Selasa, 03 Juli 2018

Sponsored Links

Multimodal Surveillance Raises the Level of Protection in Smart ...
src: www.memoori.com

Supervision ( or ) is monitoring behavior, activity or other change information for the purpose of influencing, managing, directing, or protecting people. This may include remote observations with electronic equipment (such as CCTV cameras) or interception of information sent electronically (such as Internet traffic or phone calls). It can also include simple methods without technology or relatively low-level agents like human intelligence and post interception. The word supervision is derived from the French phrase to "watch" ( sur means "from above" and surfer means "watch") and Unlike the development latest such as sousveillance.

Supervision is used by governments for intelligence gathering, crime prevention, process protection, people, groups or objects, or criminal investigations. It is also used by criminal organizations to plan and commit crimes, such as robberies and kidnappings, by businesses to gather intelligence, and by private investigators.

Supervision can be seen as a violation of privacy, and is thus often opposed by various groups and civil liberties activists. Liberal democracies have laws restricting the domestic government and private use of oversight, usually limiting the circumstances under which public safety is at risk. Authoritarian governments rarely have domestic restrictions, and international espionage is common among all types of countries.

Supervision areas are increasingly becoming a topic of academic study, including through research centers, books, and peer-reviewed academic journals. "In the future, intelligence services may use [internet terms] for identification, monitoring, monitoring, location tracking and targeting for recruitment, or for gaining access to user networks or credentials," Clapper said.


Video Surveillance



Jenis

Komputer

Most computer surveillance involves monitoring data and traffic on the Internet. In the United States, for example, under the Communications for Law Enforcement Assistance Act, all broadband Internet phone calls and traffic (email, web traffic, instant messaging, etc.) should be available for uninterrupted monitoring directly by federal law enforcement agency.

There is too much data on the Internet for human investigators to manually search for it. Therefore, Internet surveillance computers automatically filter through a large number of intercepted Internet traffic to identify and report to traffic investigators who are considered to be interesting or suspicious. This process is organized by targeting specific "trigger" words or phrases, visiting certain types of websites, or communicating via email or online chat with suspicious individuals or groups. Billions of dollars per year spent by agencies, such as the NSA, the FBI, and the Office of Information Awareness are no longer in use, to develop, buy, implement and operate systems such as Carnivore, NarusInsight, and ECHELON to intercept and analyze all of this data just extract information which is useful for law enforcement and intelligence services.

Computers can be targets of surveillance because of personal data stored on them. If one can install software, such as FBI's Magic Lantern and CIPAV, on a computer system, they can easily gain unauthorized access to this data. The software can be installed physically or remotely. Another form of computer surveillance, known as van Eck phreaking, involves reading the electromagnetic emanations of computing devices to extract data from them at distances of hundreds of meters. The NSA runs a database known as "Pinwale", which stores and indexes a large number of emails from American citizens and foreigners. In addition, the NSA runs a program known as PRISM, which is a data mining system that provides direct access to the US government to information from technology companies. By accessing this information, governments can obtain search history, emails, stored information, live chat, file transfers, and more. The program generates major controversy in terms of surveillance and privacy, especially from US citizens.

Telephones

Official and unofficial intercepts of telephone lines are widespread. In the United States for example, the Communication Assistance for Law Enforcement Law (CALEA) requires that all VoIP phones and communications be available for real-time interception by Federal law enforcement agencies and intelligence. Two major telecommunications companies in the US. AT & amp; T Inc. and Verizon - have contracts with the FBI, requiring them to keep their call records searchable and accessible to Federal agencies, in exchange for $ 1.8 million annually. Between 2003 and 2005, the FBI sent more than 140,000 "National Security Letters" ordering phone companies to submit information about their customers' calls and their Internet history. About half of these letters ask for information about US citizens.

The human agent does not need to monitor most calls. Speech-to-text software creates machine-readable text from intercepted audio, which is then processed by automated call analysis programs, such as those developed by agencies such as the Information Awareness Office, or companies like Verint, and Narus, who are searching for words or a particular phrase, to decide whether to dedicate a human agent to a call.

Law enforcement and intelligence services in the UK and the United States have the technology to activate the microphone on mobile phones remotely, by accessing the diagnostic or maintenance features of the phone to listen to the conversations that occur near the person holding the phone.

The StingRay Tracker is an example of one of the tools used to monitor mobile phone usage in the United States and the United Kingdom. Originally developed for counterterrorism purposes by the military, they work by broadcasting strong signals that cause the closest mobile phones to transmit their IMSI numbers, just as they would to a normal cell phone tower. Once the phone is connected to the device, there is no way for the user to know that they are being tracked. Stingray operators are able to extract information such as location, phone calls, and text messaging, but it is widely believed that StingRay's capabilities are widespread. There is much controversy surrounding StingRay because of its strong ability and the secrecy that surrounds it.

Mobile phones are also commonly used to collect location data. The geographic location of the phone (and the person carrying it) can be easily determined even when the phone is not in use, using a technique known as multilateration to calculate the time difference for a signal to travel from phone to each of several cell towers near the phone owner. The legality of such techniques has been questioned in the United States, particularly whether court orders are required. Records for one operator only (Sprint), indicate that in a given year a federal law enforcement agency requests customer location data 8 million times.

In response to customer privacy concerns in the post-Edward Snowden era, the Apple iPhone 6 has been designed to interfere with investigative eavesdropping efforts. The phone encrypts e-mails, contacts, and photos with code generated by a complex mathematical algorithm unique to an individual phone, and inaccessible to Apple. The encryption feature on iPhone 6 has invited criticism from FBI director James B. Comey and other law enforcement officials because even a legitimate request to access user content on iPhone 6 will result in Apple supplying "nonsense" data that requires law enforcement personnel to decode it own or get the code from the owner of the phone. Because Snowden's leaks indicate that American agents can access phones anywhere in the world, privacy concerns in countries with emerging markets for smartphones have increased, providing strong incentives for companies like Apple to address these concerns to secure their positions in the world market.

Although CALEA requires telecom companies to build their systems, the ability to legitimate eavesdropping, legislation has not been updated to address smart phone issues and access requests to email and metadata. Snowden's leak suggests that the NSA has taken advantage of the ambiguity in the law by collecting metadata on "at least hundreds of millions" of "incidental" targets from around the world. The NSA uses an analytical tool known as CO-TRAVELER to track people whose movements intersect and find hidden connections with interested people.

Snowden leaks have also revealed that the UK Government Communications Headquarters (GCHQ) can access information collected by the NSA on Americans. Once the data is collected, GCHQ can last up to two years. The deadline can be extended with permission of "senior UK officials".

Camera

Surveillance cameras are video cameras used for the purpose of observing an area. They are often connected to recording devices or IP networks, and can be monitored by security guards or law enforcement officers. Cameras and recording equipment are used to be relatively expensive and require human personnel to monitor camera recordings, but record analysis has been made easier by automated software that organizes digital video recordings into searchable databases, and by video analysis software (such as VIRAT and HumanID). The number of recordings is also drastically reduced by motion sensors that only record when motion is detected. With cheaper production techniques, surveillance cameras are simple enough and cheap enough to be used in home security systems, and for daily surveillance.

There are about 350 million surveillance cameras worldwide by 2016. About 65% of these cameras are installed in Asia. CCTV growth has slowed in recent years. In 2018, China reportedly has an enormous surveillance network with more than 170 million CCTV cameras with 400 million new cameras expected to be installed in the next three years, many of which use face recognition technology.

In the United States, the Department of Homeland Security provides billions of dollars per year in Homeland Security grants to local, state, and federal agencies to install modern video surveillance equipment. For example, the city of Chicago, Illinois, recently used a $ 5.1 million Homeland Security grant to install 250 additional surveillance cameras, and connected it to a central monitoring center, along with a pre-existing network of over 2000 cameras, in a known program as a Virtual Shield Operation. Speaking in 2009, Chicago Mayor Richard Daley announced that Chicago will have surveillance cameras on every street corner in 2016.

In the United Kingdom, most video surveillance cameras are not operated by government agencies, but by private individuals or companies, primarily to monitor store and business interiors. According to the Freedom of Information Act 2011 request, the total number of government-operated CCTV cameras is around 52,000 compared to the UK overall. The prevalence of video surveillance in the UK is often exaggerated because of unreliable estimates being reviewed; for example one report in 2002 was extrapolated from a very small sample to estimate the number of cameras in the UK at 4.2 million (of which 500,000 in Greater London). A more reliable estimate puts the number of cameras operated by private and local government in the UK around 1.85 million in 2011.

In the Netherlands, one example of a city where there is a camera is The Hague. There, cameras are placed in the city districts where the most illegal activities are concentrated. Examples are the red light district and the train station.

As part of the China Gold Shield Project, several US companies, including IBM, General Electric and Honeywell, have been working with the Chinese government to install millions of surveillance cameras across China, along with advanced video analytics and facial recognition software that will identify and track individuals wherever they go. They will be connected to a centralized data center and monitoring station, which will, after the completion of the project, contains a picture of everyone's face in China: more than 1.3 billion people. Lin Jiang Huai, head of China's "Information Technology Security" office (responsible for the project), credited the supervisory system in the United States and Britain as an inspiration for what he did with the Golden Shield Project.

The Agency Agency for Advanced Defense Research (DARPA) funded a research project called Combat Zones That See that would connect cameras across the city to a centralized monitoring station, identifying and tracking individuals and vehicles as they move through the city, and reporting "suspicious". "Activities (such as waving, looking side to side, standing in groups, etc.).

At Super Bowl XXXV in January 2001, police in Tampa, Florida, used Identix facial identification software, FaceIt, to scan the crowd for potential criminals and terrorists present at the event (found 19 people with arrest warrants waiting).

Governments often initially claim that cameras are meant to be used for traffic control, but many of them end up using them for general surveillance. For example, Washington, DC has 5,000 "traffic" cameras installed under this premise, and then once they are all in place, their networks are all together and then granted access to the Metropolitan Police Department, so they can perform "everyday" monitoring ".

The development of a centralized network of CCTV cameras that oversee public areas - linked to computer databases of image and person identity (biometric data), able to track the movement of people across the city, and identify who is with them - has been debated by some to present it. risks to civil liberties. Trapwire is an example of such a network.

Social network analysis

One common form of monitoring is to create social network maps based on data from social networking sites like Facebook, MySpace, Twitter as well as from traffic analysis information from phone call records such as those in the NSA call database, and more. These social network "maps" are mined data to extract useful information such as personal interests, friendships & amp; affiliation, desire, belief, thought, and activity.

Many US government agencies such as the Agency for Advanced Defense Research Project (DARPA), the National Security Agency (NSA), and the Department of Homeland Security (DHS) invest heavily in research involving social network analysis. The intelligence community believes that the greatest threat to US power comes from decentralized, non-leader, and geographically dispersed terrorists, subversives, extremists and dissidents. This type of threat is most easily solved by finding an important node in the network, and deleting it. To do this requires a detailed network map.

Jason Ethier of Northeastern University, in his study of the analysis of modern social networks, says the following Scalable Social Network Analysis Program developed by the Office of Information Awareness:

The goal of the SSNA algorithm program is to extend social network analysis techniques to help differentiate potential terrorist cells from legitimate groups.... Successful SSNA will require information about the social interaction of the majority of people around the globe. Because the Department of Defense can not easily distinguish between peaceful citizens and terrorists, it is important for them to collect data on innocent civilians as well as on potential terrorists.

AT & amp; T developed a programming language called "Hancock", capable of filtering out the extraordinary databases of Internet phone calls and traffic records, such as NSA calling databases, and extracting "community interests" - groups of people calling each other regularly, or groups who regularly visit certain sites on the Internet. AT & T initially built the system to develop "marketing prospects", but the FBI has regularly requested such information from phone companies like AT & T without warrant, and after using the data store all the information received in its own database, regardless of whether the information never useful in the investigation or not.

Some people believe that the use of social networking sites is a form of "participatory oversight", in which users of this site are essentially self-surveying, placing detailed personal information on public websites that can be seen by companies and governments. In 2008, about 20% of employers reported using social networking sites to collect personal data on prospective employees or current employees.

Biometric

Biometric monitoring is a technology that measures and analyzes physical characteristics and/or human behavior for authentication, identification, or screening purposes. Examples of physical characteristics include fingerprints, DNA, and facial patterns. Examples of most behavioral characteristics include gait (the way a person walks) or sound.

Face recognition is the use of the unique configuration of a person's facial features to accurately identify them, usually from video surveillance. Both the Department of Homeland Security and DARPA are funding research in the face recognition system. The Office of Information Processing Technology, runs a program known as Human Identification at a Distance that develops a technology capable of identifying a person in up to 500 ft (150 m) by their facial features.

Another form of behavioral biometric, based on affective computation, involves a computer that recognizes a person's emotional state based on the analysis of their facial expressions, how quickly they speak, their tone and tone of voice, their posture, and other behavioral traits. It can be used for example to see if a person's behavior is suspicious (seeing facial expressions clandestinely, "tense" or "angry", waving, etc.).

More recent developments are profiling DNA, which sees some of the major markers in the body's DNA to produce a match. The FBI spends $ 1 billion to build a new biometric database, which will store DNA, facial recognition data, iris/eye data, fingerprints, fingerprints, and other biometric data from people living in the United States. The computers running the database are contained within an underground facility the size of two American football fields.

The Los Angeles Police Department is installing automatic face recognition and plate recognition devices in its squad cars, and provides a hand-held face scanner, which officers will use to identify people while on patrol.

The facial thermography is under development, allowing the machine to identify certain emotions in people like fear or stress, by measuring the temperature generated by blood flow to different parts of their faces. Law enforcement officials believe that this has the potential for them to identify when a suspect is nervous, which may indicate that they are hiding something, lying, or worrying about something.

Aerial

Air observation is the collection of surveillance, usually imagery or visual video, from air vehicles - such as unmanned aerial vehicles, helicopters, or spy planes. Military surveillance planes use various sensors (eg radar) to monitor the battlefield.

Digital imaging technology, miniature computers, and many other technological advancements over the past decade have contributed to the rapid advancement in air surveillance hardware such as micro-air vehicles, forward infrared, and high-resolution imagery capable of identifying objects at great distances. For example, the MQ-9 Reaper, a US drone used for domestic operations by the Department of Homeland Security, carries cameras capable of identifying objects the size of a carton of milk from a height of 60,000 feet, and has foresight. an infrared device that can detect heat from the human body at distances up to 60 kilometers. In the earliest example of commercial air surveillance, the Killington Mountain ski resort hired air photography 'eyes in the sky' from its competitors' parking spaces to assess the success of its marketing initiatives as developed from the 1950s.

The US Department of Homeland Security is in the process of testing UAVs to oversee the sky over the United States for the purpose of protecting critical infrastructure, border patrols, "transit monitoring", and general surveillance of US residents. The Miami-Dade police department runs tests with vertical take-off and landing UAV from Honeywell, which is planned to be used in SWAT operations. The Houston police department has been testing fixed wing UAVs for use in "traffic control".

The United Kingdom, too, is drawing up plans to build a UAV fleet of surveillance ranging from micro-air vehicles to large-size drones, for use by police forces across Britain.

In addition to their oversight capabilities, MAVs were able to bring Taser to "crowd control", or weapons to kill enemy fighters.

Programs such as the heterogeneous aerial reconnaissance Team program developed by DARPA have automated many airborne surveillance processes. They have developed systems consisting of large team drones piloting themselves, automatically deciding who is "suspicious" and how to monitor them, coordinating their activities with other drones nearby, and notifying human operators if anything suspicious happens. This greatly increases the number of areas that can continue to be monitored, while reducing the number of human operators required. Thus a self-organizing drone bunch can automatically patrol in a city and track suspicious people, reporting their activities back to a centralized monitoring station. In addition, the researchers also investigated the possibility of autonomous oversight by a large group of micro air vehicles stabilized by decentralized bio-inspiration rules.

Data mining and data retrieval

Data mining is the application of statistical techniques and programmatic algorithms to find relationships previously unknown in the data. Creating a data profile in this context is the process of gathering information about a particular individual or group to produce a profile - that is, their pattern and behavior. Data profiling can be a powerful tool for psychological and social network analysis. An expert analyst can find facts about someone they may not even know consciously.

Economic transactions (such as credit card purchases) and social (such as phone calls and emails) in modern society create large amounts of stored data and records. In the past, this data was documented in paper notes, leaving a "paper trail", or not at all documented at all. The correlation of paper-based notes is an exhausting process - it requires human intelligence operators to manually, time-consuming and incomplete document manually digging, at best.

But today many of these records are electronic, producing "electronic footprints". Any use of bank machines, credit card payments, use of phone cards, home calls, library book checks, rented videos, or other recorded transactions produce electronic records. Public records - such as births, courts, taxes, and other records - are increasingly easily digitized and available online. In addition, because laws like CALEA, web traffic and online purchases are also available for profiles. Electronic record keeping makes data easy to collect, store, and accessible - so high-quality, efficient aggregation and analysis can be done at a much lower cost.

Information related to many individual transactions is often easily available because it is generally not maintained in isolation, because information, such as the title of a movie that a person hires, may not appear sensitive. However, when multiple transactions are collected, they can be used to collect detailed profiles that reveal actions, customs, beliefs, frequent locations, social connections, and individual preferences. This profile is then used, by programs such as ADVISE and TALON, to determine whether the person is a military, criminal, or political threat.

In addition to its own aggregation tools and profiles, governments can access information from third parties - for example, banks, credit companies or employers, etc. - by requesting access informally, with attractive access through the use of subpoenas or other procedures, or by purchasing data from commercial data aggregators or data brokers. The United States has spent $ 370 million on 43 planned fusion centers, which is a national network of surveillance centers located in more than 30 countries. Centers will collect and analyze large amounts of data on US citizens. This will get this data by consolidating personal information from sources such as state driver licenses agents, hospital records, criminal records, school records, credit bureaus, banks, etc. - and putting this information in a centralized database accessible from all centers - centers, as well as other law enforcement and federal intelligence agencies.

Under United States v. Miller (1976), data held by third parties is generally not subject to the requirements of the Fourth Amendment warrant.

Company

Company supervision is the monitoring of a person's or group's behavior by a company. The data collected is most often used for marketing purposes or sold to other companies, but also regularly shared with government agencies. It can be used as a form of business intelligence, allowing companies to better customize their products and/or services to their customers' wants.

Business Intelligence

The data collected on individuals and groups can be sold to other companies, so they can use them for the purposes mentioned above. This can be used for direct marketing purposes, such as targeted ads on Google and Yahoo. These ads are customized for every search engine user by analyzing their search history and email (if they use free webmail services), which are stored in the database.

For example, Google, the world's most popular search engine, stores identification information for each web search. The IP address and search phrases used are stored in the database for up to 18 months. Google also scans the email content of its Gmail webmail service users, to create targeted ads based on what people are talking about in their personal email correspondence. Google, by far, the largest Internet advertising agency. Their revenue model is based on receiving payments from advertisers for each page visit generated by visitors clicking on Google AdWords ads, hosted either on Google services or third party websites. Millions of sites place Google banners and ad links on their websites, to share these benefits from visitors who click on ads. Each page containing Google ads adds, reads, and modifies "cookies" on every visitor's computer. These cookies track users across all these sites, and collect information about their web browsing habits, track the sites they visit, and what they do when they are on the site. This information, along with information from their email accounts, and search engine history, is stored by Google for use to build user profiles for better targeted ad submissions.

Intra-Corporate Surveillance

According to the American Management Association and ePolicy Institute which conducted an annual quantitative survey of electronic monitoring and surveillance with about 300 US companies, "more than a quarter of employers have fired workers for misuse of e-mail and nearly a third have fired employees to abuse the Internet." More than 40% of companies monitor their e-mail traffic, and 66% of companies monitor internet connections. In addition, most companies use software to block unrelated websites such as sexual or pornographic sites, game sites, social networking sites, entertainment sites, shopping sites and sports sites. The American Management Association and the ePolicy Institute also emphasize that companies "keep track of content, keystrokes, and time spent on keyboards... storing and reviewing computer files... monitoring the blogosphere to see what's being written about the company, and. monitor social networking sites ". In addition, about 30% of companies have also fired employees for unrelated emails and usage of the Internet such as "inappropriate or offensive language" and "viewing, downloading, or uploading inappropriate/offensive content".

Use of Government Enterprise Oversight Data

The United States government often gains access to this database, either by generating a warrant for it, or simply by asking. The Department of Homeland Security has publicly stated that it uses data collected from consumer credit and direct marketing agencies - such as Google - to increase the profile of monitored individuals. The FBI, the Department of Homeland Security, and other intelligence agencies have formed a "information sharing" partnership with more than 34,000 companies as part of their Infragard program.

The US Federal Government has collected information from a grocery store discount card program, which tracks customer shopping patterns and stores them in a database, to search for "terrorists" by analyzing buyer purchasing patterns.

Human Cooperation

Organizations that have enemies who want to gather information about members or activities of the group are facing infiltration problems.

In addition to operative 'organizational infiltration', the oversight party may put pressure on certain members of the target organization to act as informants (that is, to disclose the information they hold to the organization and its members).

Fielding operations are very expensive, and for governments with extensive electronic surveillance tools, information obtained from operations can be derived from the less problematic forms of control as mentioned above. Nevertheless, human infiltrators are still common today. For example, in 2007 documents appeared indicating that the FBI plans to oversee a total of 15,000 agents and informants disguised in response to anti-terrorism directives sent by George W. Bush in 2004 that ordered intelligence and law enforcement agencies to improve Ability HUMINT.

Satellite imagery

On May 25, 2007, US National Intelligence Director Michael McConnell authorized the National Office of Applications (NAO) from the Department of Homeland Security to allow local, state, and domestic Federal agencies to access images of military intelligence. Reconnaissance satellites and aircraft sensors Current surveillance can be used to observe the activities of US citizens. Satellites and aircraft sensors will be able to penetrate cloud cover, detect chemical traces, and identify objects in buildings and "underground bunkers", and will provide real-time video at a much higher resolution than the still images produced by programs such as Google Earth.

Identification and credentials

One of the simplest forms of identification is carrying credentials. Some countries have an identity card system to aid identification, while others consider it but face public opposition. Other documents, such as passports, driver's licenses, library cards, banking or credit cards are also used to verify identity.

If the form of the identity card is "machine readable", it usually uses encoded magnetic strips or identification numbers (such as Social Security numbers), it corroborates subject identification data. In this case it can create electronic traces when inspected and scanned, which can be used in profile creation, as mentioned above.

RFID devices and geolocation

RFID tagging

Identification of Radio Frequency Identification (RFID) is the use of very small electronic devices (called "RFID tags") applied or incorporated into products, animals or persons for the purposes of identification and tracking using radio waves. Tags can be read from a few meters. They are very cheap, cost a few cents per piece, so they can be incorporated into many types of everyday products without significantly increasing the price, and can be used to track and identify these objects for various purposes.

Some companies seem to "tag" their workers by entering RFID tags in the employee ID badge. Workers in Britain consider strike action as a protest because they themselves are tagged; they feel that it is inhuman to have all their motions tracked with RFID chips. Some critics have expressed fears that people will be tracked and scanned wherever they go. On the other hand, RFID tags on the newborn ID bracelet mounted by the hospital have foiled the abduction.

Verichip is an RFID device manufactured by a company called Applied Digital Solutions (ADS). Verichip is slightly larger than a grain of rice, and is injected under the skin. Injection reported feels similar to receiving injections. The chip is enclosed in glass, and stores the "VeriChip Customer ID" that the scanner uses to access their personal information, over the Internet, from the Verichip Inc. database, "VeriChip Global Customer Signup". Thousands have already put it. In Mexico, for example, 160 workers in the Attorney General's office are required to have the chip injected for identity verification and access control purposes.

In a 2003 editorial, CNET News.com's political correspondent Declan McCullagh speculated that, immediately, any object purchased, and possibly an ID card, would have an RFID device in it, which would respond with information about people as they walked past the scanner (what kind of phones they have, what kind of shoes they have, what books they carry, what credit cards or membership cards they have, etc.). This information can be used for targeted identification, tracking, or marketing. In 2012, this is largely not the case.

Global Positioning System

In the US, police have installed a GPS tracking device hidden in people's vehicles to monitor their movements, without warrant. In early 2009, they argued in court that they were entitled to do this.

Some cities run pilot projects to request parole to use GPS devices to track their movements when they get out of jail.

Mobile

Mobile phones are also often used to collect geolocation data. The geographic location of the phone (and the person carrying it) can be determined easily (whether in use or not), using a known multilateration technique to calculate the time difference for a signal to travel from phone to each of several cell towers near the phone owner. Dr. Victor Kappeler of Eastern Kentucky University points out that police surveillance is a strong concern, stating the following statistics from 2013:

Of the 321,545 law enforcement requests made to Verizon, 54,200 of these requests are for "content" or "location" information - not just mobile numbers or IP addresses. Content information including actual message text, email and tapping of voice or message content in real-time.

A new outdoors reconnaissance device is an IMSI catcher, a phone eavesdropper device used to cut mobile phone traffic and track mobile phone user movements. Basically a "fake" cell tower that acts between a target phone and a service provider tower, is considered a man-in-the-middle (MITM) attack. IMSI catchers are used in some countries by law enforcement and intelligence agencies, but their use has significantly increased civil and privacy freedom and is strictly regulated in some countries.

Microchip man

Human microchip implants are integrated circuits or RFID transponder devices wrapped in silicate glass and grown in the human body. Subdermic implants usually contain unique ID numbers that can be associated with information contained in external databases, such as personal identification, medical history, medications, allergies, and contact information.

Several types of microchips have been developed to control and monitor certain types of people, such as criminals, political figures and spies, a patent "killer" tracking chip filed at the German Patent and Trademark Office (DPMA) around May 2009.

Device

Listening devices and video devices, or "bugs", are hidden electronic devices used to capture, record and/or transmit data to recipients such as law enforcement agencies.

The United States has run many domestic intelligence operations, such as COINTELPRO, which has tapped into homes, offices and vehicles of thousands of Americans, usually political, subversive, and criminal activists.

Law enforcement and intelligence services in the United States and the United States have the technology to activate the microphone in the phone remotely, by accessing the phone's diagnostic/maintenance features, to listen to the conversations that occur near the person holding the phone.

Postal service

As more and more people use fax and email, the significance of postal system oversight declines, supporting internet and telephone surveillance. But post interception is still an option available for law enforcement and intelligence services, under certain circumstances. This is not a common practice, however, and entities like the US Army require a high level of approval to do.

The US Central Intelligence Agency and the Federal Bureau of Investigation have conducted twelve separate letter-opening campaigns targeted to US citizens. In one of these programs, more than 215,000 communications were intercepted, opened, and photographed.

Stakeout

Supervision is a coordinated oversight of a location or person. Stakeout is generally done covertly and for the purpose of collecting evidence related to criminal activity. The term comes from practice by land surveyors using survey bets to measure the area before the major building projects begin.

Wildlife

Wildlife population management often requires surveillance. This includes, for example, supervision of (1) the location of invasive species and abundance for more effective management, (2) illegal fishing and hunters to reduce harvests and exploitation of natural resources, (3) population abundance of endangered species to reduce the risk of extinction, and (4) wildlife diseases that can damage crops, agriculture and natural populations.

Social Supervision

When examining the idea of ​​cultural oversight and the implications for human interaction and privacy, due to technological advances in society, people have better ability to observe and monitor one another, ultimately raising awareness of the level of public privacy. More and more individuals start watching each other; the less freedom a person has to have true self.

Panoptic form of Observation

The notion of social oversight is promoted through the philosophy of individuals to continue to be monitored. In correlation, when looking at the concept of Panopticon, designed by philosopher Jeremey Bentham, the prison structure illustrates how the intention to organize inmates with observed ideas will result in self-regulation of their behavior, as a result of feeling cared for at all times. The power of supervision allows for a shift in the control of internal self-control into self-control. Current technology enables the development of a panoptic arrangement across the community. Technological developments allow individuals to monitor their actions and behaviors to improve their self-control. Digital technology allows a form of panoptic observation, which allows the individual to monitor the identity and actions of others.

Maps Surveillance



Controversy

Support

Supervision system advocates believe that these tools can help protect people from terrorists and criminals. They argue that oversight can reduce crime in three ways: by prevention, by observation, and by reconstruction. Supervision can prevent by increasing the chances of being caught, and by revealing the modus operandi. This requires a minimum level of invasion.

Another method of how surveillance can be used to combat criminal activity is by connecting the flow of information obtained from them to the recognition system (for example, camera systems that have baits run through the facial recognition system). This can for example identify fugitives and police directly to their location.

However, the differences here should be made on the type of supervision used. Some people who say video surveillance support in city streets may not support tap-and-phone calls vice versa. In addition to the type, the way in which this oversight is done is also very important; ie tap the phone arbitrarily supported by fewer people than to say that the phone tap is only done for people suspected of involvement in illegal activities.

Supervision can also be used to provide tactical benefits to humans through situational awareness raising, or through the use of automated processes, ie video analysis. Supervision can help reconstruct incidents and prove errors through the availability of recordings for forensic experts. Supervision may also affect subjective safety if the source of supervision is seen or if supervisory consequences can be felt.

Some surveillance systems (such as camera systems that have baits run through the above mentioned facial recognition systems) may also have other uses than against criminal activity. For example, it can be helpful in taking away children who are abducted, abducted or missing adults, mentally disabled people,...

Other supporters simply believe that nothing can be done about the loss of privacy, and people should get used to having no privacy. As Sun Microsystems CEO, Scott McNealy says: "You have zero privacy too. Get more."

Another common argument is: "If you do not do something wrong then you need not be afraid." Who follows that if a person engages in unlawful activity, in which case they have no valid justification for their privacy. However, if they follow the law of supervision will not affect them.

Opposition

With the advent of programs such as the Total Information Awareness program and ADVISE, technologies such as high speed computer surveillance and biometrics software, and legislation such as Communications Aid for Law Enforcement Act, the government now has an unprecedented ability to monitor their subjects' activities. Many civil rights and privacy groups, such as the Electronic Frontier Foundation and the American Civil Liberties Union, have expressed concern that by allowing a continuous increase in government oversight of our citizens will end up in a massive, very limited, or nonexistent mass surveillance community political and/or personal freedoms. This fear has caused many lawsuits such as Hepting v. AT & amp; T .

Some critics assert that claims made by supporters must be modified to read: "As long as we do what is commanded, we need not fear." For example, a person who is part of a political group opposed to a national government policy may not want the government to know their name and what they have read so the government can not easily subvert their organization, capture, or kill them. Other critics argue that while a person may not have something to hide now, the government may then apply the policies they want to oppose, and that the opposition may not be possible because of the mass supervision that allows the government to identify and remove political threats. Furthermore, other critics point out the fact that most people do hide things. For example, if someone is looking for a new job, they may not want their current employer to know this. Also if employers want total privacy to oversee their own employees and secure their financial information, it may become impossible, and they may not want to hire those who are supervised. The greatest concern of the loss is securing the lives of those living under full supervision, educating the public to those who are under peace control while identifying terrorists and those who use similar systems and monitoring mechanisms in opposition to peace, against civilians, and to express life is removed from state law.

Moreover, the risk of collecting personal data is significant from the fact that this risk is too much unknown to be assessed at this time. Storage is cheap enough to keep data forever, and the model used to analyze it in a decade from now is unpredictable.

In December 2017, the Chinese Government took steps to defy extensive surveillance by security camera companies, web cameras, and IP Cameras after tens of thousands were made accessible for viewing by Qihoo IT companies

Totalitarianism

Programs such as the Total Information Awareness program, and legislation such as the Communications Aid for Law Enforcement Law have led many groups to fear that society moves toward a state of mass surveillance with very limited political, social, political freedoms, in which individuals or groups disagree will be strategically removed in COINTELPRO cleaning.

Kate Martin, of the National Center for Security Studies said about the use of military spy satellites used to monitor US activities: "They put bricks one by one for a police state."

Some points obscure lines between public and private places, and privatization of places traditionally seen as public (such as shopping centers and industrial parks) as illustrating the increasing legality of personal information collection. Traveling through many public places such as government offices is hardly optional for most people, but consumers have little choice but to be subject to corporate supervisory practices. Control techniques are not created equal; among many biometric identification technologies, for example, facial recognition requires the least amount of cooperation. Unlike automatic fingerprint readings, which require a person to press a finger on the machine, the technique is subtle and requires little or no approval.

Psychological/social effects

Some critics, such as Michel Foucault, believe that in addition to its obvious function of identifying and capturing individuals performing undesirable actions, oversight also serves to create in everyone a feeling of being constantly watched, so that they become police themselves. This allows the State to control the people without having to use physical strength, which is expensive and problematic.

The concept of panopticism is an indirect control tool of large populations through uncontrolled uncertainty. Michel Foucault analyzes the panopticonon prison architecture, and realizes that its success is not only its ability to monitor but also its ability to not monitor without anyone knowing. Critics such as Derrick Jensen and George Draffan, argue that Panoptics in the United States began in World War I when passport spending became important for tracking citizens and possibly an enemy of the state. Such supervision continues today through government agencies in the form of internet usage tracking and library usage.

With the development of digital technology, individuals become increasingly clear to each other, as monitoring becomes virtual. Online monitoring is the use of the internet to observe one's activities. Corporations, citizens, and governments participate in tracking the behavior of others for motivation arising from business relationships, curiosity, to legality. In his Superconnected , Chayko distinguishes between two types of surveillance: vertical and horizontal. Vertical oversight occurs when there is a dominant power, such as a government that tries to control or regulate certain community actions. Such powerful authorities often justify their attacks as a means of protecting people from the threat of violence or terrorism. Some people question when this becomes a violation of civil rights.

Horizontally deviates from vertical monitoring as tracking shifts from authoritative sources to daily figures, such as friends, co-workers, or strangers interested in one's worldly activities. Individuals leave traces of information when they are online that express their interests and desires that others observe. While this may allow people to connect and develop social connections online, it can also increase the potential risks to dangers, such as cyberbullying or censoring/stalking by strangers, reducing privacy.

Michel Foucault has expanded the literature on discipline and power structures in society, especially by developing Jeremy Bentham's idea of ​​panopticon. This metaphor has been used to describe the effect of supervision on the individual, in addition to society as a collective. Panoptikon is a circular prison design in which the prison guard is at the center of the facility, monitoring the prisoners who are invisible to each other. Although prisoners are not consistently observed, they are still obliged to obey the rules because of the perception that they are being watched. This is similar to the prevalence of undercover police and contemporary highway trackers. An example of video surveillance is called closed-circuit television (CCTV), which is used to reduce crime and improve public safety. Regulations are maintained both through vertical control and self-control.

Privacy

Many civil rights groups and privacy groups are opposed to surveillance as a violation of the right of persons to privacy. The groups include: Electronic Privacy Information Center, Frontier Electronic Foundation, American Civil Liberties Union

There are several lawsuits such as Hepting v. AT & amp; T and EPIC v. The Department of Justice by groups or individuals, opposes certain surveillance activities.

The legislative process as it occurs during the Church Committee, which investigates domestic intelligence programs such as COINTELPRO, also weighs the pros and cons of oversight.

Court Case

People vs. Diaz (2011) is a court case in the domain of mobile privacy, although the decision was later canceled. In this case, Gregory Diaz was arrested during the assault operation for trying to sell ecstasy. During his arrest, police searched Diaz's phone and found more incriminating evidence including SMS text messages and photographs depicting illicit activities. During the trial, Diaz attempted to obtain information from his cell phone removed from evidence, but the court considered it as halal and the Diaz appeal was denied at the California District Court level and, later, the Supreme Court rate. Only three years later, this decision was canceled in the case of Riley vs. California (2014).

Riley vs. California (2014) is a vital Supreme Court case in which a man is arrested for his involvement in a car shoot. A few days after the shooting, the police arrested a suspect (Riley), and, during the arrest, the police searched him. However, this search was not only from Riley's people, but also the police opened and searched his cell phone, found images of other weapons, drugs, and Riley showing gang signs. In court, the question arises whether the telephone search is valid or if the search is protected by the 4th amendment of the constitution. The decision stated that Riley's cell phone search during his arrest was illegal, and that it was protected by the 4th Amendment.

SURVEILLANCE â€
src: zeetronnetworks.com


Avoidance of counterattack, reverse oversight, sousveillance

Countersurveillance is a practice of avoiding oversight or making supervision difficult. Developments at the end of the 20th century have caused reconnaissance to grow dramatically both in scope and complexity, such as the Internet, increasing the prevalence of electronic security systems, high-altitude (and possibly armed) UAVs, and large corporate and government computer databases.

Reverse control is the practice of reversing controls on individuals or other groups (eg, citizens who photograph the police). Famous examples are George Holliday's record of the beating of Rodney King and the Copwatch organization, which tries to monitor police officers to prevent police brutality. Counter-surveillance can also be used in applications to prevent corporate espionage, or to track other criminals by certain criminal entities. It can also be used to block the stalking methods used by various entities and organizations.

Source of the article : Wikipedia

Comments
0 Comments