Part+2+-+Other+types+of+surveillance


 * Part 2 - Other types of surveillance**

GPS is only one type of surveillance. There are many other types of surveillance listed below. For each type, explain what it is and find a real-life example (perhaps a news article or video) of it being put into practice. What type of tools are needed to carry out the surveillance? Why do people engage in this type of surveillance?


 * Computer Surveillance**


 * 1) Definition
 * The act of monitoring computer activity, and data stored on a hard drive or being transferred over the Internet.
 * A tool which users can track and monitor all activity on a target's computer via local or remote network.
 * 1) Real life example
 * School IT Department is able to monitor ** all the computer in the school. Not quite, they cannot monitor laptops if the login password is changed ** using the computer surveillance software and collect all the information and data from targeted computers when necessary
 * 1) Tools required
 * Computer surveillance software
 * 1) Why do people engage in this type of surveillance (can be for good, bad, or both)?
 * Both
 * Good for business or at work, computer surveillance help employers to monitor what the employees are doing during the day.
 * Good for parents to monitor what their kids are doing online. ** Is there an issue of trust here? Should their be constraints imposed? **
 * Bad for invasion of personal privacy, people might not want their information to be collected and their daily routine to be monitored


 * Telephones and mobile phones**
 * 1) Definition
 * The act of monitoring telephone and mobile phone conversation by a third party
 * 1) Real life example
 * FBI remotely activating a mobile phone's microphone and using it to eavesdrop nearby conversations
 * FBI taps cell phone mic as eavesdropping tool
 * 1) Tools required
 * Cellphone spy software
 * 1) Why do people engage in this type of surveillance (can be for good, bad, or both)?
 * Both
 * Good for law enforcement and intelligence service can legally use mobile phone or telephone to collect location data and other information
 * Bad because e avesdropping technique functioned whether the phone was powered on or off (** powered off? **)
 * Bad for individuals, loss of privacy if someone eavesdrop conversations and collect personal information or location


 * Social Network Analysis**
 * 1) Definition
 * A form of surveillance by creating maps of social networks based on data from social networking sites to extract information such as personal interests, friendships & affiliations, wants, beliefs, thoughts, and activities.
 * 1) Real life example
 * FBI trains intelligence analysts to use link analysis for intelligence and for investigations of everything from mortgage fraud to terror networks.
 * Network analysis - How the FBI finds bad guys!
 * 1) Tools required
 * Internet
 * Online survey tool, system package, commercial software for social network analysis
 * 1) Why do people engage in this type of surveillance (can be for good, bad, or both)?
 * Good because it helps government to research any intelligence community that is threatening their power and remove them through social network sites
 * Good for helping companies to know which area or customer to target their product selling
 * Bad because loss of privacy and control over the data
 * All the information, personal interests, activities, job experiences can be distributed to anyone. ** Deliberately, accidentally, or both? **
 * It might allow saboteurs to use the information for unknown or bad purpose


 * Biometric Surveillance**
 * 1) Definition
 * Technologies that measure and analyze human physical and/or behavioral characteristics for authentication, identification, or screening purposes.
 * 1) Real life example
 * A South Side man suspected of robbing the same Loop bank four times has been arrested and charged with one of the robberies after leaving his demand note — with a fingerprint — behind. A forensic examination of the note by the FBI laboratory found a latent fingerprint that belonged to the suspect in the robbery.
 * Fingerprint on note leads to arrest of suspected serial bank robber
 * 1) Tools required
 * Fingerprint and hand scanner
 * Facial recognition cameras
 * Voice recognition microphones
 * Iris scanner
 * Signature pads, handwriting analysis, pauses during writing, rate of speed used when writing and pressure applied when writing
 * 1) Why do people engage in this type of surveillance (can be for good, bad, or both)?
 * Good for law enforcement because they can use facial thermograph to identify the emotions and facial temperature in different parts of a person's face, this has potential for them to identify if a suspect is nervous, hiding something or lying.
 * Help lessening the chances of identity theft
 * Good for business and national security
 * ** Should people have the choice of whether or not they want to share this information with law enforcement or government? **


 * Aerial Surveillance**
 * 1) Definition
 * A form of gathering surveillance
 * Gather visual imagery or video from airborne vehicle such as unmanned aerial vehicle, helicopter or spy plane that attached with surveillance camera
 * 1) Real life example
 * Police was approved by The Lancaster City Council in the use of small-fixed wing plane that will allow them to monitor suspected criminal activity
 * Lancaster approves police aerial surveillance
 * 1) Tools required
 * Unmanned aerial vehicles
 * remote-controlled airplane
 * 1) Why do people engage in this type of surveillance (can be for good, bad, or both)?
 * Good for the government, security of a country
 * Help to patrol a city, keep track suspicious individuals secretly and report their activities to the monitoring station
 * Help to monitor battlefield
 * ** What about other fields that might require data gathered by aerial surveillance? For example, engineering of highways, agriculture, topographical maps, etc.? **


 * Surveillance devices "Bugs"**
 * 1) Definition
 * Hidden electronic devices which are used to capture, record, and/or transmit data to a receiving party such as a law enforcement agency.
 * 1) Real life example
 * Egypt's Presidential Palace was believed to have electronic bugs (cameras and listening devices) installed by the ex-Chief of Presidential Staff on the direct orders of Suzanne Mubarak, the deposed president's wife.
 * Surveillance equipment removed from Egypt's Presidential Palace
 * 1) Tools required
 * Hidden spy camera, nanny camera
 * Hidden microphone or listening device
 * 1) Why do people engage in this type of surveillance (can be for good, bad, or both)?
 * Bad for individuals, if someone is stalking and trying to use personal information for bad purpose
 * Spouses use it to investigate if their love one is cheating, having affair with someone else and ruin their relationship
 * Good for police or investigators to monitor their suspect's action and conversation to get more sources and information