ebook img

Understanding Surveillance Technologies: Spy Devices, Privacy, History & Applications (revised and expanded second edition) PDF

1024 Pages·2007·3.35 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Understanding Surveillance Technologies: Spy Devices, Privacy, History & Applications (revised and expanded second edition)

OTHER INFORMATION SECURITY BOOKS FROM AUERBACH Assessing and Managing Security Risk in IT Information Security Management Handbook, Fifth Systems: A Structured Methodology Edition, Volume 2 John McCumber Harold F Tipton; Micki Krause ISBN: 0-8493-2232-4 ISBN: 0-8493-3210-9 Audit and Trace Log Management: Consolidation Information Security Management Handbook, Fifth and Analysis Edition, Volume 3 Phillip Q Maier Harold F Tipton; Micki Krause ISBN: 0-8493-2725-3 ISBN: 0-8493-9561-5 Building and Implementing Security Certification Information Security Policies and Procedures: and Accreditation Program A Practitioner's Reference, Second Edition Patrick D Howard Thomas R Peltier ISBN: 0-8493-2062-3 ISBN: 0-8493-1958-7 The CISO Handbook: A Practical Guide to Securing Information Security Risk Analysis, Second Edition Your Company Thomas R Peltier Michael Gentile; Ronald D Collette; Thomas D August ISBN: 0-8493-3346-6 ISBN: 0-8493-1952-8 Information Technology Control and Audit, The Complete Guide for CPP Examination Second Edition Preparation Frederick Gallegos; Daniel P Manson; James P Muuss; David Rabern Sandra Senft; Carol Gonzales ISBN: 0-8493-2896-9 ISBN: 0-8493-2032-1 Curing the Patch Management Headache Intelligence Support Systems: Technologies Felicia M Nicastro for Lawful Intercepts ISBN: 0-8493-2854-3 Kornel Terplan; Paul Hoffmann ISBN: 0-8493-2855-1 Cyber Crime Investigator's Field Guide, Second Edition Managing an Information Security and Privacy Bruce Middleton Awareness and Training Program ISBN: 0-8493-2768-7 Rebecca Herold ISBN: 0-8493-2963-9 Database and Applications Security: Integrating Information Security and Data Management Network Security Technologies, Second Edition Bhavani Thuraisingham Kwok T Fung ISBN: 0-8493-2224-3 ISBN: 0-8493-3027-0 The Ethical Hack: A Framework for Business Value The Practical Guide to HIPAA Privacy and Penetration Testing Security Compliance James S Tiller Kevin Beaver; Rebecca Herold ISBN: 0-8493-1609-X ISBN: 0-8493-1953-6 Guide to Optimal Operational Risk and Basel II A Practical Guide to Security Assessments Ioannis S Akkizidis; Vivianne Bouchereau Sudhanshu Kairab ISBN: 0-8493-3813-1 ISBN: 0-8493-1706-1 The Hacker's Handbook: The Strategy Behind The Security Risk Assessment Handbook: Breaking into and Defending Networks A Complete Guide for Performing Security Susan Young; Dave Aitel Risk Assessments ISBN: 0-8493-0888-7 Douglas J Landoll ISBN: 0-8493-2998-1 The HIPAA Program Reference Handbook Ross Leo Strategic Information Security ISBN: 0-8493-2211-1 John Wylder ISBN: 0-8493-2041-0 Information Security Architecture: An Integrated Approach to Security in the Organization, Surviving Security: How to Integrate People, Second Edition Process, and Technology, Second Edition Jan Killmeyer Tudor Amanda Andress ISBN: 0-8493-1549-2 ISBN: 0-8493-2042-9 Information Security Fundamentals Wireless Security Handbook Thomas R Peltier; Justin Peltier; John A Blackley Aaron E Earle ISBN: 0-8493-1957-9 ISBN: 0-8493-3378-4 AUERBACH PUBLICATIONS www.auerbach-publications.com To Order Call: 1-800-272-7737 • Fax: 1-800-374-3401 E-mail: [email protected] AU8319_C000a.indd 2 12/4/06 10:11:43 AM Boca Raton New York Auerbach Publications is an imprint of the Taylor & Francis Group, an informa business Auerbach Publications Taylor & Francis Group 6000 Broken Sound Parkway NW, Suite 300 Boca Raton, FL 33487‑2742 © 2007 by Taylor & Francis Group, LLC Auerbach is an imprint of Taylor & Francis Group, an Informa business No claim to original U.S. Government works Printed in the United States of America on acid‑free paper 10 9 8 7 6 5 4 3 2 1 International Standard Book Number‑10: 0‑8493‑8319‑6 (Hardcover) International Standard Book Number‑13: 978‑0‑8493‑8319‑9 (Hardcover) This book contains information obtained from authentic and highly regarded sources. Reprinted material is quoted with permission, and sources are indicated. A wide variety of references are listed. Reasonable efforts have been made to publish reliable data and information, but the author and the publisher cannot assume responsibility for the validity of all materials or for the consequences of their use. No part of this book may be reprinted, reproduced, transmitted, or utilized in any form by any electronic, mechanical, or other means, now known or hereafter invented, including photocopying, microfilming, and recording, or in any informa‑ tion storage or retrieval system, without written permission from the publishers. For permission to photocopy or use material electronically from this work, please access www.copyright.com (http:// www.copyright.com/) or contact the Copyright Clearance Center, Inc. (CCC) 222 Rosewood Drive, Danvers, MA 01923, 978‑750‑8400. CCC is a not‑for‑profit organization that provides licenses and registration for a variety of users. For orga‑ nizations that have been granted a photocopy license by the CCC, a separate system of payment has been arranged. Trademark Notice: Product or corporate names may be trademarks or registered trademarks, and are used only for identification and explanation without intent to infringe. Library of Congress Cataloging‑in‑Publication Data Petersen, Julie K. Understanding surveillance technologies : spy devices, privacy, history & applications / J.K. Petersen. ‑‑ 2nd ed. p. cm. Includes bibliographical references and index. ISBN‑13: 978‑0‑8493‑8319‑9 (alk. paper) ISBN‑10: 0‑8493‑8319‑6 (alk. paper) 1. Electronic surveillance. I. Title. TK7882.E2P48 2007 621.389’28‑‑dc22 2006035040 Visit the Taylor & Francis Web site at http://www.taylorandfrancis.com and the Auerbach Web site at http://www.auerbach‑publications.com C ONTENTS Dedication vii About this Book vii Preface viii Format x About the Author xi To Be Supplied Section 1 ◊ Introduction Chapter 1 - Introduction & Overview 3 Section 2 ◊ Acoustic Surveillance By Chapter 2 - Audio 105 Chapter 3 - Infra/Ultrasound 195 Chapter 4 - Sonar 223 Section 3 ◊ Electromagnetic Surveillance Publisher Chapter 5 - Radio 295 Chapter 6 - Radar 353 Chapter 7 - Infrared 415 Chapter 8 - Visual 469 Chapter 9 - Aerial 559 Chapter 10 - Ultraviolet 613 Chapter 11 - X-Rays 653 Section 4 ◊ Chemical & Biological Surveillance Chapter 12 - Chemical & Biological 683 Chapter 13 - Biometrics 733 Chapter 14 - Animals 767 Chapter 15 - Genetics 801 Section 5 ◊ Miscellaneous Surveillance Chapter 16 - Magnetic 873 Chapter 17 - Cryptologic 907 Chapter 18 - Computers 947 Section 6 ◊ Index Index 981  0Surveil.indd 5 12/7/06 2:31:26 PM i 0Surveil.indd 6 12/7/06 2:31:26 PM D EDICATION This book is dedicated Araminta Ross, who climbed every mountain and used whatever surveillance devices were at her disposal to further the quality of life and well-being of others. May we all make such wise choices. A BOUT THIS BOOK T his was an enormous project. It required several years of research plus more than a year of 60-hour weeks to write, illustrate, and produce the first edition. The second edition, while essentially an update, required equally dedicated commitment because surveillance technologies are changing faster than books can be written. One of the biggest problems encountered by the author while creating this reference was the discovery of fallacies and errors in supposedly reputable texts. While no text can be perfect, no matter how well researched (and much of the information about the inner workings of intelligence agencies is not public knowledge), there is a surprising amount of erroneous infor- mation in supposedly accurate references even about mundane and widely researched subjects related to surveillance. For example, misinformation abounds about the invention and develop- ment of radar. The author encountered many references that unequivocably stated that radar was invented during World War II. As can be seen from the information included in the Radar Surveillance chapter, the concept for radar was discussed in the 1800s, radio-ranging instruments existed by the 1890s and were patented at least by 1904, long before WWII began. In fact, one of the early radar instruments was offered to the Germans for the war effort and rejected. While it is true that radar received priority development and funding during the war, especially in England, it is still important to recognize the developmental steps that led to the technology as we know it today. Similar incorrect information has been written regarding many other important inventions, including the telegraph and the telephone. The author made an extra effort to locate original sources (patent diagrams, oral histories, engineering texts, etc.) to try to sort fiction from fact and has corrected a number of widespread inaccuracies (with references and patent numbers so readers can verify the information for themselves). ii 0Surveil.indd 7 12/7/06 2:31:27 PM Another complication to producing a comprehensive text is the volatile po- litical climate surrounding spies and widespread public use of spy technolo- gies. The destruction of the World Trade Center and the subsequent creation of the department of Homeland Security wrought significant changes in focus and funding and the structure of the U.S. Intelligence Community. Allegations of unwarranted wiretapping by the government and illegal use of surveillance devices by regular citizens have both been much in the news lately. Some of the concerns are justified—criminals have unprecedented tools for committing crimes, but the potential for invasion of privacy and loss of constitutional freedoms stemming from the proliferation of surveil- lance technologies is enormous, as well, and must be considered as much of a priority as national security. It is hoped that this text will help lawmakers, installers, government officials, educators, surveillance users, and journalists better understand surveillance technologies, so they can make proactive decisions to protect health and safety, while still safeguarding our basic freedoms. P REFACE T his book sets the groundwork for understanding surveillance technolo- gies by describing contemporary devices and current legislation in their historical context. These stepping stones will make it easier to understand more specialized texts on radar, sonar, video cameras, satellite imaging, and genetic profiling. This book is suitable as a general reference for a variety of professions and also as a foundation text for post-secondary institutions offering surveil- lance studies courses. Understanding Surveillance Technologies is the first comprehensive, in- troductory overview of the field of surveillance devices, first published in 2000 and remains the only comprehensive text on the subject. It comprises 18 chapters with more than 700 photos and illustrations and is suitable for college surveillance studies in sociology and political science, professional recruiting programs, and as a reference for beginning professionals in the fields of law enforcement, forensics, and military surveillance. It is also an indispensable reference for journalists, lawmakers, and community plan- ners. It has been designed with a flexible, modular format so the chapters can be read in almost any order (chapters that share common topics are cross-referenced to alert the reader). We are all being surveilled. It is no longer possible to avoid cameras, DNA iii 0Surveil.indd 8 12/7/06 2:31:27 PM tests, identity chips, border crossing cameras, highway monitors, ATMs, and other devices that record our movements, finances, and even our health. Many people don’t realize that their activities are cataloged and stored in a multitude of data- bases, many of which are accessible on the Internet without the surveillee’s knowl- edge or permission. Here are examples that illustrate this unsettling trend: • Detailed information about people who have never logged onto the Net nor even used a computer is available to anyone with an Internet connec- tion. Even ages and occupations are freely distributed by commercial sites and it is possible to acquire the names, addresses, and phone numbers, ages, and occupations of a person’s neighbors quite easily, as well, which provides the data to create a composite picture of a neighborhood’s social and economic characteristics. This book provides a better understanding of who is collecting this information, how they are doing it, and what they are doing with the data once they have it. • Some hospitals now routinely take DNA samples of newborn babies. Similarly, the U.S. armed forces require submission of a DNA sample from new service members. This book explains the background and origins of DNA matching and possible social consequences of its use. In many instances, your DNA can reveal your gender, race, medical tendencies, and physical characteristics. • Semi-nude and nude photos of unwary victims are sold on the Internet without the knowledge or permission of the surveillee. How is this pos- sible? This book explains how these technologies work and why bootleg images may not be illegal. It further describes the ethical and social consequences of new forms of exploitation. • Gaming centers, hotels, and trade shows use magnetic access cards to keep track of their guests. In casinos they can tell how often patrons play, how much they spend, and how frequently they visit the establishment. Even universities issue student cards that double as access cards. They allow access to vending machines, copy machines, and various retail services on campus. In some instances, this information is stored in sophisticated databases. This text describes a variety of user access and property surveillance technologies that provide travel suppliers, casinos, hotels, and retail outlets with detailed information on their patrons. • Law enforcement agencies are consolidating their forensic and criminal databases and providing Internet access to authorized personnel from any part of the country. This provides new ways to solve serial murders and to catch felons who move from state to state, but it also makes a criminal less distinguishable from a law-abiding citizen because of the way databases are designed and used to store general information on ix 0Surveil.indd 9 12/7/06 2:31:28 PM

Description:
Understanding Surveillance Technologies demystifies spy devices and describes how technology is used to observe and record intimate details of people’s lives—often without their knowledge or consent. From historical origins to current applications, it explains how satellites, pinhole cameras, ce
See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.