CINXE.COM

Surveillance - Wikipedia

<!DOCTYPE html> <html class="client-nojs vector-feature-language-in-header-enabled vector-feature-language-in-main-page-header-disabled vector-feature-sticky-header-disabled vector-feature-page-tools-pinned-disabled vector-feature-toc-pinned-clientpref-1 vector-feature-main-menu-pinned-disabled vector-feature-limited-width-clientpref-1 vector-feature-limited-width-content-enabled vector-feature-custom-font-size-clientpref-1 vector-feature-appearance-pinned-clientpref-1 vector-feature-night-mode-enabled skin-theme-clientpref-day vector-toc-available" lang="en" dir="ltr"> <head> <meta charset="UTF-8"> <title>Surveillance - Wikipedia</title> <script>(function(){var className="client-js vector-feature-language-in-header-enabled vector-feature-language-in-main-page-header-disabled vector-feature-sticky-header-disabled vector-feature-page-tools-pinned-disabled vector-feature-toc-pinned-clientpref-1 vector-feature-main-menu-pinned-disabled vector-feature-limited-width-clientpref-1 vector-feature-limited-width-content-enabled vector-feature-custom-font-size-clientpref-1 vector-feature-appearance-pinned-clientpref-1 vector-feature-night-mode-enabled skin-theme-clientpref-day vector-toc-available";var cookie=document.cookie.match(/(?:^|; )enwikimwclientpreferences=([^;]+)/);if(cookie){cookie[1].split('%2C').forEach(function(pref){className=className.replace(new RegExp('(^| )'+pref.replace(/-clientpref-\w+$|[^\w-]+/g,'')+'-clientpref-\\w+( |$)'),'$1'+pref+'$2');});}document.documentElement.className=className;}());RLCONF={"wgBreakFrames":false,"wgSeparatorTransformTable":["",""],"wgDigitTransformTable":["",""],"wgDefaultDateFormat":"dmy", "wgMonthNames":["","January","February","March","April","May","June","July","August","September","October","November","December"],"wgRequestId":"d02a9769-de97-4591-b6a2-2028b247327e","wgCanonicalNamespace":"","wgCanonicalSpecialPageName":false,"wgNamespaceNumber":0,"wgPageName":"Surveillance","wgTitle":"Surveillance","wgCurRevisionId":1258775741,"wgRevisionId":1258775741,"wgArticleId":87231,"wgIsArticle":true,"wgIsRedirect":false,"wgAction":"view","wgUserName":null,"wgUserGroups":["*"],"wgCategories":["CS1: long volume value","All articles with dead external links","Articles with dead external links from August 2018","Articles with permanently dead external links","CS1 maint: bot: original URL status unknown","Webarchive template wayback links","CS1 maint: multiple names: authors list","CS1 maint: numeric names: authors list","Articles with short description","Short description is different from Wikidata","Use mdy dates from December 2012", "Articles slanted towards recent events from June 2024","All articles with unsourced statements","Articles with unsourced statements from August 2023","All Wikipedia articles needing clarification","Wikipedia articles needing clarification from March 2012","Articles containing potentially dated statements from 2021","All articles containing potentially dated statements","Wikipedia articles needing clarification from February 2016","Articles with excerpts","Commons category link from Wikidata","Surveillance","Crime prevention","Espionage techniques","Law enforcement","Law enforcement techniques","National security","Privacy","Security"],"wgPageViewLanguage":"en","wgPageContentLanguage":"en","wgPageContentModel":"wikitext","wgRelevantPageName":"Surveillance","wgRelevantArticleId":87231,"wgIsProbablyEditable":true,"wgRelevantPageIsProbablyEditable":true,"wgRestrictionEdit":[],"wgRestrictionMove":[],"wgNoticeProject":"wikipedia","wgCiteReferencePreviewsActive":false,"wgFlaggedRevsParams":{ "tags":{"status":{"levels":1}}},"wgMediaViewerOnClick":true,"wgMediaViewerEnabledByDefault":true,"wgPopupsFlags":0,"wgVisualEditor":{"pageLanguageCode":"en","pageLanguageDir":"ltr","pageVariantFallbacks":"en"},"wgMFDisplayWikibaseDescriptions":{"search":true,"watchlist":true,"tagline":false,"nearby":true},"wgWMESchemaEditAttemptStepOversample":false,"wgWMEPageLength":100000,"wgRelatedArticlesCompat":[],"wgCentralAuthMobileDomain":false,"wgEditSubmitButtonLabelPublish":true,"wgULSPosition":"interlanguage","wgULSisCompactLinksEnabled":false,"wgVector2022LanguageInHeader":true,"wgULSisLanguageSelectorEmpty":false,"wgWikibaseItemId":"Q334401","wgCheckUserClientHintsHeadersJsApi":["brands","architecture","bitness","fullVersionList","mobile","model","platform","platformVersion"],"GEHomepageSuggestedEditsEnableTopics":true,"wgGETopicsMatchModeEnabled":false,"wgGEStructuredTaskRejectionReasonTextInputEnabled":false,"wgGELevelingUpEnabledForUser":false};RLSTATE={"ext.globalCssJs.user.styles": "ready","site.styles":"ready","user.styles":"ready","ext.globalCssJs.user":"ready","user":"ready","user.options":"loading","ext.cite.styles":"ready","skins.vector.search.codex.styles":"ready","skins.vector.styles":"ready","skins.vector.icons":"ready","jquery.makeCollapsible.styles":"ready","ext.wikimediamessages.styles":"ready","ext.visualEditor.desktopArticleTarget.noscript":"ready","ext.uls.interlanguage":"ready","wikibase.client.init":"ready","ext.wikimediaBadges":"ready"};RLPAGEMODULES=["ext.cite.ux-enhancements","mediawiki.page.media","site","mediawiki.page.ready","jquery.makeCollapsible","mediawiki.toc","skins.vector.js","ext.centralNotice.geoIP","ext.centralNotice.startUp","ext.gadget.ReferenceTooltips","ext.gadget.switcher","ext.urlShortener.toolbar","ext.centralauth.centralautologin","mmv.bootstrap","ext.popups","ext.visualEditor.desktopArticleTarget.init","ext.visualEditor.targetLoader","ext.echo.centralauth","ext.eventLogging","ext.wikimediaEvents","ext.navigationTiming", "ext.uls.interface","ext.cx.eventlogging.campaigns","ext.cx.uls.quick.actions","wikibase.client.vector-2022","ext.checkUser.clientHints","ext.growthExperiments.SuggestedEditSession","wikibase.sidebar.tracking"];</script> <script>(RLQ=window.RLQ||[]).push(function(){mw.loader.impl(function(){return["user.options@12s5i",function($,jQuery,require,module){mw.user.tokens.set({"patrolToken":"+\\","watchToken":"+\\","csrfToken":"+\\"}); }];});});</script> <link rel="stylesheet" href="/w/load.php?lang=en&amp;modules=ext.cite.styles%7Cext.uls.interlanguage%7Cext.visualEditor.desktopArticleTarget.noscript%7Cext.wikimediaBadges%7Cext.wikimediamessages.styles%7Cjquery.makeCollapsible.styles%7Cskins.vector.icons%2Cstyles%7Cskins.vector.search.codex.styles%7Cwikibase.client.init&amp;only=styles&amp;skin=vector-2022"> <script async="" src="/w/load.php?lang=en&amp;modules=startup&amp;only=scripts&amp;raw=1&amp;skin=vector-2022"></script> <meta name="ResourceLoaderDynamicStyles" content=""> <link rel="stylesheet" href="/w/load.php?lang=en&amp;modules=site.styles&amp;only=styles&amp;skin=vector-2022"> <meta name="generator" content="MediaWiki 1.44.0-wmf.4"> <meta name="referrer" content="origin"> <meta name="referrer" content="origin-when-cross-origin"> <meta name="robots" content="max-image-preview:standard"> <meta name="format-detection" content="telephone=no"> <meta property="og:image" content="https://upload.wikimedia.org/wikipedia/commons/thumb/3/30/Surveillance_video_cameras%2C_Gdynia.jpeg/1200px-Surveillance_video_cameras%2C_Gdynia.jpeg"> <meta property="og:image:width" content="1200"> <meta property="og:image:height" content="900"> <meta property="og:image" content="https://upload.wikimedia.org/wikipedia/commons/thumb/3/30/Surveillance_video_cameras%2C_Gdynia.jpeg/800px-Surveillance_video_cameras%2C_Gdynia.jpeg"> <meta property="og:image:width" content="800"> <meta property="og:image:height" content="600"> <meta property="og:image" content="https://upload.wikimedia.org/wikipedia/commons/thumb/3/30/Surveillance_video_cameras%2C_Gdynia.jpeg/640px-Surveillance_video_cameras%2C_Gdynia.jpeg"> <meta property="og:image:width" content="640"> <meta property="og:image:height" content="480"> <meta name="viewport" content="width=1120"> <meta property="og:title" content="Surveillance - Wikipedia"> <meta property="og:type" content="website"> <link rel="preconnect" href="//upload.wikimedia.org"> <link rel="alternate" media="only screen and (max-width: 640px)" href="//en.m.wikipedia.org/wiki/Surveillance"> <link rel="alternate" type="application/x-wiki" title="Edit this page" href="/w/index.php?title=Surveillance&amp;action=edit"> <link rel="apple-touch-icon" href="/static/apple-touch/wikipedia.png"> <link rel="icon" href="/static/favicon/wikipedia.ico"> <link rel="search" type="application/opensearchdescription+xml" href="/w/rest.php/v1/search" title="Wikipedia (en)"> <link rel="EditURI" type="application/rsd+xml" href="//en.wikipedia.org/w/api.php?action=rsd"> <link rel="canonical" href="https://en.wikipedia.org/wiki/Surveillance"> <link rel="license" href="https://creativecommons.org/licenses/by-sa/4.0/deed.en"> <link rel="alternate" type="application/atom+xml" title="Wikipedia Atom feed" href="/w/index.php?title=Special:RecentChanges&amp;feed=atom"> <link rel="dns-prefetch" href="//meta.wikimedia.org" /> <link rel="dns-prefetch" href="//login.wikimedia.org"> </head> <body class="skin--responsive skin-vector skin-vector-search-vue mediawiki ltr sitedir-ltr mw-hide-empty-elt ns-0 ns-subject mw-editable page-Surveillance rootpage-Surveillance skin-vector-2022 action-view"><a class="mw-jump-link" href="#bodyContent">Jump to content</a> <div class="vector-header-container"> <header class="vector-header mw-header"> <div class="vector-header-start"> <nav class="vector-main-menu-landmark" aria-label="Site"> <div id="vector-main-menu-dropdown" class="vector-dropdown vector-main-menu-dropdown vector-button-flush-left vector-button-flush-right" > <input type="checkbox" id="vector-main-menu-dropdown-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-main-menu-dropdown" class="vector-dropdown-checkbox " aria-label="Main menu" > <label id="vector-main-menu-dropdown-label" for="vector-main-menu-dropdown-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only " aria-hidden="true" ><span class="vector-icon mw-ui-icon-menu mw-ui-icon-wikimedia-menu"></span> <span class="vector-dropdown-label-text">Main menu</span> </label> <div class="vector-dropdown-content"> <div id="vector-main-menu-unpinned-container" class="vector-unpinned-container"> <div id="vector-main-menu" class="vector-main-menu vector-pinnable-element"> <div class="vector-pinnable-header vector-main-menu-pinnable-header vector-pinnable-header-unpinned" data-feature-name="main-menu-pinned" data-pinnable-element-id="vector-main-menu" data-pinned-container-id="vector-main-menu-pinned-container" data-unpinned-container-id="vector-main-menu-unpinned-container" > <div class="vector-pinnable-header-label">Main menu</div> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-pin-button" data-event-name="pinnable-header.vector-main-menu.pin">move to sidebar</button> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-unpin-button" data-event-name="pinnable-header.vector-main-menu.unpin">hide</button> </div> <div id="p-navigation" class="vector-menu mw-portlet mw-portlet-navigation" > <div class="vector-menu-heading"> Navigation </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="n-mainpage-description" class="mw-list-item"><a href="/wiki/Main_Page" title="Visit the main page [z]" accesskey="z"><span>Main page</span></a></li><li id="n-contents" class="mw-list-item"><a href="/wiki/Wikipedia:Contents" title="Guides to browsing Wikipedia"><span>Contents</span></a></li><li id="n-currentevents" class="mw-list-item"><a href="/wiki/Portal:Current_events" title="Articles related to current events"><span>Current events</span></a></li><li id="n-randompage" class="mw-list-item"><a href="/wiki/Special:Random" title="Visit a randomly selected article [x]" accesskey="x"><span>Random article</span></a></li><li id="n-aboutsite" class="mw-list-item"><a href="/wiki/Wikipedia:About" title="Learn about Wikipedia and how it works"><span>About Wikipedia</span></a></li><li id="n-contactpage" class="mw-list-item"><a href="//en.wikipedia.org/wiki/Wikipedia:Contact_us" title="How to contact Wikipedia"><span>Contact us</span></a></li> </ul> </div> </div> <div id="p-interaction" class="vector-menu mw-portlet mw-portlet-interaction" > <div class="vector-menu-heading"> Contribute </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="n-help" class="mw-list-item"><a href="/wiki/Help:Contents" title="Guidance on how to use and edit Wikipedia"><span>Help</span></a></li><li id="n-introduction" class="mw-list-item"><a href="/wiki/Help:Introduction" title="Learn how to edit Wikipedia"><span>Learn to edit</span></a></li><li id="n-portal" class="mw-list-item"><a href="/wiki/Wikipedia:Community_portal" title="The hub for editors"><span>Community portal</span></a></li><li id="n-recentchanges" class="mw-list-item"><a href="/wiki/Special:RecentChanges" title="A list of recent changes to Wikipedia [r]" accesskey="r"><span>Recent changes</span></a></li><li id="n-upload" class="mw-list-item"><a href="/wiki/Wikipedia:File_upload_wizard" title="Add images or other media for use on Wikipedia"><span>Upload file</span></a></li> </ul> </div> </div> </div> </div> </div> </div> </nav> <a href="/wiki/Main_Page" class="mw-logo"> <img class="mw-logo-icon" src="/static/images/icons/wikipedia.png" alt="" aria-hidden="true" height="50" width="50"> <span class="mw-logo-container skin-invert"> <img class="mw-logo-wordmark" alt="Wikipedia" src="/static/images/mobile/copyright/wikipedia-wordmark-en.svg" style="width: 7.5em; height: 1.125em;"> <img class="mw-logo-tagline" alt="The Free Encyclopedia" src="/static/images/mobile/copyright/wikipedia-tagline-en.svg" width="117" height="13" style="width: 7.3125em; height: 0.8125em;"> </span> </a> </div> <div class="vector-header-end"> <div id="p-search" role="search" class="vector-search-box-vue vector-search-box-collapses vector-search-box-show-thumbnail vector-search-box-auto-expand-width vector-search-box"> <a href="/wiki/Special:Search" class="cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only search-toggle" title="Search Wikipedia [f]" accesskey="f"><span class="vector-icon mw-ui-icon-search mw-ui-icon-wikimedia-search"></span> <span>Search</span> </a> <div class="vector-typeahead-search-container"> <div class="cdx-typeahead-search cdx-typeahead-search--show-thumbnail cdx-typeahead-search--auto-expand-width"> <form action="/w/index.php" id="searchform" class="cdx-search-input cdx-search-input--has-end-button"> <div id="simpleSearch" class="cdx-search-input__input-wrapper" data-search-loc="header-moved"> <div class="cdx-text-input cdx-text-input--has-start-icon"> <input class="cdx-text-input__input" type="search" name="search" placeholder="Search Wikipedia" aria-label="Search Wikipedia" autocapitalize="sentences" title="Search Wikipedia [f]" accesskey="f" id="searchInput" > <span class="cdx-text-input__icon cdx-text-input__start-icon"></span> </div> <input type="hidden" name="title" value="Special:Search"> </div> <button class="cdx-button cdx-search-input__end-button">Search</button> </form> </div> </div> </div> <nav class="vector-user-links vector-user-links-wide" aria-label="Personal tools"> <div class="vector-user-links-main"> <div id="p-vector-user-menu-preferences" class="vector-menu mw-portlet emptyPortlet" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> </ul> </div> </div> <div id="p-vector-user-menu-userpage" class="vector-menu mw-portlet emptyPortlet" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> </ul> </div> </div> <nav class="vector-appearance-landmark" aria-label="Appearance"> <div id="vector-appearance-dropdown" class="vector-dropdown " title="Change the appearance of the page&#039;s font size, width, and color" > <input type="checkbox" id="vector-appearance-dropdown-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-appearance-dropdown" class="vector-dropdown-checkbox " aria-label="Appearance" > <label id="vector-appearance-dropdown-label" for="vector-appearance-dropdown-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only " aria-hidden="true" ><span class="vector-icon mw-ui-icon-appearance mw-ui-icon-wikimedia-appearance"></span> <span class="vector-dropdown-label-text">Appearance</span> </label> <div class="vector-dropdown-content"> <div id="vector-appearance-unpinned-container" class="vector-unpinned-container"> </div> </div> </div> </nav> <div id="p-vector-user-menu-notifications" class="vector-menu mw-portlet emptyPortlet" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> </ul> </div> </div> <div id="p-vector-user-menu-overflow" class="vector-menu mw-portlet" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="pt-sitesupport-2" class="user-links-collapsible-item mw-list-item user-links-collapsible-item"><a data-mw="interface" href="https://donate.wikimedia.org/wiki/Special:FundraiserRedirector?utm_source=donate&amp;utm_medium=sidebar&amp;utm_campaign=C13_en.wikipedia.org&amp;uselang=en" class=""><span>Donate</span></a> </li> <li id="pt-createaccount-2" class="user-links-collapsible-item mw-list-item user-links-collapsible-item"><a data-mw="interface" href="/w/index.php?title=Special:CreateAccount&amp;returnto=Surveillance" title="You are encouraged to create an account and log in; however, it is not mandatory" class=""><span>Create account</span></a> </li> <li id="pt-login-2" class="user-links-collapsible-item mw-list-item user-links-collapsible-item"><a data-mw="interface" href="/w/index.php?title=Special:UserLogin&amp;returnto=Surveillance" title="You&#039;re encouraged to log in; however, it&#039;s not mandatory. [o]" accesskey="o" class=""><span>Log in</span></a> </li> </ul> </div> </div> </div> <div id="vector-user-links-dropdown" class="vector-dropdown vector-user-menu vector-button-flush-right vector-user-menu-logged-out" title="Log in and more options" > <input type="checkbox" id="vector-user-links-dropdown-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-user-links-dropdown" class="vector-dropdown-checkbox " aria-label="Personal tools" > <label id="vector-user-links-dropdown-label" for="vector-user-links-dropdown-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only " aria-hidden="true" ><span class="vector-icon mw-ui-icon-ellipsis mw-ui-icon-wikimedia-ellipsis"></span> <span class="vector-dropdown-label-text">Personal tools</span> </label> <div class="vector-dropdown-content"> <div id="p-personal" class="vector-menu mw-portlet mw-portlet-personal user-links-collapsible-item" title="User menu" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="pt-sitesupport" class="user-links-collapsible-item mw-list-item"><a href="https://donate.wikimedia.org/wiki/Special:FundraiserRedirector?utm_source=donate&amp;utm_medium=sidebar&amp;utm_campaign=C13_en.wikipedia.org&amp;uselang=en"><span>Donate</span></a></li><li id="pt-createaccount" class="user-links-collapsible-item mw-list-item"><a href="/w/index.php?title=Special:CreateAccount&amp;returnto=Surveillance" title="You are encouraged to create an account and log in; however, it is not mandatory"><span class="vector-icon mw-ui-icon-userAdd mw-ui-icon-wikimedia-userAdd"></span> <span>Create account</span></a></li><li id="pt-login" class="user-links-collapsible-item mw-list-item"><a href="/w/index.php?title=Special:UserLogin&amp;returnto=Surveillance" title="You&#039;re encouraged to log in; however, it&#039;s not mandatory. [o]" accesskey="o"><span class="vector-icon mw-ui-icon-logIn mw-ui-icon-wikimedia-logIn"></span> <span>Log in</span></a></li> </ul> </div> </div> <div id="p-user-menu-anon-editor" class="vector-menu mw-portlet mw-portlet-user-menu-anon-editor" > <div class="vector-menu-heading"> Pages for logged out editors <a href="/wiki/Help:Introduction" aria-label="Learn more about editing"><span>learn more</span></a> </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="pt-anoncontribs" class="mw-list-item"><a href="/wiki/Special:MyContributions" title="A list of edits made from this IP address [y]" accesskey="y"><span>Contributions</span></a></li><li id="pt-anontalk" class="mw-list-item"><a href="/wiki/Special:MyTalk" title="Discussion about edits from this IP address [n]" accesskey="n"><span>Talk</span></a></li> </ul> </div> </div> </div> </div> </nav> </div> </header> </div> <div class="mw-page-container"> <div class="mw-page-container-inner"> <div class="vector-sitenotice-container"> <div id="siteNotice"><!-- CentralNotice --></div> </div> <div class="vector-column-start"> <div class="vector-main-menu-container"> <div id="mw-navigation"> <nav id="mw-panel" class="vector-main-menu-landmark" aria-label="Site"> <div id="vector-main-menu-pinned-container" class="vector-pinned-container"> </div> </nav> </div> </div> <div class="vector-sticky-pinned-container"> <nav id="mw-panel-toc" aria-label="Contents" data-event-name="ui.sidebar-toc" class="mw-table-of-contents-container vector-toc-landmark"> <div id="vector-toc-pinned-container" class="vector-pinned-container"> <div id="vector-toc" class="vector-toc vector-pinnable-element"> <div class="vector-pinnable-header vector-toc-pinnable-header vector-pinnable-header-pinned" data-feature-name="toc-pinned" data-pinnable-element-id="vector-toc" > <h2 class="vector-pinnable-header-label">Contents</h2> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-pin-button" data-event-name="pinnable-header.vector-toc.pin">move to sidebar</button> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-unpin-button" data-event-name="pinnable-header.vector-toc.unpin">hide</button> </div> <ul class="vector-toc-contents" id="mw-panel-toc-list"> <li id="toc-mw-content-text" class="vector-toc-list-item vector-toc-level-1"> <a href="#" class="vector-toc-link"> <div class="vector-toc-text">(Top)</div> </a> </li> <li id="toc-Methods" class="vector-toc-list-item vector-toc-level-1"> <a class="vector-toc-link" href="#Methods"> <div class="vector-toc-text"> <span class="vector-toc-numb">1</span> <span>Methods</span> </div> </a> <button aria-controls="toc-Methods-sublist" class="cdx-button cdx-button--weight-quiet cdx-button--icon-only vector-toc-toggle"> <span class="vector-icon mw-ui-icon-wikimedia-expand"></span> <span>Toggle Methods subsection</span> </button> <ul id="toc-Methods-sublist" class="vector-toc-list"> <li id="toc-Computer" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Computer"> <div class="vector-toc-text"> <span class="vector-toc-numb">1.1</span> <span>Computer</span> </div> </a> <ul id="toc-Computer-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Telephones" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Telephones"> <div class="vector-toc-text"> <span class="vector-toc-numb">1.2</span> <span>Telephones</span> </div> </a> <ul id="toc-Telephones-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Cameras" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Cameras"> <div class="vector-toc-text"> <span class="vector-toc-numb">1.3</span> <span>Cameras</span> </div> </a> <ul id="toc-Cameras-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Social_network_analysis" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Social_network_analysis"> <div class="vector-toc-text"> <span class="vector-toc-numb">1.4</span> <span>Social network analysis</span> </div> </a> <ul id="toc-Social_network_analysis-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Biometric" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Biometric"> <div class="vector-toc-text"> <span class="vector-toc-numb">1.5</span> <span>Biometric</span> </div> </a> <ul id="toc-Biometric-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Aerial" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Aerial"> <div class="vector-toc-text"> <span class="vector-toc-numb">1.6</span> <span>Aerial</span> </div> </a> <ul id="toc-Aerial-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Corporate" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Corporate"> <div class="vector-toc-text"> <span class="vector-toc-numb">1.7</span> <span>Corporate</span> </div> </a> <ul id="toc-Corporate-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Data_mining_and_profiling" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Data_mining_and_profiling"> <div class="vector-toc-text"> <span class="vector-toc-numb">1.8</span> <span>Data mining and profiling</span> </div> </a> <ul id="toc-Data_mining_and_profiling-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Human_operatives" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Human_operatives"> <div class="vector-toc-text"> <span class="vector-toc-numb">1.9</span> <span>Human operatives</span> </div> </a> <ul id="toc-Human_operatives-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Satellite_imagery" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Satellite_imagery"> <div class="vector-toc-text"> <span class="vector-toc-numb">1.10</span> <span>Satellite imagery</span> </div> </a> <ul id="toc-Satellite_imagery-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Identification_and_credentials" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Identification_and_credentials"> <div class="vector-toc-text"> <span class="vector-toc-numb">1.11</span> <span>Identification and credentials</span> </div> </a> <ul id="toc-Identification_and_credentials-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Wireless_tracking" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Wireless_tracking"> <div class="vector-toc-text"> <span class="vector-toc-numb">1.12</span> <span>Wireless tracking</span> </div> </a> <ul id="toc-Wireless_tracking-sublist" class="vector-toc-list"> <li id="toc-Mobile_phones" class="vector-toc-list-item vector-toc-level-3"> <a class="vector-toc-link" href="#Mobile_phones"> <div class="vector-toc-text"> <span class="vector-toc-numb">1.12.1</span> <span>Mobile phones</span> </div> </a> <ul id="toc-Mobile_phones-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-RFID_tagging" class="vector-toc-list-item vector-toc-level-3"> <a class="vector-toc-link" href="#RFID_tagging"> <div class="vector-toc-text"> <span class="vector-toc-numb">1.12.2</span> <span>RFID tagging</span> </div> </a> <ul id="toc-RFID_tagging-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-RFID_tagging_on_humans" class="vector-toc-list-item vector-toc-level-3"> <a class="vector-toc-link" href="#RFID_tagging_on_humans"> <div class="vector-toc-text"> <span class="vector-toc-numb">1.12.3</span> <span>RFID tagging on humans</span> </div> </a> <ul id="toc-RFID_tagging_on_humans-sublist" class="vector-toc-list"> </ul> </li> </ul> </li> <li id="toc-Radar" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Radar"> <div class="vector-toc-text"> <span class="vector-toc-numb">1.13</span> <span>Radar</span> </div> </a> <ul id="toc-Radar-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Geolocation_devices" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Geolocation_devices"> <div class="vector-toc-text"> <span class="vector-toc-numb">1.14</span> <span>Geolocation devices</span> </div> </a> <ul id="toc-Geolocation_devices-sublist" class="vector-toc-list"> <li id="toc-Global_Positioning_System" class="vector-toc-list-item vector-toc-level-3"> <a class="vector-toc-link" href="#Global_Positioning_System"> <div class="vector-toc-text"> <span class="vector-toc-numb">1.14.1</span> <span>Global Positioning System</span> </div> </a> <ul id="toc-Global_Positioning_System-sublist" class="vector-toc-list"> </ul> </li> </ul> </li> <li id="toc-Devices" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Devices"> <div class="vector-toc-text"> <span class="vector-toc-numb">1.15</span> <span>Devices</span> </div> </a> <ul id="toc-Devices-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Postal_services" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Postal_services"> <div class="vector-toc-text"> <span class="vector-toc-numb">1.16</span> <span>Postal services</span> </div> </a> <ul id="toc-Postal_services-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Stakeout" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Stakeout"> <div class="vector-toc-text"> <span class="vector-toc-numb">1.17</span> <span>Stakeout</span> </div> </a> <ul id="toc-Stakeout-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Internet_of_things" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Internet_of_things"> <div class="vector-toc-text"> <span class="vector-toc-numb">1.18</span> <span>Internet of things</span> </div> </a> <ul id="toc-Internet_of_things-sublist" class="vector-toc-list"> </ul> </li> </ul> </li> <li id="toc-Controversy" class="vector-toc-list-item vector-toc-level-1"> <a class="vector-toc-link" href="#Controversy"> <div class="vector-toc-text"> <span class="vector-toc-numb">2</span> <span>Controversy</span> </div> </a> <button aria-controls="toc-Controversy-sublist" class="cdx-button cdx-button--weight-quiet cdx-button--icon-only vector-toc-toggle"> <span class="vector-icon mw-ui-icon-wikimedia-expand"></span> <span>Toggle Controversy subsection</span> </button> <ul id="toc-Controversy-sublist" class="vector-toc-list"> <li id="toc-Support" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Support"> <div class="vector-toc-text"> <span class="vector-toc-numb">2.1</span> <span>Support</span> </div> </a> <ul id="toc-Support-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Opposition" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Opposition"> <div class="vector-toc-text"> <span class="vector-toc-numb">2.2</span> <span>Opposition</span> </div> </a> <ul id="toc-Opposition-sublist" class="vector-toc-list"> <li id="toc-Totalitarianism" class="vector-toc-list-item vector-toc-level-3"> <a class="vector-toc-link" href="#Totalitarianism"> <div class="vector-toc-text"> <span class="vector-toc-numb">2.2.1</span> <span>Totalitarianism</span> </div> </a> <ul id="toc-Totalitarianism-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Psychological/social_effects" class="vector-toc-list-item vector-toc-level-3"> <a class="vector-toc-link" href="#Psychological/social_effects"> <div class="vector-toc-text"> <span class="vector-toc-numb">2.2.2</span> <span>Psychological/social effects</span> </div> </a> <ul id="toc-Psychological/social_effects-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Privacy" class="vector-toc-list-item vector-toc-level-3"> <a class="vector-toc-link" href="#Privacy"> <div class="vector-toc-text"> <span class="vector-toc-numb">2.2.3</span> <span>Privacy</span> </div> </a> <ul id="toc-Privacy-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Court_cases" class="vector-toc-list-item vector-toc-level-3"> <a class="vector-toc-link" href="#Court_cases"> <div class="vector-toc-text"> <span class="vector-toc-numb">2.2.4</span> <span>Court cases</span> </div> </a> <ul id="toc-Court_cases-sublist" class="vector-toc-list"> </ul> </li> </ul> </li> </ul> </li> <li id="toc-Countersurveillance,_inverse_surveillance,_sousveillance" class="vector-toc-list-item vector-toc-level-1"> <a class="vector-toc-link" href="#Countersurveillance,_inverse_surveillance,_sousveillance"> <div class="vector-toc-text"> <span class="vector-toc-numb">3</span> <span>Countersurveillance, inverse surveillance, sousveillance</span> </div> </a> <ul id="toc-Countersurveillance,_inverse_surveillance,_sousveillance-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Popular_culture" class="vector-toc-list-item vector-toc-level-1"> <a class="vector-toc-link" href="#Popular_culture"> <div class="vector-toc-text"> <span class="vector-toc-numb">4</span> <span>Popular culture</span> </div> </a> <button aria-controls="toc-Popular_culture-sublist" class="cdx-button cdx-button--weight-quiet cdx-button--icon-only vector-toc-toggle"> <span class="vector-icon mw-ui-icon-wikimedia-expand"></span> <span>Toggle Popular culture subsection</span> </button> <ul id="toc-Popular_culture-sublist" class="vector-toc-list"> <li id="toc-In_literature" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#In_literature"> <div class="vector-toc-text"> <span class="vector-toc-numb">4.1</span> <span>In literature</span> </div> </a> <ul id="toc-In_literature-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-In_music" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#In_music"> <div class="vector-toc-text"> <span class="vector-toc-numb">4.2</span> <span>In music</span> </div> </a> <ul id="toc-In_music-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Onscreen" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Onscreen"> <div class="vector-toc-text"> <span class="vector-toc-numb">4.3</span> <span>Onscreen</span> </div> </a> <ul id="toc-Onscreen-sublist" class="vector-toc-list"> </ul> </li> </ul> </li> <li id="toc-See_also" class="vector-toc-list-item vector-toc-level-1"> <a class="vector-toc-link" href="#See_also"> <div class="vector-toc-text"> <span class="vector-toc-numb">5</span> <span>See also</span> </div> </a> <ul id="toc-See_also-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-References" class="vector-toc-list-item vector-toc-level-1"> <a class="vector-toc-link" href="#References"> <div class="vector-toc-text"> <span class="vector-toc-numb">6</span> <span>References</span> </div> </a> <ul id="toc-References-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Further_reading" class="vector-toc-list-item vector-toc-level-1"> <a class="vector-toc-link" href="#Further_reading"> <div class="vector-toc-text"> <span class="vector-toc-numb">7</span> <span>Further reading</span> </div> </a> <button aria-controls="toc-Further_reading-sublist" class="cdx-button cdx-button--weight-quiet cdx-button--icon-only vector-toc-toggle"> <span class="vector-icon mw-ui-icon-wikimedia-expand"></span> <span>Toggle Further reading subsection</span> </button> <ul id="toc-Further_reading-sublist" class="vector-toc-list"> <li id="toc-General_information" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#General_information"> <div class="vector-toc-text"> <span class="vector-toc-numb">7.1</span> <span>General information</span> </div> </a> <ul id="toc-General_information-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Historical_information" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Historical_information"> <div class="vector-toc-text"> <span class="vector-toc-numb">7.2</span> <span>Historical information</span> </div> </a> <ul id="toc-Historical_information-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Legal_resources" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Legal_resources"> <div class="vector-toc-text"> <span class="vector-toc-numb">7.3</span> <span>Legal resources</span> </div> </a> <ul id="toc-Legal_resources-sublist" class="vector-toc-list"> </ul> </li> </ul> </li> <li id="toc-External_links" class="vector-toc-list-item vector-toc-level-1"> <a class="vector-toc-link" href="#External_links"> <div class="vector-toc-text"> <span class="vector-toc-numb">8</span> <span>External links</span> </div> </a> <ul id="toc-External_links-sublist" class="vector-toc-list"> </ul> </li> </ul> </div> </div> </nav> </div> </div> <div class="mw-content-container"> <main id="content" class="mw-body"> <header class="mw-body-header vector-page-titlebar"> <nav aria-label="Contents" class="vector-toc-landmark"> <div id="vector-page-titlebar-toc" class="vector-dropdown vector-page-titlebar-toc vector-button-flush-left" > <input type="checkbox" id="vector-page-titlebar-toc-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-page-titlebar-toc" class="vector-dropdown-checkbox " aria-label="Toggle the table of contents" > <label id="vector-page-titlebar-toc-label" for="vector-page-titlebar-toc-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only " aria-hidden="true" ><span class="vector-icon mw-ui-icon-listBullet mw-ui-icon-wikimedia-listBullet"></span> <span class="vector-dropdown-label-text">Toggle the table of contents</span> </label> <div class="vector-dropdown-content"> <div id="vector-page-titlebar-toc-unpinned-container" class="vector-unpinned-container"> </div> </div> </div> </nav> <h1 id="firstHeading" class="firstHeading mw-first-heading"><span class="mw-page-title-main">Surveillance</span></h1> <div id="p-lang-btn" class="vector-dropdown mw-portlet mw-portlet-lang" > <input type="checkbox" id="p-lang-btn-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-p-lang-btn" class="vector-dropdown-checkbox mw-interlanguage-selector" aria-label="Go to an article in another language. Available in 40 languages" > <label id="p-lang-btn-label" for="p-lang-btn-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--action-progressive mw-portlet-lang-heading-40" aria-hidden="true" ><span class="vector-icon mw-ui-icon-language-progressive mw-ui-icon-wikimedia-language-progressive"></span> <span class="vector-dropdown-label-text">40 languages</span> </label> <div class="vector-dropdown-content"> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li class="interlanguage-link interwiki-af mw-list-item"><a href="https://af.wikipedia.org/wiki/Waarneming" title="Waarneming – Afrikaans" lang="af" hreflang="af" data-title="Waarneming" data-language-autonym="Afrikaans" data-language-local-name="Afrikaans" class="interlanguage-link-target"><span>Afrikaans</span></a></li><li class="interlanguage-link interwiki-ar mw-list-item"><a href="https://ar.wikipedia.org/wiki/%D9%85%D8%B1%D8%A7%D9%82%D8%A8%D8%A9" title="مراقبة – Arabic" lang="ar" hreflang="ar" data-title="مراقبة" data-language-autonym="العربية" data-language-local-name="Arabic" class="interlanguage-link-target"><span>العربية</span></a></li><li class="interlanguage-link interwiki-az mw-list-item"><a href="https://az.wikipedia.org/wiki/N%C9%99zar%C9%99t" title="Nəzarət – Azerbaijani" lang="az" hreflang="az" data-title="Nəzarət" data-language-autonym="Azərbaycanca" data-language-local-name="Azerbaijani" class="interlanguage-link-target"><span>Azərbaycanca</span></a></li><li class="interlanguage-link interwiki-ca mw-list-item"><a href="https://ca.wikipedia.org/wiki/Vigil%C3%A0ncia" title="Vigilància – Catalan" lang="ca" hreflang="ca" data-title="Vigilància" data-language-autonym="Català" data-language-local-name="Catalan" class="interlanguage-link-target"><span>Català</span></a></li><li class="interlanguage-link interwiki-cs mw-list-item"><a href="https://cs.wikipedia.org/wiki/Sledov%C3%A1n%C3%AD" title="Sledování – Czech" lang="cs" hreflang="cs" data-title="Sledování" data-language-autonym="Čeština" data-language-local-name="Czech" class="interlanguage-link-target"><span>Čeština</span></a></li><li class="interlanguage-link interwiki-da mw-list-item"><a href="https://da.wikipedia.org/wiki/Overv%C3%A5gning" title="Overvågning – Danish" lang="da" hreflang="da" data-title="Overvågning" data-language-autonym="Dansk" data-language-local-name="Danish" class="interlanguage-link-target"><span>Dansk</span></a></li><li class="interlanguage-link interwiki-de mw-list-item"><a href="https://de.wikipedia.org/wiki/%C3%9Cberwachung" title="Überwachung – German" lang="de" hreflang="de" data-title="Überwachung" data-language-autonym="Deutsch" data-language-local-name="German" class="interlanguage-link-target"><span>Deutsch</span></a></li><li class="interlanguage-link interwiki-et mw-list-item"><a href="https://et.wikipedia.org/wiki/Varjatud_j%C3%A4lgimine" title="Varjatud jälgimine – Estonian" lang="et" hreflang="et" data-title="Varjatud jälgimine" data-language-autonym="Eesti" data-language-local-name="Estonian" class="interlanguage-link-target"><span>Eesti</span></a></li><li class="interlanguage-link interwiki-es mw-list-item"><a href="https://es.wikipedia.org/wiki/Vigilancia" title="Vigilancia – Spanish" lang="es" hreflang="es" data-title="Vigilancia" data-language-autonym="Español" data-language-local-name="Spanish" class="interlanguage-link-target"><span>Español</span></a></li><li class="interlanguage-link interwiki-eo mw-list-item"><a href="https://eo.wikipedia.org/wiki/Gvatado" title="Gvatado – Esperanto" lang="eo" hreflang="eo" data-title="Gvatado" data-language-autonym="Esperanto" data-language-local-name="Esperanto" class="interlanguage-link-target"><span>Esperanto</span></a></li><li class="interlanguage-link interwiki-eu mw-list-item"><a href="https://eu.wikipedia.org/wiki/Jagoletza" title="Jagoletza – Basque" lang="eu" hreflang="eu" data-title="Jagoletza" data-language-autonym="Euskara" data-language-local-name="Basque" class="interlanguage-link-target"><span>Euskara</span></a></li><li class="interlanguage-link interwiki-fa mw-list-item"><a href="https://fa.wikipedia.org/wiki/%D9%86%D8%B8%D8%A7%D8%B1%D8%AA" title="نظارت – Persian" lang="fa" hreflang="fa" data-title="نظارت" data-language-autonym="فارسی" data-language-local-name="Persian" class="interlanguage-link-target"><span>فارسی</span></a></li><li class="interlanguage-link interwiki-fr mw-list-item"><a href="https://fr.wikipedia.org/wiki/Surveillance" title="Surveillance – French" lang="fr" hreflang="fr" data-title="Surveillance" data-language-autonym="Français" data-language-local-name="French" class="interlanguage-link-target"><span>Français</span></a></li><li class="interlanguage-link interwiki-ko mw-list-item"><a href="https://ko.wikipedia.org/wiki/%EA%B0%90%EC%8B%9C" title="감시 – Korean" lang="ko" hreflang="ko" data-title="감시" data-language-autonym="한국어" data-language-local-name="Korean" class="interlanguage-link-target"><span>한국어</span></a></li><li class="interlanguage-link interwiki-id mw-list-item"><a href="https://id.wikipedia.org/wiki/Pengawasan" title="Pengawasan – Indonesian" lang="id" hreflang="id" data-title="Pengawasan" data-language-autonym="Bahasa Indonesia" data-language-local-name="Indonesian" class="interlanguage-link-target"><span>Bahasa Indonesia</span></a></li><li class="interlanguage-link interwiki-zu mw-list-item"><a href="https://zu.wikipedia.org/wiki/Indlozabukhoma" title="Indlozabukhoma – Zulu" lang="zu" hreflang="zu" data-title="Indlozabukhoma" data-language-autonym="IsiZulu" data-language-local-name="Zulu" class="interlanguage-link-target"><span>IsiZulu</span></a></li><li class="interlanguage-link interwiki-he mw-list-item"><a href="https://he.wikipedia.org/wiki/%D7%9E%D7%A2%D7%A7%D7%91_%D7%A1%D7%9E%D7%95%D7%99" title="מעקב סמוי – Hebrew" lang="he" hreflang="he" data-title="מעקב סמוי" data-language-autonym="עברית" data-language-local-name="Hebrew" class="interlanguage-link-target"><span>עברית</span></a></li><li class="interlanguage-link interwiki-ms mw-list-item"><a href="https://ms.wikipedia.org/wiki/Pengawasan" title="Pengawasan – Malay" lang="ms" hreflang="ms" data-title="Pengawasan" data-language-autonym="Bahasa Melayu" data-language-local-name="Malay" class="interlanguage-link-target"><span>Bahasa Melayu</span></a></li><li class="interlanguage-link interwiki-nl mw-list-item"><a href="https://nl.wikipedia.org/wiki/Surveillance" title="Surveillance – Dutch" lang="nl" hreflang="nl" data-title="Surveillance" data-language-autonym="Nederlands" data-language-local-name="Dutch" class="interlanguage-link-target"><span>Nederlands</span></a></li><li class="interlanguage-link interwiki-ja mw-list-item"><a href="https://ja.wikipedia.org/wiki/%E3%82%B5%E3%83%BC%E3%83%99%E3%82%A4%E3%83%A9%E3%83%B3%E3%82%B9" title="サーベイランス – Japanese" lang="ja" hreflang="ja" data-title="サーベイランス" data-language-autonym="日本語" data-language-local-name="Japanese" class="interlanguage-link-target"><span>日本語</span></a></li><li class="interlanguage-link interwiki-no mw-list-item"><a href="https://no.wikipedia.org/wiki/Overv%C3%A5kning" title="Overvåkning – Norwegian Bokmål" lang="nb" hreflang="nb" data-title="Overvåkning" data-language-autonym="Norsk bokmål" data-language-local-name="Norwegian Bokmål" class="interlanguage-link-target"><span>Norsk bokmål</span></a></li><li class="interlanguage-link interwiki-nn mw-list-item"><a href="https://nn.wikipedia.org/wiki/Overvaking" title="Overvaking – Norwegian Nynorsk" lang="nn" hreflang="nn" data-title="Overvaking" data-language-autonym="Norsk nynorsk" data-language-local-name="Norwegian Nynorsk" class="interlanguage-link-target"><span>Norsk nynorsk</span></a></li><li class="interlanguage-link interwiki-pnb mw-list-item"><a href="https://pnb.wikipedia.org/wiki/%D9%86%DA%AF%DB%81%D8%AF%D8%A7%D8%B1%DB%8C" title="نگہداری – Western Punjabi" lang="pnb" hreflang="pnb" data-title="نگہداری" data-language-autonym="پنجابی" data-language-local-name="Western Punjabi" class="interlanguage-link-target"><span>پنجابی</span></a></li><li class="interlanguage-link interwiki-ps mw-list-item"><a href="https://ps.wikipedia.org/wiki/%DA%85%D8%A7%D8%B1%D9%86%D9%87" title="څارنه – Pashto" lang="ps" hreflang="ps" data-title="څارنه" data-language-autonym="پښتو" data-language-local-name="Pashto" class="interlanguage-link-target"><span>پښتو</span></a></li><li class="interlanguage-link interwiki-pl mw-list-item"><a href="https://pl.wikipedia.org/wiki/Inwigilacja" title="Inwigilacja – Polish" lang="pl" hreflang="pl" data-title="Inwigilacja" data-language-autonym="Polski" data-language-local-name="Polish" class="interlanguage-link-target"><span>Polski</span></a></li><li class="interlanguage-link interwiki-pt mw-list-item"><a href="https://pt.wikipedia.org/wiki/Vigil%C3%A2ncia" title="Vigilância – Portuguese" lang="pt" hreflang="pt" data-title="Vigilância" data-language-autonym="Português" data-language-local-name="Portuguese" class="interlanguage-link-target"><span>Português</span></a></li><li class="interlanguage-link interwiki-ro mw-list-item"><a href="https://ro.wikipedia.org/wiki/Supraveghere" title="Supraveghere – Romanian" lang="ro" hreflang="ro" data-title="Supraveghere" data-language-autonym="Română" data-language-local-name="Romanian" class="interlanguage-link-target"><span>Română</span></a></li><li class="interlanguage-link interwiki-ru mw-list-item"><a href="https://ru.wikipedia.org/wiki/%D0%9D%D0%B5%D0%B3%D0%BB%D0%B0%D1%81%D0%BD%D0%BE%D0%B5_%D0%BD%D0%B0%D0%B1%D0%BB%D1%8E%D0%B4%D0%B5%D0%BD%D0%B8%D0%B5" title="Негласное наблюдение – Russian" lang="ru" hreflang="ru" data-title="Негласное наблюдение" data-language-autonym="Русский" data-language-local-name="Russian" class="interlanguage-link-target"><span>Русский</span></a></li><li class="interlanguage-link interwiki-sq mw-list-item"><a href="https://sq.wikipedia.org/wiki/V%C3%ABzhgimi" title="Vëzhgimi – Albanian" lang="sq" hreflang="sq" data-title="Vëzhgimi" data-language-autonym="Shqip" data-language-local-name="Albanian" class="interlanguage-link-target"><span>Shqip</span></a></li><li class="interlanguage-link interwiki-simple mw-list-item"><a href="https://simple.wikipedia.org/wiki/Surveillance" title="Surveillance – Simple English" lang="en-simple" hreflang="en-simple" data-title="Surveillance" data-language-autonym="Simple English" data-language-local-name="Simple English" class="interlanguage-link-target"><span>Simple English</span></a></li><li class="interlanguage-link interwiki-sl mw-list-item"><a href="https://sl.wikipedia.org/wiki/Nadzor" title="Nadzor – Slovenian" lang="sl" hreflang="sl" data-title="Nadzor" data-language-autonym="Slovenščina" data-language-local-name="Slovenian" class="interlanguage-link-target"><span>Slovenščina</span></a></li><li class="interlanguage-link interwiki-sr mw-list-item"><a href="https://sr.wikipedia.org/wiki/Nadzor" title="Nadzor – Serbian" lang="sr" hreflang="sr" data-title="Nadzor" data-language-autonym="Српски / srpski" data-language-local-name="Serbian" class="interlanguage-link-target"><span>Српски / srpski</span></a></li><li class="interlanguage-link interwiki-fi mw-list-item"><a href="https://fi.wikipedia.org/wiki/Valvonta" title="Valvonta – Finnish" lang="fi" hreflang="fi" data-title="Valvonta" data-language-autonym="Suomi" data-language-local-name="Finnish" class="interlanguage-link-target"><span>Suomi</span></a></li><li class="interlanguage-link interwiki-sv mw-list-item"><a href="https://sv.wikipedia.org/wiki/%C3%96vervakning" title="Övervakning – Swedish" lang="sv" hreflang="sv" data-title="Övervakning" data-language-autonym="Svenska" data-language-local-name="Swedish" class="interlanguage-link-target"><span>Svenska</span></a></li><li class="interlanguage-link interwiki-tt mw-list-item"><a href="https://tt.wikipedia.org/wiki/%D0%9A%D2%AF%D0%B7%D3%99%D1%82%D2%AF" title="Күзәтү – Tatar" lang="tt" hreflang="tt" data-title="Күзәтү" data-language-autonym="Татарча / tatarça" data-language-local-name="Tatar" class="interlanguage-link-target"><span>Татарча / tatarça</span></a></li><li class="interlanguage-link interwiki-tr mw-list-item"><a href="https://tr.wikipedia.org/wiki/G%C3%B6zetim" title="Gözetim – Turkish" lang="tr" hreflang="tr" data-title="Gözetim" data-language-autonym="Türkçe" data-language-local-name="Turkish" class="interlanguage-link-target"><span>Türkçe</span></a></li><li class="interlanguage-link interwiki-uk mw-list-item"><a href="https://uk.wikipedia.org/wiki/%D0%A1%D0%BF%D0%BE%D1%81%D1%82%D0%B5%D1%80%D0%B5%D0%B6%D0%B5%D0%BD%D0%BD%D1%8F_(%D0%BD%D0%B5%D0%B3%D0%BB%D0%B0%D1%81%D0%BD%D0%B5)" title="Спостереження (негласне) – Ukrainian" lang="uk" hreflang="uk" data-title="Спостереження (негласне)" data-language-autonym="Українська" data-language-local-name="Ukrainian" class="interlanguage-link-target"><span>Українська</span></a></li><li class="interlanguage-link interwiki-ur mw-list-item"><a href="https://ur.wikipedia.org/wiki/%D9%86%DA%AF%DB%81%D8%AF%D8%A7%D8%B1%DB%8C" title="نگہداری – Urdu" lang="ur" hreflang="ur" data-title="نگہداری" data-language-autonym="اردو" data-language-local-name="Urdu" class="interlanguage-link-target"><span>اردو</span></a></li><li class="interlanguage-link interwiki-vi mw-list-item"><a href="https://vi.wikipedia.org/wiki/Gi%C3%A1m_s%C3%A1t" title="Giám sát – Vietnamese" lang="vi" hreflang="vi" data-title="Giám sát" data-language-autonym="Tiếng Việt" data-language-local-name="Vietnamese" class="interlanguage-link-target"><span>Tiếng Việt</span></a></li><li class="interlanguage-link interwiki-zh mw-list-item"><a href="https://zh.wikipedia.org/wiki/%E7%9B%A3%E8%A6%96" title="監視 – Chinese" lang="zh" hreflang="zh" data-title="監視" data-language-autonym="中文" data-language-local-name="Chinese" class="interlanguage-link-target"><span>中文</span></a></li> </ul> <div class="after-portlet after-portlet-lang"><span class="wb-langlinks-edit wb-langlinks-link"><a href="https://www.wikidata.org/wiki/Special:EntityPage/Q334401#sitelinks-wikipedia" title="Edit interlanguage links" class="wbc-editpage">Edit links</a></span></div> </div> </div> </div> </header> <div class="vector-page-toolbar"> <div class="vector-page-toolbar-container"> <div id="left-navigation"> <nav aria-label="Namespaces"> <div id="p-associated-pages" class="vector-menu vector-menu-tabs mw-portlet mw-portlet-associated-pages" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="ca-nstab-main" class="selected vector-tab-noicon mw-list-item"><a href="/wiki/Surveillance" title="View the content page [c]" accesskey="c"><span>Article</span></a></li><li id="ca-talk" class="vector-tab-noicon mw-list-item"><a href="/wiki/Talk:Surveillance" rel="discussion" title="Discuss improvements to the content page [t]" accesskey="t"><span>Talk</span></a></li> </ul> </div> </div> <div id="vector-variants-dropdown" class="vector-dropdown emptyPortlet" > <input type="checkbox" id="vector-variants-dropdown-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-variants-dropdown" class="vector-dropdown-checkbox " aria-label="Change language variant" > <label id="vector-variants-dropdown-label" for="vector-variants-dropdown-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet" aria-hidden="true" ><span class="vector-dropdown-label-text">English</span> </label> <div class="vector-dropdown-content"> <div id="p-variants" class="vector-menu mw-portlet mw-portlet-variants emptyPortlet" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> </ul> </div> </div> </div> </div> </nav> </div> <div id="right-navigation" class="vector-collapsible"> <nav aria-label="Views"> <div id="p-views" class="vector-menu vector-menu-tabs mw-portlet mw-portlet-views" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="ca-view" class="selected vector-tab-noicon mw-list-item"><a href="/wiki/Surveillance"><span>Read</span></a></li><li id="ca-edit" class="vector-tab-noicon mw-list-item"><a href="/w/index.php?title=Surveillance&amp;action=edit" title="Edit this page [e]" accesskey="e"><span>Edit</span></a></li><li id="ca-history" class="vector-tab-noicon mw-list-item"><a href="/w/index.php?title=Surveillance&amp;action=history" title="Past revisions of this page [h]" accesskey="h"><span>View history</span></a></li> </ul> </div> </div> </nav> <nav class="vector-page-tools-landmark" aria-label="Page tools"> <div id="vector-page-tools-dropdown" class="vector-dropdown vector-page-tools-dropdown" > <input type="checkbox" id="vector-page-tools-dropdown-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-page-tools-dropdown" class="vector-dropdown-checkbox " aria-label="Tools" > <label id="vector-page-tools-dropdown-label" for="vector-page-tools-dropdown-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet" aria-hidden="true" ><span class="vector-dropdown-label-text">Tools</span> </label> <div class="vector-dropdown-content"> <div id="vector-page-tools-unpinned-container" class="vector-unpinned-container"> <div id="vector-page-tools" class="vector-page-tools vector-pinnable-element"> <div class="vector-pinnable-header vector-page-tools-pinnable-header vector-pinnable-header-unpinned" data-feature-name="page-tools-pinned" data-pinnable-element-id="vector-page-tools" data-pinned-container-id="vector-page-tools-pinned-container" data-unpinned-container-id="vector-page-tools-unpinned-container" > <div class="vector-pinnable-header-label">Tools</div> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-pin-button" data-event-name="pinnable-header.vector-page-tools.pin">move to sidebar</button> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-unpin-button" data-event-name="pinnable-header.vector-page-tools.unpin">hide</button> </div> <div id="p-cactions" class="vector-menu mw-portlet mw-portlet-cactions emptyPortlet vector-has-collapsible-items" title="More options" > <div class="vector-menu-heading"> Actions </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="ca-more-view" class="selected vector-more-collapsible-item mw-list-item"><a href="/wiki/Surveillance"><span>Read</span></a></li><li id="ca-more-edit" class="vector-more-collapsible-item mw-list-item"><a href="/w/index.php?title=Surveillance&amp;action=edit" title="Edit this page [e]" accesskey="e"><span>Edit</span></a></li><li id="ca-more-history" class="vector-more-collapsible-item mw-list-item"><a href="/w/index.php?title=Surveillance&amp;action=history"><span>View history</span></a></li> </ul> </div> </div> <div id="p-tb" class="vector-menu mw-portlet mw-portlet-tb" > <div class="vector-menu-heading"> General </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="t-whatlinkshere" class="mw-list-item"><a href="/wiki/Special:WhatLinksHere/Surveillance" title="List of all English Wikipedia pages containing links to this page [j]" accesskey="j"><span>What links here</span></a></li><li id="t-recentchangeslinked" class="mw-list-item"><a href="/wiki/Special:RecentChangesLinked/Surveillance" rel="nofollow" title="Recent changes in pages linked from this page [k]" accesskey="k"><span>Related changes</span></a></li><li id="t-upload" class="mw-list-item"><a href="/wiki/Wikipedia:File_Upload_Wizard" title="Upload files [u]" accesskey="u"><span>Upload file</span></a></li><li id="t-specialpages" class="mw-list-item"><a href="/wiki/Special:SpecialPages" title="A list of all special pages [q]" accesskey="q"><span>Special pages</span></a></li><li id="t-permalink" class="mw-list-item"><a href="/w/index.php?title=Surveillance&amp;oldid=1258775741" title="Permanent link to this revision of this page"><span>Permanent link</span></a></li><li id="t-info" class="mw-list-item"><a href="/w/index.php?title=Surveillance&amp;action=info" title="More information about this page"><span>Page information</span></a></li><li id="t-cite" class="mw-list-item"><a href="/w/index.php?title=Special:CiteThisPage&amp;page=Surveillance&amp;id=1258775741&amp;wpFormIdentifier=titleform" title="Information on how to cite this page"><span>Cite this page</span></a></li><li id="t-urlshortener" class="mw-list-item"><a href="/w/index.php?title=Special:UrlShortener&amp;url=https%3A%2F%2Fen.wikipedia.org%2Fwiki%2FSurveillance"><span>Get shortened URL</span></a></li><li id="t-urlshortener-qrcode" class="mw-list-item"><a href="/w/index.php?title=Special:QrCode&amp;url=https%3A%2F%2Fen.wikipedia.org%2Fwiki%2FSurveillance"><span>Download QR code</span></a></li> </ul> </div> </div> <div id="p-coll-print_export" class="vector-menu mw-portlet mw-portlet-coll-print_export" > <div class="vector-menu-heading"> Print/export </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="coll-download-as-rl" class="mw-list-item"><a href="/w/index.php?title=Special:DownloadAsPdf&amp;page=Surveillance&amp;action=show-download-screen" title="Download this page as a PDF file"><span>Download as PDF</span></a></li><li id="t-print" class="mw-list-item"><a href="/w/index.php?title=Surveillance&amp;printable=yes" title="Printable version of this page [p]" accesskey="p"><span>Printable version</span></a></li> </ul> </div> </div> <div id="p-wikibase-otherprojects" class="vector-menu mw-portlet mw-portlet-wikibase-otherprojects" > <div class="vector-menu-heading"> In other projects </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li class="wb-otherproject-link wb-otherproject-commons mw-list-item"><a href="https://commons.wikimedia.org/wiki/Category:Surveillance" hreflang="en"><span>Wikimedia Commons</span></a></li><li class="wb-otherproject-link wb-otherproject-wikiquote mw-list-item"><a href="https://en.wikiquote.org/wiki/Surveillance" hreflang="en"><span>Wikiquote</span></a></li><li id="t-wikibase" class="wb-otherproject-link wb-otherproject-wikibase-dataitem mw-list-item"><a href="https://www.wikidata.org/wiki/Special:EntityPage/Q334401" title="Structured data on this page hosted by Wikidata [g]" accesskey="g"><span>Wikidata item</span></a></li> </ul> </div> </div> </div> </div> </div> </div> </nav> </div> </div> </div> <div class="vector-column-end"> <div class="vector-sticky-pinned-container"> <nav class="vector-page-tools-landmark" aria-label="Page tools"> <div id="vector-page-tools-pinned-container" class="vector-pinned-container"> </div> </nav> <nav class="vector-appearance-landmark" aria-label="Appearance"> <div id="vector-appearance-pinned-container" class="vector-pinned-container"> <div id="vector-appearance" class="vector-appearance vector-pinnable-element"> <div class="vector-pinnable-header vector-appearance-pinnable-header vector-pinnable-header-pinned" data-feature-name="appearance-pinned" data-pinnable-element-id="vector-appearance" data-pinned-container-id="vector-appearance-pinned-container" data-unpinned-container-id="vector-appearance-unpinned-container" > <div class="vector-pinnable-header-label">Appearance</div> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-pin-button" data-event-name="pinnable-header.vector-appearance.pin">move to sidebar</button> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-unpin-button" data-event-name="pinnable-header.vector-appearance.unpin">hide</button> </div> </div> </div> </nav> </div> </div> <div id="bodyContent" class="vector-body" aria-labelledby="firstHeading" data-mw-ve-target-container> <div class="vector-body-before-content"> <div class="mw-indicators"> </div> <div id="siteSub" class="noprint">From Wikipedia, the free encyclopedia</div> </div> <div id="contentSub"><div id="mw-content-subtitle"></div></div> <div id="mw-content-text" class="mw-body-content"><div class="mw-content-ltr mw-parser-output" lang="en" dir="ltr"><div class="shortdescription nomobile noexcerpt noprint searchaux" style="display:none">Monitoring something for the purposes of influencing, protecting, or suppressing it</div> <style data-mw-deduplicate="TemplateStyles:r1236090951">.mw-parser-output .hatnote{font-style:italic}.mw-parser-output div.hatnote{padding-left:1.6em;margin-bottom:0.5em}.mw-parser-output .hatnote i{font-style:normal}.mw-parser-output .hatnote+link+.hatnote{margin-top:-0.5em}@media print{body.ns-0 .mw-parser-output .hatnote{display:none!important}}</style><div role="note" class="hatnote navigation-not-searchable">This article is about surveillance in security. Not to be confused with <a href="/wiki/Health_surveillance" title="Health surveillance">Health surveillance</a>.</div> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236090951"><div role="note" class="hatnote navigation-not-searchable">"Electronic surveillance" redirects here. Not to be confused with <a href="/wiki/Computer_and_network_surveillance" title="Computer and network surveillance">Computer and network surveillance</a>.</div> <p class="mw-empty-elt"> </p> <style data-mw-deduplicate="TemplateStyles:r1251242444">.mw-parser-output .ambox{border:1px solid #a2a9b1;border-left:10px solid #36c;background-color:#fbfbfb;box-sizing:border-box}.mw-parser-output .ambox+link+.ambox,.mw-parser-output .ambox+link+style+.ambox,.mw-parser-output .ambox+link+link+.ambox,.mw-parser-output .ambox+.mw-empty-elt+link+.ambox,.mw-parser-output .ambox+.mw-empty-elt+link+style+.ambox,.mw-parser-output .ambox+.mw-empty-elt+link+link+.ambox{margin-top:-1px}html body.mediawiki .mw-parser-output .ambox.mbox-small-left{margin:4px 1em 4px 0;overflow:hidden;width:238px;border-collapse:collapse;font-size:88%;line-height:1.25em}.mw-parser-output .ambox-speedy{border-left:10px solid #b32424;background-color:#fee7e6}.mw-parser-output .ambox-delete{border-left:10px solid #b32424}.mw-parser-output .ambox-content{border-left:10px solid #f28500}.mw-parser-output .ambox-style{border-left:10px solid #fc3}.mw-parser-output .ambox-move{border-left:10px solid #9932cc}.mw-parser-output .ambox-protection{border-left:10px solid #a2a9b1}.mw-parser-output .ambox .mbox-text{border:none;padding:0.25em 0.5em;width:100%}.mw-parser-output .ambox .mbox-image{border:none;padding:2px 0 2px 0.5em;text-align:center}.mw-parser-output .ambox .mbox-imageright{border:none;padding:2px 0.5em 2px 0;text-align:center}.mw-parser-output .ambox .mbox-empty-cell{border:none;padding:0;width:1px}.mw-parser-output .ambox .mbox-image-div{width:52px}@media(min-width:720px){.mw-parser-output .ambox{margin:0 10%}}@media print{body.ns-0 .mw-parser-output .ambox{display:none!important}}</style><table class="box-Recentism plainlinks metadata ambox ambox-style ambox-Recentism" role="presentation"><tbody><tr><td class="mbox-image"><div class="mbox-image-div"><span typeof="mw:File"><span><img alt="" src="//upload.wikimedia.org/wikipedia/commons/thumb/0/0a/Ambox_clock_yellow.svg/40px-Ambox_clock_yellow.svg.png" decoding="async" width="40" height="40" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/0/0a/Ambox_clock_yellow.svg/60px-Ambox_clock_yellow.svg.png 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/0/0a/Ambox_clock_yellow.svg/80px-Ambox_clock_yellow.svg.png 2x" data-file-width="620" data-file-height="620" /></span></span></div></td><td class="mbox-text"><div class="mbox-text-span">This article <b>appears to be <a href="/wiki/Wikipedia:Recentism" title="Wikipedia:Recentism">slanted towards recent events</a>.</b><span class="hide-when-compact"> Please try to keep recent events in historical perspective and <a class="external text" href="https://en.wikipedia.org/w/index.php?title=Surveillance&amp;action=edit">add more content</a> related to non-recent events.</span> <span class="date-container"><i>(<span class="date">June 2024</span>)</i></span></div></td></tr></tbody></table> <figure class="mw-default-size" typeof="mw:File/Thumb"><a href="/wiki/File:Surveillance_video_cameras,_Gdynia.jpeg" class="mw-file-description"><img src="//upload.wikimedia.org/wikipedia/commons/thumb/3/30/Surveillance_video_cameras%2C_Gdynia.jpeg/220px-Surveillance_video_cameras%2C_Gdynia.jpeg" decoding="async" width="220" height="165" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/3/30/Surveillance_video_cameras%2C_Gdynia.jpeg/330px-Surveillance_video_cameras%2C_Gdynia.jpeg 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/3/30/Surveillance_video_cameras%2C_Gdynia.jpeg/440px-Surveillance_video_cameras%2C_Gdynia.jpeg 2x" data-file-width="1280" data-file-height="960" /></a><figcaption>Surveillance cameras</figcaption></figure> <figure class="mw-default-size" typeof="mw:File/Thumb"><a href="/wiki/File:Surveillance_Camera_At_Connecticut_Avenue,_NW_%26_Nebraska_Avenue,_NW_(Washington,_DC)_(349115665).jpg" class="mw-file-description"><img src="//upload.wikimedia.org/wikipedia/commons/thumb/1/1b/Surveillance_Camera_At_Connecticut_Avenue%2C_NW_%26_Nebraska_Avenue%2C_NW_%28Washington%2C_DC%29_%28349115665%29.jpg/220px-Surveillance_Camera_At_Connecticut_Avenue%2C_NW_%26_Nebraska_Avenue%2C_NW_%28Washington%2C_DC%29_%28349115665%29.jpg" decoding="async" width="220" height="367" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/1/1b/Surveillance_Camera_At_Connecticut_Avenue%2C_NW_%26_Nebraska_Avenue%2C_NW_%28Washington%2C_DC%29_%28349115665%29.jpg/330px-Surveillance_Camera_At_Connecticut_Avenue%2C_NW_%26_Nebraska_Avenue%2C_NW_%28Washington%2C_DC%29_%28349115665%29.jpg 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/1/1b/Surveillance_Camera_At_Connecticut_Avenue%2C_NW_%26_Nebraska_Avenue%2C_NW_%28Washington%2C_DC%29_%28349115665%29.jpg/440px-Surveillance_Camera_At_Connecticut_Avenue%2C_NW_%26_Nebraska_Avenue%2C_NW_%28Washington%2C_DC%29_%28349115665%29.jpg 2x" data-file-width="959" data-file-height="1600" /></a><figcaption>Surveillance Camera to support the Washington, DC Police</figcaption></figure> <p><b>Surveillance</b> is the monitoring of behavior, many activities, or information for the purpose of information gathering, influencing, <a href="/wiki/Managing" class="mw-redirect" title="Managing">managing</a>, or directing.<sup id="cite_ref-1" class="reference"><a href="#cite_note-1"><span class="cite-bracket">&#91;</span>1<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-2" class="reference"><a href="#cite_note-2"><span class="cite-bracket">&#91;</span>2<span class="cite-bracket">&#93;</span></a></sup> This can include observation from a distance by means of electronic equipment, such as <a href="/wiki/Closed-circuit_television" title="Closed-circuit television">closed-circuit television</a> (CCTV), or interception of electronically transmitted information like <a href="/wiki/Internet_traffic" title="Internet traffic">Internet traffic</a>. Increasingly, <a href="/wiki/Government" title="Government">governments</a> may also obtain <a href="/wiki/Customer_data" title="Customer data">consumer data</a> through the purchase of online information, effectively expanding surveillance capabilities through commercially available digital records.<sup id="cite_ref-3" class="reference"><a href="#cite_note-3"><span class="cite-bracket">&#91;</span>3<span class="cite-bracket">&#93;</span></a></sup> It can also include simple technical methods, such as <a href="/wiki/Human_intelligence_(intelligence_gathering)" title="Human intelligence (intelligence gathering)">human intelligence gathering</a> and <a href="/wiki/Postal_interception" title="Postal interception">postal interception</a>. </p><p>Surveillance is used by citizens, for instance for protecting their neighborhoods. It is widely used by <a href="/wiki/Government" title="Government">governments</a> for intelligence gathering, including espionage, prevention of crime, the protection of a process, person, group or object, or the investigation of crime. It is also used by criminal organizations to plan and commit crimes, and by businesses to <a href="/wiki/Industrial_espionage" title="Industrial espionage">gather intelligence</a> on criminals, their competitors, suppliers or customers. <a href="/wiki/Religious" class="mw-redirect" title="Religious">Religious</a> organizations charged with detecting <a href="/wiki/Heresy" title="Heresy">heresy</a> and <a href="/wiki/Heterodoxy" title="Heterodoxy">heterodoxy</a> may also carry out surveillance.<sup id="cite_ref-4" class="reference"><a href="#cite_note-4"><span class="cite-bracket">&#91;</span>4<span class="cite-bracket">&#93;</span></a></sup> <a href="/wiki/Auditor" title="Auditor">Auditors</a> carry out a form of surveillance.<sup id="cite_ref-5" class="reference"><a href="#cite_note-5"><span class="cite-bracket">&#91;</span>5<span class="cite-bracket">&#93;</span></a></sup> </p><p>A byproduct of surveillance is that it can unjustifiably violate people's <a href="/wiki/Privacy" title="Privacy">privacy</a> and is often criticized by <a href="/wiki/Civil_liberties" title="Civil liberties">civil liberties</a> activists.<sup id="cite_ref-6" class="reference"><a href="#cite_note-6"><span class="cite-bracket">&#91;</span>6<span class="cite-bracket">&#93;</span></a></sup> <a href="/wiki/Democracies" class="mw-redirect" title="Democracies">Democracies</a> may have laws that seek to restrict governmental and private use of surveillance, whereas <a href="/wiki/Authoritarian" class="mw-redirect" title="Authoritarian">authoritarian</a> governments seldom have any domestic restrictions. </p><p><a href="/wiki/Espionage" title="Espionage">Espionage</a> is by definition covert and typically illegal according to the rules of the observed party, whereas most types of surveillance are overt and are considered legal or legitimate by state authorities. International <a href="/wiki/Espionage" title="Espionage">espionage</a> seems to be common among all types of countries.<sup id="cite_ref-7" class="reference"><a href="#cite_note-7"><span class="cite-bracket">&#91;</span>7<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-8" class="reference"><a href="#cite_note-8"><span class="cite-bracket">&#91;</span>8<span class="cite-bracket">&#93;</span></a></sup> </p> <meta property="mw:PageProp/toc" /> <div class="mw-heading mw-heading2"><h2 id="Methods">Methods</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Surveillance&amp;action=edit&amp;section=1" title="Edit section: Methods"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <div class="mw-heading mw-heading3"><h3 id="Computer">Computer</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Surveillance&amp;action=edit&amp;section=2" title="Edit section: Computer"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <figure class="mw-halign-right" typeof="mw:File/Thumb"><a href="/wiki/File:IAO-logo.png" class="mw-file-description"><img src="//upload.wikimedia.org/wikipedia/commons/thumb/d/d1/IAO-logo.png/200px-IAO-logo.png" decoding="async" width="200" height="203" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/d/d1/IAO-logo.png/300px-IAO-logo.png 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/d/d1/IAO-logo.png/400px-IAO-logo.png 2x" data-file-width="658" data-file-height="669" /></a><figcaption> Official seal of the <a href="/wiki/Information_Awareness_Office" title="Information Awareness Office">Information Awareness Office</a> – a U.S. agency which developed technologies for <a href="/wiki/Mass_surveillance" title="Mass surveillance">mass surveillance</a></figcaption></figure> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236090951"><div role="note" class="hatnote navigation-not-searchable">Main article: <a href="/wiki/Computer_surveillance" class="mw-redirect" title="Computer surveillance">Computer surveillance</a></div> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236090951"><div role="note" class="hatnote navigation-not-searchable">See also: <a href="/wiki/Profiling_(information_science)" title="Profiling (information science)">Profiling (information science)</a></div> <p>The vast majority of computer surveillance involves the monitoring of <a href="/wiki/Data_mining" title="Data mining">data</a> and <a href="/wiki/Traffic_analysis" title="Traffic analysis">traffic</a> on the <a href="/wiki/Internet" title="Internet">Internet</a>.<sup id="cite_ref-sciam-internet_9-0" class="reference"><a href="#cite_note-sciam-internet-9"><span class="cite-bracket">&#91;</span>9<span class="cite-bracket">&#93;</span></a></sup> In the United States for example, under the <a href="/wiki/Communications_Assistance_For_Law_Enforcement_Act" class="mw-redirect" title="Communications Assistance For Law Enforcement Act">Communications Assistance For Law Enforcement Act</a>, all phone calls and broadband Internet traffic (emails, web traffic, instant messaging, etc.) are required to be available for unimpeded real-time monitoring by federal law enforcement agencies.<sup id="cite_ref-eff-calea-archive_10-0" class="reference"><a href="#cite_note-eff-calea-archive-10"><span class="cite-bracket">&#91;</span>10<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-eff-calea-summary_11-0" class="reference"><a href="#cite_note-eff-calea-summary-11"><span class="cite-bracket">&#91;</span>11<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-eff-calea-faq_12-0" class="reference"><a href="#cite_note-eff-calea-faq-12"><span class="cite-bracket">&#91;</span>12<span class="cite-bracket">&#93;</span></a></sup> </p><p>There is far too much data on the Internet for human investigators to manually search through all of it. Therefore, automated Internet surveillance computers sift through the vast amount of intercepted Internet traffic to identify and report to human investigators the traffic that is considered interesting or suspicious. This process is regulated by targeting certain "trigger" words or phrases, visiting certain types of web sites, or communicating via <a href="/wiki/Email" title="Email">email</a> or online chat with suspicious individuals or groups.<sup id="cite_ref-usatoday-chatroom_13-0" class="reference"><a href="#cite_note-usatoday-chatroom-13"><span class="cite-bracket">&#91;</span>13<span class="cite-bracket">&#93;</span></a></sup> Billions of dollars per year are spent by agencies, such as the <a href="/wiki/NSA" class="mw-redirect" title="NSA">NSA</a>, the <a href="/wiki/FBI" class="mw-redirect" title="FBI">FBI</a> and the now-defunct <a href="/wiki/Information_Awareness_Office" title="Information Awareness Office">Information Awareness Office</a>, to develop, purchase, implement, and operate systems such as <a href="/wiki/Carnivore_(FBI)" class="mw-redirect" title="Carnivore (FBI)">Carnivore</a>, <a href="/wiki/Narus_(company)" class="mw-redirect" title="Narus (company)">NarusInsight</a>, and <a href="/wiki/ECHELON" title="ECHELON">ECHELON</a> to intercept and analyze all of this data to extract only the information which is useful to law enforcement and intelligence agencies.<sup id="cite_ref-zdnet-fbi_14-0" class="reference"><a href="#cite_note-zdnet-fbi-14"><span class="cite-bracket">&#91;</span>14<span class="cite-bracket">&#93;</span></a></sup> </p><p>Computers can be a surveillance target because of the personal data stored on them. If someone is able to install software, such as the FBI's <a href="/wiki/Magic_Lantern_(spyware)" title="Magic Lantern (spyware)">Magic Lantern</a> and <a href="/wiki/CIPAV" class="mw-redirect" title="CIPAV">CIPAV</a>, on a computer system, they can easily gain unauthorized access to this data. Such software could be installed physically or remotely.<sup id="cite_ref-teen-busted-in-wired_15-0" class="reference"><a href="#cite_note-teen-busted-in-wired-15"><span class="cite-bracket">&#91;</span>15<span class="cite-bracket">&#93;</span></a></sup> Another form of computer surveillance, known as <a href="/wiki/Van_Eck_phreaking" title="Van Eck phreaking">van Eck phreaking</a>, involves reading electromagnetic emanations from computing devices in order to extract data from them at distances of hundreds of meters.<sup id="cite_ref-emr_16-0" class="reference"><a href="#cite_note-emr-16"><span class="cite-bracket">&#91;</span>16<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-Kuhn2004_17-0" class="reference"><a href="#cite_note-Kuhn2004-17"><span class="cite-bracket">&#91;</span>17<span class="cite-bracket">&#93;</span></a></sup> The NSA runs a database known as "<a href="/wiki/Pinwale" title="Pinwale">Pinwale</a>", which stores and indexes large numbers of emails of both American citizens and foreigners.<sup id="cite_ref-nytimes-email-surveillance_18-0" class="reference"><a href="#cite_note-nytimes-email-surveillance-18"><span class="cite-bracket">&#91;</span>18<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-atlantic-pinwale_19-0" class="reference"><a href="#cite_note-atlantic-pinwale-19"><span class="cite-bracket">&#91;</span>19<span class="cite-bracket">&#93;</span></a></sup> Additionally, the NSA runs a program known as <a href="/wiki/PRISM_(surveillance_program)" class="mw-redirect" title="PRISM (surveillance program)">PRISM</a>, which is a data mining system that gives the United States government direct access to information from <a href="/wiki/Technology_companies" class="mw-redirect" title="Technology companies">technology companies</a>. Through accessing this information, the government is able to obtain search history, emails, stored information, live chats, file transfers, and more. This program generated huge controversies in regards to surveillance and privacy, especially from U.S. citizens.<sup id="cite_ref-20" class="reference"><a href="#cite_note-20"><span class="cite-bracket">&#91;</span>20<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-21" class="reference"><a href="#cite_note-21"><span class="cite-bracket">&#91;</span>21<span class="cite-bracket">&#93;</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Telephones">Telephones</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Surveillance&amp;action=edit&amp;section=3" title="Edit section: Telephones"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236090951"><div role="note" class="hatnote navigation-not-searchable">Main articles: <a href="/wiki/Phone_surveillance" title="Phone surveillance">Phone surveillance</a> and <a href="/wiki/Lawful_interception" title="Lawful interception">Lawful interception</a></div> <p>The official and unofficial tapping of telephone lines is widespread. In the <a href="/wiki/United_States" title="United States">United States</a> for instance, the <a href="/wiki/Communications_Assistance_for_Law_Enforcement_Act" title="Communications Assistance for Law Enforcement Act">Communications Assistance for Law Enforcement Act</a> (CALEA) requires that all telephone and VoIP communications be available for real-time wiretapping by Federal law enforcement and intelligence agencies.<sup id="cite_ref-eff-calea-archive_10-1" class="reference"><a href="#cite_note-eff-calea-archive-10"><span class="cite-bracket">&#91;</span>10<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-eff-calea-summary_11-1" class="reference"><a href="#cite_note-eff-calea-summary-11"><span class="cite-bracket">&#91;</span>11<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-eff-calea-faq_12-1" class="reference"><a href="#cite_note-eff-calea-faq-12"><span class="cite-bracket">&#91;</span>12<span class="cite-bracket">&#93;</span></a></sup> Two major <a href="/wiki/Telecommunications_companies" class="mw-redirect" title="Telecommunications companies">telecommunications companies</a> in the U.S.—<a href="/wiki/AT%26T_Inc." class="mw-redirect" title="AT&amp;T Inc.">AT&amp;T Inc.</a> and <a href="/wiki/Verizon" title="Verizon">Verizon</a>—have contracts with the FBI, requiring them to keep their phone call records easily searchable and accessible for Federal agencies, in return for $1.8 million per year.<sup id="cite_ref-threatlevel-exigent_22-0" class="reference"><a href="#cite_note-threatlevel-exigent-22"><span class="cite-bracket">&#91;</span>22<span class="cite-bracket">&#93;</span></a></sup> Between 2003 and 2005, the FBI sent out more than 140,000 "<a href="/wiki/National_Security_Letter" class="mw-redirect" title="National Security Letter">National Security Letters</a>" ordering phone companies to hand over information about their customers' calling and Internet histories. About half of these letters requested information on U.S. citizens.<sup id="cite_ref-fbi-national-letters_23-0" class="reference"><a href="#cite_note-fbi-national-letters-23"><span class="cite-bracket">&#91;</span>23<span class="cite-bracket">&#93;</span></a></sup> </p><p>Human agents are not required to monitor most calls. <a href="/wiki/Speech-to-text" class="mw-redirect" title="Speech-to-text">Speech-to-text</a> software creates machine-readable text from intercepted audio, which is then processed by automated call-analysis programs, such as those developed by agencies such as the <a href="/wiki/Information_Awareness_Office" title="Information Awareness Office">Information Awareness Office</a>, or companies such as <a href="/wiki/Verint" class="mw-redirect" title="Verint">Verint</a>, and <a href="/wiki/Narus_(company)" class="mw-redirect" title="Narus (company)">Narus</a>, which search for certain words or phrases, to decide whether to dedicate a human agent to the call.<sup id="cite_ref-latimes-fbi-intel-analysis_24-0" class="reference"><a href="#cite_note-latimes-fbi-intel-analysis-24"><span class="cite-bracket">&#91;</span>24<span class="cite-bracket">&#93;</span></a></sup> </p><p>Law enforcement and intelligence services in the United Kingdom and the United States possess technology to activate the microphones in cell phones remotely, by accessing phones' diagnostic or maintenance features in order to listen to conversations that take place near the person who holds the phone.<sup id="cite_ref-schneier-roving-bugs_25-0" class="reference"><a href="#cite_note-schneier-roving-bugs-25"><span class="cite-bracket">&#91;</span>25<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-roving-bugs_26-0" class="reference"><a href="#cite_note-roving-bugs-26"><span class="cite-bracket">&#91;</span>26<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-uk-mobile-bug_27-0" class="reference"><a href="#cite_note-uk-mobile-bug-27"><span class="cite-bracket">&#91;</span>27<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-noaa-phone_28-0" class="reference"><a href="#cite_note-noaa-phone-28"><span class="cite-bracket">&#91;</span>28<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-can-you-hear-me_29-0" class="reference"><a href="#cite_note-can-you-hear-me-29"><span class="cite-bracket">&#91;</span>29<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-seattle-times-roving_30-0" class="reference"><a href="#cite_note-seattle-times-roving-30"><span class="cite-bracket">&#91;</span>30<span class="cite-bracket">&#93;</span></a></sup> </p><p>The <a href="/wiki/Stingray_phone_tracker" title="Stingray phone tracker">StingRay</a> tracker is an example of one of these tools used to monitor cell phone usage in the United States and the United Kingdom. Originally developed for counterterrorism purposes by the military, they work by broadcasting powerful signals that cause nearby cell phones to transmit their <a href="/wiki/Mobile_identification_number" title="Mobile identification number">IMSI number</a>, just as they would to normal cell phone towers. Once the phone is connected to the device, there is no way for the user to know that they are being tracked. The operator of the stingray is able to extract information such as location, phone calls, and text messages, but it is widely believed that the capabilities of the StingRay extend much further. A lot of controversy surrounds the StingRay because of its powerful capabilities and the secrecy that surrounds it.<sup id="cite_ref-31" class="reference"><a href="#cite_note-31"><span class="cite-bracket">&#91;</span>31<span class="cite-bracket">&#93;</span></a></sup> </p><p>Mobile phones are also commonly used to collect location data. The geographical location of a mobile phone (and thus the person carrying it) can be determined easily even when the phone is not being used, using a technique known as <a href="/wiki/Multilateration" class="mw-redirect" title="Multilateration">multilateration</a> to calculate the differences in time for a signal to travel from the cell phone to each of several <a href="/wiki/Cell_towers" class="mw-redirect" title="Cell towers">cell towers</a> near the owner of the phone.<sup id="cite_ref-bbc-phone-locate_32-0" class="reference"><a href="#cite_note-bbc-phone-locate-32"><span class="cite-bracket">&#91;</span>32<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-foxnews-phone-locate_33-0" class="reference"><a href="#cite_note-foxnews-phone-locate-33"><span class="cite-bracket">&#91;</span>33<span class="cite-bracket">&#93;</span></a></sup> The legality of such techniques has been questioned in the United States, in particular whether a court warrant is required.<sup id="cite_ref-nyu-lawrev_34-0" class="reference"><a href="#cite_note-nyu-lawrev-34"><span class="cite-bracket">&#91;</span>34<span class="cite-bracket">&#93;</span></a></sup> Records for <i>one</i> carrier alone (Sprint), showed that in a given year federal law enforcement agencies requested customer location data 8 million times.<sup id="cite_ref-wired-gps-ping_35-0" class="reference"><a href="#cite_note-wired-gps-ping-35"><span class="cite-bracket">&#91;</span>35<span class="cite-bracket">&#93;</span></a></sup> </p> <figure class="mw-default-size" typeof="mw:File/Thumb"><a href="/wiki/File:Aerial_of_GCHQ,_Cheltenham,_Gloucestershire,_England_24May2017_arp.jpg" class="mw-file-description"><img src="//upload.wikimedia.org/wikipedia/commons/thumb/7/74/Aerial_of_GCHQ%2C_Cheltenham%2C_Gloucestershire%2C_England_24May2017_arp.jpg/220px-Aerial_of_GCHQ%2C_Cheltenham%2C_Gloucestershire%2C_England_24May2017_arp.jpg" decoding="async" width="220" height="166" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/7/74/Aerial_of_GCHQ%2C_Cheltenham%2C_Gloucestershire%2C_England_24May2017_arp.jpg/330px-Aerial_of_GCHQ%2C_Cheltenham%2C_Gloucestershire%2C_England_24May2017_arp.jpg 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/7/74/Aerial_of_GCHQ%2C_Cheltenham%2C_Gloucestershire%2C_England_24May2017_arp.jpg/440px-Aerial_of_GCHQ%2C_Cheltenham%2C_Gloucestershire%2C_England_24May2017_arp.jpg 2x" data-file-width="1869" data-file-height="1408" /></a><figcaption>The headquarters of UK intelligence activities is <a href="/wiki/Government_Communications_Headquarters" class="mw-redirect" title="Government Communications Headquarters">Government Communications Headquarters</a>, <a href="/wiki/Cheltenham" title="Cheltenham">Cheltenham</a>, England (2017)</figcaption></figure> <p>In response to customers' privacy concerns in the post <a href="/wiki/Edward_Snowden" title="Edward Snowden">Edward Snowden</a> era,<sup id="cite_ref-36" class="reference"><a href="#cite_note-36"><span class="cite-bracket">&#91;</span>36<span class="cite-bracket">&#93;</span></a></sup> Apple's iPhone 6 has been designed to disrupt investigative <a href="/wiki/Wiretapping" title="Wiretapping">wiretapping</a> efforts. The phone encrypts e-mails, contacts, and photos with a code generated by a complex mathematical algorithm that is unique to an individual phone, and is inaccessible to Apple.<sup id="cite_ref-new-iphone-locks-out-nsa_37-0" class="reference"><a href="#cite_note-new-iphone-locks-out-nsa-37"><span class="cite-bracket">&#91;</span>37<span class="cite-bracket">&#93;</span></a></sup> The <a href="/wiki/Encryption" title="Encryption">encryption</a> feature on the iPhone 6 has drawn criticism from FBI director James B. Comey and other law enforcement officials since even lawful requests to access user content on the iPhone 6 will result in Apple supplying "gibberish" data that requires law enforcement personnel to either break the code themselves or to get the code from the phone's owner.<sup id="cite_ref-new-iphone-locks-out-nsa_37-1" class="reference"><a href="#cite_note-new-iphone-locks-out-nsa-37"><span class="cite-bracket">&#91;</span>37<span class="cite-bracket">&#93;</span></a></sup> Because the Snowden leaks demonstrated that American agencies can access phones anywhere in the world, privacy concerns in countries with growing markets for smart phones have intensified, providing a strong incentive for companies like <a href="/wiki/Apple_Inc." title="Apple Inc.">Apple</a> to address those concerns in order to secure their position in the global market.<sup id="cite_ref-new-iphone-locks-out-nsa_37-2" class="reference"><a href="#cite_note-new-iphone-locks-out-nsa-37"><span class="cite-bracket">&#91;</span>37<span class="cite-bracket">&#93;</span></a></sup> </p><p><a href="/wiki/Apple_Inc." title="Apple Inc.">Apple</a> has made several moves to emphasize their concern for privacy, in order to appeal to more consumers. In 2011, Apple stopped the use of permanent device identifiers, and in 2019, they banned the ability of third parties to track on children’s apps.<sup id="cite_ref-38" class="reference"><a href="#cite_note-38"><span class="cite-bracket">&#91;</span>38<span class="cite-bracket">&#93;</span></a></sup> </p><p>Although the <a href="/wiki/Communications_Assistance_for_Law_Enforcement_Act" title="Communications Assistance for Law Enforcement Act">CALEA</a> requires telecommunications companies to build into their systems the ability to carry out a lawful wiretap, the law has not been updated to address the issue of smart phones and requests for access to <a href="/wiki/E-mails" class="mw-redirect" title="E-mails">e-mails</a> and <a href="/wiki/Metadata" title="Metadata">metadata</a>.<sup id="cite_ref-nsa-tracking-cellphone-locations_39-0" class="reference"><a href="#cite_note-nsa-tracking-cellphone-locations-39"><span class="cite-bracket">&#91;</span>39<span class="cite-bracket">&#93;</span></a></sup> The Snowden leaks show that the <a href="/wiki/NSA" class="mw-redirect" title="NSA">NSA</a> has been taking advantage of this ambiguity in the law by collecting metadata on "at least hundreds of millions" of "incidental" targets from around the world.<sup id="cite_ref-nsa-tracking-cellphone-locations_39-1" class="reference"><a href="#cite_note-nsa-tracking-cellphone-locations-39"><span class="cite-bracket">&#91;</span>39<span class="cite-bracket">&#93;</span></a></sup> The NSA uses an analytic tool known as CO-TRAVELER in order to track people whose movements intersect and to find any hidden connections with persons of interest.<sup id="cite_ref-nsa-tracking-cellphone-locations_39-2" class="reference"><a href="#cite_note-nsa-tracking-cellphone-locations-39"><span class="cite-bracket">&#91;</span>39<span class="cite-bracket">&#93;</span></a></sup> </p><p>The Snowden leaks have also revealed that the British <a href="/wiki/Government_Communications_Headquarters" class="mw-redirect" title="Government Communications Headquarters">Government Communications Headquarters</a> (GCHQ) can access information collected by the NSA on American citizens. Once the data has been collected, the GCHQ can hold on to it for up to two years. The deadline can be extended with the permission of a "senior UK official".<sup id="cite_ref-40" class="reference"><a href="#cite_note-40"><span class="cite-bracket">&#91;</span>40<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-41" class="reference"><a href="#cite_note-41"><span class="cite-bracket">&#91;</span>41<span class="cite-bracket">&#93;</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Cameras">Cameras</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Surveillance&amp;action=edit&amp;section=4" title="Edit section: Cameras"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236090951"><div role="note" class="hatnote navigation-not-searchable">Main article: <a href="/wiki/Closed-circuit_television" title="Closed-circuit television">Closed-circuit television</a></div> <figure class="mw-default-size mw-halign-right" typeof="mw:File/Thumb"><a href="/wiki/File:Cairns-Lagoon.JPG" class="mw-file-description"><img src="//upload.wikimedia.org/wikipedia/commons/thumb/a/a4/Cairns-Lagoon.JPG/220px-Cairns-Lagoon.JPG" decoding="async" width="220" height="165" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/a/a4/Cairns-Lagoon.JPG/330px-Cairns-Lagoon.JPG 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/a/a4/Cairns-Lagoon.JPG/440px-Cairns-Lagoon.JPG 2x" data-file-width="2304" data-file-height="1728" /></a><figcaption>A surveillance camera in <a href="/wiki/Cairns,_Queensland" class="mw-redirect" title="Cairns, Queensland">Cairns, Queensland</a></figcaption></figure> <figure class="mw-default-size mw-halign-right" typeof="mw:File/Thumb"><a href="/wiki/File:Three_Surveillance_cameras.jpg" class="mw-file-description"><img src="//upload.wikimedia.org/wikipedia/commons/thumb/a/a1/Three_Surveillance_cameras.jpg/220px-Three_Surveillance_cameras.jpg" decoding="async" width="220" height="179" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/a/a1/Three_Surveillance_cameras.jpg/330px-Three_Surveillance_cameras.jpg 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/a/a1/Three_Surveillance_cameras.jpg/440px-Three_Surveillance_cameras.jpg 2x" data-file-width="1815" data-file-height="1475" /></a><figcaption>Surveillance cameras such as these are installed by the millions in many countries, and are nowadays monitored by automated computer programs instead of humans.</figcaption></figure> <p>Surveillance cameras, or security cameras, are video cameras used for the purpose of observing an area. They are often connected to a recording device or <a href="/wiki/IP_network" class="mw-redirect" title="IP network">IP network</a>, and may be watched by a <a href="/wiki/Security_guard" title="Security guard">security guard</a> or <a href="/wiki/Law_enforcement_officer" title="Law enforcement officer">law enforcement officer</a>. Cameras and recording equipment used to be relatively expensive and required human personnel to monitor camera footage, but analysis of footage has been made easier by automated software that organizes digital video footage into a searchable <a href="/wiki/Database" title="Database">database</a>, and by video analysis software (such as <a href="/wiki/VIRAT" title="VIRAT">VIRAT</a> and <a href="/wiki/Human_Identification_at_a_Distance" class="mw-redirect" title="Human Identification at a Distance">HumanID</a>). The amount of footage is also drastically reduced by motion sensors which record only when motion is detected. With cheaper production techniques, surveillance cameras are simple and inexpensive enough to be used in home security systems, and for everyday surveillance. Video cameras are one of the most common methods of surveillance.<sup id="cite_ref-42" class="reference"><a href="#cite_note-42"><span class="cite-bracket">&#91;</span>42<span class="cite-bracket">&#93;</span></a></sup> </p><p>As of 2016, there are about 350 million surveillance cameras worldwide. About 65% of these cameras are installed in Asia. The growth of CCTV has been slowing in recent years.<sup id="cite_ref-SDM2016_43-0" class="reference"><a href="#cite_note-SDM2016-43"><span class="cite-bracket">&#91;</span>43<span class="cite-bracket">&#93;</span></a></sup> In 2018, <a href="/wiki/Mass_surveillance_in_China" title="Mass surveillance in China">China was reported</a> to have a huge surveillance network of over 170 million CCTV cameras with 400 million new cameras expected to be installed in the next three years, many of which use <a href="/wiki/Facial_recognition_system" title="Facial recognition system">facial recognition technology</a>.<sup id="cite_ref-44" class="reference"><a href="#cite_note-44"><span class="cite-bracket">&#91;</span>44<span class="cite-bracket">&#93;</span></a></sup> </p><p>In the <a href="/wiki/United_States" title="United States">United States</a>, the <a href="/wiki/Department_of_Homeland_Security" class="mw-redirect" title="Department of Homeland Security">Department of Homeland Security</a> awards billions of dollars per year in <a href="/wiki/Homeland_Security_grants" class="mw-redirect" title="Homeland Security grants">Homeland Security grants</a> for local, state, and federal agencies to install modern video surveillance equipment. For example, the city of <a href="/wiki/Chicago" title="Chicago">Chicago</a>, Illinois, recently used a $5.1 million Homeland Security grant to install an additional 250 surveillance cameras, and connect them to a centralized monitoring center, along with its preexisting network of over 2000 cameras, in a program known as <a href="/wiki/Operation_Virtual_Shield" title="Operation Virtual Shield">Operation Virtual Shield</a>. Speaking in 2009, Chicago Mayor <a href="/wiki/Richard_M._Daley" title="Richard M. Daley">Richard Daley</a> announced that Chicago would have a surveillance camera on every street corner by 2016.<sup id="cite_ref-sun-times_45-0" class="reference"><a href="#cite_note-sun-times-45"><span class="cite-bracket">&#91;</span>45<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-were-watching_46-0" class="reference"><a href="#cite_note-were-watching-46"><span class="cite-bracket">&#91;</span>46<span class="cite-bracket">&#93;</span></a></sup> <a href="/wiki/New_York_City" title="New York City">New York City</a> received a $350 million grant towards the development of the <a href="/wiki/Domain_Awareness_System" title="Domain Awareness System">Domain Awareness System</a>,<sup id="cite_ref-informs-2017_47-0" class="reference"><a href="#cite_note-informs-2017-47"><span class="cite-bracket">&#91;</span>47<span class="cite-bracket">&#93;</span></a></sup> which is an interconnected system of sensors including 18,000 CCTV cameras used for continual surveillance of the city<sup id="cite_ref-48" class="reference"><a href="#cite_note-48"><span class="cite-bracket">&#91;</span>48<span class="cite-bracket">&#93;</span></a></sup> by both police officers and <a href="/wiki/Artificial_intelligence_for_video_surveillance" title="Artificial intelligence for video surveillance">artificial intelligence systems</a>.<sup id="cite_ref-informs-2017_47-1" class="reference"><a href="#cite_note-informs-2017-47"><span class="cite-bracket">&#91;</span>47<span class="cite-bracket">&#93;</span></a></sup> </p><p>In the <a href="/wiki/United_Kingdom" title="United Kingdom">United Kingdom</a>, the vast majority of video surveillance cameras are not operated by government bodies, but by private individuals or companies, especially to monitor the interiors of shops and businesses. According to 2011 <a href="/wiki/Freedom_of_Information_Act_2000" title="Freedom of Information Act 2000">Freedom of Information Act</a> requests, the total number of local government operated CCTV cameras was around 52,000 over the entirety of the UK.<sup id="cite_ref-BBW2012_49-0" class="reference"><a href="#cite_note-BBW2012-49"><span class="cite-bracket">&#91;</span>49<span class="cite-bracket">&#93;</span></a></sup> The prevalence of video surveillance in the UK is often overstated due to unreliable estimates being requoted;<sup id="cite_ref-50" class="reference"><a href="#cite_note-50"><span class="cite-bracket">&#91;</span>50<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-Guardian2011_51-0" class="reference"><a href="#cite_note-Guardian2011-51"><span class="cite-bracket">&#91;</span>51<span class="cite-bracket">&#93;</span></a></sup> for example one report in 2002 extrapolated from a very small sample to estimate the number of cameras in the UK at 4.2 million (of which 500,000 were in <a href="/wiki/London" title="London">Greater London</a>).<sup id="cite_ref-52" class="reference"><a href="#cite_note-52"><span class="cite-bracket">&#91;</span>52<span class="cite-bracket">&#93;</span></a></sup> More reliable estimates put the number of private and local government operated cameras in the United Kingdom at around 1.85 million in 2011.<sup id="cite_ref-53" class="reference"><a href="#cite_note-53"><span class="cite-bracket">&#91;</span>53<span class="cite-bracket">&#93;</span></a></sup> </p><p>In the Netherlands, one example city where there are cameras is The Hague. There, cameras are placed in city districts in which the most illegal activity is concentrated. Examples are the <a href="/wiki/Red-light_district" title="Red-light district">red-light districts</a> and the train stations.<sup id="cite_ref-54" class="reference"><a href="#cite_note-54"><span class="cite-bracket">&#91;</span>54<span class="cite-bracket">&#93;</span></a></sup> </p><p>As part of China's <a href="/wiki/Golden_Shield_Project" title="Golden Shield Project">Golden Shield Project</a>, several U.S. corporations, including <a href="/wiki/IBM" title="IBM">IBM</a>, <a href="/wiki/General_Electric" title="General Electric">General Electric</a>, and <a href="/wiki/Honeywell" title="Honeywell">Honeywell</a>, have been working closely with the <a href="/wiki/Politics_of_the_People%27s_Republic_of_China" class="mw-redirect" title="Politics of the People&#39;s Republic of China">Chinese government</a> to install millions of surveillance cameras throughout <a href="/wiki/People%27s_Republic_of_China" class="mw-redirect" title="People&#39;s Republic of China">China</a>, along with advanced <a href="/wiki/Video_analytics" class="mw-redirect" title="Video analytics">video analytics</a> and facial recognition software, which will identify and track individuals everywhere they go. They will be connected to a centralized database and monitoring station, which will, upon completion of the project, contain a picture of the face of every person in China: over 1.3 billion people.<sup id="cite_ref-rollingstone-china_55-0" class="reference"><a href="#cite_note-rollingstone-china-55"><span class="cite-bracket">&#91;</span>55<span class="cite-bracket">&#93;</span></a></sup> Lin Jiang Huai, the head of China's "Information Security Technology" office (which is in charge of the project), credits the surveillance systems in the United States and the U.K. as the inspiration for what he is doing with the Golden Shield Project.<sup id="cite_ref-rollingstone-china_55-1" class="reference"><a href="#cite_note-rollingstone-china-55"><span class="cite-bracket">&#91;</span>55<span class="cite-bracket">&#93;</span></a></sup> </p> <figure class="mw-default-size mw-halign-left" typeof="mw:File/Thumb"><a href="/wiki/File:DSTAMP_Controp_Camera.jpg" class="mw-file-description"><img src="//upload.wikimedia.org/wikipedia/commons/b/bb/DSTAMP_Controp_Camera.jpg" decoding="async" width="220" height="165" class="mw-file-element" data-file-width="220" data-file-height="165" /></a><figcaption>A payload surveillance camera manufactured by Controp and distributed to the U.S. government by ADI Technologies</figcaption></figure> <p>The <a href="/wiki/Defense_Advanced_Research_Projects_Agency" class="mw-redirect" title="Defense Advanced Research Projects Agency">Defense Advanced Research Projects Agency</a> (DARPA) is funding a research project called <a href="/wiki/Combat_Zones_That_See" title="Combat Zones That See">Combat Zones That See</a> that will link up cameras across a city to a centralized monitoring station, identify and track individuals and vehicles as they move through the city, and report "suspicious" activity (such as waving arms, looking side-to-side, standing in a group, etc.).<sup id="cite_ref-wired-cts_56-0" class="reference"><a href="#cite_note-wired-cts-56"><span class="cite-bracket">&#91;</span>56<span class="cite-bracket">&#93;</span></a></sup> </p><p>At <a href="/wiki/Super_Bowl_XXXV" title="Super Bowl XXXV">Super Bowl XXXV</a> in January 2001, police in Tampa, Florida, used <a href="/wiki/Identix_Incorporated" title="Identix Incorporated">Identix's</a> facial recognition software, FaceIt, to scan the crowd for potential criminals and terrorists in attendance at the event<sup id="cite_ref-Bonsor_57-0" class="reference"><a href="#cite_note-Bonsor-57"><span class="cite-bracket">&#91;</span>57<span class="cite-bracket">&#93;</span></a></sup> (it found 19 people with pending arrest warrants).<sup id="cite_ref-McNealy_58-0" class="reference"><a href="#cite_note-McNealy-58"><span class="cite-bracket">&#91;</span>58<span class="cite-bracket">&#93;</span></a></sup> </p><p>Governments often initially claim that cameras are meant to be used for <a href="/wiki/Road_traffic_control" title="Road traffic control">traffic control</a>, but many of them end up using them for general surveillance.<sup class="noprint Inline-Template Template-Fact" style="white-space:nowrap;">&#91;<i><a href="/wiki/Wikipedia:Citation_needed" title="Wikipedia:Citation needed"><span title="This claim needs references to reliable sources. (August 2023)">citation needed</span></a></i>&#93;</sup> For example, Washington, D.C. had 5,000 "traffic" cameras installed under this premise, and then after they were all in place, networked them all together and then granted access to the Metropolitan Police Department, so they could perform "day-to-day monitoring".<sup id="cite_ref-59" class="reference"><a href="#cite_note-59"><span class="cite-bracket">&#91;</span>59<span class="cite-bracket">&#93;</span></a></sup> </p><p>The development of centralized networks of CCTV cameras watching public areas—linked to computer databases of people's pictures and identity (<a href="/wiki/Biometric" class="mw-redirect" title="Biometric">biometric</a> data), able to track people's movements throughout the city, and identify whom they have been with—has been argued by some to present a risk to <a href="/wiki/Civil_liberties" title="Civil liberties">civil liberties</a>.<sup id="cite_ref-epic-video-page_60-0" class="reference"><a href="#cite_note-epic-video-page-60"><span class="cite-bracket">&#91;</span>60<span class="cite-bracket">&#93;</span></a></sup> <a href="/wiki/Trapwire" class="mw-redirect" title="Trapwire">Trapwire</a> is an example of such a network.<sup id="cite_ref-61" class="reference"><a href="#cite_note-61"><span class="cite-bracket">&#91;</span>61<span class="cite-bracket">&#93;</span></a></sup> </p> <div style="clear:both;" class=""></div> <div class="mw-heading mw-heading3"><h3 id="Social_network_analysis">Social network analysis</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Surveillance&amp;action=edit&amp;section=5" title="Edit section: Social network analysis"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <figure class="mw-default-size mw-halign-right" typeof="mw:File/Thumb"><a href="/wiki/File:Kencf0618FacebookNetwork.jpg" class="mw-file-description"><img src="//upload.wikimedia.org/wikipedia/commons/thumb/9/90/Kencf0618FacebookNetwork.jpg/220px-Kencf0618FacebookNetwork.jpg" decoding="async" width="220" height="220" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/9/90/Kencf0618FacebookNetwork.jpg/330px-Kencf0618FacebookNetwork.jpg 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/9/90/Kencf0618FacebookNetwork.jpg/440px-Kencf0618FacebookNetwork.jpg 2x" data-file-width="960" data-file-height="960" /></a><figcaption>A <a href="/wiki/Graph_(discrete_mathematics)" title="Graph (discrete mathematics)">graph</a> of the relationships between users on the <a href="/wiki/Social_networking" class="mw-redirect" title="Social networking">social networking</a> site <a href="/wiki/Facebook" title="Facebook">Facebook</a>. <a href="/wiki/Social_network_analysis" title="Social network analysis">Social network analysis</a> enables governments to gather detailed information about peoples' friends, family, and other contacts. Since much of this information is voluntarily made public by the users themselves, it is often considered to be a form of <a href="/wiki/Open-source_intelligence" title="Open-source intelligence">open-source intelligence</a></figcaption></figure> <p>One common form of surveillance is to create maps of <a href="/wiki/Social_network_analysis" title="Social network analysis">social networks</a> based on data from <a href="/wiki/Social_networking_sites" class="mw-redirect" title="Social networking sites">social networking sites</a> such as <a href="/wiki/Facebook" title="Facebook">Facebook</a>, <a href="/wiki/MySpace" class="mw-redirect" title="MySpace">MySpace</a>, <a href="/wiki/Twitter" title="Twitter">Twitter</a> as well as from <a href="/wiki/Traffic_analysis" title="Traffic analysis">traffic analysis</a> information from phone call records such as those in the <a href="/wiki/NSA_call_database" class="mw-redirect" title="NSA call database">NSA call database</a>,<sup id="cite_ref-keefe_62-0" class="reference"><a href="#cite_note-keefe-62"><span class="cite-bracket">&#91;</span>62<span class="cite-bracket">&#93;</span></a></sup> and others. These <a href="/wiki/Social_network" title="Social network">social network</a> "maps" are then <a href="/wiki/Data_mining" title="Data mining">data mined</a> to extract useful information such as personal interests, friendships &amp; affiliations, wants, beliefs, thoughts, and activities.<sup id="cite_ref-part-surv_63-0" class="reference"><a href="#cite_note-part-surv-63"><span class="cite-bracket">&#91;</span>63<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-fuchs_64-0" class="reference"><a href="#cite_note-fuchs-64"><span class="cite-bracket">&#91;</span>64<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-ethier_65-0" class="reference"><a href="#cite_note-ethier-65"><span class="cite-bracket">&#91;</span>65<span class="cite-bracket">&#93;</span></a></sup> </p><p>Many U.S. government agencies such as the <a href="/wiki/Defense_Advanced_Research_Projects_Agency" class="mw-redirect" title="Defense Advanced Research Projects Agency">Defense Advanced Research Projects Agency</a> (DARPA), the <a href="/wiki/National_Security_Agency" title="National Security Agency">National Security Agency</a> (NSA), and the <a href="/wiki/Department_of_Homeland_Security" class="mw-redirect" title="Department of Homeland Security">Department of Homeland Security</a> (DHS) are investing heavily in research involving social network analysis.<sup id="cite_ref-pentagon-social-networks_66-0" class="reference"><a href="#cite_note-pentagon-social-networks-66"><span class="cite-bracket">&#91;</span>66<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-nsa-myspace_67-0" class="reference"><a href="#cite_note-nsa-myspace-67"><span class="cite-bracket">&#91;</span>67<span class="cite-bracket">&#93;</span></a></sup> The intelligence community believes that the biggest threat to U.S. power comes from decentralized, leaderless, geographically dispersed groups of <a href="/wiki/Terrorists" class="mw-redirect" title="Terrorists">terrorists</a>, <a href="/wiki/Subversives" class="mw-redirect" title="Subversives">subversives</a>, <a href="/wiki/Extremists" class="mw-redirect" title="Extremists">extremists</a>, and <a href="/wiki/Dissidents" class="mw-redirect" title="Dissidents">dissidents</a>. These types of threats are most easily countered by finding important nodes in the network, and removing them. To do this requires a detailed map of the network.<sup id="cite_ref-ethier_2_68-0" class="reference"><a href="#cite_note-ethier_2-68"><span class="cite-bracket">&#91;</span>68<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-ressler_69-0" class="reference"><a href="#cite_note-ressler-69"><span class="cite-bracket">&#91;</span>69<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-dydan-blog_70-0" class="reference"><a href="#cite_note-dydan-blog-70"><span class="cite-bracket">&#91;</span>70<span class="cite-bracket">&#93;</span></a></sup> </p><p>Jason Ethier of Northeastern University, in his study of modern social network analysis, said the following of the Scalable Social Network Analysis Program developed by the <a href="/wiki/Information_Awareness_Office" title="Information Awareness Office">Information Awareness Office</a>: </p> <style data-mw-deduplicate="TemplateStyles:r1244412712">.mw-parser-output .templatequote{overflow:hidden;margin:1em 0;padding:0 32px}.mw-parser-output .templatequotecite{line-height:1.5em;text-align:left;margin-top:0}@media(min-width:500px){.mw-parser-output .templatequotecite{padding-left:1.6em}}</style><blockquote class="templatequote"><p>The purpose of the SSNA algorithms program is to extend techniques of social network analysis to assist with distinguishing potential terrorist cells from legitimate groups of people.... In order to be successful SSNA will require information on the social interactions of the majority of people around the globe. Since the Defense Department cannot easily distinguish between peaceful citizens and terrorists, it will be necessary for them to gather data on innocent civilians as well as on potential terrorists.</p><div class="templatequotecite">—&#8202;<cite>Jason Ethier<sup id="cite_ref-ethier_65-1" class="reference"><a href="#cite_note-ethier-65"><span class="cite-bracket">&#91;</span>65<span class="cite-bracket">&#93;</span></a></sup></cite></div></blockquote> <p>AT&amp;T developed a programming language called "Hancock", which is able to sift through enormous databases of phone call and Internet traffic records, such as the <a href="/wiki/NSA_call_database" class="mw-redirect" title="NSA call database">NSA call database</a>, and extract "communities of interest"—groups of people who call each other regularly, or groups that regularly visit certain sites on the Internet. AT&amp;T originally built the system to develop "marketing leads",<sup id="cite_ref-hancock_71-0" class="reference"><a href="#cite_note-hancock-71"><span class="cite-bracket">&#91;</span>71<span class="cite-bracket">&#93;</span></a></sup> but the FBI has regularly requested such information from phone companies such as AT&amp;T without a warrant,<sup id="cite_ref-hancock_71-1" class="reference"><a href="#cite_note-hancock-71"><span class="cite-bracket">&#91;</span>71<span class="cite-bracket">&#93;</span></a></sup> and, after using the data, stores all information received in its own databases, regardless of whether or not the information was ever useful in an investigation.<sup id="cite_ref-threatlevel-fbi-phonerecords_72-0" class="reference"><a href="#cite_note-threatlevel-fbi-phonerecords-72"><span class="cite-bracket">&#91;</span>72<span class="cite-bracket">&#93;</span></a></sup> </p><p>Some people believe that the use of social networking sites is a form of "participatory surveillance", where users of these sites are essentially performing surveillance on themselves, putting detailed personal information on public websites where it can be viewed by corporations and governments.<sup id="cite_ref-part-surv_63-1" class="reference"><a href="#cite_note-part-surv-63"><span class="cite-bracket">&#91;</span>63<span class="cite-bracket">&#93;</span></a></sup> In 2008, about 20% of employers reported using social networking sites to collect personal data on prospective or current employees.<sup id="cite_ref-havenstein_73-0" class="reference"><a href="#cite_note-havenstein-73"><span class="cite-bracket">&#91;</span>73<span class="cite-bracket">&#93;</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Biometric">Biometric</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Surveillance&amp;action=edit&amp;section=6" title="Edit section: Biometric"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <figure class="mw-default-size mw-halign-right" typeof="mw:File/Thumb"><a href="/wiki/File:US-VISIT_(CBP).jpg" class="mw-file-description"><img src="//upload.wikimedia.org/wikipedia/commons/thumb/5/5c/US-VISIT_%28CBP%29.jpg/220px-US-VISIT_%28CBP%29.jpg" decoding="async" width="220" height="142" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/5/5c/US-VISIT_%28CBP%29.jpg/330px-US-VISIT_%28CBP%29.jpg 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/5/5c/US-VISIT_%28CBP%29.jpg/440px-US-VISIT_%28CBP%29.jpg 2x" data-file-width="2310" data-file-height="1496" /></a><figcaption>Fingerprints being scanned as part of the <a href="/wiki/US-VISIT" class="mw-redirect" title="US-VISIT">US-VISIT</a> program</figcaption></figure> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236090951"><div role="note" class="hatnote navigation-not-searchable">Main article: <a href="/wiki/Biometrics" title="Biometrics">Biometrics</a></div> <p>Biometric surveillance is a technology that measures and analyzes human physical and/or behavioral characteristics for authentication, identification, or screening purposes.<sup id="cite_ref-rand-facial_74-0" class="reference"><a href="#cite_note-rand-facial-74"><span class="cite-bracket">&#91;</span>74<span class="cite-bracket">&#93;</span></a></sup> Examples of physical characteristics include fingerprints, DNA, and facial patterns. Examples of mostly behavioral characteristics include gait (a person's manner of walking) or voice. </p><p><a href="/wiki/Facial_recognition_system" title="Facial recognition system">Facial recognition</a> is the use of the unique configuration of a person's facial features to accurately identify them, usually from surveillance video. Both the Department of Homeland Security and <a href="/wiki/DARPA" title="DARPA">DARPA</a> are heavily funding research into facial recognition systems.<sup id="cite_ref-usatoday-facial_75-0" class="reference"><a href="#cite_note-usatoday-facial-75"><span class="cite-bracket">&#91;</span>75<span class="cite-bracket">&#93;</span></a></sup> The <a href="/wiki/Information_Processing_Technology_Office" class="mw-redirect" title="Information Processing Technology Office">Information Processing Technology Office</a> ran a program known as <a href="/wiki/Human_Identification_at_a_Distance" class="mw-redirect" title="Human Identification at a Distance">Human Identification at a Distance</a> which developed technologies that are capable of identifying a person at up to 500&#160;ft (150&#160;m) by their facial features. </p><p>Another form of behavioral biometrics, based on <a href="/wiki/Affective_computing" title="Affective computing">affective computing</a>, involves computers recognizing a person's emotional state based on an analysis of their facial expressions, how fast they are talking, the tone and pitch of their voice, their posture, and other behavioral traits. This might be used for instance to see if a person's behavior is suspect (looking around furtively, "tense" or "angry" facial expressions, waving arms, etc.).<sup id="cite_ref-pop-mech-cameras_76-0" class="reference"><a href="#cite_note-pop-mech-cameras-76"><span class="cite-bracket">&#91;</span>76<span class="cite-bracket">&#93;</span></a></sup> </p><p>A more recent development is <a href="/wiki/DNA_profiling" title="DNA profiling">DNA profiling</a>, which looks at some of the major markers in the body's DNA to produce a match. The FBI is spending $1 billion to build a new biometric database, which will store DNA, facial recognition data, iris/retina (eye) data, fingerprints, palm prints, and other biometric data of people living in the United States. The computers running the database are contained in an underground facility about the size of two <a href="/wiki/American_football_field" title="American football field">American football fields</a>.<sup id="cite_ref-wpost-biometricdb_77-0" class="reference"><a href="#cite_note-wpost-biometricdb-77"><span class="cite-bracket">&#91;</span>77<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-fbi-biometric-db_78-0" class="reference"><a href="#cite_note-fbi-biometric-db-78"><span class="cite-bracket">&#91;</span>78<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-fbi-biometric-idg_79-0" class="reference"><a href="#cite_note-fbi-biometric-idg-79"><span class="cite-bracket">&#91;</span>79<span class="cite-bracket">&#93;</span></a></sup> </p><p>The Los Angeles Police Department is installing automated facial recognition and <a href="/wiki/Automatic_number_plate_recognition" class="mw-redirect" title="Automatic number plate recognition">license plate recognition</a> devices in its squad cars, and providing handheld face scanners, which officers will use to identify people while on patrol.<sup id="cite_ref-wired-lapd_80-0" class="reference"><a href="#cite_note-wired-lapd-80"><span class="cite-bracket">&#91;</span>80<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-nbc-lapd-facial_81-0" class="reference"><a href="#cite_note-nbc-lapd-facial-81"><span class="cite-bracket">&#91;</span>81<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-latimes-lapd-analysis-center_82-0" class="reference"><a href="#cite_note-latimes-lapd-analysis-center-82"><span class="cite-bracket">&#91;</span>82<span class="cite-bracket">&#93;</span></a></sup> </p><p><a rel="nofollow" class="external text" href="https://www.biometricupdate.com/201308/explainer-facial-thermography">Facial thermographs</a> are in development, which allow machines to identify certain emotions in people such as fear or stress, by measuring the temperature generated by blood flow to different parts of the face.<sup id="cite_ref-wired-lying-face_83-0" class="reference"><a href="#cite_note-wired-lying-face-83"><span class="cite-bracket">&#91;</span>83<span class="cite-bracket">&#93;</span></a></sup> Law enforcement officers believe that this has potential for them to identify when a suspect is nervous, which might indicate that they are hiding something, lying, or worried about something.<sup id="cite_ref-wired-lying-face_83-1" class="reference"><a href="#cite_note-wired-lying-face-83"><span class="cite-bracket">&#91;</span>83<span class="cite-bracket">&#93;</span></a></sup> </p><p>In <a rel="nofollow" class="external text" href="https://link.springer.com/article/10.1007/s10676-018-9493-1/">his paper</a> in <a href="/wiki/Ethics_and_Information_Technology" title="Ethics and Information Technology">Ethics and Information Technology</a>, Avi Marciano maps the harms caused by biometric surveillance, traces their theoretical origins, and brings these harms together in one integrative framework to elucidate their cumulative power. Marciano proposes four types of harms: Unauthorized use of bodily information, denial or limitation of access to physical spaces, bodily social sorting, and symbolic ineligibility through construction of marginality and otherness. Biometrics' social power, according to Marciano, derives from three main features: their complexity as "enigmatic technologies", their objective-scientific image, and their increasing agency, particularly in the context of automatic decision-making. </p> <div class="mw-heading mw-heading3"><h3 id="Aerial">Aerial<span class="anchor" id="Aerial_surveillance"></span></h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Surveillance&amp;action=edit&amp;section=7" title="Edit section: Aerial"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236090951"><div role="note" class="hatnote navigation-not-searchable">Further information: <a href="/wiki/Surveillance_aircraft" title="Surveillance aircraft">Surveillance aircraft</a> and <a href="/wiki/Wide-area_motion_imagery" title="Wide-area motion imagery">Wide-area motion imagery</a></div> <figure class="mw-default-size mw-halign-right" typeof="mw:File/Thumb"><a href="/wiki/File:MicroAirVehicle.jpg" class="mw-file-description"><img src="//upload.wikimedia.org/wikipedia/commons/thumb/0/03/MicroAirVehicle.jpg/220px-MicroAirVehicle.jpg" decoding="async" width="220" height="183" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/0/03/MicroAirVehicle.jpg/330px-MicroAirVehicle.jpg 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/0/03/MicroAirVehicle.jpg/440px-MicroAirVehicle.jpg 2x" data-file-width="1804" data-file-height="1500" /></a><figcaption>Micro Air Vehicle with attached surveillance camera</figcaption></figure> <p>Aerial surveillance is the gathering of surveillance, usually visual imagery or video, from an airborne vehicle—such as an <a href="/wiki/Unmanned_aerial_vehicle" title="Unmanned aerial vehicle">unmanned aerial vehicle</a>, <a href="/wiki/Helicopter" title="Helicopter">helicopter</a>, or <a href="/wiki/Surveillance_aircraft" title="Surveillance aircraft">spy plane</a>. Military <a href="/wiki/Surveillance_aircraft" title="Surveillance aircraft">surveillance aircraft</a> use a range of sensors (e.g. radar) to monitor the battlefield. </p><p>Digital imaging technology, miniaturized computers, and numerous other technological advances over the past decade have contributed to rapid advances in aerial surveillance hardware such as <a href="/wiki/Micro-aerial_vehicles" class="mw-redirect" title="Micro-aerial vehicles">micro-aerial vehicles</a>, <a href="/wiki/Forward-looking_infrared" title="Forward-looking infrared">forward-looking infrared</a>, and high-resolution imagery capable of identifying objects at extremely long distances. For instance, the <a href="/wiki/MQ-9_Reaper" class="mw-redirect" title="MQ-9 Reaper">MQ-9 Reaper</a>,<sup id="cite_ref-84" class="reference"><a href="#cite_note-84"><span class="cite-bracket">&#91;</span>84<span class="cite-bracket">&#93;</span></a></sup> a U.S. drone plane used for domestic operations by the <a href="/wiki/Department_of_Homeland_Security" class="mw-redirect" title="Department of Homeland Security">Department of Homeland Security</a>, carries cameras that are capable of identifying an object the size of a milk carton from altitudes of 30,000 feet (9.1&#160;km), and has <a href="/wiki/Forward-looking_infrared" title="Forward-looking infrared">forward-looking infrared</a> devices that can detect the heat from a human body at distances of up to 60 kilometers (37&#160;mi).<sup id="cite_ref-85" class="reference"><a href="#cite_note-85"><span class="cite-bracket">&#91;</span>85<span class="cite-bracket">&#93;</span></a></sup> In an earlier instance of commercial aerial surveillance, the <a href="/wiki/Killington_Mountain" class="mw-redirect" title="Killington Mountain">Killington Mountain</a> ski resort hired 'eye in the sky' aerial photography of its competitors' parking lots to judge the success of its marketing initiatives as it developed starting in the 1950s.<sup id="cite_ref-86" class="reference"><a href="#cite_note-86"><span class="cite-bracket">&#91;</span>86<span class="cite-bracket">&#93;</span></a></sup> </p> <figure class="mw-default-size mw-halign-right" typeof="mw:File/Thumb"><a href="/wiki/File:HURT_concept_drawing.jpg" class="mw-file-description"><img src="//upload.wikimedia.org/wikipedia/commons/thumb/e/e9/HURT_concept_drawing.jpg/220px-HURT_concept_drawing.jpg" decoding="async" width="220" height="143" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/e/e9/HURT_concept_drawing.jpg/330px-HURT_concept_drawing.jpg 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/e/e9/HURT_concept_drawing.jpg/440px-HURT_concept_drawing.jpg 2x" data-file-width="450" data-file-height="292" /></a><figcaption> <a href="/wiki/Heterogeneous_Aerial_Reconnaissance_Team" title="Heterogeneous Aerial Reconnaissance Team">HART</a> program concept drawing from official <a href="/wiki/Information_Processing_Technology_Office" class="mw-redirect" title="Information Processing Technology Office">IPTO</a> (<a href="/wiki/DARPA" title="DARPA">DARPA</a>) official website</figcaption></figure> <p>The <a href="/wiki/United_States" title="United States">United States</a> <a href="/wiki/Department_of_Homeland_Security" class="mw-redirect" title="Department of Homeland Security">Department of Homeland Security</a> is in the process of testing UAVs to patrol the skies over the United States for the purposes of <a href="/wiki/Critical_infrastructure_protection" class="mw-redirect" title="Critical infrastructure protection">critical infrastructure protection</a>, border patrol, "<a href="/wiki/Intelligent_transportation_system" title="Intelligent transportation system">transit monitoring</a>", and general surveillance of the U.S. population.<sup id="cite_ref-drones-us-skies_87-0" class="reference"><a href="#cite_note-drones-us-skies-87"><span class="cite-bracket">&#91;</span>87<span class="cite-bracket">&#93;</span></a></sup> Miami-Dade police department ran tests with a vertical take-off and landing UAV from <a href="/wiki/Honeywell" title="Honeywell">Honeywell</a>, which is planned to be used in <a href="/wiki/SWAT" title="SWAT">SWAT</a> operations.<sup id="cite_ref-police-uavs_88-0" class="reference"><a href="#cite_note-police-uavs-88"><span class="cite-bracket">&#91;</span>88<span class="cite-bracket">&#93;</span></a></sup> Houston's police department has been testing fixed-wing UAVs for use in "traffic control".<sup id="cite_ref-police-uavs_88-1" class="reference"><a href="#cite_note-police-uavs-88"><span class="cite-bracket">&#91;</span>88<span class="cite-bracket">&#93;</span></a></sup> </p><p>The <a href="/wiki/United_Kingdom" title="United Kingdom">United Kingdom</a>, as well, is working on plans to build up a fleet of surveillance UAVs ranging from <a href="/wiki/Micro-aerial_vehicles" class="mw-redirect" title="Micro-aerial vehicles">micro-aerial vehicles</a> to full-size <a href="/wiki/Unmanned_aerial_vehicle" title="Unmanned aerial vehicle">drones</a>, to be used by police forces throughout the U.K.<sup id="cite_ref-uk-uav-fleet_89-0" class="reference"><a href="#cite_note-uk-uav-fleet-89"><span class="cite-bracket">&#91;</span>89<span class="cite-bracket">&#93;</span></a></sup> </p><p>In addition to their surveillance capabilities, MAVs are capable of carrying <a href="/wiki/Taser" title="Taser">tasers</a> for "<a href="/wiki/Crowd_control" title="Crowd control">crowd control</a>", or weapons for killing enemy combatants.<sup id="cite_ref-uav-tazers_90-0" class="reference"><a href="#cite_note-uav-tazers-90"><span class="cite-bracket">&#91;</span>90<span class="cite-bracket">&#93;</span></a></sup> </p><p>Programs such as the <a href="/wiki/Heterogeneous_Aerial_Reconnaissance_Team" title="Heterogeneous Aerial Reconnaissance Team">Heterogeneous Aerial Reconnaissance Team</a> program developed by <a href="/wiki/DARPA" title="DARPA">DARPA</a> have automated much of the aerial surveillance process. They have developed systems consisting of large teams drone planes that pilot themselves, automatically decide who is "suspicious" and how to go about monitoring them, coordinate their activities with other drones nearby, and notify human operators if something suspicious is occurring. This greatly increases the amount of area that can be continuously monitored, while reducing the number of human operators required. Thus a swarm of automated, self-directing drones can automatically patrol a city and track suspicious individuals, reporting their activities back to a centralized monitoring station.<sup id="cite_ref-hart-overview_91-0" class="reference"><a href="#cite_note-hart-overview-91"><span class="cite-bracket">&#91;</span>91<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-hart-proposal_92-0" class="reference"><a href="#cite_note-hart-proposal-92"><span class="cite-bracket">&#91;</span>92<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-defense-daily_93-0" class="reference"><a href="#cite_note-defense-daily-93"><span class="cite-bracket">&#91;</span>93<span class="cite-bracket">&#93;</span></a></sup> In addition, researchers also investigate possibilities of autonomous surveillance by large groups of micro aerial vehicles stabilized by decentralized bio-inspired swarming rules.<sup id="cite_ref-94" class="reference"><a href="#cite_note-94"><span class="cite-bracket">&#91;</span>94<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-95" class="reference"><a href="#cite_note-95"><span class="cite-bracket">&#91;</span>95<span class="cite-bracket">&#93;</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Corporate">Corporate</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Surveillance&amp;action=edit&amp;section=8" title="Edit section: Corporate"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236090951"><div role="note" class="hatnote navigation-not-searchable">Main article: <a href="/wiki/Corporate_surveillance" title="Corporate surveillance">Corporate surveillance</a></div> <p>Corporate surveillance is the monitoring of a person or group's behavior by a corporation. The data collected is most often used for marketing purposes or sold to other corporations, but is also regularly shared with government agencies. It can be used as a form of <a href="/wiki/Business_intelligence" title="Business intelligence">business intelligence</a>, which enables the corporation to better tailor their products and/or services to be desirable by their customers. Although there is a common belief that monitoring can increase productivity, it can also create consequences such as increasing chances of deviant behavior and creating punishments that are not equitable to their actions. Additionally, monitoring can cause resistance and backlash because it insinuates an employer's suspicion and lack of trust.<sup id="cite_ref-96" class="reference"><a href="#cite_note-96"><span class="cite-bracket">&#91;</span>96<span class="cite-bracket">&#93;</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Data_mining_and_profiling">Data mining and profiling</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Surveillance&amp;action=edit&amp;section=9" title="Edit section: Data mining and profiling"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p><a href="/wiki/Data_mining" title="Data mining">Data mining</a> is the application of statistical techniques and programmatic algorithms to discover previously unnoticed relationships within the data. <a href="/wiki/Data_profiling" title="Data profiling">Data profiling</a> in this context is the process of assembling information about a particular individual or group in order to generate a profile&#160;— that is, a picture of their patterns and behavior. Data profiling can be an extremely powerful tool for psychological and <a href="/wiki/Social_network_analysis" title="Social network analysis">social network analysis</a>. A skilled analyst can discover facts about a person that they might not even be consciously aware of themselves.<sup id="cite_ref-profiling-euro_97-0" class="reference"><a href="#cite_note-profiling-euro-97"><span class="cite-bracket">&#91;</span>97<span class="cite-bracket">&#93;</span></a></sup> </p><p>Economic (such as credit card purchases) and social (such as telephone calls and emails) transactions in modern society create large amounts of stored <a href="/wiki/Data" title="Data">data</a> and records. In the past, this data was documented in paper records, leaving a "<a href="/wiki/Paper_trail" class="mw-redirect" title="Paper trail">paper trail</a>", or was simply not documented at all. Correlation of paper-based records was a laborious process—it required human intelligence operators to manually dig through documents, which was time-consuming and incomplete, at best. </p><p>But today many of these records are electronic, resulting in an "<a href="/wiki/Digital_footprint" title="Digital footprint">electronic trail</a>". Every use of a bank machine, payment by credit card, use of a phone card, call from home, checked out library book, rented video, or otherwise complete recorded transaction generates an electronic record. Public records—such as birth, court, tax and other records—are increasingly being digitized and made available online. In addition, due to laws like <a href="/wiki/Communications_Assistance_For_Law_Enforcement_Act" class="mw-redirect" title="Communications Assistance For Law Enforcement Act">CALEA</a>, web traffic and online purchases are also available for profiling. Electronic record-keeping makes data easily collectable, storable, and accessible—so that high-volume, efficient aggregation and analysis is possible at significantly lower costs. </p><p>Information relating to many of these individual transactions is often easily available because it is generally not guarded in isolation, since the information, such as the title of a movie a person has rented, might not seem sensitive. However, when many such transactions are <a href="/wiki/Government_databases" class="mw-redirect" title="Government databases">aggregated</a> they can be used to assemble a detailed profile revealing the actions, habits, beliefs, locations frequented, <a href="/wiki/Social_network_analysis" title="Social network analysis">social connections</a>, and preferences of the individual. This profile is then used, by programs such as <a href="/wiki/ADVISE" title="ADVISE">ADVISE</a><sup id="cite_ref-data-sweep_98-0" class="reference"><a href="#cite_note-data-sweep-98"><span class="cite-bracket">&#91;</span>98<span class="cite-bracket">&#93;</span></a></sup> and <a href="/wiki/TALON_(database)" title="TALON (database)">TALON</a>, to determine whether the person is a military, criminal, or political threat. </p><p>In addition to its own aggregation and profiling tools, the government is able to access information from third parties—for example, banks, credit companies or employers, etc.—by requesting access informally, by compelling access through the use of subpoenas or other procedures,<sup id="cite_ref-cdt-fbi-subpoenas_99-0" class="reference"><a href="#cite_note-cdt-fbi-subpoenas-99"><span class="cite-bracket">&#91;</span>99<span class="cite-bracket">&#93;</span></a></sup> or by purchasing data from commercial data aggregators or data brokers. The United States has spent $370 million on its 43 planned <a href="/wiki/Fusion_centers" class="mw-redirect" title="Fusion centers">fusion centers</a>, which are national network of surveillance centers that are located in over 30 states. The centers will collect and analyze vast amounts of data on U.S. citizens. It will get this data by consolidating personal information from sources such as state driver's licensing agencies, hospital records, criminal records, school records, credit bureaus, banks, etc.—and placing this information in a centralized database that can be accessed from all of the centers, as well as other federal law enforcement and intelligence agencies.<sup id="cite_ref-epic-fusion-centers_100-0" class="reference"><a href="#cite_note-epic-fusion-centers-100"><span class="cite-bracket">&#91;</span>100<span class="cite-bracket">&#93;</span></a></sup> </p><p>Under <i><a href="/wiki/United_States_v._Miller" title="United States v. Miller">United States v. Miller</a></i> (1976), data held by third parties is generally not subject to <a href="/wiki/Fourth_Amendment_to_the_United_States_Constitution" title="Fourth Amendment to the United States Constitution">Fourth Amendment</a> warrant requirements. </p> <div class="mw-heading mw-heading3"><h3 id="Human_operatives">Human operatives</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Surveillance&amp;action=edit&amp;section=10" title="Edit section: Human operatives"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>A <a href="/wiki/Tailing_(disambiguation)" class="mw-redirect mw-disambig" title="Tailing (disambiguation)"> tail</a> may surreptitiously track and report on the movements and contacts of a person of interest. Such following by one or more people may provide useful in formation in relatively densely populated urban environments.<sup id="cite_ref-101" class="reference"><a href="#cite_note-101"><span class="cite-bracket">&#91;</span>101<span class="cite-bracket">&#93;</span></a></sup> </p><p>Organizations that have enemies who wish to gather information about the groups' members or activities face the issue of potential infiltration.<sup id="cite_ref-pentagon-infiltration_102-0" class="reference"><a href="#cite_note-pentagon-infiltration-102"><span class="cite-bracket">&#91;</span>102<span class="cite-bracket">&#93;</span></a></sup> </p><p>In addition to operatives' infiltrating an organization, the surveilling party may exert pressure on certain members of the target organization to act as <a href="/wiki/Informants" class="mw-redirect" title="Informants">informants</a> (i.e., to disclose the information they hold on the organization and its members).<sup id="cite_ref-senate-hearing-informants_103-0" class="reference"><a href="#cite_note-senate-hearing-informants-103"><span class="cite-bracket">&#91;</span>103<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-104" class="reference"><a href="#cite_note-104"><span class="cite-bracket">&#91;</span>104<span class="cite-bracket">&#93;</span></a></sup> </p><p>Fielding operatives is very expensive, and governments with wide-reaching electronic <a href="/wiki/Surveillance_tools" title="Surveillance tools">surveillance tools</a> at their disposal, rather than gathering the sort of information which operatives can provide, may use less problematic forms of surveillance—such as those mentioned above. Nevertheless, the use of human infiltrators remains common. For instance, in 2007 documents surfaced showing that the <a href="/wiki/FBI" class="mw-redirect" title="FBI">FBI</a> planned to field a total of 15,000 undercover agents and informants in response to an anti-terrorism directive (issued by President <a href="/wiki/George_W._Bush" title="George W. Bush">George W. Bush</a> in 2004) that ordered intelligence and law-enforcement agencies to increase their <a href="/wiki/HUMINT" class="mw-redirect" title="HUMINT">HUMINT</a> capabilities.<sup id="cite_ref-fbi-informant-network_105-0" class="reference"><a href="#cite_note-fbi-informant-network-105"><span class="cite-bracket">&#91;</span>105<span class="cite-bracket">&#93;</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Satellite_imagery">Satellite imagery</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Surveillance&amp;action=edit&amp;section=11" title="Edit section: Satellite imagery"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236090951"><div role="note" class="hatnote navigation-not-searchable">Main article: <a href="/wiki/Reconnaissance_satellite" title="Reconnaissance satellite">Reconnaissance satellite</a></div> <p>On May 25, 2007, the U.S. <a href="/wiki/Director_of_National_Intelligence" title="Director of National Intelligence">Director of National Intelligence</a> <a href="/wiki/John_Michael_McConnell" class="mw-redirect" title="John Michael McConnell">Michael McConnell</a> authorized the <a href="/wiki/National_Applications_Office" title="National Applications Office">National Applications Office</a> (NAO) of the <a href="/wiki/Department_of_Homeland_Security" class="mw-redirect" title="Department of Homeland Security">Department of Homeland Security</a> to allow local, state, and domestic Federal agencies to access imagery from <a href="/wiki/Military_intelligence" title="Military intelligence">military intelligence</a> <a href="/wiki/Reconnaissance_satellite" title="Reconnaissance satellite">Reconnaissance satellites</a> and <a href="/wiki/Reconnaissance_aircraft" title="Reconnaissance aircraft">Reconnaissance aircraft</a> sensors which can now be used to observe the activities of U.S. citizens. The satellites and aircraft sensors will be able to penetrate cloud cover, detect chemical traces, and identify objects in buildings and "underground bunkers", and will provide real-time video at much higher resolutions than the still-images produced by programs such as <a href="/wiki/Google_Earth" title="Google Earth">Google Earth</a>.<sup id="cite_ref-ns-archive-domestic-sat_106-0" class="reference"><a href="#cite_note-ns-archive-domestic-sat-106"><span class="cite-bracket">&#91;</span>106<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-wsj-domestic-sat_107-0" class="reference"><a href="#cite_note-wsj-domestic-sat-107"><span class="cite-bracket">&#91;</span>107<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-wsj-sat-program-approved_108-0" class="reference"><a href="#cite_note-wsj-sat-program-approved-108"><span class="cite-bracket">&#91;</span>108<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-dhs-nao-factsheet_109-0" class="reference"><a href="#cite_note-dhs-nao-factsheet-109"><span class="cite-bracket">&#91;</span>109<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-washpost-sat_110-0" class="reference"><a href="#cite_note-washpost-sat-110"><span class="cite-bracket">&#91;</span>110<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-usatoday-spysat_111-0" class="reference"><a href="#cite_note-usatoday-spysat-111"><span class="cite-bracket">&#91;</span>111<span class="cite-bracket">&#93;</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Identification_and_credentials">Identification and credentials</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Surveillance&amp;action=edit&amp;section=12" title="Edit section: Identification and credentials"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <figure class="mw-default-size mw-halign-right" typeof="mw:File/Thumb"><a href="/wiki/File:Social_Security_card.jpg" class="mw-file-description"><img src="//upload.wikimedia.org/wikipedia/commons/1/11/Social_Security_card.jpg" decoding="async" width="200" height="123" class="mw-file-element" data-file-width="200" data-file-height="123" /></a><figcaption>A card containing an identification number</figcaption></figure> <p>One of the simplest forms of identification is the carrying of credentials. Some nations have an <a href="/wiki/Identity_document" title="Identity document">identity card</a> system to aid identification, whilst others are considering it but face public opposition. Other documents, such as <a href="/wiki/Passport" title="Passport">passports</a>, <a href="/wiki/Driver%27s_license" title="Driver&#39;s license">driver's licenses</a>, <a href="/wiki/Library_card" title="Library card">library cards</a>, banking or <a href="/wiki/Credit_card" title="Credit card">credit cards</a> are also used to verify identity. </p><p>If the form of the identity card is "machine-readable", usually using an encoded magnetic stripe or identification number (such as a <a href="/wiki/Social_Security_number" title="Social Security number">Social Security number</a>), it corroborates the subject's identifying data. In this case it may create an electronic trail when it is checked and scanned, which can be used in profiling, as mentioned above. </p> <div class="mw-heading mw-heading3"><h3 id="Wireless_tracking">Wireless tracking</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Surveillance&amp;action=edit&amp;section=13" title="Edit section: Wireless tracking"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>This section refers to methods that involve the monitoring of <a href="/wiki/Tracking_device" class="mw-redirect" title="Tracking device">tracking devices</a> through the aid of wireless signals. </p> <div class="mw-heading mw-heading4"><h4 id="Mobile_phones">Mobile phones</h4><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Surveillance&amp;action=edit&amp;section=14" title="Edit section: Mobile phones"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>Mobile carrier antennas are also commonly used to collect geolocation data on mobile phones. The geographical location of a powered mobile phone (and thus the person carrying it) can be determined easily (whether it is being used or not), using a technique known as <a href="/wiki/Multilateration" class="mw-redirect" title="Multilateration">multilateration</a> to calculate the differences in time for a signal to travel from the cell phone to each of several <a href="/wiki/Cell_towers" class="mw-redirect" title="Cell towers">cell towers</a> near the owner of the phone.<sup id="cite_ref-bbc-phone-locate_32-1" class="reference"><a href="#cite_note-bbc-phone-locate-32"><span class="cite-bracket">&#91;</span>32<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-foxnews-phone-locate_33-1" class="reference"><a href="#cite_note-foxnews-phone-locate-33"><span class="cite-bracket">&#91;</span>33<span class="cite-bracket">&#93;</span></a></sup> Dr. Victor Kappeler<sup id="cite_ref-112" class="reference"><a href="#cite_note-112"><span class="cite-bracket">&#91;</span>112<span class="cite-bracket">&#93;</span></a></sup> of Eastern Kentucky University indicates that police surveillance is a strong concern, stating the following statistics from 2013: </p> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1244412712"><blockquote class="templatequote"><p>Of the 321,545 law enforcement requests made to Verizon, 54,200 of these requests were for "content" or "location" information—not just cell phone numbers or IP addresses. Content information included the actual text of messages, emails and the wiretapping of voice or messaging content in real-time.</p></blockquote> <p>A comparatively new off-the-shelf surveillance device is an <a href="/wiki/IMSI-catcher" title="IMSI-catcher">IMSI-catcher</a>, a <a href="/wiki/Telephone_tapping" class="mw-redirect" title="Telephone tapping">telephone eavesdropping</a> device used to intercept mobile phone traffic and track the movement of mobile phone users. Essentially a "fake" <a href="/wiki/Cell_site" title="Cell site">mobile tower</a> acting between the target mobile phone and the service provider's real towers, it is considered a <a href="/wiki/Man-in-the-middle_attack" title="Man-in-the-middle attack">man-in-the-middle</a> (MITM) attack. IMSI-catchers are used in some countries by <a href="/wiki/Law_enforcement_agency" title="Law enforcement agency">law enforcement</a> and <a href="/wiki/Intelligence_agency" title="Intelligence agency">intelligence agencies</a>, but their use has raised significant civil liberty and privacy concerns and is strictly regulated in some countries.<sup id="cite_ref-113" class="reference"><a href="#cite_note-113"><span class="cite-bracket">&#91;</span>113<span class="cite-bracket">&#93;</span></a></sup> </p><p>In March 2020, British daily <a href="/wiki/The_Guardian" title="The Guardian">The Guardian</a>, based on the claims of a <a href="/wiki/Whistleblower" class="mw-redirect" title="Whistleblower">whistleblower</a>, accused the government of <a href="/wiki/Saudi_Arabia" title="Saudi Arabia">Saudi Arabia</a> of exploiting global mobile telecom network weaknesses to spy on its citizens traveling around the <a href="/wiki/United_States" title="United States">United States</a>.<sup id="cite_ref-114" class="reference"><a href="#cite_note-114"><span class="cite-bracket">&#91;</span>114<span class="cite-bracket">&#93;</span></a></sup> The data shared by the whistleblower in support of the claims, showed that a systematic <a href="/wiki/Spying" class="mw-redirect" title="Spying">spying</a> campaign was being run by the kingdom exploiting the flaws of <a href="/wiki/Signalling_System_No._7" title="Signalling System No. 7">SS7</a>, a global messaging system. The data showed that millions of secret tracking commands originated from Saudi in a duration of four-months, starting from November 2019.<sup id="cite_ref-115" class="reference"><a href="#cite_note-115"><span class="cite-bracket">&#91;</span>115<span class="cite-bracket">&#93;</span></a></sup> </p> <div class="mw-heading mw-heading4"><h4 id="RFID_tagging">RFID tagging</h4><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Surveillance&amp;action=edit&amp;section=15" title="Edit section: RFID tagging"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <figure class="mw-default-size mw-halign-left" typeof="mw:File/Thumb"><a href="/wiki/File:Paypass_chip_front.png" class="mw-file-description"><img src="//upload.wikimedia.org/wikipedia/commons/thumb/c/c8/Paypass_chip_front.png/170px-Paypass_chip_front.png" decoding="async" width="170" height="179" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/c/c8/Paypass_chip_front.png/255px-Paypass_chip_front.png 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/c/c8/Paypass_chip_front.png/340px-Paypass_chip_front.png 2x" data-file-width="670" data-file-height="704" /></a><figcaption>RFID chip pulled from a new credit card</figcaption></figure> <p><a href="/wiki/Radio-frequency_identification" title="Radio-frequency identification">Radio-frequency identification</a> (RFID) tagging is the use of very small electronic devices (called "RFID tags") which are applied to or incorporated into a product, animal, or person for the purpose of identification and tracking using radio waves. The tags can be read from several meters away. They are extremely inexpensive, costing a few cents per piece, so they can be inserted into many types of everyday products without significantly increasing the price, and can be used to track and identify these objects for a variety of purposes. </p><p>Some companies appear to be "tagging" their workers by incorporating RFID tags in employee ID badges. Workers in U.K. considered <a href="/wiki/Strike_action" title="Strike action">strike action</a> in protest of having themselves tagged; they felt that it was <a href="/wiki/Dehumanisation" class="mw-redirect" title="Dehumanisation">dehumanizing</a> to have all of their movements tracked with RFID chips.<sup id="cite_ref-rfid-strike-uk_116-0" class="reference"><a href="#cite_note-rfid-strike-uk-116"><span class="cite-bracket">&#91;</span>116<span class="cite-bracket">&#93;</span></a></sup><sup class="noprint Inline-Template" style="margin-left:0.1em; white-space:nowrap;">&#91;<i><a href="/wiki/Wikipedia:Vagueness" title="Wikipedia:Vagueness"><span title="This information is too vague. (March 2012)">vague</span></a></i>&#93;</sup> Some critics have expressed fears that people will soon be tracked and scanned everywhere they go.<sup id="cite_ref-usatoday-verichip_117-0" class="reference"><a href="#cite_note-usatoday-verichip-117"><span class="cite-bracket">&#91;</span>117<span class="cite-bracket">&#93;</span></a></sup> On the other hand, RFID tags in newborn baby ID bracelets put on by hospitals have foiled kidnappings.<sup id="cite_ref-rfid-strike-uk_116-1" class="reference"><a href="#cite_note-rfid-strike-uk-116"><span class="cite-bracket">&#91;</span>116<span class="cite-bracket">&#93;</span></a></sup> </p><p>In a 2003 editorial, CNET News.com's chief political correspondent, Declan McCullagh, speculated that, soon, every object that is purchased, and perhaps ID cards, will have RFID devices in them, which would respond with information about people as they walk past scanners (what type of phone they have, what type of shoes they have on, which books they are carrying, what credit cards or membership cards they have, etc.). This information could be used for identification, tracking, or <a href="/wiki/Targeted_marketing" class="mw-redirect" title="Targeted marketing">targeted marketing</a>. As of 2021<sup class="plainlinks noexcerpt noprint asof-tag update" style="display:none;"><a class="external text" href="https://en.wikipedia.org/w/index.php?title=Surveillance&amp;action=edit">&#91;update&#93;</a></sup>, this has largely not come to pass.<sup id="cite_ref-mccullagh-rfid_118-0" class="reference"><a href="#cite_note-mccullagh-rfid-118"><span class="cite-bracket">&#91;</span>118<span class="cite-bracket">&#93;</span></a></sup> </p> <div style="clear:both;" class=""></div> <div class="mw-heading mw-heading4"><h4 id="RFID_tagging_on_humans">RFID tagging on humans</h4><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Surveillance&amp;action=edit&amp;section=16" title="Edit section: RFID tagging on humans"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236090951"><div role="note" class="hatnote navigation-not-searchable">Main article: <a href="/wiki/Microchip_implant_(human)" title="Microchip implant (human)">Microchip implant (human)</a></div> <figure class="mw-default-size mw-halign-right" typeof="mw:File/Thumb"><a href="/wiki/File:RFID_hand_1.jpg" class="mw-file-description"><img src="//upload.wikimedia.org/wikipedia/commons/thumb/9/99/RFID_hand_1.jpg/220px-RFID_hand_1.jpg" decoding="async" width="220" height="165" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/9/99/RFID_hand_1.jpg/330px-RFID_hand_1.jpg 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/9/99/RFID_hand_1.jpg/440px-RFID_hand_1.jpg 2x" data-file-width="640" data-file-height="480" /></a><figcaption>Hand with planned insertion point for Verichip device</figcaption></figure> <p>A human microchip implant is an identifying integrated circuit device or <a href="/wiki/RFID" class="mw-redirect" title="RFID">RFID</a> transponder encased in <a href="/wiki/Silicate_glass" class="mw-redirect" title="Silicate glass">silicate glass</a> and implanted in the body of a human being. A <a href="/wiki/Subdermal_implant" title="Subdermal implant">subdermal implant</a> typically contains a unique ID number that can be linked to information contained in an external database, such as personal identification, medical history, medications, allergies, and contact information. </p><p>Several types of microchips have been developed in order to control and monitor certain types of people, such as criminals, political figures and spies,<sup class="noprint Inline-Template" style="margin-left:0.1em; white-space:nowrap;">&#91;<i><a href="/wiki/Wikipedia:Please_clarify" title="Wikipedia:Please clarify"><span title="The text near this tag may need clarification or removal of jargon. (February 2016)">clarification needed</span></a></i>&#93;</sup> a "killer" tracking chip patent was filed at the German Patent and Trademark Office (DPMA) around May 2009. </p><p><a href="/wiki/Verichip" class="mw-redirect" title="Verichip">Verichip</a> is an RFID device produced by a company called Applied Digital Solutions (ADS). Verichip is slightly larger than a grain of rice, and is injected under the skin. The injection reportedly feels similar to receiving a <a href="/wiki/Injection_(medicine)" title="Injection (medicine)">shot</a>. The chip is encased in glass, and stores a "VeriChip Subscriber Number" which the scanner uses to access their personal information, via the Internet, from Verichip Inc.'s database, the "Global VeriChip Subscriber Registry". Thousands of people have already had them inserted.<sup id="cite_ref-usatoday-verichip_117-1" class="reference"><a href="#cite_note-usatoday-verichip-117"><span class="cite-bracket">&#91;</span>117<span class="cite-bracket">&#93;</span></a></sup> In Mexico, for example, 160 workers at the Attorney General's office were required to have the chip injected for identity verification and <a href="/wiki/Access_control" title="Access control">access control</a> purposes.<sup id="cite_ref-mex-pig-verichip_119-0" class="reference"><a href="#cite_note-mex-pig-verichip-119"><span class="cite-bracket">&#91;</span>119<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-csm-mexico-verichip_120-0" class="reference"><a href="#cite_note-csm-mexico-verichip-120"><span class="cite-bracket">&#91;</span>120<span class="cite-bracket">&#93;</span></a></sup> </p><p>Implantable microchips have also been used in healthcare settings, but ethnographic researchers have identified a number of ethical problems with such uses; these problems include unequal treatment, diminished trust, and possible endangerment of patients.<sup id="cite_ref-RFID-implants_121-0" class="reference"><a href="#cite_note-RFID-implants-121"><span class="cite-bracket">&#91;</span>121<span class="cite-bracket">&#93;</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Radar">Radar</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Surveillance&amp;action=edit&amp;section=17" title="Edit section: Radar"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <div class="excerpt-block"><style data-mw-deduplicate="TemplateStyles:r1066933788">.mw-parser-output .excerpt-hat .mw-editsection-like{font-style:normal}</style><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236090951"><div role="note" class="hatnote navigation-not-searchable dablink excerpt-hat selfref">This section is an excerpt from <a href="/wiki/Perimeter_surveillance_radar" title="Perimeter surveillance radar">Perimeter surveillance radar</a>.<span class="mw-editsection-like plainlinks"><span class="mw-editsection-bracket">[</span><a class="external text" href="https://en.wikipedia.org/w/index.php?title=Perimeter_surveillance_radar&amp;action=edit">edit</a><span class="mw-editsection-bracket">]</span></span></div><div class="excerpt"> <p><a href="/wiki/Perimeter_surveillance_radar" title="Perimeter surveillance radar">Perimeter surveillance radar</a> (PSR) is a class of radar sensors that monitor activity surrounding or on critical infrastructure areas such as airports,<sup id="cite_ref-122" class="reference"><a href="#cite_note-122"><span class="cite-bracket">&#91;</span>122<span class="cite-bracket">&#93;</span></a></sup> seaports, military installations, national borders, refineries and other critical industry and the like. Such radars are characterized by their ability to detect movement at ground level of targets such as an individual walking or crawling towards a facility. Such radars typically have ranges of several hundred metres to over 10 kilometres.<sup id="cite_ref-123" class="reference"><a href="#cite_note-123"><span class="cite-bracket">&#91;</span>123<span class="cite-bracket">&#93;</span></a></sup> </p> Alternate technologies include laser-based systems. These have the potential for very high target position accuracy, however they are less effective in the presence of fog and other obscurants.</div></div> <div class="mw-heading mw-heading3"><h3 id="Geolocation_devices">Geolocation devices</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Surveillance&amp;action=edit&amp;section=18" title="Edit section: Geolocation devices"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <div class="mw-heading mw-heading4"><h4 id="Global_Positioning_System">Global Positioning System</h4><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Surveillance&amp;action=edit&amp;section=19" title="Edit section: Global Positioning System"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <figure class="mw-default-size mw-halign-right" typeof="mw:File/Thumb"><a href="/wiki/File:ConstellationGPS.gif" class="mw-file-description"><img src="//upload.wikimedia.org/wikipedia/commons/thumb/9/9c/ConstellationGPS.gif/220px-ConstellationGPS.gif" decoding="async" width="220" height="176" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/9/9c/ConstellationGPS.gif 1.5x" data-file-width="240" data-file-height="192" /></a><figcaption>Diagram of GPS satellites orbiting Earth</figcaption></figure> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236090951"><div role="note" class="hatnote navigation-not-searchable">See also: <a href="/wiki/GPS_tracking" class="mw-redirect" title="GPS tracking">GPS tracking</a></div> <p>In the U.S., police have planted hidden <a href="/wiki/Global_positioning_system" class="mw-redirect" title="Global positioning system">GPS</a> tracking devices in people's vehicles to monitor their movements,<sup id="cite_ref-124" class="reference"><a href="#cite_note-124"><span class="cite-bracket">&#91;</span>124<span class="cite-bracket">&#93;</span></a></sup> without a warrant.<sup id="cite_ref-125" class="reference"><a href="#cite_note-125"><span class="cite-bracket">&#91;</span>125<span class="cite-bracket">&#93;</span></a></sup> In early 2009, they were arguing in court that they have the right to do this.<sup id="cite_ref-fbi-warrantless-gps_126-0" class="reference"><a href="#cite_note-fbi-warrantless-gps-126"><span class="cite-bracket">&#91;</span>126<span class="cite-bracket">&#93;</span></a></sup> </p><p>Several cities are running pilot projects to require parolees to wear GPS devices to track their movements when they get out of prison.<sup id="cite_ref-verichip-legal_127-0" class="reference"><a href="#cite_note-verichip-legal-127"><span class="cite-bracket">&#91;</span>127<span class="cite-bracket">&#93;</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Devices">Devices</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Surveillance&amp;action=edit&amp;section=20" title="Edit section: Devices"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236090951"><div role="note" class="hatnote navigation-not-searchable">See also: <a href="/wiki/United_States_v._Spy_Factory,_Inc." title="United States v. Spy Factory, Inc.">United States v. Spy Factory, Inc.</a></div> <p><a href="/wiki/Covert_listening_device" title="Covert listening device">Covert listening devices</a> and video devices, or "bugs", are hidden electronic devices which are used to capture, record, and/or transmit data to a receiving party such as a law enforcement agency. </p><p>The U.S. has run numerous domestic intelligence operations, such as <a href="/wiki/COINTELPRO" title="COINTELPRO">COINTELPRO</a>, which have bugged the homes, offices, and vehicles of thousands of U.S. citizens, usually <a href="/wiki/Political_activists" class="mw-redirect" title="Political activists">political activists</a>, <a href="/wiki/Subversives" class="mw-redirect" title="Subversives">subversives</a>, and <a href="/wiki/Criminals" class="mw-redirect" title="Criminals">criminals</a>.<sup id="cite_ref-wolf-cointelpro_128-0" class="reference"><a href="#cite_note-wolf-cointelpro-128"><span class="cite-bracket">&#91;</span>128<span class="cite-bracket">&#93;</span></a></sup> </p><p>Law enforcement and intelligence services in the U.K. and the United States possess technology to remotely activate the microphones in cell phones, by accessing the phone's diagnostic/maintenance features, in order to listen to conversations that take place nearby the person who holds the phone.<sup id="cite_ref-roving-bugs_26-1" class="reference"><a href="#cite_note-roving-bugs-26"><span class="cite-bracket">&#91;</span>26<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-uk-mobile-bug_27-1" class="reference"><a href="#cite_note-uk-mobile-bug-27"><span class="cite-bracket">&#91;</span>27<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-noaa-phone_28-1" class="reference"><a href="#cite_note-noaa-phone-28"><span class="cite-bracket">&#91;</span>28<span class="cite-bracket">&#93;</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Postal_services">Postal services</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Surveillance&amp;action=edit&amp;section=21" title="Edit section: Postal services"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>As more people use faxes and e-mail the significance of surveilling the postal system is decreasing, in favor of Internet and telephone surveillance. But interception of post is still an available option for law enforcement and intelligence agencies, in certain circumstances.<sup id="cite_ref-129" class="reference"><a href="#cite_note-129"><span class="cite-bracket">&#91;</span>129<span class="cite-bracket">&#93;</span></a></sup> This is not a common practice, however, and entities like the US Army require high levels of approval to conduct.<sup id="cite_ref-130" class="reference"><a href="#cite_note-130"><span class="cite-bracket">&#91;</span>130<span class="cite-bracket">&#93;</span></a></sup> </p><p>The U.S. <a href="/wiki/Central_Intelligence_Agency" title="Central Intelligence Agency">Central Intelligence Agency</a> and <a href="/wiki/Federal_Bureau_of_Investigation" title="Federal Bureau of Investigation">Federal Bureau of Investigation</a> have performed twelve separate mail-opening campaigns targeted towards U.S. citizens. In one of these programs, more than 215,000 communications were intercepted, opened, and photographed.<sup id="cite_ref-senate-mail-opening_131-0" class="reference"><a href="#cite_note-senate-mail-opening-131"><span class="cite-bracket">&#91;</span>131<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-political-repression_132-0" class="reference"><a href="#cite_note-political-repression-132"><span class="cite-bracket">&#91;</span>132<span class="cite-bracket">&#93;</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Stakeout">Stakeout</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Surveillance&amp;action=edit&amp;section=22" title="Edit section: Stakeout"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236090951"><div role="note" class="hatnote navigation-not-searchable">"Stakeout" redirects here. For other uses, see <a href="/wiki/Stakeout_(disambiguation)" class="mw-disambig" title="Stakeout (disambiguation)">Stakeout (disambiguation)</a>.</div> <p>A <b>stakeout</b> is the coordinated surveillance of a location or person. Stakeouts are generally performed covertly and for the purpose of gathering <a href="/wiki/Evidence" title="Evidence">evidence</a> related to <a href="/wiki/Criminal_activity" class="mw-redirect" title="Criminal activity">criminal activity</a>. The term derives from the practice by <a href="/wiki/Land_surveyor" class="mw-redirect" title="Land surveyor">land surveyors</a> of using <a href="/wiki/Survey_stakes" class="mw-redirect" title="Survey stakes">survey stakes</a> to measure out an area before the main building project begins. </p> <div class="mw-heading mw-heading3"><h3 id="Internet_of_things">Internet of things</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Surveillance&amp;action=edit&amp;section=23" title="Edit section: Internet of things"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>The <a href="/wiki/Internet_of_Things" class="mw-redirect" title="Internet of Things">Internet of Things</a> (IoT), is a network of physical devices. These devices can collect data to one another without human intervention. IoTs can be used for identification, monitoring, location tracking, and health tracking.<sup id="cite_ref-:2_133-0" class="reference"><a href="#cite_note-:2-133"><span class="cite-bracket">&#91;</span>133<span class="cite-bracket">&#93;</span></a></sup> While IoTs can be used as time-saving tools that make activities simpler, they raise the concern of government surveillance and privacy regarding how data will be used.<sup id="cite_ref-:2_133-1" class="reference"><a href="#cite_note-:2-133"><span class="cite-bracket">&#91;</span>133<span class="cite-bracket">&#93;</span></a></sup> </p> <div class="mw-heading mw-heading2"><h2 id="Controversy">Controversy</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Surveillance&amp;action=edit&amp;section=24" title="Edit section: Controversy"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <figure class="mw-default-size mw-halign-right" typeof="mw:File/Thumb"><a href="/wiki/File:Bansky_one_nation_under_cctv.jpg" class="mw-file-description"><img src="//upload.wikimedia.org/wikipedia/commons/thumb/8/8a/Bansky_one_nation_under_cctv.jpg/220px-Bansky_one_nation_under_cctv.jpg" decoding="async" width="220" height="147" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/8/8a/Bansky_one_nation_under_cctv.jpg/330px-Bansky_one_nation_under_cctv.jpg 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/8/8a/Bansky_one_nation_under_cctv.jpg/440px-Bansky_one_nation_under_cctv.jpg 2x" data-file-width="800" data-file-height="535" /></a><figcaption>Graffiti expressing concern about the proliferation of video surveillance</figcaption></figure> <div class="mw-heading mw-heading3"><h3 id="Support">Support</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Surveillance&amp;action=edit&amp;section=25" title="Edit section: Support"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>Supporters of surveillance systems believe that these tools can help protect society from <a href="/wiki/Terrorists" class="mw-redirect" title="Terrorists">terrorists</a> and <a href="/wiki/Criminals" class="mw-redirect" title="Criminals">criminals</a>. They argue that surveillance can reduce crime by three means: by deterrence, by observation, and by reconstruction. Surveillance can deter by increasing the chance of being caught, and by revealing the <a href="/wiki/Modus_operandi" title="Modus operandi">modus operandi</a>. This requires a minimal level of invasiveness.<sup id="cite_ref-Deviant_Behaviour_-_Socially_accepted_observation_of_behaviour_for_security_134-0" class="reference"><a href="#cite_note-Deviant_Behaviour_-_Socially_accepted_observation_of_behaviour_for_security-134"><span class="cite-bracket">&#91;</span>134<span class="cite-bracket">&#93;</span></a></sup> </p><p>Another method on how surveillance can be used to fight criminal activity is by linking the information stream obtained from them to a recognition system (for instance, a camera system that has its feed run through a facial recognition system). This can for instance auto-recognize fugitives and direct police to their location. </p><p>A distinction here has to be made however on the type of surveillance employed. Some people that support video surveillance in city streets may not support indiscriminate telephone taps and vice versa. Besides the types, the way in which this surveillance is done also matters a lot; i.e. indiscriminate telephone taps are supported by much fewer people than say telephone taps done only to people suspected of engaging in illegal activities. </p><p>Surveillance can also be used to give human operatives a tactical advantage through improved situational awareness, or through the use of automated processes, i.e. <a href="/wiki/Video_analytics" class="mw-redirect" title="Video analytics">video analytics</a>. Surveillance can help reconstruct an incident and prove guilt through the availability of footage for forensics experts. Surveillance can also influence subjective security if surveillance resources are visible or if the consequences of surveillance can be felt. </p><p>Some of the surveillance systems (such as the camera system that has its feed run through a facial recognition system mentioned above) can also have other uses besides countering criminal activity. For instance, it can help in retrieving runaway children, abducted or missing adults and mentally disabled people. Other supporters simply believe that there is nothing that can be done about the loss of privacy, and that people must become accustomed to having no privacy. As <a href="/wiki/Sun_Microsystems" title="Sun Microsystems">Sun Microsystems</a> CEO <a href="/wiki/Scott_McNealy" title="Scott McNealy">Scott McNealy</a> said: "You have zero privacy anyway. Get over it."<sup id="cite_ref-sun-getoverit_135-0" class="reference"><a href="#cite_note-sun-getoverit-135"><span class="cite-bracket">&#91;</span>135<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-bw-getoverit_136-0" class="reference"><a href="#cite_note-bw-getoverit-136"><span class="cite-bracket">&#91;</span>136<span class="cite-bracket">&#93;</span></a></sup> </p><p>Another common argument is: "<a href="/wiki/Nothing_to_hide_argument" title="Nothing to hide argument">If you aren't doing something wrong then you don't have anything to fear</a>." That is, one does not have a right to privacy regarding illegal activities, while those following the law suffer no harm from surveillance and so have no standing to object to it. Beyond the heroically self-serving identification of what is wrong with what is illegal, the ethical fly in this ointment is the tacit premise that the individual has no duty to preserve the health of the state—the antithesis of the principle that only the consent of the governed can adequately serve as the moral foundation of a (just) state and warrant the vast gulf between its power (and agency) and that of the individual. <sup id="cite_ref-137" class="reference"><a href="#cite_note-137"><span class="cite-bracket">&#91;</span>137<span class="cite-bracket">&#93;</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Opposition">Opposition</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Surveillance&amp;action=edit&amp;section=26" title="Edit section: Opposition"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <figure class="mw-default-size" typeof="mw:File/Thumb"><a href="/wiki/File:Sheung_Yuet_Road_lamppost_after_protesters_destroy_20190824.jpg" class="mw-file-description"><img src="//upload.wikimedia.org/wikipedia/commons/thumb/c/ca/Sheung_Yuet_Road_lamppost_after_protesters_destroy_20190824.jpg/220px-Sheung_Yuet_Road_lamppost_after_protesters_destroy_20190824.jpg" decoding="async" width="220" height="147" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/c/ca/Sheung_Yuet_Road_lamppost_after_protesters_destroy_20190824.jpg/330px-Sheung_Yuet_Road_lamppost_after_protesters_destroy_20190824.jpg 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/c/ca/Sheung_Yuet_Road_lamppost_after_protesters_destroy_20190824.jpg/440px-Sheung_Yuet_Road_lamppost_after_protesters_destroy_20190824.jpg 2x" data-file-width="2736" data-file-height="1824" /></a><figcaption>Surveillance lamppost brought down in Hong Kong by citizens fearing state surveillance</figcaption></figure> <figure class="mw-default-size" typeof="mw:File/Thumb"><a href="/wiki/File:UncleSamListensIn.jpg" class="mw-file-description"><img src="//upload.wikimedia.org/wikipedia/commons/thumb/4/46/UncleSamListensIn.jpg/170px-UncleSamListensIn.jpg" decoding="async" width="170" height="227" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/4/46/UncleSamListensIn.jpg/255px-UncleSamListensIn.jpg 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/4/46/UncleSamListensIn.jpg/340px-UncleSamListensIn.jpg 2x" data-file-width="1535" data-file-height="2047" /></a><figcaption>An elaborate <a href="/wiki/Graffiti" title="Graffiti">graffito</a> in Columbus, Ohio, depicting state surveillance of <a href="/wiki/Telecommunications" title="Telecommunications">telecommunications</a> </figcaption></figure> <p>With the advent of programs such as the <a href="/wiki/Total_Information_Awareness" title="Total Information Awareness">Total Information Awareness</a> program and <a href="/wiki/ADVISE" title="ADVISE">ADVISE</a>, technologies such as <a href="/wiki/NarusInsight" class="mw-redirect" title="NarusInsight">high speed surveillance computers</a> and <a class="mw-selflink-fragment" href="#Biometric">biometrics</a> software, and laws such as the <a href="/wiki/Communications_Assistance_for_Law_Enforcement_Act" title="Communications Assistance for Law Enforcement Act">Communications Assistance for Law Enforcement Act</a>, governments now possess an unprecedented ability to monitor the activities of their subjects.<sup id="cite_ref-us-surveillance-soc_138-0" class="reference"><a href="#cite_note-us-surveillance-soc-138"><span class="cite-bracket">&#91;</span>138<span class="cite-bracket">&#93;</span></a></sup> Many <a href="/wiki/Civil_rights" class="mw-redirect" title="Civil rights">civil rights</a> and <a href="/wiki/Privacy" title="Privacy">privacy</a> groups, such as the <a href="/wiki/Electronic_Frontier_Foundation" title="Electronic Frontier Foundation">Electronic Frontier Foundation</a> and <a href="/wiki/American_Civil_Liberties_Union" title="American Civil Liberties Union">American Civil Liberties Union</a>, have expressed concern that by allowing continual increases in government surveillance of citizens we will end up in a <a href="/wiki/Mass_surveillance" title="Mass surveillance">mass surveillance</a> society, with extremely limited, or non-existent political and/or personal freedoms. Fears such as this have led to numerous lawsuits such as <i><a href="/wiki/Hepting_v._AT%26T" title="Hepting v. AT&amp;T">Hepting v. AT&amp;T</a></i>.<sup id="cite_ref-us-surveillance-soc_138-1" class="reference"><a href="#cite_note-us-surveillance-soc-138"><span class="cite-bracket">&#91;</span>138<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-bigger-monster_139-0" class="reference"><a href="#cite_note-bigger-monster-139"><span class="cite-bracket">&#91;</span>139<span class="cite-bracket">&#93;</span></a></sup> </p><p>Some critics state that the claim made by supporters should be modified to read: "As long as we do what we're told, we have nothing to fear." For instance, a person who is part of a political group which opposes the policies of the national government, might not want the government to know their names and what they have been reading, so that the government cannot easily subvert their organization, arrest, or kill them. Other critics state that while a person might not have anything to hide right now, the government might later implement policies that they do wish to oppose, and that opposition might then be impossible due to mass surveillance enabling the government to identify and remove political threats. Further, other critics point to the fact that most people <i>do</i> have things to hide. For example, if a person is looking for a new job, they might not want their current employer to know this. Also if an employer wishes total privacy to watch over their own employee and secure their financial information it may become impossible, and they may not wish to hire those under surveillance. </p><p>In December 2017, the Government of China took steps to oppose widespread surveillance by security-company cameras, webcams, and <a href="/wiki/IP_camera" title="IP camera">IP cameras</a> after tens-of-thousands were made accessible for internet viewing by IT company <a href="/wiki/Qihoo" class="mw-redirect" title="Qihoo">Qihoo</a><sup id="cite_ref-140" class="reference"><a href="#cite_note-140"><span class="cite-bracket">&#91;</span>140<span class="cite-bracket">&#93;</span></a></sup> </p> <div class="mw-heading mw-heading4"><h4 id="Totalitarianism">Totalitarianism</h4><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Surveillance&amp;action=edit&amp;section=27" title="Edit section: Totalitarianism"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <figure class="mw-default-size" typeof="mw:File/Thumb"><a href="/wiki/File:Sur-veillance-trafficcam-glog.jpg" class="mw-file-description"><img src="//upload.wikimedia.org/wikipedia/commons/thumb/e/eb/Sur-veillance-trafficcam-glog.jpg/170px-Sur-veillance-trafficcam-glog.jpg" decoding="async" width="170" height="408" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/e/eb/Sur-veillance-trafficcam-glog.jpg/255px-Sur-veillance-trafficcam-glog.jpg 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/e/eb/Sur-veillance-trafficcam-glog.jpg/340px-Sur-veillance-trafficcam-glog.jpg 2x" data-file-width="500" data-file-height="1200" /></a><figcaption>A traffic camera atop a high pole oversees a road in the Canadian city of Toronto.</figcaption></figure> <p>Programs such as the <a href="/wiki/Total_Information_Awareness" title="Total Information Awareness">Total Information Awareness</a> program, and laws such as the <a href="/wiki/Communications_Assistance_For_Law_Enforcement_Act" class="mw-redirect" title="Communications Assistance For Law Enforcement Act">Communications Assistance For Law Enforcement Act</a> have led many groups to fear that society is moving towards a state of <a href="/wiki/Mass_surveillance" title="Mass surveillance">mass surveillance</a> with severely limited personal, social, political freedoms, where dissenting individuals or groups will be strategically removed in <a href="/wiki/COINTELPRO" title="COINTELPRO">COINTELPRO</a>-like purges.<sup id="cite_ref-us-surveillance-soc_138-2" class="reference"><a href="#cite_note-us-surveillance-soc-138"><span class="cite-bracket">&#91;</span>138<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-bigger-monster_139-1" class="reference"><a href="#cite_note-bigger-monster-139"><span class="cite-bracket">&#91;</span>139<span class="cite-bracket">&#93;</span></a></sup> </p><p>Kate Martin, of the Center For National Security Studies said of the use of military spy satellites being used to monitor the activities of U.S. citizens: "They are laying the bricks one at a time for a police state."<sup id="cite_ref-washpost-sat_110-1" class="reference"><a href="#cite_note-washpost-sat-110"><span class="cite-bracket">&#91;</span>110<span class="cite-bracket">&#93;</span></a></sup> </p><p>Some point to the blurring of lines between public and private places, and the privatization of places traditionally seen as public (such as shopping malls and industrial parks) as illustrating the increasing legality of collecting personal information.<sup id="cite_ref-Marx_et_al,_2007_141-0" class="reference"><a href="#cite_note-Marx_et_al,_2007-141"><span class="cite-bracket">&#91;</span>141<span class="cite-bracket">&#93;</span></a></sup> Traveling through many public places such as government offices is hardly optional for most people, yet consumers have little choice but to submit to companies' surveillance practices.<sup id="cite_ref-Agre,_2003_142-0" class="reference"><a href="#cite_note-Agre,_2003-142"><span class="cite-bracket">&#91;</span>142<span class="cite-bracket">&#93;</span></a></sup> Surveillance techniques are not created equal; among the many <a href="/wiki/Biometric" class="mw-redirect" title="Biometric">biometric</a> identification technologies, for instance, <a href="/wiki/Face_recognition" class="mw-redirect" title="Face recognition">face recognition</a> requires the least cooperation. Unlike automatic fingerprint reading, which requires an individual to press a finger against a machine, this technique is subtle and requires little to no consent.<sup id="cite_ref-Agre,_2003_142-1" class="reference"><a href="#cite_note-Agre,_2003-142"><span class="cite-bracket">&#91;</span>142<span class="cite-bracket">&#93;</span></a></sup> </p> <div class="mw-heading mw-heading4"><h4 id="Psychological/social_effects"><span id="Psychological.2Fsocial_effects"></span>Psychological/social effects</h4><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Surveillance&amp;action=edit&amp;section=28" title="Edit section: Psychological/social effects"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236090951"><div role="note" class="hatnote navigation-not-searchable">See also: <a href="/wiki/Hawthorne_effect" title="Hawthorne effect">Hawthorne effect</a></div> <p>Some critics, such as <a href="/wiki/Michel_Foucault" title="Michel Foucault">Michel Foucault</a>, believe that in addition to its obvious function of identifying and capturing individuals who are committing undesirable acts, surveillance also functions to create in everyone a feeling of always being watched, so that they become self-policing. This allows the State to control the populace without having to resort to physical force, which is expensive and otherwise problematic.<sup id="cite_ref-foucault-discipline_143-0" class="reference"><a href="#cite_note-foucault-discipline-143"><span class="cite-bracket">&#91;</span>143<span class="cite-bracket">&#93;</span></a></sup> </p><p>With the development of digital technology, individuals have become increasingly perceptible to one another, as surveillance becomes virtual. Online surveillance is the utilization of the internet to observe one's activity.<sup id="cite_ref-:1_144-0" class="reference"><a href="#cite_note-:1-144"><span class="cite-bracket">&#91;</span>144<span class="cite-bracket">&#93;</span></a></sup> Corporations, citizens, and governments participate in tracking others' behaviours for motivations that arise out of business relations, to curiosity, to legality. In her book <i>Superconnected</i>, <a href="/wiki/Mary_Chayko" title="Mary Chayko">Mary Chayko</a> differentiates between two types of surveillance: vertical and horizontal.<sup id="cite_ref-:1_144-1" class="reference"><a href="#cite_note-:1-144"><span class="cite-bracket">&#91;</span>144<span class="cite-bracket">&#93;</span></a></sup> Vertical surveillance occurs when there is a dominant force, such as the government that is attempting to control or regulate the actions of a given society. Such powerful authorities often justify their incursions as a means to protect society from threats of violence or terrorism. Some individuals question when this becomes an infringement on civil rights.<sup id="cite_ref-:1_144-2" class="reference"><a href="#cite_note-:1-144"><span class="cite-bracket">&#91;</span>144<span class="cite-bracket">&#93;</span></a></sup> </p><p>Horizontal diverges from vertical surveillance as the tracking shifts from an authoritative source to an everyday figure, such as a friend, coworker, or stranger that is interested in one's mundane activities.<sup id="cite_ref-:1_144-3" class="reference"><a href="#cite_note-:1-144"><span class="cite-bracket">&#91;</span>144<span class="cite-bracket">&#93;</span></a></sup> Individuals leave traces of information when they are online that reveal their interests and desires of which others observe. While this can allow people to become interconnected and develop social connections online, it can also increase potential risk to harm, such as <a href="/wiki/Cyberbullying" title="Cyberbullying">cyberbullying</a> or censoring/stalking by strangers, reducing privacy.<sup id="cite_ref-:1_144-4" class="reference"><a href="#cite_note-:1-144"><span class="cite-bracket">&#91;</span>144<span class="cite-bracket">&#93;</span></a></sup> </p><p>In addition, <a href="/wiki/Simone_Browne" title="Simone Browne">Simone Browne</a> argues that surveillance wields an immense racializing quality such that it operates as "racializing surveillance." Browne uses racializing surveillance to refer to moments when enactments of surveillance are used to reify boundaries, borders, and bodies along racial lines and where the outcome is discriminatory treatment of those who are negatively racialized by such surveillance. Browne argues racializing surveillance pertains to policing what is "in or out of place."<sup id="cite_ref-145" class="reference"><a href="#cite_note-145"><span class="cite-bracket">&#91;</span>145<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-146" class="reference"><a href="#cite_note-146"><span class="cite-bracket">&#91;</span>146<span class="cite-bracket">&#93;</span></a></sup> </p> <div class="mw-heading mw-heading4"><h4 id="Privacy">Privacy</h4><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Surveillance&amp;action=edit&amp;section=29" title="Edit section: Privacy"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>Numerous <a href="/wiki/Civil_rights" class="mw-redirect" title="Civil rights">civil rights</a> groups and <a href="/wiki/Privacy" title="Privacy">privacy</a> groups oppose surveillance as a violation of people's right to privacy. Such groups include: <a href="/wiki/Electronic_Privacy_Information_Center" title="Electronic Privacy Information Center">Electronic Privacy Information Center</a>, <a href="/wiki/Electronic_Frontier_Foundation" title="Electronic Frontier Foundation">Electronic Frontier Foundation</a>, <a href="/wiki/American_Civil_Liberties_Union" title="American Civil Liberties Union">American Civil Liberties Union</a> and <a href="/wiki/Privacy_International" title="Privacy International">Privacy International</a>. </p><p>There have been several lawsuits such as <i><a href="/wiki/Hepting_v._AT%26T" title="Hepting v. AT&amp;T">Hepting v. AT&amp;T</a></i> and <i><a href="/wiki/EPIC_v._Department_of_Justice" class="mw-redirect" title="EPIC v. Department of Justice">EPIC v. Department of Justice</a></i> by groups or individuals, opposing certain surveillance activities. </p><p>Legislative proceedings such as those that took place during the <a href="/wiki/Church_Committee" title="Church Committee">Church Committee</a>, which investigated domestic intelligence programs such as <a href="/wiki/COINTELPRO" title="COINTELPRO">COINTELPRO</a>, have also weighed the pros and cons of surveillance. </p> <div class="mw-heading mw-heading4"><h4 id="Court_cases">Court cases</h4><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Surveillance&amp;action=edit&amp;section=30" title="Edit section: Court cases"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p><a href="/wiki/People_v._Diaz" title="People v. Diaz"><i>People vs. Diaz</i> (2011)</a> was a court case in the realm of cell phone privacy, even though the decision was later overturned. In this case, Gregory Diaz was arrested during a sting operation for attempting to sell ecstasy. During his arrest, police searched Diaz's phone and found more incriminating evidence including SMS text messages and photographs depicting illicit activities. During his trial, Diaz attempted to have the information from his cell phone removed from evidence, but the courts deemed it as lawful and Diaz's appeal was denied on the California State Court level and, later, the Supreme Court level. Just three short years after, this decision was overturned in the case <i>Riley vs. California</i> (2014).<sup id="cite_ref-147" class="reference"><a href="#cite_note-147"><span class="cite-bracket">&#91;</span>147<span class="cite-bracket">&#93;</span></a></sup> </p><p><a href="/wiki/Riley_v._California" title="Riley v. California"><i>Riley vs. California</i> (2014)</a> was a <a href="/wiki/Supreme_Court_of_the_United_States" title="Supreme Court of the United States">U.S. Supreme Court</a> case in which a man was arrested for his involvement in a drive-by shooting. A few days after the shooting the police made an arrest of the suspect (Riley), and, during the arrest, the police searched him. However, this search was not only of Riley's person, but also the police opened and searched his cell phone, finding pictures of other weapons, drugs, and of Riley showing gang signs. In court, the question arose whether searching the phone was lawful or if the search was protected by the 4th amendment of the constitution. The decision held that the search of Riley's cell phone during the arrest was illegal, and that it was protected by the 4th Amendment.<sup id="cite_ref-148" class="reference"><a href="#cite_note-148"><span class="cite-bracket">&#91;</span>148<span class="cite-bracket">&#93;</span></a></sup> </p> <div class="mw-heading mw-heading2"><h2 id="Countersurveillance,_inverse_surveillance,_sousveillance"><span id="Countersurveillance.2C_inverse_surveillance.2C_sousveillance"></span>Countersurveillance, inverse surveillance, sousveillance</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Surveillance&amp;action=edit&amp;section=31" title="Edit section: Countersurveillance, inverse surveillance, sousveillance"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p><a href="/wiki/Countersurveillance" title="Countersurveillance">Countersurveillance</a> is the practice of avoiding surveillance or making surveillance difficult. Developments in the late twentieth century have caused counter surveillance to dramatically grow in both scope and complexity, such as the Internet, increasing prevalence of electronic <a href="/wiki/Security_systems" class="mw-redirect" title="Security systems">security systems</a>, high-altitude (and possibly armed) <a href="/wiki/Unmanned_aerial_vehicle" title="Unmanned aerial vehicle">UAVs</a>, and large corporate and government computer databases.<sup id="cite_ref-149" class="reference"><a href="#cite_note-149"><span class="cite-bracket">&#91;</span>149<span class="cite-bracket">&#93;</span></a></sup> Other examples include encrypted messenger apps such as Signal<sup id="cite_ref-150" class="reference"><a href="#cite_note-150"><span class="cite-bracket">&#91;</span>150<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-151" class="reference"><a href="#cite_note-151"><span class="cite-bracket">&#91;</span>151<span class="cite-bracket">&#93;</span></a></sup> and privacy cryptocurrencies such as Monero<sup id="cite_ref-152" class="reference"><a href="#cite_note-152"><span class="cite-bracket">&#91;</span>152<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-153" class="reference"><a href="#cite_note-153"><span class="cite-bracket">&#91;</span>153<span class="cite-bracket">&#93;</span></a></sup> and ZCash.<sup id="cite_ref-154" class="reference"><a href="#cite_note-154"><span class="cite-bracket">&#91;</span>154<span class="cite-bracket">&#93;</span></a></sup> </p><p><a href="/wiki/Inverse_surveillance" class="mw-redirect" title="Inverse surveillance">Inverse surveillance</a> is the practice of the reversal of surveillance on other individuals or groups (e.g., citizens photographing police). Well-known examples include <a href="/wiki/Rodney_King" title="Rodney King">George Holliday</a>'s recording of the <a href="/wiki/Rodney_King" title="Rodney King">Rodney King</a> beating and the organization <a href="/wiki/Copwatch" title="Copwatch">Copwatch</a>, which attempts to monitor police officers to prevent <a href="/wiki/Police_brutality" title="Police brutality">police brutality</a>. Counter-surveillance can be also used in applications to prevent corporate spying, or to track other criminals by certain criminal entities. It can also be used to deter stalking methods used by various entities and organizations. </p><p><i><a href="/wiki/Sousveillance" title="Sousveillance">Sousveillance</a></i> is inverse surveillance, involving the recording by private individuals, rather than government or corporate entities.<sup id="cite_ref-155" class="reference"><a href="#cite_note-155"><span class="cite-bracket">&#91;</span>155<span class="cite-bracket">&#93;</span></a></sup> </p> <div class="mw-heading mw-heading2"><h2 id="Popular_culture">Popular culture</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Surveillance&amp;action=edit&amp;section=32" title="Edit section: Popular culture"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <div class="mw-heading mw-heading3"><h3 id="In_literature">In literature</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Surveillance&amp;action=edit&amp;section=33" title="Edit section: In literature"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <ul><li><a href="/wiki/George_Orwell" title="George Orwell">George Orwell</a>'s novel <i><a href="/wiki/Nineteen_Eighty-Four" title="Nineteen Eighty-Four">Nineteen Eighty-Four</a></i> portrays a fictional <a href="/wiki/Totalitarian" class="mw-redirect" title="Totalitarian">totalitarian</a> surveillance society with a very simple <a href="/wiki/Mass_surveillance" title="Mass surveillance">mass surveillance</a> system consisting of human operatives, informants, and two-way "telescreens" in people's homes. Because of the impact of this book, mass-surveillance technologies are commonly called "Orwellian" when they are considered problematic.</li> <li>The book <i><a href="/wiki/The_Handmaid%27s_Tale" title="The Handmaid&#39;s Tale">The Handmaid's Tale</a></i>, as well as a film and TV series based on it, portray a totalitarian Christian <a href="/wiki/Theocracy" title="Theocracy">theocracy</a> where all citizens are kept under constant surveillance.</li> <li>In the book <i><a href="/wiki/The_Girl_with_the_Dragon_Tattoo" title="The Girl with the Dragon Tattoo">The Girl with the Dragon Tattoo</a></i>, <a href="/wiki/Lisbeth_Salander" title="Lisbeth Salander">Lisbeth Salander</a> uses computers to get information on people, as well as other common surveillance methods, as a freelancer.</li> <li><i><a href="/wiki/V_for_Vendetta" title="V for Vendetta">V for Vendetta</a>,</i> a British <a href="/wiki/Graphic_novel" title="Graphic novel">graphic novel</a> written by <a href="/wiki/Alan_Moore" title="Alan Moore">Alan Moore</a></li> <li><a href="/wiki/Dave_Eggers" title="Dave Eggers">David Egger's</a> novel <i><a href="/wiki/The_Circle_(Eggers_novel)" title="The Circle (Eggers novel)">The Circle</a></i> exhibits a world where a single company called "The Circle" produces all of the latest and highest quality technologies from computers and smartphones, to surveillance cameras known as "See-Change cameras". This company becomes associated with politics when starting a movement where politicians go "transparent" by wearing See-Change cameras on their body to prevent keeping secrets from the public about their daily work activity. In this society, it becomes mandatory to share personal information and experiences because it is The Circle's belief that everyone should have access to all information freely. However, as Eggers illustrates, this takes a toll on the individuals and creates a disruption of power between the governments and the private company. The Circle presents extreme ideologies surrounding mandatory surveillance. Eamon Bailey, one of the Wise Men, or founders of The Circle, believes that possessing the tools to access information about anything or anyone, should be a human right given to all of the world's citizens.<sup id="cite_ref-:0_156-0" class="reference"><a href="#cite_note-:0-156"><span class="cite-bracket">&#91;</span>156<span class="cite-bracket">&#93;</span></a></sup> By eliminating all secrets, any behaviour that has been deemed shameful will either become normalized or no longer considered shocking. Negative actions will eventually be eradicated from society altogether, through the fear of being exposed to other citizens<sup id="cite_ref-:0_156-1" class="reference"><a href="#cite_note-:0-156"><span class="cite-bracket">&#91;</span>156<span class="cite-bracket">&#93;</span></a></sup> This would be achieved in part by everyone going transparent, something that Bailey highly supports, although none of the Wise Men ever became transparent themselves. One major goal of The Circle is to have all of the world's information filtered through The Circle, a process they call "Completion".<sup id="cite_ref-:0_156-2" class="reference"><a href="#cite_note-:0-156"><span class="cite-bracket">&#91;</span>156<span class="cite-bracket">&#93;</span></a></sup> A single, private company would then have full access and control over all information and privacy of individuals and governments. Ty Gospodinov, the first founder of The Circle, has major concerns about the completion of the circle. He warns that this step would give The Circle too much power and control, and would quickly lead to <a href="/wiki/Totalitarianism" title="Totalitarianism">totalitarianism</a>.</li></ul> <div class="mw-heading mw-heading3"><h3 id="In_music">In music</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Surveillance&amp;action=edit&amp;section=34" title="Edit section: In music"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <ul><li>The <a href="/wiki/Dead_Kennedys" title="Dead Kennedys">Dead Kennedys</a>' song "I Am The Owl" is about government surveillance and <a href="/wiki/Social_engineering_(security)" title="Social engineering (security)">social engineering</a> of political groups.</li> <li>The <a href="/wiki/Vienna_Teng" title="Vienna Teng">Vienna Teng</a> song "Hymn of Acxiom" is about corporate data collection and surveillance.</li></ul> <div class="mw-heading mw-heading3"><h3 id="Onscreen">Onscreen</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Surveillance&amp;action=edit&amp;section=35" title="Edit section: Onscreen"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236090951"><div role="note" class="hatnote navigation-not-searchable">Main article: <a href="/wiki/List_of_films_featuring_surveillance" title="List of films featuring surveillance">List of films featuring surveillance</a></div> <ul><li>The film <i><a href="/wiki/Gattaca" title="Gattaca">Gattaca</a></i> portrays a society that uses <a href="/wiki/Biometric" class="mw-redirect" title="Biometric">biometric</a> surveillance to distinguish between people who are genetically engineered "superior" humans and genetically natural "inferior" humans.</li> <li>In the movie <i><a href="/wiki/Minority_Report_(film)" title="Minority Report (film)">Minority Report</a></i>, the police and government intelligence agencies use <a href="/wiki/Micro_aerial_vehicles" class="mw-redirect" title="Micro aerial vehicles">micro aerial vehicles</a> in <a href="/wiki/SWAT" title="SWAT">SWAT</a> operations and for surveillance purposes.</li> <li><a href="/wiki/HBO" title="HBO">HBO</a>'s crime-drama series <i><a href="/wiki/The_Sopranos" title="The Sopranos">The Sopranos</a></i> regularly portrays the FBI's surveillance of the <a href="/wiki/DiMeo_Crime_Family" class="mw-redirect" title="DiMeo Crime Family">DiMeo Crime Family</a>. Audio devices they use include "<a href="/wiki/Covert_listening_device" title="Covert listening device">bugs</a>" placed in strategic locations (e.g., in "<a href="/wiki/I_Dream_of_Jeannie_Cusamano" title="I Dream of Jeannie Cusamano">I Dream of Jeannie Cusamano</a>" and "<a href="/wiki/Mr._Ruggerio%27s_Neighborhood" title="Mr. Ruggerio&#39;s Neighborhood">Mr. Ruggerio's Neighborhood</a>") and hidden microphones worn by operatives (e.g., in "<a href="/wiki/Rat_Pack_(The_Sopranos)" title="Rat Pack (The Sopranos)">Rat Pack</a>") and informants (e.g., in "<a href="/wiki/Funhouse_(The_Sopranos)" title="Funhouse (The Sopranos)">Funhouse</a>", "<a href="/wiki/Proshai,_Livushka" title="Proshai, Livushka">Proshai, Livushka</a>" and "<a href="/wiki/Members_Only_(The_Sopranos)" title="Members Only (The Sopranos)">Members Only</a>"). Visual devices include <a href="/wiki/Hidden_cameras" class="mw-redirect" title="Hidden cameras">hidden still cameras</a> (e.g., in "<a href="/wiki/Pax_Soprana" title="Pax Soprana">Pax Soprana</a>") and video cameras (e.g., in "<a href="/wiki/Long_Term_Parking" title="Long Term Parking">Long Term Parking</a>").</li> <li>The movie <i><a href="/wiki/THX-1138" class="mw-redirect" title="THX-1138">THX-1138</a></i> portrays a society wherein people are drugged with sedatives and antidepressants, and have surveillance cameras watching them everywhere they go.</li> <li>The movie <i><a href="/wiki/The_Lives_of_Others" title="The Lives of Others">The Lives of Others</a></i> portrays the monitoring of <a href="/wiki/East_Berlin" title="East Berlin">East Berlin</a> by agents of the <a href="/wiki/Stasi" title="Stasi">Stasi</a>, the <a href="/wiki/East_Germany" title="East Germany">GDR</a>'s secret police.</li> <li>The movie <i><a href="/wiki/The_Conversation" title="The Conversation">The Conversation</a></i> portrays many methods of <a href="/wiki/Eavesdropping" title="Eavesdropping">audio surveillance</a>.</li> <li>The movie <i><a href="/wiki/V_for_Vendetta_(film)" title="V for Vendetta (film)">V for Vendetta</a></i>, a 2005 <a href="/wiki/List_of_dystopian_films" title="List of dystopian films">dystopian</a> <a href="/wiki/Political_thriller" title="Political thriller">political thriller film</a> directed by <a href="/wiki/James_McTeigue" title="James McTeigue">James McTeigue</a> and written by <a href="/wiki/The_Wachowskis" title="The Wachowskis">the Wachowskis</a>, is about British government trying to brainwash people by media, obtain their support by fearmongering, monitor them by mass surveillance devices, and suppress or kill any political or social objection.</li> <li>The movie <i><a href="/wiki/Enemy_of_the_State_(film)" title="Enemy of the State (film)">Enemy of the State</a></i> a 1998 American <a href="/wiki/Action_film" title="Action film">action</a>-<a href="/wiki/Thriller_film" title="Thriller film">thriller film</a> directed by <a href="/wiki/Tony_Scott" title="Tony Scott">Tony Scott</a> is about using U.S. citizens' data to search their background and surveillance devices to capture everyone that is identified as "enemy".</li> <li>The British TV series <i><a href="/wiki/The_Capture_(TV_series)" title="The Capture (TV series)">The Capture</a></i> explores the potential for video surveillance to be manipulated in order to support a conviction to pursue a political agenda.</li></ul> <div class="mw-heading mw-heading2"><h2 id="See_also">See also</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Surveillance&amp;action=edit&amp;section=36" title="Edit section: See also"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <ul><li><a href="/wiki/Computer_and_network_surveillance" title="Computer and network surveillance">Computer and network surveillance</a></li> <li><a href="/wiki/Mass_surveillance" title="Mass surveillance">Mass surveillance</a></li> <li><a href="/wiki/Sousveillance" title="Sousveillance">Sousveillance</a></li> <li><a href="/wiki/Surveillance_aircraft" title="Surveillance aircraft">Surveillance aircraft</a></li> <li><a href="/wiki/Surveillance_art" title="Surveillance art">Surveillance art</a></li> <li><a href="/wiki/Surveillance_capitalism" title="Surveillance capitalism">Surveillance capitalism</a></li> <li><a href="/wiki/Surveillance_system_monitor" title="Surveillance system monitor">Surveillance system monitor</a></li> <li><a href="/wiki/Trapwire" class="mw-redirect" title="Trapwire">Trapwire</a></li> <li><a href="/wiki/Participatory_surveillance" title="Participatory surveillance">Participatory surveillance</a></li> <li><a href="/wiki/PRISM_(surveillance_program)" class="mw-redirect" title="PRISM (surveillance program)">PRISM (surveillance program)</a></li> <li><a href="/wiki/The_Age_of_Surveillance_Capitalism" title="The Age of Surveillance Capitalism">The Age of Surveillance Capitalism</a></li> <li><a href="/wiki/Vulkan_files_leak" title="Vulkan files leak">Vulkan files leak</a></li> <li><a href="/wiki/Surveillance_in_New_Zealand" class="mw-redirect" title="Surveillance in New Zealand">Surveillance in New Zealand</a></li> <li><a href="/wiki/Surveillance_in_the_Ottoman_Empire" title="Surveillance in the Ottoman Empire">Surveillance in the Ottoman Empire</a></li></ul> <div class="mw-heading mw-heading2"><h2 id="References">References</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Surveillance&amp;action=edit&amp;section=37" title="Edit section: References"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <style data-mw-deduplicate="TemplateStyles:r1239543626">.mw-parser-output .reflist{margin-bottom:0.5em;list-style-type:decimal}@media screen{.mw-parser-output .reflist{font-size:90%}}.mw-parser-output .reflist .references{font-size:100%;margin-bottom:0;list-style-type:inherit}.mw-parser-output .reflist-columns-2{column-width:30em}.mw-parser-output .reflist-columns-3{column-width:25em}.mw-parser-output .reflist-columns{margin-top:0.3em}.mw-parser-output .reflist-columns ol{margin-top:0}.mw-parser-output .reflist-columns li{page-break-inside:avoid;break-inside:avoid-column}.mw-parser-output .reflist-upper-alpha{list-style-type:upper-alpha}.mw-parser-output .reflist-upper-roman{list-style-type:upper-roman}.mw-parser-output .reflist-lower-alpha{list-style-type:lower-alpha}.mw-parser-output .reflist-lower-greek{list-style-type:lower-greek}.mw-parser-output .reflist-lower-roman{list-style-type:lower-roman}</style><div class="reflist reflist-columns references-column-width" style="column-width: 30em;"> <ol class="references"> <li id="cite_note-1"><span class="mw-cite-backlink"><b><a href="#cite_ref-1">^</a></b></span> <span class="reference-text"><style data-mw-deduplicate="TemplateStyles:r1238218222">.mw-parser-output cite.citation{font-style:inherit;word-wrap:break-word}.mw-parser-output .citation q{quotes:"\"""\"""'""'"}.mw-parser-output .citation:target{background-color:rgba(0,127,255,0.133)}.mw-parser-output .id-lock-free.id-lock-free a{background:url("//upload.wikimedia.org/wikipedia/commons/6/65/Lock-green.svg")right 0.1em center/9px no-repeat}.mw-parser-output .id-lock-limited.id-lock-limited a,.mw-parser-output .id-lock-registration.id-lock-registration a{background:url("//upload.wikimedia.org/wikipedia/commons/d/d6/Lock-gray-alt-2.svg")right 0.1em center/9px no-repeat}.mw-parser-output .id-lock-subscription.id-lock-subscription a{background:url("//upload.wikimedia.org/wikipedia/commons/a/aa/Lock-red-alt-2.svg")right 0.1em center/9px no-repeat}.mw-parser-output .cs1-ws-icon a{background:url("//upload.wikimedia.org/wikipedia/commons/4/4c/Wikisource-logo.svg")right 0.1em center/12px no-repeat}body:not(.skin-timeless):not(.skin-minerva) .mw-parser-output .id-lock-free a,body:not(.skin-timeless):not(.skin-minerva) .mw-parser-output .id-lock-limited a,body:not(.skin-timeless):not(.skin-minerva) .mw-parser-output .id-lock-registration a,body:not(.skin-timeless):not(.skin-minerva) .mw-parser-output .id-lock-subscription a,body:not(.skin-timeless):not(.skin-minerva) .mw-parser-output .cs1-ws-icon a{background-size:contain;padding:0 1em 0 0}.mw-parser-output .cs1-code{color:inherit;background:inherit;border:none;padding:inherit}.mw-parser-output .cs1-hidden-error{display:none;color:var(--color-error,#d33)}.mw-parser-output .cs1-visible-error{color:var(--color-error,#d33)}.mw-parser-output .cs1-maint{display:none;color:#085;margin-left:0.3em}.mw-parser-output .cs1-kern-left{padding-left:0.2em}.mw-parser-output .cs1-kern-right{padding-right:0.2em}.mw-parser-output .citation .mw-selflink{font-weight:inherit}@media screen{.mw-parser-output .cs1-format{font-size:95%}html.skin-theme-clientpref-night .mw-parser-output .cs1-maint{color:#18911f}}@media screen and (prefers-color-scheme:dark){html.skin-theme-clientpref-os .mw-parser-output .cs1-maint{color:#18911f}}</style><cite id="CITEREFLyon2001" class="citation book cs1">Lyon, David (2001). <i>Surveillance Society: Monitoring in Everyday Life</i>. Philadelphia: Open University Press. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-0-335-20546-2" title="Special:BookSources/978-0-335-20546-2"><bdi>978-0-335-20546-2</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=Surveillance+Society%3A+Monitoring+in+Everyday+Life&amp;rft.place=Philadelphia&amp;rft.pub=Open+University+Press&amp;rft.date=2001&amp;rft.isbn=978-0-335-20546-2&amp;rft.aulast=Lyon&amp;rft.aufirst=David&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-2"><span class="mw-cite-backlink"><b><a href="#cite_ref-2">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFMonahanMurakami_Wood2018" class="citation book cs1">Monahan, Torin; Murakami Wood, David (2018). <i>Surveillance Studies: A Reader</i>. New York: Oxford University Press. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/9780190297824" title="Special:BookSources/9780190297824"><bdi>9780190297824</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=Surveillance+Studies%3A+A+Reader&amp;rft.place=New+York&amp;rft.pub=Oxford+University+Press&amp;rft.date=2018&amp;rft.isbn=9780190297824&amp;rft.aulast=Monahan&amp;rft.aufirst=Torin&amp;rft.au=Murakami+Wood%2C+David&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-3"><span class="mw-cite-backlink"><b><a href="#cite_ref-3">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFFung2024" class="citation web cs1">Fung, Brian (January 26, 2024). <a rel="nofollow" class="external text" href="https://www.cnn.com/2024/01/26/tech/the-nsa-buys-americans-internet-data-newly-released-documents-show/index.html">"The NSA buys Americans' internet data, newly released documents show | CNN Business"</a>. <i>CNN</i><span class="reference-accessdate">. Retrieved <span class="nowrap">October 30,</span> 2024</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=CNN&amp;rft.atitle=The+NSA+buys+Americans%27+internet+data%2C+newly+released+documents+show+%7C+CNN+Business&amp;rft.date=2024-01-26&amp;rft.aulast=Fung&amp;rft.aufirst=Brian&amp;rft_id=https%3A%2F%2Fwww.cnn.com%2F2024%2F01%2F26%2Ftech%2Fthe-nsa-buys-americans-internet-data-newly-released-documents-show%2Findex.html&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-4"><span class="mw-cite-backlink"><b><a href="#cite_ref-4">^</a></b></span> <span class="reference-text"> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFGreenleaf2018" class="citation book cs1">Greenleaf, Richard E. (2018). "Historiography of the Mexican Inquisition: Evolution of Interpretations and Methodologies". In Perry, Mary Elizabeth; Cruz, Anne J. (eds.). <a rel="nofollow" class="external text" href="https://books.google.com/books?id=KbnADwAAQBAJ"><i>Cultural Encounters: The Impact of the Inquisition in Spain and the New World</i></a>. Center for Medieval and Renaissance Studies, UCLA. Vol.&#160;24. Berleley: University of California Press. p.&#160;260. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/9780520301245" title="Special:BookSources/9780520301245"><bdi>9780520301245</bdi></a><span class="reference-accessdate">. Retrieved <span class="nowrap">March 14,</span> 2020</span>. <q>Studies [...] are based partially on Inquisition surveillance of foreigners and Protestants.</q></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=bookitem&amp;rft.atitle=Historiography+of+the+Mexican+Inquisition%3A+Evolution+of+Interpretations+and+Methodologies&amp;rft.btitle=Cultural+Encounters%3A+The+Impact+of+the+Inquisition+in+Spain+and+the+New+World&amp;rft.place=Berleley&amp;rft.series=Center+for+Medieval+and+Renaissance+Studies%2C+UCLA&amp;rft.pages=260&amp;rft.pub=University+of+California+Press&amp;rft.date=2018&amp;rft.isbn=9780520301245&amp;rft.aulast=Greenleaf&amp;rft.aufirst=Richard+E.&amp;rft_id=https%3A%2F%2Fbooks.google.com%2Fbooks%3Fid%3DKbnADwAAQBAJ&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-5"><span class="mw-cite-backlink"><b><a href="#cite_ref-5">^</a></b></span> <span class="reference-text"> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFCardwell2005" class="citation book cs1">Cardwell, Harvey (2005). <a rel="nofollow" class="external text" href="https://books.google.com/books?id=fGIV4d_vLusC"><i>Principles of Audit Surveillance</i></a>. R.T. Edwards, Inc. p.&#160;102. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/9781930217133" title="Special:BookSources/9781930217133"><bdi>9781930217133</bdi></a><span class="reference-accessdate">. Retrieved <span class="nowrap">March 14,</span> 2020</span>. <q>[...] accounts and inventories alike are generally within the area of surveillance of the auditor [...].</q></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=Principles+of+Audit+Surveillance&amp;rft.pages=102&amp;rft.pub=R.T.+Edwards%2C+Inc.&amp;rft.date=2005&amp;rft.isbn=9781930217133&amp;rft.aulast=Cardwell&amp;rft.aufirst=Harvey&amp;rft_id=https%3A%2F%2Fbooks.google.com%2Fbooks%3Fid%3DfGIV4d_vLusC&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-6"><span class="mw-cite-backlink"><b><a href="#cite_ref-6">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFStallman2013" class="citation magazine cs1">Stallman, Richard M. (October 14, 2013). <a rel="nofollow" class="external text" href="https://www.wired.com/2013/10/a-necessary-evil-what-it-takes-for-democracy-to-survive-surveillance/">"Stallman: How Much Surveillance Can Democracy Withstand?"</a>. <i>Wired</i>. <a href="/wiki/ISSN_(identifier)" class="mw-redirect" title="ISSN (identifier)">ISSN</a>&#160;<a rel="nofollow" class="external text" href="https://search.worldcat.org/issn/1059-1028">1059-1028</a><span class="reference-accessdate">. Retrieved <span class="nowrap">April 15,</span> 2020</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Wired&amp;rft.atitle=Stallman%3A+How+Much+Surveillance+Can+Democracy+Withstand%3F&amp;rft.date=2013-10-14&amp;rft.issn=1059-1028&amp;rft.aulast=Stallman&amp;rft.aufirst=Richard+M.&amp;rft_id=https%3A%2F%2Fwww.wired.com%2F2013%2F10%2Fa-necessary-evil-what-it-takes-for-democracy-to-survive-surveillance%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-7"><span class="mw-cite-backlink"><b><a href="#cite_ref-7">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation journal cs1"><a rel="nofollow" class="external text" href="https://www.cia.gov/static/30b273c621d0896f13104ff48840b68f/psychology-of-espionage.pdf">"The Psychology of Espionage"</a> <span class="cs1-format">(PDF)</span>. <i>The Psychology of Espionage</i>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20201109040321/https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol-61-no-2/pdfs/psychology-of-espionage.pdf">Archived</a> <span class="cs1-format">(PDF)</span> from the original on November 9, 2020<span class="reference-accessdate">. Retrieved <span class="nowrap">October 1,</span> 2022</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=The+Psychology+of+Espionage&amp;rft.atitle=The+Psychology+of+Espionage&amp;rft_id=https%3A%2F%2Fwww.cia.gov%2Fstatic%2F30b273c621d0896f13104ff48840b68f%2Fpsychology-of-espionage.pdf&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-8"><span class="mw-cite-backlink"><b><a href="#cite_ref-8">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFRadsan2007" class="citation journal cs1">Radsan, A. John (Spring 2007). <a rel="nofollow" class="external text" href="https://repository.law.umich.edu/cgi/viewcontent.cgi?article=1170&amp;context=mjil">"The Unresolved Equation of Espionage and International Law"</a>. <i>Michigan Journal of International Law</i>. <b>28</b> (3): 595–623.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Michigan+Journal+of+International+Law&amp;rft.atitle=The+Unresolved+Equation+of+Espionage+and+International+Law&amp;rft.ssn=spring&amp;rft.volume=28&amp;rft.issue=3&amp;rft.pages=595-623&amp;rft.date=2007&amp;rft.aulast=Radsan&amp;rft.aufirst=A.+John&amp;rft_id=https%3A%2F%2Frepository.law.umich.edu%2Fcgi%2Fviewcontent.cgi%3Farticle%3D1170%26context%3Dmjil&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-sciam-internet-9"><span class="mw-cite-backlink"><b><a href="#cite_ref-sciam-internet_9-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFDiffieSusan_Landau2008" class="citation news cs1">Diffie, Whitfield; Susan Landau (August 2008). <a rel="nofollow" class="external text" href="http://www.sciam.com/article.cfm?id=internet-eavesdropping">"Internet Eavesdropping: A Brave New World of Wiretapping"</a>. <i>Scientific American</i><span class="reference-accessdate">. Retrieved <span class="nowrap">March 13,</span> 2009</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Scientific+American&amp;rft.atitle=Internet+Eavesdropping%3A+A+Brave+New+World+of+Wiretapping&amp;rft.date=2008-08&amp;rft.aulast=Diffie&amp;rft.aufirst=Whitfield&amp;rft.au=Susan+Landau&amp;rft_id=http%3A%2F%2Fwww.sciam.com%2Farticle.cfm%3Fid%3Dinternet-eavesdropping&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-eff-calea-archive-10"><span class="mw-cite-backlink">^ <a href="#cite_ref-eff-calea-archive_10-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-eff-calea-archive_10-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20090503035053/http://w2.eff.org/Privacy/Surveillance/CALEA/?f=archive.html">"CALEA Archive – Electronic Frontier Foundation"</a>. <i>Electronic Frontier Foundation (website)</i>. Archived from <a rel="nofollow" class="external text" href="https://w2.eff.org/Privacy/Surveillance/CALEA/?f=archive.html">the original</a> on May 3, 2009<span class="reference-accessdate">. Retrieved <span class="nowrap">March 14,</span> 2009</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=Electronic+Frontier+Foundation+%28website%29&amp;rft.atitle=CALEA+Archive+%E2%80%93+Electronic+Frontier+Foundation&amp;rft_id=http%3A%2F%2Fw2.eff.org%2FPrivacy%2FSurveillance%2FCALEA%2F%3Ff%3Darchive.html&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-eff-calea-summary-11"><span class="mw-cite-backlink">^ <a href="#cite_ref-eff-calea-summary_11-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-eff-calea-summary_11-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.eff.org/issues/calea">"CALEA: The Perils of Wiretapping the Internet"</a>. <i>Electronic Frontier Foundation (website)</i><span class="reference-accessdate">. Retrieved <span class="nowrap">March 14,</span> 2009</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=Electronic+Frontier+Foundation+%28website%29&amp;rft.atitle=CALEA%3A+The+Perils+of+Wiretapping+the+Internet&amp;rft_id=https%3A%2F%2Fwww.eff.org%2Fissues%2Fcalea&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-eff-calea-faq-12"><span class="mw-cite-backlink">^ <a href="#cite_ref-eff-calea-faq_12-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-eff-calea-faq_12-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.eff.org/pages/calea-faq">"CALEA: Frequently Asked Questions"</a>. <i>Electronic Frontier Foundation (website)</i>. September 20, 2007<span class="reference-accessdate">. Retrieved <span class="nowrap">March 14,</span> 2009</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=Electronic+Frontier+Foundation+%28website%29&amp;rft.atitle=CALEA%3A+Frequently+Asked+Questions&amp;rft.date=2007-09-20&amp;rft_id=https%3A%2F%2Fwww.eff.org%2Fpages%2Fcalea-faq&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-usatoday-chatroom-13"><span class="mw-cite-backlink"><b><a href="#cite_ref-usatoday-chatroom_13-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFHill2004" class="citation news cs1">Hill, Michael (October 11, 2004). <a rel="nofollow" class="external text" href="https://www.usatoday.com/tech/news/surveillance/2004-10-11-chatroom-surv_x.htm">"Government funds chat room surveillance research"</a>. <i>USA Today</i>. Associated Press<span class="reference-accessdate">. Retrieved <span class="nowrap">March 19,</span> 2009</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=USA+Today&amp;rft.atitle=Government+funds+chat+room+surveillance+research&amp;rft.date=2004-10-11&amp;rft.aulast=Hill&amp;rft.aufirst=Michael&amp;rft_id=https%3A%2F%2Fwww.usatoday.com%2Ftech%2Fnews%2Fsurveillance%2F2004-10-11-chatroom-surv_x.htm&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-zdnet-fbi-14"><span class="mw-cite-backlink"><b><a href="#cite_ref-zdnet-fbi_14-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFMcCullagh2007" class="citation news cs1">McCullagh, Declan (January 30, 2007). <a rel="nofollow" class="external text" href="https://www.zdnet.com/home-and-office/networking/fbi-turns-to-broad-new-wiretap-method/">"FBI turns to broad new wiretap method"</a>. <i>ZDNet News</i><span class="reference-accessdate">. Retrieved <span class="nowrap">September 26,</span> 2014</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=ZDNet+News&amp;rft.atitle=FBI+turns+to+broad+new+wiretap+method&amp;rft.date=2007-01-30&amp;rft.aulast=McCullagh&amp;rft.aufirst=Declan&amp;rft_id=https%3A%2F%2Fwww.zdnet.com%2Fhome-and-office%2Fnetworking%2Ffbi-turns-to-broad-new-wiretap-method%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-teen-busted-in-wired-15"><span class="mw-cite-backlink"><b><a href="#cite_ref-teen-busted-in-wired_15-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation magazine cs1"><a rel="nofollow" class="external text" href="https://www.wired.com/politics/law/news/2007/07/fbi_spyware">"FBI's Secret Spyware Tracks Down Teen Who Made Bomb Threats"</a>. <i>Wired Magazine</i>. July 18, 2007.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Wired+Magazine&amp;rft.atitle=FBI%27s+Secret+Spyware+Tracks+Down+Teen+Who+Made+Bomb+Threats&amp;rft.date=2007-07-18&amp;rft_id=https%3A%2F%2Fwww.wired.com%2Fpolitics%2Flaw%2Fnews%2F2007%2F07%2Ffbi_spyware&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-emr-16"><span class="mw-cite-backlink"><b><a href="#cite_ref-emr_16-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFVan_Eck,_Wim1985" class="citation journal cs1">Van Eck, Wim (1985). <a rel="nofollow" class="external text" href="http://jya.com/emr.pdf">"Electromagnetic Radiation from Video Display Units: An Eavesdropping Risk?"</a> <span class="cs1-format">(PDF)</span>. <i>Computers &amp; Security</i>. <b>4</b> (4): 269–286. <a href="/wiki/CiteSeerX_(identifier)" class="mw-redirect" title="CiteSeerX (identifier)">CiteSeerX</a>&#160;<span class="id-lock-free" title="Freely accessible"><a rel="nofollow" class="external text" href="https://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.35.1695">10.1.1.35.1695</a></span>. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1016%2F0167-4048%2885%2990046-X">10.1016/0167-4048(85)90046-X</a>. <a rel="nofollow" class="external text" href="https://ghostarchive.org/archive/20221009/http://jya.com/emr.pdf">Archived</a> <span class="cs1-format">(PDF)</span> from the original on October 9, 2022.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Computers+%26+Security&amp;rft.atitle=Electromagnetic+Radiation+from+Video+Display+Units%3A+An+Eavesdropping+Risk%3F&amp;rft.volume=4&amp;rft.issue=4&amp;rft.pages=269-286&amp;rft.date=1985&amp;rft_id=https%3A%2F%2Fciteseerx.ist.psu.edu%2Fviewdoc%2Fsummary%3Fdoi%3D10.1.1.35.1695%23id-name%3DCiteSeerX&amp;rft_id=info%3Adoi%2F10.1016%2F0167-4048%2885%2990046-X&amp;rft.au=Van+Eck%2C+Wim&amp;rft_id=http%3A%2F%2Fjya.com%2Femr.pdf&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-Kuhn2004-17"><span class="mw-cite-backlink"><b><a href="#cite_ref-Kuhn2004_17-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFKuhn,_M.G.2004" class="citation journal cs1">Kuhn, M.G. (2004). <a rel="nofollow" class="external text" href="http://www.cl.cam.ac.uk/~mgk25/pet2004-fpd.pdf">"Electromagnetic Eavesdropping Risks of Flat-Panel Displays"</a> <span class="cs1-format">(PDF)</span>. <i>4th Workshop on Privacy Enhancing Technologies</i>: 23–25.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=4th+Workshop+on+Privacy+Enhancing+Technologies&amp;rft.atitle=Electromagnetic+Eavesdropping+Risks+of+Flat-Panel+Displays&amp;rft.pages=23-25&amp;rft.date=2004&amp;rft.au=Kuhn%2C+M.G.&amp;rft_id=http%3A%2F%2Fwww.cl.cam.ac.uk%2F~mgk25%2Fpet2004-fpd.pdf&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-nytimes-email-surveillance-18"><span class="mw-cite-backlink"><b><a href="#cite_ref-nytimes-email-surveillance_18-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFRisenLichtblau2009" class="citation news cs1">Risen, James; Lichtblau, Eric (June 16, 2009). <a rel="nofollow" class="external text" href="https://www.nytimes.com/2009/06/17/us/17nsa.html?_r=1&amp;pagewanted=2&amp;hp">"E-Mail Surveillance Renews Concerns in Congress"</a>. <i><a href="/wiki/The_New_York_Times" title="The New York Times">The New York Times</a></i>. pp.&#160;A1<span class="reference-accessdate">. Retrieved <span class="nowrap">June 30,</span> 2009</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=The+New+York+Times&amp;rft.atitle=E-Mail+Surveillance+Renews+Concerns+in+Congress&amp;rft.pages=A1&amp;rft.date=2009-06-16&amp;rft.aulast=Risen&amp;rft.aufirst=James&amp;rft.au=Lichtblau%2C+Eric&amp;rft_id=https%3A%2F%2Fwww.nytimes.com%2F2009%2F06%2F17%2Fus%2F17nsa.html%3F_r%3D1%26pagewanted%3D2%26hp&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-atlantic-pinwale-19"><span class="mw-cite-backlink"><b><a href="#cite_ref-atlantic-pinwale_19-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFAmbinder2009" class="citation news cs1">Ambinder, Marc (June 16, 2009). <a rel="nofollow" class="external text" href="https://www.theatlantic.com/politics/archive/2009/06/pinwale-and-the-new-nsa-revelations/19532/">"Pinwale And The New NSA Revelations"</a>. <i>The Atlantic</i><span class="reference-accessdate">. Retrieved <span class="nowrap">June 30,</span> 2009</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=The+Atlantic&amp;rft.atitle=Pinwale+And+The+New+NSA+Revelations&amp;rft.date=2009-06-16&amp;rft.aulast=Ambinder&amp;rft.aufirst=Marc&amp;rft_id=https%3A%2F%2Fwww.theatlantic.com%2Fpolitics%2Farchive%2F2009%2F06%2Fpinwale-and-the-new-nsa-revelations%2F19532%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-20"><span class="mw-cite-backlink"><b><a href="#cite_ref-20">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFGreenwaldEwen2013" class="citation news cs1">Greenwald, Glen; Ewen, MacAskill (June 6, 2013). <a rel="nofollow" class="external text" href="http://www.fbcoverup.com/docs/articles/2013-06-06-NSA-Prism-program-taps-in-to-user-data-of-Apple-Google-and-others-The-Guardian-Jun-06-2013.pdf">"NSA Prism program taps in to user data of Apple, Google and others"</a> <span class="cs1-format">(PDF)</span>. <i>The Guardian</i>. <a rel="nofollow" class="external text" href="https://ghostarchive.org/archive/20221009/http://www.fbcoverup.com/docs/articles/2013-06-06-NSA-Prism-program-taps-in-to-user-data-of-Apple-Google-and-others-The-Guardian-Jun-06-2013.pdf">Archived</a> <span class="cs1-format">(PDF)</span> from the original on October 9, 2022<span class="reference-accessdate">. Retrieved <span class="nowrap">February 1,</span> 2017</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=The+Guardian&amp;rft.atitle=NSA+Prism+program+taps+in+to+user+data+of+Apple%2C+Google+and+others&amp;rft.date=2013-06-06&amp;rft.aulast=Greenwald&amp;rft.aufirst=Glen&amp;rft.au=Ewen%2C+MacAskill&amp;rft_id=http%3A%2F%2Fwww.fbcoverup.com%2Fdocs%2Farticles%2F2013-06-06-NSA-Prism-program-taps-in-to-user-data-of-Apple-Google-and-others-The-Guardian-Jun-06-2013.pdf&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-21"><span class="mw-cite-backlink"><b><a href="#cite_ref-21">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFSottekKopfstein2013" class="citation news cs1">Sottek, T.C.; Kopfstein, Janus (July 17, 2013). <a rel="nofollow" class="external text" href="https://www.theverge.com/2013/7/17/4517480/nsa-spying-prism-surveillance-cheat-sheet">"Everything you need to know about PRISM"</a>. <i>The Verge</i><span class="reference-accessdate">. Retrieved <span class="nowrap">February 13,</span> 2017</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=The+Verge&amp;rft.atitle=Everything+you+need+to+know+about+PRISM&amp;rft.date=2013-07-17&amp;rft.aulast=Sottek&amp;rft.aufirst=T.C.&amp;rft.au=Kopfstein%2C+Janus&amp;rft_id=https%3A%2F%2Fwww.theverge.com%2F2013%2F7%2F17%2F4517480%2Fnsa-spying-prism-surveillance-cheat-sheet&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-threatlevel-exigent-22"><span class="mw-cite-backlink"><b><a href="#cite_ref-threatlevel-exigent_22-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFSingel2007" class="citation news cs1">Singel, Ryan (September 10, 2007). <a rel="nofollow" class="external text" href="http://blog.wired.com/27bstroke6/2007/09/rogue-fbi-lette.html#previouspost">"Rogue FBI Letters Hint at Phone Companies' Own Data Mining Programs – Updated"</a>. <i>Threat Level</i>. Wired<span class="reference-accessdate">. Retrieved <span class="nowrap">March 19,</span> 2009</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Threat+Level&amp;rft.atitle=Rogue+FBI+Letters+Hint+at+Phone+Companies%27+Own+Data+Mining+Programs+%E2%80%93+Updated&amp;rft.date=2007-09-10&amp;rft.aulast=Singel&amp;rft.aufirst=Ryan&amp;rft_id=http%3A%2F%2Fblog.wired.com%2F27bstroke6%2F2007%2F09%2Frogue-fbi-lette.html%23previouspost&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-fbi-national-letters-23"><span class="mw-cite-backlink"><b><a href="#cite_ref-fbi-national-letters_23-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFRoland2007" class="citation news cs1">Roland, Neil (March 20, 2007). <a rel="nofollow" class="external text" href="https://www.bloomberg.com/apps/news?pid=20601087&amp;sid=aBd9Zzld22w0&amp;refer=home">"Mueller Orders Audit of 56 FBI Offices for Secret Subpoenas"</a>. <i>Bloomberg News</i><span class="reference-accessdate">. Retrieved <span class="nowrap">March 19,</span> 2009</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Bloomberg+News&amp;rft.atitle=Mueller+Orders+Audit+of+56+FBI+Offices+for+Secret+Subpoenas&amp;rft.date=2007-03-20&amp;rft.aulast=Roland&amp;rft.aufirst=Neil&amp;rft_id=https%3A%2F%2Fwww.bloomberg.com%2Fapps%2Fnews%3Fpid%3D20601087%26sid%3DaBd9Zzld22w0%26refer%3Dhome&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-latimes-fbi-intel-analysis-24"><span class="mw-cite-backlink"><b><a href="#cite_ref-latimes-fbi-intel-analysis_24-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFPillerEric_Lichtblau2002" class="citation news cs1">Piller, Charles; Eric Lichtblau (July 29, 2002). <a rel="nofollow" class="external text" href="https://www.latimes.com/archives/la-xpm-2002-jul-29-na-technology29-story.html">"FBI Plans to Fight Terror With High-Tech Arsenal"</a>. <i>LA Times</i><span class="reference-accessdate">. Retrieved <span class="nowrap">March 14,</span> 2009</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=LA+Times&amp;rft.atitle=FBI+Plans+to+Fight+Terror+With+High-Tech+Arsenal&amp;rft.date=2002-07-29&amp;rft.aulast=Piller&amp;rft.aufirst=Charles&amp;rft.au=Eric+Lichtblau&amp;rft_id=https%3A%2F%2Fwww.latimes.com%2Farchives%2Fla-xpm-2002-jul-29-na-technology29-story.html&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-schneier-roving-bugs-25"><span class="mw-cite-backlink"><b><a href="#cite_ref-schneier-roving-bugs_25-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFSchneier2006" class="citation web cs1">Schneier, Bruce (December 5, 2006). <a rel="nofollow" class="external text" href="http://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html">"Remotely Eavesdropping on Cell Phone Microphones"</a>. <i>Schneier On Security</i><span class="reference-accessdate">. Retrieved <span class="nowrap">December 13,</span> 2009</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=Schneier+On+Security&amp;rft.atitle=Remotely+Eavesdropping+on+Cell+Phone+Microphones&amp;rft.date=2006-12-05&amp;rft.aulast=Schneier&amp;rft.aufirst=Bruce&amp;rft_id=http%3A%2F%2Fwww.schneier.com%2Fblog%2Farchives%2F2006%2F12%2Fremotely_eavesd_1.html&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-roving-bugs-26"><span class="mw-cite-backlink">^ <a href="#cite_ref-roving-bugs_26-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-roving-bugs_26-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFMcCullaghAnne_Broache2006" class="citation news cs1">McCullagh, Declan; Anne Broache (December 1, 2006). <a rel="nofollow" class="external text" href="https://web.archive.org/web/20131110182623/http://news.cnet.com/FBI-taps-cell-phone-mic-as-eavesdropping-tool/2100-1029_3-6140191.html">"FBI taps cell phone mic as eavesdropping tool"</a>. <i>CNet News</i>. Archived from <a rel="nofollow" class="external text" href="http://news.cnet.com/FBI-taps-cell-phone-mic-as-eavesdropping-tool/2100-1029_3-6140191.html">the original</a> on November 10, 2013<span class="reference-accessdate">. Retrieved <span class="nowrap">March 14,</span> 2009</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=CNet+News&amp;rft.atitle=FBI+taps+cell+phone+mic+as+eavesdropping+tool&amp;rft.date=2006-12-01&amp;rft.aulast=McCullagh&amp;rft.aufirst=Declan&amp;rft.au=Anne+Broache&amp;rft_id=http%3A%2F%2Fnews.cnet.com%2FFBI-taps-cell-phone-mic-as-eavesdropping-tool%2F2100-1029_3-6140191.html&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-uk-mobile-bug-27"><span class="mw-cite-backlink">^ <a href="#cite_ref-uk-mobile-bug_27-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-uk-mobile-bug_27-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFOdell2005" class="citation news cs1">Odell, Mark (August 1, 2005). <a rel="nofollow" class="external text" href="http://news.ft.com/cms/s/7166b8a2-02cb-11da-84e5-00000e2511c8.html">"Use of mobile helped police keep tabs on suspect"</a>. <i>Financial Times</i><span class="reference-accessdate">. Retrieved <span class="nowrap">March 14,</span> 2009</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Financial+Times&amp;rft.atitle=Use+of+mobile+helped+police+keep+tabs+on+suspect&amp;rft.date=2005-08-01&amp;rft.aulast=Odell&amp;rft.aufirst=Mark&amp;rft_id=http%3A%2F%2Fnews.ft.com%2Fcms%2Fs%2F7166b8a2-02cb-11da-84e5-00000e2511c8.html&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-noaa-phone-28"><span class="mw-cite-backlink">^ <a href="#cite_ref-noaa-phone_28-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-noaa-phone_28-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20131106021817/http://www.wrc.noaa.gov/wrso/security_guide/telephon.htm">"Telephones"</a>. <i>Western Regional Security Office (NOAA official site)</i>. 2001. Archived from <a rel="nofollow" class="external text" href="http://www.wrc.noaa.gov/wrso/security_guide/telephon.htm">the original</a> on November 6, 2013<span class="reference-accessdate">. Retrieved <span class="nowrap">March 22,</span> 2009</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=Western+Regional+Security+Office+%28NOAA+official+site%29&amp;rft.atitle=Telephones&amp;rft.date=2001&amp;rft_id=http%3A%2F%2Fwww.wrc.noaa.gov%2Fwrso%2Fsecurity_guide%2Ftelephon.htm&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-can-you-hear-me-29"><span class="mw-cite-backlink"><b><a href="#cite_ref-can-you-hear-me_29-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation news cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20110825102123/http://blogs.abcnews.com/theblotter/2006/12/can_you_hear_me.html">"Can You Hear Me Now?"</a>. <i>ABC News: The Blotter</i>. Archived from <a rel="nofollow" class="external text" href="http://blogs.abcnews.com/theblotter/2006/12/can_you_hear_me.html">the original</a> on August 25, 2011<span class="reference-accessdate">. Retrieved <span class="nowrap">December 13,</span> 2009</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=ABC+News%3A+The+Blotter&amp;rft.atitle=Can+You+Hear+Me+Now%3F&amp;rft_id=http%3A%2F%2Fblogs.abcnews.com%2Ftheblotter%2F2006%2F12%2Fcan_you_hear_me.html&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-seattle-times-roving-30"><span class="mw-cite-backlink"><b><a href="#cite_ref-seattle-times-roving_30-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFCoughlin2006" class="citation news cs1">Coughlin, Kevin (December 13, 2006). <a rel="nofollow" class="external text" href="http://seattletimes.nwsource.com/html/nationworld/2003474824_bugs130.html">"Even if they're off, cellphones allow FBI to listen in"</a>. <i>The Seattle Times</i><span class="reference-accessdate">. Retrieved <span class="nowrap">December 14,</span> 2009</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=The+Seattle+Times&amp;rft.atitle=Even+if+they%27re+off%2C+cellphones+allow+FBI+to+listen+in&amp;rft.date=2006-12-13&amp;rft.aulast=Coughlin&amp;rft.aufirst=Kevin&amp;rft_id=http%3A%2F%2Fseattletimes.nwsource.com%2Fhtml%2Fnationworld%2F2003474824_bugs130.html&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-31"><span class="mw-cite-backlink"><b><a href="#cite_ref-31">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFHampton2012" class="citation journal cs1 cs1-prop-long-vol">Hampton, Brittany (2012). <a rel="nofollow" class="external text" href="http://heinonline.org/HOL/Page?handle=hein.journals/branlaj51&amp;div=8&amp;g_sent=1&amp;collection=journals">"From Smartphones to Stingrays: Can the Fourth Amendment Keep up with the Twenty-First Century Note"</a>. <i>University of Louisville Law Review</i>. Fifty One: 159–176 &#8211; via Law Journal Library.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=University+of+Louisville+Law+Review&amp;rft.atitle=From+Smartphones+to+Stingrays%3A+Can+the+Fourth+Amendment+Keep+up+with+the+Twenty-First+Century+Note&amp;rft.volume=Fifty+One&amp;rft.pages=159-176&amp;rft.date=2012&amp;rft.aulast=Hampton&amp;rft.aufirst=Brittany&amp;rft_id=http%3A%2F%2Fheinonline.org%2FHOL%2FPage%3Fhandle%3Dhein.journals%2Fbranlaj51%26amp%3Bdiv%3D8%26amp%3Bg_sent%3D1%26amp%3Bcollection%3Djournals&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-bbc-phone-locate-32"><span class="mw-cite-backlink">^ <a href="#cite_ref-bbc-phone-locate_32-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-bbc-phone-locate_32-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation news cs1"><a rel="nofollow" class="external text" href="http://news.bbc.co.uk/1/hi/technology/4738219.stm">"Tracking a suspect by mobile phone"</a>. <i>BBC News</i>. August 3, 2005<span class="reference-accessdate">. Retrieved <span class="nowrap">March 14,</span> 2009</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=BBC+News&amp;rft.atitle=Tracking+a+suspect+by+mobile+phone&amp;rft.date=2005-08-03&amp;rft_id=http%3A%2F%2Fnews.bbc.co.uk%2F1%2Fhi%2Ftechnology%2F4738219.stm&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-foxnews-phone-locate-33"><span class="mw-cite-backlink">^ <a href="#cite_ref-foxnews-phone-locate_33-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-foxnews-phone-locate_33-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFMiller2009" class="citation news cs1">Miller, Joshua (March 14, 2009). <a rel="nofollow" class="external text" href="https://www.foxnews.com/story/cell-phone-tracking-can-locate-terrorists-but-only-where-its-legal">"Cell Phone Tracking Can Locate Terrorists – But Only Where It's Legal"</a>. <i>FOX News</i>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20090318002319/http://www.foxnews.com/story/0,2933,509211,00.html">Archived</a> from the original on March 18, 2009<span class="reference-accessdate">. Retrieved <span class="nowrap">March 14,</span> 2009</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=FOX+News&amp;rft.atitle=Cell+Phone+Tracking+Can+Locate+Terrorists+%E2%80%93+But+Only+Where+It%27s+Legal&amp;rft.date=2009-03-14&amp;rft.aulast=Miller&amp;rft.aufirst=Joshua&amp;rft_id=https%3A%2F%2Fwww.foxnews.com%2Fstory%2Fcell-phone-tracking-can-locate-terrorists-but-only-where-its-legal&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-nyu-lawrev-34"><span class="mw-cite-backlink"><b><a href="#cite_ref-nyu-lawrev_34-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFSamuel2008" class="citation journal cs1">Samuel, Ian (2008). "Warrantless Location Tracking". <i>N.Y.U. Law Review</i>. <a href="/wiki/SSRN_(identifier)" class="mw-redirect" title="SSRN (identifier)">SSRN</a>&#160;<a rel="nofollow" class="external text" href="https://papers.ssrn.com/sol3/papers.cfm?abstract_id=1092293">1092293</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=N.Y.U.+Law+Review&amp;rft.atitle=Warrantless+Location+Tracking&amp;rft.date=2008&amp;rft_id=https%3A%2F%2Fpapers.ssrn.com%2Fsol3%2Fpapers.cfm%3Fabstract_id%3D1092293%23id-name%3DSSRN&amp;rft.aulast=Samuel&amp;rft.aufirst=Ian&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-wired-gps-ping-35"><span class="mw-cite-backlink"><b><a href="#cite_ref-wired-gps-ping_35-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFZetter2009" class="citation news cs1">Zetter, Kim (December 1, 2009). <a rel="nofollow" class="external text" href="https://www.wired.com/threatlevel/2009/12/gps-data">"Threat Level Privacy, Crime and Security Online Feds 'Pinged' Sprint GPS Data 8 Million Times Over a Year"</a>. <i>Wired Magazine: Threat Level</i><span class="reference-accessdate">. Retrieved <span class="nowrap">December 5,</span> 2009</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Wired+Magazine%3A+Threat+Level&amp;rft.atitle=Threat+Level+Privacy%2C+Crime+and+Security+Online+Feds+%27Pinged%27+Sprint+GPS+Data+8+Million+Times+Over+a+Year&amp;rft.date=2009-12-01&amp;rft.aulast=Zetter&amp;rft.aufirst=Kim&amp;rft_id=https%3A%2F%2Fwww.wired.com%2Fthreatlevel%2F2009%2F12%2Fgps-data&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-36"><span class="mw-cite-backlink"><b><a href="#cite_ref-36">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20220104101650/https://snowdenarchive.cjfe.org/greenstone/cgi-bin/library.cgi">"Greenstone Digital Library Software"</a>. <i>snowdenarchive.cjfe.org</i>. Archived from <a rel="nofollow" class="external text" href="https://snowdenarchive.cjfe.org/greenstone/cgi-bin/library.cgi/">the original</a> on January 4, 2022<span class="reference-accessdate">. Retrieved <span class="nowrap">June 3,</span> 2017</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=snowdenarchive.cjfe.org&amp;rft.atitle=Greenstone+Digital+Library+Software&amp;rft_id=https%3A%2F%2Fsnowdenarchive.cjfe.org%2Fgreenstone%2Fcgi-bin%2Flibrary.cgi%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-new-iphone-locks-out-nsa-37"><span class="mw-cite-backlink">^ <a href="#cite_ref-new-iphone-locks-out-nsa_37-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-new-iphone-locks-out-nsa_37-1"><sup><i><b>b</b></i></sup></a> <a href="#cite_ref-new-iphone-locks-out-nsa_37-2"><sup><i><b>c</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFSanger2014" class="citation news cs1">Sanger, David (September 26, 2014). <a rel="nofollow" class="external text" href="https://www.nytimes.com/2014/09/27/technology/iphone-locks-out-the-nsa-signaling-a-post-snowden-era-.html?r=0=home">"Signaling Post-Snowden Era, New iPhone Locks Out N.S.A"</a>. <i><a href="/wiki/The_New_York_Times" title="The New York Times">The New York Times</a></i><span class="reference-accessdate">. Retrieved <span class="nowrap">November 1,</span> 2014</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=The+New+York+Times&amp;rft.atitle=Signaling+Post-Snowden+Era%2C+New+iPhone+Locks+Out+N.S.A&amp;rft.date=2014-09-26&amp;rft.aulast=Sanger&amp;rft.aufirst=David&amp;rft_id=https%3A%2F%2Fwww.nytimes.com%2F2014%2F09%2F27%2Ftechnology%2Fiphone-locks-out-the-nsa-signaling-a-post-snowden-era-.html%3Fr%3D0%3Dhome&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-38"><span class="mw-cite-backlink"><b><a href="#cite_ref-38">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://csu-sfsu.primo.exlibrisgroup.com/discovery/fulldisplay?docid=cdi_proquest_journals_2577590488&amp;context=PC&amp;vid=01CALS_SFR:01CALS_SFR&amp;lang=en&amp;search_scope=Everything_RAPIDO&amp;adaptor=Primo%20Central&amp;tab=Everything&amp;query=any,contains,iphone%20privacy&amp;offset=0">"Are iPhones Really Better for Privacy? Comparative Study of iOS and Android Apps"</a>. <i>csu-sfsu.primo.exlibrisgroup.com</i><span class="reference-accessdate">. Retrieved <span class="nowrap">September 22,</span> 2023</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=csu-sfsu.primo.exlibrisgroup.com&amp;rft.atitle=Are+iPhones+Really+Better+for+Privacy%3F+Comparative+Study+of+iOS+and+Android+Apps&amp;rft_id=https%3A%2F%2Fcsu-sfsu.primo.exlibrisgroup.com%2Fdiscovery%2Ffulldisplay%3Fdocid%3Dcdi_proquest_journals_2577590488%26context%3DPC%26vid%3D01CALS_SFR%3A01CALS_SFR%26lang%3Den%26search_scope%3DEverything_RAPIDO%26adaptor%3DPrimo%2520Central%26tab%3DEverything%26query%3Dany%2Ccontains%2Ciphone%2520privacy%26offset%3D0&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-nsa-tracking-cellphone-locations-39"><span class="mw-cite-backlink">^ <a href="#cite_ref-nsa-tracking-cellphone-locations_39-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-nsa-tracking-cellphone-locations_39-1"><sup><i><b>b</b></i></sup></a> <a href="#cite_ref-nsa-tracking-cellphone-locations_39-2"><sup><i><b>c</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFGellman2013" class="citation news cs1">Gellman, Barton (December 4, 2013). <a rel="nofollow" class="external text" href="https://www.washingtonpost.com/world/national-security/nsa-tracking-cellphone-locations-worldwide-snowden-documents-show/2013/12/04/5492873a-5cf2-11e3-bc56-c6ca94801fac_story.html?r=0=home">"NSA tracking cellphone locations worldwide, Snowden documents show"</a>. <i>The Washington Post</i><span class="reference-accessdate">. Retrieved <span class="nowrap">November 1,</span> 2014</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=The+Washington+Post&amp;rft.atitle=NSA+tracking+cellphone+locations+worldwide%2C+Snowden+documents+show&amp;rft.date=2013-12-04&amp;rft.aulast=Gellman&amp;rft.aufirst=Barton&amp;rft_id=https%3A%2F%2Fwww.washingtonpost.com%2Fworld%2Fnational-security%2Fnsa-tracking-cellphone-locations-worldwide-snowden-documents-show%2F2013%2F12%2F04%2F5492873a-5cf2-11e3-bc56-c6ca94801fac_story.html%3Fr%3D0%3Dhome&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-40"><span class="mw-cite-backlink"><b><a href="#cite_ref-40">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFBall2014" class="citation news cs1">Ball, James (October 29, 2014). <a rel="nofollow" class="external text" href="https://www.theguardian.com/uk-news/2014/oct/29/gchq-nsa-data-surveillance">"GCHQ views data without a warrant, government admits"</a>. <i>The Guardian</i>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=The+Guardian&amp;rft.atitle=GCHQ+views+data+without+a+warrant%2C+government+admits&amp;rft.date=2014-10-29&amp;rft.aulast=Ball&amp;rft.aufirst=James&amp;rft_id=https%3A%2F%2Fwww.theguardian.com%2Fuk-news%2F2014%2Foct%2F29%2Fgchq-nsa-data-surveillance&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-41"><span class="mw-cite-backlink"><b><a href="#cite_ref-41">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFSzoldra" class="citation web cs1">Szoldra, Paul. <a rel="nofollow" class="external text" href="https://www.businessinsider.com/snowden-leaks-timeline-2016-9">"This is everything Edward Snowden revealed in one year of unprecedented top-secret leaks"</a>. <i>Business Insider</i>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=Business+Insider&amp;rft.atitle=This+is+everything+Edward+Snowden+revealed+in+one+year+of+unprecedented+top-secret+leaks&amp;rft.aulast=Szoldra&amp;rft.aufirst=Paul&amp;rft_id=https%3A%2F%2Fwww.businessinsider.com%2Fsnowden-leaks-timeline-2016-9&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-42"><span class="mw-cite-backlink"><b><a href="#cite_ref-42">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFCroccoCristaniTruccoMurino2016" class="citation journal cs1">Crocco, Marco; Cristani, Marco; Trucco, Andrea; Murino, Vittorio (May 2, 2016). <a rel="nofollow" class="external text" href="https://dl.acm.org/doi/10.1145/2871183">"Audio Surveillance: A Systematic Review"</a>. <i>ACM Computing Surveys</i>. <b>48</b> (4): 1–46. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1145%2F2871183">10.1145/2871183</a>. <a href="/wiki/ISSN_(identifier)" class="mw-redirect" title="ISSN (identifier)">ISSN</a>&#160;<a rel="nofollow" class="external text" href="https://search.worldcat.org/issn/0360-0300">0360-0300</a>. <a href="/wiki/S2CID_(identifier)" class="mw-redirect" title="S2CID (identifier)">S2CID</a>&#160;<a rel="nofollow" class="external text" href="https://api.semanticscholar.org/CorpusID:6128808">6128808</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=ACM+Computing+Surveys&amp;rft.atitle=Audio+Surveillance%3A+A+Systematic+Review&amp;rft.volume=48&amp;rft.issue=4&amp;rft.pages=1-46&amp;rft.date=2016-05-02&amp;rft_id=https%3A%2F%2Fapi.semanticscholar.org%2FCorpusID%3A6128808%23id-name%3DS2CID&amp;rft.issn=0360-0300&amp;rft_id=info%3Adoi%2F10.1145%2F2871183&amp;rft.aulast=Crocco&amp;rft.aufirst=Marco&amp;rft.au=Cristani%2C+Marco&amp;rft.au=Trucco%2C+Andrea&amp;rft.au=Murino%2C+Vittorio&amp;rft_id=https%3A%2F%2Fdl.acm.org%2Fdoi%2F10.1145%2F2871183&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-SDM2016-43"><span class="mw-cite-backlink"><b><a href="#cite_ref-SDM2016_43-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://www.sdmmag.com/articles/92407-rise-of-surveillance-camera-installed-base-slows">"Rise of Surveillance Camera Installed Base Slows"</a>. May 5, 2016<span class="reference-accessdate">. Retrieved <span class="nowrap">January 5,</span> 2017</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Rise+of+Surveillance+Camera+Installed+Base+Slows&amp;rft.date=2016-05-05&amp;rft_id=http%3A%2F%2Fwww.sdmmag.com%2Farticles%2F92407-rise-of-surveillance-camera-installed-base-slows&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-44"><span class="mw-cite-backlink"><b><a href="#cite_ref-44">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation news cs1"><a rel="nofollow" class="external text" href="https://www.bbc.co.uk/news/world-asia-china-43751276">"Smart cameras catch man in 60,000 crowd"</a>. <i>BBC News</i>. April 13, 2018<span class="reference-accessdate">. Retrieved <span class="nowrap">April 13,</span> 2018</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=BBC+News&amp;rft.atitle=Smart+cameras+catch+man+in+60%2C000+crowd&amp;rft.date=2018-04-13&amp;rft_id=https%3A%2F%2Fwww.bbc.co.uk%2Fnews%2Fworld-asia-china-43751276&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-sun-times-45"><span class="mw-cite-backlink"><b><a href="#cite_ref-sun-times_45-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFSpielman2009" class="citation news cs1">Spielman, Fran (February 19, 2009). <a rel="nofollow" class="external text" href="http://www.suntimes.com/news/politics/1440402,">"Surveillance cams help fight crime, city says"</a>. <i>Chicago Sun Times</i><span class="reference-accessdate">. Retrieved <span class="nowrap">March 13,</span> 2009</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Chicago+Sun+Times&amp;rft.atitle=Surveillance+cams+help+fight+crime%2C+city+says&amp;rft.date=2009-02-19&amp;rft.aulast=Spielman&amp;rft.aufirst=Fran&amp;rft_id=http%3A%2F%2Fwww.suntimes.com%2Fnews%2Fpolitics%2F1440402%2C&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span><sup class="noprint Inline-Template"><span style="white-space: nowrap;">&#91;<i><a href="/wiki/Wikipedia:Link_rot" title="Wikipedia:Link rot"><span title="&#160;Dead link tagged August 2018">permanent dead link</span></a></i><span style="visibility:hidden; color:transparent; padding-left:2px">&#8205;</span>&#93;</span></sup></span> </li> <li id="cite_note-were-watching-46"><span class="mw-cite-backlink"><b><a href="#cite_ref-were-watching_46-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFSchorn2006" class="citation news cs1">Schorn, Daniel (September 6, 2006). <a rel="nofollow" class="external text" href="https://www.cbsnews.com/news/were-watching/">"We're Watching: How Chicago Authorities Keep An Eye On The City"</a>. <i>CBS News</i>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20090206151429/http://www.cbsnews.com/stories/2006/09/05/five_years/main1968121.shtml">Archived</a> from the original on February 6, 2009<span class="reference-accessdate">. Retrieved <span class="nowrap">March 13,</span> 2009</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=CBS+News&amp;rft.atitle=We%27re+Watching%3A+How+Chicago+Authorities+Keep+An+Eye+On+The+City&amp;rft.date=2006-09-06&amp;rft.aulast=Schorn&amp;rft.aufirst=Daniel&amp;rft_id=https%3A%2F%2Fwww.cbsnews.com%2Fnews%2Fwere-watching%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-informs-2017-47"><span class="mw-cite-backlink">^ <a href="#cite_ref-informs-2017_47-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-informs-2017_47-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFLevineTischTassoJoy2017" class="citation journal cs1">Levine, E. S.; Tisch, Jessica; Tasso, Anthony; Joy, Michael (February 2017). "The New York City Police Department's Domain Awareness System". <i>Interfaces</i>. <b>47</b> (1): 70–84. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1287%2Finte.2016.0860">10.1287/inte.2016.0860</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Interfaces&amp;rft.atitle=The+New+York+City+Police+Department%27s+Domain+Awareness+System&amp;rft.volume=47&amp;rft.issue=1&amp;rft.pages=70-84&amp;rft.date=2017-02&amp;rft_id=info%3Adoi%2F10.1287%2Finte.2016.0860&amp;rft.aulast=Levine&amp;rft.aufirst=E.+S.&amp;rft.au=Tisch%2C+Jessica&amp;rft.au=Tasso%2C+Anthony&amp;rft.au=Joy%2C+Michael&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-48"><span class="mw-cite-backlink"><b><a href="#cite_ref-48">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFParascandola2018" class="citation web cs1">Parascandola, Rocco (October 24, 2018). <a rel="nofollow" class="external text" href="https://www.nydailynews.com/new-york/nyc-crime/ny-metro-argus-cameras-east-20181024-story.html">"New NYPD surveillance cameras to cover stretch of Upper East Side not easily reached by patrol cars"</a>. <i>nydailynews.com</i><span class="reference-accessdate">. Retrieved <span class="nowrap">November 1,</span> 2019</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=nydailynews.com&amp;rft.atitle=New+NYPD+surveillance+cameras+to+cover+stretch+of+Upper+East+Side+not+easily+reached+by+patrol+cars&amp;rft.date=2018-10-24&amp;rft.aulast=Parascandola&amp;rft.aufirst=Rocco&amp;rft_id=https%3A%2F%2Fwww.nydailynews.com%2Fnew-york%2Fnyc-crime%2Fny-metro-argus-cameras-east-20181024-story.html&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-BBW2012-49"><span class="mw-cite-backlink"><b><a href="#cite_ref-BBW2012_49-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20150923185058/http://www.bigbrotherwatch.org.uk/files/priceofprivacy/Price_of_privacy_2012.pdf">"The Price of Privacy: How local authorities spent £515m on CCTV in four years"</a> <span class="cs1-format">(PDF)</span>. Big Brother Watch. February 2012. p.&#160;30. Archived from <a rel="nofollow" class="external text" href="http://www.bigbrotherwatch.org.uk/files/priceofprivacy/Price_of_privacy_2012.pdf">the original</a> <span class="cs1-format">(PDF)</span> on September 23, 2015<span class="reference-accessdate">. Retrieved <span class="nowrap">February 4,</span> 2015</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=The+Price+of+Privacy%3A+How+local+authorities+spent+%C2%A3515m+on+CCTV+in+four+years&amp;rft.pages=30&amp;rft.pub=Big+Brother+Watch&amp;rft.date=2012-02&amp;rft_id=http%3A%2F%2Fwww.bigbrotherwatch.org.uk%2Ffiles%2Fpriceofprivacy%2FPrice_of_privacy_2012.pdf&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-50"><span class="mw-cite-backlink"><b><a href="#cite_ref-50">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20100511054941/http://www.channel4.com/news/articles/society/factcheck+how+many+cctv+cameras/2291167">"FactCheck: how many CCTV cameras?"</a>. Channel 4 News. June 18, 2008. Archived from <a rel="nofollow" class="external text" href="http://www.channel4.com/news/articles/society/factcheck+how+many+cctv+cameras/2291167">the original</a> on May 11, 2010<span class="reference-accessdate">. Retrieved <span class="nowrap">May 8,</span> 2009</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=FactCheck%3A+how+many+CCTV+cameras%3F&amp;rft.pub=Channel+4+News&amp;rft.date=2008-06-18&amp;rft_id=http%3A%2F%2Fwww.channel4.com%2Fnews%2Farticles%2Fsociety%2Ffactcheck%2Bhow%2Bmany%2Bcctv%2Bcameras%2F2291167&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-Guardian2011-51"><span class="mw-cite-backlink"><b><a href="#cite_ref-Guardian2011_51-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation news cs1"><a rel="nofollow" class="external text" href="https://www.theguardian.com/uk/2011/mar/02/cctv-cameras-watching-surveillance">"You're being watched: there's one CCTV camera for every 32 people in UK – Research shows 1.85m machines across Britain, most of them indoors and privately operated"</a>. <i>The Guardian</i>. March 2, 2011<span class="reference-accessdate">. Retrieved <span class="nowrap">January 7,</span> 2017</span></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=The+Guardian&amp;rft.atitle=You%27re+being+watched%3A+there%27s+one+CCTV+camera+for+every+32+people+in+UK+%E2%80%93+Research+shows+1.85m+machines+across+Britain%2C+most+of+them+indoors+and+privately+operated&amp;rft.date=2011-03-02&amp;rft_id=https%3A%2F%2Fwww.theguardian.com%2Fuk%2F2011%2Fmar%2F02%2Fcctv-cameras-watching-surveillance&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span>; <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation news cs1"><a rel="nofollow" class="external text" href="http://www.securitynewsdesk.com/in-the-press-how-the-media-is-reporting-the-1-85-million-cameras-story/">"In the press: How the media is reporting the 1.85 million cameras story"</a>. <i>Security News Desk</i>. March 3, 2011<span class="reference-accessdate">. Retrieved <span class="nowrap">January 7,</span> 2017</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Security+News+Desk&amp;rft.atitle=In+the+press%3A+How+the+media+is+reporting+the+1.85+million+cameras+story&amp;rft.date=2011-03-03&amp;rft_id=http%3A%2F%2Fwww.securitynewsdesk.com%2Fin-the-press-how-the-media-is-reporting-the-1-85-million-cameras-story%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-52"><span class="mw-cite-backlink"><b><a href="#cite_ref-52">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://www.urbaneye.net/results/ue_wp6.pdf">"CCTV in London"</a> <span class="cs1-format">(PDF)</span>. <a rel="nofollow" class="external text" href="https://ghostarchive.org/archive/20221009/http://www.urbaneye.net/results/ue_wp6.pdf">Archived</a> <span class="cs1-format">(PDF)</span> from the original on October 9, 2022<span class="reference-accessdate">. Retrieved <span class="nowrap">July 22,</span> 2009</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=CCTV+in+London&amp;rft_id=http%3A%2F%2Fwww.urbaneye.net%2Fresults%2Fue_wp6.pdf&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-53"><span class="mw-cite-backlink"><b><a href="#cite_ref-53">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20081023191646/http://www.cctvusergroup.com/art.php?art=94">"How many cameras are there?"</a>. CCTV User Group. June 18, 2008. Archived from <a rel="nofollow" class="external text" href="http://www.cctvusergroup.com/art.php?art=94">the original</a> on October 23, 2008<span class="reference-accessdate">. Retrieved <span class="nowrap">May 8,</span> 2009</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=How+many+cameras+are+there%3F&amp;rft.pub=CCTV+User+Group&amp;rft.date=2008-06-18&amp;rft_id=http%3A%2F%2Fwww.cctvusergroup.com%2Fart.php%3Fart%3D94&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-54"><span class="mw-cite-backlink"><b><a href="#cite_ref-54">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFDen_Haag" class="citation web cs1">Den Haag. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20161008030841/http://www.denhaag.nl/en/residents/relocation-and-settling/to/Camera-surveillance.htm">"Camera surveillance"</a>. Archived from <a rel="nofollow" class="external text" href="http://www.denhaag.nl/en/residents/relocation-and-settling/to/Camera-surveillance.htm">the original</a> on October 8, 2016<span class="reference-accessdate">. Retrieved <span class="nowrap">December 2,</span> 2016</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Camera+surveillance&amp;rft.au=Den+Haag&amp;rft_id=http%3A%2F%2Fwww.denhaag.nl%2Fen%2Fresidents%2Frelocation-and-settling%2Fto%2FCamera-surveillance.htm&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-rollingstone-china-55"><span class="mw-cite-backlink">^ <a href="#cite_ref-rollingstone-china_55-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-rollingstone-china_55-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFKlein2008" class="citation magazine cs1">Klein, Naomi (May 29, 2008). <a rel="nofollow" class="external text" href="https://web.archive.org/web/20090326152758/http://www.rollingstone.com/politics/story/20797485/chinas_allseeing_eye/print">"China's All-Seeing Eye"</a>. <i>Rolling Stone</i>. Archived from <a rel="nofollow" class="external text" href="https://www.rollingstone.com/politics/story/20797485/chinas_allseeing_eye/print">the original</a> on March 26, 2009<span class="reference-accessdate">. Retrieved <span class="nowrap">March 20,</span> 2009</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Rolling+Stone&amp;rft.atitle=China%27s+All-Seeing+Eye&amp;rft.date=2008-05-29&amp;rft.aulast=Klein&amp;rft.aufirst=Naomi&amp;rft_id=https%3A%2F%2Fwww.rollingstone.com%2Fpolitics%2Fstory%2F20797485%2Fchinas_allseeing_eye%2Fprint&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-wired-cts-56"><span class="mw-cite-backlink"><b><a href="#cite_ref-wired-cts_56-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation news cs1"><a rel="nofollow" class="external text" href="http://www.cbsnews.com/news/big-brother-to-see-all-everywhere/">"Big Brother To See All, Everywhere"</a>. CBS News. Associated Press. July 1, 2003<span class="reference-accessdate">. Retrieved <span class="nowrap">September 26,</span> 2014</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.atitle=Big+Brother+To+See+All%2C+Everywhere&amp;rft.date=2003-07-01&amp;rft_id=http%3A%2F%2Fwww.cbsnews.com%2Fnews%2Fbig-brother-to-see-all-everywhere%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-Bonsor-57"><span class="mw-cite-backlink"><b><a href="#cite_ref-Bonsor_57-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFBonsor2001" class="citation web cs1">Bonsor, K. (September 4, 2001). <a rel="nofollow" class="external text" href="http://computer.howstuffworks.com/facial-recognition.htm">"How Facial Recognition Systems Work"</a><span class="reference-accessdate">. Retrieved <span class="nowrap">June 18,</span> 2006</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=How+Facial+Recognition+Systems+Work&amp;rft.date=2001-09-04&amp;rft.aulast=Bonsor&amp;rft.aufirst=K.&amp;rft_id=http%3A%2F%2Fcomputer.howstuffworks.com%2Ffacial-recognition.htm&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-McNealy-58"><span class="mw-cite-backlink"><b><a href="#cite_ref-McNealy_58-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFMcNealy" class="citation web cs1">McNealy, Scott. <a rel="nofollow" class="external text" href="http://www.jrnyquist.com/aug20/privacy.htm">"Privacy is (Virtually) Dead"</a><span class="reference-accessdate">. Retrieved <span class="nowrap">December 24,</span> 2006</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Privacy+is+%28Virtually%29+Dead&amp;rft.aulast=McNealy&amp;rft.aufirst=Scott&amp;rft_id=http%3A%2F%2Fwww.jrnyquist.com%2Faug20%2Fprivacy.htm&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-59"><span class="mw-cite-backlink"><b><a href="#cite_ref-59">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://www.businessinsider.com/trapwire-everything-you-need-to-know-2012-8">"WIKILEAKS: Surveillance Cameras Around The Country Are Being Used In A Huge Spy Network"</a>. <i><a href="/wiki/Business_Insider" title="Business Insider">Business Insider</a></i><span class="reference-accessdate">. Retrieved <span class="nowrap">October 5,</span> 2016</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=Business+Insider&amp;rft.atitle=WIKILEAKS%3A+Surveillance+Cameras+Around+The+Country+Are+Being+Used+In+A+Huge+Spy+Network&amp;rft_id=http%3A%2F%2Fwww.businessinsider.com%2Ftrapwire-everything-you-need-to-know-2012-8&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-epic-video-page-60"><span class="mw-cite-backlink"><b><a href="#cite_ref-epic-video-page_60-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20090225214527/http://epic.org/privacy/surveillance/">"EPIC Video Surveillance Information Page"</a>. <i>EPIC</i>. Archived from <a rel="nofollow" class="external text" href="https://epic.org/privacy/surveillance/">the original</a> on February 25, 2009<span class="reference-accessdate">. Retrieved <span class="nowrap">March 13,</span> 2009</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=EPIC&amp;rft.atitle=EPIC+Video+Surveillance+Information+Page&amp;rft_id=http%3A%2F%2Fepic.org%2Fprivacy%2Fsurveillance%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-61"><span class="mw-cite-backlink"><b><a href="#cite_ref-61">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFHedgecock2012" class="citation news cs1">Hedgecock, Sarah (August 14, 2012). <a rel="nofollow" class="external text" href="http://www.thedailybeast.com/articles/2012/08/14/trapwire-the-less-than-advertised-system-to-spy-on-americans.html">"TrapWire: The Less-Than-Advertised System To Spy On Americans"</a>. <i>The Daily Beast</i><span class="reference-accessdate">. Retrieved <span class="nowrap">September 13,</span> 2012</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=The+Daily+Beast&amp;rft.atitle=TrapWire%3A+The+Less-Than-Advertised+System+To+Spy+On+Americans&amp;rft.date=2012-08-14&amp;rft.aulast=Hedgecock&amp;rft.aufirst=Sarah&amp;rft_id=http%3A%2F%2Fwww.thedailybeast.com%2Farticles%2F2012%2F08%2F14%2Ftrapwire-the-less-than-advertised-system-to-spy-on-americans.html&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-keefe-62"><span class="mw-cite-backlink"><b><a href="#cite_ref-keefe_62-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFKeefe2006" class="citation news cs1">Keefe, Patrick (March 12, 2006). "Can Network Theory Thwart Terrorists?". <i><a href="/wiki/The_New_York_Times" title="The New York Times">The New York Times</a></i>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=The+New+York+Times&amp;rft.atitle=Can+Network+Theory+Thwart+Terrorists%3F&amp;rft.date=2006-03-12&amp;rft.aulast=Keefe&amp;rft.aufirst=Patrick&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-part-surv-63"><span class="mw-cite-backlink">^ <a href="#cite_ref-part-surv_63-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-part-surv_63-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFAlbrechtslund2008" class="citation journal cs1">Albrechtslund, Anders (March 3, 2008). <a rel="nofollow" class="external text" href="https://doi.org/10.5210%2Ffm.v13i3.2142">"Online Social Networking as Participatory Surveillance"</a>. <i>First Monday</i>. <b>13</b> (3). <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<span class="id-lock-free" title="Freely accessible"><a rel="nofollow" class="external text" href="https://doi.org/10.5210%2Ffm.v13i3.2142">10.5210/fm.v13i3.2142</a></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=First+Monday&amp;rft.atitle=Online+Social+Networking+as+Participatory+Surveillance&amp;rft.volume=13&amp;rft.issue=3&amp;rft.date=2008-03-03&amp;rft_id=info%3Adoi%2F10.5210%2Ffm.v13i3.2142&amp;rft.aulast=Albrechtslund&amp;rft.aufirst=Anders&amp;rft_id=https%3A%2F%2Fdoi.org%2F10.5210%252Ffm.v13i3.2142&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-fuchs-64"><span class="mw-cite-backlink"><b><a href="#cite_ref-fuchs_64-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFFuchs2009" class="citation book cs1">Fuchs, Christian (2009). <a rel="nofollow" class="external text" href="http://fuchs.uti.at/wp-content/uploads/SNS_Surveillance_Fuchs.pdf"><i>Social Networking Sites and the Surveillance Society. A Critical Case Study of the Usage of studiVZ, Facebook, and MySpace by Students in Salzburg in the Context of Electronic Surveillance</i></a> <span class="cs1-format">(PDF)</span>. Salzburg and Vienna: Forschungsgruppe Unified Theory of Information. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-3-200-01428-2" title="Special:BookSources/978-3-200-01428-2"><bdi>978-3-200-01428-2</bdi></a>. <a rel="nofollow" class="external text" href="https://ghostarchive.org/archive/20221009/http://fuchs.uti.at/wp-content/uploads/SNS_Surveillance_Fuchs.pdf">Archived</a> <span class="cs1-format">(PDF)</span> from the original on October 9, 2022<span class="reference-accessdate">. Retrieved <span class="nowrap">July 28,</span> 2012</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=Social+Networking+Sites+and+the+Surveillance+Society.+A+Critical+Case+Study+of+the+Usage+of+studiVZ%2C+Facebook%2C+and+MySpace+by+Students+in+Salzburg+in+the+Context+of+Electronic+Surveillance&amp;rft.place=Salzburg+and+Vienna&amp;rft.pub=Forschungsgruppe+Unified+Theory+of+Information&amp;rft.date=2009&amp;rft.isbn=978-3-200-01428-2&amp;rft.aulast=Fuchs&amp;rft.aufirst=Christian&amp;rft_id=http%3A%2F%2Ffuchs.uti.at%2Fwp-content%2Fuploads%2FSNS_Surveillance_Fuchs.pdf&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-ethier-65"><span class="mw-cite-backlink">^ <a href="#cite_ref-ethier_65-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-ethier_65-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFEthier" class="citation web cs1">Ethier, Jason. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20041116125614/http://www.ccs.neu.edu/home/perrolle/archive/Ethier-SocialNetworks.html">"Current Research in Social Network Theory"</a>. <i>Northeastern University College of Computer and Information Science</i>. Archived from the original on November 16, 2004<span class="reference-accessdate">. Retrieved <span class="nowrap">March 15,</span> 2009</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=Northeastern+University+College+of+Computer+and+Information+Science&amp;rft.atitle=Current+Research+in+Social+Network+Theory&amp;rft.aulast=Ethier&amp;rft.aufirst=Jason&amp;rft_id=http%3A%2F%2Fwww.ccs.neu.edu%2Fhome%2Fperrolle%2Farchive%2FEthier-SocialNetworks.html&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span><span class="cs1-maint citation-comment"><code class="cs1-code">{{<a href="/wiki/Template:Cite_web" title="Template:Cite web">cite web</a>}}</code>: CS1 maint: bot: original URL status unknown (<a href="/wiki/Category:CS1_maint:_bot:_original_URL_status_unknown" title="Category:CS1 maint: bot: original URL status unknown">link</a>)</span></span> </li> <li id="cite_note-pentagon-social-networks-66"><span class="mw-cite-backlink"><b><a href="#cite_ref-pentagon-social-networks_66-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFMarks2006" class="citation news cs1">Marks, Paul (June 9, 2006). <a rel="nofollow" class="external text" href="https://www.newscientist.com/article/mg19025556.200?DCMP=NLC-nletter&amp;nsref=mg19025556.200">"Pentagon sets its sights on social networking websites"</a>. <i>New Scientist</i><span class="reference-accessdate">. Retrieved <span class="nowrap">March 16,</span> 2009</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=New+Scientist&amp;rft.atitle=Pentagon+sets+its+sights+on+social+networking+websites&amp;rft.date=2006-06-09&amp;rft.aulast=Marks&amp;rft.aufirst=Paul&amp;rft_id=https%3A%2F%2Fwww.newscientist.com%2Farticle%2Fmg19025556.200%3FDCMP%3DNLC-nletter%26nsref%3Dmg19025556.200&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-nsa-myspace-67"><span class="mw-cite-backlink"><b><a href="#cite_ref-nsa-myspace_67-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFKawamoto2006" class="citation news cs1">Kawamoto, Dawn (June 9, 2006). <a rel="nofollow" class="external text" href="https://archive.today/20120720043006/http%3A%2F%2Fnews.cnet.com%2F8301-10784_3-6082047-7.html">"Is the NSA reading your MySpace profile?"</a>. <i>CNET News</i>. Archived from <a rel="nofollow" class="external text" href="http://news.cnet.com/8301-10784_3-6082047-7.html">the original</a> on July 20, 2012<span class="reference-accessdate">. Retrieved <span class="nowrap">March 16,</span> 2009</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=CNET+News&amp;rft.atitle=Is+the+NSA+reading+your+MySpace+profile%3F&amp;rft.date=2006-06-09&amp;rft.aulast=Kawamoto&amp;rft.aufirst=Dawn&amp;rft_id=http%3A%2F%2Fnews.cnet.com%2F8301-10784_3-6082047-7.html&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-ethier_2-68"><span class="mw-cite-backlink"><b><a href="#cite_ref-ethier_2_68-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFEthier" class="citation web cs1">Ethier, Jason. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20150226213456/http://spyapps.net/current-research-in-social-network-theory/">"Current Research in Social Network Theory"</a>. <i>Northeastern University College of Computer and Information Science</i>. Archived from <a rel="nofollow" class="external text" href="http://spyapps.net/current-research-in-social-network-theory/">the original</a> on February 26, 2015<span class="reference-accessdate">. Retrieved <span class="nowrap">March 15,</span> 2009</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=Northeastern+University+College+of+Computer+and+Information+Science&amp;rft.atitle=Current+Research+in+Social+Network+Theory&amp;rft.aulast=Ethier&amp;rft.aufirst=Jason&amp;rft_id=http%3A%2F%2Fspyapps.net%2Fcurrent-research-in-social-network-theory%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-ressler-69"><span class="mw-cite-backlink"><b><a href="#cite_ref-ressler_69-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFRessler2006" class="citation journal cs1">Ressler, Steve (July 2006). <a rel="nofollow" class="external text" href="http://www.hsaj.org/?fullarticle=2.2.8">"Social Network Analysis as an Approach to Combat Terrorism: Past, Present, and Future Research"</a>. <i>Homeland Security Affairs</i>. <b>II</b> (2)<span class="reference-accessdate">. Retrieved <span class="nowrap">March 14,</span> 2009</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Homeland+Security+Affairs&amp;rft.atitle=Social+Network+Analysis+as+an+Approach+to+Combat+Terrorism%3A+Past%2C+Present%2C+and+Future+Research&amp;rft.volume=II&amp;rft.issue=2&amp;rft.date=2006-07&amp;rft.aulast=Ressler&amp;rft.aufirst=Steve&amp;rft_id=http%3A%2F%2Fwww.hsaj.org%2F%3Ffullarticle%3D2.2.8&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-dydan-blog-70"><span class="mw-cite-backlink"><b><a href="#cite_ref-dydan-blog_70-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://dydan-research.blogspot.com/">"DyDAn Research Blog"</a>. <i>DyDAn Research Blog (official blog of DyDAn)</i><span class="reference-accessdate">. Retrieved <span class="nowrap">December 20,</span> 2009</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=DyDAn+Research+Blog+%28official+blog+of+DyDAn%29&amp;rft.atitle=DyDAn+Research+Blog&amp;rft_id=http%3A%2F%2Fdydan-research.blogspot.com%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-hancock-71"><span class="mw-cite-backlink">^ <a href="#cite_ref-hancock_71-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-hancock_71-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFSingel2007" class="citation news cs1">Singel, Ryan (October 29, 2007). <a rel="nofollow" class="external text" href="http://blog.wired.com/27bstroke6/2007/10/att-invents-pro.html">"AT&amp;T Invents Programming Language for Mass Surveillance"</a>. <i>Threat Level</i>. Wired<span class="reference-accessdate">. Retrieved <span class="nowrap">March 19,</span> 2009</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Threat+Level&amp;rft.atitle=AT%26T+Invents+Programming+Language+for+Mass+Surveillance&amp;rft.date=2007-10-29&amp;rft.aulast=Singel&amp;rft.aufirst=Ryan&amp;rft_id=http%3A%2F%2Fblog.wired.com%2F27bstroke6%2F2007%2F10%2Fatt-invents-pro.html&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-threatlevel-fbi-phonerecords-72"><span class="mw-cite-backlink"><b><a href="#cite_ref-threatlevel-fbi-phonerecords_72-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFSingel2007" class="citation news cs1">Singel, Ryan (October 16, 2007). <a rel="nofollow" class="external text" href="http://blog.wired.com/27bstroke6/2007/10/legally-questio.html#previouspost">"Legally Questionable FBI Requests for Calling Circle Info More Widespread than Previously Known"</a>. <i>Threat Level</i>. Wired<span class="reference-accessdate">. Retrieved <span class="nowrap">March 19,</span> 2009</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Threat+Level&amp;rft.atitle=Legally+Questionable+FBI+Requests+for+Calling+Circle+Info+More+Widespread+than+Previously+Known&amp;rft.date=2007-10-16&amp;rft.aulast=Singel&amp;rft.aufirst=Ryan&amp;rft_id=http%3A%2F%2Fblog.wired.com%2F27bstroke6%2F2007%2F10%2Flegally-questio.html%23previouspost&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-havenstein-73"><span class="mw-cite-backlink"><b><a href="#cite_ref-havenstein_73-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFHavenstein2008" class="citation news cs1">Havenstein, Heather (September 12, 2008). <a rel="nofollow" class="external text" href="https://web.archive.org/web/20080923065244/http://www.computerworld.com/action/article.do?command=viewArticleBasic&amp;articleId=9114560">"One in five employers uses social networks in hiring process"</a>. <i>Computer World</i>. Archived from <a rel="nofollow" class="external text" href="http://www.computerworld.com/action/article.do?command=viewArticleBasic&amp;articleId=9114560">the original</a> on September 23, 2008<span class="reference-accessdate">. Retrieved <span class="nowrap">March 14,</span> 2009</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Computer+World&amp;rft.atitle=One+in+five+employers+uses+social+networks+in+hiring+process&amp;rft.date=2008-09-12&amp;rft.aulast=Havenstein&amp;rft.aufirst=Heather&amp;rft_id=http%3A%2F%2Fwww.computerworld.com%2Faction%2Farticle.do%3Fcommand%3DviewArticleBasic%26articleId%3D9114560&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-rand-facial-74"><span class="mw-cite-backlink"><b><a href="#cite_ref-rand-facial_74-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFWoodwardChristopher_HornJulius_GatuneAryn_Thomas2003" class="citation book cs1">Woodward, John; Christopher Horn; Julius Gatune; Aryn Thomas (2003). <a rel="nofollow" class="external text" href="https://web.archive.org/web/20130908174005/http://www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA414520"><i>Biometrics: A Look at Facial Recognition</i></a>. RAND Corporation. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-0-8330-3302-4" title="Special:BookSources/978-0-8330-3302-4"><bdi>978-0-8330-3302-4</bdi></a>. Archived from <a rel="nofollow" class="external text" href="http://www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA414520">the original</a> on September 8, 2013<span class="reference-accessdate">. Retrieved <span class="nowrap">March 15,</span> 2009</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=Biometrics%3A+A+Look+at+Facial+Recognition&amp;rft.pub=RAND+Corporation&amp;rft.date=2003&amp;rft.isbn=978-0-8330-3302-4&amp;rft.aulast=Woodward&amp;rft.aufirst=John&amp;rft.au=Christopher+Horn&amp;rft.au=Julius+Gatune&amp;rft.au=Aryn+Thomas&amp;rft_id=http%3A%2F%2Fwww.dtic.mil%2Fcgi-bin%2FGetTRDoc%3FAD%3DADA414520&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-usatoday-facial-75"><span class="mw-cite-backlink"><b><a href="#cite_ref-usatoday-facial_75-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFFrank2007" class="citation news cs1">Frank, Thomas (May 10, 2007). <a rel="nofollow" class="external text" href="https://www.usatoday.com/news/washington/2007-05-10-facial-recognition-terrorism_N.htm">"Face recognition next in terror fight"</a>. <i>USA Today</i><span class="reference-accessdate">. Retrieved <span class="nowrap">March 16,</span> 2009</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=USA+Today&amp;rft.atitle=Face+recognition+next+in+terror+fight&amp;rft.date=2007-05-10&amp;rft.aulast=Frank&amp;rft.aufirst=Thomas&amp;rft_id=https%3A%2F%2Fwww.usatoday.com%2Fnews%2Fwashington%2F2007-05-10-facial-recognition-terrorism_N.htm&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-pop-mech-cameras-76"><span class="mw-cite-backlink"><b><a href="#cite_ref-pop-mech-cameras_76-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFVlahos2008" class="citation news cs1">Vlahos, James (January 2008). <a rel="nofollow" class="external text" href="https://web.archive.org/web/20071219164859/http://www.popularmechanics.com/technology/military_law/4236865.html">"Surveillance Society: New High-Tech Cameras Are Watching You"</a>. <i>Popular Mechanics</i>. Archived from <a rel="nofollow" class="external text" href="http://www.popularmechanics.com/technology/military_law/4236865.html">the original</a> on December 19, 2007<span class="reference-accessdate">. Retrieved <span class="nowrap">March 14,</span> 2009</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Popular+Mechanics&amp;rft.atitle=Surveillance+Society%3A+New+High-Tech+Cameras+Are+Watching+You&amp;rft.date=2008-01&amp;rft.aulast=Vlahos&amp;rft.aufirst=James&amp;rft_id=http%3A%2F%2Fwww.popularmechanics.com%2Ftechnology%2Fmilitary_law%2F4236865.html&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-wpost-biometricdb-77"><span class="mw-cite-backlink"><b><a href="#cite_ref-wpost-biometricdb_77-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFNakashima2007" class="citation news cs1">Nakashima, Ellen (December 22, 2007). <a rel="nofollow" class="external text" href="https://www.washingtonpost.com/wp-dyn/content/article/2007/12/21/AR2007122102544.html">"FBI Prepares Vast Database Of Biometrics: $1 Billion Project to Include Images of Irises and Faces"</a>. <i><a href="/wiki/The_Washington_Post" title="The Washington Post">The Washington Post</a></i>. pp.&#160;A01<span class="reference-accessdate">. Retrieved <span class="nowrap">May 6,</span> 2009</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=The+Washington+Post&amp;rft.atitle=FBI+Prepares+Vast+Database+Of+Biometrics%3A+%241+Billion+Project+to+Include+Images+of+Irises+and+Faces&amp;rft.pages=A01&amp;rft.date=2007-12-22&amp;rft.aulast=Nakashima&amp;rft.aufirst=Ellen&amp;rft_id=https%3A%2F%2Fwww.washingtonpost.com%2Fwp-dyn%2Fcontent%2Farticle%2F2007%2F12%2F21%2FAR2007122102544.html&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-fbi-biometric-db-78"><span class="mw-cite-backlink"><b><a href="#cite_ref-fbi-biometric-db_78-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFArenaCarol_Cratty2008" class="citation news cs1">Arena, Kelly; Carol Cratty (February 4, 2008). <a rel="nofollow" class="external text" href="http://www.cnn.com/2008/TECH/02/04/fbi.biometrics/">"FBI wants palm prints, eye scans, tattoo mapping"</a>. <i>CNN</i><span class="reference-accessdate">. Retrieved <span class="nowrap">March 14,</span> 2009</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=CNN&amp;rft.atitle=FBI+wants+palm+prints%2C+eye+scans%2C+tattoo+mapping&amp;rft.date=2008-02-04&amp;rft.aulast=Arena&amp;rft.aufirst=Kelly&amp;rft.au=Carol+Cratty&amp;rft_id=http%3A%2F%2Fwww.cnn.com%2F2008%2FTECH%2F02%2F04%2Ffbi.biometrics%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-fbi-biometric-idg-79"><span class="mw-cite-backlink"><b><a href="#cite_ref-fbi-biometric-idg_79-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFGross2008" class="citation news cs1">Gross, Grant (February 13, 2008). <a rel="nofollow" class="external text" href="https://web.archive.org/web/20080617002203/http://www.infoworld.com/article/08/02/13/Lockheed-wins-1B-FBI-biometric-contract_1.html">"Lockheed wins $1 billion FBI biometric contract"</a>. <i>IDG News Service</i>. InfoWorld. Archived from <a rel="nofollow" class="external text" href="http://www.infoworld.com/article/08/02/13/Lockheed-wins-1B-FBI-biometric-contract_1.html">the original</a> on June 17, 2008<span class="reference-accessdate">. Retrieved <span class="nowrap">March 18,</span> 2009</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=IDG+News+Service&amp;rft.atitle=Lockheed+wins+%241+billion+FBI+biometric+contract&amp;rft.date=2008-02-13&amp;rft.aulast=Gross&amp;rft.aufirst=Grant&amp;rft_id=http%3A%2F%2Fwww.infoworld.com%2Farticle%2F08%2F02%2F13%2FLockheed-wins-1B-FBI-biometric-contract_1.html&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-wired-lapd-80"><span class="mw-cite-backlink"><b><a href="#cite_ref-wired-lapd_80-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://thehightechhouse.weebly.com/lapd-we-know-that-mug.html">"LAPD: We Know That Mug"</a>. <i>Wired Magazine</i>. Associated Press. December 26, 2004<span class="reference-accessdate">. Retrieved <span class="nowrap">March 18,</span> 2009</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=Wired+Magazine&amp;rft.atitle=LAPD%3A+We+Know+That+Mug&amp;rft.date=2004-12-26&amp;rft_id=http%3A%2F%2Fthehightechhouse.weebly.com%2Flapd-we-know-that-mug.html&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-nbc-lapd-facial-81"><span class="mw-cite-backlink"><b><a href="#cite_ref-nbc-lapd-facial_81-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFMack" class="citation web cs1">Mack, Kelly. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20100330144142/http://www.officer.com/web/online/Top-News-Stories/LAPD-Uses-Face-Recognition-Technology-To-Fight-Crime/1$31230">"LAPD Uses Face Recognition Technology To Fight Crime"</a>. <i>NBC4 TV (transcript from Officer.com)</i>. Archived from <a rel="nofollow" class="external text" href="http://www.officer.com/web/online/Top-News-Stories/LAPD-Uses-Face-Recognition-Technology-To-Fight-Crime/1$31230">the original</a> on March 30, 2010<span class="reference-accessdate">. Retrieved <span class="nowrap">December 20,</span> 2009</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=NBC4+TV+%28transcript+from+Officer.com%29&amp;rft.atitle=LAPD+Uses+Face+Recognition+Technology+To+Fight+Crime&amp;rft.aulast=Mack&amp;rft.aufirst=Kelly&amp;rft_id=http%3A%2F%2Fwww.officer.com%2Fweb%2Fonline%2FTop-News-Stories%2FLAPD-Uses-Face-Recognition-Technology-To-Fight-Crime%2F1%2431230&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-latimes-lapd-analysis-center-82"><span class="mw-cite-backlink"><b><a href="#cite_ref-latimes-lapd-analysis-center_82-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFWillon2009" class="citation news cs1">Willon, Phil (September 17, 2009). <a rel="nofollow" class="external text" href="http://latimesblogs.latimes.com/lanow/2009/09/crime-lab.html">"LAPD opens new high-tech crime analysis center"</a>. <i>LA Times</i><span class="reference-accessdate">. Retrieved <span class="nowrap">December 20,</span> 2009</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=LA+Times&amp;rft.atitle=LAPD+opens+new+high-tech+crime+analysis+center&amp;rft.date=2009-09-17&amp;rft.aulast=Willon&amp;rft.aufirst=Phil&amp;rft_id=http%3A%2F%2Flatimesblogs.latimes.com%2Flanow%2F2009%2F09%2Fcrime-lab.html&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-wired-lying-face-83"><span class="mw-cite-backlink">^ <a href="#cite_ref-wired-lying-face_83-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-wired-lying-face_83-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFDotinga2004" class="citation news cs1">Dotinga, Randy (October 14, 2004). <a rel="nofollow" class="external text" href="https://www.wired.com/science/discoveries/news/2004/10/65322">"Can't Hide Your Lying ... Face?"</a>. <i>Wired Magazine</i><span class="reference-accessdate">. Retrieved <span class="nowrap">March 18,</span> 2009</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Wired+Magazine&amp;rft.atitle=Can%27t+Hide+Your+Lying+...+Face%3F&amp;rft.date=2004-10-14&amp;rft.aulast=Dotinga&amp;rft.aufirst=Randy&amp;rft_id=https%3A%2F%2Fwww.wired.com%2Fscience%2Fdiscoveries%2Fnews%2F2004%2F10%2F65322&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-84"><span class="mw-cite-backlink"><b><a href="#cite_ref-84">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFBoyd" class="citation web cs1">Boyd, Ryan. <a rel="nofollow" class="external text" href="http://www.military.com/equipment/mq-9-reaper">"MQ-9 Reaper"</a><span class="reference-accessdate">. Retrieved <span class="nowrap">October 5,</span> 2016</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=MQ-9+Reaper&amp;rft.aulast=Boyd&amp;rft.aufirst=Ryan&amp;rft_id=http%3A%2F%2Fwww.military.com%2Fequipment%2Fmq-9-reaper&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-85"><span class="mw-cite-backlink"><b><a href="#cite_ref-85">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFFriedersdorf2016" class="citation web cs1">Friedersdorf, Conor (March 10, 2016). <a rel="nofollow" class="external text" href="https://www.theatlantic.com/politics/archive/2016/03/the-rapid-rise-of-federal-surveillance-drones-over-america/473136/">"The Rapid Rise of Federal Surveillance Drones Over America"</a>. <i><a href="/wiki/The_Atlantic" title="The Atlantic">The Atlantic</a></i><span class="reference-accessdate">. Retrieved <span class="nowrap">October 5,</span> 2016</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=The+Atlantic&amp;rft.atitle=The+Rapid+Rise+of+Federal+Surveillance+Drones+Over+America&amp;rft.date=2016-03-10&amp;rft.aulast=Friedersdorf&amp;rft.aufirst=Conor&amp;rft_id=https%3A%2F%2Fwww.theatlantic.com%2Fpolitics%2Farchive%2F2016%2F03%2Fthe-rapid-rise-of-federal-surveillance-drones-over-america%2F473136%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-86"><span class="mw-cite-backlink"><b><a href="#cite_ref-86">^</a></b></span> <span class="reference-text">Edwards, Bruce, <a rel="nofollow" class="external text" href="http://www.vermonttoday.com/apps/pbcs.dll/article?AID=/RH/20121109/BUSINESS03/711099916">"Killington co-founder Sargent dead at 83"</a> <a rel="nofollow" class="external text" href="https://web.archive.org/web/20150904091030/http://www.vermonttoday.com/apps/pbcs.dll/article?AID=%2FRH%2F20121109%2FBUSINESS03%2F711099916">Archived</a> September 4, 2015, at the <a href="/wiki/Wayback_Machine" title="Wayback Machine">Wayback Machine</a>, Rutland <i>Herald</i>, November 9, 2012. Retrieved December 10, 2012.</span> </li> <li id="cite_note-drones-us-skies-87"><span class="mw-cite-backlink"><b><a href="#cite_ref-drones-us-skies_87-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFMcCullagh2006" class="citation news cs1">McCullagh, Declan (March 29, 2006). <a rel="nofollow" class="external text" href="http://news.cnet.com/2100-11746_3-6055658.html">"Drone aircraft may prowl U.S. skies"</a>. <i>CNet News</i><span class="reference-accessdate">. Retrieved <span class="nowrap">March 14,</span> 2009</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=CNet+News&amp;rft.atitle=Drone+aircraft+may+prowl+U.S.+skies&amp;rft.date=2006-03-29&amp;rft.aulast=McCullagh&amp;rft.aufirst=Declan&amp;rft_id=http%3A%2F%2Fnews.cnet.com%2F2100-11746_3-6055658.html&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-police-uavs-88"><span class="mw-cite-backlink">^ <a href="#cite_ref-police-uavs_88-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-police-uavs_88-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFWarwick2007" class="citation news cs1">Warwick, Graham (June 12, 2007). <a rel="nofollow" class="external text" href="http://www.flightglobal.com/articles/2007/12/06/220084/us-police-experiment-with-insitu-honeywell-uavs.html">"US police experiment with Insitu, Honeywell UAVs"</a>. <i>FlightGlobal.com</i><span class="reference-accessdate">. Retrieved <span class="nowrap">March 13,</span> 2009</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=FlightGlobal.com&amp;rft.atitle=US+police+experiment+with+Insitu%2C+Honeywell+UAVs&amp;rft.date=2007-06-12&amp;rft.aulast=Warwick&amp;rft.aufirst=Graham&amp;rft_id=http%3A%2F%2Fwww.flightglobal.com%2Farticles%2F2007%2F12%2F06%2F220084%2Fus-police-experiment-with-insitu-honeywell-uavs.html&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-uk-uav-fleet-89"><span class="mw-cite-backlink"><b><a href="#cite_ref-uk-uav-fleet_89-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFLa_Franchi2007" class="citation news cs1">La Franchi, Peter (July 17, 2007). <a rel="nofollow" class="external text" href="http://www.flightglobal.com/articles/2007/07/17/215507/uk-home-office-plans-national-police-uav-fleet.html">"UK Home Office plans national police UAV fleet"</a>. <i>Flight International</i><span class="reference-accessdate">. Retrieved <span class="nowrap">March 13,</span> 2009</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Flight+International&amp;rft.atitle=UK+Home+Office+plans+national+police+UAV+fleet&amp;rft.date=2007-07-17&amp;rft.aulast=La+Franchi&amp;rft.aufirst=Peter&amp;rft_id=http%3A%2F%2Fwww.flightglobal.com%2Farticles%2F2007%2F07%2F17%2F215507%2Fuk-home-office-plans-national-police-uav-fleet.html&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-uav-tazers-90"><span class="mw-cite-backlink"><b><a href="#cite_ref-uav-tazers_90-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation news cs1"><a rel="nofollow" class="external text" href="http://www.policeone.com/police-products/less-lethal/articles/99337-No-Longer-Science-Fiction-Less-Than-Lethal-Directed-Energy-Weapons/">"No Longer Science Fiction: Less Than Lethal &amp; Directed Energy Weapons"</a>. <i>International Online Defense Magazine</i>. February 22, 2005<span class="reference-accessdate">. Retrieved <span class="nowrap">March 15,</span> 2009</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=International+Online+Defense+Magazine&amp;rft.atitle=No+Longer+Science+Fiction%3A+Less+Than+Lethal+%26+Directed+Energy+Weapons&amp;rft.date=2005-02-22&amp;rft_id=http%3A%2F%2Fwww.policeone.com%2Fpolice-products%2Fless-lethal%2Farticles%2F99337-No-Longer-Science-Fiction-Less-Than-Lethal-Directed-Energy-Weapons%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-hart-overview-91"><span class="mw-cite-backlink"><b><a href="#cite_ref-hart-overview_91-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20081205233843/http://www.darpa.mil/ipto/programs/hart/docs/HART_Overview.pdf">"HART Overview"</a> <span class="cs1-format">(PDF)</span>. <i>IPTO (DARPA) – Official website</i>. August 2008. Archived from <a rel="nofollow" class="external text" href="https://www.darpa.mil/ipto/programs/hart/docs/HART_Overview.pdf">the original</a> <span class="cs1-format">(PDF)</span> on December 5, 2008<span class="reference-accessdate">. Retrieved <span class="nowrap">March 15,</span> 2009</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=IPTO+%28DARPA%29+%E2%80%93+Official+website&amp;rft.atitle=HART+Overview&amp;rft.date=2008-08&amp;rft_id=http%3A%2F%2Fwww.darpa.mil%2Fipto%2Fprograms%2Fhart%2Fdocs%2FHART_Overview.pdf&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-hart-proposal-92"><span class="mw-cite-backlink"><b><a href="#cite_ref-hart-proposal_92-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20081127074930/http://www.darpa.mil/ipto/solicit/baa/BAA-04-05_PIP.pdf">"BAA 04-05-PIP: Heterogeneous Airborne Reconnaissance Team (HART)"</a> <span class="cs1-format">(PDF)</span>. <i>Information Processing Technology Office (DARPA) – Official Website</i>. December 5, 2003. Archived from <a rel="nofollow" class="external text" href="https://www.darpa.mil/ipto/solicit/baa/BAA-04-05_PIP.pdf">the original</a> <span class="cs1-format">(PDF)</span> on November 27, 2008<span class="reference-accessdate">. Retrieved <span class="nowrap">March 16,</span> 2009</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=Information+Processing+Technology+Office+%28DARPA%29+%E2%80%93+Official+Website&amp;rft.atitle=BAA+04-05-PIP%3A+Heterogeneous+Airborne+Reconnaissance+Team+%28HART%29&amp;rft.date=2003-12-05&amp;rft_id=http%3A%2F%2Fwww.darpa.mil%2Fipto%2Fsolicit%2Fbaa%2FBAA-04-05_PIP.pdf&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-defense-daily-93"><span class="mw-cite-backlink"><b><a href="#cite_ref-defense-daily_93-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFSirak2007" class="citation news cs1">Sirak, Michael (November 29, 2007). <a rel="nofollow" class="external text" href="https://web.archive.org/web/20120309060941/http://findarticles.com/p/articles/mi_6712/is_40_236/ai_n29399227/">"DARPA, Northrop Grumman Move Into Next Phase of UAV Control Architecture"</a>. <i>Defense Daily</i>. Archived from <a rel="nofollow" class="external text" href="http://findarticles.com/p/articles/mi_6712/is_40_236/ai_n29399227">the original</a> on March 9, 2012<span class="reference-accessdate">. Retrieved <span class="nowrap">March 16,</span> 2009</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Defense+Daily&amp;rft.atitle=DARPA%2C+Northrop+Grumman+Move+Into+Next+Phase+of+UAV+Control+Architecture&amp;rft.date=2007-11-29&amp;rft.aulast=Sirak&amp;rft.aufirst=Michael&amp;rft_id=http%3A%2F%2Ffindarticles.com%2Fp%2Farticles%2Fmi_6712%2Fis_40_236%2Fai_n29399227&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-94"><span class="mw-cite-backlink"><b><a href="#cite_ref-94">^</a></b></span> <span class="reference-text">Saska, M.; Chudoba, J.; Preucil, L.; Thomas, J.; Loianno, G.; Tresnak, A.; Vonasek, V.; Kumar, V. Autonomous Deployment of Swarms of Micro-Aerial Vehicles in Cooperative Surveillance. In Proceedings of 2014 International Conference on Unmanned Aircraft Systems (ICUAS). 2014.</span> </li> <li id="cite_note-95"><span class="mw-cite-backlink"><b><a href="#cite_ref-95">^</a></b></span> <span class="reference-text">Saska, M.; Vakula, J.; Preucil, L. <a rel="nofollow" class="external text" href="https://ieeexplore.ieee.org/abstract/document/6907374/">Swarms of Micro Aerial Vehicles Stabilized Under a Visual Relative Localization</a>. In ICRA2014: Proceedings of 2014 IEEE International Conference on Robotics and Automation. 2014.</span> </li> <li id="cite_note-96"><span class="mw-cite-backlink"><b><a href="#cite_ref-96">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFAnthony2017" class="citation journal cs1">Anthony, Denise (2017). <a rel="nofollow" class="external text" href="https://doi.org/10.1146%2Fannurev-soc-060116-053643">"Toward a Sociology of Privacy"</a>. <i><a href="/wiki/Annual_Review_of_Sociology" title="Annual Review of Sociology">Annual Review of Sociology</a></i>. <b>43</b> (1): 249–269. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<span class="id-lock-free" title="Freely accessible"><a rel="nofollow" class="external text" href="https://doi.org/10.1146%2Fannurev-soc-060116-053643">10.1146/annurev-soc-060116-053643</a></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Annual+Review+of+Sociology&amp;rft.atitle=Toward+a+Sociology+of+Privacy&amp;rft.volume=43&amp;rft.issue=1&amp;rft.pages=249-269&amp;rft.date=2017&amp;rft_id=info%3Adoi%2F10.1146%2Fannurev-soc-060116-053643&amp;rft.aulast=Anthony&amp;rft.aufirst=Denise&amp;rft_id=https%3A%2F%2Fdoi.org%2F10.1146%252Fannurev-soc-060116-053643&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-profiling-euro-97"><span class="mw-cite-backlink"><b><a href="#cite_ref-profiling-euro_97-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFHildebrandtSerge_Gutwirth2008" class="citation book cs1"><a href="/wiki/Mireille_Hildebrandt" title="Mireille Hildebrandt">Hildebrandt, Mireille</a>; Serge Gutwirth (2008). <i>Profiling the European Citizen: Cross Disciplinary Perspectives</i>. Dordrecht: Springer. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-1-4020-6913-0" title="Special:BookSources/978-1-4020-6913-0"><bdi>978-1-4020-6913-0</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=Profiling+the+European+Citizen%3A+Cross+Disciplinary+Perspectives&amp;rft.place=Dordrecht&amp;rft.pub=Springer&amp;rft.date=2008&amp;rft.isbn=978-1-4020-6913-0&amp;rft.aulast=Hildebrandt&amp;rft.aufirst=Mireille&amp;rft.au=Serge+Gutwirth&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-data-sweep-98"><span class="mw-cite-backlink"><b><a href="#cite_ref-data-sweep_98-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFClayton2006" class="citation news cs1">Clayton, Mark (February 9, 2006). <a rel="nofollow" class="external text" href="http://www.csmonitor.com/2006/0209/p01s02-uspo.html">"US Plans Massive Data Sweep"</a>. <i>Christian Science Monitor</i><span class="reference-accessdate">. Retrieved <span class="nowrap">March 13,</span> 2009</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Christian+Science+Monitor&amp;rft.atitle=US+Plans+Massive+Data+Sweep&amp;rft.date=2006-02-09&amp;rft.aulast=Clayton&amp;rft.aufirst=Mark&amp;rft_id=http%3A%2F%2Fwww.csmonitor.com%2F2006%2F0209%2Fp01s02-uspo.html&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-cdt-fbi-subpoenas-99"><span class="mw-cite-backlink"><b><a href="#cite_ref-cdt-fbi-subpoenas_99-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFFlint2003" class="citation web cs1">Flint, Lara (September 24, 2003). <a rel="nofollow" class="external text" href="https://web.archive.org/web/20090308183232/http://cdt.org/security/usapatriot/030924cdt.shtml">"Administrative Subpoenas for the FBI: A Grab for Unchecked Executive Power"</a>. <i>The Center For Democracy &amp; Technology (official site)</i>. Archived from <a rel="nofollow" class="external text" href="http://www.cdt.org/security/usapatriot/030924cdt.shtml">the original</a> on March 8, 2009<span class="reference-accessdate">. Retrieved <span class="nowrap">March 20,</span> 2009</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=The+Center+For+Democracy+%26+Technology+%28official+site%29&amp;rft.atitle=Administrative+Subpoenas+for+the+FBI%3A+A+Grab+for+Unchecked+Executive+Power&amp;rft.date=2003-09-24&amp;rft.aulast=Flint&amp;rft.aufirst=Lara&amp;rft_id=http%3A%2F%2Fwww.cdt.org%2Fsecurity%2Fusapatriot%2F030924cdt.shtml&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-epic-fusion-centers-100"><span class="mw-cite-backlink"><b><a href="#cite_ref-epic-fusion-centers_100-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://epic.org/privacy/surveillance/spotlight/0607/default.html">"<span class="cs1-kern-left"></span>"National Network" of Fusion Centers Raises Specter of COINTELPRO"</a>. <i>EPIC Spotlight on Surveillance</i>. June 2007<span class="reference-accessdate">. Retrieved <span class="nowrap">March 14,</span> 2009</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=EPIC+Spotlight+on+Surveillance&amp;rft.atitle=%22National+Network%22+of+Fusion+Centers+Raises+Specter+of+COINTELPRO&amp;rft.date=2007-06&amp;rft_id=http%3A%2F%2Fepic.org%2Fprivacy%2Fsurveillance%2Fspotlight%2F0607%2Fdefault.html&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-101"><span class="mw-cite-backlink"><b><a href="#cite_ref-101">^</a></b></span> <span class="reference-text"> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFPrunckun2019" class="citation book cs1">Prunckun, Hank (April 12, 2019) [2010]. "Clandestine and Covert Sources of Information". <a rel="nofollow" class="external text" href="https://books.google.com/books?id=mqSNDwAAQBAJ"><i>Methods of Inquiry for Intelligence Analysis</i></a>. Security and Professional Intelligence Education Series (3&#160;ed.). Lanham, Maryland: Rowman &amp; Littlefield (published 2019). p.&#160;57. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/9781538125885" title="Special:BookSources/9781538125885"><bdi>9781538125885</bdi></a><span class="reference-accessdate">. Retrieved <span class="nowrap">September 13,</span> 2022</span>. <q>Physical surveillance is the act of making observations of people, vehicles, or the activities occurring at specific locations. [...] Physical surveillance may take place either at a fixed location, which is known as a stakeout, or in a continually moving situation, referred to as a tail.</q></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=bookitem&amp;rft.atitle=Clandestine+and+Covert+Sources+of+Information&amp;rft.btitle=Methods+of+Inquiry+for+Intelligence+Analysis&amp;rft.place=Lanham%2C+Maryland&amp;rft.series=Security+and+Professional+Intelligence+Education+Series&amp;rft.pages=57&amp;rft.edition=3&amp;rft.pub=Rowman+%26+Littlefield&amp;rft.date=2019-04-12&amp;rft.isbn=9781538125885&amp;rft.aulast=Prunckun&amp;rft.aufirst=Hank&amp;rft_id=https%3A%2F%2Fbooks.google.com%2Fbooks%3Fid%3DmqSNDwAAQBAJ&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span> </span> </li> <li id="cite_note-pentagon-infiltration-102"><span class="mw-cite-backlink"><b><a href="#cite_ref-pentagon-infiltration_102-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFMyers2005" class="citation news cs1">Myers, Lisa (December 14, 2005). <a rel="nofollow" class="external text" href="https://www.nbcnews.com/id/wbna10454316">"Is the Pentagon spying on Americans?"</a>. <i>NBC Nightly News</i>. NBC News<span class="reference-accessdate">. Retrieved <span class="nowrap">March 13,</span> 2009</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=NBC+Nightly+News&amp;rft.atitle=Is+the+Pentagon+spying+on+Americans%3F&amp;rft.date=2005-12-14&amp;rft.aulast=Myers&amp;rft.aufirst=Lisa&amp;rft_id=https%3A%2F%2Fwww.nbcnews.com%2Fid%2Fwbna10454316&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-senate-hearing-informants-103"><span class="mw-cite-backlink"><b><a href="#cite_ref-senate-hearing-informants_103-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://www.icdc.com/~paulwolf/cointelpro/churchfinalreportIIId.htm">"The Use of Informants in FBI Domestic Intelligence Investigations"</a>. <i>Final Report: Book III, Supplementary Detailed Staff Reports on Intelligence Activities and the Rights of Americans</i>. U.S. Senate Select Committee to Study Governmental Operations with Respect to Intelligence Activities. April 23, 1976. pp.&#160;225–270<span class="reference-accessdate">. Retrieved <span class="nowrap">March 13,</span> 2009</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=Final+Report%3A+Book+III%2C+Supplementary+Detailed+Staff+Reports+on+Intelligence+Activities+and+the+Rights+of+Americans&amp;rft.atitle=The+Use+of+Informants+in+FBI+Domestic+Intelligence+Investigations&amp;rft.pages=225-270&amp;rft.date=1976-04-23&amp;rft_id=http%3A%2F%2Fwww.icdc.com%2F~paulwolf%2Fcointelpro%2FchurchfinalreportIIId.htm&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-104"><span class="mw-cite-backlink"><b><a href="#cite_ref-104">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.prisonlegalnews.org/news/2010/jun/15/secret-justice-criminal-informants-and-americas-underground-legal-system/">"Secret Justice: Criminal Informants and America's Underground Legal System | Prison Legal News"</a>. <i>www.prisonlegalnews.org</i><span class="reference-accessdate">. Retrieved <span class="nowrap">October 5,</span> 2016</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=www.prisonlegalnews.org&amp;rft.atitle=Secret+Justice%3A+Criminal+Informants+and+America%27s+Underground+Legal+System+%7C+Prison+Legal+News&amp;rft_id=https%3A%2F%2Fwww.prisonlegalnews.org%2Fnews%2F2010%2Fjun%2F15%2Fsecret-justice-criminal-informants-and-americas-underground-legal-system%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-fbi-informant-network-105"><span class="mw-cite-backlink"><b><a href="#cite_ref-fbi-informant-network_105-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFRoss2007" class="citation web cs1">Ross, Brian (July 25, 2007). <a rel="nofollow" class="external text" href="http://blogs.abcnews.com/theblotter/2007/07/fbi-proposes-bu.html">"FBI Proposes Building Network of U.S. Informants"</a>. <i>Blotter</i>. ABC News<span class="reference-accessdate">. Retrieved <span class="nowrap">March 13,</span> 2009</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=Blotter&amp;rft.atitle=FBI+Proposes+Building+Network+of+U.S.+Informants&amp;rft.date=2007-07-25&amp;rft.aulast=Ross&amp;rft.aufirst=Brian&amp;rft_id=http%3A%2F%2Fblogs.abcnews.com%2Ftheblotter%2F2007%2F07%2Ffbi-proposes-bu.html&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-ns-archive-domestic-sat-106"><span class="mw-cite-backlink"><b><a href="#cite_ref-ns-archive-domestic-sat_106-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB229/index.htm">"U.S. Reconnaissance Satellites: Domestic Targets"</a>. <i>National Security Archive</i><span class="reference-accessdate">. Retrieved <span class="nowrap">March 16,</span> 2009</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=National+Security+Archive&amp;rft.atitle=U.S.+Reconnaissance+Satellites%3A+Domestic+Targets&amp;rft_id=http%3A%2F%2Fwww.gwu.edu%2F~nsarchiv%2FNSAEBB%2FNSAEBB229%2Findex.htm&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-wsj-domestic-sat-107"><span class="mw-cite-backlink"><b><a href="#cite_ref-wsj-domestic-sat_107-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFBlock2007" class="citation news cs1">Block, Robert (August 15, 2007). <a rel="nofollow" class="external text" href="https://www.wsj.com/articles/SB118714764716998275">"U.S. to Expand Domestic Use Of Spy Satellites"</a>. <i><a href="/wiki/The_Wall_Street_Journal" title="The Wall Street Journal">The Wall Street Journal</a></i><span class="reference-accessdate">. Retrieved <span class="nowrap">March 14,</span> 2009</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=The+Wall+Street+Journal&amp;rft.atitle=U.S.+to+Expand+Domestic+Use+Of+Spy+Satellites&amp;rft.date=2007-08-15&amp;rft.aulast=Block&amp;rft.aufirst=Robert&amp;rft_id=https%3A%2F%2Fwww.wsj.com%2Farticles%2FSB118714764716998275&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-wsj-sat-program-approved-108"><span class="mw-cite-backlink"><b><a href="#cite_ref-wsj-sat-program-approved_108-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFGorman2008" class="citation news cs1">Gorman, Siobhan (October 1, 2008). <a rel="nofollow" class="external text" href="https://www.wsj.com/articles/SB122282336428992785?mod=googlenews_wsj">"Satellite-Surveillance Program to Begin Despite Privacy Concerns"</a>. <i>The Wall Street Journal</i><span class="reference-accessdate">. Retrieved <span class="nowrap">March 16,</span> 2009</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=The+Wall+Street+Journal&amp;rft.atitle=Satellite-Surveillance+Program+to+Begin+Despite+Privacy+Concerns&amp;rft.date=2008-10-01&amp;rft.aulast=Gorman&amp;rft.aufirst=Siobhan&amp;rft_id=https%3A%2F%2Fwww.wsj.com%2Farticles%2FSB122282336428992785%3Fmod%3Dgooglenews_wsj&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-dhs-nao-factsheet-109"><span class="mw-cite-backlink"><b><a href="#cite_ref-dhs-nao-factsheet_109-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation news cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20090311151910/http://www.dhs.gov/xnews/releases/pr_1187188414685.shtm">"Fact Sheet: National Applications Office"</a>. <i>Department of Homeland Security (official website)</i>. August 15, 2007. Archived from <a rel="nofollow" class="external text" href="https://www.dhs.gov/xnews/releases/pr_1187188414685.shtm">the original</a> on March 11, 2009<span class="reference-accessdate">. Retrieved <span class="nowrap">March 16,</span> 2009</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Department+of+Homeland+Security+%28official+website%29&amp;rft.atitle=Fact+Sheet%3A+National+Applications+Office&amp;rft.date=2007-08-15&amp;rft_id=https%3A%2F%2Fwww.dhs.gov%2Fxnews%2Freleases%2Fpr_1187188414685.shtm&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-washpost-sat-110"><span class="mw-cite-backlink">^ <a href="#cite_ref-washpost-sat_110-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-washpost-sat_110-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFWarrick2007" class="citation news cs1">Warrick, Joby (August 16, 2007). <a rel="nofollow" class="external text" href="https://www.washingtonpost.com/wp-dyn/content/article/2007/08/15/AR2007081502430_pf.html">"Domestic Use of Spy Satellites To Widen"</a>. <i><a href="/wiki/The_Washington_Post" title="The Washington Post">The Washington Post</a></i>. pp.&#160;A01<span class="reference-accessdate">. Retrieved <span class="nowrap">March 17,</span> 2009</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=The+Washington+Post&amp;rft.atitle=Domestic+Use+of+Spy+Satellites+To+Widen&amp;rft.pages=A01&amp;rft.date=2007-08-16&amp;rft.aulast=Warrick&amp;rft.aufirst=Joby&amp;rft_id=https%3A%2F%2Fwww.washingtonpost.com%2Fwp-dyn%2Fcontent%2Farticle%2F2007%2F08%2F15%2FAR2007081502430_pf.html&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-usatoday-spysat-111"><span class="mw-cite-backlink"><b><a href="#cite_ref-usatoday-spysat_111-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFShrader2004" class="citation news cs1">Shrader, Katherine (September 26, 2004). <a rel="nofollow" class="external text" href="https://www.usatoday.com/tech/news/surveillance/2004-09-26-civilian-spying_x.htm">"Spy imagery agency watching inside U.S."</a> <i>USA Today</i>. Associated Press<span class="reference-accessdate">. Retrieved <span class="nowrap">March 17,</span> 2009</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=USA+Today&amp;rft.atitle=Spy+imagery+agency+watching+inside+U.S.&amp;rft.date=2004-09-26&amp;rft.aulast=Shrader&amp;rft.aufirst=Katherine&amp;rft_id=https%3A%2F%2Fwww.usatoday.com%2Ftech%2Fnews%2Fsurveillance%2F2004-09-26-civilian-spying_x.htm&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-112"><span class="mw-cite-backlink"><b><a href="#cite_ref-112">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFKappeler" class="citation web cs1">Kappeler, Victor. <a rel="nofollow" class="external text" href="http://www.plsonline.eku.edu/insidelook/forget-nsa-police-may-be-greater-threat-privacy">"Forget the NSA: Police May be a Greater Threat to Privacy"</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Forget+the+NSA%3A+Police+May+be+a+Greater+Threat+to+Privacy&amp;rft.aulast=Kappeler&amp;rft.aufirst=Victor&amp;rft_id=http%3A%2F%2Fwww.plsonline.eku.edu%2Finsidelook%2Fforget-nsa-police-may-be-greater-threat-privacy&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-113"><span class="mw-cite-backlink"><b><a href="#cite_ref-113">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation cs2"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20150925164238/http://www.gesetze-im-internet.de/englisch_stpo/german_code_of_criminal_procedure.pdf">"Section 100i – IMS I-Catcher"</a> <span class="cs1-format">(PDF)</span>, <i>The German Code Of Criminal Procedure</i>, 2014, pp.&#160;43–44, archived from <a rel="nofollow" class="external text" href="http://www.gesetze-im-internet.de/englisch_stpo/german_code_of_criminal_procedure.pdf">the original</a> <span class="cs1-format">(PDF)</span> on September 25, 2015<span class="reference-accessdate">, retrieved <span class="nowrap">November 27,</span> 2015</span></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=bookitem&amp;rft.atitle=Section+100i+%E2%80%93+IMS+I-Catcher&amp;rft.btitle=The+German+Code+Of+Criminal+Procedure&amp;rft.pages=43-44&amp;rft.date=2014&amp;rft_id=http%3A%2F%2Fwww.gesetze-im-internet.de%2Fenglisch_stpo%2Fgerman_code_of_criminal_procedure.pdf&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-114"><span class="mw-cite-backlink"><b><a href="#cite_ref-114">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.theguardian.com/world/2020/mar/29/revealed-saudis-suspected-of-phone-spying-campaign-in-us">"Revealed: Saudis suspected of phone spying campaign in US"</a>. <i>The Guardian</i>. March 29, 2020<span class="reference-accessdate">. Retrieved <span class="nowrap">March 29,</span> 2020</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=The+Guardian&amp;rft.atitle=Revealed%3A+Saudis+suspected+of+phone+spying+campaign+in+US&amp;rft.date=2020-03-29&amp;rft_id=https%3A%2F%2Fwww.theguardian.com%2Fworld%2F2020%2Fmar%2F29%2Frevealed-saudis-suspected-of-phone-spying-campaign-in-us&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-115"><span class="mw-cite-backlink"><b><a href="#cite_ref-115">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://techcrunch.com/2020/03/29/saudi-spies-ss7-phone-tracking/">"Saudi Spies Tracked Phones Using Flaws the FCC Failed to Fix for Years"</a>. <i>TechCrunch</i>. March 29, 2020<span class="reference-accessdate">. Retrieved <span class="nowrap">March 29,</span> 2020</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=TechCrunch&amp;rft.atitle=Saudi+Spies+Tracked+Phones+Using+Flaws+the+FCC+Failed+to+Fix+for+Years&amp;rft.date=2020-03-29&amp;rft_id=https%3A%2F%2Ftechcrunch.com%2F2020%2F03%2F29%2Fsaudi-spies-ss7-phone-tracking%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-rfid-strike-uk-116"><span class="mw-cite-backlink">^ <a href="#cite_ref-rfid-strike-uk_116-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-rfid-strike-uk_116-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation news cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20121207145117/http://www.rfidjournal.com/article/print/6294">"Two Stories Highlight the RFID Debate"</a>. <i>RFID Journal</i>. July 19, 2005. Archived from <a rel="nofollow" class="external text" href="http://www.rfidjournal.com/article/print/6294">the original</a> on December 7, 2012<span class="reference-accessdate">. Retrieved <span class="nowrap">March 23,</span> 2012</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=RFID+Journal&amp;rft.atitle=Two+Stories+Highlight+the+RFID+Debate&amp;rft.date=2005-07-19&amp;rft_id=http%3A%2F%2Fwww.rfidjournal.com%2Farticle%2Fprint%2F6294&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-usatoday-verichip-117"><span class="mw-cite-backlink">^ <a href="#cite_ref-usatoday-verichip_117-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-usatoday-verichip_117-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFLewan2007" class="citation news cs1">Lewan, Todd (July 21, 2007). <a rel="nofollow" class="external text" href="https://www.usatoday.com/tech/news/surveillance/2007-07-21-chips_N.htm">"Microchips in humans spark privacy debate"</a>. <i>USA Today</i>. Associated Press<span class="reference-accessdate">. Retrieved <span class="nowrap">March 17,</span> 2009</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=USA+Today&amp;rft.atitle=Microchips+in+humans+spark+privacy+debate&amp;rft.date=2007-07-21&amp;rft.aulast=Lewan&amp;rft.aufirst=Todd&amp;rft_id=https%3A%2F%2Fwww.usatoday.com%2Ftech%2Fnews%2Fsurveillance%2F2007-07-21-chips_N.htm&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-mccullagh-rfid-118"><span class="mw-cite-backlink"><b><a href="#cite_ref-mccullagh-rfid_118-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFMcCullagh2003" class="citation news cs1">McCullagh, Declan (January 13, 2003). <a rel="nofollow" class="external text" href="http://news.cnet.com/2010-1069-980325.html">"RFID Tags: Big Brother in small packages"</a>. <i>CNET News</i><span class="reference-accessdate">. Retrieved <span class="nowrap">July 24,</span> 2012</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=CNET+News&amp;rft.atitle=RFID+Tags%3A+Big+Brother+in+small+packages&amp;rft.date=2003-01-13&amp;rft.aulast=McCullagh&amp;rft.aufirst=Declan&amp;rft_id=http%3A%2F%2Fnews.cnet.com%2F2010-1069-980325.html&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-mex-pig-verichip-119"><span class="mw-cite-backlink"><b><a href="#cite_ref-mex-pig-verichip_119-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFGardener2004" class="citation news cs1">Gardener, W. David (July 15, 2004). <a rel="nofollow" class="external text" href="https://web.archive.org/web/20090412014051/http://www.informationweek.com/news/global-cio/showArticle.jhtml?articleID=23901004">"RFID Chips Implanted In Mexican Law-Enforcement Workers"</a>. <i>Information Week</i>. Archived from <a rel="nofollow" class="external text" href="http://www.informationweek.com/news/global-cio/showArticle.jhtml?articleID=23901004">the original</a> on April 12, 2009<span class="reference-accessdate">. Retrieved <span class="nowrap">March 17,</span> 2009</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Information+Week&amp;rft.atitle=RFID+Chips+Implanted+In+Mexican+Law-Enforcement+Workers&amp;rft.date=2004-07-15&amp;rft.aulast=Gardener&amp;rft.aufirst=W.+David&amp;rft_id=http%3A%2F%2Fwww.informationweek.com%2Fnews%2Fglobal-cio%2FshowArticle.jhtml%3FarticleID%3D23901004&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-csm-mexico-verichip-120"><span class="mw-cite-backlink"><b><a href="#cite_ref-csm-mexico-verichip_120-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFCampbell2004" class="citation news cs1">Campbell, Monica (August 4, 2004). <a rel="nofollow" class="external text" href="http://www.csmonitor.com/2004/0804/p01s04-woam.html">"Law enforcement in Mexico goes a bit bionic"</a>. <i>Christian Science Monitor</i><span class="reference-accessdate">. Retrieved <span class="nowrap">March 17,</span> 2009</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Christian+Science+Monitor&amp;rft.atitle=Law+enforcement+in+Mexico+goes+a+bit+bionic&amp;rft.date=2004-08-04&amp;rft.aulast=Campbell&amp;rft.aufirst=Monica&amp;rft_id=http%3A%2F%2Fwww.csmonitor.com%2F2004%2F0804%2Fp01s04-woam.html&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-RFID-implants-121"><span class="mw-cite-backlink"><b><a href="#cite_ref-RFID-implants_121-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFMonahanFisher2010" class="citation journal cs1">Monahan, Torin; Fisher, Jill A. (2010). "Implanting inequality: Empirical evidence of social and ethical risks of implantable radio-frequency identification (RFID) devices". <i>International Journal of Technology Assessment in Health Care</i>. <b>26</b> (4): 370–376. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1017%2FS0266462310001133">10.1017/S0266462310001133</a>. <a href="/wiki/PMID_(identifier)" class="mw-redirect" title="PMID (identifier)">PMID</a>&#160;<a rel="nofollow" class="external text" href="https://pubmed.ncbi.nlm.nih.gov/20923593">20923593</a>. <a href="/wiki/S2CID_(identifier)" class="mw-redirect" title="S2CID (identifier)">S2CID</a>&#160;<a rel="nofollow" class="external text" href="https://api.semanticscholar.org/CorpusID:12365071">12365071</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=International+Journal+of+Technology+Assessment+in+Health+Care&amp;rft.atitle=Implanting+inequality%3A+Empirical+evidence+of+social+and+ethical+risks+of+implantable+radio-frequency+identification+%28RFID%29+devices&amp;rft.volume=26&amp;rft.issue=4&amp;rft.pages=370-376&amp;rft.date=2010&amp;rft_id=https%3A%2F%2Fapi.semanticscholar.org%2FCorpusID%3A12365071%23id-name%3DS2CID&amp;rft_id=info%3Apmid%2F20923593&amp;rft_id=info%3Adoi%2F10.1017%2FS0266462310001133&amp;rft.aulast=Monahan&amp;rft.aufirst=Torin&amp;rft.au=Fisher%2C+Jill+A.&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-122"><span class="mw-cite-backlink"><b><a href="#cite_ref-122">^</a></b></span> <span class="reference-text"><a rel="nofollow" class="external text" href="http://www.blighter.com/news/press-releases/87-plexteks-blighter-b400-series-radars-improve-perimeter-security-at-londons-heathrow-airport-30-may-2012.html">Plextek’s Blighter B400 series radars improve perimeter security at London’s Heathrow Airport </a></span> </li> <li id="cite_note-123"><span class="mw-cite-backlink"><b><a href="#cite_ref-123">^</a></b></span> <span class="reference-text"><a rel="nofollow" class="external text" href="http://www.radartutorial.eu/02.basics/rp28.en.html">Radartutorial</a></span> </li> <li id="cite_note-124"><span class="mw-cite-backlink"><b><a href="#cite_ref-124">^</a></b></span> <span class="reference-text">Lyman, D., Micheal. <i>Criminal Investigation: The Art and the Science</i>. 6th ed. Pearson, 2010. p249</span> </li> <li id="cite_note-125"><span class="mw-cite-backlink"><b><a href="#cite_ref-125">^</a></b></span> <span class="reference-text">Crowder, Stan, and Turvery E. Brent. <i>Ethical Justice: Applied Issues for Criminal Justice Students and Professionals</i>. 1st ed. Academic Press, 2013. p150. Print.</span> </li> <li id="cite_note-fbi-warrantless-gps-126"><span class="mw-cite-backlink"><b><a href="#cite_ref-fbi-warrantless-gps_126-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFClaburn2009" class="citation news cs1">Claburn, Thomas (March 4, 2009). <a rel="nofollow" class="external text" href="https://informationweek.com/architecture/court-asked-to-disallow-warrantless-gps-tracking/d/d-id/1077257">"Court Asked To Disallow Warrantless GPS Tracking"</a>. <i>Information Week</i><span class="reference-accessdate">. Retrieved <span class="nowrap">March 18,</span> 2009</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Information+Week&amp;rft.atitle=Court+Asked+To+Disallow+Warrantless+GPS+Tracking&amp;rft.date=2009-03-04&amp;rft.aulast=Claburn&amp;rft.aufirst=Thomas&amp;rft_id=https%3A%2F%2Finformationweek.com%2Farchitecture%2Fcourt-asked-to-disallow-warrantless-gps-tracking%2Fd%2Fd-id%2F1077257&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-verichip-legal-127"><span class="mw-cite-backlink"><b><a href="#cite_ref-verichip-legal_127-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFHilden2002" class="citation news cs1">Hilden, Julie (April 16, 2002). <a rel="nofollow" class="external text" href="https://web.archive.org/web/20090518085650/http://archives.cnn.com/2002/LAW/05/columns/fl.hilden.chip/index.html">"What legal questions are the new chip implants for humans likely to raise?"</a>. <i>CNN.com (FindLaw)</i>. Archived from <a rel="nofollow" class="external text" href="http://archives.cnn.com/2002/LAW/05/columns/fl.hilden.chip/index.html">the original</a> on May 18, 2009<span class="reference-accessdate">. Retrieved <span class="nowrap">March 17,</span> 2009</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=CNN.com+%28FindLaw%29&amp;rft.atitle=What+legal+questions+are+the+new+chip+implants+for+humans+likely+to+raise%3F&amp;rft.date=2002-04-16&amp;rft.aulast=Hilden&amp;rft.aufirst=Julie&amp;rft_id=http%3A%2F%2Farchives.cnn.com%2F2002%2FLAW%2F05%2Fcolumns%2Ffl.hilden.chip%2Findex.html&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-wolf-cointelpro-128"><span class="mw-cite-backlink"><b><a href="#cite_ref-wolf-cointelpro_128-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFWolf" class="citation web cs1">Wolf, Paul. <a rel="nofollow" class="external text" href="http://www.icdc.com/~paulwolf/cointelpro/cointel.htm">"COINTELPRO"</a>. <i>(online collection of historical documents)</i><span class="reference-accessdate">. Retrieved <span class="nowrap">March 14,</span> 2009</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=%28online+collection+of+historical+documents%29&amp;rft.atitle=COINTELPRO&amp;rft.aulast=Wolf&amp;rft.aufirst=Paul&amp;rft_id=http%3A%2F%2Fwww.icdc.com%2F~paulwolf%2Fcointelpro%2Fcointel.htm&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-129"><span class="mw-cite-backlink"><b><a href="#cite_ref-129">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFRooney2017" class="citation journal cs1 cs1-prop-long-vol">Rooney, Julie Lynn (2017). "Going Postal: Analyzing the Abuse of Mail Covers Under the Fourth Amendment". <i>Vanderbilt Law Review</i>. 70[5]: 1627–1662.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Vanderbilt+Law+Review&amp;rft.atitle=Going+Postal%3A+Analyzing+the+Abuse+of+Mail+Covers+Under+the+Fourth+Amendment&amp;rft.volume=70%5B5%5D&amp;rft.pages=1627-1662&amp;rft.date=2017&amp;rft.aulast=Rooney&amp;rft.aufirst=Julie+Lynn&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-130"><span class="mw-cite-backlink"><b><a href="#cite_ref-130">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20150808002021/http://armypubs.army.mil/epubs/pdf/r381_10.pdf">"U.S. Army Intelligence Activities"</a> <span class="cs1-format">(PDF)</span>. Archived from <a rel="nofollow" class="external text" href="http://armypubs.army.mil/epubs/pdf/r381_10.pdf">the original</a> <span class="cs1-format">(PDF)</span> on August 8, 2015<span class="reference-accessdate">. Retrieved <span class="nowrap">25 May</span> 2015</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=U.S.+Army+Intelligence+Activities&amp;rft_id=http%3A%2F%2Farmypubs.army.mil%2Fepubs%2Fpdf%2Fr381_10.pdf&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-senate-mail-opening-131"><span class="mw-cite-backlink"><b><a href="#cite_ref-senate-mail-opening_131-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20110505050256/http://www.intelligence.senate.gov/pdfs94th/94755_III.pdf">"Domestic CIA and FBI Mail Opening Programs"</a> <span class="cs1-format">(PDF)</span>. <i>Final Report: Book III, Supplementary Detailed Staff Reports on Intelligence Activities and the Rights of Americans</i>. U.S. Senate Select Committee to Study Governmental Operations with Respect to Intelligence Activities. April 23, 1976. pp.&#160;559–678. Archived from <a rel="nofollow" class="external text" href="http://www.intelligence.senate.gov/pdfs94th/94755_III.pdf">the original</a> <span class="cs1-format">(PDF)</span> on May 5, 2011<span class="reference-accessdate">. Retrieved <span class="nowrap">March 13,</span> 2009</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=Final+Report%3A+Book+III%2C+Supplementary+Detailed+Staff+Reports+on+Intelligence+Activities+and+the+Rights+of+Americans&amp;rft.atitle=Domestic+CIA+and+FBI+Mail+Opening+Programs&amp;rft.pages=559-678&amp;rft.date=1976-04-23&amp;rft_id=http%3A%2F%2Fwww.intelligence.senate.gov%2Fpdfs94th%2F94755_III.pdf&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-political-repression-132"><span class="mw-cite-backlink"><b><a href="#cite_ref-political-repression_132-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFGoldstein2001" class="citation book cs1">Goldstein, Robert (2001). <a href="/wiki/Political_Repression_in_Modern_America" title="Political Repression in Modern America"><i>Political Repression in Modern America</i></a>. <a href="/wiki/University_of_Illinois_Press" title="University of Illinois Press">University of Illinois Press</a>. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-0-252-06964-2" title="Special:BookSources/978-0-252-06964-2"><bdi>978-0-252-06964-2</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=Political+Repression+in+Modern+America&amp;rft.pub=University+of+Illinois+Press&amp;rft.date=2001&amp;rft.isbn=978-0-252-06964-2&amp;rft.aulast=Goldstein&amp;rft.aufirst=Robert&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-:2-133"><span class="mw-cite-backlink">^ <a href="#cite_ref-:2_133-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-:2_133-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFWilliams2016" class="citation journal cs1">Williams, Jamie Lee (2016). <a rel="nofollow" class="external text" href="https://www.jstor.org/stable/26423456">"Privacy in the Age of the Internet of Things"</a>. <i>Human Rights</i>. <b>41</b> (4): 14–22. <a href="/wiki/ISSN_(identifier)" class="mw-redirect" title="ISSN (identifier)">ISSN</a>&#160;<a rel="nofollow" class="external text" href="https://search.worldcat.org/issn/0046-8185">0046-8185</a>. <a href="/wiki/JSTOR_(identifier)" class="mw-redirect" title="JSTOR (identifier)">JSTOR</a>&#160;<a rel="nofollow" class="external text" href="https://www.jstor.org/stable/26423456">26423456</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Human+Rights&amp;rft.atitle=Privacy+in+the+Age+of+the+Internet+of+Things&amp;rft.volume=41&amp;rft.issue=4&amp;rft.pages=14-22&amp;rft.date=2016&amp;rft_id=https%3A%2F%2Fwww.jstor.org%2Fstable%2F26423456%23id-name%3DJSTOR&amp;rft.issn=0046-8185&amp;rft.aulast=Williams&amp;rft.aufirst=Jamie+Lee&amp;rft_id=https%3A%2F%2Fwww.jstor.org%2Fstable%2F26423456&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-Deviant_Behaviour_-_Socially_accepted_observation_of_behaviour_for_security-134"><span class="mw-cite-backlink"><b><a href="#cite_ref-Deviant_Behaviour_-_Socially_accepted_observation_of_behaviour_for_security_134-0">^</a></b></span> <span class="reference-text"><a rel="nofollow" class="external text" href="http://www.fp7-tactics.eu/files/documents/Deviant%20Behaviour-Socially%20accepted%20observation%20of%20behaviour%20for%20security.pdf">Deviant Behaviour – Socially accepted observation of behaviour for security</a> <a rel="nofollow" class="external text" href="https://web.archive.org/web/20141223104500/http://www.fp7-tactics.eu/files/documents/Deviant%20Behaviour-Socially%20accepted%20observation%20of%20behaviour%20for%20security.pdf">Archived</a> December 23, 2014, at the <a href="/wiki/Wayback_Machine" title="Wayback Machine">Wayback Machine</a>, Jeroen van Rest</span> </li> <li id="cite_note-sun-getoverit-135"><span class="mw-cite-backlink"><b><a href="#cite_ref-sun-getoverit_135-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFSprenger1999" class="citation news cs1">Sprenger, Polly (January 26, 1999). <a rel="nofollow" class="external text" href="https://www.wired.com/politics/law/news/1999/01/17538">"Sun on Privacy: 'Get Over It'<span class="cs1-kern-right"></span>"</a>. <i>Wired Magazine</i><span class="reference-accessdate">. Retrieved <span class="nowrap">March 20,</span> 2009</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Wired+Magazine&amp;rft.atitle=Sun+on+Privacy%3A+%27Get+Over+It%27&amp;rft.date=1999-01-26&amp;rft.aulast=Sprenger&amp;rft.aufirst=Polly&amp;rft_id=https%3A%2F%2Fwww.wired.com%2Fpolitics%2Flaw%2Fnews%2F1999%2F01%2F17538&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-bw-getoverit-136"><span class="mw-cite-backlink"><b><a href="#cite_ref-bw-getoverit_136-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFBaigMarcia_StepanekNeil_Gross1999" class="citation news cs1">Baig, Edward; Marcia Stepanek; Neil Gross (April 5, 1999). <a rel="nofollow" class="external text" href="https://web.archive.org/web/20081017102602/http://www.businessweek.com/1999/99_14/b3623028.htm">"Privacy"</a>. <i>Business Week</i>. Archived from <a rel="nofollow" class="external text" href="http://www.businessweek.com/1999/99_14/b3623028.htm">the original</a> on October 17, 2008<span class="reference-accessdate">. Retrieved <span class="nowrap">March 20,</span> 2009</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Business+Week&amp;rft.atitle=Privacy&amp;rft.date=1999-04-05&amp;rft.aulast=Baig&amp;rft.aufirst=Edward&amp;rft.au=Marcia+Stepanek&amp;rft.au=Neil+Gross&amp;rft_id=http%3A%2F%2Fwww.businessweek.com%2F1999%2F99_14%2Fb3623028.htm&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-137"><span class="mw-cite-backlink"><b><a href="#cite_ref-137">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFSolove,_Daniel2007" class="citation journal cs1"><a href="/wiki/Daniel_J._Solove" title="Daniel J. Solove">Solove, Daniel</a> (2007). "<span class="cs1-kern-left"></span>'I've Got Nothing to Hide' and Other Misunderstandings of Privacy". <i>San Diego Law Review</i>. <b>44</b>: 745. <a href="/wiki/SSRN_(identifier)" class="mw-redirect" title="SSRN (identifier)">SSRN</a>&#160;<a rel="nofollow" class="external text" href="https://papers.ssrn.com/sol3/papers.cfm?abstract_id=998565">998565</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=San+Diego+Law+Review&amp;rft.atitle=%27I%27ve+Got+Nothing+to+Hide%27+and+Other+Misunderstandings+of+Privacy&amp;rft.volume=44&amp;rft.pages=745&amp;rft.date=2007&amp;rft_id=https%3A%2F%2Fpapers.ssrn.com%2Fsol3%2Fpapers.cfm%3Fabstract_id%3D998565%23id-name%3DSSRN&amp;rft.au=Solove%2C+Daniel&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-us-surveillance-soc-138"><span class="mw-cite-backlink">^ <a href="#cite_ref-us-surveillance-soc_138-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-us-surveillance-soc_138-1"><sup><i><b>b</b></i></sup></a> <a href="#cite_ref-us-surveillance-soc_138-2"><sup><i><b>c</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.aclu.org/privacy/gen/index.html">"Is the U.S. Turning Into a Surveillance Society?"</a>. <i>American Civil Liberties Union</i><span class="reference-accessdate">. Retrieved <span class="nowrap">March 13,</span> 2009</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=American+Civil+Liberties+Union&amp;rft.atitle=Is+the+U.S.+Turning+Into+a+Surveillance+Society%3F&amp;rft_id=https%3A%2F%2Fwww.aclu.org%2Fprivacy%2Fgen%2Findex.html&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-bigger-monster-139"><span class="mw-cite-backlink">^ <a href="#cite_ref-bigger-monster_139-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-bigger-monster_139-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.aclu.org/FilesPDFs/aclu_report_bigger_monster_weaker_chains.pdf">"Bigger Monster, Weaker Chains: The Growth of an American Surveillance Society"</a> <span class="cs1-format">(PDF)</span>. <i>American Civil Liberties Union</i>. January 15, 2003. <a rel="nofollow" class="external text" href="https://ghostarchive.org/archive/20221009/https://www.aclu.org/FilesPDFs/aclu_report_bigger_monster_weaker_chains.pdf">Archived</a> <span class="cs1-format">(PDF)</span> from the original on October 9, 2022<span class="reference-accessdate">. Retrieved <span class="nowrap">March 13,</span> 2009</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=American+Civil+Liberties+Union&amp;rft.atitle=Bigger+Monster%2C+Weaker+Chains%3A+The+Growth+of+an+American+Surveillance+Society&amp;rft.date=2003-01-15&amp;rft_id=https%3A%2F%2Fwww.aclu.org%2FFilesPDFs%2Faclu_report_bigger_monster_weaker_chains.pdf&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-140"><span class="mw-cite-backlink"><b><a href="#cite_ref-140">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://www.scmp.com/news/china/society/article/2124158/chinese-tech-firm-told-stop-watching-us-after-footage-security">"Privacy fears over online surveillance footage broadcasts in China"</a>. December 13, 2017.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Privacy+fears+over+online+surveillance+footage+broadcasts+in+China&amp;rft.date=2017-12-13&amp;rft_id=http%3A%2F%2Fwww.scmp.com%2Fnews%2Fchina%2Fsociety%2Farticle%2F2124158%2Fchinese-tech-firm-told-stop-watching-us-after-footage-security&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-Marx_et_al,_2007-141"><span class="mw-cite-backlink"><b><a href="#cite_ref-Marx_et_al,_2007_141-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFMarxMuschert2007" class="citation journal cs1">Marx, Gary T.; Muschert, Glenn W. (2007). <a rel="nofollow" class="external text" href="https://web.archive.org/web/20170811145820/http://www.users.miamioh.edu/muschegw/Personal%20Info%20Borders%20Surveillance%20Marx%20Muschert.pdf">"Personal Information, Borders, and the New Surveillance Studies"</a> <span class="cs1-format">(PDF)</span>. <i><a href="/wiki/Annual_Review_of_Law_and_Social_Science" title="Annual Review of Law and Social Science">Annual Review of Law and Social Science</a></i>. <b>3</b>: 375–395. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1146%2Fannurev.lawsocsci.3.081806.112824">10.1146/annurev.lawsocsci.3.081806.112824</a>. Archived from <a rel="nofollow" class="external text" href="http://www.users.miamioh.edu/muschegw/Personal%20Info%20Borders%20Surveillance%20Marx%20Muschert.pdf">the original</a> <span class="cs1-format">(PDF)</span> on August 11, 2017.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Annual+Review+of+Law+and+Social+Science&amp;rft.atitle=Personal+Information%2C+Borders%2C+and+the+New+Surveillance+Studies&amp;rft.volume=3&amp;rft.pages=375-395&amp;rft.date=2007&amp;rft_id=info%3Adoi%2F10.1146%2Fannurev.lawsocsci.3.081806.112824&amp;rft.aulast=Marx&amp;rft.aufirst=Gary+T.&amp;rft.au=Muschert%2C+Glenn+W.&amp;rft_id=http%3A%2F%2Fwww.users.miamioh.edu%2Fmuschegw%2FPersonal%2520Info%2520Borders%2520Surveillance%2520Marx%2520Muschert.pdf&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-Agre,_2003-142"><span class="mw-cite-backlink">^ <a href="#cite_ref-Agre,_2003_142-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-Agre,_2003_142-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text">Agre, Philip E. (2003), <a rel="nofollow" class="external text" href="http://polaris.gseis.ucla.edu/pagre/bar-code.html">"Your Face is not a bar code: arguments against automatic face recognition in public places"</a>. Retrieved November 14, 2004.</span> </li> <li id="cite_note-foucault-discipline-143"><span class="mw-cite-backlink"><b><a href="#cite_ref-foucault-discipline_143-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFFoucault1979" class="citation book cs1"><a href="/wiki/Michel_Foucault" title="Michel Foucault">Foucault, Michel</a> (1979). <span class="id-lock-registration" title="Free registration required"><a rel="nofollow" class="external text" href="https://archive.org/details/disciplinepunish0000fouc"><i>Discipline and Punish</i></a></span>. New York: Vintage Books. pp.&#160;<a rel="nofollow" class="external text" href="https://archive.org/details/disciplinepunish0000fouc/page/201">201</a>–202. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/9780394727677" title="Special:BookSources/9780394727677"><bdi>9780394727677</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=Discipline+and+Punish&amp;rft.place=New+York&amp;rft.pages=201-202&amp;rft.pub=Vintage+Books&amp;rft.date=1979&amp;rft.isbn=9780394727677&amp;rft.aulast=Foucault&amp;rft.aufirst=Michel&amp;rft_id=https%3A%2F%2Farchive.org%2Fdetails%2Fdisciplinepunish0000fouc&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-:1-144"><span class="mw-cite-backlink">^ <a href="#cite_ref-:1_144-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-:1_144-1"><sup><i><b>b</b></i></sup></a> <a href="#cite_ref-:1_144-2"><sup><i><b>c</b></i></sup></a> <a href="#cite_ref-:1_144-3"><sup><i><b>d</b></i></sup></a> <a href="#cite_ref-:1_144-4"><sup><i><b>e</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFChayko2017" class="citation book cs1"><a href="/wiki/Mary_Chayko" title="Mary Chayko">Chayko, Mary</a> (2017). <i>Superconnected: the internet, digital media, and techno-social life</i>. New York, NY: Sage Publications.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=Superconnected%3A+the+internet%2C+digital+media%2C+and+techno-social+life&amp;rft.place=New+York%2C+NY&amp;rft.pub=Sage+Publications&amp;rft.date=2017&amp;rft.aulast=Chayko&amp;rft.aufirst=Mary&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-145"><span class="mw-cite-backlink"><b><a href="#cite_ref-145">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFNishiyama2017" class="citation journal cs1">Nishiyama, Hidefumi (2017). <a rel="nofollow" class="external text" href="https://muse.jhu.edu/article/646864/summary">"Surveillance as Race Struggle: On Browne's Dark Matters"</a>. <i>Theory &amp; Event</i>. <b>20</b> (1). Johns Hopkins University Press: 280–285 &#8211; via Project MUSE.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Theory+%26+Event&amp;rft.atitle=Surveillance+as+Race+Struggle%3A+On+Browne%27s+Dark+Matters&amp;rft.volume=20&amp;rft.issue=1&amp;rft.pages=280-285&amp;rft.date=2017&amp;rft.aulast=Nishiyama&amp;rft.aufirst=Hidefumi&amp;rft_id=https%3A%2F%2Fmuse.jhu.edu%2Farticle%2F646864%2Fsummary&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-146"><span class="mw-cite-backlink"><b><a href="#cite_ref-146">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFBrowne2015" class="citation book cs1"><a href="/wiki/Simone_Browne" title="Simone Browne">Browne, Simone</a> (October 2, 2015). <i>Dark Matters: On the Surveillance of Blackness</i>. Duke University Press Books. p.&#160;224. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-0822359197" title="Special:BookSources/978-0822359197"><bdi>978-0822359197</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=Dark+Matters%3A+On+the+Surveillance+of+Blackness&amp;rft.pages=224&amp;rft.pub=Duke+University+Press+Books&amp;rft.date=2015-10-02&amp;rft.isbn=978-0822359197&amp;rft.aulast=Browne&amp;rft.aufirst=Simone&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-147"><span class="mw-cite-backlink"><b><a href="#cite_ref-147">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFCourt_of_Appeal,_Second_District,_Division_6,_California.2008" class="citation web cs1">Court of Appeal, Second District, Division 6, California. (July 30, 2008). <a rel="nofollow" class="external text" href="https://caselaw.findlaw.com/ca-court-of-appeal/1033744.html">"People vs. Diaz"</a>. <i>FindLaw</i><span class="reference-accessdate">. Retrieved <span class="nowrap">February 1,</span> 2017</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=FindLaw&amp;rft.atitle=People+vs.+Diaz&amp;rft.date=2008-07-30&amp;rft.au=Court+of+Appeal%2C+Second+District%2C+Division+6%2C+California.&amp;rft_id=https%3A%2F%2Fcaselaw.findlaw.com%2Fca-court-of-appeal%2F1033744.html&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span><span class="cs1-maint citation-comment"><code class="cs1-code">{{<a href="/wiki/Template:Cite_web" title="Template:Cite web">cite web</a>}}</code>: CS1 maint: multiple names: authors list (<a href="/wiki/Category:CS1_maint:_multiple_names:_authors_list" title="Category:CS1 maint: multiple names: authors list">link</a>) CS1 maint: numeric names: authors list (<a href="/wiki/Category:CS1_maint:_numeric_names:_authors_list" title="Category:CS1 maint: numeric names: authors list">link</a>)</span></span> </li> <li id="cite_note-148"><span class="mw-cite-backlink"><b><a href="#cite_ref-148">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFCalifornia_Fourth_District_Court_of_Appeal2014" class="citation web cs1">California Fourth District Court of Appeal (June 25, 2014). <a rel="nofollow" class="external text" href="https://www.oyez.org/cases/2013/13-132">"Riley v. California"</a>. <i>Oyez – IIT Chicago-Kent College of Law</i><span class="reference-accessdate">. Retrieved <span class="nowrap">February 1,</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=Oyez+%E2%80%93+IIT+Chicago-Kent+College+of+Law&amp;rft.atitle=Riley+v.+California&amp;rft.date=2014-06-25&amp;rft.au=California+Fourth+District+Court+of+Appeal&amp;rft_id=https%3A%2F%2Fwww.oyez.org%2Fcases%2F2013%2F13-132&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-149"><span class="mw-cite-backlink"><b><a href="#cite_ref-149">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.stratfor.com/secrets_countersurveillance">"The Secrets of Countersurveillance"</a>. Security Weekly. June 6, 2007.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=The+Secrets+of+Countersurveillance&amp;rft.pub=Security+Weekly&amp;rft.date=2007-06-06&amp;rft_id=https%3A%2F%2Fwww.stratfor.com%2Fsecrets_countersurveillance&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-150"><span class="mw-cite-backlink"><b><a href="#cite_ref-150">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFAngwin2023" class="citation web cs1">Angwin, Julia (June 13, 2023). <a rel="nofollow" class="external text" href="https://www.nytimes.com/2023/06/13/opinion/encryption-messaging-privacy-signal-whatsapp.html">"One of the Last Bastions of Digital Privacy Is Under Threat"</a>. <i><a href="/wiki/The_New_York_Times" title="The New York Times">The New York Times</a></i>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=The+New+York+Times&amp;rft.atitle=One+of+the+Last+Bastions+of+Digital+Privacy+Is+Under+Threat&amp;rft.date=2023-06-13&amp;rft.aulast=Angwin&amp;rft.aufirst=Julia&amp;rft_id=https%3A%2F%2Fwww.nytimes.com%2F2023%2F06%2F13%2Fopinion%2Fencryption-messaging-privacy-signal-whatsapp.html&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-151"><span class="mw-cite-backlink"><b><a href="#cite_ref-151">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFLee2015" class="citation web cs1">Lee, Micah (November 12, 2015). <a rel="nofollow" class="external text" href="https://theintercept.com/2015/11/12/edward-snowden-explains-how-to-reclaim-your-privacy/">"Edward Snowden Explains How To Reclaim Your Privacy"</a>. <i>The Intercept</i><span class="reference-accessdate">. Retrieved <span class="nowrap">October 31,</span> 2023</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=The+Intercept&amp;rft.atitle=Edward+Snowden+Explains+How+To+Reclaim+Your+Privacy&amp;rft.date=2015-11-12&amp;rft.aulast=Lee&amp;rft.aufirst=Micah&amp;rft_id=https%3A%2F%2Ftheintercept.com%2F2015%2F11%2F12%2Fedward-snowden-explains-how-to-reclaim-your-privacy%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-152"><span class="mw-cite-backlink"><b><a href="#cite_ref-152">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFSigalos2021" class="citation web cs1">Sigalos, MacKenzie (June 13, 2021). <a rel="nofollow" class="external text" href="https://www.cnbc.com/2021/06/13/what-is-monero-new-cryptocurrency-of-choice-for-cyber-criminals.html">"Why some cyber criminals are ditching bitcoin for a cryptocurrency called monero"</a>. <i>CNBC</i><span class="reference-accessdate">. Retrieved <span class="nowrap">October 31,</span> 2023</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=CNBC&amp;rft.atitle=Why+some+cyber+criminals+are+ditching+bitcoin+for+a+cryptocurrency+called+monero&amp;rft.date=2021-06-13&amp;rft.aulast=Sigalos&amp;rft.aufirst=MacKenzie&amp;rft_id=https%3A%2F%2Fwww.cnbc.com%2F2021%2F06%2F13%2Fwhat-is-monero-new-cryptocurrency-of-choice-for-cyber-criminals.html&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-153"><span class="mw-cite-backlink"><b><a href="#cite_ref-153">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFCheng2017" class="citation web cs1">Cheng, Evelyn (August 29, 2017). <a rel="nofollow" class="external text" href="https://www.cnbc.com/2017/08/29/dark-web-finds-bitcoin-increasingly-more-of-a-problem-than-a-help-tries-other-digital-currencies.html">"Dark web finds bitcoin increasingly more of a problem than a help, tries other digital currencies"</a>. <i>CNBC</i><span class="reference-accessdate">. Retrieved <span class="nowrap">October 31,</span> 2023</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=CNBC&amp;rft.atitle=Dark+web+finds+bitcoin+increasingly+more+of+a+problem+than+a+help%2C+tries+other+digital+currencies&amp;rft.date=2017-08-29&amp;rft.aulast=Cheng&amp;rft.aufirst=Evelyn&amp;rft_id=https%3A%2F%2Fwww.cnbc.com%2F2017%2F08%2F29%2Fdark-web-finds-bitcoin-increasingly-more-of-a-problem-than-a-help-tries-other-digital-currencies.html&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-154"><span class="mw-cite-backlink"><b><a href="#cite_ref-154">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFEll2018" class="citation web cs1">Ell, Kellie (July 13, 2018). <a rel="nofollow" class="external text" href="https://www.cnbc.com/2018/07/13/coinbase-considers-five-new-coins-for-its-platform.html">"Coinbase considers adding five new coins to its platform"</a>. <i>CNBC</i><span class="reference-accessdate">. Retrieved <span class="nowrap">October 31,</span> 2023</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=CNBC&amp;rft.atitle=Coinbase+considers+adding+five+new+coins+to+its+platform&amp;rft.date=2018-07-13&amp;rft.aulast=Ell&amp;rft.aufirst=Kellie&amp;rft_id=https%3A%2F%2Fwww.cnbc.com%2F2018%2F07%2F13%2Fcoinbase-considers-five-new-coins-for-its-platform.html&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-155"><span class="mw-cite-backlink"><b><a href="#cite_ref-155">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFBirch2005" class="citation news cs1">Birch, Dave (July 14, 2005). <a rel="nofollow" class="external text" href="https://www.theguardian.com/technology/2005/jul/14/comment.comment">"The age of sousveillance"</a>. <i><a href="/wiki/The_Guardian" title="The Guardian">The Guardian</a></i>. London<span class="reference-accessdate">. Retrieved <span class="nowrap">August 6,</span> 2007</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=The+Guardian&amp;rft.atitle=The+age+of+sousveillance&amp;rft.date=2005-07-14&amp;rft.aulast=Birch&amp;rft.aufirst=Dave&amp;rft_id=https%3A%2F%2Fwww.theguardian.com%2Ftechnology%2F2005%2Fjul%2F14%2Fcomment.comment&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> <li id="cite_note-:0-156"><span class="mw-cite-backlink">^ <a href="#cite_ref-:0_156-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-:0_156-1"><sup><i><b>b</b></i></sup></a> <a href="#cite_ref-:0_156-2"><sup><i><b>c</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFEggers2013" class="citation book cs1">Eggers, David (2013). <span class="id-lock-registration" title="Free registration required"><a rel="nofollow" class="external text" href="https://archive.org/details/circle00dave"><i>The Circle</i></a></span>. New York: Alfred A. Knopf, McSweeney's Books. pp.&#160;<a rel="nofollow" class="external text" href="https://archive.org/details/circle00dave/page/288">288</a>, 290–291, 486. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-0-385-35139-3" title="Special:BookSources/978-0-385-35139-3"><bdi>978-0-385-35139-3</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=The+Circle&amp;rft.place=New+York&amp;rft.pages=288%2C+290-291%2C+486&amp;rft.pub=Alfred+A.+Knopf%2C+McSweeney%27s+Books&amp;rft.date=2013&amp;rft.isbn=978-0-385-35139-3&amp;rft.aulast=Eggers&amp;rft.aufirst=David&amp;rft_id=https%3A%2F%2Farchive.org%2Fdetails%2Fcircle00dave&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></span> </li> </ol></div> <div class="mw-heading mw-heading2"><h2 id="Further_reading">Further reading</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Surveillance&amp;action=edit&amp;section=38" title="Edit section: Further reading"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <style data-mw-deduplicate="TemplateStyles:r1235681985">.mw-parser-output .side-box{margin:4px 0;box-sizing:border-box;border:1px solid #aaa;font-size:88%;line-height:1.25em;background-color:var(--background-color-interactive-subtle,#f8f9fa);display:flow-root}.mw-parser-output .side-box-abovebelow,.mw-parser-output .side-box-text{padding:0.25em 0.9em}.mw-parser-output .side-box-image{padding:2px 0 2px 0.9em;text-align:center}.mw-parser-output .side-box-imageright{padding:2px 0.9em 2px 0;text-align:center}@media(min-width:500px){.mw-parser-output .side-box-flex{display:flex;align-items:center}.mw-parser-output .side-box-text{flex:1;min-width:0}}@media(min-width:720px){.mw-parser-output .side-box{width:238px}.mw-parser-output .side-box-right{clear:right;float:right;margin-left:1em}.mw-parser-output .side-box-left{margin-right:1em}}</style><div class="side-box metadata side-box-right"><style data-mw-deduplicate="TemplateStyles:r1126788409">.mw-parser-output .plainlist ol,.mw-parser-output .plainlist ul{line-height:inherit;list-style:none;margin:0;padding:0}.mw-parser-output .plainlist ol li,.mw-parser-output .plainlist ul li{margin-bottom:0}</style> <div class="side-box-abovebelow"> <a href="/wiki/Wikipedia:The_Wikipedia_Library" title="Wikipedia:The Wikipedia Library">Library resources</a> about <br /> <b>Surveillance</b> <hr /></div> <div class="side-box-flex"> <div class="side-box-text plainlist"><ul><li><a class="external text" href="https://ftl.toolforge.org/cgi-bin/ftl?st=wp&amp;su=Surveillance">Resources in your library</a></li> <li><a class="external text" href="https://ftl.toolforge.org/cgi-bin/ftl?st=wp&amp;su=Surveillance&amp;library=0CHOOSE0">Resources in other libraries</a></li> </ul></div></div> </div> <ul><li>Allmer, Thomas. (2012). <i>Towards a Critical Theory of Surveillance in Informational Capitalism</i>. Frankfurt am Main: Peter Lang. <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-3-631-63220-8" title="Special:BookSources/978-3-631-63220-8">978-3-631-63220-8</a></li> <li>Andrejevic, Mark. 2007. <i>iSpy: Surveillance and Power in the Interactive Era</i>. Lawrence, KS: University Press of Kansas. <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/0700616861" title="Special:BookSources/0700616861">0700616861</a></li> <li>Ball, Kirstie, Kevin D. Haggerty, and David Lyon, eds. (2012). <i>Routledge Handbook of Surveillance Studies</i>. New York: Routledge. <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/1138026026" title="Special:BookSources/1138026026">1138026026</a></li> <li>Brayne, Sarah. (2020). <i>Predict and Surveil: Data, Discretion, and the Future of Policing</i>. New York: Oxford University Press. <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/0190684097" title="Special:BookSources/0190684097">0190684097</a></li> <li>Browne, Simone. (2015). <i>Dark Matters: On the Surveillance of Blackness</i>. Durham: Duke University Press. <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-0822359197" title="Special:BookSources/978-0822359197">978-0822359197</a></li> <li>Coleman, Roy, and Michael McCahill. 2011. <i>Surveillance &amp; Crime</i>. Thousand Oaks, Calif.: Sage. <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/1847873537" title="Special:BookSources/1847873537">1847873537</a></li> <li>Feldman, Jay. (2011). <i>Manufacturing Hysteria: A History of Scapegoating, Surveillance, and Secrecy in Modern America</i>. New York, NY: Pantheon Books. <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/0-375-42534-9" title="Special:BookSources/0-375-42534-9">0-375-42534-9</a></li> <li>Fuchs, Christian, Kees Boersma, Anders Albrechtslund, and Marisol Sandoval, eds. (2012). "Internet and Surveillance: The Challenges of Web 2.0 and Social Media". New York: Routledge. <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-0-415-89160-8" title="Special:BookSources/978-0-415-89160-8">978-0-415-89160-8</a></li> <li><a href="/wiki/Garfinkel,_Simson" class="mw-redirect" title="Garfinkel, Simson">Garfinkel, Simson</a>, <i>Database Nation; The Death of Privacy in the 21st Century</i>. O'Reilly &amp; Associates, Inc. <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/0-596-00105-3" title="Special:BookSources/0-596-00105-3">0-596-00105-3</a></li> <li>Gilliom, John. (2001). <i>Overseers of the Poor: Surveillance, Resistance, and the Limits of Privacy</i>, University Of Chicago Press, <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-0-226-29361-5" title="Special:BookSources/978-0-226-29361-5">978-0-226-29361-5</a></li> <li>Haque, Akhlaque. (2015). Surveillance, Transparency and Democracy: Public Administration in the Information Age. University of Alabama Press, Tuscaloosa, AL. <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-0-8173-1877-2" title="Special:BookSources/978-0-8173-1877-2">978-0-8173-1877-2</a></li> <li>Harris, Shane. (2011). <i>The Watchers: The Rise of America's Surveillance State</i>. London, UK: Penguin Books Ltd. <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/0-14-311890-0" title="Special:BookSources/0-14-311890-0">0-14-311890-0</a></li> <li>Hier, Sean P., &amp; Greenberg, Joshua (Eds.). (2009). <i>Surveillance: Power, Problems, and Politics</i>. Vancouver, CA: UBC Press. <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/0-7748-1611-2" title="Special:BookSources/0-7748-1611-2">0-7748-1611-2</a></li> <li><a href="/wiki/Jensen,_Derrick" class="mw-redirect" title="Jensen, Derrick">Jensen, Derrick</a> and Draffan, George (2004) <i>Welcome to the Machine: Science, Surveillance, and the Culture of Control</i> Chelsea Green Publishing Company. <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-1-931498-52-4" title="Special:BookSources/978-1-931498-52-4">978-1-931498-52-4</a></li> <li>Lewis, Randolph. (2017). <i>Under Surveillance: Being Watched in Modern America</i>. Austin: University of Texas Press. <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/1477312439" title="Special:BookSources/1477312439">1477312439</a></li> <li>Lyon, David (2001). <i>Surveillance Society: Monitoring in Everyday Life</i>. Philadelphia: Open University Press. <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-0-335-20546-2" title="Special:BookSources/978-0-335-20546-2">978-0-335-20546-2</a></li> <li>Lyon, David (Ed.). (2006). <i>Theorizing Surveillance: The Panopticon and Beyond</i>. Cullompton, UK: Willan Publishing. <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-1-84392-191-2" title="Special:BookSources/978-1-84392-191-2">978-1-84392-191-2</a></li> <li>Lyon, David (2007) <i>Surveillance Studies: An Overview</i>. Cambridge: Polity Press. <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-0-7456-3591-0" title="Special:BookSources/978-0-7456-3591-0">978-0-7456-3591-0</a></li> <li>Matteralt, Armand. (2010). <i>The Globalization of Surveillance</i>. Cambridge, UK: Polity Press. <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/0-7456-4511-9" title="Special:BookSources/0-7456-4511-9">0-7456-4511-9</a></li> <li>Monahan, Torin, ed. (2006). <i>Surveillance and Security: Technological Politics and Power in Everyday Life</i>. New York: Routledge. <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/9780415953931" title="Special:BookSources/9780415953931">9780415953931</a></li> <li>Monahan, Torin. (2010). <i>Surveillance in the Time of Insecurity</i>. New Brunswick: Rutgers University Press. <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/0813547652" title="Special:BookSources/0813547652">0813547652</a></li> <li>Monahan, Torin, and David Murakami Wood, eds. (2018). <i>Surveillance Studies: A Reader</i>. New York: Oxford University Press. <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-0-190-29782-4" title="Special:BookSources/978-0-190-29782-4">978-0-190-29782-4</a></li> <li>Parenti, Christian <i>The Soft Cage: Surveillance in America From Slavery to the War on Terror</i>, Basic Books, <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-0-465-05485-5" title="Special:BookSources/978-0-465-05485-5">978-0-465-05485-5</a></li> <li>Petersen, J.K. (2012) <i>Handbook of Surveillance Technologies, Third Edition</i>, Taylor &amp; Francis: CRC Press, 1020 pp., <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-1-439873-15-1" title="Special:BookSources/978-1-439873-15-1">978-1-439873-15-1</a></li> <li>Staples, William G. (2000). <i>Everyday Surveillance: Vigilance and Visibility in Post-Modern Life</i>. Lanham, MD: Rowman &amp; Littlefield Publishers. <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/0-7425-0077-2" title="Special:BookSources/0-7425-0077-2">0-7425-0077-2</a></li> <li>Yan, W. (2019). <i>Introduction to Intelligent Surveillance: Surveillance Data Capture, Transmission, and Analytics </i>. Springer Publishers. <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/3030107124" title="Special:BookSources/3030107124">3030107124</a></li></ul> <div class="mw-heading mw-heading3"><h3 id="General_information">General information</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Surveillance&amp;action=edit&amp;section=39" title="Edit section: General information"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <ul><li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation news cs1"><a rel="nofollow" class="external text" href="http://monthlyreview.org/">"Special Issue on Surveillance Capitalism – nine articles analyzing financial, social, political, legal, historical, security and other aspects of US and international surveillance and spying programs and their relation to capitalism"</a>. <i><a href="/wiki/Monthly_Review" title="Monthly Review">Monthly Review</a></i>. 2014.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Monthly+Review&amp;rft.atitle=Special+Issue+on+Surveillance+Capitalism+%E2%80%93+nine+articles+analyzing+financial%2C+social%2C+political%2C+legal%2C+historical%2C+security+and+other+aspects+of+US+and+international+surveillance+and+spying+programs+and+their+relation+to+capitalism&amp;rft.date=2014&amp;rft_id=http%3A%2F%2Fmonthlyreview.org%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span> (Volume 66, Number 3, July–August)</li> <li><a rel="nofollow" class="external text" href="https://www.aclu.org/FilesPDFs/surveillance_report.pdf">ACLU, "The Surveillance-Industrial Complex: How the American Government Is Conscripting Businesses and Individuals in the Construction of a Surveillance Society"</a></li> <li><a rel="nofollow" class="external text" href="http://digitalcommons.law.yale.edu/cgi/viewcontent.cgi?article=1224&amp;context=fss_papers">Balkin, Jack M. (2008). "The Constitution in the National Surveillance State", Yale Law School</a></li> <li><a rel="nofollow" class="external text" href="https://web.archive.org/web/20111108000538/http://cle.ens-lyon.fr/08111026/0/fiche___pagelibre/%26RH%3DCDL_ANG100100">Bibo, Didier and Delmas-Marty, "The State and Surveillance: Fear and Control"</a></li> <li><a rel="nofollow" class="external text" href="https://www.eff.org/issues/privacy">EFF Privacy Resources</a></li> <li><a rel="nofollow" class="external text" href="https://epic.org/privacy/privacy_resources_faq.html">EPIC Privacy Resources</a></li> <li><a rel="nofollow" class="external text" href="https://web.archive.org/web/20160102163220/http://www.ico.gov.uk/upload/documents/library/data_protection/practical_application/surveillance_society_full_report_2006.pdf">ICO. (September 2006). "A Report on the Surveillance Society for the Information Commissioner by the Surveillance Studies Network".</a></li> <li><a rel="nofollow" class="external text" href="https://epic.org/privacy/default.html">Privacy Information Center</a> <a rel="nofollow" class="external text" href="https://web.archive.org/web/20090221160924/http://epic.org/privacy/default.html">Archived</a> February 21, 2009, at the <a href="/wiki/Wayback_Machine" title="Wayback Machine">Wayback Machine</a></li> <li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation news cs1"><a rel="nofollow" class="external text" href="https://www.theguardian.com/world/the-nsa-files">"The NSA Files (Dozens of articles about the U.S. National Security Agency and its spying and surveillance programs)"</a>. <i><a href="/wiki/The_Guardian" title="The Guardian">The Guardian</a></i>. London. June 8, 2013.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=The+Guardian&amp;rft.atitle=The+NSA+Files+%28Dozens+of+articles+about+the+U.S.+National+Security+Agency+and+its+spying+and+surveillance+programs%29&amp;rft.date=2013-06-08&amp;rft_id=https%3A%2F%2Fwww.theguardian.com%2Fworld%2Fthe-nsa-files&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASurveillance" class="Z3988"></span></li></ul> <div class="mw-heading mw-heading3"><h3 id="Historical_information">Historical information</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Surveillance&amp;action=edit&amp;section=40" title="Edit section: Historical information"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <ul><li><a rel="nofollow" class="external text" href="http://www.icdc.com/~paulwolf/cointelpro/cointel.htm">COINTELPRO</a>—FBI counterintelligence programs designed to neutralize political dissidents</li> <li><a rel="nofollow" class="external text" href="https://web.archive.org/web/20140410190734/http://www.historyoftechnology.org/tech_stories/index.html">Reversing the Whispering Gallery of Dionysius </a> – A Short History of Electronic Surveillance in the United States</li></ul> <div class="mw-heading mw-heading3"><h3 id="Legal_resources">Legal resources</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Surveillance&amp;action=edit&amp;section=41" title="Edit section: Legal resources"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <ul><li><a rel="nofollow" class="external text" href="https://www.eff.org/cases">EFF Legal Cases</a></li> <li><a rel="nofollow" class="external text" href="https://web.archive.org/web/20080307143322/http://www.ss8.com/pdfs/Ready_Guide_Download_Version.pdf">Guide to lawful intercept legislation around the world</a></li></ul> <div class="mw-heading mw-heading2"><h2 id="External_links">External links</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Surveillance&amp;action=edit&amp;section=42" title="Edit section: External links"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1235681985"><style data-mw-deduplicate="TemplateStyles:r1237033735">@media print{body.ns-0 .mw-parser-output .sistersitebox{display:none!important}}@media screen{html.skin-theme-clientpref-night .mw-parser-output .sistersitebox img[src*="Wiktionary-logo-en-v2.svg"]{background-color:white}}@media screen and (prefers-color-scheme:dark){html.skin-theme-clientpref-os .mw-parser-output .sistersitebox img[src*="Wiktionary-logo-en-v2.svg"]{background-color:white}}</style><div class="side-box side-box-right plainlinks sistersitebox"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1126788409"> <div class="side-box-flex"> <div class="side-box-image"><span class="noviewer" typeof="mw:File"><span><img alt="" src="//upload.wikimedia.org/wikipedia/commons/thumb/9/99/Wiktionary-logo-en-v2.svg/40px-Wiktionary-logo-en-v2.svg.png" decoding="async" width="40" height="40" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/9/99/Wiktionary-logo-en-v2.svg/60px-Wiktionary-logo-en-v2.svg.png 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/9/99/Wiktionary-logo-en-v2.svg/80px-Wiktionary-logo-en-v2.svg.png 2x" data-file-width="512" data-file-height="512" /></span></span></div> <div class="side-box-text plainlist">Look up <i><b><a href="https://en.wiktionary.org/wiki/surveillance" class="extiw" title="wiktionary:surveillance">surveillance</a></b></i> in Wiktionary, the free dictionary.</div></div> </div> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1235681985"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1237033735"><div class="side-box side-box-right plainlinks sistersitebox"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1126788409"> <div class="side-box-flex"> <div class="side-box-image"><span class="noviewer" typeof="mw:File"><span><img alt="" src="//upload.wikimedia.org/wikipedia/commons/thumb/f/fa/Wikiquote-logo.svg/34px-Wikiquote-logo.svg.png" decoding="async" width="34" height="40" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/f/fa/Wikiquote-logo.svg/51px-Wikiquote-logo.svg.png 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/f/fa/Wikiquote-logo.svg/68px-Wikiquote-logo.svg.png 2x" data-file-width="300" data-file-height="355" /></span></span></div> <div class="side-box-text plainlist">Wikiquote has quotations related to <i><b><a href="https://en.wikiquote.org/wiki/Special:Search/Surveillance" class="extiw" title="q:Special:Search/Surveillance">Surveillance</a></b></i>.</div></div> </div> <ul><li><span class="noviewer" typeof="mw:File"><a href="/wiki/File:Commons-logo.svg" class="mw-file-description"><img alt="" src="//upload.wikimedia.org/wikipedia/en/thumb/4/4a/Commons-logo.svg/12px-Commons-logo.svg.png" decoding="async" width="12" height="16" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/en/thumb/4/4a/Commons-logo.svg/18px-Commons-logo.svg.png 1.5x, //upload.wikimedia.org/wikipedia/en/thumb/4/4a/Commons-logo.svg/24px-Commons-logo.svg.png 2x" data-file-width="1024" data-file-height="1376" /></a></span> Media related to <a href="https://commons.wikimedia.org/wiki/Category:Surveillance" class="extiw" title="commons:Category:Surveillance">Surveillance</a> at Wikimedia Commons</li></ul> <div class="navbox-styles"><style data-mw-deduplicate="TemplateStyles:r1129693374">.mw-parser-output .hlist dl,.mw-parser-output .hlist ol,.mw-parser-output .hlist ul{margin:0;padding:0}.mw-parser-output .hlist dd,.mw-parser-output .hlist dt,.mw-parser-output .hlist li{margin:0;display:inline}.mw-parser-output .hlist.inline,.mw-parser-output .hlist.inline dl,.mw-parser-output .hlist.inline ol,.mw-parser-output .hlist.inline ul,.mw-parser-output .hlist dl dl,.mw-parser-output .hlist dl ol,.mw-parser-output .hlist dl ul,.mw-parser-output .hlist ol dl,.mw-parser-output .hlist ol ol,.mw-parser-output .hlist ol ul,.mw-parser-output .hlist ul dl,.mw-parser-output .hlist ul ol,.mw-parser-output .hlist ul ul{display:inline}.mw-parser-output .hlist .mw-empty-li{display:none}.mw-parser-output .hlist dt::after{content:": "}.mw-parser-output .hlist dd::after,.mw-parser-output .hlist li::after{content:" · ";font-weight:bold}.mw-parser-output .hlist dd:last-child::after,.mw-parser-output .hlist dt:last-child::after,.mw-parser-output .hlist li:last-child::after{content:none}.mw-parser-output .hlist dd dd:first-child::before,.mw-parser-output .hlist dd dt:first-child::before,.mw-parser-output .hlist dd li:first-child::before,.mw-parser-output .hlist dt dd:first-child::before,.mw-parser-output .hlist dt dt:first-child::before,.mw-parser-output .hlist dt li:first-child::before,.mw-parser-output .hlist li dd:first-child::before,.mw-parser-output .hlist li dt:first-child::before,.mw-parser-output .hlist li li:first-child::before{content:" (";font-weight:normal}.mw-parser-output .hlist dd dd:last-child::after,.mw-parser-output .hlist dd dt:last-child::after,.mw-parser-output .hlist dd li:last-child::after,.mw-parser-output .hlist dt dd:last-child::after,.mw-parser-output .hlist dt dt:last-child::after,.mw-parser-output .hlist dt li:last-child::after,.mw-parser-output .hlist li dd:last-child::after,.mw-parser-output .hlist li dt:last-child::after,.mw-parser-output .hlist li li:last-child::after{content:")";font-weight:normal}.mw-parser-output .hlist ol{counter-reset:listitem}.mw-parser-output .hlist ol>li{counter-increment:listitem}.mw-parser-output .hlist ol>li::before{content:" "counter(listitem)"\a0 "}.mw-parser-output .hlist dd ol>li:first-child::before,.mw-parser-output .hlist dt ol>li:first-child::before,.mw-parser-output .hlist li ol>li:first-child::before{content:" ("counter(listitem)"\a0 "}</style><style data-mw-deduplicate="TemplateStyles:r1236075235">.mw-parser-output .navbox{box-sizing:border-box;border:1px solid #a2a9b1;width:100%;clear:both;font-size:88%;text-align:center;padding:1px;margin:1em auto 0}.mw-parser-output .navbox .navbox{margin-top:0}.mw-parser-output .navbox+.navbox,.mw-parser-output .navbox+.navbox-styles+.navbox{margin-top:-1px}.mw-parser-output .navbox-inner,.mw-parser-output .navbox-subgroup{width:100%}.mw-parser-output .navbox-group,.mw-parser-output .navbox-title,.mw-parser-output .navbox-abovebelow{padding:0.25em 1em;line-height:1.5em;text-align:center}.mw-parser-output .navbox-group{white-space:nowrap;text-align:right}.mw-parser-output .navbox,.mw-parser-output .navbox-subgroup{background-color:#fdfdfd}.mw-parser-output .navbox-list{line-height:1.5em;border-color:#fdfdfd}.mw-parser-output .navbox-list-with-group{text-align:left;border-left-width:2px;border-left-style:solid}.mw-parser-output tr+tr>.navbox-abovebelow,.mw-parser-output tr+tr>.navbox-group,.mw-parser-output tr+tr>.navbox-image,.mw-parser-output tr+tr>.navbox-list{border-top:2px solid #fdfdfd}.mw-parser-output .navbox-title{background-color:#ccf}.mw-parser-output .navbox-abovebelow,.mw-parser-output .navbox-group,.mw-parser-output .navbox-subgroup .navbox-title{background-color:#ddf}.mw-parser-output .navbox-subgroup .navbox-group,.mw-parser-output .navbox-subgroup .navbox-abovebelow{background-color:#e6e6ff}.mw-parser-output .navbox-even{background-color:#f7f7f7}.mw-parser-output .navbox-odd{background-color:transparent}.mw-parser-output .navbox .hlist td dl,.mw-parser-output .navbox .hlist td ol,.mw-parser-output .navbox .hlist td ul,.mw-parser-output .navbox td.hlist dl,.mw-parser-output .navbox td.hlist ol,.mw-parser-output .navbox td.hlist ul{padding:0.125em 0}.mw-parser-output .navbox .navbar{display:block;font-size:100%}.mw-parser-output .navbox-title .navbar{float:left;text-align:left;margin-right:0.5em}body.skin--responsive .mw-parser-output .navbox-image img{max-width:none!important}@media print{body.ns-0 .mw-parser-output .navbox{display:none!important}}</style><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1129693374"></div><div role="navigation" class="navbox" aria-labelledby="Espionage" style="padding:3px"><table class="nowraplinks mw-collapsible autocollapse navbox-inner" style="border-spacing:0;background:transparent;color:inherit"><tbody><tr><th scope="col" class="navbox-title" colspan="2"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1129693374"><style data-mw-deduplicate="TemplateStyles:r1239400231">.mw-parser-output .navbar{display:inline;font-size:88%;font-weight:normal}.mw-parser-output .navbar-collapse{float:left;text-align:left}.mw-parser-output .navbar-boxtext{word-spacing:0}.mw-parser-output .navbar ul{display:inline-block;white-space:nowrap;line-height:inherit}.mw-parser-output .navbar-brackets::before{margin-right:-0.125em;content:"[ "}.mw-parser-output .navbar-brackets::after{margin-left:-0.125em;content:" ]"}.mw-parser-output .navbar li{word-spacing:-0.125em}.mw-parser-output .navbar a>span,.mw-parser-output .navbar a>abbr{text-decoration:inherit}.mw-parser-output .navbar-mini abbr{font-variant:small-caps;border-bottom:none;text-decoration:none;cursor:inherit}.mw-parser-output .navbar-ct-full{font-size:114%;margin:0 7em}.mw-parser-output .navbar-ct-mini{font-size:114%;margin:0 4em}html.skin-theme-clientpref-night .mw-parser-output .navbar li a abbr{color:var(--color-base)!important}@media(prefers-color-scheme:dark){html.skin-theme-clientpref-os .mw-parser-output .navbar li a abbr{color:var(--color-base)!important}}@media print{.mw-parser-output .navbar{display:none!important}}</style><div class="navbar plainlinks hlist navbar-mini"><ul><li class="nv-view"><a href="/wiki/Template:Espionage" title="Template:Espionage"><abbr title="View this template">v</abbr></a></li><li class="nv-talk"><a href="/wiki/Template_talk:Espionage" title="Template talk:Espionage"><abbr title="Discuss this template">t</abbr></a></li><li class="nv-edit"><a href="/wiki/Special:EditPage/Template:Espionage" title="Special:EditPage/Template:Espionage"><abbr title="Edit this template">e</abbr></a></li></ul></div><div id="Espionage" style="font-size:114%;margin:0 4em"><a href="/wiki/Espionage" title="Espionage">Espionage</a></div></th></tr><tr><th scope="row" class="navbox-group" style="width:1%"><div class="hlist"><ul><li><a href="/wiki/Espionage#Agents_in_espionage" title="Espionage">Agents</a></li><li><a href="/wiki/Asset_(intelligence)" title="Asset (intelligence)">Assets</a></li></ul></div></th><td class="navbox-list-with-group navbox-list navbox-odd hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Agent_handling" title="Agent handling">Agent handling</a></li> <li><i><a href="/wiki/Agent_provocateur" title="Agent provocateur">Agent provocateur</a></i></li> <li><a href="/wiki/Cover_(intelligence_gathering)" title="Cover (intelligence gathering)">Cover</a> <ul><li><a href="/wiki/Covert_agent" title="Covert agent">Agent</a></li></ul></li> <li><a href="/wiki/Double_agent" title="Double agent">Double agent</a></li> <li><a href="/wiki/Field_agent" title="Field agent">Field agent</a></li> <li><a href="/wiki/Mole_(espionage)" title="Mole (espionage)">Mole</a></li> <li><a href="/wiki/Resident_spy" title="Resident spy">Resident spy</a></li> <li><a href="/wiki/Sleeper_agent" title="Sleeper agent">Sleeper agent</a></li> <li><a href="/wiki/Spymaster" class="mw-redirect" title="Spymaster">Spymaster</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Analysis</th><td class="navbox-list-with-group navbox-list navbox-even hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Intelligence_assessment" title="Intelligence assessment">Intelligence assessment</a> <ul><li><a href="/wiki/Analysis_of_competing_hypotheses" title="Analysis of competing hypotheses">competing hypotheses</a></li></ul></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Devices and<br />communications</th><td class="navbox-list-with-group navbox-list navbox-odd hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Burn_notice" title="Burn notice">Burn notice</a></li> <li><a href="/wiki/Concealment_device" title="Concealment device">Concealment device</a></li> <li><a href="/wiki/Covert_listening_device" title="Covert listening device">Covert listening device</a></li> <li><a href="/wiki/Cryptography" title="Cryptography">Cryptography</a></li> <li><a href="/wiki/Cutout_(espionage)" title="Cutout (espionage)">Cutout</a></li> <li><a href="/wiki/Computer_and_network_surveillance" title="Computer and network surveillance">Computer and network surveillance</a></li> <li><a href="/wiki/Cyber_spying" title="Cyber spying">Cyber spying</a></li> <li><a href="/wiki/Dead_drop" title="Dead drop">Dead drop</a></li> <li><a href="/wiki/Invisible_ink" title="Invisible ink">Invisible ink</a></li> <li><a href="/wiki/Numbers_station" title="Numbers station">Numbers station</a></li> <li><a href="/wiki/One-way_voice_link" title="One-way voice link">One-way voice link</a></li> <li><a href="/wiki/Phone_surveillance" title="Phone surveillance">Phone surveillance</a></li> <li><a href="/wiki/Short-range_agent_communications" title="Short-range agent communications">Short-range agent communications</a></li> <li><a href="/wiki/Steganography" title="Steganography">Steganography</a> <ul><li><a href="/wiki/Microdot" title="Microdot">microdot</a></li></ul></li> <li><a href="/wiki/Surveillance_tools" title="Surveillance tools">Surveillance tools</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%"><a href="/wiki/Tradecraft" title="Tradecraft">Tradecraft</a> and<br />techniques</th><td class="navbox-list-with-group navbox-list navbox-even hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Canary_trap" title="Canary trap">Canary trap</a></li> <li><a href="/wiki/Front_organization" title="Front organization">Front organization</a></li> <li><a href="/wiki/Limited_hangout" title="Limited hangout">Limited hangout</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Operations</th><td class="navbox-list-with-group navbox-list navbox-odd hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Chinese_intelligence_activity_abroad" title="Chinese intelligence activity abroad">Chinese intelligence activity abroad</a> <ul><li><a href="/wiki/Chinese_espionage_in_the_United_States" title="Chinese espionage in the United States">Chinese espionage in the United States</a></li></ul></li> <li><a href="/wiki/Cold_War_espionage" title="Cold War espionage">Cold War espionage</a></li> <li><a href="/wiki/Recruitment_of_spies" title="Recruitment of spies">Recruitment</a></li> <li><a href="/wiki/Black_operation" class="mw-redirect" title="Black operation">Black operation</a> <ul><li><a href="/wiki/Black_bag_operation" title="Black bag operation">black bag</a></li> <li><a href="/wiki/Wetwork" title="Wetwork">wetwork</a></li></ul></li> <li><a href="/wiki/Eavesdropping" title="Eavesdropping">Eavesdropping</a> <ul><li><a href="/wiki/Signals_intelligence" title="Signals intelligence">SIGINT</a></li> <li><a href="/wiki/Measurement_and_signature_intelligence" title="Measurement and signature intelligence">MASINT</a></li></ul></li> <li><a href="/wiki/False_flag" title="False flag">False flag</a></li> <li><a href="/wiki/Industrial_espionage" title="Industrial espionage">Industrial espionage</a></li> <li><a href="/wiki/Human_intelligence_(intelligence_gathering)" title="Human intelligence (intelligence gathering)">Interpersonal (HUMINT) intelligence</a> <ul><li><a href="/wiki/Interrogation" title="Interrogation">interrogation</a></li> <li><a href="/wiki/Safe_house" title="Safe house">safe house</a></li></ul></li> <li><a href="/wiki/COINTELPRO" title="COINTELPRO">COINTELPRO</a></li> <li><a href="/wiki/Project_MINARET" title="Project MINARET">MINARET</a></li> <li><a href="/wiki/Project_SHAMROCK" title="Project SHAMROCK">SHAMROCK</a></li> <li><a href="/wiki/Five_Eyes" title="Five Eyes">FVEY</a></li> <li><a href="/wiki/Sexpionage" title="Sexpionage">Sexpionage</a></li> <li><a href="/wiki/Stay-behind" title="Stay-behind">Stay-behind</a></li> <li><a href="/wiki/Sting_operation" title="Sting operation">Sting operation</a></li> <li><a class="mw-selflink selflink">Surveillance</a> <ul><li><a href="/wiki/Global_surveillance" title="Global surveillance">Global</a></li> <li><a href="/wiki/Mass_surveillance" title="Mass surveillance">Mass</a></li></ul></li> <li><a href="/wiki/Targeted_surveillance" title="Targeted surveillance">Targeted surveillance</a></li></ul> </div></td></tr></tbody></table></div> <div class="navbox-styles"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1129693374"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236075235"></div><div role="navigation" class="navbox" aria-labelledby="Intelligence_management" style="padding:3px"><table class="nowraplinks mw-collapsible autocollapse navbox-inner" style="border-spacing:0;background:transparent;color:inherit"><tbody><tr><th scope="col" class="navbox-title" colspan="2"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1129693374"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1239400231"><div class="navbar plainlinks hlist navbar-mini"><ul><li class="nv-view"><a href="/wiki/Template:Intelligence_cycle_management" title="Template:Intelligence cycle management"><abbr title="View this template">v</abbr></a></li><li class="nv-talk"><a href="/wiki/Template_talk:Intelligence_cycle_management" title="Template talk:Intelligence cycle management"><abbr title="Discuss this template">t</abbr></a></li><li class="nv-edit"><a href="/wiki/Special:EditPage/Template:Intelligence_cycle_management" title="Special:EditPage/Template:Intelligence cycle management"><abbr title="Edit this template">e</abbr></a></li></ul></div><div id="Intelligence_management" style="font-size:114%;margin:0 4em"><a href="/wiki/Intelligence_cycle_management" title="Intelligence cycle management">Intelligence management</a></div></th></tr><tr><th scope="row" class="navbox-group" style="width:1%"><a href="/wiki/Intelligence_collection_management" title="Intelligence collection management">Collection</a></th><td class="navbox-list-with-group navbox-list navbox-odd hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"></div><table class="nowraplinks navbox-subgroup" style="border-spacing:0"><tbody><tr><th scope="row" class="navbox-group" style="width:1%;font-weight:normal;"><a href="/wiki/Human_intelligence_(intelligence_gathering)" title="Human intelligence (intelligence gathering)">Human (HUMINT)</a></th><td class="navbox-list-with-group navbox-list navbox-odd" style="width:100%;padding:0"><div style="padding:0 0.25em"></div><table class="nowraplinks navbox-subgroup" style="border-spacing:0"><tbody><tr><td colspan="2" class="navbox-list navbox-odd" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Special_reconnaissance" title="Special reconnaissance">Special reconnaissance</a> <ul><li><a href="/wiki/List_of_Special_Reconnaissance_organizations" class="mw-redirect" title="List of Special Reconnaissance organizations">organizations</a></li></ul></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%;font-weight:normal;"><a href="/wiki/Clandestine_human_intelligence" title="Clandestine human intelligence">Clandestine</a></th><td class="navbox-list-with-group navbox-list navbox-even" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Recruitment_of_spies" title="Recruitment of spies">Asset recruiting</a></li> <li><a href="/wiki/Clandestine_cell_system" title="Clandestine cell system">Cell system</a></li> <li><a href="/wiki/Clandestine_HUMINT_and_covert_action" title="Clandestine HUMINT and covert action">Covert action</a></li> <li><a href="/wiki/Direct_action_(military)" title="Direct action (military)">Direct action</a></li> <li><a href="/wiki/Clandestine_HUMINT_operational_techniques" title="Clandestine HUMINT operational techniques">Operational techniques</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%;font-weight:normal;"><a href="/wiki/Espionage" title="Espionage">Espionage</a></th><td class="navbox-list-with-group navbox-list navbox-odd" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Espionage#Agents_in_espionage" title="Espionage">Agents</a> <ul><li><a href="/wiki/Field_agent" title="Field agent">field</a></li> <li><a href="/wiki/Agent_handling" title="Agent handling">handling</a></li></ul></li> <li><a href="/wiki/Asset_(intelligence)" title="Asset (intelligence)">Asset</a></li> <li><a href="/wiki/Black_operation" class="mw-redirect" title="Black operation">Black operation</a> <ul><li><a href="/wiki/Black_bag_operation" title="Black bag operation">black bag</a></li></ul></li> <li><a href="/wiki/Concealment_device" title="Concealment device">Concealment device</a></li> <li><a href="/wiki/Cover_(intelligence_gathering)" title="Cover (intelligence gathering)">Cover</a></li> <li><a href="/wiki/Cryptography" title="Cryptography">Cryptography</a></li> <li><a href="/wiki/Cutout_(espionage)" title="Cutout (espionage)">Cutout</a></li> <li><a href="/wiki/Dead_drop" title="Dead drop">Dead drop</a></li> <li><a href="/wiki/Defection" title="Defection">Defection</a> / <a href="/wiki/Turncoat" title="Turncoat">Turncoat</a></li> <li><a href="/wiki/Denial_and_deception" title="Denial and deception">Denial and deception</a></li> <li><a href="/wiki/Eavesdropping" title="Eavesdropping">Eavesdropping</a></li> <li><a href="/wiki/False_flag" title="False flag">False flag</a></li> <li><a href="/wiki/Industrial_espionage" title="Industrial espionage">Industrial espionage</a></li> <li><a href="/wiki/Interrogation" title="Interrogation">Interrogation</a></li> <li><a href="/wiki/Numbers_station" title="Numbers station">Numbers station</a></li> <li><a href="/wiki/One-way_voice_link" title="One-way voice link">One-way voice link</a></li> <li><a href="/wiki/Resident_spy" title="Resident spy">Resident spy</a></li> <li><a href="/wiki/Steganography" title="Steganography">Steganography</a></li> <li><a class="mw-selflink selflink">Surveillance</a></li></ul> </div></td></tr></tbody></table><div></div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%;font-weight:normal;"><a href="/wiki/Signals_intelligence" title="Signals intelligence">Signals (SIGINT)</a></th><td class="navbox-list-with-group navbox-list navbox-even" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Signals_intelligence_by_alliances,_nations_and_industries" title="Signals intelligence by alliances, nations and industries">By alliances, nations and industries</a></li> <li><a href="/wiki/Signals_intelligence_in_modern_history" title="Signals intelligence in modern history">In modern history</a></li> <li><a href="/wiki/Signals_intelligence_operational_platforms_by_nation" title="Signals intelligence operational platforms by nation">Operational platforms by nation</a></li> <li><a href="/wiki/Direction_finding" title="Direction finding">Direction finding</a></li> <li><a href="/wiki/Traffic_analysis" title="Traffic analysis">Traffic analysis</a></li> <li><a href="/wiki/Tempest_(codename)" title="Tempest (codename)">TEMPEST</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%;font-weight:normal;"><a href="/wiki/Measurement_and_signature_intelligence" title="Measurement and signature intelligence">Measurement and<br />signature (MASINT)</a></th><td class="navbox-list-with-group navbox-list navbox-odd" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Electro-optical_MASINT" title="Electro-optical MASINT">Electro-optical</a></li> <li><a href="/wiki/Geophysical_MASINT" title="Geophysical MASINT">Geophysical</a></li> <li><a href="/wiki/Nuclear_MASINT" title="Nuclear MASINT">Nuclear</a></li> <li><a href="/wiki/Radar_MASINT" title="Radar MASINT">Radar</a></li> <li><a href="/wiki/Radiofrequency_MASINT" title="Radiofrequency MASINT">Radiofrequency</a></li> <li><a href="/wiki/Materials_MASINT" title="Materials MASINT">Materials</a></li> <li><a href="/wiki/Casualty_estimation" title="Casualty estimation">Casualty estimation</a>&#160;(<a href="/wiki/Earthquake_casualty_estimation" title="Earthquake casualty estimation">earthquake</a>)</li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%;font-weight:normal;">Other</th><td class="navbox-list-with-group navbox-list navbox-even" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Financial_intelligence" title="Financial intelligence">Financial (FININT)</a></li> <li><a href="/wiki/Geospatial_intelligence" title="Geospatial intelligence">Geospatial (GEOINT)</a></li> <li><a href="/wiki/Imagery_intelligence" title="Imagery intelligence">Imagery (IMINT)</a></li> <li><a href="/wiki/Open-source_intelligence" title="Open-source intelligence">Open-source (OSINT)</a></li> <li><a href="/wiki/Technical_intelligence" title="Technical intelligence">Technical (TECHINT)</a></li></ul> </div></td></tr></tbody></table><div></div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%"><a href="/wiki/Intelligence_analysis_management" title="Intelligence analysis management">Analysis</a></th><td class="navbox-list-with-group navbox-list navbox-odd hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Analysis_of_competing_hypotheses" title="Analysis of competing hypotheses">Competing hypotheses</a></li> <li><a href="/wiki/Intelligence_cycle_(target-centric_approach)" title="Intelligence cycle (target-centric approach)">Target-centric</a></li> <li><a href="/wiki/Words_of_estimative_probability" title="Words of estimative probability">Words of estimative probability</a></li> <li><a href="/wiki/All-source_intelligence" title="All-source intelligence">All-source intelligence</a></li> <li><a href="/wiki/Basic_intelligence" title="Basic intelligence">Basic intelligence</a></li> <li><a href="/wiki/Intelligence_assessment" title="Intelligence assessment">Intelligence assessment</a></li> <li><a href="/wiki/Medical_intelligence" title="Medical intelligence">Medical intelligence</a></li> <li><a href="/wiki/Military_geography" title="Military geography">Military geography</a></li> <li><a href="/wiki/Technical_intelligence" title="Technical intelligence">Scientific &amp; Technical intelligence</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%"><a href="/wiki/Intelligence_dissemination_management" title="Intelligence dissemination management">Dissemination</a></th><td class="navbox-list-with-group navbox-list navbox-even hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Intelligence_cycle_security" title="Intelligence cycle security">Intelligence cycle security</a></li> <li><a href="/wiki/Counterintelligence" title="Counterintelligence">Counterintelligence</a> <ul><li><a href="/wiki/List_of_counterintelligence_organizations" title="List of counterintelligence organizations">organizations</a></li></ul></li> <li><a href="/wiki/Counter-intelligence_and_counter-terrorism_organizations" title="Counter-intelligence and counter-terrorism organizations">Counterintelligence and counter-terrorism organizations</a></li></ul> </div></td></tr></tbody></table></div> <div class="navbox-styles"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1129693374"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236075235"></div><div role="navigation" class="navbox" aria-labelledby="Privacy" style="padding:3px"><table class="nowraplinks hlist mw-collapsible autocollapse navbox-inner" style="border-spacing:0;background:transparent;color:inherit"><tbody><tr><th scope="col" class="navbox-title" colspan="2"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1129693374"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1239400231"><div class="navbar plainlinks hlist navbar-mini"><ul><li class="nv-view"><a href="/wiki/Template:Privacy" title="Template:Privacy"><abbr title="View this template">v</abbr></a></li><li class="nv-talk"><a href="/wiki/Template_talk:Privacy" title="Template talk:Privacy"><abbr title="Discuss this template">t</abbr></a></li><li class="nv-edit"><a href="/wiki/Special:EditPage/Template:Privacy" title="Special:EditPage/Template:Privacy"><abbr title="Edit this template">e</abbr></a></li></ul></div><div id="Privacy" style="font-size:114%;margin:0 4em"><a href="/wiki/Privacy" title="Privacy">Privacy</a></div></th></tr><tr><th scope="row" class="navbox-group" style="width:1%">Principles</th><td class="navbox-list-with-group navbox-list navbox-odd" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Right_of_access_to_personal_data" title="Right of access to personal data">Right of access to personal data</a></li> <li><a href="/wiki/Expectation_of_privacy" class="mw-redirect" title="Expectation of privacy">Expectation of privacy</a></li> <li><a href="/wiki/Right_to_privacy" title="Right to privacy">Right to privacy</a></li> <li><a href="/wiki/Right_to_be_forgotten" title="Right to be forgotten">Right to be forgotten</a></li> <li><a href="/wiki/Post-mortem_privacy" title="Post-mortem privacy">Post-mortem privacy</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%"><a href="/wiki/Privacy_law" title="Privacy law">Privacy laws</a></th><td class="navbox-list-with-group navbox-list navbox-even" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Privacy_in_Australian_law" title="Privacy in Australian law">Australia</a></li> <li><a href="/wiki/General_Personal_Data_Protection_Law" title="General Personal Data Protection Law">Brazil</a></li> <li><a href="/wiki/Canadian_privacy_law" title="Canadian privacy law">Canada</a></li> <li><a href="/wiki/Personal_Information_Protection_Law_of_the_People%27s_Republic_of_China" title="Personal Information Protection Law of the People&#39;s Republic of China">China</a></li> <li><a href="/wiki/Privacy_law_in_Denmark" title="Privacy law in Denmark">Denmark</a></li> <li><a href="/wiki/Privacy_in_English_law" title="Privacy in English law">England</a></li> <li><a href="/wiki/General_Data_Protection_Regulation" title="General Data Protection Regulation">European Union</a></li> <li><a href="/wiki/Bundesdatenschutzgesetz" title="Bundesdatenschutzgesetz">Germany</a></li> <li><a href="/wiki/Data_Protection_Act,_2012" title="Data Protection Act, 2012">Ghana</a></li> <li><a href="/wiki/Right_to_privacy_in_New_Zealand" title="Right to privacy in New Zealand">New Zealand</a></li> <li><a href="/wiki/Data_protection_(privacy)_laws_in_Russia" title="Data protection (privacy) laws in Russia">Russia</a></li> <li><a href="/wiki/Personal_Data_Protection_Act_2012_(Singapore)" class="mw-redirect" title="Personal Data Protection Act 2012 (Singapore)">Singapore</a></li> <li><a href="/wiki/Personal_Data_Protection_Act_(Sri_Lanka)" title="Personal Data Protection Act (Sri Lanka)">Sri Lanka</a></li> <li><a href="/wiki/Federal_Data_Protection_and_Information_Commissioner" title="Federal Data Protection and Information Commissioner">Switzerland</a></li> <li><a href="/wiki/Privacy_laws_of_the_United_Kingdom" class="mw-redirect" title="Privacy laws of the United Kingdom">United Kingdom</a></li> <li><a href="/wiki/Privacy_laws_of_the_United_States" title="Privacy laws of the United States">United States</a> <ul><li><a href="/wiki/California_Consumer_Privacy_Act" title="California Consumer Privacy Act">California</a>, <a href="/wiki/California_Privacy_Rights_Act" title="California Privacy Rights Act">amended in 2020</a></li></ul></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%"><a href="/wiki/National_data_protection_authority" title="National data protection authority">Data protection authorities</a></th><td class="navbox-list-with-group navbox-list navbox-odd" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Office_of_the_Australian_Information_Commissioner" title="Office of the Australian Information Commissioner">Australia</a></li> <li><a href="/wiki/Danish_Data_Protection_Agency" title="Danish Data Protection Agency">Denmark</a></li> <li><a href="/wiki/European_Data_Protection_Supervisor" title="European Data Protection Supervisor">European Union</a></li> <li><a href="/wiki/Commission_nationale_de_l%27informatique_et_des_libert%C3%A9s" title="Commission nationale de l&#39;informatique et des libertés">France</a></li> <li><a href="/wiki/Federal_Commissioner_for_Data_Protection_and_Freedom_of_Information" title="Federal Commissioner for Data Protection and Freedom of Information">Germany</a></li> <li><a href="/wiki/Data_Protection_Board_of_India" title="Data Protection Board of India">India</a></li> <li><a href="/wiki/Personal_Data_Protection_Authority_Institute" title="Personal Data Protection Authority Institute">Indonesia</a></li> <li><a href="/wiki/Data_Protection_Commissioner" title="Data Protection Commissioner">Ireland</a></li> <li><a href="/wiki/Office_of_the_Data_Protection_Supervisor" title="Office of the Data Protection Supervisor">Isle of Man</a></li> <li><a href="/wiki/Dutch_Data_Protection_Authority" title="Dutch Data Protection Authority">Netherlands</a></li> <li><a href="/wiki/Norwegian_Data_Protection_Authority" title="Norwegian Data Protection Authority">Norway</a></li> <li><a href="/wiki/National_Privacy_Commission" title="National Privacy Commission">Philippines</a></li> <li><a href="/wiki/Polish_Data_Protection_Commissioner" title="Polish Data Protection Commissioner">Poland</a></li> <li><a href="/wiki/Personal_Information_Protection_Commission_(South_Korea)" title="Personal Information Protection Commission (South Korea)">South Korea</a></li> <li><a href="/wiki/Spanish_Data_Protection_Agency" title="Spanish Data Protection Agency">Spain</a></li> <li><a href="/wiki/Swedish_Data_Protection_Authority" class="mw-redirect" title="Swedish Data Protection Authority">Sweden</a></li> <li><a href="/wiki/Federal_Data_Protection_and_Information_Commissioner" title="Federal Data Protection and Information Commissioner">Switzerland</a></li> <li><a href="/wiki/Office_of_the_Personal_Data_Protection_Committee" class="mw-redirect" title="Office of the Personal Data Protection Committee">Thailand</a></li> <li><a href="/wiki/Turkish_Data_Protection_Authority" title="Turkish Data Protection Authority">Turkey</a></li> <li><a href="/wiki/Information_Commissioner%27s_Office" title="Information Commissioner&#39;s Office">United Kingdom</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Areas</th><td class="navbox-list-with-group navbox-list navbox-even" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Consumer_privacy" title="Consumer privacy">Consumer</a></li> <li><a href="/wiki/Digital_privacy" title="Digital privacy">Digital</a></li> <li><a href="/wiki/Privacy_in_education" title="Privacy in education">Education</a></li> <li><a href="/wiki/Medical_privacy" title="Medical privacy">Medical</a></li> <li><a href="/wiki/Workplace_privacy" title="Workplace privacy">Workplace</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%"><a href="/wiki/Information_privacy" title="Information privacy">Information privacy</a></th><td class="navbox-list-with-group navbox-list navbox-odd" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Information_privacy_law" title="Information privacy law">Law</a></li> <li><a href="/wiki/Bank_secrecy" title="Bank secrecy">Financial</a></li> <li><a href="/wiki/Internet_privacy" title="Internet privacy">Internet</a> <ul><li><a href="/wiki/Privacy_concerns_with_Facebook" title="Privacy concerns with Facebook">Facebook</a></li> <li><a href="/wiki/Privacy_concerns_regarding_Google" class="mw-redirect" title="Privacy concerns regarding Google">Google</a></li> <li><a href="/wiki/Privacy_concerns_with_Twitter" class="mw-redirect" title="Privacy concerns with Twitter">Twitter</a></li></ul></li> <li><a href="/wiki/Email_privacy" title="Email privacy">Email</a></li> <li><a href="/wiki/Personal_data" title="Personal data">Personal data</a></li> <li><a href="/wiki/Personal_identifier" title="Personal identifier">Personal identifier</a></li> <li><a href="/wiki/Privacy_concerns_with_social_networking_services" title="Privacy concerns with social networking services">Social networking services</a></li> <li><a href="/wiki/Privacy-enhancing_technologies" title="Privacy-enhancing technologies">Privacy-enhancing technologies</a></li> <li><a href="/wiki/Privacy_engineering" title="Privacy engineering">Privacy engineering</a></li> <li><a href="/wiki/Privacy-invasive_software" title="Privacy-invasive software">Privacy-invasive software</a></li> <li><a href="/wiki/Privacy_policy" title="Privacy policy">Privacy policy</a></li> <li><a href="/wiki/Privacy_software" title="Privacy software">Privacy software</a></li> <li><a href="/wiki/Secret_ballot" title="Secret ballot">Secret ballot</a></li> <li><a href="/wiki/Virtual_assistant_privacy" title="Virtual assistant privacy">Virtual assistant privacy</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Advocacy organizations</th><td class="navbox-list-with-group navbox-list navbox-even" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/American_Civil_Liberties_Union" title="American Civil Liberties Union">American Civil Liberties Union</a></li> <li><a href="/wiki/Center_for_Democracy_and_Technology" title="Center for Democracy and Technology">Center for Democracy and Technology</a></li> <li><a href="/wiki/Computer_Professionals_for_Social_Responsibility" title="Computer Professionals for Social Responsibility">Computer Professionals for Social Responsibility</a></li> <li><a href="/wiki/Data_Privacy_Lab" title="Data Privacy Lab">Data Privacy Lab</a></li> <li><a href="/wiki/Electronic_Frontier_Foundation" title="Electronic Frontier Foundation">Electronic Frontier Foundation</a></li> <li><a href="/wiki/Electronic_Privacy_Information_Center" title="Electronic Privacy Information Center">Electronic Privacy Information Center</a></li> <li><a href="/wiki/European_Digital_Rights" title="European Digital Rights">European Digital Rights</a></li> <li><a href="/wiki/Future_of_Privacy_Forum" title="Future of Privacy Forum">Future of Privacy Forum</a></li> <li><a href="/wiki/Global_Network_Initiative" title="Global Network Initiative">Global Network Initiative</a></li> <li><a href="/wiki/International_Association_of_Privacy_Professionals" title="International Association of Privacy Professionals">International Association of Privacy Professionals</a></li> <li><a href="/wiki/NOYB" title="NOYB">NOYB</a></li> <li><a href="/wiki/Privacy_International" title="Privacy International">Privacy International</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">See also</th><td class="navbox-list-with-group navbox-list navbox-odd" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Anonymity" title="Anonymity">Anonymity</a></li> <li><a href="/wiki/Cellphone_surveillance" title="Cellphone surveillance">Cellphone surveillance</a></li> <li><a href="/wiki/Data_security" title="Data security">Data security</a></li> <li><a href="/wiki/Eavesdropping" title="Eavesdropping">Eavesdropping</a></li> <li><a href="/wiki/Global_surveillance" title="Global surveillance">Global surveillance</a></li> <li><a href="/wiki/Identity_theft" title="Identity theft">Identity theft</a></li> <li><a href="/wiki/Mass_surveillance" title="Mass surveillance">Mass surveillance</a></li> <li><a href="/wiki/Panopticon" title="Panopticon">Panopticon</a></li> <li><a href="/wiki/PRISM" title="PRISM">PRISM</a></li> <li><a href="/wiki/Search_warrant" title="Search warrant">Search warrant</a></li> <li><a href="/wiki/Wiretapping" title="Wiretapping">Wiretapping</a></li> <li><a href="/wiki/Human_rights" title="Human rights">Human rights</a></li> <li><a href="/wiki/Personality_rights" title="Personality rights">Personality rights</a></li></ul> </div></td></tr><tr><td class="navbox-abovebelow" colspan="2"><div> <ul><li><span class="noviewer" typeof="mw:File"><span title="Category"><img alt="" src="//upload.wikimedia.org/wikipedia/en/thumb/9/96/Symbol_category_class.svg/16px-Symbol_category_class.svg.png" decoding="async" width="16" height="16" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/en/thumb/9/96/Symbol_category_class.svg/23px-Symbol_category_class.svg.png 1.5x, //upload.wikimedia.org/wikipedia/en/thumb/9/96/Symbol_category_class.svg/31px-Symbol_category_class.svg.png 2x" data-file-width="180" data-file-height="185" /></span></span> <a href="/wiki/Category:Privacy" title="Category:Privacy">Category</a></li></ul> </div></td></tr></tbody></table></div> <div class="navbox-styles"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1129693374"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236075235"></div><div role="navigation" class="navbox authority-control" aria-labelledby="Authority_control_databases_frameless&amp;#124;text-top&amp;#124;10px&amp;#124;alt=Edit_this_at_Wikidata&amp;#124;link=https&amp;#58;//www.wikidata.org/wiki/Q334401#identifiers&amp;#124;class=noprint&amp;#124;Edit_this_at_Wikidata" style="padding:3px"><table class="nowraplinks hlist mw-collapsible autocollapse navbox-inner" style="border-spacing:0;background:transparent;color:inherit"><tbody><tr><th scope="col" class="navbox-title" colspan="2"><div id="Authority_control_databases_frameless&amp;#124;text-top&amp;#124;10px&amp;#124;alt=Edit_this_at_Wikidata&amp;#124;link=https&amp;#58;//www.wikidata.org/wiki/Q334401#identifiers&amp;#124;class=noprint&amp;#124;Edit_this_at_Wikidata" style="font-size:114%;margin:0 4em"><a href="/wiki/Help:Authority_control" title="Help:Authority control">Authority control databases</a> <span class="mw-valign-text-top noprint" typeof="mw:File/Frameless"><a href="https://www.wikidata.org/wiki/Q334401#identifiers" title="Edit this at Wikidata"><img alt="Edit this at Wikidata" src="//upload.wikimedia.org/wikipedia/en/thumb/8/8a/OOjs_UI_icon_edit-ltr-progressive.svg/10px-OOjs_UI_icon_edit-ltr-progressive.svg.png" decoding="async" width="10" height="10" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/en/thumb/8/8a/OOjs_UI_icon_edit-ltr-progressive.svg/15px-OOjs_UI_icon_edit-ltr-progressive.svg.png 1.5x, //upload.wikimedia.org/wikipedia/en/thumb/8/8a/OOjs_UI_icon_edit-ltr-progressive.svg/20px-OOjs_UI_icon_edit-ltr-progressive.svg.png 2x" data-file-width="20" data-file-height="20" /></a></span></div></th></tr><tr><th scope="row" class="navbox-group" style="width:1%">National</th><td class="navbox-list-with-group navbox-list navbox-odd" style="width:100%;padding:0"><div style="padding:0 0.25em"><ul><li><span class="uid"><a rel="nofollow" class="external text" href="https://d-nb.info/gnd/4134175-2">Germany</a></span></li><li><span class="uid"><a rel="nofollow" class="external text" href="https://id.loc.gov/authorities/sh86006641">United States</a></span></li><li><span class="uid"><a rel="nofollow" class="external text" href="http://olduli.nli.org.il/F/?func=find-b&amp;local_base=NLX10&amp;find_code=UID&amp;request=987007529741205171">Israel</a></span></li></ul></div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Other</th><td class="navbox-list-with-group navbox-list navbox-even" style="width:100%;padding:0"><div style="padding:0 0.25em"><ul><li><span class="uid"><a rel="nofollow" class="external text" href="https://catalog.archives.gov/id/10643084">NARA</a></span></li></ul></div></td></tr></tbody></table></div> <!-- NewPP limit report Parsed by mw‐web.codfw.main‐f69cdc8f6‐rnwnx Cached time: 20241122140653 Cache expiry: 2592000 Reduced expiry: false Complications: [vary‐revision‐sha1, show‐toc] CPU time usage: 1.565 seconds Real time usage: 1.767 seconds Preprocessor visited node count: 14991/1000000 Post‐expand include size: 379031/2097152 bytes Template argument size: 8874/2097152 bytes Highest expansion depth: 17/100 Expensive parser function count: 30/500 Unstrip recursion depth: 1/20 Unstrip post‐expand size: 642162/5000000 bytes Lua time usage: 0.925/10.000 seconds Lua memory usage: 9936502/52428800 bytes Number of Wikibase entities loaded: 1/400 --> <!-- Transclusion expansion time report (%,ms,calls,template) 100.00% 1512.899 1 -total 52.29% 791.086 1 Template:Reflist 17.82% 269.666 64 Template:Cite_news 11.27% 170.559 52 Template:Cite_web 8.58% 129.844 13 Template:Cite_book 6.37% 96.309 5 Template:Navbox 6.18% 93.510 26 Template:ISBN 5.00% 75.586 17 Template:Cite_journal 4.96% 75.055 1 Template:Espionage 4.64% 70.192 1 Template:Short_description --> <!-- Saved in parser cache with key enwiki:pcache:idhash:87231-0!canonical and timestamp 20241122140653 and revision id 1258775741. Rendering was triggered because: page-view --> </div><!--esi <esi:include src="/esitest-fa8a495983347898/content" /> --><noscript><img src="https://login.wikimedia.org/wiki/Special:CentralAutoLogin/start?type=1x1" alt="" width="1" height="1" style="border: none; position: absolute;"></noscript> <div class="printfooter" data-nosnippet="">Retrieved from "<a dir="ltr" href="https://en.wikipedia.org/w/index.php?title=Surveillance&amp;oldid=1258775741">https://en.wikipedia.org/w/index.php?title=Surveillance&amp;oldid=1258775741</a>"</div></div> <div id="catlinks" class="catlinks" data-mw="interface"><div id="mw-normal-catlinks" class="mw-normal-catlinks"><a href="/wiki/Help:Category" title="Help:Category">Categories</a>: <ul><li><a href="/wiki/Category:Surveillance" title="Category:Surveillance">Surveillance</a></li><li><a href="/wiki/Category:Crime_prevention" title="Category:Crime prevention">Crime prevention</a></li><li><a href="/wiki/Category:Espionage_techniques" title="Category:Espionage techniques">Espionage techniques</a></li><li><a href="/wiki/Category:Law_enforcement" title="Category:Law enforcement">Law enforcement</a></li><li><a href="/wiki/Category:Law_enforcement_techniques" title="Category:Law enforcement techniques">Law enforcement techniques</a></li><li><a href="/wiki/Category:National_security" title="Category:National security">National security</a></li><li><a href="/wiki/Category:Privacy" title="Category:Privacy">Privacy</a></li><li><a href="/wiki/Category:Security" title="Category:Security">Security</a></li></ul></div><div id="mw-hidden-catlinks" class="mw-hidden-catlinks mw-hidden-cats-hidden">Hidden categories: <ul><li><a href="/wiki/Category:CS1:_long_volume_value" title="Category:CS1: long volume value">CS1: long volume value</a></li><li><a href="/wiki/Category:All_articles_with_dead_external_links" title="Category:All articles with dead external links">All articles with dead external links</a></li><li><a href="/wiki/Category:Articles_with_dead_external_links_from_August_2018" title="Category:Articles with dead external links from August 2018">Articles with dead external links from August 2018</a></li><li><a href="/wiki/Category:Articles_with_permanently_dead_external_links" title="Category:Articles with permanently dead external links">Articles with permanently dead external links</a></li><li><a href="/wiki/Category:CS1_maint:_bot:_original_URL_status_unknown" title="Category:CS1 maint: bot: original URL status unknown">CS1 maint: bot: original URL status unknown</a></li><li><a href="/wiki/Category:Webarchive_template_wayback_links" title="Category:Webarchive template wayback links">Webarchive template wayback links</a></li><li><a href="/wiki/Category:CS1_maint:_multiple_names:_authors_list" title="Category:CS1 maint: multiple names: authors list">CS1 maint: multiple names: authors list</a></li><li><a href="/wiki/Category:CS1_maint:_numeric_names:_authors_list" title="Category:CS1 maint: numeric names: authors list">CS1 maint: numeric names: authors list</a></li><li><a href="/wiki/Category:Articles_with_short_description" title="Category:Articles with short description">Articles with short description</a></li><li><a href="/wiki/Category:Short_description_is_different_from_Wikidata" title="Category:Short description is different from Wikidata">Short description is different from Wikidata</a></li><li><a href="/wiki/Category:Use_mdy_dates_from_December_2012" title="Category:Use mdy dates from December 2012">Use mdy dates from December 2012</a></li><li><a href="/wiki/Category:Articles_slanted_towards_recent_events_from_June_2024" title="Category:Articles slanted towards recent events from June 2024">Articles slanted towards recent events from June 2024</a></li><li><a href="/wiki/Category:All_articles_with_unsourced_statements" title="Category:All articles with unsourced statements">All articles with unsourced statements</a></li><li><a href="/wiki/Category:Articles_with_unsourced_statements_from_August_2023" title="Category:Articles with unsourced statements from August 2023">Articles with unsourced statements from August 2023</a></li><li><a href="/wiki/Category:All_Wikipedia_articles_needing_clarification" title="Category:All Wikipedia articles needing clarification">All Wikipedia articles needing clarification</a></li><li><a href="/wiki/Category:Wikipedia_articles_needing_clarification_from_March_2012" title="Category:Wikipedia articles needing clarification from March 2012">Wikipedia articles needing clarification from March 2012</a></li><li><a href="/wiki/Category:Articles_containing_potentially_dated_statements_from_2021" title="Category:Articles containing potentially dated statements from 2021">Articles containing potentially dated statements from 2021</a></li><li><a href="/wiki/Category:All_articles_containing_potentially_dated_statements" title="Category:All articles containing potentially dated statements">All articles containing potentially dated statements</a></li><li><a href="/wiki/Category:Wikipedia_articles_needing_clarification_from_February_2016" title="Category:Wikipedia articles needing clarification from February 2016">Wikipedia articles needing clarification from February 2016</a></li><li><a href="/wiki/Category:Articles_with_excerpts" title="Category:Articles with excerpts">Articles with excerpts</a></li><li><a href="/wiki/Category:Commons_category_link_from_Wikidata" title="Category:Commons category link from Wikidata">Commons category link from Wikidata</a></li></ul></div></div> </div> </main> </div> <div class="mw-footer-container"> <footer id="footer" class="mw-footer" > <ul id="footer-info"> <li id="footer-info-lastmod"> This page was last edited on 21 November 2024, at 15:39<span class="anonymous-show">&#160;(UTC)</span>.</li> <li id="footer-info-copyright">Text is available under the <a href="/wiki/Wikipedia:Text_of_the_Creative_Commons_Attribution-ShareAlike_4.0_International_License" title="Wikipedia:Text of the Creative Commons Attribution-ShareAlike 4.0 International License">Creative Commons Attribution-ShareAlike 4.0 License</a>; additional terms may apply. By using this site, you agree to the <a href="https://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Terms_of_Use" class="extiw" title="foundation:Special:MyLanguage/Policy:Terms of Use">Terms of Use</a> and <a href="https://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Privacy_policy" class="extiw" title="foundation:Special:MyLanguage/Policy:Privacy policy">Privacy Policy</a>. Wikipedia® is a registered trademark of the <a rel="nofollow" class="external text" href="https://wikimediafoundation.org/">Wikimedia Foundation, Inc.</a>, a non-profit organization.</li> </ul> <ul id="footer-places"> <li id="footer-places-privacy"><a href="https://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Privacy_policy">Privacy policy</a></li> <li id="footer-places-about"><a href="/wiki/Wikipedia:About">About Wikipedia</a></li> <li id="footer-places-disclaimers"><a href="/wiki/Wikipedia:General_disclaimer">Disclaimers</a></li> <li id="footer-places-contact"><a href="//en.wikipedia.org/wiki/Wikipedia:Contact_us">Contact Wikipedia</a></li> <li id="footer-places-wm-codeofconduct"><a href="https://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Universal_Code_of_Conduct">Code of Conduct</a></li> <li id="footer-places-developers"><a href="https://developer.wikimedia.org">Developers</a></li> <li id="footer-places-statslink"><a href="https://stats.wikimedia.org/#/en.wikipedia.org">Statistics</a></li> <li id="footer-places-cookiestatement"><a href="https://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Cookie_statement">Cookie statement</a></li> <li id="footer-places-mobileview"><a href="//en.m.wikipedia.org/w/index.php?title=Surveillance&amp;mobileaction=toggle_view_mobile" class="noprint stopMobileRedirectToggle">Mobile view</a></li> </ul> <ul id="footer-icons" class="noprint"> <li id="footer-copyrightico"><a href="https://wikimediafoundation.org/" class="cdx-button cdx-button--fake-button cdx-button--size-large cdx-button--fake-button--enabled"><img src="/static/images/footer/wikimedia-button.svg" width="84" height="29" alt="Wikimedia Foundation" loading="lazy"></a></li> <li id="footer-poweredbyico"><a href="https://www.mediawiki.org/" class="cdx-button cdx-button--fake-button cdx-button--size-large cdx-button--fake-button--enabled"><img src="/w/resources/assets/poweredby_mediawiki.svg" alt="Powered by MediaWiki" width="88" height="31" loading="lazy"></a></li> </ul> </footer> </div> </div> </div> <div class="vector-settings" id="p-dock-bottom"> <ul></ul> </div><script>(RLQ=window.RLQ||[]).push(function(){mw.config.set({"wgHostname":"mw-web.codfw.main-f69cdc8f6-9msw5","wgBackendResponseTime":208,"wgPageParseReport":{"limitreport":{"cputime":"1.565","walltime":"1.767","ppvisitednodes":{"value":14991,"limit":1000000},"postexpandincludesize":{"value":379031,"limit":2097152},"templateargumentsize":{"value":8874,"limit":2097152},"expansiondepth":{"value":17,"limit":100},"expensivefunctioncount":{"value":30,"limit":500},"unstrip-depth":{"value":1,"limit":20},"unstrip-size":{"value":642162,"limit":5000000},"entityaccesscount":{"value":1,"limit":400},"timingprofile":["100.00% 1512.899 1 -total"," 52.29% 791.086 1 Template:Reflist"," 17.82% 269.666 64 Template:Cite_news"," 11.27% 170.559 52 Template:Cite_web"," 8.58% 129.844 13 Template:Cite_book"," 6.37% 96.309 5 Template:Navbox"," 6.18% 93.510 26 Template:ISBN"," 5.00% 75.586 17 Template:Cite_journal"," 4.96% 75.055 1 Template:Espionage"," 4.64% 70.192 1 Template:Short_description"]},"scribunto":{"limitreport-timeusage":{"value":"0.925","limit":"10.000"},"limitreport-memusage":{"value":9936502,"limit":52428800}},"cachereport":{"origin":"mw-web.codfw.main-f69cdc8f6-rnwnx","timestamp":"20241122140653","ttl":2592000,"transientcontent":false}}});});</script> <script type="application/ld+json">{"@context":"https:\/\/schema.org","@type":"Article","name":"Surveillance","url":"https:\/\/en.wikipedia.org\/wiki\/Surveillance","sameAs":"http:\/\/www.wikidata.org\/entity\/Q334401","mainEntity":"http:\/\/www.wikidata.org\/entity\/Q334401","author":{"@type":"Organization","name":"Contributors to Wikimedia projects"},"publisher":{"@type":"Organization","name":"Wikimedia Foundation, Inc.","logo":{"@type":"ImageObject","url":"https:\/\/www.wikimedia.org\/static\/images\/wmf-hor-googpub.png"}},"datePublished":"2002-04-09T06:17:17Z","dateModified":"2024-11-21T15:39:07Z","image":"https:\/\/upload.wikimedia.org\/wikipedia\/commons\/3\/30\/Surveillance_video_cameras%2C_Gdynia.jpeg","headline":"monitoring of behavior, activities, or other changing information, for the purpose of influencing, managing or directing"}</script> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10