Surveillance

Surveillance

Surveillance is the use of IT to monitor the actions of people. For example, monitoring may be used to track, record and assess employees’ performance. It can be used to support claims for promotion or to ensure that employees follow the organization’s internet policies appropriately. //-ITGS guide book//


 * The word //surveillance// may be applied to observation from a distance by means of electronic equipment (such as CCTV cameras), or interception of electronically transmitted information (such as Internet traffic or phone calls). It may also refer to simple, relatively no- or low-technology methods such as human intelligence agents and postal interference. || [[image:http://upload.wikimedia.org/wikipedia/commons/8/8a/Bansky_one_nation_under_cctv.jpg width="349" height="212"]] ||
 * Surveillance is very useful to governments and law enforcement to maintain social control, recognize and monitor threats, and prevent/investigate criminal activity.

//CIA and Peruvian Airforce Shot Down 15 Civilian Planes in Covert Drug Operation// video : media type="youtube" key="KdxgIxqhsgs?rel=0" height="390" width="480" || ||

__** Types of surveillance : **__
 * **Computer Surveillance** - The vast majority of computer surveillance involves the monitoring of data and traffic on the internet. In the United States for example, under the [|Communications Assistance For Law Enforcement Act], all phone calls and broadband Internet traffic (emails, web traffic, instant messaging, etc.) are required to be available for unimpeded real-time monitoring by Federal law enforcement agencies.
 * **Telephones and mobile phones -** The official and unofficial tapping of telephone lines is widespread. In the US for instance, the [|Communications Assistance For Law Enforcement Act (CALEA)] requires that all telephone and [|VoIP] communications be available for real-time wiretapping by Federal law enforcement and intelligence agencies.
 * **Surveillance Cameras** - Surveillance cameras are video cameras used for the purpose of observing an area. They are often connected to a recording device, IP network, and/or watched by a security guard/law enforcement officer.
 * **Social Network Analysis -** One common form of surveillance is to create maps of social network based on data from social network sites such as [|Facebook], [|MySpace], [|Twitter] as well as from traffic analysis information from phone call records such as those in the [|NSA call database__,__] and others. These social network"maps" are then data mined to extract useful information such as personal interests, friendships & affiliations, wants, beliefs, thoughts, and activities.
 * **Biometric Surveillance-** Biometric surveillance refers to technologies that measure and analyze human physical and/or behavioral characteristics for authentication, identification, or screening purpose. Examples of physical characteristics include fingerprints, DNA, and facial patterns.
 * **Aerial Surveillance -** Aerial surveillance is the gathering of surveillance, usually visual imagery or video, from an airborne vehicle—such as a unmanned aerial vehicle, helicopter, or spy plane. Military surveillance aircraft use a range of sensors (e.g. radar) to monitor the battlefield.
 * **Surveillance devices "Bugs" -** Surveillance devices, or "bugs", are hidden electronic devices which are used to capture, record, and/or transmit data to a receiving party such as a law enforcement agency.

Saudis in America under surveillance video media type="youtube" key="tJisTJ30iEU?rel=0" height="390" width="480"

Employees go crazy video: media type="youtube" key="A-qmH5irA-0?rel=0" height="390" width="480"

//related news://
 * //[|FBI uncovers pornography and Santa's illegal surveillance systems; puts NORAD to shame]//
 * [|Bosses switch on antisocial network]
 * [|City gets 'crime-detecting' CCTV]
 * [|Predicting Bus Assault : CCTV cameras - Aggressive behaviour could be observed before it happens]