Understanding Surveillance Technologies demystifies spy devices and describes how technology is used to observe and record intimate details of peopleas livesaoften without their knowledge or consent. From historical origins to current applications, it explains how satellites, pinhole cameras, cell phone and credit card logs, DNA kits, tiny microphones (abugsa), chemical sniffers, and implanted RF/ID chips have enabled us to create a two-edged swordadevices that promise security while, at the same time, eroding our privacy. Understanding Surveillance Technologies is profusely illustrated with extensive references and indexes, laying the groundwork for more specialized texts on specific technologies. It covers each of the major sensing devices and explains how they are used in civilian, criminal justice, scientific, national security, and military applications. It also includes recent changes in legislation and the organization of the intelligence community, and discusses how equal access to high-tech sensing devices and encryption schemes has changed society. Understanding Surveillance Technologies is modular, so the chapters can be read in any order, and is written in an accessible, somewhat narrative style, to suit the needs of journalists/newscasters, privacy organizations, educators, civic planners, and technology centers. It is appropriate as an adjunct reference for criminal justice/law enforcement/military, and forensic trainees, and as a textbook for courses in Surveillance Studies, Sociology, Communications, and Political Science. Now in its second edition, with 1, 000 pages and more than 700 diagrams, it is still the only text that comprehensively conveys the breadth of the field.(and then make the mistake of hiring a questionable caddy or renting a bugged golf cart). Sometimes metal-detecting wands and physical a#39;pat-downa#39; searches are used to see if someone is a#39;wearing a wirea#39; when entering a premises or the ... They are useful, however, in noncovert surveillance in which radio waves are not an option (perhaps because of interference) and a clear line of sight is available.
|Title||:||Understanding Surveillance Technologies|
|Publisher||:||CRC Press - 2007-02-05|