{"version":"1.0","provider_name":"Students Again","provider_url":"http:\/\/studentsagain.com\/home","author_name":"students","author_url":"http:\/\/studentsagain.com\/home\/author\/students\/","title":"Surveillance Technologies | Students Again","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"ekEqPxfDtq\"><a href=\"http:\/\/studentsagain.com\/home\/political-science\/surveillance-technologies\/\">Surveillance Technologies<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"http:\/\/studentsagain.com\/home\/political-science\/surveillance-technologies\/embed\/#?secret=ekEqPxfDtq\" width=\"600\" height=\"338\" title=\"&#8220;Surveillance Technologies&#8221; &#8212; Students Again\" data-secret=\"ekEqPxfDtq\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=http:\/\/studentsagain.com\/home\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"http:\/\/studentsagain.com\/home\/wp-content\/uploads\/2014\/04\/94403705_3cdc2febb4_surveillance.jpg","thumbnail_width":500,"thumbnail_height":375,"description":"Surveillance is a double-edged sword. On the one hand it is necessary for security, safety, and a multitude of other reasons. On the other, it is a sinister tool ripe for abuse. Surveillance intersects with peoples\u2019 lives in many ways. The three main intersections include in the workplace, as a consumer, and through the government. There are a number of surveillance techniques available to be used by these entities. These techniques are not mutually exclusive. However, certain techniques are more common to certain venues. Some of the more common techniques for each venue will be discussed. Surveillance is not restricted to any particular geographic location. Surveillance is commonly practiced around the globe to varying degrees."}