2107:"transparent" by wearing See-Change cameras on their body to prevent keeping secrets from the public about their daily work activity. In this society, it becomes mandatory to share personal information and experiences because it is The Circle's belief that everyone should have access to all information freely. However, as Eggers illustrates, this takes a toll on the individuals and creates a disruption of power between the governments and the private company. The Circle presents extreme ideologies surrounding mandatory surveillance. Eamon Bailey, one of the Wise Men, or founders of The Circle, believes that possessing the tools to access information about anything or anyone, should be a human right given to all of the world's citizens. By eliminating all secrets, any behaviour that has been deemed shameful will either become normalized or no longer considered shocking. Negative actions will eventually be eradicated from society altogether, through the fear of being exposed to other citizens This would be achieved in part by everyone going transparent, something that Bailey highly supports, although none of the Wise Men ever became transparent themselves. One major goal of The Circle is to have all of the world's information filtered through The Circle, a process they call "Completion". A single, private company would then have full access and control over all information and privacy of individuals and governments. Ty Gospodinov, the first founder of The Circle, has major concerns about the completion of the circle. He warns that this step would give The Circle too much power and control, and would quickly lead to
98:
380:
1697:
886:, Avi Marciano maps the harms caused by biometric surveillance, traces their theoretical origins, and brings these harms together in one integrative framework to elucidate their cumulative power. Marciano proposes four types of harms: Unauthorized use of bodily information, denial or limitation of access to physical spaces, bodily social sorting, and symbolic ineligibility through construction of marginality and otherness. Biometrics' social power, according to Marciano, derives from three main features: their complexity as "enigmatic technologies", their objective-scientific image, and their increasing agency, particularly in the context of automatic decision-making.
1688:." That is, one does not have a right to privacy regarding illegal activities, while those following the law suffer no harm from surveillance and so have no standing to object to it. Beyond the heroically self-serving identification of what is wrong with what is illegal, the ethical fly in this ointment is the tacit premise that the individual has no duty to preserve the health of the state—the antithesis of the principle that only the consent of the governed can adequately serve as the moral foundation of a (just) state and warrant the vast gulf between its power (and agency) and that of the individual.
90:
1038:
operators if something suspicious is occurring. This greatly increases the amount of area that can be continuously monitored, while reducing the number of human operators required. Thus a swarm of automated, self-directing drones can automatically patrol a city and track suspicious individuals, reporting their activities back to a centralized monitoring station. In addition, researchers also investigate possibilities of autonomous surveillance by large groups of micro aerial vehicles stabilized by decentralized bio-inspired swarming rules.
1127:, which are national network of surveillance centers that are located in over 30 states. The centers will collect and analyze vast amounts of data on U.S. citizens. It will get this data by consolidating personal information from sources such as state driver's licensing agencies, hospital records, criminal records, school records, credit bureaus, banks, etc.—and placing this information in a centralized database that can be accessed from all of the centers, as well as other federal law enforcement and intelligence agencies.
1793:
1379:(RFID) tagging is the use of very small electronic devices (called "RFID tags") which are applied to or incorporated into a product, animal, or person for the purpose of identification and tracking using radio waves. The tags can be read from several meters away. They are extremely inexpensive, costing a few cents per piece, so they can be inserted into many types of everyday products without significantly increasing the price, and can be used to track and identify these objects for a variety of purposes.
1630:
476:
794:, and extract "communities of interest"—groups of people who call each other regularly, or groups that regularly visit certain sites on the Internet. AT&T originally built the system to develop "marketing leads", but the FBI has regularly requested such information from phone companies such as AT&T without a warrant, and, after using the data, stores all information received in its own databases, regardless of whether or not the information was ever useful in an investigation.
674:
1769:
names and what they have been reading, so that the government cannot easily subvert their organization, arrest, or kill them. Other critics state that while a person might not have anything to hide right now, the government might later implement policies that they do wish to oppose, and that opposition might then be impossible due to mass surveillance enabling the government to identify and remove political threats. Further, other critics point to the fact that most people
360:, just as they would to normal cell phone towers. Once the phone is connected to the device, there is no way for the user to know that they are being tracked. The operator of the stingray is able to extract information such as location, phone calls, and text messages, but it is widely believed that the capabilities of the StingRay extend much further. A lot of controversy surrounds the StingRay because of its powerful capabilities and the secrecy that surrounds it.
1477:(PSR) is a class of radar sensors that monitor activity surrounding or on critical infrastructure areas such as airports, seaports, military installations, national borders, refineries and other critical industry and the like. Such radars are characterized by their ability to detect movement at ground level of targets such as an individual walking or crawling towards a facility. Such radars typically have ranges of several hundred metres to over 10 kilometres.
8792:
1057:, which enables the corporation to better tailor their products and/or services to be desirable by their customers. Although there is a common belief that monitoring can increase productivity, it can also create consequences such as increasing chances of deviant behavior and creating punishments that are not equitable to their actions. Additionally, monitoring can cause resistance and backlash because it insinuates an employer's suspicion and lack of trust.
52:
959:
807:
1369:
1705:
905:
1449:. The chip is encased in glass, and stores a "VeriChip Subscriber Number" which the scanner uses to access their personal information, via the Internet, from Verichip Inc.'s database, the "Global VeriChip Subscriber Registry". Thousands of people have already had them inserted. In Mexico, for example, 160 workers at the Attorney General's office were required to have the chip injected for identity verification and
465:
7307:
857:, which looks at some of the major markers in the body's DNA to produce a match. The FBI is spending $ 1 billion to build a new biometric database, which will store DNA, facial recognition data, iris/retina (eye) data, fingerprints, palm prints, and other biometric data of people living in the United States. The computers running the database are contained in an underground facility about the size of two
1414:
287:, which is a data mining system that gives the United States government direct access to information from technology companies. Through accessing this information, the government is able to obtain search history, emails, stored information, live chats, file transfers, and more. This program generated huge controversies in regards to surveillance and privacy, especially from U.S. citizens.
1850:, believe that in addition to its obvious function of identifying and capturing individuals who are committing undesirable acts, surveillance also functions to create in everyone a feeling of always being watched, so that they become self-policing. This allows the State to control the populace without having to resort to physical force, which is expensive and otherwise problematic.
200:
850:, involves computers recognizing a person's emotional state based on an analysis of their facial expressions, how fast they are talking, the tone and pitch of their voice, their posture, and other behavioral traits. This might be used for instance to see if a person's behavior is suspect (looking around furtively, "tense" or "angry" facial expressions, waving arms, etc.).
1621:(IoT), is a network of physical devices. These devices can collect data to one another without human intervention. IoTs can be used for identification, monitoring, location tracking, and health tracking. While IoTs can be used as time-saving tools that make activities simpler, they raise the concern of government surveillance and privacy regarding how data will be used.
1952:
text messages and photographs depicting illicit activities. During his trial, Diaz attempted to have the information from his cell phone removed from evidence, but the courts deemed it as lawful and Diaz's appeal was denied on the
California State Court level and, later, the Supreme Court level. Just three short years after, this decision was overturned in the case
1970:
his cell phone, finding pictures of other weapons, drugs, and of Riley showing gang signs. In court, the question arose whether searching the phone was lawful or if the search was protected by the 4th amendment of the constitution. The decision held that the search of Riley's cell phone during the arrest was illegal, and that it was protected by the 4th
Amendment.
1095:". Every use of a bank machine, payment by credit card, use of a phone card, call from home, checked out library book, rented video, or otherwise complete recorded transaction generates an electronic record. Public records—such as birth, court, tax and other records—are increasingly being digitized and made available online. In addition, due to laws like
507:). The amount of footage is also drastically reduced by motion sensors which record only when motion is detected. With cheaper production techniques, surveillance cameras are simple and inexpensive enough to be used in home security systems, and for everyday surveillance. Video cameras are one of the most common methods of surveillance.
3472:
650:, but many of them end up using them for general surveillance. For example, Washington, D.C. had 5,000 "traffic" cameras installed under this premise, and then after they were all in place, networked them all together and then granted access to the Metropolitan Police Department, so they could perform "day-to-day monitoring".
1122:
In addition to its own aggregation and profiling tools, the government is able to access information from third parties—for example, banks, credit companies or employers, etc.—by requesting access informally, by compelling access through the use of subpoenas or other procedures, or by purchasing data
442:
has been taking advantage of this ambiguity in the law by collecting metadata on "at least hundreds of millions" of "incidental" targets from around the world. The NSA uses an analytic tool known as CO-TRAVELER in order to track people whose movements intersect and to find any hidden connections with
1969:
case in which a man was arrested for his involvement in a drive-by shooting. A few days after the shooting the police made an arrest of the suspect (Riley), and, during the arrest, the police searched him. However, this search was not only of Riley's person, but also the police opened and searched
1862:
differentiates between two types of surveillance: vertical and horizontal. Vertical surveillance occurs when there is a dominant force, such as the government that is attempting to control or regulate the actions of a given society. Such powerful authorities often justify their incursions as a means
797:
Some people believe that the use of social networking sites is a form of "participatory surveillance", where users of these sites are essentially performing surveillance on themselves, putting detailed personal information on public websites where it can be viewed by corporations and governments. In
874:
are in development, which allow machines to identify certain emotions in people such as fear or stress, by measuring the temperature generated by blood flow to different parts of the face. Law enforcement officers believe that this has potential for them to identify when a suspect is nervous, which
2106:
exhibits a world where a single company called "The Circle" produces all of the latest and highest quality technologies from computers and smartphones, to surveillance cameras known as "See-Change cameras". This company becomes associated with politics when starting a movement where politicians go
1878:
argues that surveillance wields an immense racializing quality such that it operates as "racializing surveillance." Browne uses racializing surveillance to refer to moments when enactments of surveillance are used to reify boundaries, borders, and bodies along racial lines and where the outcome is
1866:
Horizontal diverges from vertical surveillance as the tracking shifts from an authoritative source to an everyday figure, such as a friend, coworker, or stranger that is interested in one's mundane activities. Individuals leave traces of information when they are online that reveal their interests
1823:
Some point to the blurring of lines between public and private places, and the privatization of places traditionally seen as public (such as shopping malls and industrial parks) as illustrating the increasing legality of collecting personal information. Traveling through many public places such as
1223:
sensors which can now be used to observe the activities of U.S. citizens. The satellites and aircraft sensors will be able to penetrate cloud cover, detect chemical traces, and identify objects in buildings and "underground bunkers", and will provide real-time video at much higher resolutions than
568:
requests, the total number of local government operated CCTV cameras was around 52,000 over the entirety of the UK. The prevalence of video surveillance in the UK is often overstated due to unreliable estimates being requoted; for example one report in 2002 extrapolated from a very small sample to
1951:
was a court case in the realm of cell phone privacy, even though the decision was later overturned. In this case, Gregory Diaz was arrested during a sting operation for attempting to sell ecstasy. During his arrest, police searched Diaz's phone and found more incriminating evidence including SMS
1773:
have things to hide. For example, if a person is looking for a new job, they might not want their current employer to know this. Also if an employer wishes total privacy to watch over their own employee and secure their financial information it may become impossible, and they may not wish to hire
1562:
As more people use faxes and e-mail the significance of surveilling the postal system is decreasing, in favor of
Internet and telephone surveillance. But interception of post is still an available option for law enforcement and intelligence agencies, in certain circumstances. This is not a common
1768:
Some critics state that the claim made by supporters should be modified to read: "As long as we do what we're told, we have nothing to fear." For instance, a person who is part of a political group which opposes the policies of the national government, might not want the government to know their
1553:
Law enforcement and intelligence services in the U.K. and the United States possess technology to remotely activate the microphones in cell phones, by accessing the phone's diagnostic/maintenance features, in order to listen to conversations that take place nearby the person who holds the phone.
1394:
In a 2003 editorial, CNET News.com's chief political correspondent, Declan McCullagh, speculated that, soon, every object that is purchased, and perhaps ID cards, will have RFID devices in them, which would respond with information about people as they walk past scanners (what type of phone they
611:
and facial recognition software, which will identify and track individuals everywhere they go. They will be connected to a centralized database and monitoring station, which will, upon completion of the project, contain a picture of the face of every person in China: over 1.3 billion people. Lin
1853:
With the development of digital technology, individuals have become increasingly perceptible to one another, as surveillance becomes virtual. Online surveillance is the utilization of the internet to observe one's activity. Corporations, citizens, and governments participate in tracking others'
1672:
Some of the surveillance systems (such as the camera system that has its feed run through a facial recognition system mentioned above) can also have other uses besides countering criminal activity. For instance, it can help in retrieving runaway children, abducted or missing adults and mentally
1657:
Another method on how surveillance can be used to fight criminal activity is by linking the information stream obtained from them to a recognition system (for instance, a camera system that has its feed run through a facial recognition system). This can for instance auto-recognize fugitives and
1494:
779:
The purpose of the SSNA algorithms program is to extend techniques of social network analysis to assist with distinguishing potential terrorist cells from legitimate groups of people.... In order to be successful SSNA will require information on the social interactions of the majority of people
347:
Law enforcement and intelligence services in the United
Kingdom and the United States possess technology to activate the microphones in cell phones remotely, by accessing phones' diagnostic or maintenance features in order to listen to conversations that take place near the person who holds the
239:
There is far too much data on the
Internet for human investigators to manually search through all of it. Therefore, automated Internet surveillance computers sift through the vast amount of intercepted Internet traffic to identify and report to human investigators the traffic that is considered
1037:
have automated much of the aerial surveillance process. They have developed systems consisting of large teams drone planes that pilot themselves, automatically decide who is "suspicious" and how to go about monitoring them, coordinate their activities with other drones nearby, and notify human
407:
feature on the iPhone 6 has drawn criticism from FBI director James B. Comey and other law enforcement officials since even lawful requests to access user content on the iPhone 6 will result in Apple supplying "gibberish" data that requires law enforcement personnel to either break the code
1170:
at their disposal, rather than gathering the sort of information which operatives can provide, may use less problematic forms of surveillance—such as those mentioned above. Nevertheless, the use of human infiltrators remains common. For instance, in 2007 documents surfaced showing that the
408:
themselves or to get the code from the phone's owner. Because the
Snowden leaks demonstrated that American agencies can access phones anywhere in the world, privacy concerns in countries with growing markets for smart phones have intensified, providing a strong incentive for companies like
1304:
Of the 321,545 law enforcement requests made to
Verizon, 54,200 of these requests were for "content" or "location" information—not just cell phone numbers or IP addresses. Content information included the actual text of messages, emails and the wiretapping of voice or messaging content in
1661:
A distinction here has to be made however on the type of surveillance employed. Some people that support video surveillance in city streets may not support indiscriminate telephone taps and vice versa. Besides the types, the way in which this surveillance is done also matters a lot; i.e.
824:
Biometric surveillance is a technology that measures and analyzes human physical and/or behavioral characteristics for authentication, identification, or screening purposes. Examples of physical characteristics include fingerprints, DNA, and facial patterns. Examples of mostly behavioral
240:
interesting or suspicious. This process is regulated by targeting certain "trigger" words or phrases, visiting certain types of web sites, or communicating via email or online chat with suspicious individuals or groups. Billions of dollars per year are spent by agencies, such as the
355:
tracker is an example of one of these tools used to monitor cell phone usage in the United States and the United
Kingdom. Originally developed for counterterrorism purposes by the military, they work by broadcasting powerful signals that cause nearby cell phones to transmit their
5290:
Physical surveillance is the act of making observations of people, vehicles, or the activities occurring at specific locations. Physical surveillance may take place either at a fixed location, which is known as a stakeout, or in a continually moving situation, referred to as a
1102:
Information relating to many of these individual transactions is often easily available because it is generally not guarded in isolation, since the information, such as the title of a movie a person has rented, might not seem sensitive. However, when many such transactions are
5095:
Saska, M.; Chudoba, J.; Preucil, L.; Thomas, J.; Loianno, G.; Tresnak, A.; Vonasek, V.; Kumar, V. Autonomous
Deployment of Swarms of Micro-Aerial Vehicles in Cooperative Surveillance. In Proceedings of 2014 International Conference on Unmanned Aircraft Systems (ICUAS).
1291:
Mobile carrier antennas are also commonly used to collect geolocation data on mobile phones. The geographical location of a powered mobile phone (and thus the person carrying it) can be determined easily (whether it is being used or not), using a technique known as
1052:
Corporate surveillance is the monitoring of a person or group's behavior by a corporation. The data collected is most often used for marketing purposes or sold to other corporations, but is also regularly shared with government agencies. It can be used as a form of
1669:. Surveillance can help reconstruct an incident and prove guilt through the availability of footage for forensics experts. Surveillance can also influence subjective security if surveillance resources are visible or if the consequences of surveillance can be felt.
1437:
Several types of microchips have been developed in order to control and monitor certain types of people, such as criminals, political figures and spies, a "killer" tracking chip patent was filed at the German Patent and
Trademark Office (DPMA) around May 2009.
1981:
is the practice of avoiding surveillance or making surveillance difficult. Developments in the late twentieth century have caused counter surveillance to dramatically grow in both scope and complexity, such as the Internet, increasing prevalence of electronic
1390:
to have all of their movements tracked with RFID chips. Some critics have expressed fears that people will soon be tracked and scanned everywhere they go. On the other hand, RFID tags in newborn baby ID bracelets put on by hospitals have foiled kidnappings.
631:
that will link up cameras across a city to a centralized monitoring station, identify and track individuals and vehicles as they move through the city, and report "suspicious" activity (such as waving arms, looking side-to-side, standing in a group, etc.).
1456:
Implantable microchips have also been used in healthcare settings, but ethnographic researchers have identified a number of ethical problems with such uses; these problems include unequal treatment, diminished trust, and possible endangerment of patients.
1072:
in this context is the process of assembling information about a particular individual or group in order to generate a profile — that is, a picture of their patterns and behavior. Data profiling can be an extremely powerful tool for psychological and
1099:, web traffic and online purchases are also available for profiling. Electronic record-keeping makes data easily collectable, storable, and accessible—so that high-volume, efficient aggregation and analysis is possible at significantly lower costs.
612:
Jiang Huai, the head of China's "Information Security Technology" office (which is in charge of the project), credits the surveillance systems in the United States and the U.K. as the inspiration for what he is doing with the Golden Shield Project.
537:, Illinois, recently used a $ 5.1 million Homeland Security grant to install an additional 250 surveillance cameras, and connect them to a centralized monitoring center, along with its preexisting network of over 2000 cameras, in a program known as
418:
has made several moves to emphasize their concern for privacy, in order to appeal to more consumers. In 2011, Apple stopped the use of permanent device identifiers, and in 2019, they banned the ability of third parties to track on children’s apps.
135:
for intelligence gathering, including espionage, prevention of crime, the protection of a process, person, group or object, or the investigation of crime. It is also used by criminal organizations to plan and commit crimes, and by businesses to
495:. Cameras and recording equipment used to be relatively expensive and required human personnel to monitor camera footage, but analysis of footage has been made easier by automated software that organizes digital video footage into a searchable
7193:"Special Issue on Surveillance Capitalism – nine articles analyzing financial, social, political, legal, historical, security and other aspects of US and international surveillance and spying programs and their relation to capitalism"
2012:. Counter-surveillance can be also used in applications to prevent corporate spying, or to track other criminals by certain criminal entities. It can also be used to deter stalking methods used by various entities and organizations.
363:
Mobile phones are also commonly used to collect location data. The geographical location of a mobile phone (and thus the person carrying it) can be determined easily even when the phone is not being used, using a technique known as
450:(GCHQ) can access information collected by the NSA on American citizens. Once the data has been collected, the GCHQ can hold on to it for up to two years. The deadline can be extended with the permission of a "senior UK official".
321:—have contracts with the FBI, requiring them to keep their phone call records easily searchable and accessible for Federal agencies, in return for $ 1.8 million per year. Between 2003 and 2005, the FBI sent out more than 140,000 "
1088:", or was simply not documented at all. Correlation of paper-based records was a laborious process—it required human intelligence operators to manually dig through documents, which was time-consuming and incomplete, at best.
693:
enables governments to gather detailed information about peoples' friends, family, and other contacts. Since much of this information is voluntarily made public by the users themselves, it is often considered to be a form of
2595:
3503:
752:(DHS) are investing heavily in research involving social network analysis. The intelligence community believes that the biggest threat to U.S. power comes from decentralized, leaderless, geographically dispersed groups of
2970:
2051:
system consisting of human operatives, informants, and two-way "telescreens" in people's homes. Because of the impact of this book, mass-surveillance technologies are commonly called "Orwellian" when they are considered
1819:
Kate Martin, of the Center For National Security Studies said of the use of military spy satellites being used to monitor the activities of U.S. citizens: "They are laying the bricks one at a time for a police state."
780:
around the globe. Since the Defense Department cannot easily distinguish between peaceful citizens and terrorists, it will be necessary for them to gather data on innocent civilians as well as on potential terrorists.
1444:
is an RFID device produced by a company called Applied Digital Solutions (ADS). Verichip is slightly larger than a grain of rice, and is injected under the skin. The injection reportedly feels similar to receiving a
1152:
may surreptitiously track and report on the movements and contacts of a person of interest. Such following by one or more people may provide useful in formation in relatively densely populated urban environments.
181:
is by definition covert and typically illegal according to the rules of the observed party, whereas most types of surveillance are overt and are considered legal or legitimate by state authorities. International
6155:
564:, the vast majority of video surveillance cameras are not operated by government bodies, but by private individuals or companies, especially to monitor the interiors of shops and businesses. According to 2011
1433:
typically contains a unique ID number that can be linked to information contained in an external database, such as personal identification, medical history, medications, allergies, and contact information.
7231:
2302:, is about British government trying to brainwash people by media, obtain their support by fearmongering, monitor them by mass surveillance devices, and suppress or kill any political or social objection.
1650:. They argue that surveillance can reduce crime by three means: by deterrence, by observation, and by reconstruction. Surveillance can deter by increasing the chance of being caught, and by revealing the
313:(CALEA) requires that all telephone and VoIP communications be available for real-time wiretapping by Federal law enforcement and intelligence agencies. Two major telecommunications companies in the U.S.—
1824:
government offices is hardly optional for most people, yet consumers have little choice but to submit to companies' surveillance practices. Surveillance techniques are not created equal; among the many
236:, all phone calls and broadband Internet traffic (emails, web traffic, instant messaging, etc.) are required to be available for unimpeded real-time monitoring by federal law enforcement agencies.
1832:
requires the least cooperation. Unlike automatic fingerprint reading, which requires an individual to press a finger against a machine, this technique is subtle and requires little to no consent.
8310:
1479:
Alternate technologies include laser-based systems. These have the potential for very high target position accuracy, however they are less effective in the presence of fog and other obscurants.
5865:
4727:
1395:
have, what type of shoes they have on, which books they are carrying, what credit cards or membership cards they have, etc.). This information could be used for identification, tracking, or
931:
Digital imaging technology, miniaturized computers, and numerous other technological advances over the past decade have contributed to rapid advances in aerial surveillance hardware such as
1574:
have performed twelve separate mail-opening campaigns targeted towards U.S. citizens. In one of these programs, more than 215,000 communications were intercepted, opened, and photographed.
403:
efforts. The phone encrypts e-mails, contacts, and photos with a code generated by a complex mathematical algorithm that is unique to an individual phone, and is inaccessible to Apple. The
4200:
Social Networking Sites and the Surveillance Society. A Critical Case Study of the Usage of studiVZ, Facebook, and MySpace by Students in Salzburg in the Context of Electronic Surveillance
576:
In the Netherlands, one example city where there are cameras is The Hague. There, cameras are placed in city districts in which the most illegal activity is concentrated. Examples are the
616:
1237:
8419:
510:
As of 2016, there are about 350 million surveillance cameras worldwide. About 65% of these cameras are installed in Asia. The growth of CCTV has been slowing in recent years. In 2018,
275:, on a computer system, they can easily gain unauthorized access to this data. Such software could be installed physically or remotely. Another form of computer surveillance, known as
6920:
Fuchs, Christian, Kees Boersma, Anders Albrechtslund, and Marisol Sandoval, eds. (2012). "Internet and Surveillance: The Challenges of Web 2.0 and Social Media". New York: Routledge.
1867:
and desires of which others observe. While this can allow people to become interconnected and develop social connections online, it can also increase potential risk to harm, such as
1271:), it corroborates the subject's identifying data. In this case it may create an electronic trail when it is checked and scanned, which can be used in profiling, as mentioned above.
1300:
near the owner of the phone. Dr. Victor Kappeler of Eastern Kentucky University indicates that police surveillance is a strong concern, stating the following statistics from 2013:
1673:
disabled people. Other supporters simply believe that there is nothing that can be done about the loss of privacy, and that people must become accustomed to having no privacy. As
2959:
6343:
1879:
discriminatory treatment of those who are negatively racialized by such surveillance. Browne argues racializing surveillance pertains to policing what is "in or out of place."
831:
is the use of the unique configuration of a person's facial features to accurately identify them, usually from surveillance video. Both the Department of Homeland Security and
1990:, and large corporate and government computer databases. Other examples include encrypted messenger apps such as Signal and privacy cryptocurrencies such as Monero and ZCash.
955:
ski resort hired 'eye in the sky' aerial photography of its competitors' parking lots to judge the success of its marketing initiatives as it developed starting in the 1950s.
325:" ordering phone companies to hand over information about their customers' calling and Internet histories. About half of these letters requested information on U.S. citizens.
5823:
Monahan, Torin; Fisher, Jill A. (2010). "Implanting inequality: Empirical evidence of social and ethical risks of implantable radio-frequency identification (RFID) devices".
430:
companies to build into their systems the ability to carry out a lawful wiretap, the law has not been updated to address the issue of smart phones and requests for access to
279:, involves reading electromagnetic emanations from computing devices in order to extract data from them at distances of hundreds of meters. The NSA runs a database known as "
4865:
771:
Jason Ethier of Northeastern University, in his study of modern social network analysis, said the following of the Scalable Social Network Analysis Program developed by the
643:
facial recognition software, FaceIt, to scan the crowd for potential criminals and terrorists in attendance at the event (it found 19 people with pending arrest warrants).
332:
software creates machine-readable text from intercepted audio, which is then processed by automated call-analysis programs, such as those developed by agencies such as the
4488:
2476:
Greenleaf, Richard E. (2018). "Historiography of the Mexican Inquisition: Evolution of Interpretations and Methodologies". In Perry, Mary Elizabeth; Cruz, Anne J. (eds.).
1531:
and video devices, or "bugs", are hidden electronic devices which are used to capture, record, and/or transmit data to a receiving party such as a law enforcement agency.
8414:
4967:
3130:
6673:
6152:
1360:, a global messaging system. The data showed that millions of secret tracking commands originated from Saudi in a duration of four-months, starting from November 2019.
4670:
514:
to have a huge surveillance network of over 170 million CCTV cameras with 400 million new cameras expected to be installed in the next three years, many of which use
372:
near the owner of the phone. The legality of such techniques has been questioned in the United States, in particular whether a court warrant is required. Records for
7988:
3833:"You're being watched: there's one CCTV camera for every 32 people in UK – Research shows 1.85m machines across Britain, most of them indoors and privately operated"
790:
AT&T developed a programming language called "Hancock", which is able to sift through enormous databases of phone call and Internet traffic records, such as the
1665:
Surveillance can also be used to give human operatives a tactical advantage through improved situational awareness, or through the use of automated processes, i.e.
1511:
tracking devices in people's vehicles to monitor their movements, without a warrant. In early 2009, they were arguing in court that they have the right to do this.
768:. These types of threats are most easily countered by finding important nodes in the network, and removing them. To do this requires a detailed map of the network.
8464:
8201:
5590:
3935:
3806:
951:
devices that can detect the heat from a human body at distances of up to 60 kilometers (37 mi). In an earlier instance of commercial aerial surveillance, the
7752:
7207:
ACLU, "The Surveillance-Industrial Complex: How the American Government Is Conscripting Businesses and Individuals in the Construction of a Surveillance Society"
5767:
479:
Surveillance cameras such as these are installed by the millions in many countries, and are nowadays monitored by automated computer programs instead of humans.
6961:
Haque, Akhlaque. (2015). Surveillance, Transparency and Democracy: Public Administration in the Information Age. University of Alabama Press, Tuscaloosa, AL.
3774:
5356:
3965:
8479:
8360:
7998:
4272:
4835:
1662:
indiscriminate telephone taps are supported by much fewer people than say telephone taps done only to people suspected of engaging in illegal activities.
1159:
In addition to operatives' infiltrating an organization, the surveilling party may exert pressure on certain members of the target organization to act as
483:
Surveillance cameras, or security cameras, are video cameras used for the purpose of observing an area. They are often connected to a recording device or
6054:. U.S. Senate Select Committee to Study Governmental Operations with Respect to Intelligence Activities. April 23, 1976. pp. 559–678. Archived from
6328:
6303:
8691:
7216:
1137:
1080:
Economic (such as credit card purchases) and social (such as telephone calls and emails) transactions in modern society create large amounts of stored
8399:
4246:
4119:
3445:
1805:
1736:
1096:
553:, which is an interconnected system of sensors including 18,000 CCTV cameras used for continual surveillance of the city by both police officers and
423:
310:
233:
97:
3696:
8656:
8595:
8484:
6541:
5941:
4735:
4584:
1996:
is the practice of the reversal of surveillance on other individuals or groups (e.g., citizens photographing police). Well-known examples include
6545:
5271:. Security and Professional Intelligence Education Series (3 ed.). Lanham, Maryland: Rowman & Littlefield (published 2019). p. 57.
2244:
portrays a society wherein people are drugged with sedatives and antidepressants, and have surveillance cameras watching them everywhere they go.
1156:
Organizations that have enemies who wish to gather information about the groups' members or activities face the issue of potential infiltration.
573:). More reliable estimates put the number of private and local government operated cameras in the United Kingdom at around 1.85 million in 2011.
5066:
657:
data), able to track people's movements throughout the city, and identify whom they have been with—has been argued by some to present a risk to
3279:
554:
4916:
4217:
3721:
Levine, E. S.; Tisch, Jessica; Tasso, Anthony; Joy, Michael (February 2017). "The New York City Police Department's Domain Awareness System".
3222:
1759:
society, with extremely limited, or non-existent political and/or personal freedoms. Fears such as this have led to numerous lawsuits such as
653:
The development of centralized networks of CCTV cameras watching public areas—linked to computer databases of people's pictures and identity (
267:
Computers can be a surveillance target because of the personal data stored on them. If someone is able to install software, such as the FBI's
8350:
4942:
600:
4993:
3409:
283:", which stores and indexes large numbers of emails of both American citizens and foreigners. Additionally, the NSA runs a program known as
8429:
8131:
7795:
5915:
4344:
947:, carries cameras that are capable of identifying an object the size of a milk carton from altitudes of 30,000 feet (9.1 km), and has
3850:
2672:
7778:
7745:
7650:
5625:
5337:. U.S. Senate Select Committee to Study Governmental Operations with Respect to Intelligence Activities. April 23, 1976. pp. 225–270
2323:
is about using U.S. citizens' data to search their background and surveillance devices to capture everyone that is identified as "enemy".
1068:
is the application of statistical techniques and programmatic algorithms to discover previously unnoticed relationships within the data.
992:", and general surveillance of the U.S. population. Miami-Dade police department ran tests with a vertical take-off and landing UAV from
121:
7275:
1514:
Several cities are running pilot projects to require parolees to wear GPS devices to track their movements when they get out of prison.
264:
to intercept and analyze all of this data to extract only the information which is useful to law enforcement and intelligence agencies.
6647:
6368:
6044:
1863:
to protect society from threats of violence or terrorism. Some individuals question when this becomes an infringement on civil rights.
376:
carrier alone (Sprint), showed that in a given year federal law enforcement agencies requested customer location data 8 million times.
7293:
3192:
2551:
2162:
surveillance to distinguish between people who are genetically engineered "superior" humans and genetically natural "inferior" humans.
8194:
7835:
5487:
5029:
1593:
is the coordinated surveillance of a location or person. Stakeouts are generally performed covertly and for the purpose of gathering
1267:
If the form of the identity card is "machine-readable", usually using an encoded magnetic stripe or identification number (such as a
741:
624:
1812:
with severely limited personal, social, political freedoms, where dissenting individuals or groups will be strategically removed in
1175:
planned to field a total of 15,000 undercover agents and informants in response to an anti-terrorism directive (issued by President
737:
to extract useful information such as personal interests, friendships & affiliations, wants, beliefs, thoughts, and activities.
8439:
8355:
8345:
7232:
ICO. (September 2006). "A Report on the Surveillance Society for the Information Commissioner by the Surveillance Studies Network".
1030:
966:
962:
836:
2933:
843:
which developed technologies that are capable of identifying a person at up to 500 ft (150 m) by their facial features.
798:
2008, about 20% of employers reported using social networking sites to collect personal data on prospective or current employees.
6351:
6199:
3749:
1777:
In December 2017, the Government of China took steps to oppose widespread surveillance by security-company cameras, webcams, and
1382:
Some companies appear to be "tagging" their workers by incorporating RFID tags in employee ID badges. Workers in U.K. considered
5209:
4496:
4313:
4287:
3330:
8023:
7993:
7738:
7633:
7589:
6600:
6081:
4519:
447:
384:
3138:
2332:
explores the potential for video surveillance to be manipulated in order to support a conviction to pursue a political agenda.
8671:
8176:
7211:
7151:
7137:
7123:
7067:
7053:
7039:
7011:
6966:
6956:
6925:
6831:
6775:
6095:
5166:
4529:
4211:
2435:
1896:
868:
devices in its squad cars, and providing handheld face scanners, which officers will use to identify people while on patrol.
6012:
8494:
8300:
7825:
7584:
6621:
5680:
5521:
4678:
2146:
912:
Aerial surveillance is the gathering of surveillance, usually visual imagery or video, from an airborne vehicle—such as an
6699:
5576:
4862:
2787:
2584:
2482:. Center for Medieval and Renaissance Studies, UCLA. Vol. 24. Berleley: University of California Press. p. 260.
8836:
8651:
8459:
8449:
8409:
7339:
4558:
3908:
1755:, have expressed concern that by allowing continual increases in government surveillance of citizens we will end up in a
17:
5601:
4615:
3939:
3810:
3613:
8391:
8365:
8325:
7769:
6887:
6499:
3883:
3049:
2996:
2407:
2392:
2020:
is inverse surveillance, involving the recording by private individuals, rather than government or corporate entities.
1966:
1523:
1333:, but their use has raised significant civil liberty and privacy concerns and is strictly regulated in some countries.
985:
865:
840:
504:
5775:
108:
is the monitoring of behavior, many activities, or information for the purpose of information gathering, influencing,
8568:
8489:
8474:
8370:
8234:
7485:
7250:"The NSA Files (Dozens of articles about the U.S. National Security Agency and its spying and surveillance programs)"
7165:
7095:
7081:
6994:
6980:
6942:
6915:
6421:
5276:
2621:
2524:
2487:
2460:
2342:
1198:
989:
883:
379:
38:
1248:
system to aid identification, whilst others are considering it but face public opposition. Other documents, such as
8257:
8126:
8118:
7520:
7445:
6052:
Final Report: Book III, Supplementary Detailed Staff Reports on Intelligence Activities and the Rights of Americans
5550:
5335:
Final Report: Book III, Supplementary Detailed Staff Reports on Intelligence Activities and the Rights of Americans
4088:
3781:
1077:. A skilled analyst can discover facts about a person that they might not even be consciously aware of themselves.
7239:
3973:
8444:
8375:
8340:
8136:
6793:
3075:
2760:
2070:
1571:
1317:
device used to intercept mobile phone traffic and track the movement of mobile phone users. Essentially a "fake"
1209:
981:
944:
749:
565:
526:
3832:
2904:
619:
A payload surveillance camera manufactured by Controp and distributed to the U.S. government by ADI Technologies
533:
for local, state, and federal agencies to install modern video surveillance equipment. For example, the city of
8666:
8646:
8600:
8563:
8469:
8424:
8067:
7892:
7807:
7387:
7179:
7109:
7025:
6901:
6873:
6859:
6845:
2204:
1904:
1900:
1752:
1748:
1376:
6292:
1696:
1123:
from commercial data aggregators or data brokers. The United States has spent $ 370 million on its 43 planned
1107:
they can be used to assemble a detailed profile revealing the actions, habits, beliefs, locations frequented,
8826:
8573:
8404:
8379:
7761:
7311:
4461:
4061:
3529:
3022:
2126:
1922:
604:
6146:
3253:
939:, and high-resolution imagery capable of identifying objects at extremely long distances. For instance, the
8434:
6087:
3385:"Threat Level Privacy, Crime and Security Online Feds 'Pinged' Sprint GPS Data 8 Million Times Over a Year"
2387:
2078:
uses computers to get information on people, as well as other common surveillance methods, as a freelancer.
1474:
1467:
1205:
772:
678:
357:
333:
284:
249:
204:
5997:
Rooney, Julie Lynn (2017). "Going Postal: Analyzing the Abuse of Mail Covers Under the Fourth Amendment".
8454:
8184:
5714:
2402:
2372:
2220:
2200:
1801:
1720:
1567:
6812:
5949:
1854:
behaviours for motivations that arise out of business relations, to curiosity, to legality. In her book
131:
Surveillance is used by citizens, for instance for protecting their neighborhoods. It is widely used by
8841:
5462:
5125:
4592:
3101:
2382:
1000:
operations. Houston's police department has been testing fixed-wing UAVs for use in "traffic control".
871:
511:
112:, or directing. This can include observation from a distance by means of electronic equipment, such as
344:, which search for certain words or phrases, to decide whether to dedicate a human agent to the call.
8821:
8686:
8630:
8610:
8335:
8295:
6725:
5330:
4616:"FBI Prepares Vast Database Of Biometrics: $ 1 Billion Project to Include Images of Irises and Faces"
3750:"New NYPD surveillance cameras to cover stretch of Upper East Side not easily reached by patrol cars"
3164:
2307:
2102:
1739:, governments now possess an unprecedented ability to monitor the activities of their subjects. Many
1583:
1508:
1408:
828:
515:
459:
113:
5651:
5239:
5074:
4198:
3280:"From Smartphones to Stingrays: Can the Fourth Amendment Keep up with the Twenty-First Century Note"
8831:
8099:
7830:
6674:"Dark web finds bitcoin increasingly more of a problem than a help, tries other digital currencies"
5382:
3230:
2864:
2851:
1685:
1348:
of exploiting global mobile telecom network weaknesses to spy on its citizens traveling around the
1322:
1296:
to calculate the differences in time for a signal to travel from the cell phone to each of several
1216:
1192:
1149:
948:
936:
899:
745:
695:
538:
530:
368:
to calculate the differences in time for a signal to travel from the cell phone to each of several
322:
5109:. In ICRA2014: Proceedings of 2014 IEEE International Conference on Robotics and Automation. 2014.
5004:
3417:
1321:
acting between the target mobile phone and the service provider's real towers, it is considered a
8681:
8676:
8548:
8330:
8151:
8141:
8089:
7820:
7470:
7440:
7332:
7172:
Introduction to Intelligent Surveillance: Surveillance Data Capture, Transmission, and Analytics
5439:
4462:"Legally Questionable FBI Requests for Calling Circle Info More Widespread than Previously Known"
3995:
2367:
2328:
2288:
2212:
2208:
2196:
1987:
1528:
1357:
1244:
One of the simplest forms of identification is the carrying of credentials. Some nations have an
1220:
1132:
1108:
1074:
1012:
984:
is in the process of testing UAVs to patrol the skies over the United States for the purposes of
913:
858:
706:
702:
690:
550:
492:
268:
6413:
5357:"Secret Justice: Criminal Informants and America's Underground Legal System | Prison Legal News"
4700:
4434:
4376:"Social Network Analysis as an Approach to Combat Terrorism: Past, Present, and Future Research"
4352:
3548:
2680:
8722:
8320:
8315:
8262:
8166:
8104:
8084:
8033:
7790:
4787:
4758:
2846:
2167:
2057:
1326:
1268:
1201:
1047:
879:
352:
7212:
Balkin, Jack M. (2008). "The Constitution in the National Surveillance State", Yale Law School
6908:
Manufacturing Hysteria: A History of Scapegoating, Surveillance, and Secrecy in Modern America
6516:
6364:
5866:
Plextek’s Blighter B400 series radars improve perimeter security at London’s Heathrow Airport
3369:
2812:
8816:
8701:
8272:
8227:
8053:
7719:
6245:
2644:
2538:
accounts and inventories alike are generally within the area of surveillance of the auditor .
2357:
2283:
2172:
1908:
1895:
groups oppose surveillance as a violation of people's right to privacy. Such groups include:
1563:
practice, however, and entities like the US Army require high levels of approval to conduct.
1213:
1054:
1008:
932:
925:
921:
895:
628:
584:
215:
6389:"Your Face is not a bar code: arguments against automatic face recognition in public places"
6055:
1538:, which have bugged the homes, offices, and vehicles of thousands of U.S. citizens, usually
8520:
8305:
8156:
8094:
7980:
7936:
7921:
7870:
7815:
7645:
7628:
7601:
7364:
5495:
5154:
5040:
4018:
3200:
2039:
1993:
1446:
1104:
647:
640:
137:
5408:
3549:"This is everything Edward Snowden revealed in one year of unprecedented top-secret leaks"
1642:
Supporters of surveillance systems believe that these tools can help protect society from
1352:. The data shared by the whistleblower in support of the claims, showed that a systematic
171:
may have laws that seek to restrict governmental and private use of surveillance, whereas
8:
8737:
8605:
8590:
8540:
8277:
8189:
8063:
7880:
7853:
7707:
7611:
7359:
7206:
6514:
5526:
5217:
5106:
4620:
4062:"WIKILEAKS: Surveillance Cameras Around The Country Are Being Used In A Huge Spy Network"
2249:
1978:
1959:
1539:
1330:
1253:
952:
847:
300:
125:
62:
31:
6173:
545:
announced that Chicago would have a surveillance camera on every street corner by 2016.
8777:
8161:
8146:
8038:
8013:
7951:
7902:
7887:
7596:
7563:
7537:
7515:
7510:
7480:
7465:
7325:
7269:
6605:
6585:
6406:
6135:
5972:
5848:
4146:
3635:
3595:
3450:
2909:
2501:
Studies are based partially on Inquisition surveillance of foreigners and Protestants.
2291:
2192:
1916:
1761:
1713:
1618:
1396:
1167:
577:
469:
296:
7226:
6207:
5798:
5183:
5139:
5120:
1700:
Surveillance lamppost brought down in Hong Kong by citizens fearing state surveillance
89:
69:
8851:
8747:
8530:
8003:
7712:
7381:
7175:
7161:
7147:
7133:
7119:
7105:
7091:
7077:
7063:
7049:
7035:
7021:
7007:
6990:
6976:
6962:
6952:
6938:
6930:
6921:
6911:
6897:
6883:
6869:
6855:
6841:
6827:
6771:
6535:
6495:
6417:
6241:
6127:
6091:
5876:
5840:
5272:
5162:
4644:
4525:
4266:
4207:
3587:
3384:
3365:
3338:
2860:
2559:
2520:
2483:
2456:
2431:
2397:
2347:
2232:
2216:
2048:
1809:
1756:
1598:
1430:
1314:
1245:
1166:
Fielding operatives is very expensive, and governments with wide-reaching electronic
1092:
1007:, as well, is working on plans to build up a fleet of surveillance UAVs ranging from
791:
726:
682:
427:
276:
208:
6767:
6388:
5852:
5434:
4535:
3300:
1111:, and preferences of the individual. This profile is then used, by programs such as
8846:
8795:
8661:
8620:
8558:
8510:
8267:
8220:
8058:
8008:
7677:
7409:
6807:
6360:
6229:
5832:
5265:
Prunckun, Hank (April 12, 2019) . "Clandestine and Covert Sources of Information".
5134:
4321:
4177:
4066:
3730:
3599:
3579:
2856:
2362:
2270:
2075:
2009:
1983:
1930:
1841:
1829:
1674:
1163:(i.e., to disclose the information they hold on the organization and its members).
1116:
722:
592:
542:
225:
117:
27:
Monitoring something for the purposes of influencing, protecting, or suppressing it
7249:
6648:"Why some cyber criminals are ditching bitcoin for a cryptocurrency called monero"
3473:"Are iPhones Really Better for Privacy? Comparative Study of iOS and Android Apps"
1796:
A traffic camera atop a high pole oversees a road in the Canadian city of Toronto.
1179:
in 2004) that ordered intelligence and law-enforcement agencies to increase their
875:
might indicate that they are hiding something, lying, or worried about something.
569:
estimate the number of cameras in the UK at 4.2 million (of which 500,000 were in
412:
to address those concerns in order to secure their position in the global market.
8525:
8515:
7946:
7875:
7697:
7672:
7606:
7568:
7505:
7243:
6999:
6401:
6159:
6019:
5266:
4887:
4869:
3662:
2882:
2514:
2477:
2108:
1847:
1666:
1293:
1280:
864:
The Los Angeles Police Department is installing automated facial recognition and
658:
636:
608:
365:
341:
257:
253:
164:
5688:
4813:
4517:
3566:
Crocco, Marco; Cristani, Marco; Trucco, Andrea; Murino, Vittorio (May 2, 2016).
2061:, as well as a film and TV series based on it, portray a totalitarian Christian
1792:
1781:
after tens-of-thousands were made accessible for internet viewing by IT company
1119:, to determine whether the person is a military, criminal, or political threat.
1084:
and records. In the past, this data was documented in paper records, leaving a "
8762:
8742:
8615:
8043:
7863:
7375:
7197:
6293:"Bigger Monster, Weaker Chains: The Growth of an American Surveillance Society"
5902:
Ethical Justice: Applied Issues for Criminal Justice Students and Professionals
5107:
Swarms of Micro Aerial Vehicles Stabilized Under a Visual Relative Localization
3775:"The Price of Privacy: How local authorities spent ÂŁ515m on CCTV in four years"
3023:"Rogue FBI Letters Hint at Phone Companies' Own Data Mining Programs – Updated"
2299:
2295:
2224:
2082:
1945:
1651:
1629:
1450:
1426:
1387:
1176:
1124:
1069:
1004:
730:
561:
488:
396:
329:
6465:
6264:
5836:
3912:
3688:
8810:
8732:
8727:
8625:
8585:
8580:
7961:
7941:
7926:
7655:
7623:
7525:
7500:
7419:
7272:—FBI counterintelligence programs designed to neutralize political dissidents
7217:
Bibo, Didier and Delmas-Marty, "The State and Surveillance: Fear and Control"
6487:
6232:(2007). "'I've Got Nothing to Hide' and Other Misunderstandings of Privacy".
6131:
5741:
4040:
3876:
3591:
2563:
2479:
Cultural Encounters: The Impact of the Inquisition in Spain and the New World
2352:
2316:
2275:
2122:
2088:
2034:
2016:
1875:
1868:
1678:
1606:
1602:
1383:
1349:
1341:
1023:
1018:
In addition to their surveillance capabilities, MAVs are capable of carrying
978:
854:
546:
522:
475:
306:
305:
The official and unofficial tapping of telephone lines is widespread. In the
172:
7088:
Surveillance and Security: Technological Politics and Power in Everyday Life
5942:"What legal questions are the new chip implants for humans likely to raise?"
5210:"Administrative Subpoenas for the FBI: A Grab for Unchecked Executive Power"
2832:"Electromagnetic Radiation from Video Display Units: An Eavesdropping Risk?"
1212:
to allow local, state, and domestic Federal agencies to access imagery from
8772:
8553:
8048:
7956:
7897:
7490:
7475:
7414:
7399:
7392:
7254:
6760:
6730:
6515:
Court of Appeal, Second District, Division 6, California. (July 30, 2008).
6153:
Deviant Behaviour – Socially accepted observation of behaviour for security
5844:
4968:"No Longer Science Fiction: Less Than Lethal & Directed Energy Weapons"
4840:
3734:
2262:
2187:
2044:
1973:
1888:
1740:
1728:
1502:
1345:
1337:
1310:
1257:
1225:
673:
314:
7730:
6949:
Overseers of the Poor: Surveillance, Resistance, and the Limits of Privacy
6558:
5304:
5067:"DARPA, Northrop Grumman Move Into Next Phase of UAV Control Architecture"
4182:
4165:
4144:
Keefe, Patrick (March 12, 2006). "Can Network Theory Thwart Terrorists?".
2136:
song "Hymn of Acxiom" is about corporate data collection and surveillance.
159:
A byproduct of surveillance is that it can unjustifiably violate people's
8767:
8287:
7858:
7692:
7558:
7404:
7004:
Welcome to the Machine: Science, Surveillance, and the Culture of Control
6560:
6446:
4375:
4096:
3851:"In the press: How the media is reporting the 1.85 million cameras story"
3567:
2312:
2254:
2228:
2133:
2097:
2001:
1997:
1859:
1633:
Graffiti expressing concern about the proliferation of video surveillance
1543:
1421:
A human microchip implant is an identifying integrated circuit device or
1297:
1261:
1085:
1065:
940:
757:
734:
400:
369:
221:
168:
7236:
7130:
The Soft Cage: Surveillance in America From Slavery to the War on Terror
6139:
6115:
5652:"Saudi Spies Tracked Phones Using Flaws the FCC Failed to Fix for Years"
1686:
If you aren't doing something wrong then you don't have anything to fear
646:
Governments often initially claim that cameras are meant to be used for
615:
30:
This article is about surveillance in security. Not to be confused with
8752:
7931:
7687:
7667:
7660:
7640:
7547:
4206:. Salzburg and Vienna: Forschungsgruppe Unified Theory of Information.
3331:"Cell Phone Tracking Can Locate Terrorists – But Only Where It's Legal"
2320:
2092:
1934:
1813:
1808:
have led many groups to fear that society is moving towards a state of
1643:
1535:
1236:
1160:
958:
917:
819:
765:
761:
753:
484:
415:
409:
404:
388:
149:
132:
116:(CCTV), or interception of electronically transmitted information like
6476:(1). Johns Hopkins University Press: 280–285 – via Project MUSE.
4405:
2733:
825:
characteristics include gait (a person's manner of walking) or voice.
220:
The vast majority of computer surveillance involves the monitoring of
8717:
7912:
7907:
7845:
7682:
7495:
7424:
7348:
7221:
6824:
Towards a Critical Theory of Surveillance in Informational Capitalism
4518:
Woodward, John; Christopher Horn; Julius Gatune; Aryn Thomas (2003).
2159:
2062:
1825:
1778:
1647:
1547:
1368:
1318:
993:
654:
596:
183:
178:
141:
6329:"Privacy fears over online surveillance footage broadcasts in China"
3583:
3504:"NSA tracking cellphone locations worldwide, Snowden documents show"
2960:"NSA Prism program taps in to user data of Apple, Google and others"
1926:
by groups or individuals, opposing certain surveillance activities.
1704:
1534:
The U.S. has run numerous domestic intelligence operations, such as
7916:
7530:
7158:
Everyday Surveillance: Vigilance and Visibility in Post-Modern Life
6451:
Superconnected: the internet, digital media, and techno-social life
5331:"The Use of Informants in FBI Domestic Intelligence Investigations"
5240:""National Network" of Fusion Centers Raises Specter of COINTELPRO"
5037:
Information Processing Technology Office (DARPA) – Official Website
4349:
Northeastern University College of Computer and Information Science
4251:
Northeastern University College of Computer and Information Science
3497:
3495:
3493:
2705:
2377:
2240:
2005:
1709:
1594:
1493:
1441:
1249:
811:
710:
686:
662:
496:
435:
229:
109:
5463:"Satellite-Surveillance Program to Begin Despite Privacy Concerns"
5030:"BAA 04-05-PIP: Heterogeneous Airborne Reconnaissance Team (HART)"
904:
835:
are heavily funding research into facial recognition systems. The
37:"Electronic surveillance" redirects here. Not to be confused with
8243:
7616:
7278:– A Short History of Electronic Surveillance in the United States
6866:
Predict and Surveil: Data, Discretion, and the Future of Policing
6344:"Personal Information, Borders, and the New Surveillance Studies"
3689:"We're Watching: How Chicago Authorities Keep An Eye On The City"
2154:
1929:
Legislative proceedings such as those that took place during the
1892:
1744:
1091:
But today many of these records are electronic, resulting in an "
806:
718:
714:
534:
431:
399:
era, Apple's iPhone 6 has been designed to disrupt investigative
318:
280:
261:
160:
153:
3490:
1609:
to measure out an area before the main building project begins.
928:
use a range of sensors (e.g. radar) to monitor the battlefield.
464:
7306:
6850:
Ball, Kirstie, Kevin D. Haggerty, and David Lyon, eds. (2012).
5159:
Profiling the European Citizen: Cross Disciplinary Perspectives
4120:"TrapWire: The Less-Than-Advertised System To Spy On Americans"
1724:
1353:
1180:
1136:(1976), data held by third parties is generally not subject to
1112:
570:
337:
252:, to develop, purchase, implement, and operate systems such as
145:
68:
Please try to keep recent events in historical perspective and
4585:"Surveillance Society: New High-Tech Cameras Are Watching You"
4489:"One in five employers uses social networks in hiring process"
3780:. Big Brother Watch. February 2012. p. 30. Archived from
1413:
1386:
in protest of having themselves tagged; they felt that it was
1356:
campaign was being run by the kingdom exploiting the flaws of
1279:
This section refers to methods that involve the monitoring of
549:
received a $ 350 million grant towards the development of the
8757:
6601:"One of the Last Bastions of Digital Privacy Is Under Threat"
6197:
5825:
International Journal of Technology Assessment in Health Care
4435:"AT&T Invents Programming Language for Mass Surveillance"
3050:"Mueller Orders Audit of 56 FBI Offices for Secret Subpoenas"
2813:"FBI's Secret Spyware Tracks Down Teen Who Made Bomb Threats"
2258:
1782:
1034:
1019:
970:
832:
500:
272:
7317:
7288:
7192:
6559:
California Fourth District Court of Appeal (June 25, 2014).
4836:"The Rapid Rise of Federal Surveillance Drones Over America"
4750:
4453:
2883:"Electromagnetic Eavesdropping Risks of Flat-Panel Displays"
2622:"The Unresolved Equation of Espionage and International Law"
1933:, which investigated domestic intelligence programs such as
1309:
A comparatively new off-the-shelf surveillance device is an
8696:
6198:
Baig, Edward; Marcia Stepanek; Neil Gross (April 5, 1999).
5626:"Revealed: Saudis suspected of phone spying campaign in US"
5577:"Forget the NSA: Police May be a Greater Threat to Privacy"
3439:
3437:
3435:
2176:
2125:' song "I Am The Owl" is about government surveillance and
1422:
1325:(MITM) attack. IMSI-catchers are used in some countries by
1081:
997:
199:
8212:
6700:"Coinbase considers adding five new coins to its platform"
5323:
3565:
3067:
2896:
2645:"Internet Eavesdropping: A Brave New World of Wiretapping"
2552:"Stallman: How Much Surveillance Can Democracy Withstand?"
6935:
Database Nation; The Death of Privacy in the 21st Century
6766:. New York: Alfred A. Knopf, McSweeney's Books. pp.
6466:"Surveillance as Race Struggle: On Browne's Dark Matters"
5768:"RFID Chips Implanted In Mexican Law-Enforcement Workers"
5454:
5214:
The Center For Democracy & Technology (official site)
5153:
2831:
2182:
1172:
943:, a U.S. drone plane used for domestic operations by the
725:
information from phone call records such as those in the
588:
439:
245:
241:
140:
on criminals, their competitors, suppliers or customers.
5401:
4288:"Pentagon sets its sights on social networking websites"
4279:
4166:"Online Social Networking as Participatory Surveillance"
3446:"Signaling Post-Snowden Era, New iPhone Locks Out N.S.A"
3432:
3254:"Even if they're off, cellphones allow FBI to listen in"
2207:") and hidden microphones worn by operatives (e.g., in "
2065:
where all citizens are kept under constant surveillance.
1974:
Countersurveillance, inverse surveillance, sousveillance
120:. It can also include simple technical methods, such as
101:
Surveillance Camera to support the Washington, DC Police
8202:
Counterintelligence and counter-terrorism organizations
6985:
Hier, Sean P., & Greenberg, Joshua (Eds.). (2009).
6259:
6257:
6255:
3324:
3322:
2008:, which attempts to monitor police officers to prevent
1937:, have also weighed the pros and cons of surveillance.
603:
to install millions of surveillance cameras throughout
395:
In response to customers' privacy concerns in the post
7294:
Guide to lawful intercept legislation around the world
7114:
Monahan, Torin, and David Murakami Wood, eds. (2018).
6973:
The Watchers: The Rise of America's Surveillance State
5374:
5296:
4728:"LAPD Uses Face Recognition Technology To Fight Crime"
3530:"GCHQ views data without a warrant, government admits"
2171:, the police and government intelligence agencies use
1871:
or censoring/stalking by strangers, reducing privacy.
446:
The Snowden leaks have also revealed that the British
6622:"Edward Snowden Explains How To Reclaim Your Privacy"
6073:
5708:
5706:
3959:
3957:
3360:
Samuel, Ian (2008). "Warrantless Location Tracking".
3286:. Fifty One: 159–176 – via Law Journal Library.
3197:
Western Regional Security Office (NOAA official site)
3128:
1417:
Hand with planned insertion point for Verichip device
701:
One common form of surveillance is to create maps of
328:
Human agents are not required to monitor most calls.
7144:
Handbook of Surveillance Technologies, Third Edition
6394:
6252:
6037:
5907:
5790:
3319:
3245:
3129:
McCullagh, Declan; Anne Broache (December 1, 2006).
3093:
3073:
3041:
2805:
2700:
2698:
2450:
7160:. Lanham, MD: Rowman & Littlefield Publishers.
7018:
Under Surveillance: Being Watched in Modern America
6838:
iSpy: Surveillance and Power in the Interactive Era
5232:
4781:
4779:
3720:
3295:
3293:
3014:
2667:
2665:
1712:in Columbus, Ohio, depicting state surveillance of
1681:said: "You have zero privacy anyway. Get over it."
908:
Micro Air Vehicle with attached surveillance camera
175:governments seldom have any domestic restrictions.
8692:International Association of Privacy Professionals
7046:Theorizing Surveillance: The Panopticon and Beyond
6759:
6405:
6287:
6285:
6265:"Is the U.S. Turning Into a Surveillance Society?"
5916:"Court Asked To Disallow Warrantless GPS Tracking"
5703:
5675:
5673:
5492:Department of Homeland Security (official website)
5480:
5409:"U.S. Reconnaissance Satellites: Domestic Targets"
5383:"FBI Proposes Building Network of U.S. Informants"
4917:"US police experiment with Insitu, Honeywell UAVs"
4671:"Lockheed wins $ 1 billion FBI biometric contract"
4645:"FBI wants palm prints, eye scans, tattoo mapping"
3954:
3614:"Rise of Surveillance Camera Installed Base Slows"
3165:"Use of mobile helped police keep tabs on suspect"
3102:"Remotely Eavesdropping on Cell Phone Microphones"
3076:"FBI Plans to Fight Terror With High-Tech Arsenal"
2761:"Government funds chat room surveillance research"
2642:
1015:, to be used by police forces throughout the U.K.
383:The headquarters of UK intelligence activities is
7032:Surveillance Society: Monitoring in Everyday Life
6335:
5759:
5426:
5201:
4662:
4642:
4607:
4253:. Archived from the original on November 16, 2004
3074:Piller, Charles; Eric Lichtblau (July 29, 2002).
2958:Greenwald, Glen; Ewen, MacAskill (June 6, 2013).
2905:"E-Mail Surveillance Renews Concerns in Congress"
2752:
2695:
2428:Surveillance Society: Monitoring in Everyday Life
2191:regularly portrays the FBI's surveillance of the
1806:Communications Assistance For Law Enforcement Act
1737:Communications Assistance for Law Enforcement Act
1654:. This requires a minimal level of invasiveness.
1399:. As of 2021, this has largely not come to pass.
1231:
311:Communications Assistance for Law Enforcement Act
234:Communications Assistance For Law Enforcement Act
207:– a U.S. agency which developed technologies for
186:seems to be common among all types of countries.
8808:
8657:Computer Professionals for Social Responsibility
5964:
5542:
5515:
5513:
4943:"UK Home Office plans national police UAV fleet"
4876:, November 9, 2012. Retrieved December 10, 2012.
4776:
4759:"LAPD opens new high-tech crime analysis center"
4636:
4576:
4271:: CS1 maint: bot: original URL status unknown (
3911:. CCTV User Group. June 18, 2008. Archived from
3290:
3158:
3156:
2995:Sottek, T.C.; Kopfstein, Janus (July 17, 2013).
2925:
2728:
2726:
2673:"CALEA Archive – Electronic Frontier Foundation"
2662:
846:Another form of behavioral biometrics, based on
639:in January 2001, police in Tampa, Florida, used
6282:
5933:
5889:Criminal Investigation: The Art and the Science
5733:
5670:
5435:"U.S. to Expand Domestic Use Of Spy Satellites"
4879:
4719:
4643:Arena, Kelly; Carol Cratty (February 4, 2008).
4550:
4081:
3809:. Channel 4 News. June 18, 2008. Archived from
3716:
3714:
3663:"Surveillance cams help fight crime, city says"
3215:
3131:"FBI taps cell phone mic as eavesdropping tool"
2994:
2903:Risen, James; Lichtblau, Eric (June 16, 2009).
2706:"CALEA: The Perils of Wiretapping the Internet"
2643:Diffie, Whitfield; Susan Landau (August 2008).
1835:
1582:"Stakeout" redirects here. For other uses, see
1429:and implanted in the body of a human being. A
7276:Reversing the Whispering Gallery of Dionysius
6880:Dark Matters: On the Surveillance of Blackness
6492:Dark Matters: On the Surveillance of Blackness
6383:
6381:
6228:
6165:
6116:"Privacy in the Age of the Internet of Things"
5816:
5147:
4910:
4908:
3376:
3124:
3122:
2902:
2890:4th Workshop on Privacy Enhancing Technologies
1224:the still-images produced by programs such as
232:. In the United States for example, under the
8228:
7746:
7333:
7146:, Taylor & Francis: CRC Press, 1020 pp.,
6191:
5904:. 1st ed. Academic Press, 2013. p150. Print.
5822:
5799:"Law enforcement in Mexico goes a bit bionic"
5510:
5058:
5022:
4986:
4163:
3680:
3187:
3185:
3153:
2957:
2723:
2636:
2451:Monahan, Torin; Murakami Wood, David (2018).
627:(DARPA) is funding a research project called
6840:. Lawrence, KS: University Press of Kansas.
6540:: CS1 maint: multiple names: authors list (
6494:. Duke University Press Books. p. 224.
6341:
6045:"Domestic CIA and FBI Mail Opening Programs"
5268:Methods of Inquiry for Intelligence Analysis
4934:
4833:
4410:DyDAn Research Blog (official blog of DyDAn)
4159:
4157:
3825:
3747:
3711:
2829:
1488:
1060:
1026:", or weapons for killing enemy combatants.
7760:
7104:. New Brunswick: Rutgers University Press.
6987:Surveillance: Power, Problems, and Politics
6378:
5977:(online collection of historical documents)
5715:"Microchips in humans spark privacy debate"
4905:
4511:
4345:"Current Research in Social Network Theory"
4305:
4247:"Current Research in Social Network Theory"
3119:
2199:" placed in strategic locations (e.g., in "
1828:identification technologies, for instance,
8235:
8221:
7753:
7739:
7340:
7326:
6892:Coleman, Roy, and Michael McCahill. 2011.
6852:Routledge Handbook of Surveillance Studies
6544:) CS1 maint: numeric names: authors list (
6342:Marx, Gary T.; Muschert, Glenn W. (2007).
5742:"RFID Tags: Big Brother in small packages"
5488:"Fact Sheet: National Applications Office"
5175:
4960:
4940:
4863:"Killington co-founder Sargent dead at 83"
4693:
4487:Havenstein, Heather (September 12, 2008).
4486:
4480:
4428:
4426:
4398:
4314:"Is the NSA reading your MySpace profile?"
4089:"EPIC Video Surveillance Information Page"
3998:. CBS News. Associated Press. July 1, 2003
3353:
3182:
2880:
1240:A card containing an identification number
810:Fingerprints being scanned as part of the
740:Many U.S. government agencies such as the
681:of the relationships between users on the
668:
499:, and by video analysis software (such as
7263:
6463:
6365:10.1146/annurev.lawsocsci.3.081806.112824
6079:
5739:
5551:"Spy imagery agency watching inside U.S."
5549:Shrader, Katherine (September 26, 2004).
5522:"Domestic Use of Spy Satellites To Widen"
5138:
4885:
4613:
4240:
4238:
4181:
4154:
4117:
3988:
3654:
3636:"Smart cameras catch man in 60,000 crowd"
3568:"Audio Surveillance: A Systematic Review"
2997:"Everything you need to know about PRISM"
2850:
2785:
2779:
2550:Stallman, Richard M. (October 14, 2013).
2475:
2179:operations and for surveillance purposes.
1914:There have been several lawsuits such as
1402:
742:Defense Advanced Research Projects Agency
625:Defense Advanced Research Projects Agency
6400:
6171:
6113:
5796:
5765:
5264:
4521:Biometrics: A Look at Facial Recognition
4336:
4311:
3748:Parascandola, Rocco (October 24, 2018).
3660:
3251:
3099:
2931:
2874:
2738:Electronic Frontier Foundation (website)
2710:Electronic Frontier Foundation (website)
2677:Electronic Frontier Foundation (website)
2549:
2512:
2047:surveillance society with a very simple
1791:
1719:With the advent of programs such as the
1703:
1695:
1628:
1601:. The term derives from the practice by
1507:In the U.S., police have planted hidden
1497:Diagram of GPS satellites orbiting Earth
1492:
1412:
1367:
1235:
1031:Heterogeneous Aerial Reconnaissance Team
957:
903:
837:Information Processing Technology Office
805:
672:
614:
474:
463:
378:
198:
96:
88:
8167:Scientific & Technical intelligence
7034:. Philadelphia: Open University Press.
6645:
6352:Annual Review of Law and Social Science
5913:
5681:"Two Stories Highlight the RFID Debate"
5548:
5519:
5181:
5118:
4914:
4785:
4559:"Face recognition next in terror fight"
4423:
4373:
4367:
4164:Albrechtslund, Anders (March 3, 2008).
4032:
3767:
3606:
3501:
3277:
2788:"FBI turns to broad new wiretap method"
2430:. Philadelphia: Open University Press.
1372:RFID chip pulled from a new credit card
587:, several U.S. corporations, including
529:awards billions of dollars per year in
14:
8809:
7590:Chinese espionage in the United States
7185:
7102:Surveillance in the Time of Insecurity
6757:
6753:
6751:
6749:
6598:
6565:Oyez – IIT Chicago-Kent College of Law
6486:
6445:
6441:
6439:
6437:
6435:
6433:
6109:
6107:
6083:Political Repression in Modern America
5996:
5939:
5740:McCullagh, Declan (January 13, 2003).
5600:, 2014, pp. 43–44, archived from
5460:
5305:"Is the Pentagon spying on Americans?"
4834:Friedersdorf, Conor (March 10, 2016).
4756:
4614:Nakashima, Ellen (December 22, 2007).
4582:
4459:
4432:
4235:
4016:
4010:
3686:
3443:
3382:
3359:
3328:
3047:
3020:
2786:McCullagh, Declan (January 30, 2007).
2619:
1483:
965:program concept drawing from official
448:Government Communications Headquarters
385:Government Communications Headquarters
8672:Electronic Privacy Information Center
8216:
7734:
7321:
7118:. New York: Oxford University Press.
7048:. Cullompton, UK: Willan Publishing.
7020:. Austin: University of Texas Press.
6868:. New York: Oxford University Press.
6723:
6671:
5900:Crowder, Stan, and Turvery E. Brent.
5712:
5598:The German Code Of Criminal Procedure
5432:
5302:
5207:
5064:
4972:International Online Defense Magazine
4888:"Drone aircraft may prowl U.S. skies"
4732:NBC4 TV (transcript from Officer.com)
4707:. Associated Press. December 26, 2004
4668:
4556:
4285:
4196:
4190:
4143:
4137:
4019:"How Facial Recognition Systems Work"
3963:
3699:from the original on February 6, 2009
3410:"Greenstone Digital Library Software"
3252:Coughlin, Kevin (December 13, 2006).
3162:
2934:"Pinwale And The New NSA Revelations"
2870:from the original on October 9, 2022.
2626:Michigan Journal of International Law
2601:from the original on November 9, 2020
2455:. New York: Oxford University Press.
1986:, high-altitude (and possibly armed)
1897:Electronic Privacy Information Center
1612:
1283:through the aid of wireless signals.
599:, have been working closely with the
144:organizations charged with detecting
7989:By alliances, nations and industries
7585:Chinese intelligence activity abroad
6646:Sigalos, MacKenzie (June 13, 2021).
6586:"The Secrets of Countersurveillance"
6412:. New York: Vintage Books. pp.
6309:from the original on October 9, 2022
6172:Sprenger, Polly (January 26, 1999).
5766:Gardener, W. David (July 15, 2004).
5574:
5380:
5065:Sirak, Michael (November 29, 2007).
4886:McCullagh, Declan (March 29, 2006).
4223:from the original on October 9, 2022
4118:Hedgecock, Sarah (August 14, 2012).
3996:"Big Brother To See All, Everywhere"
3933:
3889:from the original on October 9, 2022
3687:Schorn, Daniel (September 6, 2006).
3661:Spielman, Fran (February 19, 2009).
3527:
3502:Gellman, Barton (December 4, 2013).
3444:Sanger, David (September 26, 2014).
3301:"Tracking a suspect by mobile phone"
3100:Schneier, Bruce (December 5, 2006).
2976:from the original on October 9, 2022
2758:
2425:
2147:List of films featuring surveillance
1274:
1186:
45:
8652:Center for Democracy and Technology
7651:Interpersonal (HUMINT) intelligence
6746:
6697:
6619:
6430:
6104:
6013:"U.S. Army Intelligence Activities"
5797:Campbell, Monica (August 4, 2004).
5461:Gorman, Siobhan (October 1, 2008).
5105:Saska, M.; Vakula, J.; Preucil, L.
4941:La Franchi, Peter (July 17, 2007).
4786:Dotinga, Randy (October 14, 2004).
4757:Willon, Phil (September 17, 2009).
4038:
3807:"FactCheck: how many CCTV cameras?"
3546:
3284:University of Louisville Law Review
3021:Singel, Ryan (September 10, 2007).
2823:
2734:"CALEA: Frequently Asked Questions"
1143:
24:
7282:
7203:(Volume 66, Number 3, July–August)
7006:Chelsea Green Publishing Company.
6937:. O'Reilly & Associates, Inc.
6787:
6453:. New York, NY: Sage Publications.
5208:Flint, Lara (September 24, 2003).
5182:Clayton, Mark (February 9, 2006).
5039:. December 5, 2003. Archived from
4669:Gross, Grant (February 13, 2008).
4342:
4244:
2759:Hill, Michael (October 11, 2004).
2519:. R.T. Edwards, Inc. p. 102.
2408:Surveillance in the Ottoman Empire
2393:The Age of Surveillance Capitalism
2195:. Audio devices they use include "
2023:
1787:
1557:
1524:United States v. Spy Factory, Inc.
1264:are also used to verify identity.
986:critical infrastructure protection
841:Human Identification at a Distance
541:. Speaking in 2009, Chicago Mayor
438:. The Snowden leaks show that the
156:carry out a form of surveillance.
25:
8863:
7486:Computer and network surveillance
7299:
7074:The Globalization of Surveillance
7060:Surveillance Studies: An Overview
6975:. London, UK: Penguin Books Ltd.
6882:. Durham: Duke University Press.
6826:. Frankfurt am Main: Peter Lang.
6672:Cheng, Evelyn (August 29, 2017).
5914:Claburn, Thomas (March 4, 2009).
5520:Warrick, Joby (August 16, 2007).
5494:. August 15, 2007. Archived from
5433:Block, Robert (August 15, 2007).
5303:Myers, Lisa (December 14, 2005).
5140:10.1146/annurev-soc-060116-053643
4915:Warwick, Graham (June 12, 2007).
4788:"Can't Hide Your Lying ... Face?"
4460:Singel, Ryan (October 16, 2007).
4433:Singel, Ryan (October 29, 2007).
3329:Miller, Joshua (March 14, 2009).
2343:Computer and network surveillance
1729:high speed surveillance computers
1658:direct police to their location.
1199:Director of National Intelligence
996:, which is planned to be used in
884:Ethics and Information Technology
665:is an example of such a network.
152:may also carry out surveillance.
39:Computer and network surveillance
8791:
8790:
8258:Right of access to personal data
7521:Short-range agent communications
7305:
6910:. New York, NY: Pantheon Books.
6717:
6691:
6665:
6639:
6620:Lee, Micah (November 12, 2015).
6613:
6592:
6588:. Security Weekly. June 6, 2007.
6578:
6552:
6508:
6480:
6457:
6321:
6222:
6005:
5990:
5970:
5940:Hilden, Julie (April 16, 2002).
5894:
5881:
5870:
5859:
5644:
5618:
5583:
5568:
5349:
5258:
4811:
4725:
4017:Bonsor, K. (September 4, 2001).
3528:Ball, James (October 29, 2014).
3477:csu-sfsu.primo.exlibrisgroup.com
3383:Zetter, Kim (December 1, 2009).
2932:Ambinder, Marc (June 16, 2009).
2516:Principles of Audit Surveillance
2231:") and video cameras (e.g., in "
2028:
1466:This section is an excerpt from
1286:
50:
8137:Words of estimative probability
7999:Operational platforms by nation
7076:. Cambridge, UK: Polity Press.
6951:, University Of Chicago Press,
6896:. Thousand Oaks, Calif.: Sage.
6599:Angwin, Julia (June 13, 2023).
6174:"Sun on Privacy: 'Get Over It'"
5687:. July 19, 2005. Archived from
5121:"Toward a Sociology of Privacy"
5112:
5099:
5089:
5001:IPTO (DARPA) – Official website
4855:
4827:
4805:
4312:Kawamoto, Dawn (June 9, 2006).
4111:
4054:
3927:
3901:
3869:
3799:
3741:
3628:
3559:
3540:
3521:
3465:
3402:
3271:
3048:Roland, Neil (March 20, 2007).
2988:
2951:
2620:Radsan, A. John (Spring 2007).
2071:The Girl with the Dragon Tattoo
1735:software, and laws such as the
1572:Federal Bureau of Investigation
1363:
1210:Department of Homeland Security
982:Department of Homeland Security
945:Department of Homeland Security
750:Department of Homeland Security
555:artificial intelligence systems
527:Department of Homeland Security
8667:Electronic Frontier Foundation
8647:American Civil Liberties Union
8601:Privacy-enhancing technologies
7116:Surveillance Studies: A Reader
6391:. Retrieved November 14, 2004.
6300:American Civil Liberties Union
6269:American Civil Liberties Union
5591:"Section 100i – IMS I-Catcher"
5244:EPIC Spotlight on Surveillance
4583:Vlahos, James (January 2008).
4557:Frank, Thomas (May 10, 2007).
3163:Odell, Mark (August 1, 2005).
2613:
2577:
2543:
2506:
2469:
2453:Surveillance Studies: A Reader
2444:
2419:
1940:
1905:American Civil Liberties Union
1901:Electronic Frontier Foundation
1804:program, and laws such as the
1753:American Civil Liberties Union
1749:Electronic Frontier Foundation
1732:
1624:
1377:Radio-frequency identification
1232:Identification and credentials
13:
1:
7347:
6724:Birch, Dave (July 14, 2005).
6698:Ell, Kellie (July 13, 2018).
5891:. 6th ed. Pearson, 2010. p249
5713:Lewan, Todd (July 21, 2007).
5381:Ross, Brian (July 25, 2007).
5184:"US Plans Massive Data Sweep"
5003:. August 2008. Archived from
4041:"Privacy is (Virtually) Dead"
3964:Klein, Naomi (May 29, 2008).
3909:"How many cameras are there?"
2585:"The Psychology of Espionage"
2413:
2211:") and informants (e.g., in "
2158:portrays a society that uses
2004:beating and the organization
1923:EPIC v. Department of Justice
1691:
1684:Another common argument is: "
1336:In March 2020, British daily
853:A more recent development is
516:facial recognition technology
290:
72:related to non-recent events.
63:slanted towards recent events
7156:Staples, William G. (2000).
7086:Monahan, Torin, ed. (2006).
6989:. Vancouver, CA: UBC Press.
6813:Resources in other libraries
6464:Nishiyama, Hidefumi (2017).
6114:Williams, Jamie Lee (2016).
6088:University of Illinois Press
4374:Ressler, Steve (July 2006).
4286:Marks, Paul (June 9, 2006).
3389:Wired Magazine: Threat Level
2861:10.1016/0167-4048(85)90046-X
2388:PRISM (surveillance program)
1836:Psychological/social effects
1475:Perimeter surveillance radar
1468:Perimeter surveillance radar
1344:, accused the government of
1206:National Applications Office
1041:
801:
773:Information Awareness Office
334:Information Awareness Office
250:Information Awareness Office
205:Information Awareness Office
122:human intelligence gathering
7:
8392:Data protection authorities
8242:
8185:Intelligence cycle security
7072:Matteralt, Armand. (2010).
7062:. Cambridge: Polity Press.
7044:Lyon, David (Ed.). (2006).
7002:and Draffan, George (2004)
4677:. InfoWorld. Archived from
2592:The Psychology of Espionage
2403:Surveillance in New Zealand
2373:Surveillance system monitor
2336:
2253:portrays the monitoring of
2223:"). Visual devices include
2205:Mr. Ruggerio's Neighborhood
2201:I Dream of Jeannie Cusamano
2140:
2115:
1802:Total Information Awareness
1721:Total Information Awareness
1577:
1568:Central Intelligence Agency
1340:, based on the claims of a
194:
163:and is often criticized by
10:
8868:
8837:Law enforcement techniques
8596:Social networking services
7242:February 21, 2009, at the
7237:Privacy Information Center
6726:"The age of sousveillance"
6158:December 23, 2014, at the
6080:Goldstein, Robert (2001).
5126:Annual Review of Sociology
4868:September 4, 2015, at the
3278:Hampton, Brittany (2012).
2383:Participatory surveillance
2144:
1882:
1839:
1774:those under surveillance.
1637:
1581:
1521:
1517:
1500:
1465:
1406:
1197:On May 25, 2007, the U.S.
1190:
1045:
893:
817:
566:Freedom of Information Act
487:, and may be watched by a
457:
453:
294:
213:
189:
36:
29:
8786:
8710:
8687:Global Network Initiative
8639:
8631:Virtual assistant privacy
8611:Privacy-invasive software
8539:
8503:
8390:
8286:
8250:
8175:
8117:
8077:
8022:
7979:
7844:
7806:
7786:
7777:
7768:
7577:
7546:
7456:
7433:
7355:
7016:Lewis, Randolph. (2017).
6808:Resources in your library
5837:10.1017/S0266462310001133
5803:Christian Science Monitor
5413:National Security Archive
5188:Christian Science Monitor
5157:; Serge Gutwirth (2008).
4380:Homeland Security Affairs
4197:Fuchs, Christian (2009).
2513:Cardwell, Harvey (2005).
2274:portrays many methods of
1584:Stakeout (disambiguation)
1489:Global Positioning System
1409:Microchip implant (human)
1217:Reconnaissance satellites
1061:Data mining and profiling
889:
866:license plate recognition
468:A surveillance camera in
460:Closed-circuit television
323:National Security Letters
114:closed-circuit television
7100:Monahan, Torin. (2010).
6894:Surveillance & Crime
6878:Browne, Simone. (2015).
6836:Andrejevic, Mark. 2007.
6822:Allmer, Thomas. (2012).
6387:Agre, Philip E. (2003),
5119:Anthony, Denise (2017).
4701:"LAPD: We Know That Mug"
3966:"China's All-Seeing Eye"
2839:Computers & Security
1529:Covert listening devices
1460:
1193:Reconnaissance satellite
949:forward-looking infrared
937:forward-looking infrared
900:Wide-area motion imagery
859:American football fields
746:National Security Agency
696:open-source intelligence
580:and the train stations.
539:Operation Virtual Shield
531:Homeland Security grants
8682:Future of Privacy Forum
8677:European Digital Rights
8152:Intelligence assessment
8142:All-source intelligence
7762:Intelligence management
7471:Covert listening device
7441:Intelligence assessment
7258:. London. June 8, 2013.
7174:. Springer Publishers.
7090:. New York: Routledge.
6971:Harris, Shane. (2011).
6947:Gilliom, John. (2001).
6864:Brayne, Sarah. (2020).
6854:. New York: Routledge.
5467:The Wall Street Journal
5440:The Wall Street Journal
5361:www.prisonlegalnews.org
5161:. Dordrecht: Springer.
3414:snowdenarchive.cjfe.org
2368:Surveillance capitalism
2292:political thriller film
1727:, technologies such as
1425:transponder encased in
1315:telephone eavesdropping
1221:Reconnaissance aircraft
1133:United States v. Miller
1075:social network analysis
914:unmanned aerial vehicle
839:ran a program known as
707:social networking sites
691:Social network analysis
669:Social network analysis
551:Domain Awareness System
493:law enforcement officer
336:, or companies such as
8723:Cellphone surveillance
8640:Advocacy organizations
8263:Expectation of privacy
7836:Operational techniques
7791:Special reconnaissance
7264:Historical information
7227:EPIC Privacy Resources
7142:Petersen, J.K. (2012)
6906:Feldman, Jay. (2011).
6758:Eggers, David (2013).
3735:10.1287/inte.2016.0860
3223:"Can You Hear Me Now?"
3199:. 2001. Archived from
2326:The British TV series
2185:'s crime-drama series
1846:Some critics, such as
1797:
1716:
1701:
1634:
1498:
1418:
1403:RFID tagging on humans
1373:
1307:
1269:Social Security number
1241:
1140:warrant requirements.
1048:Corporate surveillance
974:
909:
815:
788:
698:
620:
607:, along with advanced
480:
472:
392:
211:
102:
94:
8702:Privacy International
8273:Right to be forgotten
7720:Targeted surveillance
7222:EFF Privacy Resources
6561:"Riley v. California"
6408:Discipline and Punish
5999:Vanderbilt Law Review
5607:on September 25, 2015
5155:Hildebrandt, Mireille
4499:on September 23, 2008
4406:"DyDAn Research Blog"
4183:10.5210/fm.v13i3.2142
3936:"Camera surveillance"
3787:on September 23, 2015
3572:ACM Computing Surveys
3227:ABC News: The Blotter
2830:Van Eck, Wim (1985).
2358:Surveillance aircraft
2173:micro aerial vehicles
2043:portrays a fictional
1909:Privacy International
1800:Programs such as the
1795:
1707:
1699:
1632:
1496:
1416:
1371:
1331:intelligence agencies
1302:
1239:
1214:military intelligence
1055:business intelligence
1033:program developed by
1029:Programs such as the
1009:micro-aerial vehicles
961:
933:micro-aerial vehicles
926:surveillance aircraft
907:
896:Surveillance aircraft
894:Further information:
809:
777:
676:
629:Combat Zones That See
618:
585:Golden Shield Project
478:
467:
443:persons of interest.
382:
216:Computer surveillance
203:Official seal of the
202:
100:
92:
8827:Espionage techniques
8157:Medical intelligence
8127:Competing hypotheses
7937:Industrial espionage
7922:Denial and deception
7646:Industrial espionage
7446:competing hypotheses
7314:at Wikimedia Commons
7030:Lyon, David (2001).
6331:. December 13, 2017.
6302:. January 15, 2003.
6234:San Diego Law Review
5887:Lyman, D., Micheal.
5046:on November 27, 2008
4947:Flight International
4595:on December 19, 2007
4538:on September 8, 2013
4524:. RAND Corporation.
4355:on February 26, 2015
4099:on February 25, 2009
3141:on November 10, 2013
3106:Schneier On Security
2740:. September 20, 2007
2426:Lyon, David (2001).
2225:hidden still cameras
2129:of political groups.
2040:Nineteen Eighty-Four
2000:'s recording of the
1994:Inverse surveillance
1961:Riley vs. California
1954:Riley vs. California
1747:groups, such as the
729:, and others. These
248:and the now-defunct
93:Surveillance cameras
8738:Global surveillance
8606:Privacy engineering
8591:Personal identifier
8541:Information privacy
8278:Post-mortem privacy
8190:Counterintelligence
8105:Technical (TECHINT)
8100:Open-source (OSINT)
8090:Geospatial (GEOINT)
8064:Casualty estimation
7186:General information
7128:Parenti, Christian
7058:Lyon, David (2007)
6490:(October 2, 2015).
6374:on August 11, 2017.
6210:on October 17, 2008
5691:on December 7, 2012
5527:The Washington Post
5010:on December 5, 2008
4974:. February 22, 2005
4621:The Washington Post
3915:on October 23, 2008
3508:The Washington Post
3203:on November 6, 2013
2881:Kuhn, M.G. (2004).
2649:Scientific American
2250:The Lives of Others
2058:The Handmaid's Tale
1979:Countersurveillance
1917:Hepting v. AT&T
1762:Hepting v. AT&T
1540:political activists
1484:Geolocation devices
953:Killington Mountain
872:Facial thermographs
848:affective computing
705:based on data from
583:As part of China's
578:red-light districts
301:Lawful interception
138:gather intelligence
126:postal interception
32:Health surveillance
18:Covert surveillance
8778:Personality rights
8162:Military geography
8147:Basic intelligence
8085:Financial (FININT)
8026:signature (MASINT)
7952:One-way voice link
7888:Concealment device
7597:Cold War espionage
7564:Front organization
7538:Surveillance tools
7516:Phone surveillance
7511:One-way voice link
7466:Concealment device
6606:The New York Times
6470:Theory & Event
5721:. Associated Press
5575:Kappeler, Victor.
5556:. Associated Press
4147:The New York Times
3942:on October 8, 2016
3855:Security News Desk
3451:The New York Times
3420:on January 4, 2022
3233:on August 25, 2011
2910:The New York Times
2767:. Associated Press
2308:Enemy of the State
2276:audio surveillance
2193:DiMeo Crime Family
2127:social engineering
1967:U.S. Supreme Court
1798:
1717:
1714:telecommunications
1702:
1635:
1619:Internet of Things
1613:Internet of things
1499:
1419:
1397:targeted marketing
1374:
1242:
1168:surveillance tools
1109:social connections
990:transit monitoring
988:, border patrol, "
975:
973:) official website
910:
829:Facial recognition
816:
699:
621:
601:Chinese government
512:China was reported
481:
473:
470:Cairns, Queensland
393:
309:for instance, the
297:Phone surveillance
212:
103:
95:
8842:National security
8804:
8803:
8748:Mass surveillance
8210:
8209:
8113:
8112:
8004:Direction finding
7994:In modern history
7975:
7974:
7728:
7727:
7382:Agent provocateur
7310:Media related to
7152:978-1-439873-15-1
7138:978-0-465-05485-5
7124:978-0-190-29782-4
7068:978-0-7456-3591-0
7054:978-1-84392-191-2
7040:978-0-335-20546-2
7012:978-1-931498-52-4
6967:978-0-8173-1877-2
6957:978-0-226-29361-5
6931:Garfinkel, Simson
6926:978-0-415-89160-8
6832:978-3-631-63220-8
6794:Library resources
6777:978-0-385-35139-3
6517:"People vs. Diaz"
6162:, Jeroen van Rest
6097:978-0-252-06964-2
6025:on August 8, 2015
5946:CNN.com (FindLaw)
5778:on April 12, 2009
5498:on March 11, 2009
5168:978-1-4020-6913-0
4738:on March 30, 2010
4589:Popular Mechanics
4531:978-0-8330-3302-4
4213:978-3-200-01428-2
3976:on March 26, 2009
3667:Chicago Sun Times
3362:N.Y.U. Law Review
3341:on March 18, 2009
3258:The Seattle Times
2437:978-0-335-20546-2
2398:Vulkan files leak
2348:Mass surveillance
2265:'s secret police.
2257:by agents of the
2233:Long Term Parking
2217:Proshai, Livushka
2049:mass surveillance
1810:mass surveillance
1757:mass surveillance
1599:criminal activity
1431:subdermal implant
1323:man-in-the-middle
1275:Wireless tracking
1254:driver's licenses
1202:Michael McConnell
1187:Satellite imagery
792:NSA call database
727:NSA call database
683:social networking
428:telecommunication
277:van Eck phreaking
209:mass surveillance
87:
86:
16:(Redirected from
8859:
8822:Crime prevention
8794:
8793:
8662:Data Privacy Lab
8621:Privacy software
8268:Right to privacy
8237:
8230:
8223:
8214:
8213:
8009:Traffic analysis
7981:Signals (SIGINT)
7816:Asset recruiting
7784:
7783:
7775:
7774:
7755:
7748:
7741:
7732:
7731:
7342:
7335:
7328:
7319:
7318:
7309:
7259:
7202:
7170:Yan, W. (2019).
6782:
6781:
6770:, 290–291, 486.
6765:
6755:
6744:
6743:
6741:
6739:
6721:
6715:
6714:
6712:
6710:
6695:
6689:
6688:
6686:
6684:
6669:
6663:
6662:
6660:
6658:
6643:
6637:
6636:
6634:
6632:
6617:
6611:
6610:
6596:
6590:
6589:
6582:
6576:
6575:
6573:
6571:
6556:
6550:
6549:
6539:
6531:
6529:
6527:
6512:
6506:
6505:
6484:
6478:
6477:
6461:
6455:
6454:
6443:
6428:
6427:
6411:
6402:Foucault, Michel
6398:
6392:
6385:
6376:
6375:
6373:
6367:. Archived from
6348:
6339:
6333:
6332:
6325:
6319:
6318:
6316:
6314:
6308:
6297:
6289:
6280:
6279:
6277:
6275:
6261:
6250:
6249:
6226:
6220:
6219:
6217:
6215:
6206:. Archived from
6195:
6189:
6188:
6186:
6184:
6169:
6163:
6150:
6144:
6143:
6111:
6102:
6101:
6077:
6071:
6070:
6068:
6066:
6060:
6049:
6041:
6035:
6034:
6032:
6030:
6024:
6018:. Archived from
6017:
6009:
6003:
6002:
6001:. 70: 1627–1662.
5994:
5988:
5987:
5985:
5983:
5968:
5962:
5961:
5959:
5957:
5948:. Archived from
5937:
5931:
5930:
5928:
5926:
5920:Information Week
5911:
5905:
5898:
5892:
5885:
5879:
5874:
5868:
5863:
5857:
5856:
5820:
5814:
5813:
5811:
5809:
5794:
5788:
5787:
5785:
5783:
5774:. Archived from
5772:Information Week
5763:
5757:
5756:
5754:
5752:
5737:
5731:
5730:
5728:
5726:
5710:
5701:
5700:
5698:
5696:
5677:
5668:
5667:
5665:
5663:
5658:. March 29, 2020
5648:
5642:
5641:
5639:
5637:
5632:. March 29, 2020
5622:
5616:
5615:
5614:
5612:
5606:
5595:
5587:
5581:
5580:
5572:
5566:
5565:
5563:
5561:
5546:
5540:
5539:
5537:
5535:
5517:
5508:
5507:
5505:
5503:
5484:
5478:
5477:
5475:
5473:
5458:
5452:
5451:
5449:
5447:
5430:
5424:
5423:
5421:
5419:
5405:
5399:
5398:
5396:
5394:
5378:
5372:
5371:
5369:
5367:
5353:
5347:
5346:
5344:
5342:
5327:
5321:
5320:
5318:
5316:
5309:NBC Nightly News
5300:
5294:
5293:
5287:
5285:
5262:
5256:
5255:
5253:
5251:
5236:
5230:
5229:
5227:
5225:
5220:on March 8, 2009
5216:. Archived from
5205:
5199:
5198:
5196:
5194:
5179:
5173:
5172:
5151:
5145:
5144:
5142:
5116:
5110:
5103:
5097:
5093:
5087:
5086:
5084:
5082:
5077:on March 9, 2012
5073:. Archived from
5062:
5056:
5055:
5053:
5051:
5045:
5034:
5026:
5020:
5019:
5017:
5015:
5009:
4998:
4990:
4984:
4983:
4981:
4979:
4964:
4958:
4957:
4955:
4953:
4938:
4932:
4931:
4929:
4927:
4921:FlightGlobal.com
4912:
4903:
4902:
4900:
4898:
4883:
4877:
4861:Edwards, Bruce,
4859:
4853:
4852:
4850:
4848:
4831:
4825:
4824:
4822:
4820:
4809:
4803:
4802:
4800:
4798:
4783:
4774:
4773:
4771:
4769:
4754:
4748:
4747:
4745:
4743:
4734:. Archived from
4723:
4717:
4716:
4714:
4712:
4697:
4691:
4690:
4688:
4686:
4681:on June 17, 2008
4675:IDG News Service
4666:
4660:
4659:
4657:
4655:
4640:
4634:
4633:
4631:
4629:
4611:
4605:
4604:
4602:
4600:
4591:. Archived from
4580:
4574:
4573:
4571:
4569:
4554:
4548:
4547:
4545:
4543:
4534:. Archived from
4515:
4509:
4508:
4506:
4504:
4495:. Archived from
4484:
4478:
4477:
4475:
4473:
4457:
4451:
4450:
4448:
4446:
4430:
4421:
4420:
4418:
4416:
4402:
4396:
4395:
4393:
4391:
4371:
4365:
4364:
4362:
4360:
4351:. Archived from
4340:
4334:
4333:
4331:
4329:
4324:on July 20, 2012
4320:. Archived from
4309:
4303:
4302:
4300:
4298:
4283:
4277:
4276:
4270:
4262:
4260:
4258:
4242:
4233:
4232:
4230:
4228:
4222:
4205:
4194:
4188:
4187:
4185:
4161:
4152:
4151:
4141:
4135:
4134:
4132:
4130:
4115:
4109:
4108:
4106:
4104:
4095:. Archived from
4085:
4079:
4078:
4076:
4074:
4067:Business Insider
4058:
4052:
4051:
4049:
4047:
4039:McNealy, Scott.
4036:
4030:
4029:
4027:
4025:
4014:
4008:
4007:
4005:
4003:
3992:
3986:
3985:
3983:
3981:
3972:. Archived from
3961:
3952:
3951:
3949:
3947:
3938:. Archived from
3931:
3925:
3924:
3922:
3920:
3905:
3899:
3898:
3896:
3894:
3888:
3881:
3877:"CCTV in London"
3873:
3867:
3866:
3864:
3862:
3847:
3846:
3844:
3829:
3823:
3822:
3820:
3818:
3803:
3797:
3796:
3794:
3792:
3786:
3779:
3771:
3765:
3764:
3762:
3760:
3745:
3739:
3738:
3718:
3709:
3708:
3706:
3704:
3684:
3678:
3677:
3675:
3673:
3658:
3652:
3651:
3649:
3647:
3642:. April 13, 2018
3632:
3626:
3625:
3623:
3621:
3610:
3604:
3603:
3563:
3557:
3556:
3553:Business Insider
3544:
3538:
3537:
3525:
3519:
3518:
3516:
3514:
3499:
3488:
3487:
3485:
3483:
3469:
3463:
3462:
3460:
3458:
3441:
3430:
3429:
3427:
3425:
3416:. Archived from
3406:
3400:
3399:
3397:
3395:
3380:
3374:
3373:
3357:
3351:
3350:
3348:
3346:
3337:. Archived from
3326:
3317:
3316:
3314:
3312:
3307:. August 3, 2005
3297:
3288:
3287:
3275:
3269:
3268:
3266:
3264:
3249:
3243:
3242:
3240:
3238:
3229:. Archived from
3219:
3213:
3212:
3210:
3208:
3189:
3180:
3179:
3177:
3175:
3160:
3151:
3150:
3148:
3146:
3137:. Archived from
3126:
3117:
3116:
3114:
3112:
3097:
3091:
3090:
3088:
3086:
3071:
3065:
3064:
3062:
3060:
3045:
3039:
3038:
3036:
3034:
3018:
3012:
3011:
3009:
3007:
2992:
2986:
2985:
2983:
2981:
2975:
2964:
2955:
2949:
2948:
2946:
2944:
2929:
2923:
2922:
2920:
2918:
2900:
2894:
2893:
2887:
2878:
2872:
2871:
2869:
2854:
2836:
2827:
2821:
2820:
2819:. July 18, 2007.
2809:
2803:
2802:
2800:
2798:
2783:
2777:
2776:
2774:
2772:
2756:
2750:
2749:
2747:
2745:
2730:
2721:
2720:
2718:
2716:
2702:
2693:
2692:
2690:
2688:
2679:. Archived from
2669:
2660:
2659:
2657:
2655:
2640:
2634:
2633:
2617:
2611:
2610:
2608:
2606:
2600:
2589:
2581:
2575:
2574:
2572:
2570:
2547:
2541:
2540:
2535:
2533:
2510:
2504:
2503:
2498:
2496:
2473:
2467:
2466:
2448:
2442:
2441:
2423:
2363:Surveillance art
2311:a 1998 American
2271:The Conversation
2076:Lisbeth Salander
2010:police brutality
1984:security systems
1931:Church Committee
1842:Hawthorne effect
1830:face recognition
1675:Sun Microsystems
1281:tracking devices
1144:Human operatives
1138:Fourth Amendment
1093:electronic trail
786:
733:"maps" are then
723:traffic analysis
721:as well as from
593:General Electric
391:, England (2017)
118:Internet traffic
82:
79:
73:
70:add more content
54:
53:
46:
21:
8867:
8866:
8862:
8861:
8860:
8858:
8857:
8856:
8832:Law enforcement
8807:
8806:
8805:
8800:
8782:
8706:
8635:
8535:
8499:
8386:
8380:amended in 2020
8282:
8246:
8241:
8211:
8206:
8171:
8109:
8095:Imagery (IMINT)
8073:
8034:Electro-optical
8025:
8024:Measurement and
8018:
7971:
7947:Numbers station
7876:Black operation
7840:
7802:
7764:
7759:
7729:
7724:
7698:Sting operation
7607:Black operation
7573:
7569:Limited hangout
7551:
7542:
7506:Numbers station
7458:
7452:
7429:
7369:
7351:
7346:
7302:
7289:EFF Legal Cases
7285:
7283:Legal resources
7266:
7248:
7244:Wayback Machine
7191:
7188:
7132:, Basic Books,
7000:Jensen, Derrick
6819:
6818:
6817:
6802:
6801:
6797:
6790:
6788:Further reading
6785:
6778:
6756:
6747:
6737:
6735:
6722:
6718:
6708:
6706:
6696:
6692:
6682:
6680:
6670:
6666:
6656:
6654:
6644:
6640:
6630:
6628:
6618:
6614:
6597:
6593:
6584:
6583:
6579:
6569:
6567:
6557:
6553:
6533:
6532:
6525:
6523:
6513:
6509:
6502:
6485:
6481:
6462:
6458:
6444:
6431:
6424:
6399:
6395:
6386:
6379:
6371:
6346:
6340:
6336:
6327:
6326:
6322:
6312:
6310:
6306:
6295:
6291:
6290:
6283:
6273:
6271:
6263:
6262:
6253:
6227:
6223:
6213:
6211:
6196:
6192:
6182:
6180:
6170:
6166:
6160:Wayback Machine
6151:
6147:
6112:
6105:
6098:
6078:
6074:
6064:
6062:
6058:
6047:
6043:
6042:
6038:
6028:
6026:
6022:
6015:
6011:
6010:
6006:
5995:
5991:
5981:
5979:
5969:
5965:
5955:
5953:
5952:on May 18, 2009
5938:
5934:
5924:
5922:
5912:
5908:
5899:
5895:
5886:
5882:
5875:
5871:
5864:
5860:
5821:
5817:
5807:
5805:
5795:
5791:
5781:
5779:
5764:
5760:
5750:
5748:
5738:
5734:
5724:
5722:
5711:
5704:
5694:
5692:
5679:
5678:
5671:
5661:
5659:
5650:
5649:
5645:
5635:
5633:
5624:
5623:
5619:
5610:
5608:
5604:
5593:
5589:
5588:
5584:
5573:
5569:
5559:
5557:
5547:
5543:
5533:
5531:
5518:
5511:
5501:
5499:
5486:
5485:
5481:
5471:
5469:
5459:
5455:
5445:
5443:
5431:
5427:
5417:
5415:
5407:
5406:
5402:
5392:
5390:
5379:
5375:
5365:
5363:
5355:
5354:
5350:
5340:
5338:
5329:
5328:
5324:
5314:
5312:
5301:
5297:
5283:
5281:
5279:
5263:
5259:
5249:
5247:
5238:
5237:
5233:
5223:
5221:
5206:
5202:
5192:
5190:
5180:
5176:
5169:
5152:
5148:
5117:
5113:
5104:
5100:
5094:
5090:
5080:
5078:
5063:
5059:
5049:
5047:
5043:
5032:
5028:
5027:
5023:
5013:
5011:
5007:
4996:
4994:"HART Overview"
4992:
4991:
4987:
4977:
4975:
4966:
4965:
4961:
4951:
4949:
4939:
4935:
4925:
4923:
4913:
4906:
4896:
4894:
4884:
4880:
4870:Wayback Machine
4860:
4856:
4846:
4844:
4832:
4828:
4818:
4816:
4810:
4806:
4796:
4794:
4784:
4777:
4767:
4765:
4755:
4751:
4741:
4739:
4724:
4720:
4710:
4708:
4699:
4698:
4694:
4684:
4682:
4667:
4663:
4653:
4651:
4641:
4637:
4627:
4625:
4612:
4608:
4598:
4596:
4581:
4577:
4567:
4565:
4555:
4551:
4541:
4539:
4532:
4516:
4512:
4502:
4500:
4485:
4481:
4471:
4469:
4458:
4454:
4444:
4442:
4431:
4424:
4414:
4412:
4404:
4403:
4399:
4389:
4387:
4372:
4368:
4358:
4356:
4343:Ethier, Jason.
4341:
4337:
4327:
4325:
4310:
4306:
4296:
4294:
4284:
4280:
4264:
4263:
4256:
4254:
4245:Ethier, Jason.
4243:
4236:
4226:
4224:
4220:
4214:
4203:
4195:
4191:
4162:
4155:
4142:
4138:
4128:
4126:
4124:The Daily Beast
4116:
4112:
4102:
4100:
4087:
4086:
4082:
4072:
4070:
4060:
4059:
4055:
4045:
4043:
4037:
4033:
4023:
4021:
4015:
4011:
4001:
3999:
3994:
3993:
3989:
3979:
3977:
3962:
3955:
3945:
3943:
3932:
3928:
3918:
3916:
3907:
3906:
3902:
3892:
3890:
3886:
3879:
3875:
3874:
3870:
3860:
3858:
3857:. March 3, 2011
3849:
3842:
3840:
3839:. March 2, 2011
3831:
3830:
3826:
3816:
3814:
3813:on May 11, 2010
3805:
3804:
3800:
3790:
3788:
3784:
3777:
3773:
3772:
3768:
3758:
3756:
3754:nydailynews.com
3746:
3742:
3719:
3712:
3702:
3700:
3685:
3681:
3671:
3669:
3659:
3655:
3645:
3643:
3634:
3633:
3629:
3619:
3617:
3612:
3611:
3607:
3584:10.1145/2871183
3564:
3560:
3547:Szoldra, Paul.
3545:
3541:
3526:
3522:
3512:
3510:
3500:
3491:
3481:
3479:
3471:
3470:
3466:
3456:
3454:
3442:
3433:
3423:
3421:
3408:
3407:
3403:
3393:
3391:
3381:
3377:
3358:
3354:
3344:
3342:
3327:
3320:
3310:
3308:
3299:
3298:
3291:
3276:
3272:
3262:
3260:
3250:
3246:
3236:
3234:
3221:
3220:
3216:
3206:
3204:
3191:
3190:
3183:
3173:
3171:
3169:Financial Times
3161:
3154:
3144:
3142:
3127:
3120:
3110:
3108:
3098:
3094:
3084:
3082:
3072:
3068:
3058:
3056:
3046:
3042:
3032:
3030:
3019:
3015:
3005:
3003:
2993:
2989:
2979:
2977:
2973:
2962:
2956:
2952:
2942:
2940:
2930:
2926:
2916:
2914:
2901:
2897:
2885:
2879:
2875:
2867:
2834:
2828:
2824:
2811:
2810:
2806:
2796:
2794:
2784:
2780:
2770:
2768:
2757:
2753:
2743:
2741:
2732:
2731:
2724:
2714:
2712:
2704:
2703:
2696:
2686:
2684:
2671:
2670:
2663:
2653:
2651:
2641:
2637:
2618:
2614:
2604:
2602:
2598:
2587:
2583:
2582:
2578:
2568:
2566:
2548:
2544:
2531:
2529:
2527:
2511:
2507:
2494:
2492:
2490:
2474:
2470:
2463:
2449:
2445:
2438:
2424:
2420:
2416:
2339:
2298:and written by
2168:Minority Report
2149:
2143:
2118:
2109:totalitarianism
2031:
2026:
2024:Popular culture
1998:George Holliday
1976:
1947:People vs. Diaz
1943:
1885:
1848:Michel Foucault
1844:
1838:
1790:
1788:Totalitarianism
1694:
1667:video analytics
1640:
1627:
1615:
1587:
1580:
1560:
1558:Postal services
1526:
1520:
1505:
1491:
1486:
1481:
1480:
1471:
1463:
1411:
1405:
1366:
1327:law enforcement
1294:multilateration
1289:
1277:
1234:
1204:authorized the
1195:
1189:
1146:
1063:
1050:
1044:
902:
892:
822:
804:
787:
784:
748:(NSA), and the
703:social networks
671:
659:civil liberties
648:traffic control
637:Super Bowl XXXV
609:video analytics
462:
456:
366:multilateration
303:
295:Main articles:
293:
218:
197:
192:
165:civil liberties
83:
77:
74:
67:
55:
51:
42:
35:
28:
23:
22:
15:
12:
11:
5:
8865:
8855:
8854:
8849:
8844:
8839:
8834:
8829:
8824:
8819:
8802:
8801:
8799:
8798:
8787:
8784:
8783:
8781:
8780:
8775:
8770:
8765:
8763:Search warrant
8760:
8755:
8750:
8745:
8743:Identity theft
8740:
8735:
8730:
8725:
8720:
8714:
8712:
8708:
8707:
8705:
8704:
8699:
8694:
8689:
8684:
8679:
8674:
8669:
8664:
8659:
8654:
8649:
8643:
8641:
8637:
8636:
8634:
8633:
8628:
8623:
8618:
8616:Privacy policy
8613:
8608:
8603:
8598:
8593:
8588:
8583:
8578:
8577:
8576:
8571:
8566:
8556:
8551:
8545:
8543:
8537:
8536:
8534:
8533:
8528:
8523:
8518:
8513:
8507:
8505:
8501:
8500:
8498:
8497:
8495:United Kingdom
8492:
8487:
8482:
8477:
8472:
8467:
8462:
8457:
8452:
8447:
8442:
8437:
8432:
8427:
8422:
8417:
8412:
8410:European Union
8407:
8402:
8396:
8394:
8388:
8387:
8385:
8384:
8383:
8382:
8368:
8366:United Kingdom
8363:
8358:
8353:
8348:
8343:
8338:
8333:
8328:
8326:European Union
8323:
8318:
8313:
8308:
8303:
8298:
8292:
8290:
8284:
8283:
8281:
8280:
8275:
8270:
8265:
8260:
8254:
8252:
8248:
8247:
8240:
8239:
8232:
8225:
8217:
8208:
8207:
8205:
8204:
8199:
8198:
8197:
8187:
8181:
8179:
8173:
8172:
8170:
8169:
8164:
8159:
8154:
8149:
8144:
8139:
8134:
8132:Target-centric
8129:
8123:
8121:
8115:
8114:
8111:
8110:
8108:
8107:
8102:
8097:
8092:
8087:
8081:
8079:
8075:
8074:
8072:
8071:
8061:
8056:
8054:Radiofrequency
8051:
8046:
8041:
8036:
8030:
8028:
8020:
8019:
8017:
8016:
8011:
8006:
8001:
7996:
7991:
7985:
7983:
7977:
7976:
7973:
7972:
7970:
7969:
7964:
7959:
7954:
7949:
7944:
7939:
7934:
7929:
7924:
7919:
7910:
7905:
7900:
7895:
7890:
7885:
7884:
7883:
7873:
7868:
7867:
7866:
7861:
7850:
7848:
7842:
7841:
7839:
7838:
7833:
7828:
7823:
7818:
7812:
7810:
7804:
7803:
7801:
7800:
7799:
7798:
7787:
7781:
7779:Human (HUMINT)
7772:
7766:
7765:
7758:
7757:
7750:
7743:
7735:
7726:
7725:
7723:
7722:
7717:
7716:
7715:
7710:
7700:
7695:
7690:
7685:
7680:
7675:
7670:
7665:
7664:
7663:
7658:
7648:
7643:
7638:
7637:
7636:
7631:
7621:
7620:
7619:
7614:
7604:
7599:
7594:
7593:
7592:
7581:
7579:
7575:
7574:
7572:
7571:
7566:
7561:
7555:
7553:
7544:
7543:
7541:
7540:
7535:
7534:
7533:
7523:
7518:
7513:
7508:
7503:
7498:
7493:
7488:
7483:
7478:
7473:
7468:
7462:
7460:
7459:communications
7454:
7453:
7451:
7450:
7449:
7448:
7437:
7435:
7431:
7430:
7428:
7427:
7422:
7417:
7412:
7407:
7402:
7397:
7396:
7395:
7385:
7378:
7376:Agent handling
7372:
7370:
7368:
7367:
7362:
7356:
7353:
7352:
7345:
7344:
7337:
7330:
7322:
7316:
7315:
7301:
7300:External links
7298:
7297:
7296:
7291:
7284:
7281:
7280:
7279:
7273:
7265:
7262:
7261:
7260:
7246:
7234:
7229:
7224:
7219:
7214:
7209:
7204:
7198:Monthly Review
7187:
7184:
7183:
7182:
7168:
7154:
7140:
7126:
7112:
7098:
7084:
7070:
7056:
7042:
7028:
7014:
6997:
6983:
6969:
6959:
6945:
6928:
6918:
6904:
6890:
6888:978-0822359197
6876:
6862:
6848:
6834:
6816:
6815:
6810:
6804:
6803:
6792:
6791:
6789:
6786:
6784:
6783:
6776:
6745:
6716:
6690:
6664:
6638:
6612:
6591:
6577:
6551:
6507:
6501:978-0822359197
6500:
6488:Browne, Simone
6479:
6456:
6429:
6422:
6393:
6377:
6334:
6320:
6281:
6251:
6230:Solove, Daniel
6221:
6190:
6178:Wired Magazine
6164:
6145:
6103:
6096:
6072:
6061:on May 5, 2011
6036:
6004:
5989:
5963:
5932:
5906:
5893:
5880:
5869:
5858:
5831:(4): 370–376.
5815:
5789:
5758:
5732:
5702:
5669:
5643:
5617:
5582:
5567:
5541:
5530:. pp. A01
5509:
5479:
5453:
5425:
5400:
5373:
5348:
5322:
5295:
5277:
5257:
5231:
5200:
5174:
5167:
5146:
5133:(1): 249–269.
5111:
5098:
5088:
5057:
5021:
4985:
4959:
4933:
4904:
4878:
4854:
4826:
4804:
4792:Wired Magazine
4775:
4749:
4718:
4705:Wired Magazine
4692:
4661:
4635:
4624:. pp. A01
4606:
4575:
4549:
4530:
4510:
4493:Computer World
4479:
4452:
4422:
4397:
4366:
4335:
4304:
4278:
4234:
4212:
4189:
4153:
4136:
4110:
4080:
4053:
4031:
4009:
3987:
3953:
3926:
3900:
3868:
3824:
3798:
3766:
3740:
3710:
3679:
3653:
3627:
3605:
3558:
3539:
3520:
3489:
3464:
3431:
3401:
3375:
3352:
3318:
3289:
3270:
3244:
3214:
3181:
3152:
3118:
3092:
3066:
3054:Bloomberg News
3040:
3013:
2987:
2950:
2924:
2895:
2873:
2852:10.1.1.35.1695
2845:(4): 269–286.
2822:
2817:Wired Magazine
2804:
2778:
2751:
2722:
2694:
2683:on May 3, 2009
2661:
2635:
2612:
2576:
2542:
2525:
2505:
2488:
2468:
2461:
2443:
2436:
2417:
2415:
2412:
2411:
2410:
2405:
2400:
2395:
2390:
2385:
2380:
2375:
2370:
2365:
2360:
2355:
2350:
2345:
2338:
2335:
2334:
2333:
2324:
2303:
2300:the Wachowskis
2296:James McTeigue
2284:V for Vendetta
2279:
2266:
2245:
2236:
2180:
2163:
2145:Main article:
2142:
2139:
2138:
2137:
2130:
2117:
2114:
2113:
2112:
2095:
2083:V for Vendetta
2079:
2066:
2053:
2030:
2027:
2025:
2022:
1975:
1972:
1942:
1939:
1884:
1881:
1856:Superconnected
1837:
1834:
1816:-like purges.
1789:
1786:
1693:
1690:
1652:modus operandi
1639:
1636:
1626:
1623:
1614:
1611:
1603:land surveyors
1579:
1576:
1559:
1556:
1519:
1516:
1490:
1487:
1485:
1482:
1472:
1464:
1462:
1459:
1451:access control
1427:silicate glass
1407:Main article:
1404:
1401:
1365:
1362:
1288:
1285:
1276:
1273:
1233:
1230:
1191:Main article:
1188:
1185:
1183:capabilities.
1177:George W. Bush
1145:
1142:
1125:fusion centers
1070:Data profiling
1062:
1059:
1046:Main article:
1043:
1040:
1005:United Kingdom
891:
888:
818:Main article:
803:
800:
782:
731:social network
670:
667:
571:Greater London
562:United Kingdom
489:security guard
458:Main article:
455:
452:
397:Edward Snowden
330:Speech-to-text
292:
289:
214:Main article:
196:
193:
191:
188:
85:
84:
61:appears to be
58:
56:
49:
26:
9:
6:
4:
3:
2:
8864:
8853:
8850:
8848:
8845:
8843:
8840:
8838:
8835:
8833:
8830:
8828:
8825:
8823:
8820:
8818:
8815:
8814:
8812:
8797:
8789:
8788:
8785:
8779:
8776:
8774:
8771:
8769:
8766:
8764:
8761:
8759:
8756:
8754:
8751:
8749:
8746:
8744:
8741:
8739:
8736:
8734:
8733:Eavesdropping
8731:
8729:
8728:Data security
8726:
8724:
8721:
8719:
8716:
8715:
8713:
8709:
8703:
8700:
8698:
8695:
8693:
8690:
8688:
8685:
8683:
8680:
8678:
8675:
8673:
8670:
8668:
8665:
8663:
8660:
8658:
8655:
8653:
8650:
8648:
8645:
8644:
8642:
8638:
8632:
8629:
8627:
8626:Secret ballot
8624:
8622:
8619:
8617:
8614:
8612:
8609:
8607:
8604:
8602:
8599:
8597:
8594:
8592:
8589:
8587:
8586:Personal data
8584:
8582:
8579:
8575:
8572:
8570:
8567:
8565:
8562:
8561:
8560:
8557:
8555:
8552:
8550:
8547:
8546:
8544:
8542:
8538:
8532:
8529:
8527:
8524:
8522:
8519:
8517:
8514:
8512:
8509:
8508:
8506:
8502:
8496:
8493:
8491:
8488:
8486:
8483:
8481:
8478:
8476:
8473:
8471:
8468:
8466:
8463:
8461:
8458:
8456:
8453:
8451:
8448:
8446:
8443:
8441:
8438:
8436:
8433:
8431:
8428:
8426:
8423:
8421:
8418:
8416:
8413:
8411:
8408:
8406:
8403:
8401:
8398:
8397:
8395:
8393:
8389:
8381:
8377:
8374:
8373:
8372:
8371:United States
8369:
8367:
8364:
8362:
8359:
8357:
8354:
8352:
8349:
8347:
8344:
8342:
8339:
8337:
8334:
8332:
8329:
8327:
8324:
8322:
8319:
8317:
8314:
8312:
8309:
8307:
8304:
8302:
8299:
8297:
8294:
8293:
8291:
8289:
8285:
8279:
8276:
8274:
8271:
8269:
8266:
8264:
8261:
8259:
8256:
8255:
8253:
8249:
8245:
8238:
8233:
8231:
8226:
8224:
8219:
8218:
8215:
8203:
8200:
8196:
8195:organizations
8193:
8192:
8191:
8188:
8186:
8183:
8182:
8180:
8178:
8177:Dissemination
8174:
8168:
8165:
8163:
8160:
8158:
8155:
8153:
8150:
8148:
8145:
8143:
8140:
8138:
8135:
8133:
8130:
8128:
8125:
8124:
8122:
8120:
8116:
8106:
8103:
8101:
8098:
8096:
8093:
8091:
8088:
8086:
8083:
8082:
8080:
8076:
8069:
8065:
8062:
8060:
8057:
8055:
8052:
8050:
8047:
8045:
8042:
8040:
8037:
8035:
8032:
8031:
8029:
8027:
8021:
8015:
8012:
8010:
8007:
8005:
8002:
8000:
7997:
7995:
7992:
7990:
7987:
7986:
7984:
7982:
7978:
7968:
7965:
7963:
7962:Steganography
7960:
7958:
7955:
7953:
7950:
7948:
7945:
7943:
7942:Interrogation
7940:
7938:
7935:
7933:
7930:
7928:
7927:Eavesdropping
7925:
7923:
7920:
7918:
7914:
7911:
7909:
7906:
7904:
7901:
7899:
7896:
7894:
7891:
7889:
7886:
7882:
7879:
7878:
7877:
7874:
7872:
7869:
7865:
7862:
7860:
7857:
7856:
7855:
7852:
7851:
7849:
7847:
7843:
7837:
7834:
7832:
7831:Direct action
7829:
7827:
7826:Covert action
7824:
7822:
7819:
7817:
7814:
7813:
7811:
7809:
7805:
7797:
7796:organizations
7794:
7793:
7792:
7789:
7788:
7785:
7782:
7780:
7776:
7773:
7771:
7767:
7763:
7756:
7751:
7749:
7744:
7742:
7737:
7736:
7733:
7721:
7718:
7714:
7711:
7709:
7706:
7705:
7704:
7701:
7699:
7696:
7694:
7691:
7689:
7686:
7684:
7681:
7679:
7676:
7674:
7671:
7669:
7666:
7662:
7659:
7657:
7656:interrogation
7654:
7653:
7652:
7649:
7647:
7644:
7642:
7639:
7635:
7632:
7630:
7627:
7626:
7625:
7624:Eavesdropping
7622:
7618:
7615:
7613:
7610:
7609:
7608:
7605:
7603:
7600:
7598:
7595:
7591:
7588:
7587:
7586:
7583:
7582:
7580:
7576:
7570:
7567:
7565:
7562:
7560:
7557:
7556:
7554:
7549:
7545:
7539:
7536:
7532:
7529:
7528:
7527:
7526:Steganography
7524:
7522:
7519:
7517:
7514:
7512:
7509:
7507:
7504:
7502:
7501:Invisible ink
7499:
7497:
7494:
7492:
7489:
7487:
7484:
7482:
7479:
7477:
7474:
7472:
7469:
7467:
7464:
7463:
7461:
7455:
7447:
7444:
7443:
7442:
7439:
7438:
7436:
7432:
7426:
7423:
7421:
7420:Sleeper agent
7418:
7416:
7413:
7411:
7408:
7406:
7403:
7401:
7398:
7394:
7391:
7390:
7389:
7386:
7384:
7383:
7379:
7377:
7374:
7373:
7371:
7366:
7363:
7361:
7358:
7357:
7354:
7350:
7343:
7338:
7336:
7331:
7329:
7324:
7323:
7320:
7313:
7308:
7304:
7303:
7295:
7292:
7290:
7287:
7286:
7277:
7274:
7271:
7268:
7267:
7257:
7256:
7251:
7247:
7245:
7241:
7238:
7235:
7233:
7230:
7228:
7225:
7223:
7220:
7218:
7215:
7213:
7210:
7208:
7205:
7200:
7199:
7194:
7190:
7189:
7181:
7177:
7173:
7169:
7167:
7166:0-7425-0077-2
7163:
7159:
7155:
7153:
7149:
7145:
7141:
7139:
7135:
7131:
7127:
7125:
7121:
7117:
7113:
7111:
7107:
7103:
7099:
7097:
7096:9780415953931
7093:
7089:
7085:
7083:
7082:0-7456-4511-9
7079:
7075:
7071:
7069:
7065:
7061:
7057:
7055:
7051:
7047:
7043:
7041:
7037:
7033:
7029:
7027:
7023:
7019:
7015:
7013:
7009:
7005:
7001:
6998:
6996:
6995:0-7748-1611-2
6992:
6988:
6984:
6982:
6981:0-14-311890-0
6978:
6974:
6970:
6968:
6964:
6960:
6958:
6954:
6950:
6946:
6944:
6943:0-596-00105-3
6940:
6936:
6932:
6929:
6927:
6923:
6919:
6917:
6916:0-375-42534-9
6913:
6909:
6905:
6903:
6899:
6895:
6891:
6889:
6885:
6881:
6877:
6875:
6871:
6867:
6863:
6861:
6857:
6853:
6849:
6847:
6843:
6839:
6835:
6833:
6829:
6825:
6821:
6820:
6814:
6811:
6809:
6806:
6805:
6800:
6795:
6779:
6773:
6769:
6764:
6763:
6754:
6752:
6750:
6733:
6732:
6727:
6720:
6705:
6701:
6694:
6679:
6675:
6668:
6653:
6649:
6642:
6627:
6626:The Intercept
6623:
6616:
6608:
6607:
6602:
6595:
6587:
6581:
6566:
6562:
6555:
6547:
6543:
6537:
6522:
6518:
6511:
6503:
6497:
6493:
6489:
6483:
6475:
6471:
6467:
6460:
6452:
6448:
6442:
6440:
6438:
6436:
6434:
6425:
6423:9780394727677
6419:
6415:
6410:
6409:
6403:
6397:
6390:
6384:
6382:
6370:
6366:
6362:
6358:
6354:
6353:
6345:
6338:
6330:
6324:
6305:
6301:
6294:
6288:
6286:
6270:
6266:
6260:
6258:
6256:
6247:
6243:
6239:
6235:
6231:
6225:
6209:
6205:
6204:Business Week
6201:
6194:
6179:
6175:
6168:
6161:
6157:
6154:
6149:
6141:
6137:
6133:
6129:
6125:
6121:
6117:
6110:
6108:
6099:
6093:
6089:
6085:
6084:
6076:
6057:
6053:
6046:
6040:
6021:
6014:
6008:
6000:
5993:
5978:
5974:
5967:
5951:
5947:
5943:
5936:
5921:
5917:
5910:
5903:
5897:
5890:
5884:
5878:
5877:Radartutorial
5873:
5867:
5862:
5854:
5850:
5846:
5842:
5838:
5834:
5830:
5826:
5819:
5804:
5800:
5793:
5777:
5773:
5769:
5762:
5747:
5743:
5736:
5720:
5716:
5709:
5707:
5690:
5686:
5682:
5676:
5674:
5657:
5653:
5647:
5631:
5627:
5621:
5603:
5599:
5592:
5586:
5578:
5571:
5555:
5552:
5545:
5529:
5528:
5523:
5516:
5514:
5497:
5493:
5489:
5483:
5468:
5464:
5457:
5442:
5441:
5436:
5429:
5414:
5410:
5404:
5388:
5384:
5377:
5362:
5358:
5352:
5336:
5332:
5326:
5310:
5306:
5299:
5292:
5284:September 13,
5280:
5278:9781538125885
5274:
5270:
5269:
5261:
5245:
5241:
5235:
5219:
5215:
5211:
5204:
5189:
5185:
5178:
5170:
5164:
5160:
5156:
5150:
5141:
5136:
5132:
5128:
5127:
5122:
5115:
5108:
5102:
5092:
5076:
5072:
5071:Defense Daily
5068:
5061:
5042:
5038:
5031:
5025:
5006:
5002:
4995:
4989:
4973:
4969:
4963:
4948:
4944:
4937:
4922:
4918:
4911:
4909:
4893:
4889:
4882:
4875:
4871:
4867:
4864:
4858:
4843:
4842:
4837:
4830:
4815:
4814:"MQ-9 Reaper"
4808:
4793:
4789:
4782:
4780:
4764:
4760:
4753:
4737:
4733:
4729:
4726:Mack, Kelly.
4722:
4706:
4702:
4696:
4680:
4676:
4672:
4665:
4650:
4646:
4639:
4623:
4622:
4617:
4610:
4594:
4590:
4586:
4579:
4564:
4560:
4553:
4537:
4533:
4527:
4523:
4522:
4514:
4498:
4494:
4490:
4483:
4467:
4463:
4456:
4440:
4436:
4429:
4427:
4411:
4407:
4401:
4385:
4381:
4377:
4370:
4354:
4350:
4346:
4339:
4323:
4319:
4315:
4308:
4293:
4292:New Scientist
4289:
4282:
4274:
4268:
4252:
4248:
4241:
4239:
4219:
4215:
4209:
4202:
4201:
4193:
4184:
4179:
4175:
4171:
4167:
4160:
4158:
4149:
4148:
4140:
4129:September 13,
4125:
4121:
4114:
4098:
4094:
4090:
4084:
4069:
4068:
4063:
4057:
4042:
4035:
4020:
4013:
4002:September 26,
3997:
3991:
3975:
3971:
3970:Rolling Stone
3967:
3960:
3958:
3941:
3937:
3930:
3914:
3910:
3904:
3885:
3878:
3872:
3856:
3852:
3838:
3834:
3828:
3812:
3808:
3802:
3783:
3776:
3770:
3755:
3751:
3744:
3736:
3732:
3728:
3724:
3717:
3715:
3698:
3694:
3690:
3683:
3668:
3664:
3657:
3641:
3637:
3631:
3616:. May 5, 2016
3615:
3609:
3601:
3597:
3593:
3589:
3585:
3581:
3577:
3573:
3569:
3562:
3554:
3550:
3543:
3535:
3531:
3524:
3509:
3505:
3498:
3496:
3494:
3482:September 22,
3478:
3474:
3468:
3453:
3452:
3447:
3440:
3438:
3436:
3419:
3415:
3411:
3405:
3390:
3386:
3379:
3371:
3367:
3363:
3356:
3340:
3336:
3332:
3325:
3323:
3306:
3302:
3296:
3294:
3285:
3281:
3274:
3259:
3255:
3248:
3232:
3228:
3224:
3218:
3202:
3198:
3194:
3188:
3186:
3170:
3166:
3159:
3157:
3140:
3136:
3132:
3125:
3123:
3107:
3103:
3096:
3081:
3077:
3070:
3055:
3051:
3044:
3028:
3024:
3017:
3002:
2998:
2991:
2972:
2968:
2961:
2954:
2939:
2935:
2928:
2913:. pp. A1
2912:
2911:
2906:
2899:
2891:
2884:
2877:
2866:
2862:
2858:
2853:
2848:
2844:
2840:
2833:
2826:
2818:
2814:
2808:
2797:September 26,
2793:
2789:
2782:
2766:
2762:
2755:
2739:
2735:
2729:
2727:
2711:
2707:
2701:
2699:
2682:
2678:
2674:
2668:
2666:
2650:
2646:
2639:
2632:(3): 595–623.
2631:
2627:
2623:
2616:
2597:
2593:
2586:
2580:
2565:
2561:
2557:
2553:
2546:
2539:
2528:
2526:9781930217133
2522:
2518:
2517:
2509:
2502:
2491:
2489:9780520301245
2485:
2481:
2480:
2472:
2464:
2462:9780190297824
2458:
2454:
2447:
2439:
2433:
2429:
2422:
2418:
2409:
2406:
2404:
2401:
2399:
2396:
2394:
2391:
2389:
2386:
2384:
2381:
2379:
2376:
2374:
2371:
2369:
2366:
2364:
2361:
2359:
2356:
2354:
2353:Sousveillance
2351:
2349:
2346:
2344:
2341:
2340:
2331:
2330:
2325:
2322:
2318:
2317:thriller film
2314:
2310:
2309:
2304:
2301:
2297:
2293:
2290:
2286:
2285:
2280:
2277:
2273:
2272:
2267:
2264:
2260:
2256:
2252:
2251:
2246:
2243:
2242:
2237:
2234:
2230:
2226:
2222:
2218:
2214:
2210:
2206:
2202:
2198:
2194:
2190:
2189:
2184:
2181:
2178:
2174:
2170:
2169:
2165:In the movie
2164:
2161:
2157:
2156:
2151:
2150:
2148:
2135:
2131:
2128:
2124:
2123:Dead Kennedys
2120:
2119:
2110:
2105:
2104:
2099:
2098:David Egger's
2096:
2094:
2090:
2089:graphic novel
2086:
2084:
2080:
2077:
2073:
2072:
2067:
2064:
2060:
2059:
2054:
2050:
2046:
2042:
2041:
2036:
2035:George Orwell
2033:
2032:
2029:In literature
2021:
2019:
2018:
2017:Sousveillance
2013:
2011:
2007:
2003:
1999:
1995:
1991:
1989:
1985:
1980:
1971:
1968:
1964:
1962:
1957:
1955:
1950:
1948:
1938:
1936:
1932:
1927:
1925:
1924:
1919:
1918:
1912:
1910:
1906:
1902:
1898:
1894:
1890:
1880:
1877:
1876:Simone Browne
1874:In addition,
1872:
1870:
1869:cyberbullying
1864:
1861:
1857:
1851:
1849:
1843:
1833:
1831:
1827:
1821:
1817:
1815:
1811:
1807:
1803:
1794:
1785:
1784:
1780:
1775:
1772:
1766:
1764:
1763:
1758:
1754:
1750:
1746:
1742:
1738:
1734:
1730:
1726:
1722:
1715:
1711:
1708:An elaborate
1706:
1698:
1689:
1687:
1682:
1680:
1679:Scott McNealy
1676:
1670:
1668:
1663:
1659:
1655:
1653:
1649:
1645:
1631:
1622:
1620:
1610:
1608:
1607:survey stakes
1604:
1600:
1596:
1592:
1585:
1575:
1573:
1569:
1564:
1555:
1551:
1549:
1545:
1541:
1537:
1532:
1530:
1525:
1515:
1512:
1510:
1504:
1495:
1478:
1476:
1469:
1458:
1454:
1452:
1448:
1443:
1439:
1435:
1432:
1428:
1424:
1415:
1410:
1400:
1398:
1392:
1389:
1385:
1384:strike action
1380:
1378:
1370:
1361:
1359:
1355:
1351:
1350:United States
1347:
1343:
1342:whistleblower
1339:
1334:
1332:
1328:
1324:
1320:
1316:
1312:
1306:
1301:
1299:
1295:
1287:Mobile phones
1284:
1282:
1272:
1270:
1265:
1263:
1260:, banking or
1259:
1258:library cards
1255:
1251:
1247:
1246:identity card
1238:
1229:
1227:
1222:
1218:
1215:
1211:
1208:(NAO) of the
1207:
1203:
1200:
1194:
1184:
1182:
1178:
1174:
1169:
1164:
1162:
1157:
1154:
1151:
1141:
1139:
1135:
1134:
1128:
1126:
1120:
1118:
1114:
1110:
1106:
1100:
1098:
1094:
1089:
1087:
1083:
1078:
1076:
1071:
1067:
1058:
1056:
1049:
1039:
1036:
1032:
1027:
1025:
1024:crowd control
1021:
1016:
1014:
1011:to full-size
1010:
1006:
1001:
999:
995:
991:
987:
983:
980:
979:United States
972:
968:
964:
960:
956:
954:
950:
946:
942:
938:
934:
929:
927:
923:
919:
915:
906:
901:
897:
887:
885:
881:
876:
873:
869:
867:
862:
860:
856:
855:DNA profiling
851:
849:
844:
842:
838:
834:
830:
826:
821:
813:
808:
799:
795:
793:
781:
776:
774:
769:
767:
763:
759:
755:
751:
747:
744:(DARPA), the
743:
738:
736:
732:
728:
724:
720:
716:
712:
708:
704:
697:
692:
688:
684:
680:
675:
666:
664:
660:
656:
651:
649:
644:
642:
638:
633:
630:
626:
617:
613:
610:
606:
602:
598:
594:
590:
586:
581:
579:
574:
572:
567:
563:
558:
556:
552:
548:
547:New York City
544:
543:Richard Daley
540:
536:
532:
528:
524:
523:United States
519:
517:
513:
508:
506:
502:
498:
494:
490:
486:
477:
471:
466:
461:
451:
449:
444:
441:
437:
433:
429:
425:
422:Although the
420:
417:
413:
411:
406:
402:
398:
390:
386:
381:
377:
375:
371:
367:
361:
359:
354:
349:
345:
343:
339:
335:
331:
326:
324:
320:
316:
315:AT&T Inc.
312:
308:
307:United States
302:
298:
288:
286:
282:
278:
274:
270:
269:Magic Lantern
265:
263:
259:
255:
251:
247:
243:
237:
235:
231:
227:
223:
217:
210:
206:
201:
187:
185:
180:
176:
174:
173:authoritarian
170:
166:
162:
157:
155:
151:
147:
143:
139:
134:
129:
127:
123:
119:
115:
111:
107:
99:
91:
81:
71:
66:
64:
59:This article
57:
48:
47:
44:
40:
33:
19:
8817:Surveillance
8773:Human rights
8288:Privacy laws
7967:Surveillance
7966:
7957:Resident spy
7898:Cryptography
7703:Surveillance
7702:
7491:Cyber spying
7476:Cryptography
7415:Resident spy
7400:Double agent
7380:
7312:Surveillance
7255:The Guardian
7253:
7196:
7171:
7157:
7143:
7129:
7115:
7101:
7087:
7073:
7059:
7045:
7031:
7017:
7003:
6986:
6972:
6948:
6934:
6907:
6893:
6879:
6865:
6851:
6837:
6823:
6799:Surveillance
6798:
6761:
6736:. Retrieved
6731:The Guardian
6729:
6719:
6707:. Retrieved
6703:
6693:
6681:. Retrieved
6677:
6667:
6655:. Retrieved
6651:
6641:
6629:. Retrieved
6625:
6615:
6604:
6594:
6580:
6568:. Retrieved
6564:
6554:
6524:. Retrieved
6520:
6510:
6491:
6482:
6473:
6469:
6459:
6450:
6447:Chayko, Mary
6407:
6396:
6369:the original
6356:
6350:
6337:
6323:
6311:. Retrieved
6299:
6272:. Retrieved
6268:
6237:
6233:
6224:
6212:. Retrieved
6208:the original
6203:
6193:
6181:. Retrieved
6177:
6167:
6148:
6126:(4): 14–22.
6123:
6120:Human Rights
6119:
6082:
6075:
6063:. Retrieved
6056:the original
6051:
6039:
6027:. Retrieved
6020:the original
6007:
5998:
5992:
5980:. Retrieved
5976:
5973:"COINTELPRO"
5971:Wolf, Paul.
5966:
5954:. Retrieved
5950:the original
5945:
5935:
5923:. Retrieved
5919:
5909:
5901:
5896:
5888:
5883:
5872:
5861:
5828:
5824:
5818:
5806:. Retrieved
5802:
5792:
5780:. Retrieved
5776:the original
5771:
5761:
5749:. Retrieved
5745:
5735:
5723:. Retrieved
5718:
5693:. Retrieved
5689:the original
5685:RFID Journal
5684:
5660:. Retrieved
5655:
5646:
5634:. Retrieved
5630:The Guardian
5629:
5620:
5611:November 27,
5609:, retrieved
5602:the original
5597:
5585:
5570:
5558:. Retrieved
5553:
5544:
5532:. Retrieved
5525:
5500:. Retrieved
5496:the original
5491:
5482:
5470:. Retrieved
5466:
5456:
5444:. Retrieved
5438:
5428:
5416:. Retrieved
5412:
5403:
5391:. Retrieved
5386:
5376:
5364:. Retrieved
5360:
5351:
5339:. Retrieved
5334:
5325:
5313:. Retrieved
5308:
5298:
5289:
5282:. Retrieved
5267:
5260:
5248:. Retrieved
5243:
5234:
5222:. Retrieved
5218:the original
5213:
5203:
5191:. Retrieved
5187:
5177:
5158:
5149:
5130:
5124:
5114:
5101:
5091:
5079:. Retrieved
5075:the original
5070:
5060:
5048:. Retrieved
5041:the original
5036:
5024:
5012:. Retrieved
5005:the original
5000:
4988:
4976:. Retrieved
4971:
4962:
4950:. Retrieved
4946:
4936:
4924:. Retrieved
4920:
4895:. Retrieved
4891:
4881:
4873:
4857:
4845:. Retrieved
4841:The Atlantic
4839:
4829:
4817:. Retrieved
4812:Boyd, Ryan.
4807:
4795:. Retrieved
4791:
4768:December 20,
4766:. Retrieved
4762:
4752:
4742:December 20,
4740:. Retrieved
4736:the original
4731:
4721:
4709:. Retrieved
4704:
4695:
4683:. Retrieved
4679:the original
4674:
4664:
4652:. Retrieved
4648:
4638:
4626:. Retrieved
4619:
4609:
4597:. Retrieved
4593:the original
4588:
4578:
4566:. Retrieved
4562:
4552:
4540:. Retrieved
4536:the original
4520:
4513:
4501:. Retrieved
4497:the original
4492:
4482:
4470:. Retrieved
4466:Threat Level
4465:
4455:
4443:. Retrieved
4439:Threat Level
4438:
4415:December 20,
4413:. Retrieved
4409:
4400:
4388:. Retrieved
4383:
4379:
4369:
4357:. Retrieved
4353:the original
4348:
4338:
4326:. Retrieved
4322:the original
4317:
4307:
4295:. Retrieved
4291:
4281:
4255:. Retrieved
4250:
4225:. Retrieved
4199:
4192:
4173:
4170:First Monday
4169:
4145:
4139:
4127:. Retrieved
4123:
4113:
4101:. Retrieved
4097:the original
4092:
4083:
4071:. Retrieved
4065:
4056:
4046:December 24,
4044:. Retrieved
4034:
4022:. Retrieved
4012:
4000:. Retrieved
3990:
3978:. Retrieved
3974:the original
3969:
3944:. Retrieved
3940:the original
3929:
3917:. Retrieved
3913:the original
3903:
3891:. Retrieved
3871:
3859:. Retrieved
3854:
3841:. Retrieved
3837:The Guardian
3836:
3827:
3815:. Retrieved
3811:the original
3801:
3789:. Retrieved
3782:the original
3769:
3757:. Retrieved
3753:
3743:
3729:(1): 70–84.
3726:
3722:
3701:. Retrieved
3692:
3682:
3670:. Retrieved
3666:
3656:
3644:. Retrieved
3639:
3630:
3618:. Retrieved
3608:
3575:
3571:
3561:
3552:
3542:
3534:The Guardian
3533:
3523:
3511:. Retrieved
3507:
3480:. Retrieved
3476:
3467:
3455:. Retrieved
3449:
3422:. Retrieved
3418:the original
3413:
3404:
3392:. Retrieved
3388:
3378:
3361:
3355:
3343:. Retrieved
3339:the original
3334:
3309:. Retrieved
3304:
3283:
3273:
3263:December 14,
3261:. Retrieved
3257:
3247:
3237:December 13,
3235:. Retrieved
3231:the original
3226:
3217:
3205:. Retrieved
3201:the original
3196:
3193:"Telephones"
3172:. Retrieved
3168:
3143:. Retrieved
3139:the original
3134:
3111:December 13,
3109:. Retrieved
3105:
3095:
3083:. Retrieved
3079:
3069:
3057:. Retrieved
3053:
3043:
3031:. Retrieved
3027:Threat Level
3026:
3016:
3006:February 13,
3004:. Retrieved
3000:
2990:
2978:. Retrieved
2967:The Guardian
2966:
2953:
2941:. Retrieved
2938:The Atlantic
2937:
2927:
2915:. Retrieved
2908:
2898:
2889:
2876:
2842:
2838:
2825:
2816:
2807:
2795:. Retrieved
2791:
2781:
2769:. Retrieved
2764:
2754:
2742:. Retrieved
2737:
2713:. Retrieved
2709:
2685:. Retrieved
2681:the original
2676:
2652:. Retrieved
2648:
2638:
2629:
2625:
2615:
2603:. Retrieved
2591:
2579:
2567:. Retrieved
2555:
2545:
2537:
2530:. Retrieved
2515:
2508:
2500:
2493:. Retrieved
2478:
2471:
2452:
2446:
2427:
2421:
2327:
2319:directed by
2306:
2294:directed by
2282:
2269:
2248:
2239:
2221:Members Only
2188:The Sopranos
2186:
2166:
2153:
2101:
2081:
2069:
2068:In the book
2056:
2052:problematic.
2045:totalitarian
2038:
2015:
2014:
1992:
1977:
1960:
1958:
1953:
1946:
1944:
1928:
1921:
1915:
1913:
1889:civil rights
1886:
1873:
1865:
1855:
1852:
1845:
1822:
1818:
1799:
1776:
1770:
1767:
1760:
1741:civil rights
1723:program and
1718:
1683:
1671:
1664:
1660:
1656:
1641:
1616:
1590:
1588:
1565:
1561:
1552:
1533:
1527:
1513:
1506:
1503:GPS tracking
1473:
1455:
1440:
1436:
1420:
1393:
1388:dehumanizing
1381:
1375:
1364:RFID tagging
1346:Saudi Arabia
1338:The Guardian
1335:
1319:mobile tower
1311:IMSI-catcher
1308:
1303:
1290:
1278:
1266:
1262:credit cards
1243:
1226:Google Earth
1196:
1165:
1158:
1155:
1147:
1131:
1129:
1121:
1101:
1090:
1079:
1064:
1051:
1028:
1017:
1002:
976:
930:
911:
877:
870:
863:
852:
845:
827:
823:
796:
789:
785:Jason Ethier
778:
770:
739:
700:
652:
645:
634:
622:
582:
575:
559:
520:
509:
482:
445:
421:
414:
394:
373:
362:
350:
346:
327:
304:
266:
258:NarusInsight
238:
219:
177:
158:
130:
106:Surveillance
105:
104:
75:
60:
43:
8768:Wiretapping
8480:Switzerland
8465:South Korea
8455:Philippines
8445:Netherlands
8440:Isle of Man
8361:Switzerland
8341:New Zealand
8039:Geophysical
7821:Cell system
7808:Clandestine
7693:Stay-behind
7602:Recruitment
7559:Canary trap
7457:Devices and
7405:Field agent
6709:October 31,
6683:October 31,
6657:October 31,
6631:October 31,
6570:February 1,
6526:February 1,
6359:: 375–395.
5246:. June 2007
3946:December 2,
3791:February 4,
3759:November 1,
3578:(4): 1–46.
3513:November 1,
3457:November 1,
3394:December 5,
2980:February 1,
2329:The Capture
2255:East Berlin
2229:Pax Soprana
2227:(e.g., in "
2134:Vienna Teng
2091:written by
2002:Rodney King
1941:Court cases
1891:groups and
1860:Mary Chayko
1625:Controversy
1597:related to
1544:subversives
1298:cell towers
1086:paper trail
1066:Data mining
941:MQ-9 Reaper
924:. Military
758:subversives
401:wiretapping
370:cell towers
358:IMSI number
169:Democracies
167:activists.
133:governments
8811:Categories
8753:Panopticon
8376:California
8251:Principles
8068:earthquake
7932:False flag
7770:Collection
7688:Sexpionage
7668:COINTELPRO
7661:safe house
7641:False flag
7578:Operations
7552:techniques
7548:Tradecraft
7270:COINTELPRO
7180:3030107124
7110:0813547652
7026:1477312439
6902:1847873537
6874:0190684097
6860:1138026026
6846:0700616861
6762:The Circle
5656:TechCrunch
5389:. ABC News
5366:October 5,
5311:. NBC News
4872:, Rutland
4847:October 5,
4819:October 5,
4073:October 5,
3934:Den Haag.
3861:January 7,
3843:January 7,
3723:Interfaces
3620:January 5,
2792:ZDNet News
2605:October 1,
2414:References
2321:Tony Scott
2305:The movie
2281:The movie
2268:The movie
2247:The movie
2238:The movie
2103:The Circle
2093:Alan Moore
2087:a British
1935:COINTELPRO
1840:See also:
1814:COINTELPRO
1779:IP cameras
1733:biometrics
1692:Opposition
1644:terrorists
1536:COINTELPRO
1522:See also:
1501:See also:
1453:purposes.
1305:real-time.
1161:informants
1105:aggregated
918:helicopter
820:Biometrics
766:dissidents
762:extremists
754:terrorists
735:data mined
485:IP network
405:encryption
389:Cheltenham
291:Telephones
150:heterodoxy
8718:Anonymity
8554:Financial
8531:Workplace
8521:Education
8430:Indonesia
8400:Australia
8356:Sri Lanka
8351:Singapore
8296:Australia
8059:Materials
7913:Defection
7908:Dead drop
7881:black bag
7846:Espionage
7612:black bag
7496:Dead drop
7425:Spymaster
7349:Espionage
6738:August 6,
6313:March 13,
6274:March 13,
6214:March 20,
6200:"Privacy"
6183:March 20,
6132:0046-8185
6065:March 13,
5982:March 14,
5956:March 17,
5925:March 18,
5808:March 17,
5782:March 17,
5746:CNET News
5725:March 17,
5719:USA Today
5695:March 23,
5662:March 29,
5636:March 29,
5560:March 17,
5554:USA Today
5534:March 17,
5502:March 16,
5472:March 16,
5446:March 14,
5418:March 16,
5393:March 13,
5341:March 13,
5315:March 13,
5250:March 14,
5224:March 20,
5193:March 13,
5081:March 16,
5050:March 16,
5014:March 15,
4978:March 15,
4952:March 13,
4926:March 13,
4897:March 14,
4892:CNet News
4797:March 18,
4711:March 18,
4685:March 18,
4654:March 14,
4599:March 14,
4568:March 16,
4563:USA Today
4542:March 15,
4503:March 14,
4472:March 19,
4445:March 19,
4390:March 14,
4359:March 15,
4328:March 16,
4318:CNET News
4297:March 16,
4257:March 15,
4103:March 13,
3980:March 20,
3703:March 13,
3672:March 13,
3646:April 13,
3592:0360-0300
3345:March 14,
3311:March 14,
3207:March 22,
3174:March 14,
3145:March 14,
3135:CNet News
3085:March 14,
3059:March 19,
3033:March 19,
3001:The Verge
2847:CiteSeerX
2771:March 19,
2765:USA Today
2744:March 14,
2715:March 14,
2687:March 14,
2654:March 13,
2569:April 15,
2564:1059-1028
2532:March 14,
2495:March 14,
2289:dystopian
2287:, a 2005
2160:biometric
2152:The film
2063:theocracy
2055:The book
2037:'s novel
1887:Numerous
1826:biometric
1648:criminals
1605:of using
1566:The U.S.
1548:criminals
1250:passports
1042:Corporate
994:Honeywell
922:spy plane
880:his paper
802:Biometric
655:biometric
641:Identix's
597:Honeywell
426:requires
254:Carnivore
184:espionage
179:Espionage
142:Religious
78:June 2024
8852:Security
8796:Category
8711:See also
8564:Facebook
8559:Internet
8511:Consumer
8485:Thailand
8119:Analysis
7917:Turncoat
7864:handling
7678:SHAMROCK
7531:microdot
7434:Analysis
7240:Archived
6734:. London
6536:cite web
6449:(2017).
6404:(1979).
6304:Archived
6156:Archived
6140:26423456
5853:12365071
5845:20923593
5751:July 24,
4866:Archived
4763:LA Times
4267:cite web
4227:July 28,
4218:Archived
4024:June 18,
3893:July 22,
3884:Archived
3697:Archived
3693:CBS News
3640:BBC News
3335:FOX News
3305:BBC News
3080:LA Times
2971:Archived
2943:June 30,
2917:June 30,
2892:: 23–25.
2865:Archived
2596:Archived
2378:Trapwire
2337:See also
2241:THX-1138
2213:Funhouse
2209:Rat Pack
2141:Onscreen
2116:In music
2006:Copwatch
1956:(2014).
1710:graffito
1595:evidence
1591:stakeout
1578:Stakeout
1442:Verichip
812:US-VISIT
783:—
711:Facebook
709:such as
687:Facebook
663:Trapwire
497:database
436:metadata
353:StingRay
230:Internet
195:Computer
154:Auditors
110:managing
8847:Privacy
8574:Twitter
8526:Medical
8516:Digital
8435:Ireland
8420:Germany
8405:Denmark
8331:Germany
8321:England
8316:Denmark
8244:Privacy
8066: (
8044:Nuclear
8014:TEMPEST
7673:MINARET
7617:wetwork
7201:. 2014.
6521:FindLaw
6240:: 745.
5387:Blotter
4468:. Wired
4441:. Wired
3600:6128808
3424:June 3,
3370:1092293
3029:. Wired
2219:" and "
2203:" and "
2155:Gattaca
1893:privacy
1883:Privacy
1745:privacy
1638:Support
1518:Devices
814:program
719:Twitter
715:MySpace
560:In the
535:Chicago
521:In the
505:HumanID
454:Cameras
432:e-mails
348:phone.
319:Verizon
281:Pinwale
262:ECHELON
228:on the
226:traffic
190:Methods
161:privacy
8569:Google
8490:Turkey
8475:Sweden
8460:Poland
8450:Norway
8415:France
8346:Russia
8306:Canada
8301:Brazil
7903:Cutout
7854:Agents
7708:Global
7634:MASINT
7629:SIGINT
7481:Cutout
7365:Assets
7360:Agents
7178:
7164:
7150:
7136:
7122:
7108:
7094:
7080:
7066:
7052:
7038:
7024:
7010:
6993:
6979:
6965:
6955:
6941:
6924:
6914:
6900:
6886:
6872:
6858:
6844:
6830:
6796:about
6774:
6498:
6420:
6416:–202.
6246:998565
6244:
6138:
6130:
6094:
6029:25 May
5851:
5843:
5275:
5165:
4874:Herald
4628:May 6,
4528:
4210:
3919:May 8,
3817:May 8,
3598:
3590:
3368:
2849:
2562:
2523:
2486:
2459:
2434:
2313:action
2261:, the
2100:novel
1965:was a
1963:(2014)
1949:(2011)
1725:ADVISE
1546:, and
1354:spying
1181:HUMINT
1130:Under
1113:ADVISE
1020:tasers
1013:drones
890:Aerial
764:, and
595:, and
525:, the
340:, and
338:Verint
260:, and
244:, the
146:heresy
8758:PRISM
8581:Email
8504:Areas
8470:Spain
8425:India
8336:Ghana
8311:China
8078:Other
8049:Radar
7893:Cover
7871:Asset
7859:field
7393:Agent
7388:Cover
6372:(PDF)
6347:(PDF)
6307:(PDF)
6296:(PDF)
6136:JSTOR
6059:(PDF)
6048:(PDF)
6023:(PDF)
6016:(PDF)
5849:S2CID
5605:(PDF)
5594:(PDF)
5291:tail.
5096:2014.
5044:(PDF)
5033:(PDF)
5008:(PDF)
4997:(PDF)
4221:(PDF)
4204:(PDF)
4176:(3).
3887:(PDF)
3880:(PDF)
3785:(PDF)
3778:(PDF)
3596:S2CID
2974:(PDF)
2963:(PDF)
2886:(PDF)
2868:(PDF)
2835:(PDF)
2599:(PDF)
2588:(PDF)
2556:Wired
2259:Stasi
1783:Qihoo
1461:Radar
1117:TALON
1097:CALEA
1035:DARPA
1022:for "
971:DARPA
920:, or
833:DARPA
685:site
679:graph
605:China
501:VIRAT
424:CALEA
416:Apple
410:Apple
342:Narus
285:PRISM
273:CIPAV
8697:NOYB
7713:Mass
7683:FVEY
7410:Mole
7176:ISBN
7162:ISBN
7148:ISBN
7134:ISBN
7120:ISBN
7106:ISBN
7092:ISBN
7078:ISBN
7064:ISBN
7050:ISBN
7036:ISBN
7022:ISBN
7008:ISBN
6991:ISBN
6977:ISBN
6963:ISBN
6953:ISBN
6939:ISBN
6922:ISBN
6912:ISBN
6898:ISBN
6884:ISBN
6870:ISBN
6856:ISBN
6842:ISBN
6828:ISBN
6772:ISBN
6740:2007
6711:2023
6704:CNBC
6685:2023
6678:CNBC
6659:2023
6652:CNBC
6633:2023
6572:2013
6546:link
6542:link
6528:2017
6496:ISBN
6418:ISBN
6315:2009
6276:2009
6242:SSRN
6216:2009
6185:2009
6128:ISSN
6092:ISBN
6067:2009
6031:2015
5984:2009
5958:2009
5927:2009
5841:PMID
5810:2009
5784:2009
5753:2012
5727:2009
5697:2012
5664:2020
5638:2020
5613:2015
5562:2009
5536:2009
5504:2009
5474:2009
5448:2009
5420:2009
5395:2009
5368:2016
5343:2009
5317:2009
5286:2022
5273:ISBN
5252:2009
5226:2009
5195:2009
5163:ISBN
5083:2009
5052:2009
5016:2009
4980:2009
4954:2009
4928:2009
4899:2009
4849:2016
4821:2016
4799:2009
4770:2009
4744:2009
4713:2009
4687:2009
4656:2009
4630:2009
4601:2009
4570:2009
4544:2009
4526:ISBN
4505:2009
4474:2009
4447:2009
4417:2009
4392:2009
4361:2009
4330:2009
4299:2009
4273:link
4259:2009
4229:2012
4208:ISBN
4131:2012
4105:2009
4093:EPIC
4075:2016
4048:2006
4026:2006
4004:2014
3982:2009
3948:2016
3921:2009
3895:2009
3863:2017
3845:2017
3819:2009
3793:2015
3761:2019
3705:2009
3674:2009
3648:2018
3622:2017
3588:ISSN
3515:2014
3484:2023
3459:2014
3426:2017
3396:2009
3366:SSRN
3347:2009
3313:2009
3265:2009
3239:2009
3209:2009
3176:2009
3147:2009
3113:2009
3087:2009
3061:2009
3035:2009
3008:2017
2982:2017
2945:2009
2919:2009
2799:2014
2773:2009
2746:2009
2717:2009
2689:2009
2656:2009
2607:2022
2571:2020
2560:ISSN
2534:2020
2521:ISBN
2497:2020
2484:ISBN
2457:ISBN
2432:ISBN
2215:", "
2197:bugs
2177:SWAT
2132:The
2121:The
1988:UAVs
1920:and
1907:and
1751:and
1743:and
1731:and
1677:CEO
1646:and
1617:The
1570:and
1447:shot
1423:RFID
1329:and
1313:, a
1219:and
1150:tail
1115:and
1082:data
1003:The
998:SWAT
977:The
967:IPTO
963:HART
898:and
623:The
503:and
434:and
351:The
317:and
299:and
271:and
224:and
222:data
148:and
124:and
8549:Law
7550:and
6768:288
6414:201
6361:doi
5833:doi
5135:doi
4649:CNN
4386:(2)
4178:doi
3731:doi
3580:doi
2857:doi
2263:GDR
2235:").
2183:HBO
2175:in
1509:GPS
1358:SS7
1173:FBI
882:in
878:In
635:At
589:IBM
491:or
440:NSA
374:one
246:FBI
242:NSA
8813::
8378:,
7915:/
7252:.
7195:.
6933:,
6748:^
6728:.
6702:.
6676:.
6650:.
6624:.
6603:.
6563:.
6538:}}
6534:{{
6519:.
6474:20
6472:.
6468:.
6432:^
6380:^
6355:.
6349:.
6298:.
6284:^
6267:.
6254:^
6238:44
6236:.
6202:.
6176:.
6134:.
6124:41
6122:.
6118:.
6106:^
6090:.
6086:.
6050:.
5975:.
5944:.
5918:.
5847:.
5839:.
5829:26
5827:.
5801:.
5770:.
5744:.
5717:.
5705:^
5683:.
5672:^
5654:.
5628:.
5596:,
5524:.
5512:^
5490:.
5465:.
5437:.
5411:.
5385:.
5359:.
5333:.
5307:.
5288:.
5242:.
5212:.
5186:.
5131:43
5129:.
5123:.
5069:.
5035:.
4999:.
4970:.
4945:.
4919:.
4907:^
4890:.
4838:.
4790:.
4778:^
4761:.
4730:.
4703:.
4673:.
4647:.
4618:.
4587:.
4561:.
4491:.
4464:.
4437:.
4425:^
4408:.
4384:II
4382:.
4378:.
4347:.
4316:.
4290:.
4269:}}
4265:{{
4249:.
4237:^
4216:.
4174:13
4172:.
4168:.
4156:^
4122:.
4091:.
4064:.
3968:.
3956:^
3882:.
3853:.
3848:;
3835:.
3752:.
3727:47
3725:.
3713:^
3695:.
3691:.
3665:.
3638:.
3594:.
3586:.
3576:48
3574:.
3570:.
3551:.
3532:.
3506:.
3492:^
3475:.
3448:.
3434:^
3412:.
3387:.
3364:.
3333:.
3321:^
3303:.
3292:^
3282:.
3256:.
3225:.
3195:.
3184:^
3167:.
3155:^
3133:.
3121:^
3104:.
3078:.
3052:.
3025:.
2999:.
2969:.
2965:.
2936:.
2907:.
2888:.
2863:.
2855:.
2841:.
2837:.
2815:.
2790:.
2763:.
2736:.
2725:^
2708:.
2697:^
2675:.
2664:^
2647:.
2630:28
2628:.
2624:.
2594:.
2590:.
2558:.
2554:.
2536:.
2499:.
2074:,
1911:.
1903:,
1899:,
1858:,
1771:do
1765:.
1589:A
1550:.
1542:,
1256:,
1252:,
1228:.
1148:A
935:,
916:,
861:.
775::
760:,
756:,
717:,
713:,
689:.
677:A
661:.
591:,
557:.
518:.
387:,
256:,
128:.
8236:e
8229:t
8222:v
8070:)
7754:e
7747:t
7740:v
7341:e
7334:t
7327:v
6780:.
6742:.
6713:.
6687:.
6661:.
6635:.
6609:.
6574:.
6548:)
6530:.
6504:.
6426:.
6363::
6357:3
6317:.
6278:.
6248:.
6218:.
6187:.
6142:.
6100:.
6069:.
6033:.
5986:.
5960:.
5929:.
5855:.
5835::
5812:.
5786:.
5755:.
5729:.
5699:.
5666:.
5640:.
5579:.
5564:.
5538:.
5506:.
5476:.
5450:.
5422:.
5397:.
5370:.
5345:.
5319:.
5254:.
5228:.
5197:.
5171:.
5143:.
5137::
5085:.
5054:.
5018:.
4982:.
4956:.
4930:.
4901:.
4851:.
4823:.
4801:.
4772:.
4746:.
4715:.
4689:.
4658:.
4632:.
4603:.
4572:.
4546:.
4507:.
4476:.
4449:.
4419:.
4394:.
4363:.
4332:.
4301:.
4275:)
4261:.
4231:.
4186:.
4180::
4150:.
4133:.
4107:.
4077:.
4050:.
4028:.
4006:.
3984:.
3950:.
3923:.
3897:.
3865:.
3821:.
3795:.
3763:.
3737:.
3733::
3707:.
3676:.
3650:.
3624:.
3602:.
3582::
3555:.
3536:.
3517:.
3486:.
3461:.
3428:.
3398:.
3372:.
3349:.
3315:.
3267:.
3241:.
3211:.
3178:.
3149:.
3115:.
3089:.
3063:.
3037:.
3010:.
2984:.
2947:.
2921:.
2859::
2843:4
2801:.
2775:.
2748:.
2719:.
2691:.
2658:.
2609:.
2573:.
2465:.
2440:.
2315:-
2278:.
2111:.
2085:,
1586:.
1470:.
969:(
80:)
76:(
65:.
41:.
34:.
20:)
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.