Surveillance in the context of Digital citizen


Surveillance in the context of Digital citizen

Surveillance Study page number 1 of 4

Play TriviaQuestions Online!

or

Skip to study material about Surveillance in the context of "Digital citizen"


⭐ Core Definition: Surveillance

Surveillance is the systematic observation and monitoring of a person, population, or location, with the purpose of information-gathering, influencing, managing, or directing.

It is widely used by governments for a variety of reasons, such as law enforcement, national security, and information awareness. It can also be used as a tactic by persons who are not working on behalf of a government, by criminal organizations to plan and commit crimes, and by businesses to gather intelligence on criminals, their competitors, suppliers or customers. Religious organizations charged with detecting heresy and heterodoxy may also carry out surveillance. Various kinds of auditors carry out a form of surveillance.

↓ Menu
HINT:

In this Dossier

Surveillance in the context of Biopolitics

Biopolitics is a concept popularized by the French philosopher Michel Foucault in the mid-20th century. At its core, biopolitics explores how governmental power operates through the management and regulation of a population's bodies and lives.

This interdisciplinary field scrutinizes the mechanisms through which political authorities and institutions exercise control over populations which goes beyond conventional forms of governance. This encompasses areas such as the regulation of health, reproduction, sexuality, and other aspects of biological existence. The governmental power of biopolitics is exerted through practices such as surveillance, healthcare policies, population control measures, gender-based laws, and the implementation of biometric identification systems.

View the full Wikipedia page for Biopolitics
↑ Return to Menu

Surveillance in the context of Thermography

Infrared thermography (IRT), also known as thermal imaging, is a measurement and imaging technique in which a thermal camera detects infrared radiation originating from the surface of objects. This radiation has two main components: thermal emission from the object's surface, which depends on its temperature and emissivity, and reflected radiation from surrounding sources. When the object is not (fully) opaque, i.e. exhibits nonzero transmissivity at the cameras operating wavelengths, transmitted radiation also contributes to the observed signal. The result is a visible image called a thermogram. Thermal cameras most commonly operate in the long-wave infrared (LWIR) range (7–14 μm); less frequently, systems designed for the mid-wave infrared (MWIR) range (3–5 μm) are used.

Since infrared radiation is emitted by all objects with a temperature above absolute zero according to the black body radiation law, thermography makes it possible to see one's environment with or without visible illumination. The amount of radiation emitted by an object increases with temperature, and thermography allows one to see variations in temperature. When viewed through a thermal imaging camera, warm objects stand out well against cooler backgrounds. For example, humans and other warm-blooded animals become easily visible against their environment in day or night. As a result, thermography is particularly useful to the military and other users of surveillance cameras.

View the full Wikipedia page for Thermography
↑ Return to Menu

Surveillance in the context of Mexico–United States barrier

A border wall has been built along portions of the Mexico–United States border in an attempt to reduce illegal immigration to the United States from Mexico. The barrier is not a continuous structure but a series of obstructions variously classified as "fences" or "walls".

Between the physical barriers, security is provided by a "virtual fence" of sensors, cameras, and other surveillance equipment used to dispatch United States Border Patrol agents to suspected migrant crossings. In May 2011, the Department of Homeland Security (DHS) said it had 649 miles (1,044 km) of barriers in place. A total of 438 miles (705 km) of new primary barriers were built during Donald Trump's first presidency, dubbed the "Trump wall", though Trump had repeatedly promised a "giant wall" spanning the entire border and that Mexico would "pay for the wall," neither of which were done. The national border's length is 1,954 miles (3,145 km), of which 1,255 miles (2,020 km) is the Rio Grande and 699 miles (1,125 km) is on land.

View the full Wikipedia page for Mexico–United States barrier
↑ Return to Menu

Surveillance in the context of Biometric identification

Biometrics are body measurements and calculations related to human characteristics and features. Biometric authentication (or realistic authentication) is used in computer science as a form of identification and access control. It is also used to identify individuals in groups that are under surveillance.

Biometric identifiers are the distinctive, measurable characteristics used to label and describe individuals. Biometric identifiers are often categorized as physiological characteristics which are related to the shape of the body. Examples include, but are not limited to fingerprint, palm veins, face recognition, DNA, palm print, hand geometry, iris recognition, retina, odor/scent, voice, shape of ears and gait. Behavioral characteristics are related to the pattern of behavior of a person, including but not limited to mouse movement, typing rhythm, gait, signature, voice, and behavioral profiling. Some researchers have coined the term behaviometrics (behavioral biometrics) to describe the latter class of biometrics.

View the full Wikipedia page for Biometric identification
↑ Return to Menu

Surveillance in the context of Intelligence, surveillance, target acquisition, and reconnaissance

ISTAR stands for intelligence, surveillance, target acquisition, and reconnaissance. In its macroscopic sense, ISTAR is a practice that links several battlefield functions together to assist a combat force in employing its sensors and managing the information they gather.

Information is collected on the battlefield through systematic observation by deployed soldiers and a variety of electronic sensors. Surveillance, target acquisition and reconnaissance are methods of obtaining this information. The information is then passed to intelligence personnel for analysis, and then to the commander and their staff for the formulation of battle plans. Intelligence is processed information that is relevant and contributes to an understanding of the ground, and of enemy dispositions and intents. Intelligence failures can happen.

View the full Wikipedia page for Intelligence, surveillance, target acquisition, and reconnaissance
↑ Return to Menu

Surveillance in the context of Mass surveillance

Mass surveillance is the intricate surveillance of an entire or a substantial fraction of a population in order to monitor that group of citizens. The surveillance is often carried out by local and federal governments or governmental organizations, but it may also be carried out by corporations (either on behalf of governments or at their own initiative). Depending on each nation's laws and judicial systems, the legality of and the permission required to engage in mass surveillance varies. It is the single most indicative distinguishing trait of totalitarian regimes. It is often distinguished from targeted surveillance.

Mass surveillance has often been cited by agencies like the National Security Agency (NSA) as necessary to fight terrorism, prevent crime and social unrest, protect national security, and control the population. At the same time, mass surveillance has equally often been criticized for violating privacy rights, limiting civil and political rights and freedoms, and being illegal under some legal or constitutional systems. Another criticism is that increasing mass surveillance could potentially lead to the development of a surveillance state, an electronic police state, or a totalitarian state wherein civil liberties are infringed or political dissent is undermined by COINTELPRO-like programs.

View the full Wikipedia page for Mass surveillance
↑ Return to Menu

Surveillance in the context of Bugging

A covert listening device, more commonly known as a bug or a wire, is usually a combination of a miniature radio transmitter with a microphone. The use of bugs, called bugging, or wiretapping is a common technique in surveillance, espionage and police investigations.

Self-contained electronic covert listening devices came into common use with intelligence agencies in the 1950s, when technology allowed for a suitable transmitter to be built into a relatively small package. By 1956, the US Central Intelligence Agency was designing and building "Surveillance Transmitters" that employed transistors, which greatly reduced the size and power consumption. With no moving parts and greater power efficiency, these solid-state devices could be operated by small batteries, which revolutionized the process of covert listening.

View the full Wikipedia page for Bugging
↑ Return to Menu

Surveillance in the context of Landsat

The Landsat program is the longest-running enterprise that has acquired satellite imagery of Earth. It is a joint NASA / USGS program. On 23 July 1972, the Earth Resources Technology Satellite was launched. This was eventually renamed to Landsat 1 in 1975. The most recent, Landsat 9, was launched on 27 September 2021.

The instruments on the Landsat satellites have acquired millions of images. The images, archived in the United States and at Landsat receiving stations around the world, are a unique resource for global change research and applications in agriculture, cartography, geology, forestry, regional planning, surveillance, and education, and can be viewed through the U.S. Geological Survey (USGS) "EarthExplorer" website. Landsat 7 data has eight spectral bands with spatial resolutions ranging from 15 to 60 m (49 to 197 ft); the temporal resolution is 16 days. Landsat images are usually divided into scenes for easy downloading. Each Landsat scene is about 115 miles long and 115 miles wide (or 100 nautical miles long and 100 nautical miles wide, or 185 kilometers long and 185 kilometers wide).

View the full Wikipedia page for Landsat
↑ Return to Menu

Surveillance in the context of Reconnaissance aircraft

A reconnaissance aircraft (colloquially, a spy plane) is a military aircraft designed or adapted to perform aerial reconnaissance with roles including collection of imagery intelligence (including using photography), signals intelligence, as well as measurement and signature intelligence. Modern technology has also enabled some aircraft and UAVs to carry out real-time surveillance in addition to general intelligence gathering.

Before the development of devices such as radar, military forces relied on reconnaissance aircraft for visual observation and scouting of enemy movement. An example is the PBY Catalina maritime patrol flying boat used by the Allies in World War II: a flight of U.S. Navy Catalinas spotted part of the Japanese fleet approaching Midway Island, beginning the Battle of Midway.

View the full Wikipedia page for Reconnaissance aircraft
↑ Return to Menu

Surveillance in the context of Surveillance aircraft

Surveillance aircraft or observation aircraft are aircraft used for aerial surveillance. They are primarily operated by military forces and government agencies in roles including intelligence gathering, maritime patrol, battlefield and airspace surveillance, observation (e.g. artillery spotting), and law enforcement.

Surveillance aircraft usually carry limited defensive armament, if any. They do not require high-performance capability or stealth characteristics and may be modified civilian aircraft. Surveillance aircraft have also included moored balloons (e.g. TARS) and unmanned aerial vehicles (UAVs).

View the full Wikipedia page for Surveillance aircraft
↑ Return to Menu

Surveillance in the context of Federal Security Service

The Federal Security Service of the Russian Federation (FSB) is the principal security agency of Russia and the main successor agency to the Soviet Union's KGB; its immediate predecessor was the Federal Counterintelligence Service (FSK), which was reorganized into the FSB in 1995. The three major structural successor components of the former KGB that remain administratively independent of the FSB are the Foreign Intelligence Service (SVR), the Federal Protective Service (FSO), and the Main Directorate of Special Programs of the President of the Russian Federation (GUSP).

The primary responsibilities are within the country and include counter-intelligence, internal and border security, counterterrorism, surveillance and investigating some other types of serious crimes and federal law violations. It is headquartered in Lubyanka Square, Moscow's center, in the main building of the former KGB. The director of the FSB is appointed by and directly answerable to the president of Russia. Being part of Russia's executive branch formally, the FSB has significant, if not decisive, power over it.

View the full Wikipedia page for Federal Security Service
↑ Return to Menu

Surveillance in the context of ECHELON

ECHELON, originally a secret government code name, is a surveillance program (signals intelligence/SIGINT collection and analysis network) operated by the five signatory states to the UKUSA Security Agreement: Australia, Canada, New Zealand, the UK and the United States, also known as the Five Eyes.

Created in the late 1960s to monitor the military and diplomatic communications of the Soviet Union and its Eastern Bloc allies during the Cold War, the ECHELON project became formally established in 1971. By the end of the 20th century, it had greatly expanded.

View the full Wikipedia page for ECHELON
↑ Return to Menu

Surveillance in the context of Investigatory Powers Tribunal

The Investigatory Powers Tribunal (IPT) is a first-instance tribunal and superior court of record in the United Kingdom. It is primarily an inquisitorial court.

It hears complaints about surveillance by public bodies, primarily the intelligence services. It does not hear complaints about surveillance by private bodies.

View the full Wikipedia page for Investigatory Powers Tribunal
↑ Return to Menu

Surveillance in the context of Clandestine cell system

A clandestine cell system is a method for organizing a group of people, such as resistance fighters, spies, mercenaries, organized crime members, or terrorists, to make it harder for police, military or other hostile groups to catch them. In a cell structure, each cell consists of a relatively small number of people, who know little to no information concerning organization assets (such as member identities) beyond their cell. This limits the harm that can be done to the organization as a whole by any individual cell member defecting, being a mole, being surveilled, or giving up information after being apprehended and interrogated.

The structure of a clandestine cell system can range from a strict hierarchy to an extremely distributed organization, depending on the group's ideology, its operational area, the communications technologies available, and the nature of the mission. Criminal organizations, undercover operations, and unconventional warfare units led by special forces may also use this sort of organizational structure.

View the full Wikipedia page for Clandestine cell system
↑ Return to Menu

Surveillance in the context of Surveillance abuse

Surveillance abuse is the use of surveillance methods or technology to monitor the activity of an individual or group of individuals in a way which violates international human rights standards, social and cultural norms or the laws of a particular society.

During the FBI's COINTELPRO operations, there was widespread surveillance abuse which targeted political dissidents, primarily people from the political left and civil rights movement.

View the full Wikipedia page for Surveillance abuse
↑ Return to Menu

Surveillance in the context of COINTELPRO

COINTELPRO (a syllabic abbreviation derived from Counter Intelligence Program) was a series of covert and illegal projects conducted between 1956 and 1971 by the United States Federal Bureau of Investigation (FBI) aimed at surveilling, infiltrating, discrediting, and disrupting American political parties and organizations that the FBI perceived as subversive.

Groups and individuals targeted by the FBI included feminist organizations, the Communist Party USA, anti-Vietnam War organizers, activists in the civil rights and Black power movements (e.g., Martin Luther King Jr., Malcolm X, and the Black Panther Party), Student organizations such as Students for a Democratic Society (SDS) and Student Nonviolent Coordinating Committee (SNCC), environmentalist and animal rights organizations, the American Indian Movement (AIM), Chicano and Mexican-American groups like the Brown Berets and the United Farm Workers, and independence movements (including Puerto Rican independence groups, such as the Young Lords and the Puerto Rican Socialist Party). Although the program primarily focused on organizations that were part of the broader New Left, they also targeted white supremacist groups, such as the Ku Klux Klan and the National States' Rights Party.

View the full Wikipedia page for COINTELPRO
↑ Return to Menu

Surveillance in the context of Intelligence field

The Intelligence field, in simplistic terms, is a collection of the people who gather or sift through intelligence. Those persons popularly called "spies" are a small but important part of the intelligence field. The intelligence field is the top-level field composed of people and organizations and their involvement the systematic espionage, analysis, and dissemination of intelligence to support policymaking and key stakeholder decision-making, primarily in matters related to national security, military affairs, law enforcement, and international relations. Collectively, that process of intelligence is usually called the intelligence cycle. The intelligence field can encompass a range of subfields including; espionage, surveillance, data analysis, and counterintelligence, all aimed at understanding threats, opportunities, and the intentions and power projection of foreign entities. While the act of espionage is illegal throughout the world, espionage is only a single subfield of the intelligence field. There are many subfields of intelligence that are not illegal everywhere, such as Open-source intelligence (OSINT).

Intelligence work can be conducted by government intelligence agencies, police forces, and military intelligence units. This work can also be engaged by private organizations, including; private intelligence agencies, multinational corporations, private investigators, drug cartels, narcotic cartels, terrorist groups, and others. Individuals employed by these organizations can either be fully employed officers of intelligence agencies called intelligence officers, or single and mission-specific solitary contracting agents who are commonly known as "secret agents." Confusingly, the term "spy" has no definition at most intelligence agencies, but is codified in many state judicial systems as an illegal operator.

View the full Wikipedia page for Intelligence field
↑ Return to Menu