logo

Counter Surveillance System (Doc)

   

Added on  2020-02-24

7 Pages1266 Words95 Views
 | 
 | 
 | 
Running head: COUNTER SURVEILLANCECounter SurveillanceName of the StudentName of the UniversityAuthor Note
Counter Surveillance System (Doc)_1

1COUNTER SURVEILLANCEAnswers1.Surveillance refers to the scrutinizing of the behavior activities and other information thatis changing. This is done for the purpose of persuading, managing, directing, protectionof the people. The notion of Surveillance includes the observation from a certain distanceby the help of the electronic equipments like the closed-circuit television that is theCCTV cameras and the interruption of the electronic transmitted information as thetraffic on the internet and the phone calls 1. This word comes from the French phrase thatmeans watching over. The issue of surveillance is regarded as the violation of theprivacy. The different civil liberty groups and activists counter these. The governmentsfor the action of gathering of intelligence, crime prevention, protecting a process,individual, group, object and the investigation of a crime, use the surveillance. Thecriminal organizations use this notion of surveillance to plan and commit their crimes.The business organizations use surveillance to gather intelligence. The surveillancesystems as the camera system run a facial recognition of the individuals2 . With the helpof surveillance, one can reconstruct a particular incident and prove a person guiltythrough the accessibility of the footage. The tool of surveillance also influences thesubjective security when there is visibility of the resources. This instrument helps toprotect the society from the terrorists and the criminals. It is the means to reduce thecrimes by observing, deterrence and reconstruction. There is a minimum level ofinvasion. 1 David Lyon, Kirstie Ball and Kevin D. Haggerty,Routledge Handbook Of Surveillance Studies(Routledge, 2012).2 Jiawei Han, Micheline Kamber and Jian Pei,Data Mining(Elsevier; Morgan Kaufmann, 2011).
Counter Surveillance System (Doc)_2

2COUNTER SURVEILLANCE2.There are various ways for the surveillance. Firstly, the computer surveillance engagesthe scrutinizing of the data and the traffic on the internet3 . There are several lawsimplemented by the Organizations for surveillance. The phone calls, internet traffic onthe broadband, which consists of the emails, messages, traffic on the web and so on, areunder the act of surveillance. Secondly, there is the official and the unofficial tapping ofthe telephone lines. This involves the tracking of the phone records and accesses themwhen in need. There is monitoring of the phone calls by the officials. Thirdly, thesurveillance cameras as the video cameras are used for the observation of a certain area.These are connected to the IP network and observed by a security officer. Fourthly, thereis the analysis of the social network that creates the maps of the various social networksbased on the data collected from the sites of theses social networks. These extract usefulinformation as the individual interest, friendships, association, beliefs, activities andthought process. Fifthly, there is the biometric surveillance, which helps to measure andexamine the characteristics of the behavior of the individual. This involves the facialrecognition of the facial features of an individual4 . It also uses the facial patterns,fingerprint and the DNA. The machines that are implemented can identify a few emotionsin the individuals through the measurement of the temperature that is generated by theblood flow to the various parts of the face. 3.The most common methods of surveillance are:Computer- this involves the data monitoring and monitoring of the traffic on the internet.The computers are a target of surveillance as there is the storing of personal data in them.3 Benjamin J Goold and Daniel Neyland,New Directions In Surveillance Privacy(Willan, 2013).4 Bouwmans, Thierry and Hoferlin,Background Modeling And Foreground Detection For VideoSurveillance.(CRC press, 2014).
Counter Surveillance System (Doc)_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
The Use of Mass Surveillance Technology by Governments
|7
|1068
|59

Control System: Traffic Management
|6
|1499
|331

Contemporary Issues in Criminology - Assignment
|105
|41475
|66

The Personal and Ethical Implications of the Australian Smart State Plan
|11
|3331
|107

Surveillance on Social Media
|11
|2564
|349

Unit 2 Workbook - Crime Prevention and Motivation Theories
|30
|6474
|434