دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
دسته بندی: تاریخ ویرایش: 2 نویسندگان: J.K. Petersen سری: ISBN (شابک) : 0849383196, 9780849383205 ناشر: Auerbach Publications سال نشر: 2007 تعداد صفحات: 1020 زبان: English فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) حجم فایل: 85 مگابایت
در صورت تبدیل فایل کتاب Understanding Surveillance Technologies: Spy Devices, Privacy, History & Applications (revised and expanded second edition) به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب درک فن آوری های نظارت: دستگاه های جاسوسی، حریم خصوصی، تاریخچه & amp؛ برنامه های کاربردی (ویرایش دوم و گسترش یافته) نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
درک فناوریهای نظارتی دستگاههای جاسوسی را ابهام میکند و نحوه استفاده از فناوری برای مشاهده و ثبت جزئیات زندگی افراد را توصیف میکند - اغلب بدون اطلاع یا رضایت آنها. از ریشه های تاریخی گرفته تا کاربردهای کنونی، توضیح می دهد که چگونه ماهواره ها، دوربین های سوراخ سوزنی، سیاهه های مربوط به تلفن های همراه و کارت اعتباری، کیت های DNA، میکروفون های کوچک ("اشکال")، مواد شیمیایی شیمیایی، و تراشه های RF/ID کاشته شده ما را قادر به ایجاد یک دو شمشیر لبه دار - دستگاه هایی که نوید امنیت می دهند و در عین حال حریم خصوصی ما را از بین می برند. درک فناوریهای نظارتی بهطور فراوان با منابع و فهرستهای گسترده نشان داده شده است، که زمینه را برای متون تخصصیتر در مورد فناوریهای خاص فراهم میکند. هر یک از دستگاههای حسگر اصلی را پوشش میدهد و نحوه استفاده از آنها را در برنامههای غیرنظامی، عدالت کیفری، علمی، امنیت ملی و نظامی توضیح میدهد. همچنین شامل تغییرات اخیر در قوانین و سازماندهی جامعه اطلاعاتی است و چگونگی دسترسی برابر به دستگاههای حسگر پیشرفته و طرحهای رمزگذاری را تغییر داده است. درک فناوریهای نظارت مدولار است، بنابراین فصلها را میتوان به هر ترتیبی خواند، و به سبکی قابل دسترس و تا حدودی روایتی نوشته شده است تا با نیازهای روزنامهنگاران/گویندگان اخبار، سازمانهای حفظ حریم خصوصی، مربیان، برنامهریزان مدنی و مراکز فناوری مطابقت داشته باشد. این به عنوان یک مرجع کمکی برای کارآموزان عدالت کیفری / مجری قانون / نظامی و پزشکی قانونی و به عنوان یک کتاب درسی برای دوره های مطالعات نظارتی، جامعه شناسی، ارتباطات، و علوم سیاسی مناسب است. اکنون در چاپ دوم خود، با 1000 صفحه و بیش از 700 نمودار، هنوز تنها متنی است که به طور جامع وسعت این حوزه را بیان می کند.
Understanding Surveillance Technologies demystifies spy devices and describes how technology is used to observe and record intimate details of people’s lives—often without their knowledge or consent. From historical origins to current applications, it explains how satellites, pinhole cameras, cell phone and credit card logs, DNA kits, tiny microphones (“bugs”), chemical sniffers, and implanted RF/ID chips have enabled us to create a two-edged sword—devices that promise security while, at the same time, eroding our privacy. Understanding Surveillance Technologies is profusely illustrated with extensive references and indexes, laying the groundwork for more specialized texts on specific technologies. It covers each of the major sensing devices and explains how they are used in civilian, criminal justice, scientific, national security, and military applications. It also includes recent changes in legislation and the organization of the intelligence community, and discusses how equal access to high-tech sensing devices and encryption schemes has changed society. Understanding Surveillance Technologies is modular, so the chapters can be read in any order, and is written in an accessible, somewhat narrative style, to suit the needs of journalists/newscasters, privacy organizations, educators, civic planners, and technology centers. It is appropriate as an adjunct reference for criminal justice/law enforcement/military, and forensic trainees, and as a textbook for courses in Surveillance Studies, Sociology, Communications, and Political Science. Now in its second edition, with 1,000 pages and more than 700 diagrams, it is still the only text that comprehensively conveys the breadth of the field.
9780849383205%2Efmatt......Page 1
Understanding Surveillance Technologies: Spy Devices, Privancy, History & Applications, SECOND EDITION......Page 3
CONTENTS......Page 5
ABOUT THIS BOOK......Page 6
PREFACE......Page 7
FORMAT......Page 9
ABOUT THE AUTHOR......Page 10
Section 1: Introduction......Page 11
1.a. Scope and Focus......Page 12
Political Openness......Page 13
1.b. Format......Page 14
Shift In Access......Page 15
Legislation......Page 16
Responsibility and Social Evolution......Page 18
2.a. Basic Terms and Concepts......Page 19
Congressional Legislative Bills......Page 20
2.c. Categories of Surveillance Activities......Page 21
2.d. Categories of Surveillance Devices......Page 23
2.e. Categories of Intelligence......Page 24
3. Context......Page 27
3.a. Scientific Inquiry......Page 28
3.b. Government Applications......Page 29
3.c. Commercial, Agricultural, and Government Applications......Page 30
The Formalization of Surveillance and Intelligence Gathering......Page 32
Detective Agencies and Secret Service Agents......Page 33
Scientific Input to Government......Page 35
The U.S. Secret Service and Department of Justice......Page 36
The “Progressive Era”......Page 38
Prohibition......Page 39
The Age of Communications......Page 40
Evolution of the BoI into the FBI......Page 41
4.d. Wartime Use of Surveillance Technologies......Page 42
Establishment of the CIA......Page 43
Responsibility for Security and Related Policies - The CIA and FBI......Page 44
Military Intelligence Acquires a Broader National Scope......Page 45
Post-War Prosperity and Baby-Boom Years......Page 46
Public Announcements, Cuba, and Cold War Fears......Page 47
The Establishment of Research and Technology Labs......Page 48
National Intelligence and Personal Computers......Page 49
The 1970s - The Watergate Scandal......Page 50
Birth of the Personal Computer......Page 51
Increased Governmental Surveillance of U.S. Persons......Page 52
Evolution of the ARPANET and Network Addressing......Page 54
Counterintelligence Efforts......Page 55
Members of the Intelligence Community......Page 56
The Internet......Page 58
1990s - Provisions for Privacy, ECHELON, and Public Concerns......Page 59
ECHELON Rumors and Privacy Constraints......Page 60
4.i. Mid-1990s - Terrorism, Smuggling, and Technology Upgrades......Page 62
Greater Awareness and the Struggle for Balance......Page 63
The Late 1990s - Reorganization, More Openness, Yet More Surveillance......Page 64
ROLES AND RESPONSIBILITIES......Page 65
Changes in Communications Infrastructures......Page 66
Economic Espionage and ECHELON Revisited......Page 67
Integrated Forensic Databases......Page 68
Background Checks and Forensic Facilities......Page 69
When Technology Meets Opportunity......Page 70
Transportation Security......Page 71
National Security and Terror Management......Page 72
International Relations......Page 73
DNI Responsibilities......Page 74
Director of Science and Technology......Page 75
The Central Intelligence Agency......Page 76
Archaeological Investigation......Page 77
6.a. Search and Rescue......Page 78
6.b. Border Patrol......Page 80
6.c. Natural Resources Management and Protection......Page 81
6.d. Drug Laws Enforcement......Page 82
6.e. Military Applications......Page 83
6.g. Commercial Products......Page 84
8. Restrictions and Regulations......Page 85
Little Brothers......Page 89
10.a. Organizations......Page 90
10.b. Print Resources......Page 97
Articles......Page 101
Journals and Bulletins......Page 102
10.c. Conferences and Workshops......Page 103
10.d. Online Sites......Page 105
10.e. Media Resources......Page 107
11. Glossary......Page 108
Section 2: Acoustic Surveillance......Page 111
Section 4: Biochemical Surveillance......Page 0
1. Introduction......Page 112
The Phenomenon of Sound......Page 113
Human hearing......Page 114
The Character of Sound......Page 115
Sound Conversion and Display......Page 116
2. Kinds and Variations......Page 117
Sound-Monitoring Devices......Page 122
Tapping Devices......Page 123
4. Origins and Evolution......Page 124
Eavesdropping - The Famous and the Infamous......Page 125
The Early Development of Recording Devices......Page 131
Phonographic Recordings......Page 133
Public Officials and Charges of Wiretapping......Page 135
Wiretapping Legislation in America......Page 138
Constitution Issues and Wiretapping......Page 140
Audio-Visual Developments......Page 141
Further Legislation Related to Wiretapping......Page 142
Challenging the Olmstead Decision......Page 143
Continued Controversy Over Government Wiretapping......Page 145
Opposition to Listening Devices......Page 148
Shifting the Focus to Law Enforcement......Page 149
Watergate and The Computer Age......Page 150
New Technologies and Common Carrier Obligations......Page 151
Surveillance and Civil Rights......Page 152
Issues of Privacy and Constitutional Rights......Page 154
Techies and Techie Toys......Page 156
The Breakup of AT&T and Implementation of the ECPA......Page 157
Challenges for Law Enforcement......Page 158
The 1990s - Changeover to New Technologies......Page 159
Disrobing the Machine - Security Weaknesses......Page 160
The Late 1990s - Variation and Sophistication......Page 161
Wiretapping, Implementation, and Opposition......Page 162
5.a. Listening Devices......Page 163
Microphones......Page 165
Shotgun Microphone......Page 167
Laser Listening Devices......Page 168
5.b. Recording Devices......Page 169
Analog versus Digital Recorders......Page 170
Commercial Recorders......Page 171
Remote Monitoring through a Phone Line......Page 172
Pen Registers......Page 173
Wiretapping Devices......Page 174
Audio Transmitters......Page 175
5.d. Audio Changing or Jamming Devices......Page 176
Prevalence of Law Enforcement Taps......Page 177
5.f. Covert Listening Device Countermeasures......Page 178
Detecting Bugs......Page 179
Wiretap Countermeasures......Page 180
Warning Signs......Page 182
Installation......Page 183
8. Restrictions and Regulations......Page 184
Law Enforcement Monitoring of Calls......Page 187
10.a. Organizations......Page 188
10.b. Print......Page 190
Articles......Page 193
Reports and Testimony......Page 195
10.c. Conferences and Workshops......Page 196
11. Glossary......Page 197
1. Introduction......Page 201
Infrasound and Seismography......Page 203
Sound Zones......Page 204
Frequencies Used for Surveillance......Page 205
3. Context......Page 206
Industrial Testing and Safety......Page 207
Infrasonics and Early Seismologic Studies......Page 208
Ultrasonics - Early ‘Reflectoscopes’......Page 209
Rail Expansion and Quality Control......Page 210
Display Technologies and Ultrasonics......Page 211
Nuclear Science and International Regulations......Page 212
Political Policies and Technology......Page 213
Treaty Ratification and Enforcement......Page 214
Progress in Disarmament and International Monitoring......Page 215
5. Description and Functions......Page 217
Structural Assessment and Quality Assurance......Page 218
Avalanche Detection......Page 219
Microphonic Monitoring......Page 220
7. Problems and Limitations......Page 221
10.a. Organizations......Page 222
10.b. Print......Page 223
Articles......Page 224
10.d. Online Sites......Page 225
11. Glossary......Page 226
1. Introduction......Page 228
1.a. Basic Concepts and Terminology......Page 229
Typical Frequencies......Page 230
1.c. Biological Sonar Systems......Page 231
1.d. Components of Sound......Page 234
1.e. Sound Characteristics......Page 235
2. Kinds and Variations......Page 236
Depth-Sounding......Page 238
3.a. Applications Context......Page 239
Navigation......Page 240
Communications......Page 241
4. Origins and Evolution......Page 242
Understanding Sound......Page 243
Underwater Mines and Submarine Warfare......Page 245
Post-War Developments......Page 247
World War II......Page 249
The ASW Patrol Ships and Destroyers......Page 250
Other Acoustic Applications......Page 251
Post-War and Cold War Sensing Applications......Page 252
Post-War Adjustments to Acoustics Research......Page 253
Technological One-Upmanship......Page 254
Innovation and Disaster......Page 255
Deep-Submergence Craft......Page 256
The 1970s - New and Improved Sonar Applications......Page 257
Acoustic-Sensing Challenges......Page 258
Aircraft Wreckage Search, Rescue, and Recovery......Page 260
Satellite Communications......Page 262
Loudness......Page 263
Impedance......Page 264
Hull-Mounted Systems......Page 265
Remote-Controlled Vehicles......Page 266
Robots and Autonomous Vehicles......Page 267
6.a. Depth Sounding......Page 268
6.c. Marine Mapping......Page 269
6.d. Active Submarine and Underwater Vessel Location......Page 272
6.e. Special Underwater Reconnaissance Missions......Page 273
Submarine Recovery......Page 274
Aircraft and Flight Recorder Location and Recovery......Page 275
6.g. Scientific Research......Page 277
6.h. Mine Detection......Page 279
6.i. Military Applications and Intelligence-Gathering......Page 280
Military Applications......Page 281
7.a. Interference and Aberrations......Page 283
Undersea Life......Page 284
7.e. Satellite Communications......Page 285
9. Implications of Use......Page 286
10.a. Organizations......Page 287
10.b. Print......Page 290
Articles......Page 291
Journals......Page 292
10.d. Online Sites......Page 293
10.e. Media Resources......Page 294
11. Glossary......Page 295
Section 3: Electromagnetic Surveillance......Page 297
1. Introduction......Page 298
Basic Terms and Concepts......Page 299
4. Origins and Evolution......Page 301
The Telegraph......Page 302
Telegraphic Surveillance......Page 303
Laying Down the Lines......Page 304
Transcontinental Cables......Page 305
The Telephone......Page 307
Coherers......Page 309
Automatic Telephone Switching and Marine Radio Systems......Page 310
Crystal Detectors......Page 311
Electron Tube Technology......Page 312
4.c. Radio Broadcasting......Page 313
The American Civil War and World War I......Page 314
Commercial Broadcasting and Political Alliances......Page 316
Regulation and Growth of the Radio Industry (Air Wars)......Page 317
Radio Communications in Wartime (Air Wars II - The Foreign Menace)......Page 318
Radio Security Innovations......Page 319
Innovations in Radio Communications......Page 320
Global Politics and Increased Surveillance......Page 322
The Birth of Satellite Communications......Page 323
The Microcomputer Revolution......Page 324
The Pressure for Airwaves......Page 325
Civilian Use of Radio Technologies......Page 326
Modern Use of Radio Technologies......Page 327
Modern Surveillance Tools......Page 328
Security......Page 329
Increasing Efficiency......Page 330
Radio Tags......Page 331
Basic Concepts......Page 332
Roaming Radio......Page 333
5.f. Satellite Communications......Page 334
GPS......Page 335
Satellite Antennas......Page 336
5.g. Remote-Controlled Vehicles and Robots......Page 337
ID and Inventory Tracking......Page 338
Inmate and Parolee Tracking......Page 340
Search and Rescue......Page 341
National Defense......Page 344
Availability of Bandwidth......Page 345
8. Restrictions and Regulations......Page 346
Short-Range Systems and Security......Page 347
Radio Tracking Beacons......Page 348
10.a. Organizations......Page 349
Articles......Page 350
10.c. Conferences and Workshops......Page 351
10.e. Media Resources......Page 352
11. Glossary......Page 353
1. Introduction......Page 355
Radar Basics......Page 356
Surveillance Applications......Page 357
2. Kinds and Variations......Page 358
Variations......Page 359
Identification Systems......Page 361
3. Context......Page 362
3.b. Radar Receivers......Page 363
Vector and Raster Displays......Page 364
Radar Antennas......Page 366
Radar Frequencies......Page 367
Radar Ranging......Page 370
Practical Radar Systems......Page 371
Military Development and Use of Radar......Page 372
Overseas Developments......Page 374
Aerial Early Warning Systems......Page 376
The Transistor Revolution......Page 378
Adding Radar to the Fleets......Page 379
Radar Automation......Page 380
Establishing Surveillance Systems......Page 381
Space Surveillance......Page 382
Technological Advancements......Page 383
Mapping the Earth from Space......Page 384
5.b. Radar Displays......Page 385
5.c. Digital Technology......Page 386
5.d. Synthetic-Aperture Radar......Page 387
5.f. Space Systems......Page 388
6.a. Traffic Enforcement......Page 389
Archaeology and Anthropology......Page 391
Earth Monitoring and Mapping......Page 392
Underground Investigations......Page 393
Navigation......Page 394
6.e. Security, Surveillance, and Defense......Page 395
Projectile Detection and Guidance......Page 398
Mine detection......Page 399
6.f. Commercial Products......Page 400
Interpretation of Displays and Radar Data......Page 402
Radar Countermeasures......Page 403
Bandwidth and Frequency......Page 404
8. Restrictions and Regulations......Page 405
9. Implications of Use......Page 406
10.a. Organizations......Page 407
10.b. Print Resources......Page 408
Articles......Page 409
10.c. Conferences and Workshops......Page 410
10.e. Media Resources......Page 411
11. Glossary......Page 412
1. Introduction......Page 416
Representing Waves......Page 417
Units of Measure......Page 418
Infrared Radiation......Page 419
Units......Page 420
Categories......Page 421
Passive and Active Detectors......Page 423
Extrinsic and Intrinsic Detectors......Page 424
Cooled and Uncooled Detectors......Page 425
Ambient Radiation......Page 426
Interpretation of Infrared Data......Page 427
The Discovery of New Forms of Light......Page 428
The Emergence of Practical Applications and Accessories......Page 429
Infrared Photography and Imaging......Page 430
The 1980s - Improvements in Video and Color Technologies......Page 431
The 1990s - Improvements and Broader Applications......Page 433
Further Improvements in Technology......Page 434
Late 1990s - Increased Sophistication and Commercialization......Page 435
Infrared Sensors......Page 437
Light Meters......Page 438
Infrared Film and Processing......Page 439
Black and White Infrared Film......Page 440
Illumination......Page 441
Night-Vision Scopes and Goggles......Page 442
Mapping and Topographical Studies......Page 443
Infrared Spectrometers and Reflectometers......Page 444
Quality Control, Assessment, and Inspection......Page 446
Astronomy......Page 447
Military Surveillance......Page 450
Missile Detection and Targeting......Page 451
Remote Control and Communications Devices......Page 452
Motion Detectors......Page 453
Infrared Illumination and Thermal Imaging......Page 454
Bug Detectors......Page 455
Reconnaissance Aircraft (Piloted)......Page 456
Unstaffed Aerial Vehicles (UAVs)......Page 457
7. Problems and Limitations......Page 458
8. Restrictions and Regulations......Page 459
10.a. Organizations......Page 460
10.b. Print Resources......Page 461
Articles......Page 464
10.c. Conferences and Workshops......Page 465
10.e. Media Resources......Page 466
11. Glossary......Page 467
1. Introduction......Page 469
1.a. The Prevalence of Visual Surveillance......Page 470
Visual Surveillance General Applications......Page 471
1.b. Potential for Abuse......Page 472
1.c. Basics of Visual Perception......Page 473
2. Kinds and Variations......Page 475
Magnifiers......Page 476
2.b. Imaging......Page 477
Film Cameras......Page 478
Movie Cameras......Page 479
Digital Cameras......Page 480
High-Speed Photography......Page 481
Splitters/Multiplexers......Page 482
Databases......Page 483
Environmental Suits......Page 484
Protective Vehicles and Stations......Page 487
2.g. Probes, Robots, Remote-Controlled and Autonomous Craft......Page 488
4.a. Human Aspects......Page 492
The Impulse to Record......Page 493
The Development of Lenses......Page 494
Going Beyond the Basics......Page 495
New Forms of Optical Enhancements......Page 496
Evolutionary Improvements......Page 497
Visual Recording Technologies......Page 498
Capturing a Moment in Time......Page 499
Surveillance Craft and Gear......Page 500
Surveillance from New Heights......Page 502
The Development of Image Transmission......Page 504
Image Broadcasting......Page 506
Visual Surveillance in Homes and Offices......Page 507
Digital Technologies......Page 508
International Compliance......Page 509
Scopes......Page 510
Curl......Page 513
Image and Data Processing......Page 514
5.c. Management and Storage of Recording Materials......Page 515
Example Costs of Archiving......Page 516
Art Theft......Page 517
Explosives Detection and Disposal......Page 518
Public Areas Monitoring......Page 519
Traffic Monitoring......Page 520
Border Patrol......Page 521
Domestic Help Monitoring......Page 522
Hazardous Area Monitoring......Page 523
6.c. Space Surveillance......Page 524
Atmospheric Studies......Page 525
Remote Administration......Page 526
Operations Monitoring......Page 527
Aerial Surveillance......Page 528
Compliance Monitoring and Enforcement......Page 529
6.g. Emergency Services......Page 530
Pinhole Portable Video Cameras......Page 531
Specialized Cameras......Page 532
Monitors, Monitor/Receivers......Page 533
Portable/Covert VCRs......Page 534
Resolution and Image Clarity......Page 535
8. Restrictions and Regulations......Page 536
Current Regulations......Page 538
Examples of Privacy-Related Bills......Page 539
9.a. Social Implications......Page 541
9.b. Balancing Privacy, News Coverage, and Safety......Page 542
News Surveillance......Page 544
9.d. Privacy and Identity Protection......Page 545
9.e. Evidence Issues......Page 546
10.a. Organizations......Page 548
10.b. Print......Page 549
Articles......Page 550
Journals......Page 551
10.c. Conferences and Workshops......Page 552
10.d. Online Sites......Page 553
10.e. Media Resources......Page 555
11. Glossary......Page 556
1. Introduction......Page 558
The Shift in Power......Page 559
Wind-Lofted Craft......Page 560
Self-Powered Craft......Page 561
Military Reconnaissance......Page 562
Scientific Inquiry......Page 563
Commercial Applications......Page 564
4. Origins and Evolution......Page 565
The Early 1800s - Pioneer Photography and Aerial Photography......Page 566
The Mid-1800s - Rise of Photography and Airships......Page 567
An Official Balloon Reconnaissance Corps......Page 568
The 1900s - The New Age of Flight......Page 569
The 1910s - Flying Machines and Consumer Cameras......Page 571
The 20s - Transatlantic Flight and the Lure of Outer Space......Page 573
The ‘30s - Paparazzi, Pioneers, and Global Unrest......Page 574
War and Post-War......Page 575
The 1950s - The Postwar Boom and the Cold War Years......Page 576
The First Spy Planes......Page 577
CORONA......Page 578
The 1980s - Politics, Peace, and the Pressure to Commercialize......Page 580
The 1990s - Global Conflicts and the Commercial Sector......Page 581
Improving Aerial Photography and Resolution......Page 583
The Old and the New......Page 584
Aerial and Satellite Technologies - Problems......Page 586
5. Description and Functions......Page 587
5.b. Remote-Controlled and Autonomous Vehicles......Page 588
5.c. Commercialization......Page 589
Agriculture, Wildlife and Park Management......Page 591
Engineering and Construction......Page 592
Environmental......Page 593
Military Reconnaissance......Page 594
Marine Patrol......Page 597
Commercial Imaging Products......Page 598
8. Restrictions and Regulations......Page 599
Future Technologies......Page 600
Government Policies on Remote-Sensing Systems......Page 601
10.a. Organizations......Page 602
10.b Print Resources......Page 603
Articles......Page 606
10.c. Conferences and Workshops......Page 607
10.d. Online Sites......Page 608
11. Glossary......Page 609
1. Introduction......Page 611
Chemical Interactions......Page 613
Sources and Intensity of Ultraviolet Radiation......Page 614
Chemical Marking and Illumination......Page 615
Early Observations......Page 616
Theoretical/Mathematical Frameworks......Page 617
The Emergence of Quantum Physics......Page 618
Experimental and Practical Applications......Page 619
UV Photos from Space......Page 620
Photos during Interplanetary Fly-bys......Page 622
Ultraviolet Effects......Page 623
Astronomical Research Using Ultraviolet......Page 624
Airborne Ultraviolet Sensing......Page 625
The Continued Evolution of Space Science......Page 626
The Increasing Importance of UV Sensing in Space......Page 627
XUV Research......Page 628
5. Description......Page 629
Filters......Page 630
Digital Processing......Page 631
Remains Identification......Page 632
Industrial and Resource Sciences......Page 633
Fraud Detection......Page 634
Astronomy and Cosmology - Ultraviolet-Sensing Satellites......Page 635
The Far-Ultraviolet Spectroscopic Explorer......Page 637
6.e. Spill Detection......Page 639
Flame Detectors......Page 640
Experimental Sensors......Page 641
Hazards......Page 642
9. Implications......Page 643
10.a. Organizations......Page 644
Articles......Page 645
Journals......Page 646
10.d. Online Sites......Page 647
11. Glossary......Page 648
1. Introduction......Page 650
2. Kinds and Variations......Page 651
Basic System Design......Page 652
3. Context......Page 653
The Discovery of X-Rays......Page 655
Discovering the Properties of X-Rays......Page 656
The 20th Century - Practical Applications......Page 657
Space Science......Page 658
The 1990s - Transition to Digital......Page 659
1980s and 1990s Space Science......Page 660
Illegal Entry and Smuggling Concerns......Page 662
Cargo Surveillance......Page 664
Microscopy......Page 665
Crystallography......Page 666
Industrial Fabrication and Testing......Page 667
Forensic Investigations......Page 668
Damage to Film from X-Ray Machines......Page 669
Medical X-Rays......Page 670
Transportation Security......Page 671
10.a. Organizations......Page 672
Articles......Page 673
10.c. Conferences and Workshops......Page 674
10.e. Media Resources......Page 675
11. Glossary......Page 676
9780849383205%2Ech12......Page 677
1. Introduction......Page 678
2.a. Basic Terms and Concepts......Page 679
2.c. Categorization......Page 681
Chemical Weapons Threats......Page 682
Early Regulations......Page 683
Disease and Warfare......Page 684
Prohibitions on Chemical Use......Page 685
The Control and Surveillance of Imports and Exports......Page 687
The 1970s - International Control of Disease, Arms, and Drugs......Page 688
The Mid-1990s - Treaties, Training, and Terrorism......Page 689
Progress on Treaties......Page 690
Preventive Health Measures......Page 691
International Affairs in 1998......Page 692
Customs and Border Control......Page 693
Terrorist Acts......Page 694
Industrial Spills......Page 695
Chemical Surveillance Measures......Page 696
National Biodefense......Page 697
Protective Environments and Gear......Page 698
Tapes and Samples......Page 699
Chemical ‘Fingerprinting’......Page 700
Identifying Remains......Page 701
Arson and Explosives......Page 702
Narcotics......Page 703
Explosives Detectors......Page 704
Firearms Matching and Gun Residues......Page 705
5.g. Biochemical Warfare Agents and Medical Diagnostics......Page 706
6.a. Chemical Contaminants Detection......Page 708
6.c. Terrorism......Page 710
6.d. Biological/Chemical Warfare......Page 711
Evidence Tapes......Page 714
8. Restrictions and Regulations......Page 715
9. Implications of Use......Page 716
10.a. Organizations......Page 717
10.b Print Resources......Page 720
Articles......Page 721
Journals......Page 722
10.c. Conferences and Workshops......Page 723
10.d. Online Sites......Page 724
11. Glossary......Page 725
1. Introduction......Page 727
2. Kinds and Variations......Page 728
Mug Shots......Page 730
Polygraphs......Page 731
The 1980s - The Development and Testing of New Technologies......Page 732
The 1990s - Proliferation of Biometrics Systems......Page 733
The Motivation for Biometrics Surveillance......Page 734
Concerns About Privacy and the Potential Abuse of Data......Page 735
Fingerprints as a Preferred Identity Tool......Page 736
Fingerprint Acquisition and Identification......Page 737
Inked and Inkless Systems......Page 738
Computer Analysis and Identification Systems......Page 739
6.a. Examples......Page 740
Finger Imaging Recognition......Page 741
Face Recognition......Page 742
Motion Recognition......Page 743
Fingerprint Collection......Page 744
Dusting Powders......Page 745
Latent Print Developers......Page 746
Forensic Identification of Fingerprints......Page 747
Protection of Personal Information......Page 748
Congressional Trends......Page 749
Changes in Administration......Page 750
Cost-Effective Deployment and Change of Use......Page 751
10.a. Organizations......Page 752
Articles......Page 754
10.c. Conferences and Workshops......Page 756
10.e. Media Resources......Page 757
11. Glossary......Page 758
1. Introduction......Page 760
Animal Treatment as a Psychological Indicator......Page 761
Canine Detectives......Page 762
Animal Use in Research and Testing......Page 763
Research of Animal Physiology and Behavior......Page 764
Animal Assistants......Page 765
Seeing-Eye Dogs......Page 766
Dogs in War......Page 767
Animals in Early Space Research......Page 768
The Mid-1980s - Health Care, Arson, and Transportation Security......Page 769
Bee Studies......Page 770
Electronic Sensors......Page 771
Selecting a Dog Breed......Page 772
Dog Training......Page 773
Search and Rescue......Page 774
Accelerant, Explosives, and Firearms Sniffing......Page 775
Food Substance Sniffing......Page 777
Drug Sniffing......Page 778
Underwater Surveillance......Page 781
Dog Training Scents......Page 782
Commercial Dog Sniffing Services......Page 783
Relocation of Animals......Page 784
Individual Temperament and Intelligence......Page 785
Animal Rights......Page 786
10.a. Organizations......Page 787
10.b. Print Resources......Page 788
10.c. Conferences and Workshops......Page 790
10.e. Media Resources......Page 791
11. Glossary......Page 792
1. Introduction......Page 793
Using DNA......Page 795
1.c. DNA Matching......Page 796
2.a. Nuclear DNA......Page 797
2.b. Mitochondrial DNA......Page 798
Assessing Samples......Page 800
Southern Blot......Page 802
4. Origins and Evolution......Page 803
Understanding Cell Structure......Page 805
Charting Cell Structure and Exploring its Functions......Page 806
New Theories and Procedures to Understand Heritability......Page 807
Cell Division and Fertilization......Page 808
The Rise of Modern Genetics......Page 809
Genetics and Gene Mapping......Page 810
Genetics Development and Social Impact......Page 811
Visualizing and Modeling DNA......Page 812
Laboratory Tools and Manipulation of DNA......Page 813
The Human Genome Project - HGP......Page 814
Consumer Access and Awareness......Page 816
Commercializing a Genetic Heritage......Page 817
National Databases......Page 819
5.a. Permissions......Page 820
5.b. Collecting Samples......Page 821
Bones and Teeth......Page 822
5.c. Transporting Samples......Page 823
5.e. Analyzing Samples......Page 824
5.f. Storing DNA Samples......Page 827
Equipment......Page 828
Law Enforcement......Page 829
Breeding and Wildlife Conservation and Management......Page 830
Archaeology and Anthropology......Page 831
Service Member Remains Identification......Page 832
Identifying Political or Murder Victim Remains......Page 834
Child Abductions......Page 835
Genetic Counselling......Page 836
7. Problems and Limitations......Page 837
Processing......Page 838
Population Demographics......Page 839
8. Restrictions and Regulations......Page 840
National Legislative Concerns......Page 841
United States......Page 842
Employer Interests......Page 843
State Legislative Concerns......Page 844
Accessibility......Page 846
Ethics and Regulations......Page 847
Applications......Page 848
Freedom and Privacy......Page 849
10.a. Organizations......Page 850
10.b. Print Resources......Page 855
Articles......Page 856
Journals......Page 858
10.c. Conferences and Workshops......Page 859
10.e. Media Resources......Page 860
11. Glossary......Page 861
Section 5: Miscellaneous Surveillance......Page 862
1. Introduction......Page 863
2. Kinds and Variations......Page 864
Magnetic Surveillance Strips......Page 866
Detection of Magnetic Materials......Page 867
Magnetic Resonance Imaging......Page 868
Magnetic Sensing and Common Sense......Page 869
The 1700s and 1800s - Progress in Understanding Magnetism......Page 870
Pioneer Work in Magnetic Resonance......Page 871
The Evolution of Electronics......Page 872
Smart Cards......Page 873
Space Science......Page 874
Magnetometers......Page 875
Data Cards......Page 876
Measures of Magnetic Field Strength......Page 877
Magnetic Cards......Page 878
EAS......Page 879
Types of EAS Systems......Page 880
Access Monitoring and Data Tracking......Page 881
Electronic Article Surveillance......Page 882
Geophysical Sciences and Site Surveys......Page 883
Home, Business, and Vehicle Security......Page 884
Underwater Surveillance......Page 885
Theft and Tampering......Page 886
Electromagnetic and Magnetic Interference......Page 887
Electronic Article Surveillance......Page 888
Personal Information and Magnetic Profiling......Page 889
The Monitoring of Employees......Page 890
10.a. Organizations......Page 891
Journals......Page 892
10.c. Conferences and Workshops......Page 893
10.e. Media Resources......Page 894
11. Glossary......Page 895
1. Introduction......Page 896
2. Kinds and Variations......Page 897
Invisible Ink......Page 898
Decoding Methods......Page 899
4. Origins and Evolution......Page 901
The Elizabethan Age and Beyond......Page 903
Technology and Cryptology......Page 904
World War I......Page 908
America After World War I......Page 910
The War on the British Front......Page 911
Computers, Electronics, and Cryptology......Page 912
The 1990s - Secure Communications and Controversy......Page 913
Encryption’s Soft Underbelly......Page 914
Data Security and International Software Export Regulations......Page 915
Export Regulations Adjustments......Page 916
Effectiveness of Encryption......Page 917
Discerning Message Contents......Page 918
Cryptanalysis Strategy......Page 919
Data Encryption Approaches......Page 920
The Human Element......Page 923
8. Restrictions and Regulations......Page 924
9. Implications of Use......Page 926
10.a. Organizations......Page 927
10.b. Print......Page 928
Articles......Page 929
Journals......Page 930
10.d. Online Sites......Page 931
11. Glossary......Page 933
1. Introduction......Page 935
Basic Terms and Concepts......Page 936
The Internet versus The Web......Page 938
Search in the Broader Context......Page 939
Using Good Tools......Page 941
Information-Gathering Strategy......Page 942
The Context of the Internet......Page 943
Language Considerations......Page 944
Surveillance in the Context of the Workplace......Page 945
Using Machines to Gather Data......Page 946
Development of Electronics......Page 947
The Early History of Practical Computers......Page 948
Innovative Ideas......Page 949
Microcomputer Electronics......Page 950
The 1990s - Increasing Integration and Processing Capabilities......Page 951
5. Description and Functions......Page 952
5.b. Computerized Profiling......Page 953
5.d. Computer Processing......Page 954
Computer Spy Systems......Page 955
Computer Database Systems......Page 957
Wiretapping......Page 958
Workplace Surveillance with Computers......Page 959
Powerful Programs in the Wrong Hands......Page 960
10.a. Organizations......Page 961
Articles......Page 962
Journals......Page 963
10.d. Online Sites......Page 964
11. Glossary......Page 965