1 / 11

Surveillance

Surveillance. For IB-1 ITGS By Indrani. Surveillance is the use of IT to monitor the actions of people.

Download Presentation

Surveillance

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Surveillance For IB-1 ITGS By Indrani

  2. Surveillance is the use of IT to monitor the actions of people. • For example, monitoring may be used to track, record and assess employees’ performance. It can be used to support claims for promotion or to ensure that employees follow the organization’s internet policy appropriately.

  3. The word surveillance may be applied to observation from a distance by means of electronic equipment (such as CCTV cameras), or interception of electronically transmitted information (such as Internet traffic or phone calls). It may also refer to simple, relatively no- or low-technology methods such as human intelligence agents and postal interference.

  4. Computer Surveillance • The vast majority of computer surveillance involves the monitoring of data and traffic on the internet. In the United States for example, under the Communications Assistance For Law Enforcement Act, all phone calls and broadband Internet traffic (emails, web traffic, instant messaging, etc.) are required to be available for unimpeded real-time monitoring by Federal law enforcement agencies.

  5. Telephones and mobile phones •  The official and unofficial tapping of telephone lines is widespread. In the US for instance, the Communications Assistance For Law Enforcement Act (CALEA) requires that all telephone and VoIP communications be available for real-time wiretapping by Federal law enforcement and intelligence agencies.

  6. Surveillance Cameras •  Surveillance cameras are video cameras used for the purpose of observing an area. They are often connected to a recording device, IP network, and/or watched by a security guard/law enforcement officer.

  7. Social Network Analysis  One common form of surveillance is to create maps of social network based on data from social network sites such as Facebook, MySpace, Twitter as well as from traffic analysis information from phone call records such as those in the NSA call database__,__ and others. These social network"maps" are then data mined to extract useful information such as personal interests, friendships & affiliations, wants, beliefs, thoughts, and activities.

  8. Biometric Surveillance •  Biometric surveillance refers to technologies that measure and analyze human physical and/or behavioral characteristics for authentication, identification, or screening purpose. Examples of physical characteristics include fingerprints, DNA, and facial patterns.

  9. Aerial Surveillance  Aerial surveillance is the gathering of surveillance, usually visual imagery or video, from an airborne vehicle—such as a unmanned aerial vehicle, helicopter, or spy plane. Military surveillance aircraft use a range of sensors (e.g. radar) to monitor the battlefield.

  10. Surveillance devices • "Bugs" - Surveillance devices, or "bugs", are hidden electronic devices which are used to capture, record, and/or transmit data to a receiving party such as a law enforcement agency.

  11. Extra read • e-surveillance-policy-of-india http://www.electroniccourts.in/blog/?p=157 • http://www.youtube.com/watch?feature=player_embedded&v=QtVApThODL0#t=0s

More Related