HOME

TheInfoList



OR:

Surveillance tools are all means technological provided and used by the
surveillance industry The mass surveillance industry is a multibillion-dollar industry that has undergone phenomenal growth since 2001. According to data provided by ''The Wall Street Journal'', the retail market for surveillance tools has grown from "nearly zero" in ...
,
police The police are a constituted body of persons empowered by a state, with the aim to enforce the law, to ensure the safety, health and possessions of citizens, and to prevent crime and civil disorder. Their lawful powers include arrest a ...
or
military intelligence Military intelligence is a military discipline that uses information collection and analysis approaches to provide guidance and direction to assist commanders in their decisions. This aim is achieved by providing an assessment of data from ...
, and national security institutions that enable individual surveillance and mass surveillance. Steven Ashley in 2008 listed the following components used for surveillance: *Primarily electronic **Digital still and video cameras (
CCTV Closed-circuit television (CCTV), also known as video surveillance, is the use of video cameras to transmit a signal to a specific place, on a limited set of monitors. It differs from broadcast television in that the signal is not openly tr ...
s) **
GPS The Global Positioning System (GPS), originally Navstar GPS, is a satellite-based radionavigation system owned by the United States government and operated by the United States Space Force. It is one of the global navigation satellite sy ...
s for
tracking Tracking may refer to: Science and technology Computing * Tracking, in computer graphics, in match moving (insertion of graphics into footage) * Tracking, composing music with music tracker software * Eye tracking, measuring the position of ...
** Electronic toll takers **
Computer surveillance Computer and network surveillance is the monitoring of computer activity and data stored locally on a computer or data being transferred over computer networks such as the Internet. This monitoring is often carried out covertly and may be comple ...
**
Phone tapping Telephone tapping (also wire tapping or wiretapping in American English) is the monitoring of telephone and Internet-based conversations by a third party, often by covert means. The wire tap received its name because, historically, the monitorin ...
**
Cell phone monitoring Mobile phone tracking is a process for identifying the location of a mobile phone, whether stationary or moving. Localization may be effected by a number of technologies, such as the multilateration of radio signals between (several) cell towers ...
**
Voice The human voice consists of sound made by a human being using the vocal tract, including talking, singing, laughing, crying, screaming, shouting, humming or yelling. The human voice frequency is specifically a part of human sound production ...
, facial features, walking gait and other
biometric Biometrics are body measurements and calculations related to human characteristics. Biometric authentication (or realistic authentication) is used in computer science as a form of identification and access control. It is also used to identify ...
characteristics **
Covert listening device A covert listening device, more commonly known as a bug or a wire, is usually a combination of a miniature radio transmitter with a microphone. The use of bugs, called bugging, or wiretapping is a common technique in surveillance, espionage ...
s or "bugs", tiny, hidden microphone and short-range radio transmitter **
directional microphone A microphone, colloquially called a mic or mike (), is a transducer that converts sound into an electrical signal. Microphones are used in many applications such as telephones, hearing aids, public address systems for concert halls and public ...
s *primarily chemical **
Artificial nose An electronic nose is an electronic sensing device intended to detect odors or flavors. The expression "electronic sensing" refers to the capability of reproducing human senses using sensor arrays and pattern recognition systems. Since 1982, res ...
s **Chemical markers like UV markers **DNA sensors:
Biochip In molecular biology, biochips are engineered substrates ("miniaturized laboratories") that can host large numbers of simultaneous biochemical reactions. One of the goals of biochip technology is to efficiently screen large numbers of biological ...
etc., for screening tiniest traces of body material *Other **Airplanes,
unmanned aerial vehicles An unmanned aerial vehicle (UAV), commonly known as a drone, is an aircraft without any human pilot, crew, or passengers on board. UAVs are a component of an unmanned aircraft system (UAS), which includes adding a ground-based controlle ...
and satellites **
Night-vision goggles A night-vision device (NVD), also known as a night optical/observation device (NOD), night-vision goggle (NVG), is an optoelectronic device that allows visualization of images in low levels of light, improving the user's night vision. The de ...
or
telescope A telescope is a device used to observe distant objects by their emission, absorption, or reflection of electromagnetic radiation. Originally meaning only an optical instrument using lenses, curved mirrors, or a combination of both to obse ...
s **Laser beam bounced off a window to record vibrations in the pane from conversations in the room **Discarded items containing
personal information Personal data, also known as personal information or personally identifiable information (PII), is any information related to an identifiable person. The abbreviation PII is widely accepted in the United States, but the phrase it abbreviates ha ...
, like ***phone bills, ***credit-card statements and ***computer hard drives (using
digital forensics Digital forensics (sometimes known as digital forensic science) is a branch of forensic science encompassing the recovery, investigation, examination and analysis of material found in digital devices, often in relation to mobile devices and comp ...
) The electronic means, especially when combined with Internet features (
ubiquitous computing Ubiquitous computing (or "ubicomp") is a concept in software engineering, hardware engineering and computer science where computing is made to appear anytime and everywhere. In contrast to desktop computing, ubiquitous computing can occur using ...
, IoT) and enhanced by
artificial intelligence Artificial intelligence (AI) is intelligence—perceiving, synthesizing, and inferring information—demonstrated by machines, as opposed to intelligence displayed by animals and humans. Example tasks in which this is done include speech r ...
analysis methods readily lend themselves to mass surveillance. This is why
countersurveillance Countersurveillance refers to measures that are usually undertaken by the public to prevent surveillance, including covert surveillance. Countersurveillance may include electronic methods such as technical surveillance counter-measures, which is t ...
measures like
anonymization Data anonymization is a type of information sanitization whose intent is privacy protection. It is the process of removing personally identifiable information from data sets, so that the people whom the data describe remain anonymous. Overv ...
and
end-to-end encryption End-to-end encryption (E2EE) is a system of communication where only the communicating users can read the messages. In principle, it prevents potential eavesdroppers – including telecom providers, Internet providers, malicious actors, and eve ...
have become critical. Devices like chemical markers, on the other hand are more suited and in fact designed mainly for monitoring individuals.


See also

*
Global surveillance disclosures (2013–present) Ongoing news reports in the international media have revealed operational details about the Anglophone cryptographic agencies' global surveillance of both foreign and domestic nationals. The reports mostly emanate from a cache of top secre ...
*
List of government mass surveillance projects This is a list of government surveillance projects and related databases throughout the world. International * ECHELON: A signals intelligence (SIGINT) collection and analysis network operated on behalf of the five signatory states to the ...
* National Applications Office *
Surveillance Detection Unit Surveillance Detection Units (SDU) are organizations belonging to the US Government that have conducted secret surveillance that potentially broke national laws in various European countries. The SDUs were publicly discussed in Congress in 2000 and ...


References


External links


pdf
* {{cite web , title=Digital Surveillance: Tools of the Spy Trade , website=Scientific American , doi=10.1038/scientificamerican0908-70 , url=https://www.scientificamerican.com/article/digital-surveillance-tools-of-the-spy-trade/ , ref={{sfnref , Scientific American , access-date=August 11, 2020 Mass surveillance Mass surveillance industry