Surveillance


Surveillance is the monitoring of behavior, many activities, or information for the purpose of information gathering, influencing, managing or directing.[1][2] This can include observation from a distance by means of electronic equipment, such as closed-circuit television (CCTV), or interception of electronically transmitted information like Internet traffic. It can also include simple technical methods, such as human intelligence gathering and postal interception.

Surveillance is used by citizens for protecting their neighborhoods. And by governments for intelligence gathering - including espionage, prevention of crime, the protection of a process, person, group or object, or the investigation of crime. It is also used by criminal organizations to plan and commit crimes, and by businesses to gather intelligence on criminals, their competitors, suppliers or customers. Religious organisations charged with detecting heresy and heterodoxy may also carry out surveillance.[3]Auditors carry out a form of surveillance.[4]

A byproduct of surveillance is that it can unjustifiably violate people's privacy and is often criticized by civil liberties activists.[5] Liberal democracies may have laws that seek to restrict governmental and private use of surveillance, whereas authoritarian governments seldom have any domestic restrictions.

Espionage is by definition covert and typically illegal according to the rules of the observed party, whereas most types of surveillance are overt and are considered legitimate. International espionage seems to be common among all types of countries.[6][7]

The vast majority of computer surveillance involves the monitoring of data and traffic on the Internet.[8] In the United States for example, under the Communications Assistance For Law Enforcement Act, all phone calls and broadband Internet traffic (emails, web traffic, instant messaging, etc.) are required to be available for unimpeded real-time monitoring by federal law enforcement agencies.[9][10][11]

There is far too much data on the Internet for human investigators to manually search through all of it. Therefore, automated Internet surveillance computers sift through the vast amount of intercepted Internet traffic to identify and report to human investigators the traffic that is considered interesting or suspicious. This process is regulated by targeting certain "trigger" words or phrases, visiting certain types of web sites, or communicating via email or online chat with suspicious individuals or groups.[12] Billions of dollars per year are spent by agencies, such as the NSA, the FBI and the now-defunct Information Awareness Office, to develop, purchase, implement, and operate systems such as Carnivore, NarusInsight, and ECHELON to intercept and analyze all of this data to extract only the information which is useful to law enforcement and intelligence agencies.[13]


Surveillance cameras
Surveillance Camera to support the Washington DC Police
Official seal of the Information Awareness Office – a U.S. agency which developed technologies for mass surveillance
The headquarters of UK intelligence activities is Government Communications Headquarters, Cheltenham, England (2017)
A surveillance camera in Cairns, Queensland
Surveillance cameras such as these are installed by the millions in many countries, and are nowadays monitored by automated computer programs instead of humans.
A payload surveillance camera manufactured by Controp and distributed to the U.S. government by ADI Technologies
A graph of the relationships between users on the social networking site Facebook. Social network analysis enables governments to gather detailed information about peoples' friends, family, and other contacts. Since much of this information is voluntarily made public by the users themselves, it is often considered to be a form of open-source intelligence
Fingerprints being scanned as part of the US-VISIT program
Micro Air Vehicle with attached surveillance camera
HART program concept drawing from official IPTO (DARPA) official website
A card containing an identification number
RFID chip pulled from a new credit card
Hand with planned insertion point for Verichip device
Diagram of GPS satellites orbiting Earth
Graffiti expressing concern about the proliferation of video surveillance
Surveillance lamppost brought down in Hong Kong by citizens fearing state surveillance
An elaborate graffito in Columbus, Ohio, depicting state surveillance of telecommunications
A traffic camera atop a high pole oversees a road in the Canadian city of Toronto