logo
 
 
Member login
Name :
Password :
forgot your password?
info at touch gamesinfo at touch foodsinfo at touch loansinfo at touch moviesinfo at touch travelsinfo at touch jobsinfo at touch cricketinfo at touch mobileinfo at touch newsinfo at touch sendfreesms
SELECT YOUR SERVICE
  Suppliers Directory
  Accounting & Financial Auditing
  Anti-Aging
  Apparel & Garments
  Arts & Crafts
  ATM Sales & Processing
  Auto Towing Services
  Automobile
  Ayurvedic & Herbal Products
  Baby Care
  Banking
  Bicycles & Rickshaws
  Building & Construction
  Business Banking & Finance
  Car Audio
  Car Video
  Cards & Greetings
  Clothing Accessories
  Computer
  Computer Accessories
  Computer Hardware
  Computer Software
  Credit & Lending
  Dyes & Chemicals
  Electronics & Electrical
  Face Care
  Fashion Accessories
  Flower Arrangements
  Food & Beverages
  Footwear
  Furniture Manufacturers
  Gems & Jewelry
  Gifts
  GPS
  Hair Care
  Hair Loss
  Hand & Machine Tools
  Health Care Services
  Holiday Decorations
  Home & Garden
  Home Audio & Video
  Home Supplies
  Home Textiles & Furnishings
  Household Supplies
  Hygiene & Toiletry
  Industrial Supplies
  Insurance
  Investing
  Jewelry
  Leather Products
  Make-Up & Cosmetics
  Mechanical Components
  Medical Products
  Metals & Minerals
  Musical Instruments
  Nail Care
  Natural Stones
  Nutrition & Dieting
  Office & School Supplies
  Oral Care
  Packaging Supplies
  Paper & Paper Products
  Party Supplies
  Perfumes & Fragrances
  Phone Equipment
  Photo & Video
  Plant & Machinery
  Plastic & Plastic Products
  Portable Media Devices
  Printing & Publishing
  Roadside Assistance Services
  Scholarships & Financial Aid
  Shaving & Grooming
  Skin Care
  Spa & Medical Spa
  Sports & Fitness Apparel
  Stationery
  Surveillance Equipment
  Traning & Sun Care
  Wedding Products & Supplies
  Wireless Devices
   
SURVEILLANCE EQUIPMENT

Surveillance (pronounced /sərˈveɪ.əns/ or /sərˈveɪləns/[1]) is the monitoring of the behavior, activities, or other changing information, usually of people and often in a surreptitious manner. It most usually refers to observation of individuals or groups by government organizations, but disease surveillance, for example, is monitoring the progress of a disease in a community.

The word surveillance is the French word for "watching over".

The word surveillance may be applied to observation from a distance by means of electronic equipment (such as CCTV cameras), or interception of electronically transmitted information (such as Internet traffic or phone calls). It may also refer to simple, relatively no- or low-technology methods such as human intelligence agents and postal interception.

Surveillance is very useful to governments and law enforcement to maintain social control, recognize and monitor threats, and prevent/investigate criminal activity. With the advent of programs such as the Total Information Awareness program and ADVISE, technologies such as high speed surveillance computers and biometrics software, and laws such as the Communications Assistance For Law Enforcement Act, governments now possess an unprecedented ability to monitor the activities of their subjects.[2]

However, many civil rights and privacy groups such as the Electronic Frontier Foundation and ACLU have expressed concern that by allowing continual increases in government surveillance of citizens that we will end up in a mass surveillance society, with extremely limited, or non-existent political and/or personal freedoms. Fears such as this have led to numerous lawsuits such as Hepting v. AT&T.[2][3]

The vast majority of computer surveillance involves the monitoring of data and traffic on the Internet.[4] In the United States for example, under the Communications Assistance For Law Enforcement Act, all phone calls and broadband Internet traffic (emails, web traffic, instant messaging, etc.) are required to be available for unimpeded real-time monitoring by Federal law enforcement agencies.

There is far too much data on the Internet for human investigators to manually search through all of it. So automated Internet surveillance computers sift through the vast amount of intercepted Internet traffic and identify and report to human investigators traffic considered interesting by using certain "trigger" words or phrases, visiting certain types of web sites, or communicating via email or chat with suspicious individuals or groups.[8] Billions of dollars per year are spent, by agencies such as the Information Awareness Office, NSA, and the FBI, to develop, purchase, implement, and operate systems such as Carnivore, NarusInsight, and ECHELON to intercept and analyze all of this data, and extract only the information which is useful to law enforcement and intelligence agencies.[9]

Computers are also a surveillance target because of the personal data stored on them. If someone is able to install software (either physically or remotely), such as the FBI's "Magic Lantern" and CIPAV, on a computer system, they can easily gain unauthorized access to this data.

Another form of computer surveillance, known as TEMPEST, involves reading electromagnetic emanations from computing devices in order to extract data from them at distances of hundreds of meters.

The NSA also runs a database known as "Pinwale", which stores and indexes large numbers of emails of both American citizens and foreigners.

 

 

 
 
 
 
 
 
             
 
             
 
             
 
 
 
  Hot Category Emergency Services
Social Media Links
Country We Serve Relevant Links
  youtube.com
twitter.com
flickr.com
digg.com
stumbleupon.com
metacafe.com
scribd.com
reddit.com
del.icio.us
segnalo.com
blogcatalog.com
technorati.com
mixx.com
mister-wong.de
slashdot.org

rojo.com
kaboodle.com
gather.com
folkd.com
India
Australia
Austria
Belgium
Brazil
Canada
China
Denmark
Finland
France
Germany
Hong Kong
Italy
South Africa
Srilanka
Egypt
Croatia
Venezuela
Viet Nam
  © Copyright 2015-16, Info at Touch All Right Reserved.