Surveillance Systems

Fetch Headings.ExtraData
Below are groups and resources (books, articles, websites, etc.) related to this topic. Click on an item’s title to go its resource page with author, publisher, description/abstract and other details, a link to the full text if available, as well as links to related topics in the Subject Index. You can also browse the Title, Author, Subject, Chronological, Dewey, LoC, and Format indexes, or use the Search box.
Particularly recommended items are flagged with a red logo:

Connexions Library

Bringing the Battlefield to the Border: The Wild World of Border Security and Boundary Building in Arizona
Miller, Todd
Article
2012
The U.S.-Mexican border has not only become Ground Zero for every experiment in immigration enforcement and drug interdiction, but also the incubator, testing site, showcase, and staging ground for ev...
The Computers are Listening: How the NSA Converts Spoken Words Into Searchable Text
Froomkin,Dan
Article
2015
Top-secret documents from the archive of Edward Snowden show the National Security Agency can now automatically recognize the content within phone calls by creating rough transcripts and phonetic repr...
Eavesdropping on the Planet: The Inalienable Right to Snoop?
Blum, William
Article
2013
Like a mammoth vacuum cleaner in the sky, the National Security Agency (NSA) sucks it all up: home phone, office phone, cellular phone, email, fax, telex … satellite transmissions, fiber-optic communi...
The Face Off: Law Enforcement Use of Face Recognition Technology
Lynch, Jennifer
Article
2018
Face recognition is poised to become one of the most pervasive surveillance technologies, and law enforcement's use of it is increasing rapidly. However, the adoption of face recognition technologies ...
Fake cell phone 'towers' may be spying on Americans' calls, texts
Munoz, Eduardo
Article
2014
More than a dozen 'fake cell phone towers' could be secretly hijacking Americans' mobile devices in order to listen in on phone calls or snoop on text messages, a security-focused cell phone company c...
For Owners of Amazon’s Ring Security Cameras, Strangers May Have Been Watching Too
Sam Biddle
Article
2019
Amazon's Ring security cameras have a history of lax, sloppy oversight when it comes to deciding who has access to some of the most precious, intimate data belonging to any person: a live, high-defini...
How California police are tracking your biometric data in the field: Agencies are using mobile fingerprint scanners, tattoo and facial recognition software
Brown, J Pat; Maass, Dave
Article
2015
EFF and MuckRock got together to reveal how state and local law enforcement agencies are using mobile biometric technology in the field by filing public records requests around the country. Thousands ...
If U.S. Mass Media Were State-Controlled, Would They Look Any Different?: Snowden Coverage
Cohen, Jeff
Article
2013
The Edward Snowden leaks have revealed a U.S. corporate media system at war with independent journalism. Many of the same outlets that missed the Wall Street meltdown and cheer-led the Iraq invasion h...
Information Overload: Driving a Stake Through the National Security State
Lindorff, Dave
Article
2012
Here’s an idea. Let’s all start salting all of our conversations and our written communications with a selection of those 300 key words. If every liberty-loving person in America virus were to do thi...
Is Lockheed Martin Shadowing You?: How a Giant Weapons Maker Became the New Big Brother
Hartung, William D.
Article
2011
The increasing influence and role of Lockhead Martin, the giant weapons corporation.
Location Tracking: A Pervasive Problem in Modern Technology
Schoen, Seth
Article
2013
NSA is tracking people around the Internet and the physical world. These newly-revealed techniques hijacked personal information that was being transmitted for some commercial purpose, converting it i...
NSA, GCHQ mapping "political alignment" of cellphone users: New report reveals
London, Eric
Article
2014
New information made public by Edward Snowden reveals that the governments of the United States and United Kingdom are trawling data from cellphone “apps” to accumulate dossiers on the “political alig...
NSA's Path to Totalitarianism: Ever-Shrinking Democracy in America
Pollack, Norman
Article
2013
The American National Security Agency (NSA) appears as a “rogue” organization, extremism in the putative service of liberty. Or better, call it, stripped of all cosmetics, the unerring mark of a Polic...
On Locational Privacy, and How to Avoid Losing it Forever
Blumberg, Andrew J.; Eckersley, Peter
Article
2009
Over the next decade, systems which create and store digital records of people's movements through public space will be woven inextricably into the fabric of everyday life. We are already starting to ...
Radio Frequency ID Removes Freedom
Article
2006
Radio Frequency ID violates the Charter of Rights and Freedoms and is part of the stealthy forging of a police state.
Real-Time Face Recognition Threatens to Turn Cops' Body Cameras Into Surveillance Machines
Kofman, Ava
Article
2017
For years, the development of real-time face recognition has been hampered by poor video resolution, the angles of bodies in motion, and limited computing power. But as systems begin to transcend thes...
Rights and Freedoms State Fear The Global attack on rights: New Internationalist March 2005
Serial Publication (Periodical)
2005
A look into rights and freedoms, the connection to occupation, and their state in different parts of the world.
Selling your Secrets: The Invisible World of Software Backdoors and Bounty Hunters
Chatterjee, Pratap
Article
2014
The documents released by whistleblower Edward Snowden reveal that the world of NSA mass surveillance involves close partnerships with a series of companies most of us have never heard of that design ...
The Soft Cage: Surveillance in America from Slavery to the War on Terror
Parenti, Christian; Rossetti, Chip (eds.)
Book
2004
Parenti explores the history of American surveillance from colonial times to the present. What this historical evidence clearly reveals is a continuum of the culture of surveillance. The weakest, most...
Three Leaks, Three Weeks, and What We've Learned About the US Government's Other Spying Authority: Executive Order 12333
Jaycox, Mark M.
Article
2013
The National Security Agency has been siphoning off data from the links between Yahoo and Google data centers, which include the fiber optic connections between company servers at various points aroun...
Vodafone Reveals Existence of Secret Wires that Allow State Surveillance
Garside, Juliette
Article
2014
Wires allow agencies to listen to or record live conversations, in what privacy campaigners are calling a 'nightmare scenario'.
War Against the People: Israel, The Palestinians and Global Pacification
Halper, Jeff
Book
2015
Governments today are waging a 'war against the people' -- whether 'securitization' against asylum seekers in Fortress Europe, 'counterinsurgency' in Afghanisation, or the subliminal war of policy and...

Connexions Directory of Groups & Websites

Corporate Watch
Corporate Watch is a not-for-profit co-operative providing critical information on the social and environmental impacts of corporations and capitalism. Since 1996 our research, journalism, analysis an...

Sources Experts & Spokespersons

Sources Library

The Car of the Future Will Sell Your Data
Coppola, Gabrielle; Welch, David
2018
As "smarter" vehicles provide storehouses of personal information, carmakers are building databases of consumer preferences that could be sold to outside vendors for marketing purposes, much like Goog...
Companies that cooperate with dictatorships must be sanctioned
Sources News Release
2011
Reporters Without Borders condemns the criminal cooperation that exists between many western companies, especially those operating in the new technology area, and authoritarian regimes.
Met police using surveillance system to monitor mobile phones
Gallagher, Ryan; Syal, Rejeev
2011
Civil liberties group raises concerns over Met police purchase of technology to track public handsets over a targeted area.
Obama defiant over NSA revelations ahead of summit with Chinese premier
Ackerman, Spencer; Roberts, Dan
2013
President says oversight of NSA surveillance programme should be left to Congress in comments criticising media 'hype.'
Raleigh police are asking Google to provide user data for all people near crime scenes
2018
Police in Raleigh, North Carolina, have presented Google with warrants to obtain data from mobile phones from not just specific suspects who were in a crime scene area, but from the mobile phones of a...
Software that tracks people on social media created by defence firm
Gallagher, Ryan
2013
Raytheon's Riot program mines social network data like a 'Google for spies', drawing ire from civil rights groups.
The Stasi could only dream of such data
Britain, the birthplace of liberalism, has become the database state
Ash, Timothy Garton
2008
As technology increases the flow of stored data about individual actions, assurances of the "right to informational self-determination" must be hard won from governments. Government surveillance of ci...

From the Connexions Archives

IntelligentSearch.ca
Website
2017
A web portal featuring topics related to research and the Internet. The home page features a selection of recent and important articles. A search feature, subject index, and other research tools make ...