Surveillance in the context of "Intelligence field"

Play Trivia Questions online!

or

Skip to study material about Surveillance in the context of "Intelligence field"

Ad spacer

⭐ Core Definition: Surveillance

Surveillance is the systematic observation and monitoring of a person, population, or location, with the purpose of information-gathering, influencing, managing, or directing.

It is widely used by governments for a variety of reasons, such as law enforcement, national security, and information awareness. It can also be used as a tactic by persons who are not working on behalf of a government, by criminal organizations to plan and commit crimes, and by businesses to gather intelligence on criminals, their competitors, suppliers or customers. Religious organizations charged with detecting heresy and heterodoxy may also carry out surveillance. Various kinds of auditors carry out a form of surveillance.

↓ Menu

>>>PUT SHARE BUTTONS HERE<<<
In this Dossier

Surveillance in the context of Biopolitics

Biopolitics is a concept popularized by the French philosopher Michel Foucault in the mid-20th century. At its core, biopolitics explores how governmental power operates through the management and regulation of a population's bodies and lives.

This interdisciplinary field scrutinizes the mechanisms through which political authorities and institutions exercise control over populations which goes beyond conventional forms of governance. This encompasses areas such as the regulation of health, reproduction, sexuality, and other aspects of biological existence. The governmental power of biopolitics is exerted through practices such as surveillance, healthcare policies, population control measures, gender-based laws, and the implementation of biometric identification systems.

↑ Return to Menu

Surveillance in the context of Thermography

Infrared thermography (IRT), also known as thermal imaging, is a measurement and imaging technique in which a thermal camera detects infrared radiation originating from the surface of objects. This radiation has two main components: thermal emission from the object's surface, which depends on its temperature and emissivity, and reflected radiation from surrounding sources. When the object is not (fully) opaque, i.e. exhibits nonzero transmissivity at the cameras operating wavelengths, transmitted radiation also contributes to the observed signal. The result is a visible image called a thermogram. Thermal cameras most commonly operate in the long-wave infrared (LWIR) range (7–14 μm); less frequently, systems designed for the mid-wave infrared (MWIR) range (3–5 μm) are used.

Since infrared radiation is emitted by all objects with a temperature above absolute zero according to the black body radiation law, thermography makes it possible to see one's environment with or without visible illumination. The amount of radiation emitted by an object increases with temperature, and thermography allows one to see variations in temperature. When viewed through a thermal imaging camera, warm objects stand out well against cooler backgrounds. For example, humans and other warm-blooded animals become easily visible against their environment in day or night. As a result, thermography is particularly useful to the military and other users of surveillance cameras.

↑ Return to Menu

Surveillance in the context of Mexico–United States barrier

A border wall has been built along portions of the Mexico–United States border in an attempt to reduce illegal immigration to the United States from Mexico. The barrier is not a continuous structure but a series of obstructions variously classified as "fences" or "walls".

Between the physical barriers, security is provided by a "virtual fence" of sensors, cameras, and other surveillance equipment used to dispatch United States Border Patrol agents to suspected migrant crossings. In May 2011, the Department of Homeland Security (DHS) said it had 649 miles (1,044 km) of barriers in place. A total of 438 miles (705 km) of new primary barriers were built during Donald Trump's first presidency, dubbed the "Trump wall", though Trump had repeatedly promised a "giant wall" spanning the entire border and that Mexico would "pay for the wall," neither of which were done. The national border's length is 1,954 miles (3,145 km), of which 1,255 miles (2,020 km) is the Rio Grande and 699 miles (1,125 km) is on land.

↑ Return to Menu

Surveillance in the context of Biometric identification

Biometrics are body measurements and calculations related to human characteristics and features. Biometric authentication (or realistic authentication) is used in computer science as a form of identification and access control. It is also used to identify individuals in groups that are under surveillance.

Biometric identifiers are the distinctive, measurable characteristics used to label and describe individuals. Biometric identifiers are often categorized as physiological characteristics which are related to the shape of the body. Examples include, but are not limited to fingerprint, palm veins, face recognition, DNA, palm print, hand geometry, iris recognition, retina, odor/scent, voice, shape of ears and gait. Behavioral characteristics are related to the pattern of behavior of a person, including but not limited to mouse movement, typing rhythm, gait, signature, voice, and behavioral profiling. Some researchers have coined the term behaviometrics (behavioral biometrics) to describe the latter class of biometrics.

↑ Return to Menu

Surveillance in the context of Intelligence, surveillance, target acquisition, and reconnaissance

ISTAR stands for intelligence, surveillance, target acquisition, and reconnaissance. In its macroscopic sense, ISTAR is a practice that links several battlefield functions together to assist a combat force in employing its sensors and managing the information they gather.

Information is collected on the battlefield through systematic observation by deployed soldiers and a variety of electronic sensors. Surveillance, target acquisition and reconnaissance are methods of obtaining this information. The information is then passed to intelligence personnel for analysis, and then to the commander and their staff for the formulation of battle plans. Intelligence is processed information that is relevant and contributes to an understanding of the ground, and of enemy dispositions and intents. Intelligence failures can happen.

↑ Return to Menu

Surveillance in the context of Mass surveillance

Mass surveillance is the intricate surveillance of an entire or a substantial fraction of a population in order to monitor that group of citizens. The surveillance is often carried out by local and federal governments or governmental organizations, but it may also be carried out by corporations (either on behalf of governments or at their own initiative). Depending on each nation's laws and judicial systems, the legality of and the permission required to engage in mass surveillance varies. It is the single most indicative distinguishing trait of totalitarian regimes. It is often distinguished from targeted surveillance.

Mass surveillance has often been cited by agencies like the National Security Agency (NSA) as necessary to fight terrorism, prevent crime and social unrest, protect national security, and control the population. At the same time, mass surveillance has equally often been criticized for violating privacy rights, limiting civil and political rights and freedoms, and being illegal under some legal or constitutional systems. Another criticism is that increasing mass surveillance could potentially lead to the development of a surveillance state, an electronic police state, or a totalitarian state wherein civil liberties are infringed or political dissent is undermined by COINTELPRO-like programs.

↑ Return to Menu

Surveillance in the context of Bugging

A covert listening device, more commonly known as a bug or a wire, is usually a combination of a miniature radio transmitter with a microphone. The use of bugs, called bugging, or wiretapping is a common technique in surveillance, espionage and police investigations.

Self-contained electronic covert listening devices came into common use with intelligence agencies in the 1950s, when technology allowed for a suitable transmitter to be built into a relatively small package. By 1956, the US Central Intelligence Agency was designing and building "Surveillance Transmitters" that employed transistors, which greatly reduced the size and power consumption. With no moving parts and greater power efficiency, these solid-state devices could be operated by small batteries, which revolutionized the process of covert listening.

↑ Return to Menu

Surveillance in the context of Landsat

The Landsat program is the longest-running enterprise that has acquired satellite imagery of Earth. It is a joint NASA / USGS program. On 23 July 1972, the Earth Resources Technology Satellite was launched. This was eventually renamed to Landsat 1 in 1975. The most recent, Landsat 9, was launched on 27 September 2021.

The instruments on the Landsat satellites have acquired millions of images. The images, archived in the United States and at Landsat receiving stations around the world, are a unique resource for global change research and applications in agriculture, cartography, geology, forestry, regional planning, surveillance, and education, and can be viewed through the U.S. Geological Survey (USGS) "EarthExplorer" website. Landsat 7 data has eight spectral bands with spatial resolutions ranging from 15 to 60 m (49 to 197 ft); the temporal resolution is 16 days. Landsat images are usually divided into scenes for easy downloading. Each Landsat scene is about 115 miles long and 115 miles wide (or 100 nautical miles long and 100 nautical miles wide, or 185 kilometers long and 185 kilometers wide).

↑ Return to Menu

Surveillance in the context of Reconnaissance aircraft

A reconnaissance aircraft (colloquially, a spy plane) is a military aircraft designed or adapted to perform aerial reconnaissance with roles including collection of imagery intelligence (including using photography), signals intelligence, as well as measurement and signature intelligence. Modern technology has also enabled some aircraft and UAVs to carry out real-time surveillance in addition to general intelligence gathering.

Before the development of devices such as radar, military forces relied on reconnaissance aircraft for visual observation and scouting of enemy movement. An example is the PBY Catalina maritime patrol flying boat used by the Allies in World War II: a flight of U.S. Navy Catalinas spotted part of the Japanese fleet approaching Midway Island, beginning the Battle of Midway.

↑ Return to Menu