What is Surveillance?

Moderators: jimothy_183, Admin

What is Surveillance?

Postby Ryan » Sat Jun 18, 2011 10:02 am

From Wikipedia:

Surveillance

Surveillance (play /sərˈveɪ.əns/ or /sərˈveɪləns/) is the monitoring of the behavior, activities, or other changing information, usually of people and often in a surreptitious manner. It most usually refers to observation of individuals or groups by government organizations, but disease surveillance, for example, is monitoring the progress of a disease in a community.

The word surveillance is the French word for "watching over".

The word surveillance may be applied to observation from a distance by means of electronic equipment (such as CCTV cameras), or interception of electronically transmitted information (such as Internet traffic or phone calls). It may also refer to simple, relatively no- or low-technology methods such as human intelligence agents and postal interception.

Surveillance is very useful to governments and law enforcement to maintain social control, recognize and monitor threats, and prevent/investigate criminal activity. With the advent of programs such as the Total Information Awareness program and ADVISE, technologies such as high speed surveillance computers and biometrics software, and laws such as the Communications Assistance For Law Enforcement Act, governments now possess an unprecedented ability to monitor the activities of their subjects.

However, many civil rights and privacy groups such as the Electronic Frontier Foundation and ACLU have expressed concern that by allowing continual increases in government surveillance of citizens that we will end up in a mass surveillance society, with extremely limited, or non-existent political and/or personal freedoms. Fears such as this have led to numerous lawsuits such as Hepting v. AT&T.

Contents

1 Types of surveillance
1.1 Computer surveillance
1.2 Telephones
1.3 Surveillance cameras
1.4 Social network analysis
1.5 Biometric surveillance
1.6 Aerial surveillance
1.7 Data mining and profiling
1.8 Corporate surveillance
1.9 Human operatives
1.10 Satellite imagery
1.11 Identification and credentials
1.12 RFID and geolocation devices
1.12.1 RFID tagging
1.12.2 Global Positioning System
1.12.3 Mobile phones
1.13 Surveillance devices
1.14 Postal services
2 Controversy surrounding surveillance
2.1 Support
2.2 Opposition
2.2.1 Totalitarianism
2.2.2 Psychological/Social Effects
2.2.3 Privacy
3 Countersurveillance, inverse surveillance, sousveillance
4 In popular culture
4.1 In literature
4.2 In music
4.3 Onscreen
5 See also
6 References
7 Further reading
8 External links
8.1 General information
8.2 Historical information
8.3 Legal resources

Types of surveillance
Computer surveillance

Official seal of the Information Awareness Office -- a U.S. agency which developed technologies for mass surveillance

The vast majority of computer surveillance involves the monitoring of data and traffic on the Internet. In the United States for example, under the Communications Assistance For Law Enforcement Act, all phone calls and broadband Internet traffic (emails, web traffic, instant messaging, etc.) are required to be available for unimpeded real-time monitoring by Federal law enforcement agencies.

There is far too much data on the Internet for human investigators to manually search through all of it. So automated Internet surveillance computers sift through the vast amount of intercepted Internet traffic and identify and report to human investigators traffic considered interesting by using certain "trigger" words or phrases, visiting certain types of web sites, or communicating via email or chat with suspicious individuals or groups. Billions of dollars per year are spent, by agencies such as the Information Awareness Office, NSA, and the FBI, to develop, purchase, implement, and operate systems such as Carnivore, NarusInsight, and ECHELON to intercept and analyze all of this data, and extract only the information which is useful to law enforcement and intelligence agencies.

Computers are also a surveillance target because of the personal data stored on them. If someone is able to install software (either physically or remotely), such as the FBI's "Magic Lantern" and CIPAV, on a computer system, they can easily gain unauthorized access to this data.

Another form of computer surveillance, known as TEMPEST, involves reading electromagnetic emanations from computing devices in order to extract data from them at distances of hundreds of meters.

The NSA also runs a database known as "Pinwale", which stores and indexes large numbers of emails of both American citizens and foreigners.

Telephones

The official and unofficial tapping of telephone lines is widespread. In the United States for instance, the Communications Assistance For Law Enforcement Act (CALEA) requires that all telephone and VoIP communications be available for real-time wiretapping by Federal law enforcement and intelligence agencies. Two major telecommunications companies in the U.S. -- AT&T and Verizon—have contracts with the FBI, requiring them to keep their phone call records easily searchable and accessible for Federal agencies, in return for $1.8 million dollars per year. Between 2003 and 2005, the FBI sent out more than 140,000 "National Security Letters" ordering phone companies to hand over information about their customers' calling and Internet histories. About half of these letters requested information on U.S. citizens.

Human agents are not required to monitor most calls. Speech-to-text software creates machine-readable text from intercepted audio, which is then processed by automated call-analysis programs, such as those developed by agencies such as the Information Awareness Office, or companies such as Verint, and Narus, which search for certain words or phrases, to decide whether to dedicate a human agent to the call.

Law enforcement and intelligence services in the U.K. and the United States possess technology to remotely activate the microphones in cell phones, by accessing the phone's diagnostic/maintenance features, in order to listen to conversations that take place nearby the person who holds the phone.

Mobile phones are also commonly used to collect location data. The geographical location of a mobile phone (and thus the person carrying it) can be determined easily (whether it is being used or not), using a technique known multilateration to calculate the differences in time for a signal to travel from the cell phone to each of several cell towers near the owner of the phone. A controversy has emerged in the United States over the legality of such techniques, and particularly whether a court warrant is required. Records for one carrier alone (Sprint), showed that in a given year federal law enforcement agencies requested customer location data 8 million times.

Surveillance cameras

Surveillance cameras are video cameras used for the purpose of observing an area. They are often connected to a recording device, IP network, and/or watched by a security guard/law enforcement officer. Cameras and recording equipment used to be relatively expensive and required human personnel to monitor camera footage. Now with cheaper production techniques, it is simple and inexpensive enough to be used in home security systems, and for everyday surveillance. Analysis of footage is made easier by automated software that organizes digital video footage into a searchable database, and by automated video analysis software (such as VIRAT and HumanID) . The amount of footage is also drastically reduced by motion sensors which only record when motion is detected.

The use of surveillance cameras by governments and businesses has dramatically increased over the last 10 years. In the U.K., for example, there are about 4.2 million surveillance cameras—1 camera for every 14 people.

In the United States, the Department of Homeland Security gives billions of dollars per year in Homeland Security grants for local, state, and federal agencies to install modern video surveillance equipment. For example, the city of Chicago, IL recently used a $5.1 million Homeland Security grant to install an additional 250 surveillance cameras, and connect them to a centralized monitoring center, along with its preexisting network of over 2000 cameras in a program known as Operation Virtual Shield. Chicago Mayor Richard Daley has announced that Chicago will have a surveillance camera on every street corner by the year 2016.

As part of China's Golden Shield Project, several U.S. corporations such as IBM, General Electric, and Honeywell have been working closely with the Chinese government to install millions of surveillance cameras throughout China, along with advanced video analytics and facial recognition software, which will identify and track individuals everywhere they go. They will be connected to a centralized database and monitoring station, which will, upon completion of the project, contain a picture of the face of every person in China: over 1.3 billion people. Lin Jiang Huai, the head of China's "Information Security Technology" office (which is in charge of the project), credits the surveillance systems in the United States and the U.K. as the inspiration for what he is doing with the Golden Shield project.

The Defense Advanced Research Projects Agency (DARPA) is funding a research project called Combat Zones That See that will link up cameras across a city to a centralized monitoring station, identify and track individuals and vehicles as they move through the city, and report "suspicious" activity (such as waving arms, looking side-to-side, standing in a group, etc.).

At Super Bowl XXXV in January 2001, police in Tampa Bay, Florida, used Identix’s facial recognition software, FaceIt, to scan the crowd for potential criminals and terrorists in attendance at the event. (it found 19 people with pending arrest warrants).

Governments often initially claim that cameras are meant to be used for traffic control, but many of them end up using them for general surveillance. For example, Washington, D.C. had 5000 "traffic" cameras installed under this premise, and then after they were all in place, networked them all together and then granted access to the Metropolitan Police Department, so that they could perform "day-to-day monitoring".

The development of centralized networks of CCTV cameras watching public areas—linked to computer databases of people's pictures and identity (biometric data), able to track peoples' movements throughout the city, and identify who they have been with—has been argued by some to present a risk to civil liberties.

Social network analysis

One common form of surveillance is to create maps of social networks based on data from social networking sites such as Facebook, MySpace, Twitter as well as from traffic analysis information from phone call records such as those in the NSA call database, and others. These social network "maps" are then data mined to extract useful information such as personal interests, friendships & affiliations, wants, beliefs, thoughts, and activities.

Many U.S. government agencies such as the Defense Advanced Research Projects Agency (DARPA), the National Security Agency (NSA), and the Department of Homeland Security (DHS) are currently investing heavily in research involving social network analysis. The intelligence community believes that the biggest threat to U.S. power comes from decentralized, leaderless, geographically dispersed groups of terrorists, subversives, extremists, and dissidents . These types of threats are most easily countered by finding important nodes in the network, and removing them. To do this requires a detailed map of the network.

Jason Ethier of Northeastern University, in his study of modern social network analysis, said the following of the Scalable Social Network Analysis Program developed by the Information Awareness Office:

The purpose of the SSNA algorithms program is to extend techniques of social network analysis to assist with distinguishing potential terrorist cells from legitimate groups of people ... In order to be successful SSNA will require information on the social interactions of the majority of people around the globe. Since the Defense Department cannot easily distinguish between peaceful citizens and terrorists, it will be necessary for them to gather data on innocent civilians as well as on potential terrorists. —Jason Ethier.

AT&T developed a programming language called "Hancock" which is able to sift through enormous databases of phone call and Internet traffic records, such as the NSA call database and extract "communities of interest" -- groups of people who call each other regularly, or groups that regularly visit certain sites on the Internet. AT&T originally built the system to develop "marketing leads", but the FBI has regularly requested such information from phone companies such as AT&T without a warrant, and after using the data stores all information received in its own databases, regardless of whether or not the information was ever useful in an investigation.

Some people believe that the use of social networking sites is a form of "participatory surveillance", where users of these sites are essentially performing surveillance on themselves, putting detailed personal information on public websites where it can be viewed by corporations and governments. About 20% of employers have reported using social networking sites to collect personal data on prospective or current employees.

Biometric surveillance
Fingerprints are being scanned as part of the US-VISIT program.

Biometric surveillance refers to technologies that measure and analyze human physical and/or behavioral characteristics for authentication, identification, or screening purposes. Examples of physical characteristics include fingerprints, DNA, and facial patterns. Examples of mostly behavioral characteristics include gait (a person's manner of walking) or voice.

Facial recognition is the use of the unique configuration of a person's facial features to accurately identify them, usually from surveillance video. Both the Department of Homeland Security and DARPA are heavily funding research into facial recognition systems. The Information Processing Technology Office, ran a program known as Human Identification at a Distance which developed technologies that are capable of identifying a person at up to 500 ft by their facial features.

Another form of behavioral biometrics, based on affective computing, involves computers recognizing a person's emotional state based on an analysis of their facial expressions, how fast they are talking, the tone and pitch of their voice, their posture, and other behavioral traits. This might be used for instance to see if a person is acting "suspicious" (looking around furtively, "tense" or "angry" facial expressions, waving arms, etc.).

A more recent development is DNA fingerprinting, which looks at some of the major markers in the body's DNA to produce a match. The FBI is currently spending $1 billion to build a new biometric database, which will store DNA, facial recognition data, iris/retina (eye) data, fingerprints, palm prints, and other biometric data of people living in the United States. The computers running the database will be contained in an underground facility is about the size of a football field.

The Los Angeles Police Department is currently installing automated facial recognition and license plate recognition devices in its squad cars, and providing handheld face scanners, which officers will use to identify people while on patrol.

Facial thermographs are currently in development, which allow machines to identify certain emotions in people such as fear or stress, by measuring the temperature generated by blood flow to different parts of their face. Law enforcement officers believe that this has potential for them to identify when a suspect is nervous, which might indicate that they are hiding something, lying, or worried about something.

Aerial surveillance

Aerial surveillance is the gathering of surveillance, usually visual imagery or video, from an airborne vehicle—such as a unmanned aerial vehicle, helicopter, or spy plane. Military surveillance aircraft use a range of sensors (e.g. radar) to monitor the battlefield.

Digital imaging technology, miniaturized computers, and numerous other technological advances over the past decade have contributed to rapid advances in aerial surveillance hardware such as micro-aerial vehicles, forward-looking infrared, and high-resolution imagery capable of identifying objects at extremely long distances. For instance, the MQ-9 Reaper, a U.S. drone plane currently used for domestic operations by the Department of Homeland Security, carries cameras that are capable of identifying an object the size of a milk carton from altitudes of 60,000 feet, and has forward-looking infrared devices that can detect the heat from a human body at distances of up to 60 kilometers.

The United States Department of Homeland Security is in the process of testing UAVs to patrol the skies over the United States for the purposes of critical infrastructure protection, border patrol, "transit monitoring", and general surveillance of the U.S. population. Miami-Dade police department ran tests with a vertical take-off and landing UAV from Honeywell, which is planned to be used in SWAT operations. Houston's police department has been testing fixed-wing UAVs for use in "traffic control".

The U.K., as well, is currently working on plans to build up a fleet of surveillance UAVs ranging from micro-aerial vehicles to full-size drones, to be used by police forces throughout the U.K.

In addition to their surveillance capabilities, MAVs are capable of carrying tasers for "crowd control", or weapons for killing enemy combatants.

Programs such as the Heterogenous Aerial Reconnaissance Team program developed by DARPA have automated much of the aerial surveillance process. They have developed systems consisting of large teams drone planes that pilot themselves, automatically decide who is "suspicious" and how to go about monitoring them, coordinate their activities with other drones nearby, and notify human operators if something suspicious is occurring. This greatly increases the amount of area that can be continuously monitored, while reducing the number of human operators required. Thus a swarm of automated, self-directing drones can automatically patrol a city and track suspicious individuals, reporting their activities back to a centralized monitoring station.

Data mining and profiling

Data mining is the application of statistical techniques and programmatic algorithms to discover previously unnoticed relationships within the data.. Data profiling in this context is the process of assembling information about a particular individual or group in order to generate a profile — that is, a picture of their patterns and behavior. Data profiling can be an extremely powerful tool for psychological and social network analysis. A skilled analyst can discover facts about a person that they might not even be consciously aware of themselves.

Economic (such as credit card purchases) and social (such as telephone calls and emails) transactions in modern society create large amounts of stored data and records. In the past this data would be documented in paper records and would leave a "paper trail", or simply not be documented at all. Correlation of paper-based records was a laborious process—it required human intelligence operators to manually dig through documents, which was time-consuming and incomplete, at best.

But today many of these records are electronic, resulting in an "electronic trail". Every use of a bank machine, payment by credit card, use of a phone card, call from home, checked out library book, rented video, or otherwise complete recorded transaction generates an electronic record. Public records—such as birth, court, tax and other records—are increasily being digitized and made available online. In addition, due to laws like CALEA, web traffic and online purchases are also available for profiling. Electronic record-keeping makes data easily collectable, storable, and accessible—so that high-volume, efficient aggregation and analysis is possible at significantly lower costs.

Information relating to many of these individual transactions is often easily available because it is not generally not guarded in isolation, since the information, such as the title of a movie a person has rented, might not seem sensitive. However, when many such transactions are aggregated they can be used to assemble a detailed profile revealing the actions, habits, beliefs, locations frequented, social connections, and preferences of the individual. This profile is then used, by programs such as ADVISE and TALON, to determine whether the person is a military, criminal, or political threat.

In addition to its own aggregation and profiling tools, the government is able to access information from third parties — for example, banks, credit companies or employers, etc. — by requesting access informally, by compelling access through the use of subpoenas or other procedures, or by purchasing data from commercial data aggregators or data brokers. The United States has currently spent $370 million on its 43 planned fusion centers, which are national network of surveillance centers that are located in over 30 states. The centers will collect and analyze vast amounts of data on U.S. citizens. It will get this data by consolidating personal information from sources such as state driver's licensing agencies, hospital records, criminal records, school records, credit bureaus, banks, etc. -- and placing this information in a centralized database that can be accessed from all of the centers, as well as other federal law enforcement and intelligence agencies.

Under United States v. Miller

(1976), data held by third parties is generally not subject to Fourth Amendment warrant requirements.
[edit] Corporate surveillance

Corporate surveillance is the monitoring of a person or group's behavior by a corporation. The data collected is most often used for marketing purposes or sold to other corporations, but is also regularly shared with government agencies. It can be used as a form of business intelligence, which enables the corporation to better tailor their products and/or services to be desirable by their customers. Or the data can be sold to other corporations, so that they can use it for the aforementioned purpose. Or it can be used for direct marketing purposes, such as the targeted advertisements on Google and Yahoo, where ads are targeted to the user of the search engine by analyzing their search history and emails (if they use free webmail services), which is kept in a database.

For instance, Google, the world's most popular search engine, stores identifying information for each web search. An IP address and the search phrase used are stored in a database for up to 18 months. Google also scans the content of emails of users of its Gmail webmail service, in order to create targeted advertising based on what people are talking about in their personal email correspondences.Google is, by far, the largest Internet advertising agency—millions of sites place Google's advertising banners and links on their websites, in order to earn money from visitors who click on the ads. Each page containing Google ads adds, reads, and modifies "cookies" on each visitor's computer. These cookies track the user across all of these sites, and gather information about their web surfing habits, keeping track of which sites they visit, and what they do when they are on these sites. This information, along with the information from their email accounts, and search engine histories, is stored by Google to use for building a profile of the user to deliver better-targeted advertising.

The United States government often gains access to these databases, either by producing a warrant for it, or by simply asking. The Department of Homeland Security has openly stated that it uses data collected from consumer credit and direct marketing agencies—such as Google—for augmenting the profiles of individuals that it is monitoring. The FBI, Department of Homeland Security, and other intelligence agencies have formed an "information-sharing" partnership with over 34,000 corporations as part of their Infragard program.

The U.S. Federal government has gathered information from grocery store "discount card" programs, which track customers' shopping patterns and store them in databases, in order to look for "terrorists" by analyzing shoppers' buying patterns.

Human operatives and operators

Organizations that have enemies who wish to gather information about the groups members or activities face the issue of infiltration.

In addition to operatives infiltrating an organization, the surveilling party may put pressure on certain members of the target organization to act as informants (i.e. disclose the information they hold on the organization and its members).

Fielding operatives is very expensive, and for governments with wide-reaching electronic surveillance tools at their disposal the information recovered from operatives can often be obtained from less problematic forms of surveillance such as those mentioned above. Nevertheless, human infiltrators are still common today. For instance, in 2007 documents surfaced showing that the FBI was planning to field a total of 15,000 undercover agents and informants in response to a anti-terrorism directive sent out by George W. Bush in 2004 that ordered intelligence and law enforcement agencies to increase their HUMINT capabilities.

Satellite imagery

On May 25, 2007 the U.S. Director of National Intelligence Michael McConnell authorized the National Applications Office (NAO) of the Department of Homeland Security to allow local, state, and domestic Federal agencies to access imagery from military intelligence satellites and aircraft sensors which can now be used to observe the activities of U.S. citizens. The satellites and aircraft sensors will be able to penetrate cloud cover, detect chemical traces, and identify objects in buildings and "underground bunkers", and will provide real-time video at much higher resolutions than the still-images produced by programs such as Google Earth.

Identification and credentials

One of the simplest forms of identification is the carrying of credentials. Some nations have an identity card system to aid identification, whilst many, such as Britain, are considering it but face public opposition. Other documents, such as passports, driver's licenses, library cards, bankers or credit cards are also used to verify identity.

If the form of the identity card is "machine-readable," usually using an encoded magnetic stripe or identification number (such as a Social Security number) that corroborates the subject's identifying data. In this case it may create a document trail when it is checked and scanned, which can be used in profiling, as mentioned above.

RFID and geolocation devices and RFID tagging

Radio Frequency Identification (RFID) tagging is the use of very small electronic devices (called 'RFID tags') which are applied to or incorporated into a product, animal, or person for the purpose of identification and tracking using radio waves. The tags can be read from several meters away. They are extremely cheap, costing a few cents a piece, so they can be inserted into many types of everyday products without significantly increasing the price, and can be used to track and identify these objects for a variety of purposes.

Many companies are already "tagging" their workers, who are monitored while on the job. Workers in U.K. went on general strike in protest of having themselves tagged. They felt that it was dehumanizing to have all of their movements tracked with RFID chips. Some critics have expressed fears that people will soon be tracked and scanned everywhere they go.

Verichip is an RFID device produced by a company called Applied Digital Solutions (ADS). Verichip is slightly larger than a grain of rice, and is injected under the skin. The injection reportedly feels similar to receiving a shot. The chip is encased in glass, and stores a "VeriChip Subscriber Number" which the scanner uses to access their personal information, via the Internet, from Verichip Inc.'s database, the "Global VeriChip Subscriber Registry". Thousands of people have already had them inserted. In Mexico, for example, 160 workers at the Attorney General's office were required to have the chip injected for identity verification and access control purposes.

It may be that soon every object that is purchased, and perhaps ID cards, will have RFID devices in them, which would broadcast information about people as they walk past scanners (what type of phone they have, what type of shoes they have on, which books they are carrying, what credit cards or membership cards they have, etc.). This information could be used for identification, tracking, or targeted marketing.

Global Positioning System
See also: GPS tracking

In the U.S., police have planted hidden GPS tracking devices in people's vehicles to monitor their movements, without a warrant. In early 2009 they were arguing in court that they have the right to do this.

Several cities are running pilot projects to require parolees to wear GPS devices to track their movements when they get out of prison.

Mobile phones

Mobile phones are also commonly used to collect geolocation data. The geographical location of a mobile phone (and thus the person carrying it) can be determined easily (whether it is being used or not), using a technique known multilateration to calculate the differences in time for a signal to travel from the cell phone to each of several cell towers near the owner of the phone.

Surveillance devices

Surveillance devices, or "bugs", are hidden electronic devices which are used to capture, record, and/or transmit data to a receiving party such as a law enforcement agency.

The U.S. has run numerous domestic intelligence, such as COINTELPRO, which have bugged the homes, offices, and vehicles of thousands of U.S. citizens, usually political activists, subversives, and criminals.

Law enforcement and intelligence services in the U.K. and the United States possess technology to remotely activate the microphones in cell phones, by accessing the phone's diagnostic/maintenance features, in order to listen to conversations that take place nearby the person who holds the phone.

Postal services

As more people use faxes and e-mail the significance of surveilling the postal system is decreasing, in favor of Internet and telephone surveillance. But interception of post is still an available option for law enforcement and intelligence agencies, in certain circumstances.

The CIA and FBI have performed twelve separate mail-opening campaigns targeted towards U.S. citizens. In one of these programs, more than 215,000 communications were intercepted, opened, and photographed.

Controversy surrounding surveillance
Support


Some supporters of surveillance systems believe that these tools protect society from terrorists and criminals. Other supporters simply believe that there is nothing that can be done about it, and that people must become accustomed to having no privacy. As Sun Microsystems CEO Scott McNealy said: "You have zero privacy anyway. Get over it."

Another common argument is: "If you aren't doing something wrong then you don't have anything to fear." Some critics state that this claim should be modified to read: "As long as we do what we're told, we have nothing to fear.".For instance, a person who is part of a political group which opposes the policies of the national government, might not want the government to know their names and what they have been reading, so that the government cannot easily subvert their organization, arrest them, or kill them. Other critics state that while a person might not have anything to hide right now, the government might later implement policies that they do wish to oppose, and that opposition might then be impossible due to mass surveillance enabling the government to identify and remove political threats. Other critics point to the fact that most people do have things to hide. For example, if a person is looking for a new job, they might not want their current employer to know this.

Opposition
Totalitarianism

A traffic camera atop a high pole oversees a road in the Canadian city of Toronto.

Programs such as the Total Information Awareness program, and laws such as the Communications Assistance For Law Enforcement Act have led many groups to fear that society is moving towards a state of mass surveillance with severely limited personal, social, political freedoms, where dissenting individuals or groups will be strategically removed in COINTELPRO-like purges.

Kate Martin, of the Center For National Security Studies said of the use of military spy satellites being used to monitor the activities of U.S. citizens: "They are laying the bricks one at a time for a police state."

Psychological/Social Effects

Some critics, such as Michel Foucault, believe that in addition to its obvious function of identifying and capturing individuals who are committing undesirable acts, surveillance also functions to create in everyone a feeling of always being watched, so that they become self-policing. This allows the State to control the populace without having to resort to physical force, which is expensive and otherwise problematic

Privacy

Numerous civil rights groups and privacy groups oppose surveillance as a violation of people's right to privacy. Such groups include: Electronic Privacy Information Center, Electronic Frontier Foundation, ACLU

There have been several lawsuits such as Hepting v. AT&T and EPIC v. Department of Justice by groups or individuals, opposing certain surveillance activities.

Legislative proceedings such as those that took place during the Church Committee, which investigated domestic intelligence programs such as COINTELPRO, have also weighed the pros and cons of surveillance.

Countersurveillance, inverse surveillance, sousveillance

Countersurveillance is the practice of avoiding surveillance or making surveillance difficult. With recent developments — the Internet, increasing prevalence of electronic security systems, armed UAVs flying at 60,000 feet, and large corporate/government computer databases — counter surveillance has dramatically grown in scope and complexity.

Inverse surveillance is the practice of reversalism on surveillance (e.g., citizens photographing police). Well-known examples are George Holliday's recording of the Rodney King beating and the organization Copwatch, which attempts to surveil police officers to prevent police brutality.

Sousveillance (a term coined by Steve Mann, a professor at the University of Toronto) is inverse surveillance that includes the recording of an activity by a participant in the activity.
CQB-TEAM Education and Motivation.

"Pragmatism over theory."
"Anyone with a weapon is just as deadly as the next person."
"Unopposed CQB is always a success, if you wanted you could moonwalk into the room holding a Pepsi."
User avatar
Ryan
 
Posts: 2779
Joined: Sun Apr 10, 2011 3:10 am

Re: What is Surveillance?

Postby Ryan » Sat Jun 18, 2011 10:07 am

GPS tracking unit

A GPS tracking unit is a device that uses the Global Positioning System to determine the precise location of a vehicle, person, or other asset to which it is attached and to record the position of the asset at regular intervals. The recorded location data can be stored within the tracking unit, or it may be transmitted to a central location data base, or internet-connected computer, using a cellular (GPRS or SMS), radio, or satellite modem embedded in the unit. This allows the asset's location to be displayed against a map backdrop either in real time or when analysing the track later, using GPS tracking software.

Contents

1 GPS tracking unit Architecture
2 Types of GPS trackers
2.1 Data loggers
2.2 Data pushers
2.2.1 Personal tracking
2.2.2 Asset tracking
2.3 Data pullers
3 Abuses in USA
4 Uses in Marketing
5 See also
6 References
7 External links

GPS tracking unit Architecture
Typical GPS tracker architecture


A GPS tracker essentially contains GPS module to receive the GPS signal and calculate the coordinates. For data loggers it contains large memory to store the coordinates, data pushers additionally contains the GSM/GPRS modem to transmit this information to a central computer either via SMS or via GPRS in form of IP packets. The diagram depicts a hardware architecture of an advanced GPS tracker.

Image

Types of GPS trackers

Usually, a GPS tracker will fall into one of these three categories:

Data loggers
Typical GPS logger

A GPS logger simply logs the position of the device at regular intervals in its internal memory. Modern GPS loggers have either a memory card slot, or internal flash memory and a USB port. Some act as a USB flash drive. This allows downloading of the track log data for further analyzing in a computer. The tracklist or point of interest list may be in GPX, KML, NMEA or other format.

Most digital cameras save the time a photo was taken. Provided the camera clock was reasonably accurate, or the GPS was used as a time source, this time can be correlated with GPS log data, to provide an accurate location. This can be added to the Exif metadata in the picture file, thus geotagging it.

In some Private Investigation cases, these data loggers are used to keep track of the vehicle or the fleet vehicle. The reason for using this device is so that a PI will not have to follow the target so closely and always has a backup source of data.

Data pushers

Data pusher is the most common type of GPS tracking unit, used for asset tracking, personal tracking and Vehicle tracking system.

Also known as a GPS beacon, this kind of device pushes (i.e. "sends") the position of the device as well as other information like speed or altitude at regular intervals, to a determined server, that can store and instantly analyze the data.

A GPS receiver and a mobile phone sit side-by-side in the same box, powered by the same battery. At regular intervals, the phone sends a text message via SMS or GPRS, containing the data from the GPS receiver. Newer GPS-integrated smartphones running GPS tracking software can turn the phone into a data pusher (or logger) device; as of 2009 open source and proprietary applications are available for common Java ME enabled phones, iPhone , Android, Windows Mobile, and Symbian.

Most of the modern GPS trackers provide data "push" technology, enabling sophisticated GPS tracking in business environments, specifically organizations that employ a mobile workforce, such as a commercial fleet. Typical GPS tracking systems used in commercial fleets have two core parts: location hardware (or tracking device) and tracking software. This combination is often referred to as an Automatic Vehicle Location system. The tracking device is most often hardwire installed in the vehicle; connected to the CAN-bus, Ignition system switch, battery. It allows collection of extra data, which later get transferred to the tracking server, where it is available for viewing, in most cases via a website accessed over the internet, where fleet activity can be viewed live or historically using digital maps and reports.

GPS tracking systems used in commercial fleets are often configured to transmit location and telemetry input data at a set update rate or when an event (door open/close, auxiliary equipment on/off, geofence border cross) triggers the unit to transmit data. Live GPS Tracking used in commercial fleets, generally refers to systems which update regularly at 1 minute, 2 minute or 5 minute intervals, whilst the ignition status is on. Some tracking systems combine timed updates with heading change triggered updates.

The applications of these kind of trackers include:
Personal tracking


Law enforcement. An arrested criminal out on bail may have to wear a GPS tracker, usually on the ankle, as a bail condition.
Race control. In some sports, such as gliding, participants are required to carry a tracker. This allows, among other applications, for race officials to know if the participants are cheating, taking unexpected shortcuts or how far apart they are. This use has been featured in the movie Rat Race.
Espionage/surveillance. When put on a person, or on his personal vehicle, it allows the person monitoring the tracking to know his/her habits. This application is used by private investigators.
These devices are also used by some parents to track their children. The supporters claim that if cleverly used, this actually allows children more independence.
GPS personal tracking devices are being used increasingly to assist in the care of the elderly and vulnerable. Devices allow users to call for assistance and optionally allow designated carers to locate the user's position, typically within 5 to 10 metres. Their use helps promote independent living and social inclusion for the elderly. Devices often incorporate either 1-way or 2-way voice communication which is activated by pressing a button or sliding a switch. Some devices also allow the user to call several phone numbers using pre-programmed speed dial buttons. Trials using GPS personal tracking devices are also underway in several countries for use with early stage dementia and Alzheimer's sufferers.
Internet Fun. Some Web 2.0 pioneers have created their own personal web pages that show their position constantly, and in real-time, on a map within their website. These usually use data push from a GPS enabled cell phone or a personal GPS tracker.

Asset tracking

Solar Powered. The advantage of some solar powered units is that they have much more power over their lifetime than battery powered units. This gives them the advantage to report their position and status much more often than battery units which need to conserve their energy to extend their life. Some wireless solar powered units, such as the RailRider can report more than 20,000 times per year and work indefinitely on solar power eliminating the need to change batteries.
Animal control. When put on a wildlife animal (e.g. in a collar), it allows scientists to study its activities and migration patterns. Vaginal implant transmitters mark the location where pregnant females give birth. Animal tracking collars may also be put on domestic animals, to locate them in case they get lost.

Data pullers

GPS data pullers are also known as GPS transponders. Contrary to data pushers, that send the position of the devices at regular intervals (push technology), these devices are always-on and can be queried as often as required (pull technology). This technology is not in widespread use, but an example of this kind of device is a computer connected to the Internet and running gpsd.

These can often be used in the case where the location of the tracker will only need to be known occasionally e.g. placed in property that may be stolen, or that does not have constant source of energy to send data on a regular basis, like freights or containers.

Data Pullers are coming into more common usage in the form of devices containing a GPS receiver and a cell phone which, when sent a special SMS message reply to the message with their location.
CQB-TEAM Education and Motivation.

"Pragmatism over theory."
"Anyone with a weapon is just as deadly as the next person."
"Unopposed CQB is always a success, if you wanted you could moonwalk into the room holding a Pepsi."
User avatar
Ryan
 
Posts: 2779
Joined: Sun Apr 10, 2011 3:10 am

Re: What is Surveillance?

Postby Breacher01 » Fri Jan 20, 2017 7:59 pm

Welcome.

I don't think hidden camera's provide either safety or security. Since nobody should be aware of their presence they aren't compelled to change their behavior. They only gather evidence or information, if used correctly and successfully.

However a sign stating an area is observed by camera's might provide more security, therefore safety even if there's only a sign present.
Breacher01
 
Posts: 317
Joined: Sat Aug 06, 2016 1:42 pm

Re: What is Surveillance?

Postby tacticalguy » Sat Jan 21, 2017 5:04 am

Breacher01 wrote:Welcome.

I don't think hidden camera's provide either safety or security. Since nobody should be aware of their presence they aren't compelled to change their behavior. They only gather evidence or information, if used correctly and successfully.

However a sign stating an area is observed by camera's might provide more security, therefore safety even if there's only a sign present.

It was a spammer bot. I deleted the post and have blocked them.
If you have `cleared' all the rooms and met no resistance, you and your entry team have probably kicked in the door of the wrong house.
(Murphy's Cop Laws)

The greatest enemy of a good plan is the dream of a perfect plan. (Von Clausewitz)
User avatar
tacticalguy
 
Posts: 678
Joined: Thu Mar 29, 2012 4:48 pm
Location: South Florida

Re: What is Surveillance?

Postby Breacher01 » Tue Jan 24, 2017 12:05 pm

How did I not see that :oops:

Is robot activity increasing or not?
Breacher01
 
Posts: 317
Joined: Sat Aug 06, 2016 1:42 pm


Return to Reconnaissance

Who is online

Users browsing this forum: No registered users and 1 guest

cron