Tuesday, March 14, 2017

Reference list

8 Ways The NSA is Spying on You Right Now | ExpressVPN. (n.d.). Retrieved March 15, 2017, from https://www.expressvpn.com/internet-privacy/guides/nsa-spying/


(n.d.). Retrieved March 15, 2017, from http://edition.cnn.com/2006/TECH/07/10/rfid/


AERIAL SURVEILLANCE SYSTEMS. (n.d.). Retrieved March 15, 2017, from http://www.vigilance.nl/aerial-surveillance-systems.html

Aerial Surveillance & Monitoring, observation with UAV / drone. (n.d.). Retrieved March 15, 2017, from https://www.microdrones.com/en/applications/areas-of-application/monitoring/

Bond, A. (2012, October 03). Powerful CCTV cameras which can track faces from more than half a mile away 'could breach human rights laws' Retrieved March 15, 2017, from http://www.dailymail.co.uk/news/article-2212051/Powerful-CCTV-cameras-track-faces-half-mile-away-breach-human-rights-laws.html

Dan Goodin - Oct 28, 2015 12:59 pm UTC, Old_Fogie_Late_BloomerArs Scholae Palatinae jump to post, & Synergy WaffleSmack-Fu Master, in training jump to post. (2015, October 28). Low-cost IMSI catcher for 4G/LTE networks tracks phones’ precise locations. Retrieved March 15, 2017, from https://arstechnica.com/security/2015/10/low-cost-imsi-catcher-for-4glte-networks-track-phones-precise-locations/

Drones: What are they and how do they work? (2012, January 31). Retrieved March 15, 2017, from http://www.bbc.com/news/world-south-asia-10713898

Dunbar, B. (2015, June 16). What Is a Satellite? Retrieved March 15, 2017, from https://www.nasa.gov/audience/forstudents/5-8/features/nasa-knows/what-is-a-satellite-58.html


Evans, R., Cobain, I., & Slawson, N. (2017, February 12). Retrieved March 15, 2017, from https://www.theguardian.com/uk-news/2017/feb/12/uk-government-accused-full-frontal-attack-prison-whistleblowers-media-journalists


Hastings, R. (2012, October 02). New HD CCTV puts human rights at risk. Retrieved March 15, 2017, from http://www.independent.co.uk/news/uk/crime/new-hd-cctv-puts-human-rights-at-risk-8194844.html

Intelligence, Surveillance and Reconnaissance (ISR). (n.d.). Retrieved March 15, 2017, from http://www.aerialsurveillancesystems.com/

J. (2015, August 12). The disadvantages of government surveillance. Retrieved March 15, 2017, from https://james850105.wordpress.com/2015/08/12/the-disadvantages-of-government-surveillance/

Keychain Voice Recorder. (n.d.). Retrieved March 15, 2017, from https://www.spygadgets.com/keychain-voice-recorder/

Khandelwal, S. (2016, November 04). Wi-Fi can be turned into IMSI Catcher to Track Cell Phone Users Everywhere. Retrieved March 15, 2017, from http://thehackernews.com/2016/11/imsi-track-cellphone.html

Kishore, A. (2014, August 26). How to Detect Computer & Email Monitoring or Spying Software. Retrieved March 15, 2017, from http://www.online-tech-tips.com/computer-tips/how-to-detect-computer-email-monitoring- or-spying-software/


Ionescu, D. (2010, July 22). 12 Top Spy Gadgets. Retrieved March 15, 2017, from http://www.pcworld.com/article/201703 /Spy_Gear_for_Your_Inner_Evelyn_Salt_and_James_Bond.html

Smith, M. (2010, July 27). The Next Big Privacy Concern: RFID. Retrieved March 15, 2017, from http://www.networkworld.com/article/2231436/microsoft-subnet/the-next-big-privacy-concern--rfid--spychips-.html

Spicer: Trump didn't mean wiretapping when he tweeted about wiretapping. (n.d.). Retrieved March 15, 2017, from http://edition.cnn.com/2017/03/13/politics/sean-spicer-donald-trump-wiretapping/

Steinberg, J. (2014, July 08). These Devices May Be Spying On You (Even In Your Own Home). Retrieved March 15, 2017, from https://www.forbes.com/sites/josephsteinberg/2014/01/27/these-devices-may-be-spying-on-you-even-in-your-own-home/#7fcc0a3b859c

Surveillance. (n.d.). Retrieved March 15, 2017, from https://www.biometricupdate.com/biometric-news/surveillance-biometric-articles

Surveillance Issues. (n.d.). Retrieved March 15, 2017, from http://www.surveillanceissues.com/

T. (2017, January 19). Trump's Homeland Security Team Likely to Emphasize Facial Recognition and Biometric Surveillance. Retrieved March 15, 2017, from https://theintercept.com/2017/01/19/trump-dhs-surveillance/

Top Categories. (n.d.). Retrieved March 15, 2017, from http://www.spytecinc.com/gps-satellite-tracking.html

Tracking Systems. (n.d.). Retrieved March 15, 2017, from https://www.liveviewgps.com/

Understanding the Benefits of Security and Surveillance. (2016, August 09). Retrieved March 15, 2017, from https://pro-vigil.com/2016/05/04/understanding-the-benefits-of-security-and-surveillance/

V. (2016, June 08). Retrieved March 15, 2017, from https://www.youtube.com/watch?v=ucRWyGKBVzo

Woods, B., & McCarthy, C. (2016, August 24). Baltimore police confirms aerial surveillance of city residents. Retrieved March 15, 2017, from https://www.theguardian.com/us-news/2016/aug/24/baltimore-police-aerial-surveillance-cameras

Writer, L. G. (2012, July 08). Computer Surveillance Techniques. Retrieved March 15, 2017, from http://smallbusiness.chron.com/computer-surveillance-techniques-50593.html

Zetter, K. (2010, October 07). Caught Spying on Student, FBI Demands GPS Tracker Back. Retrieved March 15, 2017, from https://www.wired.com/2010/10/fbi-tracking-device/








The Disadvantages Of Public surveillance

Last I have discussed about the advantages of public surveillance. Like I have promised, in this entry I will discuss about the disadvantages of public surveillance. What does the government take away from its citizens to reach goals to increase safety? It could costs us our privacy or freedom. Due to reduce the rate of crime, the government should increase the control of its citizens. With the development of technology, the government may obtain too much power, so sometimes it may ignore something which are also important rights for people.

 Disadvantages of government surveillance : 

1) It invades privacy - Most people are paranoid of the fact that they are being watched and that they might have lose their freedom of privacy of life.

2) government may have too much power to control its citizens’ lives - The government will have a great facility to do surveillance on their people. Even when the leader are using it with good intention, what happens when there are changes of leaders and their cabinet and the new leader decided to use the convenience of surveillance for his bad intentions.

3) Using our images for the wrong reason - People might use some of the images obtained from surveillance cameras for blackmailing or for their own personal gain in some way instead of using the surveillance cameras for catching people committing crimes

4) Mistakes - Technologies like Cameras and computers can also make mistakes for example speed cameras on occasions are known to exaggerate the speed a car is going and give it a ticket when it was actually driving the regular speed.

In a nutshell, it is actually depends on the government and its people to decide which is the best. I can understand that we have the potential to establish a safer with government surveillance. However, governments should try not to reduce citizens’ rights of freedom and privacy. The government should respect these but not ignore them to achieve the goals.
 

The Advantages Of Public surveillance

This topic is absolutely very controversial, there are always debates between conservatives who prefer public surveillance and liberals who oppose it. In this entry, i will discuss about the advantages of public surveillance and then disadvantages for the next entry. According to surveys, deterrence is still the primary objective of public surveillance.


Advantages of public surveillance :

1) Preventing crimes
Those who plan conduct a heist will always considers the risk of being detected through surveillance effort. Even more, they would be scared to execute their crime scheme.
Would-be criminals perceive a greater risk of being caught if they know they are being watched. Like an old saying, prevention is better than cure.

2) Law-abiding citizens perceive an enhanced sense of safety where surveillance systems exist. 
People will feel more confident to go out for work on daily basis rather that keep thinking of being bombarded while drinking coffee in Starbucks. 

3) Surveillance systems are thought to enhance the efficiency of criminal justice jurisdictions 
    that implement them.
With surveillance technologies, more and more evidence can be collected thus reducing the 
possibility of charging the wrong person as guilty. Recorded footage documenting criminal activity
increasing police and prosecutorial efficiency to the benefit of crime victims.

4)  Cost On Police Force :
Budget can also being cut  when these surveillance technology is doing the job that really replace the old method that may csots more. For expmple, authorities do not need to spend large amounts of money on police with surveillance cameras.

5)  Environmental Monitoring 
During seasons when weather patterns are unpredictable, people with different kind of jobs can plan ahead to make sure that thay wont be affected by natural disaster. 

So these are some of the most-interesting discussion regarding advantages of surveillance . The fact is, the advantages of surveillance technology can be applied in an unlimited number of ways. Stay tuned for my next entry that will be discussing about disadvantages of public surveillance.

Home Devices That Can Be Turned To Watch Over You (Shocking Discovery)

Hi i am back with more topic to be discussed for my entry. This entry i will give you a shocking facts that might blow your mind. It is about how your devices at home can be used to spy on you. You must be wondering how is that even possible? In this era of technology, this kind of thing is not very hard to execute at all.

Here are the devices  That Can Be Turned To Watch Over You :

1)  Your Television
 It has been reported that a particular TV brand company were found to spy on not only what channels were being watched, but even transmitted back to LG the names of files on USB drives connected to the television. It is alos for hackers nowadays to hack some models of Samsung TVs and use them as vehicles to capture data from networks to which they are attached, and even watch whatever the cameras built in to the televisions see.

2) Your Kitchen Appliances

Modern kitchen nowadays are starting to be equipped with connectivity that allows for great convenience. However, this convenience makes it vulnerable to the potential of spying and security risks. Information about when you wake up in the morning (as extrapolated from data on your Internet-connected coffee maker) and your shopping habits (as determined by information garnered from your smart fridge) can help robbers target your home.

3) Your Modem (and Internet Service Provider)
 Like i said before, If government agencies can dedicate money, people and effort to hack into something, they can do it. In this case, your ISP could easily compile a list of Internet sites with which you have communicated if the government demanded them to do so. Even without the help of the ISP, they could even hacked in themselves. Worse yet, since people often subscribe to Internet service from the same providers as they do television service, a single party may know a lot more about you then you might think.

4)  Your Webcam or Home Security Cameras
 An ex-intelligence officer who himself a networking expert, told the public that even the webcam in your PCs and laptop can be turned on by third parties. A malware is installed on your computer to take control of the webcam and record you by taking photos or video unaware.

5)  YourEntertainment Devices other than phones

As an example, an iPod are often Wi-Fi enabled and pose similar to risks to smartphones as discussed above. Of course if you are reading books or magazines, watching videos, or listening to audio supplied by an online provider, your choices and preferences are likely being tracked.

6)  Last but not least! Your Smartphone

Your ISP have your info, Google have some of your info for android users and Apple also can have your info if you use an iPhone. Some apps sync your contacts list to the providers’ servers by default, and others have been found to ignore privacy settings. Phones may even be capturing pictures or video of you when you do not realize and sending the photos or video to criminals!

This just proves that even when you are at home thinking that you are in your own castle. But today, it is no more. A phones is a mans castle and when it can be hacked, then you live in a vulnerable world. Here is one very interesting videos entitled A state of surveillance in YouTube. Be sure to watch it. Clink the link below!!

Wildlife surveillance

Hey guys. How are you? Today i am pretty exited to tell you guys that in this entry, it is going to be my favorite topics which is Wildlife surveillance. Why did i say favorite? It is because i love animals and i believe that wild species especially endangered species should receive help from us in order to conserve their population. So as i have explained before in my entry about RFID where i said that researcher tagging the animal with some sort of tracking devices that allows them to track the location, the movement pattern and behavior pattern of the animal. 

Why did they do that? Why wildlife surveillance important? It is because in conserving endangered animals, surveillance is crucial. we need to know about their location to study about their behavior, and to provide security to them. This will make conservation effort easier thus able to increase total population of that particular animal. Instead of animal surveillance, it is commonly called animal tracking. Like i said before, the data from animal tracking helps us understand how individuals and populations move within local areas, migrate across oceans and continents, and evolve through millennia. 

So these are some methods applicable for animal tracking

1) Good old fashioned  wildlife Tracking
It uses traditional Ecological Knowledge basis of most cultures around the world, interpreting the indirect evidence (tracks and signs) left behind by wildlife continues to be a fundamental field skill in the modern fields of wildlife research and management, hunting, and environmental education.


An animal footprints (possibly a feline)


2)  Global positioning system (GPS)

Usually a collar is used with GPS system embedded with it.  The function is to calculate the location of an animal at specific time intervals using positions estimated by a network of satellites. These locations can be stored on-board the tag or transmitted to the user through a communication network. These tags can provide pretty accurate locations of the animals. However, these tags are relatively expensive and heavy, and so are usually limited to use on larger animals and require a large research budget if many animals will be tagged.

A jaguar strapped with GPS collar in its neck

3)  Remote Camera Traps

The third one is relatively common which is always used by conservationist, wildlife photographer or even poachers.  When the animals are spotted, this confirms that the animal still inhabiting in the ecosystem. The main concept of this is called wildlife trapping, which is to detect and study wildlife without directly interacting with or harming wildlife. Remote camera traps are designed to capture images or video footage of wildlife using either naturally occurring or strategically placed attractants or predicated travel corridors. Camera trap design depends on the target species, landscape, time frame, and often a number of other management considerations.

This camera, attached to the tree was set to monitor a game trail on the edge of a wetland. It focused on a scent marking scrape of a mountain lion. We need to be careful of setting up the camera to prevent damage to the camera.

In just one month, a mountain lion returned to this location and marked at the same location. Scent marking locations are an example of a natural attractant that can be used to successfully locate a camera trap.

4) Genetic Sample Collection (Biometrics)
This is the concept of biometric surveillance as i have explained to you in my previous entry. It uses DNA analysis. Researchers collects biological samples like scats and fur and then conduct genetic analysis to answer research questions including species identification, home range size, and population dynamics. Samples are collected from naturally deposited material such as scats and fur found in beds and tracks, or through artificial collection methods, mainly as hair snagging devises. 


So these are all of the very informative Wildlife surveillance that i explained for your digest. In my honest opinion, wildlife surveillance is important to help the effort of maintaining the population of wildlife population.

Spying Devices

My my. Don't we had a wonderful topic that have been discussed in last entry. Alright powderhead, have you ever wonder does James Bond equipment and devices really exist? This is because when we think of spying devices, what comes first in our mind will probably about James Bond kind of devices. Well, this is your lucky day because i am about to give some brief information about real-life spying devices.

 The cool thing is, the real life gadgets can be bought online in such an easy way. A lot of spying gadgets for sale can be found in the Internet.

Here are some examples of real-life spying devices/gadgets :

Remote Monitoring














What does these three items share in common? well they are basically equipped with spying capabilities.

# The Small Black and white wall clock camera has a black-and-white camera hidden inside, 
# the Air Freshener has a color camera inside plus a SIM card that lets you watch the live video feed on a 3G phone
# Power Strip Hidden Audio Monitoring Device (above) which is also have a SIM card and a microphone.This enables you to dial in and listen to conversations. 


Keyloggers














It functioned as a cracking tools for any encryption code in a computer file. After that we need to find the users password and that's when this device perform that is when the user want to key in their password, this device will record every keystroke that a user enters on a specific computer thus gives you the precious password.

Document Scanners














Well, this device is pretty awesome. It can actually scan any documents on paper by moving the pen through every line of the documents. It comes with 64MB of internal memory, takes Micro SD cards for expansion, and can perform Bluetooth transfers as well. Well usually people will hardly noticed what youre doing because the think you must be writing something.

Night Vision Scope















This item must be a familiar one especially when you have played counter strike or watching special force kind of movies. This tools is very suitable at night which is suitable for
camping, boating or wildlife observation, as well as for espionage. It comes with monocular and binocular version. you can also attach to a tripod, a built-in LCD screen, and a rubberized body.


Aerial Snooping















This one type of small drones that have the capabilities such as
carries microphones, shoots photos and video, and comes equipped with sensors for detecting poisonous gases and radiation. It is only 6 inches wide, it also lets you snap photos from heights of up to 80 feet and download them to your PC via USB.

Keychain Voice Recorder
 Tiny size - big battery life 

This key-chain is one of a kind. It has a voice high quality recording capabilities with 10 Hour Battery Life.  With one button operation you will be able to quickly and easily activate the recorder with a simple twist of the end cap. CD quality files are created in MP3 format as soon as you activate the recorder. Running an outstanding 10 hours per charge, this keychain voice recorder will always be there for you.  And with 4GB of memory you’ll be able to save your important files and carry them with you.

In my view, this just show that how easy it is for ordinary people to buy these spying device which is quite worrying. This is because with such capabilities, people will tend to use it in a bad way such as stealing information that does not belong to them.

Global Positioning System (gps) tracking unit

Hey ho! The last post was fun and it filled with a lot of great information. So can you guess what am i going to explain in this entry? Thats right, it is time for the GPS tracking unit. As usual i will explain what exactly is the GPS.

Simply put, Global Positioning System (gps) is a global navigation satellite system that provides geolocation and time information to a GPS receiver anywhere on or near the Earth where there is an unobstructed line of sight to four or more GPS satellites. GPS system is owned by the United States government and operated by the United States Air Force. Similar navigation system are known as  GLONASS (Russia), BeiDou-2 (Chinese), or Galileo (European) . GPS system use satellites to perform.

On the other hand, a GPS tracking unit is a device, normally carried by a moving vehicle or person, that uses the Global Positioning System to determine and track its precise location, and hence that of its carrier, at intervals. The recorded location data can be stored within the tracking unit, or it may be transmitted to a central location database, or Internet-connected computer, using a cellular (GPRS or SMS), radio, or satellite modem embedded in the unit. Nearly all today's smartphones are equipped with GPS capability.

GPS satellite trackers are an ideal way to 
1) obtain accurate, real-time location-based information about a child, an adult, a vehicle or even.
     some other type of asset that you may have.
2) Let you know exactly where something is (like a vehicle) with just a few quick clicks of a button 
    (great for theft prevention)

Function of GPS trackers

  # Used for law enforment. For example a bailed ex-prisoner may have to wear a GPS tracker, 
     usually an ankle monitor, as a bail condition.  

  # Espionage. A tracker on a person or vehicle allows movements to be tracked.

  # Race control. in some sport, participants are required to carry a tracker allows race officials to
     know if the participants are cheating, taking unexpected shortcuts, and how far apart they are.
 
  # Aircraft trackers. Aircraft can be tracked either by ADS-B (primarily airliners), or by FLARM
     data packets picked up by a network of ground stations (primarily used by General Aviation
     aircraft, gliders and UAVs), both of which are data pushers. 

  # Parents to tracking their children.
 
  # Adventure sports: in case of accident, this allows rescue personnel to locate the unfortunates.


To me GPS system is very crucial in our daily life especially in terms of missing phones and individuals. And it could locate the located of the missing thing. Plus it is also convenience in showing the best route if we are not familiar to the road of a particular city. For example Google map navigation system.
The concept GPS system

 
GPS Logic