Please note that the content of this book primarily consists of articles available from Wikipedia or other free sources online. Pages: 70. Chapters: Covert listening device, Spy satellite, Steganography, Spyware, Surveillance, Forgery, Smuggling, Double Cross System, Burst transmission, Disinformation, Canary trap, Clandestine HUMINT operational ...Read MorePlease note that the content of this book primarily consists of articles available from Wikipedia or other free sources online. Pages: 70. Chapters: Covert listening device, Spy satellite, Steganography, Spyware, Surveillance, Forgery, Smuggling, Double Cross System, Burst transmission, Disinformation, Canary trap, Clandestine HUMINT operational techniques, Front organization, Secure communication, Mobile phone tracking, USS Jimmy Carter, Backdoor, Concealing objects in a book, Agent provocateur, Rubber-hose cryptanalysis, Technical research ship, Hollow Nickel Case, Infiltration tactics, Thing, Concealment device, USS Liberty, Steganography tools, Secret broadcast, Spy ship, OpenPuff, Dead drop, Black operation, Countersurveillance, Eavesdropping, Black-bag cryptanalysis, Fiber tapping, Black bag operation, Espionage balloon, Bulgarian umbrella, Tradecraft, Postal interception, Exfiltration, The Purloined Letter Approach, Cut-out, One-way voice link. Excerpt: Surveillance ( or ) is the monitoring of the behavior, activities, or other changing information, usually of people. It is sometimes done in a surreptitious manner. It most usually refers to observation of individuals or groups by government organizations, but disease surveillance, for example, is monitoring the progress of a disease in a community. The word surveillance is the French word for "watching over." The word surveillance may be applied to observation from a distance by means of electronic equipment (such as CCTV cameras), or interception of electronically transmitted information (such as Internet traffic or phone calls). It may also refer to simple, relatively no- or low-technology methods such as human intelligence agents and postal interception. Surveillance is very useful to governments and law enforcement to maintain social control, recognize and monitor threats, and prevent/investigate criminal activity. With the advent of programs such as the Total Information Awareness program and ADVISE, ...Read Less
Copyright in bibliographic data and cover images is held by Nielsen Book Services Limited, Baker & Taylor, Inc., or by their respective licensors, or by the publishers, or by their respective licensors. For personal use only. All rights reserved. All rights in images of books or other publications are reserved by the original copyright holders.