SURVEILLANCE MONITORING BEHAVIOR CHANGING PEOPLE FOR PURPOSE OBSERVATION FROM A DISTANCE MEANS ELECTRONIC EQUIPMENT CCTV CAMERAS INTERCEPTION ELECTRONICALLY INFORMATION INTERNET TRAFFIC PHONE CALLS HUMAN INTELLIGENCE AGENTS POSTAL INTERCEPTION THE WORD COMES FRENCH PHRASE WATCHING FROM ABOVE WATCH CONTRAST RECENT SOUSVEILLANCE GOVERNMENTS INTELLIGENCE PREVENTION OF CRIME THE PROTECTION GROUP THE INVESTIGATION CRIMINAL ORGANIZATIONS PLAN COMMIT CRIMES ROBBERY GATHER PRIVATE INVESTIGATOR VIOLATION OF PRIVACY CIVIL LIBERTIES LIBERAL DEMOCRACIES LAWS DOMESTIC GOVERNMENT PRIVATE USE LIMITING CIRCUMSTANCES PUBLIC SAFETY AT RISK INTERNATIONAL ESPIONAGE COMMON VAST MAJORITY COMPUTER SURVEILLANCE DATA TRAFFIC THE INTERNET THE UNITED STATES COMMUNICATIONS ASSISTANCE FOR LAW ENFORCEMENT ACT BROADBAND INTERNET WEB TRAFFIC INSTANT MESSAGING AVAILABLE FEDERAL LAW ENFORCEMENT TOO MUCH HUMAN SEARCH AUTOMATED INTERNET SURVEILLANCE COMPUTERS SIFT AMOUNT INTERCEPTED REPORT INTERESTING CERTAIN TRIGGER WORDS COMMUNICATING EMAIL CHAT INDIVIDUALS DOLLARS THE INFORMATION AWARENESS OFFICE THE FBI OPERATE SYSTEMS CARNIVORE NARUSINSIGHT ECHELON INTERCEPT ANALYZE ALL OF THIS EXTRACT USEFUL TARGET PERSONAL DATA SOMEONE ABLE INSTALL MAGIC LANTERN CIPAV COMPUTER GAIN ACCESS SOFTWARE PHYSICALLY VAN ECK PHREAKING READING ELECTROMAGNETIC EMANATIONS COMPUTING ORDER HUNDREDS RUNS DATABASE PINWALE STORES LARGE NUMBERS EMAILS AMERICAN CITIZENS UNOFFICIAL TAPPING TELEPHONE LINES TELEPHONE VOIP COMMUNICATIONS FOR REAL WIRETAPPING MAJOR TELECOMMUNICATIONS COMPANIES THE AT VERIZON CONTRACTS KEEP PHONE CALL ACCESSIBLE FEDERAL IN RETURN SENT NATIONAL SECURITY LETTER ORDERING PHONE COMPANIES HAND OVER CUSTOMERS CALLING INTERNET HALF LETTERS MONITOR CREATES TEXT DEVELOPED VERINT NARUS DECIDE WHETHER DEDICATE AGENT INTELLIGENCE SERVICES IN THE UNITED KINGDOM TECHNOLOGY ACTIVATE THE MICROPHONES CELL PHONES PHONES DIAGNOSTIC MAINTENANCE FEATURES LISTEN CONVERSATIONS PERSON HOLDS MOBILE PHONES USED TO COLLECT LOCATION GEOGRAPHICAL LOCATION MOBILE PHONE THUS CARRYING DETERMINED THE PHONE NOT BEING TECHNIQUE MULTILATERATION DIFFERENCES IN TIME SIGNAL TRAVEL THE CELL TO EACH CELL TOWERS THE OWNER LEGALITY TECHNIQUES THE UNITED PARTICULAR COURT WARRANT CARRIER ALONE CUSTOMER IN RESPONSE PRIVACY THE POST EDWARD SNOWDEN IPHONE DISRUPT PHOTOS CODE COMPLEX MATHEMATICAL ALGORITHM UNIQUE INACCESSIBLE ENCRYPTION FEATURE DRAWN CRITICISM FBI DIRECTOR JAMES COMEY OFFICIALS REQUESTS USER CONTENT APPLE GIBBERISH LAW ENFORCEMENT PERSONNEL BREAK THE CODE THEMSELVES SNOWDEN AMERICAN ANYWHERE IN THE WORLD MARKETS SMART PHONES INTENSIFIED STRONG INCENTIVE ADDRESS POSITION GLOBAL MARKET CALEA TELECOMMUNICATION COMPANIES BUILD ABILITY CARRY OUT THE LAW ISSUE METADATA SHOW TAKING ADVANTAGE AMBIGUITY COLLECTING MILLIONS TARGETS USES ANALYTIC TOOL TRACK PEOPLE WHOSE MOVEMENTS INTERSECT FIND HIDDEN CONNECTIONS PERSONS OF INTEREST REVEALED THE BRITISH GOVERNMENT HEADQUARTERS COLLECTED ONCE GCHQ HOLD ON UP TO DEADLINE PERMISSION SENIOR SURVEILLANCE CAMERAS VIDEO CAMERAS OBSERVING CONNECTED RECORDING DEVICE IP NETWORK SECURITY GUARD LAW ENFORCEMENT OFFICER CAMERAS EQUIPMENT USED TO BE PERSONNEL CAMERA FOOTAGE ANALYSIS EASIER AUTOMATED SOFTWARE ORGANIZES DIGITAL VIDEO VIDEO ANALYSIS VIRAT HUMANID REDUCED MOTION SENSORS RECORD DETECTED PRODUCTION SIMPLE INEXPENSIVE ENOUGH HOME SECURITY SYSTEMS EVERYDAY THE DEPARTMENT OF HOMELAND SECURITY AWARDS HOMELAND SECURITY GRANTS MODERN VIDEO SURVEILLANCE THE CITY OF CHICAGO RECENTLY HOMELAND SECURITY GRANT CONNECT CENTRALIZED NETWORK PROGRAM OPERATION VIRTUAL SHIELD SPEAKING CHICAGO MAYOR RICHARD DALEY ANNOUNCED CHICAGO SURVEILLANCE CAMERA ON EVERY STREET CORNER THE YEAR GOVERNMENT BODIES PRIVATE INTERIORS SHOPS FREEDOM OF INFORMATION ACT TOTAL NUMBER LOCAL GOVERNMENT PREVALENCE THE UK ESTIMATES EXAMPLE VERY SMALL SAMPLE ESTIMATE GREATER LONDON DISTRICTS ILLEGAL ACTIVITY DISTRICT CHINAS GOLDEN SHIELD PROJECT IBM GENERAL ELECTRIC HONEYWELL THE CHINESE CHINA ADVANCED VIDEO ANALYTICS FACIAL RECOGNITION SOFTWARE WHICH WILL CENTRALIZED DATABASE COMPLETION PICTURE THE FACE BILLION LIN JIANG THE HEAD INFORMATION SECURITY IN CHARGE CREDITS THE INSPIRATION FOR WHAT THE DEFENSE ADVANCED RESEARCH PROJECTS AGENCY FUNDING RESEARCH PROJECT COMBAT ZONES THAT SEE LINK UP VEHICLES MOVE LOOKING STANDING SUPER BOWL XXXV POLICE SCAN CROWD POTENTIAL CRIMINALS ATTENDANCE THE EVENT PENDING ARREST CLAIM TRAFFIC CONTROL END UP GENERAL TRAFFIC CAMERAS ALL IN NETWORKED ALL TOGETHER METROPOLITAN POLICE DEPARTMENT PERFORM DEVELOPMENT OF AREAS COMPUTER DATABASES PEOPLES PICTURES IDENTITY BIOMETRIC DATA WHOM PRESENT RISK TRAPWIRE CREATE MAPS SOCIAL NETWORKS SOCIAL NETWORKING SITES FACEBOOK MYSPACE TWITTER TRAFFIC ANALYSIS NSA CALL DATABASE SOCIAL NETWORK MINED PERSONAL FRIENDSHIPS GOVERNMENT AGENCIES THE NATIONAL SECURITY AGENCY INVESTING SOCIAL NETWORK ANALYSIS THE INTELLIGENCE COMMUNITY THREAT POWER GEOGRAPHICALLY DISPERSED SUBVERSIVES EXTREMISTS THREATS FINDING NODES TO DO J