228:
233:
682:
665:
621:
219:
have become critical. Devices like chemical markers, on the other hand are more suited and in fact designed mainly for monitoring individuals.
282:
616:
777:
371:
317:
517:
552:
477:
419:
312:
323:
238:
313:"Mass Surveillance Part 1-Risks and opportunities raised by the current generation ofnetwork services and applications"
243:
772:
152:
502:
472:
364:
204:
112:
118:
751:
216:
93:
83:
39:
31:
677:
660:
633:
396:
196:
171:
158:
739:
643:
208:
98:
35:
628:
595:
547:
542:
512:
497:
357:
200:
167:
Laser beam bounced off a window to record vibrations in the pane from conversations in the room
744:
413:
184:
51:
43:
709:
441:
331:
729:
704:
638:
600:
537:
128:
77:
72:
315:. EPRS European Parliamentary Research Service Scientific Foresight (STOA) UnitPE. 2014.
407:
335:
766:
687:
655:
557:
532:
451:
212:
102:
88:
17:
734:
522:
507:
446:
431:
424:
47:
724:
590:
436:
54:. Steven Ashley in 2008 listed the following components used for surveillance:
719:
699:
692:
672:
579:
714:
527:
456:
391:
380:
162:
134:
106:
207:
analysis methods readily lend themselves to mass surveillance. This is why
562:
648:
195:
The electronic means, especially when combined with
Internet features (
140:
115:
or "bugs", tiny, hidden microphone and short-range radio transmitter
62:
353:
68:
349:
30:
are all means of technology provided and used by the
609:
578:
488:
465:
387:
281:
sfn error: no target: CITEREFScienceDirect_Topics (
143:
etc., for screening tiniest traces of body material
276:
262:
324:"Digital Surveillance: Tools of the Spy Trade"
229:Global surveillance disclosures (2013–present)
365:
234:List of government mass surveillance projects
8:
372:
358:
350:
255:
622:Chinese espionage in the United States
7:
617:Chinese intelligence activity abroad
46:institutions that enable individual
683:Interpersonal (HUMINT) intelligence
25:
518:Computer and network surveillance
336:10.1038/scientificamerican0908-70
61:Digital still and video cameras (
553:Short-range agent communications
295:
1:
239:National Applications Office
183:computer hard drives (using
244:Surveillance Detection Unit
170:Discarded items containing
794:
778:Mass surveillance industry
180:credit-card statements and
153:unmanned aerial vehicles
113:Covert listening devices
503:Covert listening device
473:Intelligence assessment
205:artificial intelligence
119:directional microphones
133:Chemical markers like
752:Targeted surveillance
217:end-to-end encryption
94:Cell phone monitoring
84:Computer surveillance
58:Primarily electronic
40:military intelligence
32:surveillance industry
678:Industrial espionage
478:competing hypotheses
277:ScienceDirect Topics
197:ubiquitous computing
172:personal information
159:Night-vision goggles
18:Surveillance methods
328:Scientific American
264:Scientific American
209:countersurveillance
125:primarily chemical
101:, facial features,
629:Cold War espionage
596:Front organization
570:Surveillance tools
548:Phone surveillance
543:One-way voice link
498:Concealment device
203:) and enhanced by
28:Surveillance tools
773:Mass surveillance
760:
759:
414:Agent provocateur
185:digital forensics
52:mass surveillance
44:national security
16:(Redirected from
785:
374:
367:
360:
351:
346:
344:
342:
316:
299:
293:
287:
286:
274:
268:
260:
129:Artificial noses
21:
793:
792:
788:
787:
786:
784:
783:
782:
763:
762:
761:
756:
730:Sting operation
639:Black operation
605:
601:Limited hangout
583:
574:
538:Numbers station
490:
484:
461:
401:
383:
378:
340:
338:
322:
311:
308:
303:
302:
294:
290:
280:
275:
271:
261:
257:
252:
225:
109:characteristics
78:Electronic toll
23:
22:
15:
12:
11:
5:
791:
789:
781:
780:
775:
765:
764:
758:
757:
755:
754:
749:
748:
747:
742:
732:
727:
722:
717:
712:
707:
702:
697:
696:
695:
690:
680:
675:
670:
669:
668:
663:
653:
652:
651:
646:
636:
631:
626:
625:
624:
613:
611:
607:
606:
604:
603:
598:
593:
587:
585:
576:
575:
573:
572:
567:
566:
565:
555:
550:
545:
540:
535:
530:
525:
520:
515:
510:
505:
500:
494:
492:
491:communications
486:
485:
483:
482:
481:
480:
469:
467:
463:
462:
460:
459:
454:
449:
444:
439:
434:
429:
428:
427:
417:
410:
408:Agent handling
404:
402:
400:
399:
394:
388:
385:
384:
379:
377:
376:
369:
362:
354:
348:
347:
320:
307:
306:External links
304:
301:
300:
288:
269:
254:
253:
251:
248:
247:
246:
241:
236:
231:
224:
221:
211:measures like
193:
192:
191:
190:
189:
188:
181:
178:
168:
165:
156:
155:and satellites
146:
145:
144:
137:
131:
123:
122:
121:
116:
110:
96:
91:
86:
81:
75:
66:
24:
14:
13:
10:
9:
6:
4:
3:
2:
790:
779:
776:
774:
771:
770:
768:
753:
750:
746:
743:
741:
738:
737:
736:
733:
731:
728:
726:
723:
721:
718:
716:
713:
711:
708:
706:
703:
701:
698:
694:
691:
689:
688:interrogation
686:
685:
684:
681:
679:
676:
674:
671:
667:
664:
662:
659:
658:
657:
656:Eavesdropping
654:
650:
647:
645:
642:
641:
640:
637:
635:
632:
630:
627:
623:
620:
619:
618:
615:
614:
612:
608:
602:
599:
597:
594:
592:
589:
588:
586:
581:
577:
571:
568:
564:
561:
560:
559:
558:Steganography
556:
554:
551:
549:
546:
544:
541:
539:
536:
534:
533:Invisible ink
531:
529:
526:
524:
521:
519:
516:
514:
511:
509:
506:
504:
501:
499:
496:
495:
493:
487:
479:
476:
475:
474:
471:
470:
468:
464:
458:
455:
453:
452:Sleeper agent
450:
448:
445:
443:
440:
438:
435:
433:
430:
426:
423:
422:
421:
418:
416:
415:
411:
409:
406:
405:
403:
398:
395:
393:
390:
389:
386:
382:
375:
370:
368:
363:
361:
356:
355:
352:
337:
333:
329:
325:
321:
319:
314:
310:
309:
305:
297:
292:
289:
284:
278:
273:
270:
266:
265:
259:
256:
249:
245:
242:
240:
237:
235:
232:
230:
227:
226:
222:
220:
218:
214:
213:anonymization
210:
206:
202:
198:
186:
182:
179:
176:
175:
173:
169:
166:
164:
160:
157:
154:
150:
149:
147:
142:
139:DNA sensors:
138:
136:
132:
130:
127:
126:
124:
120:
117:
114:
111:
108:
104:
100:
97:
95:
92:
90:
89:Phone tapping
87:
85:
82:
79:
76:
74:
70:
67:
64:
60:
59:
57:
56:
55:
53:
49:
45:
41:
37:
33:
29:
19:
735:Surveillance
569:
523:Cyber spying
508:Cryptography
447:Resident spy
432:Double agent
412:
339:. Retrieved
327:
291:
272:
263:
258:
194:
177:phone bills,
103:walking gait
48:surveillance
27:
26:
725:Stay-behind
634:Recruitment
591:Canary trap
489:Devices and
437:Field agent
151:Airplanes,
767:Categories
720:Sexpionage
700:COINTELPRO
693:safe house
673:False flag
610:Operations
584:techniques
580:Tradecraft
341:August 11,
250:References
163:telescopes
135:UV markers
105:and other
644:black bag
528:Dead drop
457:Spymaster
381:Espionage
107:biometric
710:SHAMROCK
563:microdot
466:Analysis
223:See also
73:tracking
705:MINARET
649:wetwork
174:, like
141:Biochip
740:Global
666:MASINT
661:SIGINT
513:Cutout
397:Assets
392:Agents
148:Other
80:takers
42:, and
36:police
425:Agent
420:Cover
99:Voice
63:CCTVs
745:Mass
715:FVEY
442:Mole
343:2020
296:STOA
283:help
215:and
71:for
69:GPSs
50:and
582:and
332:doi
318:pdf
201:IoT
161:or
38:or
769::
330:.
326:.
199:,
34:,
373:e
366:t
359:v
345:.
334::
298:.
285:)
279:.
267:.
187:)
65:)
20:)
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.