known as a bug or a wire, is usually a combination of a miniature radio transmitter with a microphone. The use of bugs, called bugging, or wiretapping is a common technique in surveillance, espionage and ...
s and video devices, or "bugs", are hidden electronic devices which are used to capture, record, and/or transmit data to a receiving party such as a law enforcement agency. The U.S. has run numerous domestic intelligence operations, such as
COINTELPRO COINTELPRO (a syllabic abbreviation derived from Counter Intelligence Program) was a series of covert and illegal projects conducted between 1956 and 1971 by the United States Federal Bureau of Investigation (FBI) aimed at surveilling, infiltr ...
, which have bugged the homes, offices, and vehicles of thousands of U.S. citizens, usually
political activists Activism consists of efforts to promote, impede, direct or intervene in social, political, economic or environmental reform with the desire to make changes in society toward a perceived common good. Forms of activism range from mandate build ...
, subversives, and
criminals In ordinary language, a crime is an unlawful act punishable by a state or other authority. The term ''crime'' does not, in modern criminal law, have any simple and universally accepted definition,Farmer, Lindsay: "Crime, definitions of", in Cane ...
. Law enforcement and intelligence services in the U.K. and the United States possess technology to remotely activate the microphones in cell phones, by accessing the phone's diagnostic/maintenance features, in order to listen to conversations that take place nearby the person who holds the phone.


Postal services

As more people use faxes and e-mail the significance of surveilling the postal system is decreasing, in favor of Internet and telephone surveillance. But interception of post is still an available option for law enforcement and intelligence agencies, in certain circumstances. This is not a common practice, however, and entities like the US Army require high levels of approval to conduct. The U.S.
Central Intelligence Agency The Central Intelligence Agency (CIA; ) is a civilian foreign intelligence service of the federal government of the United States tasked with advancing national security through collecting and analyzing intelligence from around the world and ...
and
Federal Bureau of Investigation The Federal Bureau of Investigation (FBI) is the domestic Intelligence agency, intelligence and Security agency, security service of the United States and Federal law enforcement in the United States, its principal federal law enforcement ag ...
have performed twelve separate mail-opening campaigns targeted towards U.S. citizens. In one of these programs, more than 215,000 communications were intercepted, opened, and photographed.


Stakeout

A stakeout is the coordinated surveillance of a location or person. Stakeouts are generally performed covertly and for the purpose of gathering
evidence Evidence for a proposition is what supports the proposition. It is usually understood as an indication that the proposition is truth, true. The exact definition and role of evidence vary across different fields. In epistemology, evidence is what J ...
related to
criminal activity In ordinary language, a crime is an unlawful act punishable by a state or other authority. The term ''crime'' does not, in modern criminal law, have any simple and universally accepted definition,Farmer, Lindsay: "Crime, definitions of", in Cane ...
. The term derives from the practice by
land surveyor Surveying or land surveying is the technique, profession, art, and science of determining the terrestrial two-dimensional or three-dimensional positions of points and the distances and angles between them. These points are usually on the ...
s of using
survey stakes Construction surveying or building surveying (otherwise known as "staking", "stake-out", "lay-out", or "setting-out") is to provide dimensional control for all stages of construction work, including the stake out of reference points and markers t ...
to measure out an area before the main building project begins.


Internet of things

The
Internet of Things Internet of things (IoT) describes devices with sensors, processing ability, software and other technologies that connect and exchange data with other devices and systems over the Internet or other communication networks. The IoT encompasse ...
(IoT), is a network of physical devices. These devices can collect data to one another without human intervention. IoTs can be used for identification, monitoring, location tracking, and health tracking. While IoTs can be used as time-saving tools that make activities simpler, they raise the concern of government surveillance and privacy regarding how data will be used.


Controversy


Support

Supporters of surveillance systems believe that these tools can help protect society from
terrorists Terrorism, in its broadest sense, is the use of violence against non-combatants to achieve political or ideological aims. The term is used in this regard primarily to refer to intentional violence during peacetime or in the context of war aga ...
and
criminals In ordinary language, a crime is an unlawful act punishable by a state or other authority. The term ''crime'' does not, in modern criminal law, have any simple and universally accepted definition,Farmer, Lindsay: "Crime, definitions of", in Cane ...
. They argue that surveillance can reduce crime by three means: by deterrence, by observation, and by reconstruction. Surveillance can deter by increasing the chance of being caught, and by revealing the
modus operandi A (often shortened to M.O. or MO) is an individual's habits of working, particularly in the context of business or criminal investigations, but also generally. It is a Latin phrase, approximately translated as . Term The term is often used in ...
. This requires a minimal level of invasiveness.Deviant Behaviour – Socially accepted observation of behaviour for security
, Jeroen van Rest
Another method on how surveillance can be used to fight criminal activity is by linking the information stream obtained from them to a recognition system (for instance, a camera system that has its feed run through a facial recognition system). This can for instance auto-recognize fugitives and direct police to their location. A distinction here has to be made however on the type of surveillance employed. Some people that support video surveillance in city streets may not support indiscriminate telephone taps and vice versa. Besides the types, the way in which this surveillance is done also matters a lot; i.e. indiscriminate telephone taps are supported by much fewer people than say telephone taps done only to people suspected of engaging in illegal activities. Surveillance can also be used to give human operatives a tactical advantage through improved situational awareness, or through the use of automated processes, i.e.
video analytics Video content analysis or video content analytics (VCA), also known as video analysis or video analytics (VA), is the capability of automatically analyzing video to detect and determine temporal and spatial events. This technical capability is used ...
. Surveillance can help reconstruct an incident and prove guilt through the availability of footage for forensics experts. Surveillance can also influence subjective security if surveillance resources are visible or if the consequences of surveillance can be felt. Some of the surveillance systems (such as the camera system that has its feed run through a facial recognition system mentioned above) can also have other uses besides countering criminal activity. For instance, it can help in retrieving runaway children, abducted or missing adults and mentally disabled people. Other supporters simply believe that there is nothing that can be done about the loss of privacy, and that people must become accustomed to having no privacy. As
Sun Microsystems Sun Microsystems, Inc., often known as Sun for short, was an American technology company that existed from 1982 to 2010 which developed and sold computers, computer components, software, and information technology services. Sun contributed sig ...
CEO
Scott McNealy Scott McNealy (born November 13, 1954) is an American businessman. He is most famous for co-founding the computer technology company Sun Microsystems in 1982 along with Vinod Khosla, Bill Joy, and Andy Bechtolsheim. In 2004, while still at Sun ...
said: "You have zero privacy anyway. Get over it." Another common argument is: " If you aren't doing something wrong then you don't have anything to fear." That is, one does not have a right to privacy regarding illegal activities, while those following the law suffer no harm from surveillance and so have no standing to object to it. Beyond the heroically self-serving identification of what is wrong with what is illegal, the ethical fly in this ointment is the tacit premise that the individual has no duty to preserve the health of the state—the antithesis of the principle that only the consent of the governed can adequately serve as the moral foundation of a (just) state and warrant the vast gulf between its power (and agency) and that of the individual.


Opposition

With the advent of programs such as the
Total Information Awareness Total Information Awareness (TIA) was a mass detection program by the United States Information Awareness Office. It operated under this title from February to May 2003 before being renamed Terrorism Information Awareness. Based on the concep ...
program and
ADVISE ADVISE (Analysis, Dissemination, Visualization, Insight, and Semantic Enhancement) is a research and development program within the United States Department of Homeland Security (DHS) Threat and Vulnerability Testing and Assessment (TVTA) portfoli ...
, technologies such as high speed surveillance computers and
biometrics Biometrics are body measurements and calculations related to human characteristics and features. Biometric authentication (or realistic authentication) is used in computer science as a form of identification and access control. It is also used t ...
software, and laws such as the Communications Assistance for Law Enforcement Act, governments now possess an unprecedented ability to monitor the activities of their subjects. Many
civil rights Civil and political rights are a class of rights that protect individuals' political freedom, freedom from infringement by governments, social organizations, and private individuals. They ensure one's entitlement to participate in the civil and ...
and
privacy Privacy (, ) is the ability of an individual or group to seclude themselves or information about themselves, and thereby express themselves selectively. The domain of privacy partially overlaps with security, which can include the concepts of a ...
groups, such as the
Electronic Frontier Foundation The Electronic Frontier Foundation (EFF) is an American international non-profit digital rights group based in San Francisco, California. It was founded in 1990 to promote Internet civil liberties. It provides funds for legal defense in court, ...
and
American Civil Liberties Union The American Civil Liberties Union (ACLU) is an American nonprofit civil rights organization founded in 1920. ACLU affiliates are active in all 50 states, Washington, D.C., and Puerto Rico. The budget of the ACLU in 2024 was $383 million. T ...
, have expressed concern that by allowing continual increases in government surveillance of citizens we will end up in a
mass surveillance Mass surveillance is the intricate surveillance of an entire or a substantial fraction of a population in order to monitor that group of citizens. The surveillance is often carried out by Local government, local and federal governments or intell ...
society, with extremely limited, or non-existent political and/or personal freedoms. Fears such as this have led to numerous lawsuits such as '' Hepting v. AT&T''. Some critics state that the claim made by supporters should be modified to read: "As long as we do what we're told, we have nothing to fear." For instance, a person who is part of a political group which opposes the policies of the national government, might not want the government to know their names and what they have been reading, so that the government cannot easily subvert their organization, arrest, or kill them. Other critics state that while a person might not have anything to hide right now, the government might later implement policies that they do wish to oppose, and that opposition might then be impossible due to mass surveillance enabling the government to identify and remove political threats. Further, other critics point to the fact that most people ''do'' have things to hide. For example, if a person is looking for a new job, they might not want their current employer to know this. Also if an employer wishes total privacy to watch over their own employee and secure their financial information it may become impossible, and they may not wish to hire those under surveillance. In December 2017, the Government of China took steps to oppose widespread surveillance by security-company cameras, webcams, and
IP camera An Internet Protocol camera, or IP camera, is a type of digital video camera that receives control data and sends image data via an IP network. They are commonly used for surveillance, but, unlike analog closed-circuit television (CCTV) came ...
s after tens-of-thousands were made accessible for internet viewing by IT company
Qihoo Qihoo 360 (; approximate pronunciation CHEE-hoo), full name 360 Security Technology Inc., is a Chinese internet security company that has developed the antivirus software programs 360 Safeguard and 360 Mobile Safe, the Web browser 360 Secure Bro ...


Totalitarianism

Programs such as the
Total Information Awareness Total Information Awareness (TIA) was a mass detection program by the United States Information Awareness Office. It operated under this title from February to May 2003 before being renamed Terrorism Information Awareness. Based on the concep ...
program, and laws such as the Communications Assistance For Law Enforcement Act have led many groups to fear that society is moving towards a state of
mass surveillance Mass surveillance is the intricate surveillance of an entire or a substantial fraction of a population in order to monitor that group of citizens. The surveillance is often carried out by Local government, local and federal governments or intell ...
with severely limited personal, social, political freedoms, where dissenting individuals or groups will be strategically removed in
COINTELPRO COINTELPRO (a syllabic abbreviation derived from Counter Intelligence Program) was a series of covert and illegal projects conducted between 1956 and 1971 by the United States Federal Bureau of Investigation (FBI) aimed at surveilling, infiltr ...
-like purges. Kate Martin, of the Center For National Security Studies said of the use of military spy satellites being used to monitor the activities of U.S. citizens: "They are laying the bricks one at a time for a police state." Some point to the blurring of lines between public and private places, and the privatization of places traditionally seen as public (such as shopping malls and industrial parks) as illustrating the increasing legality of collecting personal information. Traveling through many public places such as government offices is hardly optional for most people, yet consumers have little choice but to submit to companies' surveillance practices.Agre, Philip E. (2003)
"Your Face is not a bar code: arguments against automatic face recognition in public places"
Retrieved November 14, 2004.
Surveillance techniques are not created equal; among the many
biometric Biometrics are body measurements and calculations related to human characteristics and features. Biometric authentication (or realistic authentication) is used in computer science as a form of identification and access control. It is also used t ...
identification technologies, for instance,
face recognition A facial recognition system is a technology potentially capable of matching a human face from a digital image or a Film frame, video frame against a database of faces. Such a system is typically employed to authenticate users through ID verif ...
requires the least cooperation. Unlike automatic fingerprint reading, which requires an individual to press a finger against a machine, this technique is subtle and requires little to no consent.


Psychological/social effects

Some critics, such as
Michel Foucault Paul-Michel Foucault ( , ; ; 15 October 192625 June 1984) was a French History of ideas, historian of ideas and Philosophy, philosopher who was also an author, Literary criticism, literary critic, Activism, political activist, and teacher. Fo ...
, believe that in addition to its obvious function of identifying and capturing individuals who are committing undesirable acts, surveillance also functions to create in everyone a feeling of always being watched, so that they become self-policing. This allows the State to control the populace without having to resort to physical force, which is expensive and otherwise problematic. With the development of digital technology, individuals have become increasingly perceptible to one another, as surveillance becomes virtual. Online surveillance is the utilization of the internet to observe one's activity. Corporations, citizens, and governments participate in tracking others' behaviours for motivations that arise out of business relations, to curiosity, to legality. In her book ''Superconnected'', Mary Chayko differentiates between two types of surveillance: vertical and horizontal. Vertical surveillance occurs when there is a dominant force, such as the government that is attempting to control or regulate the actions of a given society. Such powerful authorities often justify their incursions as a means to protect society from threats of violence or terrorism. Some individuals question when this becomes an infringement on civil rights. Horizontal diverges from vertical surveillance as the tracking shifts from an authoritative source to an everyday figure, such as a friend, coworker, or stranger that is interested in one's mundane activities. Individuals leave traces of information when they are online that reveal their interests and desires of which others observe. While this can allow people to become interconnected and develop social connections online, it can also increase potential risk to harm, such as
cyberbullying Cyberbullying (cyberharassment or online bullying) is a form of bullying or harassment using electronic means. Since the 2000s, it has become increasingly common, especially among teenagers and adolescents, due to young people's increased u ...
or censoring/stalking by strangers, reducing privacy. In addition, Simone Browne argues that surveillance wields an immense racializing quality such that it operates as "racializing surveillance." Browne uses racializing surveillance to refer to moments when enactments of surveillance are used to reify boundaries, borders, and bodies along racial lines and where the outcome is discriminatory treatment of those who are negatively racialized by such surveillance. Browne argues racializing surveillance pertains to policing what is "in or out of place."


Privacy

Numerous
civil rights Civil and political rights are a class of rights that protect individuals' political freedom, freedom from infringement by governments, social organizations, and private individuals. They ensure one's entitlement to participate in the civil and ...
groups and
privacy Privacy (, ) is the ability of an individual or group to seclude themselves or information about themselves, and thereby express themselves selectively. The domain of privacy partially overlaps with security, which can include the concepts of a ...
groups oppose surveillance as a violation of people's right to privacy. Such groups include:
Electronic Privacy Information Center The Electronic Privacy Information Center (EPIC) is an independent nonprofit research center established in 1994 to protect privacy, freedom of expression, and democratic values in the information age. Based in Washington, D.C., their mission i ...
,
Electronic Frontier Foundation The Electronic Frontier Foundation (EFF) is an American international non-profit digital rights group based in San Francisco, California. It was founded in 1990 to promote Internet civil liberties. It provides funds for legal defense in court, ...
,
American Civil Liberties Union The American Civil Liberties Union (ACLU) is an American nonprofit civil rights organization founded in 1920. ACLU affiliates are active in all 50 states, Washington, D.C., and Puerto Rico. The budget of the ACLU in 2024 was $383 million. T ...
and
Privacy International Privacy International (PI) is a UK-based registered charity that defends and promotes the right to privacy across the world. First formed in 1990, registered as a non-profit company in 2002 and as a charity in 2012, PI is based in London. Its ...
. There have been several lawsuits such as '' Hepting v. AT&T'' and '' EPIC v. Department of Justice'' by groups or individuals, opposing certain surveillance activities. Legislative proceedings such as those that took place during the
Church Committee The Church Committee (formally the United States Senate Select Committee to Study Governmental Operations with Respect to Intelligence Activities) was a US Senate select committee in 1975 that investigated abuses by the Central Intelligence ...
, which investigated domestic intelligence programs such as
COINTELPRO COINTELPRO (a syllabic abbreviation derived from Counter Intelligence Program) was a series of covert and illegal projects conducted between 1956 and 1971 by the United States Federal Bureau of Investigation (FBI) aimed at surveilling, infiltr ...
, have also weighed the pros and cons of surveillance.


Court cases

''People vs. Diaz'' (2011) was a court case in the realm of cell phone privacy, even though the decision was later overturned. In this case, Gregory Diaz was arrested during a sting operation for attempting to sell ecstasy. During his arrest, police searched Diaz's phone and found more incriminating evidence including SMS text messages and photographs depicting illicit activities. During his trial, Diaz attempted to have the information from his cell phone removed from evidence, but the courts deemed it as lawful and Diaz's appeal was denied on the California State Court level and, later, the Supreme Court level. Just three short years after, this decision was overturned in the case ''Riley vs. California'' (2014). ''Riley vs. California'' (2014) was a
U.S. Supreme Court The Supreme Court of the United States (SCOTUS) is the highest court in the federal judiciary of the United States. It has ultimate appellate jurisdiction over all U.S. federal court cases, and over state court cases that turn on question ...
case in which a man was arrested for his involvement in a drive-by shooting. A few days after the shooting the police made an arrest of the suspect (Riley), and, during the arrest, the police searched him. However, this search was not only of Riley's person, but also the police opened and searched his cell phone, finding pictures of other weapons, drugs, and of Riley showing gang signs. In court, the question arose whether searching the phone was lawful or if the search was protected by the 4th amendment of the constitution. The decision held that the search of Riley's cell phone during the arrest was illegal, and that it was protected by the 4th Amendment.


Countersurveillance, inverse surveillance, sousveillance

Countersurveillance Countersurveillance refers to measures that are usually undertaken by the public to prevent surveillance, including covert surveillance. Countersurveillance may include electronic methods such as technical surveillance counter-measures, which is t ...
is the practice of avoiding surveillance or making surveillance difficult. Developments in the late twentieth century have caused counter surveillance to dramatically grow in both scope and complexity, such as the Internet, increasing prevalence of electronic
security systems A security alarm is a system designed to detect intrusions, such as unauthorized entry, into a building or other areas, such as a home or school. Security alarms protect against burglary ( theft) or property damage, as well as against intruders ...
, high-altitude (and possibly armed)
UAVs An unmanned aerial vehicle (UAV) or unmanned aircraft system (UAS), commonly known as a drone, is an aircraft with no human pilot, crew, or passengers onboard, but rather is controlled remotely or is autonomous.De Gruyter Handbook of Drone ...
, and large corporate and government computer databases. Other examples include encrypted messenger apps such as Signal and privacy cryptocurrencies such as Monero and ZCash. Inverse surveillance is the practice of the reversal of surveillance on other individuals or groups (e.g., citizens photographing police). Well-known examples include George Holliday's recording of the
Rodney King Rodney Glen King (April 2, 1965June 17, 2012) was a Black American victim of police brutality. On March 3, 1991, he was severely beaten by Police officer, officers of the Los Angeles Police Department (LAPD) during his arrest after a high spe ...
beating and the organization Copwatch, which attempts to monitor police officers to prevent
police brutality Police brutality is the excessive and unwarranted use of force by law enforcement against an individual or Public order policing, a group. It is an extreme form of police misconduct and is a civil rights violation. Police brutality includes, b ...
. Counter-surveillance can be also used in applications to prevent corporate spying, or to track other criminals by certain criminal entities. It can also be used to deter stalking methods used by various entities and organizations. ''
Sousveillance Sousveillance ( ) is the recording of an activity by a member of the public, rather than a person or organisation in authority, typically by way of small wearable technology, wearable or portable personal technologies. The term, coined by Steve M ...
'' is inverse surveillance, involving the recording by private individuals, rather than government or corporate entities.


Popular culture


In literature

*
George Orwell Eric Arthur Blair (25 June 1903 – 21 January 1950) was an English novelist, poet, essayist, journalist, and critic who wrote under the pen name of George Orwell. His work is characterised by lucid prose, social criticism, opposition to a ...
's novel ''
Nineteen Eighty-Four ''Nineteen Eighty-Four'' (also published as ''1984'') is a dystopian novel and cautionary tale by the English writer George Orwell. It was published on 8 June 1949 by Secker & Warburg as Orwell's ninth and final completed book. Thematically ...
'' portrays a fictional
totalitarian Totalitarianism is a political system and a form of government that prohibits opposition from political parties, disregards and outlaws the political claims of individual and group opposition to the state, and completely controls the public sph ...
surveillance society with a very simple
mass surveillance Mass surveillance is the intricate surveillance of an entire or a substantial fraction of a population in order to monitor that group of citizens. The surveillance is often carried out by Local government, local and federal governments or intell ...
system consisting of human operatives, informants, and two-way "telescreens" in people's homes. Because of the impact of this book, mass-surveillance technologies are commonly called "Orwellian" when considered problematic. * The book ''
The Handmaid's Tale ''The Handmaid's Tale'' is a futuristic dystopian novel by Canadian author Margaret Atwood published in 1985. It is set in a near-future New England in a patriarchal, totalitarian theonomic state known as the Republic of Gilead, which has ...
'', as well as a film and TV series based on it, portray a totalitarian Christian
theocracy Theocracy is a form of autocracy or oligarchy in which one or more deity, deities are recognized as supreme ruling authorities, giving divine guidance to human intermediaries, with executive and legislative power, who manage the government's ...
where all citizens are kept under constant surveillance. * In the book ''
The Girl with the Dragon Tattoo ''The Girl with the Dragon Tattoo'' (original title in ) is a psychological thriller novel by Swedish author Stieg Larsson. It was published posthumously in 2005, translated into English in 2008, and became an international bestseller. ''T ...
'',
Lisbeth Salander Lisbeth Salander is a fictional character created by Swedish author and journalist Stieg Larsson in his award-winning Millennium (novel series), ''Millennium'' series. She first appeared in the 2005 novel ''The Girl with the Dragon Tattoo'', as a ...
uses computers to get information on people, as well as other standard surveillance methods, as a freelancer. * ''
V for Vendetta ''V for Vendetta'' is a British graphic novel written by Alan Moore and illustrated by David Lloyd (comics), David Lloyd (with additional art by Tony Weare). Initially published between 1982 and 1985 in black and white as an ongoing Serial (li ...
,'' a British
graphic novel A graphic novel is a self-contained, book-length form of sequential art. The term ''graphic novel'' is often applied broadly, including fiction, non-fiction, and Anthology, anthologized work, though this practice is highly contested by comics sc ...
written by
Alan Moore Alan Moore (born 18 November 1953) is an English author known primarily for his work in comic books including ''Watchmen'', ''V for Vendetta'', ''The Ballad of Halo Jones'', Swamp Thing (comic book), ''Swamp Thing'', ''Batman: The Killing Joke' ...
* David Egger's novel '' The Circle'' exhibits a world where a single company called "The Circle" produces all of the latest and highest quality technologies from computers and smartphones, to surveillance cameras known as "See-Change cameras". This company became associated with politics when it started a movement where politicians went "transparent" by wearing See-Change cameras to prevent the public from keeping secrets about their daily work activity. In this society, sharing personal information and experiences becomes mandatory because The Circle believes everyone should have access to all information freely. However, as Eggers illustrates, this takes a toll on the individuals and disrupts power between governments and private companies. The Circle presents extreme ideologies surrounding mandatory surveillance. Eamon Bailey, one of the Wise Men, or founders of The Circle, believes that possessing the tools to access information about anything or anyone, should be a human right given to all of the world's citizens. By eliminating all secrets, any behaviour that has been deemed shameful will either become normalized or no longer considered shocking. Negative actions will eventually be eradicated from society altogether, through the fear of being exposed to other citizens This would be achieved partly by everyone going transparent, which Bailey highly supports. However, none of the Wise Men ever became transparent themselves. One primary goal of The Circle is to have all of the world's information filtered through The Circle, a process they call "Completion". A single, private company would then have full access and control over all information and privacy of individuals and governments. Ty Gospodinov, the first founder of The Circle, has significant concerns about the completion of the circle. He warns that this step would give The Circle too much power and control, quickly leading to
totalitarianism Totalitarianism is a political system and a form of government that prohibits opposition from political parties, disregards and outlaws the political claims of individual and group opposition to the state, and completely controls the public s ...
.


In music

* The
Dead Kennedys Dead Kennedys are an American punk rock band that formed in San Francisco, California, in 1978. The band was one of the defining punk bands during its initial eight-year run. Initially consisting of lead guitarist East Bay Ray, bassist Klaus Fl ...
' song "I Am The Owl" is about government surveillance and social engineering of political groups. * The Vienna Teng song "Hymn of Acxiom" is about corporate data collection and surveillance.


Onscreen

* The film ''
Gattaca ''Gattaca'' is a 1997 American dystopian science fiction film written and directed by Andrew Niccol in his List of directorial debuts, feature directorial debut. It stars Ethan Hawke and Uma Thurman with Jude Law, Loren Dean, Ernest Borgnine, Go ...
'' portrays a society that uses
biometric Biometrics are body measurements and calculations related to human characteristics and features. Biometric authentication (or realistic authentication) is used in computer science as a form of identification and access control. It is also used t ...
surveillance to distinguish between people who are genetically engineered "superior" humans and genetically natural "inferior" humans. * In the movie '' Minority Report'', the police and government intelligence agencies use micro aerial vehicles in
SWAT A SWAT (''Special Weapons and Tactics'') team is a generic term for a police tactical unit within the United States, though the term has also been used by other nations. SWAT units are generally trained, equipped, and deployed to res ...
operations and for surveillance purposes. *
HBO Home Box Office (HBO) is an American pay television service, which is the flagship property of namesake parent-subsidiary Home Box Office, Inc., itself a unit owned by Warner Bros. Discovery. The overall Home Box Office business unit is based a ...
's crime-drama series ''
The Sopranos ''The Sopranos'' is an American Crime film#Crime drama, crime drama television series created by David Chase. The series follows Tony Soprano (James Gandolfini), a New Jersey American Mafia, Mafia boss who suffers from panic attacks. He reluct ...
'' regularly portrays the FBI's surveillance of the DiMeo Crime Family. Audio devices they use include " bugs" placed in strategic locations (e.g., in " I Dream of Jeannie Cusamano" and " Mr. Ruggerio's Neighborhood") and hidden microphones worn by operatives (e.g., in "
Rat Pack The Rat Pack was an informal group of singers that, in its second iteration, ultimately made films and appeared together in Las Vegas casino venues. They originated in the late 1940s and early 1950s as a group of A-list show business friends, s ...
") and informants (e.g., in "
Funhouse A funhouse or fun house is an attraction found in amusement parks and funfair midways, equipped with various devices designed to surprise, challenge, or amuse visitors. Unlike thrill rides or dark rides, fun houses are participatory attractio ...
", " Proshai, Livushka" and " Members Only"). Visual devices include hidden still cameras (e.g., in " Pax Soprana") and video cameras (e.g., in "
Long Term Parking "Long Term Parking" is the 64th episode of the HBO original series ''The Sopranos'' and the 12th of the show's fifth season. Written by Terence Winter and directed by Tim Van Patten, it originally aired on May 23, 2004. This episode was the mo ...
"). * The movie ''
THX-1138 ''THX 1138'' is a 1971 American social science fiction film co-written and directed by George Lucas in his feature directorial debut. Produced by Francis Ford Coppola and co-written by Walter Murch, the film stars Robert Duvall and Donald Pleas ...
'' portrays a society wherein people are drugged with sedatives and antidepressants, and have surveillance cameras watching them everywhere they go. * The movie ''
The Lives of Others ''The Lives of Others'' (, ) is a 2006 German drama film written and directed by Florian Henckel von Donnersmarck marking his feature film directorial debut. The plot is about the monitoring of East Berlin residents by agents of the Stasi, Ea ...
'' portrays the monitoring of
East Berlin East Berlin (; ) was the partially recognised capital city, capital of East Germany (GDR) from 1949 to 1990. From 1945, it was the Allied occupation zones in Germany, Soviet occupation sector of Berlin. The American, British, and French se ...
by agents of the
Stasi The Ministry for State Security (, ; abbreviated MfS), commonly known as the (, an abbreviation of ), was the Intelligence agency, state security service and secret police of East Germany from 1950 to 1990. It was one of the most repressive pol ...
, the
GDR East Germany, officially known as the German Democratic Republic (GDR), was a country in Central Europe from its formation on 7 October 1949 until its reunification with West Germany (FRG) on 3 October 1990. Until 1989, it was generally vie ...
's secret police. * The movie ''
The Conversation ''The Conversation'' is a 1974 American neo-noir mystery thriller film written, produced, and directed by Francis Ford Coppola. It stars Gene Hackman as a surveillance expert who faces a moral dilemma when his recordings reveal a potential ...
'' portrays many methods of audio surveillance. * The movie ''
V for Vendetta ''V for Vendetta'' is a British graphic novel written by Alan Moore and illustrated by David Lloyd (comics), David Lloyd (with additional art by Tony Weare). Initially published between 1982 and 1985 in black and white as an ongoing Serial (li ...
'', a 2005
dystopian A dystopia (lit. "bad place") is an imagined world or society in which people lead wretched, dehumanized, fearful lives. It is an imagined place (possibly state) in which everything is unpleasant or bad, typically a totalitarian or environmenta ...
political thriller film directed by
James McTeigue James McTeigue (born 29 December 1967) is an Australian film and television director. He has been an assistant director on many films, including ''Dark City (1998 film), Dark City'' (1998), the The Matrix (franchise)#Films, ''Matrix'' trilogy ( ...
and written by
the Wachowskis Lana Wachowski (born Larry Wachowski, June 21, 1965) and Lilly Wachowski (born Andy Wachowski, December 29, 1967) are American film and television directors, writers and producers. The sisters are both trans women. Together known as the Wacho ...
, is about British government trying to brainwash people by media, obtain their support by fearmongering, monitor them by mass surveillance devices, and suppress or kill any political or social objection. * The movie '' Enemy of the State'' a 1998 American
action Action may refer to: * Action (philosophy), something which is done by a person * Action principles the heart of fundamental physics * Action (narrative), a literary mode * Action fiction, a type of genre fiction * Action game, a genre of video gam ...
-
thriller film Thriller film, also known as suspense film or suspense thriller, is a broad film genre that evokes excitement and suspense in the audience. The suspense element found in most films' plots is particularly exploited by the filmmaker in this genre. ...
directed by
Tony Scott Anthony David Leighton Scott (21 June 1944 – 19 August 2012) was a British film director and producer. He made his theatrical film debut with ''The Hunger (1983 film), The Hunger'' (1983) and went on to direct highly successful action and t ...
is about using U.S. citizens' data to search their background and surveillance devices to capture everyone that is identified as "enemy". *The British TV series '' The Capture'' explores the potential for video surveillance to be manipulated in order to support a conviction to pursue a political agenda.


See also

*
Computer and network surveillance Computer and network surveillance is the monitoring of computer activity and data stored locally on a computer or data being transferred over computer networks such as the Internet. This monitoring is often carried out covertly and may be comple ...
*
Mass surveillance Mass surveillance is the intricate surveillance of an entire or a substantial fraction of a population in order to monitor that group of citizens. The surveillance is often carried out by Local government, local and federal governments or intell ...
*
Sousveillance Sousveillance ( ) is the recording of an activity by a member of the public, rather than a person or organisation in authority, typically by way of small wearable technology, wearable or portable personal technologies. The term, coined by Steve M ...
*
Surveillance aircraft Surveillance aircraft are aircraft used for surveillance. They are primarily operated by military forces and government agencies in roles including intelligence gathering, maritime patrol, battlefield and airspace surveillance, observation (e. ...
*
Surveillance art Surveillance art is the use of technology intended to record human behavior in a way that offers commentary on the process of surveillance or the technology used to surveil. Surveillance art manifests itself in many different forms, from short fi ...
*
Surveillance capitalism Surveillance capitalism is a concept in political economics which denotes the widespread collection and commodification of personal data by corporations. This phenomenon is distinct from government surveillance, although the two can be mutuall ...
* Surveillance system monitor * Trapwire * Participatory surveillance *
PRISM (surveillance program) PRISM is a code name for a program under which the United States National Security Agency (NSA) collects internet communications from various U.S. internet companies. The program is also known by the SIGINT Activity Designator, SIGAD . PRISM ...
* The Age of Surveillance Capitalism * Vulkan files leak * Surveillance in New Zealand * Surveillance in the Ottoman Empire


References


Further reading

* Allmer, Thomas. (2012). ''Towards a Critical Theory of Surveillance in Informational Capitalism''. Frankfurt am Main: Peter Lang. * Andrejevic, Mark. 2007. ''iSpy: Surveillance and Power in the Interactive Era''. Lawrence, KS:
University Press of Kansas The University Press of Kansas is a publisher located in Lawrence, Kansas. Operated by the University of Kansas, it represents the six state universities in the US state of Kansas: Emporia State University, Fort Hays State University, Kansas ...
. * Ball, Kirstie, Kevin D. Haggerty, and David Lyon, eds. (2012). ''Routledge Handbook of Surveillance Studies''. New York:
Routledge Routledge ( ) is a British multinational corporation, multinational publisher. It was founded in 1836 by George Routledge, and specialises in providing academic books, academic journals, journals and online resources in the fields of the humanit ...
. * Brayne, Sarah. (2020). ''Predict and Surveil: Data, Discretion, and the Future of Policing''. New York:
Oxford University Press Oxford University Press (OUP) is the publishing house of the University of Oxford. It is the largest university press in the world. Its first book was printed in Oxford in 1478, with the Press officially granted the legal right to print books ...
. * Browne, Simone. (2015). ''Dark Matters: On the Surveillance of Blackness''. Durham:
Duke University Press Duke University Press is an academic publisher and university press affiliated with Duke University. It was founded in 1921 by William T. Laprade as The Trinity College Press. (Duke University was initially called Trinity College). In 1926 ...
. * Coleman, Roy, and Michael McCahill. 2011. ''Surveillance & Crime''. Thousand Oaks, Calif.: Sage. * Feldman, Jay. (2011). ''Manufacturing Hysteria: A History of Scapegoating, Surveillance, and Secrecy in Modern America''. New York, NY:
Pantheon Books Pantheon Books is an American book publishing imprint. Founded in 1942 as an independent publishing house in New York City by Kurt and Helen Wolff, it specialized in introducing progressive European works to American readers. In 1961, it was ...
. * Fuchs, Christian, Kees Boersma, Anders Albrechtslund, and Marisol Sandoval, eds. (2012). "Internet and Surveillance: The Challenges of Web 2.0 and Social Media". New York:
Routledge Routledge ( ) is a British multinational corporation, multinational publisher. It was founded in 1836 by George Routledge, and specialises in providing academic books, academic journals, journals and online resources in the fields of the humanit ...
. * Garfinkel, Simson, ''Database Nation; The Death of Privacy in the 21st Century''.
O'Reilly & Associates O'Reilly Media, Inc. (formerly O'Reilly & Associates) is an American learning company established by Tim O'Reilly that provides technical and professional skills development courses via an online learning platform. O'Reilly also publishes b ...
, Inc. * Gilliom, John. (2001). ''Overseers of the Poor: Surveillance, Resistance, and the Limits of Privacy'',
University Of Chicago Press The University of Chicago Press is the university press of the University of Chicago, a Private university, private research university in Chicago, Illinois. It is the largest and one of the oldest university presses in the United States. It pu ...
, * Haque, Akhlaque. (2015). Surveillance, Transparency and Democracy: Public Administration in the Information Age.
University of Alabama Press The University of Alabama Press is a university press founded in 1945 and is the scholarly publishing arm of the University of Alabama. An editorial board composed of representatives from all doctoral degree granting public universities within Al ...
, Tuscaloosa, AL. * Harris, Shane. (2011). ''The Watchers: The Rise of America's Surveillance State''. London, UK:
Penguin Books Ltd Penguin Books Limited is a German-owned English publishing house. It was co-founded in 1935 by Allen Lane with his brothers Richard and John, as a line of the publishers the Bodley Head, only becoming a separate company the following year.
. * Hier, Sean P., & Greenberg, Joshua (Eds.). (2009). ''Surveillance: Power, Problems, and Politics''. Vancouver, CA:
UBC Press The University of British Columbia Press (UBC Press) is a university press that is part of the University of British Columbia. It is a mid-sized scholarly publisher, and the largest in Western Canada. The press is based in Vancouver, British Col ...
. * Jensen, Derrick and Draffan, George (2004) ''Welcome to the Machine: Science, Surveillance, and the Culture of Control'' Chelsea Green Publishing Company. * Lewis, Randolph. (2017). ''Under Surveillance: Being Watched in Modern America''. Austin:
University of Texas Press The University of Texas Press (or UT Press) is the university press of the University of Texas at Austin. Established in 1950, the Press publishes scholarly and trade books in several areas, including Latin American studies, Caribbean, Caribbea ...
. * Lyon, David (1994). ''The Electronic Eye: The Rise of Surveillance Society''. Minneapolis:
University of Minnesota Press The University of Minnesota Press is a university press that is part of the University of Minnesota. It had annual revenues of just over $8 million in fiscal year 2018. Founded in 1925, the University of Minnesota Press is best known for its book ...
. * Lyon, David (2001). ''Surveillance Society: Monitoring in Everyday Life''. Philadelphia:
Open University Press McGraw Hill is an American education science company that provides educational content, software, and services for students and educators across various levels—from K-12 to higher education and professional settings. They produce textbooks, ...
. * Lyon, David (Ed.). (2006). ''Theorizing Surveillance: The Panopticon and Beyond''. Cullompton, UK:
Willan Publishing Taylor & Francis Group is an international company originating in the United Kingdom that publishes books and academic journals. Its parts include Taylor & Francis, CRC Press, Routledge, F1000 Research and Dovepress. It is a division of I ...
. * Lyon, David (2007). ''Surveillance Studies: An Overview''. Cambridge: Polity Press. * Lyon, David (2018). ''The Culture of Surveillance: Watching as a Way of Life''. Cambridge: Polity Press. * Marx, Gary T. (2016) ''Windows into the Soul: Surveillance and Society in an Age of High Technology''. Chicago:
University of Chicago Press The University of Chicago Press is the university press of the University of Chicago, a Private university, private research university in Chicago, Illinois. It is the largest and one of the oldest university presses in the United States. It pu ...
. * Matteralt, Armand. (2010). ''The Globalization of Surveillance''. Cambridge, UK:
Polity Press Polity is an academic publisher in the social sciences and humanities. It was established in 1984 in Cambridge by Anthony Giddens, David Held and John Thompson at the University of Cambridge. Giddens later reported: "We didn't have any publ ...
. * Monahan, Torin, ed. (2006). ''Surveillance and Security: Technological Politics and Power in Everyday Life''. New York:
Routledge Routledge ( ) is a British multinational corporation, multinational publisher. It was founded in 1836 by George Routledge, and specialises in providing academic books, academic journals, journals and online resources in the fields of the humanit ...
. * Monahan, Torin. (2010). ''Surveillance in the Time of Insecurity''. New Brunswick:
Rutgers University Press Rutgers University Press (RUP) is a nonprofit academic publishing house, operating in New Brunswick, New Jersey under the auspices of Rutgers University Rutgers University ( ), officially Rutgers, The State University of New Jersey, is a Pub ...
. * Monahan, Torin, and David Murakami Wood, eds. (2018). ''Surveillance Studies: A Reader''. New York:
Oxford University Press Oxford University Press (OUP) is the publishing house of the University of Oxford. It is the largest university press in the world. Its first book was printed in Oxford in 1478, with the Press officially granted the legal right to print books ...
. * Parenti, Christian ''The Soft Cage: Surveillance in America From Slavery to the War on Terror'',
Basic Books Basic Books is a book publisher founded in 1950 and located in New York City, now an imprint of Hachette Book Group. It publishes books in the fields of psychology, philosophy, economics, science, politics, sociology, current affairs, and his ...
, * Petersen, J.K. (2012) ''Handbook of Surveillance Technologies, Third Edition'', Taylor & Francis:
CRC Press The CRC Press, LLC is an American publishing group that specializes in producing technical books. Many of their books relate to engineering, science and mathematics. Their scope also includes books on business, forensics and information technol ...
, 1020 pp., * Staples, William G. (2000). ''Everyday Surveillance: Vigilance and Visibility in Post-Modern Life''. Lanham, MD:
Rowman & Littlefield Publishers Rowman & Littlefield Publishing Group is an American independent academic publishing company founded in 1949. Under several imprints, the company offers scholarly books for the academic market, as well as trade books. The company also owns ...
. * Yan, W. (2019). ''Introduction to Intelligent Surveillance: Surveillance Data Capture, Transmission, and Analytics ''. Springer Publishers.


General information

* (Volume 66, Number 3, July–August)
ACLU, "The Surveillance-Industrial Complex: How the American Government Is Conscripting Businesses and Individuals in the Construction of a Surveillance Society"

Balkin, Jack M. (2008). "The Constitution in the National Surveillance State", Yale Law School

Bibo, Didier and Delmas-Marty, "The State and Surveillance: Fear and Control"

EFF Privacy Resources



ICO. (September 2006). "A Report on the Surveillance Society for the Information Commissioner by the Surveillance Studies Network".


*


Historical information



��FBI counterintelligence programs designed to neutralize political dissidents

– A Short History of Electronic Surveillance in the United States


Legal resources


EFF Legal CasesGuide to lawful intercept legislation around the world


External links

* {{Authority control Crime prevention Espionage techniques Law enforcement Law enforcement techniques National security Privacy Security