This HTML5 document contains 57 embedded RDF statements represented using HTML+Microdata notation.

The embedded RDF content will be recognized by any processor of HTML5 Microdata.

Namespace Prefixes

PrefixIRI
dctermshttp://purl.org/dc/terms/
dbohttp://dbpedia.org/ontology/
foafhttp://xmlns.com/foaf/0.1/
n5https://www.scientificamerican.com/article/digital-surveillance-tools-of-the-spy-trade/
n11https://www.europarl.europa.eu/thinktank/en/
n16https://global.dbpedia.org/id/
dbthttp://dbpedia.org/resource/Template:
rdfshttp://www.w3.org/2000/01/rdf-schema#
rdfhttp://www.w3.org/1999/02/22-rdf-syntax-ns#
owlhttp://www.w3.org/2002/07/owl#
wikipedia-enhttp://en.wikipedia.org/wiki/
dbphttp://dbpedia.org/property/
dbchttp://dbpedia.org/resource/Category:
provhttp://www.w3.org/ns/prov#
xsdhhttp://www.w3.org/2001/XMLSchema#
n12https://www.statewatch.org/media/documents/news/2015/jan/
wikidatahttp://www.wikidata.org/entity/
dbrhttp://dbpedia.org/resource/

Statements

Subject Item
dbr:Surveillance_tools
rdfs:label
Surveillance tools
rdfs:comment
Surveillance tools are all means technological provided and used by the surveillance industry, police or military intelligence, and national security institutions that enable individual surveillance and mass surveillance.Steven Ashley in 2008 listed the following components used for surveillance:
dcterms:subject
dbc:Mass_surveillance dbc:Mass_surveillance_industry
dbo:wikiPageID
23817615
dbo:wikiPageRevisionID
1000348727
dbo:wikiPageWikiLink
dbr:CCTV dbr:Digital_forensics dbr:Cell_phone_monitoring dbr:Personal_information dbr:List_of_government_mass_surveillance_projects dbr:National_security dbr:National_Applications_Office dbr:Tracking_system dbr:End-to-end_encryption dbr:Artificial_nose dbc:Mass_surveillance dbr:Computer_surveillance dbr:Night-vision_goggles dbr:Surveillance_Detection_Unit dbr:Police_intelligence dbr:Biometric dbr:Speaker_recognition dbr:Internet_of_things dbr:Phone_tapping dbr:Surveillance_industry dbr:Biochip dbr:Directional_microphone dbr:Global_surveillance_disclosures_(2013–present) dbr:Anonymization dbr:Unmanned_aerial_vehicles dbr:Surveillance dbr:GPS dbr:Ubiquitous_computing dbr:UV_marker dbc:Mass_surveillance_industry dbr:Artificial_intelligence dbr:Telescope dbr:Mass_surveillance dbr:Covert_listening_device dbr:Countersurveillance dbr:Electronic_toll dbr:Military_intelligence dbr:Gait_analysis
dbo:wikiPageExternalLink
n5: n11:document.html%3Freference=EPRS_STU(2015)527409%7Ctitle=Mass n12:ep-stoa-report-mass-surveillance-part-1.pdf
owl:sameAs
n16:FP5bQ wikidata:Q105038047
dbp:wikiPageUsesTemplate
dbt:Sfnref dbt:Reflist dbt:Cite_web dbt:Sfn
dbo:abstract
Surveillance tools are all means technological provided and used by the surveillance industry, police or military intelligence, and national security institutions that enable individual surveillance and mass surveillance.Steven Ashley in 2008 listed the following components used for surveillance: * Primarily electronic * Digital still and video cameras (CCTVs) * GPSs for tracking * Electronic toll takers * Computer surveillance * Phone tapping * Cell phone monitoring * Voice, facial features, walking gait and other biometric characteristics * Covert listening devices or "bugs", tiny, hidden microphone and short-range radio transmitter * directional microphones * primarily chemical * Artificial noses * Chemical markers like UV markers * DNA sensors: Biochip etc., for screening tiniest traces of body material * Other * Airplanes, unmanned aerial vehicles and satellites * Night-vision goggles or telescopes * Laser beam bounced off a window to record vibrations in the pane from conversations in the room * Discarded items containing personal information, like * phone bills, * credit-card statements and * computer hard drives (using digital forensics) The electronic means, especially when combined with Internet features (ubiquitous computing, IoT) and enhanced by artificial intelligence analysis methods readily lend themselves to mass surveillance. This is why countersurveillance measures like anonymization and end-to-end encryption have become critical. Devices like chemical markers, on the other hand are more suited and in fact designed mainly for monitoring individuals.
prov:wasDerivedFrom
wikipedia-en:Surveillance_tools?oldid=1000348727&ns=0
dbo:wikiPageLength
2961
foaf:isPrimaryTopicOf
wikipedia-en:Surveillance_tools