{"id":54,"date":"2014-04-02T01:28:46","date_gmt":"2014-04-02T01:28:46","guid":{"rendered":"http:\/\/studentsagain.com\/home\/?p=54"},"modified":"2014-04-09T20:17:10","modified_gmt":"2014-04-09T20:17:10","slug":"surveillance-technologies","status":"publish","type":"post","link":"http:\/\/studentsagain.com\/home\/political-science\/surveillance-technologies\/","title":{"rendered":"Surveillance Technologies"},"content":{"rendered":"<p><!--[if gte mso 9]><xml>\n<o:OfficeDocumentSettings>\n<o:TargetScreenSize>800x600<\/o:TargetScreenSize>\n<\/o:OfficeDocumentSettings>\n<\/xml><![endif]--><\/p>\n<p><!--[if gte mso 9]><xml>\n<w:WordDocument>\n<w:View>Normal<\/w:View>\n<w:Zoom>0<\/w:Zoom>\n<w:TrackMoves\/>\n<w:TrackFormatting\/>\n<w:PunctuationKerning\/>\n<w:ValidateAgainstSchemas\/>\n<w:SaveIfXMLInvalid>false<\/w:SaveIfXMLInvalid>\n<w:IgnoreMixedContent>false<\/w:IgnoreMixedContent>\n<w:AlwaysShowPlaceholderText>false<\/w:AlwaysShowPlaceholderText>\n<w:DoNotPromoteQF\/>\n<w:LidThemeOther>EN-US<\/w:LidThemeOther>\n<w:LidThemeAsian>X-NONE<\/w:LidThemeAsian>\n<w:LidThemeComplexScript>X-NONE<\/w:LidThemeComplexScript>\n<w:Compatibility>\n<w:BreakWrappedTables\/>\n<w:SnapToGridInCell\/>\n<w:WrapTextWithPunct\/>\n<w:UseAsianBreakRules\/>\n<w:DontGrowAutofit\/>\n<w:SplitPgBreakAndParaMark\/>\n<w:EnableOpenTypeKerning\/>\n<w:DontFlipMirrorIndents\/>\n<w:OverrideTableStyleHps\/>\n<\/w:Compatibility>\n<w:BrowserLevel>MicrosoftInternetExplorer4<\/w:BrowserLevel>\n<m:mathPr>\n<m:mathFont m:val=\"Cambria Math\"\/>\n<m:brkBin m:val=\"before\"\/>\n<m:brkBinSub m:val=\"&#45;-\"\/>\n<m:smallFrac m:val=\"off\"\/>\n<m:dispDef\/>\n<m:lMargin m:val=\"0\"\/>\n<m:rMargin m:val=\"0\"\/>\n<m:defJc m:val=\"centerGroup\"\/>\n<m:wrapIndent m:val=\"1440\"\/>\n<m:intLim m:val=\"subSup\"\/>\n<m:naryLim m:val=\"undOvr\"\/>\n<\/m:mathPr><\/w:WordDocument>\n<\/xml><![endif]--><!--[if gte mso 9]><xml>\n<w:LatentStyles DefLockedState=\"false\" DefUnhideWhenUsed=\"true\"\nDefSemiHidden=\"true\" DefQFormat=\"false\" DefPriority=\"99\"\nLatentStyleCount=\"267\">\n<w:LsdException Locked=\"false\" Priority=\"0\" SemiHidden=\"false\"\nUnhideWhenUsed=\"false\" QFormat=\"true\" Name=\"Normal\"\/>\n<w:LsdException Locked=\"false\" Priority=\"9\" SemiHidden=\"false\"\nUnhideWhenUsed=\"false\" QFormat=\"true\" Name=\"heading 1\"\/>\n<w:LsdException Locked=\"false\" Priority=\"9\" QFormat=\"true\" Name=\"heading 2\"\/>\n<w:LsdException Locked=\"false\" Priority=\"9\" QFormat=\"true\" Name=\"heading 3\"\/>\n<w:LsdException Locked=\"false\" Priority=\"9\" QFormat=\"true\" Name=\"heading 4\"\/>\n<w:LsdException Locked=\"false\" Priority=\"9\" QFormat=\"true\" Name=\"heading 5\"\/>\n<w:LsdException Locked=\"false\" Priority=\"9\" QFormat=\"true\" Name=\"heading 6\"\/>\n<w:LsdException Locked=\"false\" Priority=\"9\" QFormat=\"true\" Name=\"heading 7\"\/>\n<w:LsdException Locked=\"false\" Priority=\"9\" QFormat=\"true\" Name=\"heading 8\"\/>\n<w:LsdException Locked=\"false\" Priority=\"9\" QFormat=\"true\" Name=\"heading 9\"\/>\n<w:LsdException Locked=\"false\" Priority=\"39\" Name=\"toc 1\"\/>\n<w:LsdException Locked=\"false\" Priority=\"39\" Name=\"toc 2\"\/>\n<w:LsdException Locked=\"false\" Priority=\"39\" Name=\"toc 3\"\/>\n<w:LsdException Locked=\"false\" Priority=\"39\" Name=\"toc 4\"\/>\n<w:LsdException Locked=\"false\" Priority=\"39\" Name=\"toc 5\"\/>\n<w:LsdException Locked=\"false\" Priority=\"39\" Name=\"toc 6\"\/>\n<w:LsdException Locked=\"false\" Priority=\"39\" Name=\"toc 7\"\/>\n<w:LsdException Locked=\"false\" Priority=\"39\" Name=\"toc 8\"\/>\n<w:LsdException Locked=\"false\" Priority=\"39\" Name=\"toc 9\"\/>\n<w:LsdException Locked=\"false\" Priority=\"0\" Name=\"footnote text\"\/>\n<w:LsdException Locked=\"false\" Priority=\"35\" QFormat=\"true\" Name=\"caption\"\/>\n<w:LsdException Locked=\"false\" Priority=\"0\" Name=\"footnote reference\"\/>\n<w:LsdException Locked=\"false\" Priority=\"10\" SemiHidden=\"false\"\nUnhideWhenUsed=\"false\" QFormat=\"true\" Name=\"Title\"\/>\n<w:LsdException Locked=\"false\" Priority=\"0\" Name=\"Default Paragraph Font\"\/>\n<w:LsdException Locked=\"false\" Priority=\"11\" SemiHidden=\"false\"\nUnhideWhenUsed=\"false\" QFormat=\"true\" Name=\"Subtitle\"\/>\n<w:LsdException Locked=\"false\" Priority=\"22\" SemiHidden=\"false\"\nUnhideWhenUsed=\"false\" QFormat=\"true\" Name=\"Strong\"\/>\n<w:LsdException Locked=\"false\" Priority=\"20\" SemiHidden=\"false\"\nUnhideWhenUsed=\"false\" QFormat=\"true\" Name=\"Emphasis\"\/>\n<w:LsdException Locked=\"false\" Priority=\"59\" SemiHidden=\"false\"\nUnhideWhenUsed=\"false\" Name=\"Table Grid\"\/>\n<w:LsdException Locked=\"false\" UnhideWhenUsed=\"false\" Name=\"Placeholder Text\"\/>\n<w:LsdException Locked=\"false\" Priority=\"1\" SemiHidden=\"false\"\nUnhideWhenUsed=\"false\" QFormat=\"true\" Name=\"No Spacing\"\/>\n<w:LsdException Locked=\"false\" Priority=\"60\" SemiHidden=\"false\"\nUnhideWhenUsed=\"false\" Name=\"Light Shading\"\/>\n<w:LsdException Locked=\"false\" Priority=\"61\" SemiHidden=\"false\"\nUnhideWhenUsed=\"false\" Name=\"Light List\"\/>\n<w:LsdException Locked=\"false\" Priority=\"62\" SemiHidden=\"false\"\nUnhideWhenUsed=\"false\" Name=\"Light Grid\"\/>\n<w:LsdException Locked=\"false\" Priority=\"63\" SemiHidden=\"false\"\nUnhideWhenUsed=\"false\" Name=\"Medium Shading 1\"\/>\n<w:LsdException Locked=\"false\" Priority=\"64\" SemiHidden=\"false\"\nUnhideWhenUsed=\"false\" Name=\"Medium Shading 2\"\/>\n<w:LsdException Locked=\"false\" Priority=\"65\" SemiHidden=\"false\"\nUnhideWhenUsed=\"false\" Name=\"Medium List 1\"\/>\n<w:LsdException Locked=\"false\" Priority=\"66\" SemiHidden=\"false\"\nUnhideWhenUsed=\"false\" Name=\"Medium List 2\"\/>\n<w:LsdException Locked=\"false\" Priority=\"67\" SemiHidden=\"false\"\nUnhideWhenUsed=\"false\" Name=\"Medium Grid 1\"\/>\n<w:LsdException Locked=\"false\" Priority=\"68\" SemiHidden=\"false\"\nUnhideWhenUsed=\"false\" Name=\"Medium Grid 2\"\/>\n<w:LsdException Locked=\"false\" Priority=\"69\" SemiHidden=\"false\"\nUnhideWhenUsed=\"false\" Name=\"Medium Grid 3\"\/>\n<w:LsdException Locked=\"false\" Priority=\"70\" SemiHidden=\"false\"\nUnhideWhenUsed=\"false\" Name=\"Dark List\"\/>\n<w:LsdException Locked=\"false\" Priority=\"71\" SemiHidden=\"false\"\nUnhideWhenUsed=\"false\" Name=\"Colorful Shading\"\/>\n<w:LsdException Locked=\"false\" Priority=\"72\" SemiHidden=\"false\"\nUnhideWhenUsed=\"false\" Name=\"Colorful List\"\/>\n<w:LsdException Locked=\"false\" Priority=\"73\" SemiHidden=\"false\"\nUnhideWhenUsed=\"false\" Name=\"Colorful Grid\"\/>\n<w:LsdException Locked=\"false\" Priority=\"60\" SemiHidden=\"false\"\nUnhideWhenUsed=\"false\" Name=\"Light Shading Accent 1\"\/>\n<w:LsdException Locked=\"false\" Priority=\"61\" SemiHidden=\"false\"\nUnhideWhenUsed=\"false\" Name=\"Light List Accent 1\"\/>\n<w:LsdException Locked=\"false\" Priority=\"62\" SemiHidden=\"false\"\nUnhideWhenUsed=\"false\" Name=\"Light Grid Accent 1\"\/>\n<w:LsdException Locked=\"false\" Priority=\"63\" SemiHidden=\"false\"\nUnhideWhenUsed=\"false\" Name=\"Medium Shading 1 Accent 1\"\/>\n<w:LsdException Locked=\"false\" Priority=\"64\" SemiHidden=\"false\"\nUnhideWhenUsed=\"false\" Name=\"Medium Shading 2 Accent 1\"\/>\n<w:LsdException Locked=\"false\" Priority=\"65\" SemiHidden=\"false\"\nUnhideWhenUsed=\"false\" Name=\"Medium List 1 Accent 1\"\/>\n<w:LsdException Locked=\"false\" UnhideWhenUsed=\"false\" Name=\"Revision\"\/>\n<w:LsdException Locked=\"false\" Priority=\"34\" SemiHidden=\"false\"\nUnhideWhenUsed=\"false\" QFormat=\"true\" Name=\"List Paragraph\"\/>\n<w:LsdException Locked=\"false\" Priority=\"29\" SemiHidden=\"false\"\nUnhideWhenUsed=\"false\" QFormat=\"true\" Name=\"Quote\"\/>\n<w:LsdException Locked=\"false\" Priority=\"30\" SemiHidden=\"false\"\nUnhideWhenUsed=\"false\" QFormat=\"true\" Name=\"Intense Quote\"\/>\n<w:LsdException Locked=\"false\" Priority=\"66\" SemiHidden=\"false\"\nUnhideWhenUsed=\"false\" Name=\"Medium List 2 Accent 1\"\/>\n<w:LsdException Locked=\"false\" Priority=\"67\" SemiHidden=\"false\"\nUnhideWhenUsed=\"false\" Name=\"Medium Grid 1 Accent 1\"\/>\n<w:LsdException Locked=\"false\" Priority=\"68\" SemiHidden=\"false\"\nUnhideWhenUsed=\"false\" Name=\"Medium Grid 2 Accent 1\"\/>\n<w:LsdException Locked=\"false\" Priority=\"69\" SemiHidden=\"false\"\nUnhideWhenUsed=\"false\" Name=\"Medium Grid 3 Accent 1\"\/>\n<w:LsdException Locked=\"false\" Priority=\"70\" SemiHidden=\"false\"\nUnhideWhenUsed=\"false\" Name=\"Dark List Accent 1\"\/>\n<w:LsdException Locked=\"false\" Priority=\"71\" SemiHidden=\"false\"\nUnhideWhenUsed=\"false\" Name=\"Colorful Shading Accent 1\"\/>\n<w:LsdException Locked=\"false\" Priority=\"72\" SemiHidden=\"false\"\nUnhideWhenUsed=\"false\" Name=\"Colorful List Accent 1\"\/>\n<w:LsdException Locked=\"false\" Priority=\"73\" SemiHidden=\"false\"\nUnhideWhenUsed=\"false\" Name=\"Colorful Grid Accent 1\"\/>\n<w:LsdException Locked=\"false\" Priority=\"60\" SemiHidden=\"false\"\nUnhideWhenUsed=\"false\" Name=\"Light Shading Accent 2\"\/>\n<w:LsdException Locked=\"false\" Priority=\"61\" SemiHidden=\"false\"\nUnhideWhenUsed=\"false\" Name=\"Light List Accent 2\"\/>\n<w:LsdException Locked=\"false\" Priority=\"62\" SemiHidden=\"false\"\nUnhideWhenUsed=\"false\" Name=\"Light Grid Accent 2\"\/>\n<w:LsdException Locked=\"false\" Priority=\"63\" SemiHidden=\"false\"\nUnhideWhenUsed=\"false\" Name=\"Medium Shading 1 Accent 2\"\/>\n<w:LsdException Locked=\"false\" Priority=\"64\" SemiHidden=\"false\"\nUnhideWhenUsed=\"false\" Name=\"Medium Shading 2 Accent 2\"\/>\n<w:LsdException Locked=\"false\" Priority=\"65\" SemiHidden=\"false\"\nUnhideWhenUsed=\"false\" Name=\"Medium List 1 Accent 2\"\/>\n<w:LsdException Locked=\"false\" Priority=\"66\" SemiHidden=\"false\"\nUnhideWhenUsed=\"false\" Name=\"Medium List 2 Accent 2\"\/>\n<w:LsdException Locked=\"false\" Priority=\"67\" SemiHidden=\"false\"\nUnhideWhenUsed=\"false\" Name=\"Medium Grid 1 Accent 2\"\/>\n<w:LsdException Locked=\"false\" Priority=\"68\" SemiHidden=\"false\"\nUnhideWhenUsed=\"false\" Name=\"Medium Grid 2 Accent 2\"\/>\n<w:LsdException Locked=\"false\" Priority=\"69\" SemiHidden=\"false\"\nUnhideWhenUsed=\"false\" Name=\"Medium Grid 3 Accent 2\"\/>\n<w:LsdException Locked=\"false\" Priority=\"70\" SemiHidden=\"false\"\nUnhideWhenUsed=\"false\" Name=\"Dark List Accent 2\"\/>\n<w:LsdException Locked=\"false\" Priority=\"71\" SemiHidden=\"false\"\nUnhideWhenUsed=\"false\" Name=\"Colorful Shading Accent 2\"\/>\n<w:LsdException Locked=\"false\" Priority=\"72\" SemiHidden=\"false\"\nUnhideWhenUsed=\"false\" Name=\"Colorful List Accent 2\"\/>\n<w:LsdException Locked=\"false\" Priority=\"73\" SemiHidden=\"false\"\nUnhideWhenUsed=\"false\" Name=\"Colorful Grid Accent 2\"\/>\n<w:LsdException Locked=\"false\" Priority=\"60\" SemiHidden=\"false\"\nUnhideWhenUsed=\"false\" Name=\"Light Shading Accent 3\"\/>\n<w:LsdException Locked=\"false\" Priority=\"61\" SemiHidden=\"false\"\nUnhideWhenUsed=\"false\" Name=\"Light List Accent 3\"\/>\n<w:LsdException Locked=\"false\" Priority=\"62\" SemiHidden=\"false\"\nUnhideWhenUsed=\"false\" Name=\"Light Grid Accent 3\"\/>\n<w:LsdException Locked=\"false\" Priority=\"63\" SemiHidden=\"false\"\nUnhideWhenUsed=\"false\" Name=\"Medium Shading 1 Accent 3\"\/>\n<w:LsdException Locked=\"false\" Priority=\"64\" SemiHidden=\"false\"\nUnhideWhenUsed=\"false\" Name=\"Medium Shading 2 Accent 3\"\/>\n<w:LsdException Locked=\"false\" Priority=\"65\" SemiHidden=\"false\"\nUnhideWhenUsed=\"false\" Name=\"Medium List 1 Accent 3\"\/>\n<w:LsdException Locked=\"false\" Priority=\"66\" SemiHidden=\"false\"\nUnhideWhenUsed=\"false\" Name=\"Medium List 2 Accent 3\"\/>\n<w:LsdException Locked=\"false\" Priority=\"67\" SemiHidden=\"false\"\nUnhideWhenUsed=\"false\" Name=\"Medium Grid 1 Accent 3\"\/>\n<w:LsdException Locked=\"false\" Priority=\"68\" SemiHidden=\"false\"\nUnhideWhenUsed=\"false\" Name=\"Medium Grid 2 Accent 3\"\/>\n<w:LsdException Locked=\"false\" Priority=\"69\" SemiHidden=\"false\"\nUnhideWhenUsed=\"false\" Name=\"Medium Grid 3 Accent 3\"\/>\n<w:LsdException Locked=\"false\" Priority=\"70\" SemiHidden=\"false\"\nUnhideWhenUsed=\"false\" Name=\"Dark List Accent 3\"\/>\n<w:LsdException Locked=\"false\" Priority=\"71\" SemiHidden=\"false\"\nUnhideWhenUsed=\"false\" Name=\"Colorful Shading Accent 3\"\/>\n<w:LsdException Locked=\"false\" Priority=\"72\" SemiHidden=\"false\"\nUnhideWhenUsed=\"false\" Name=\"Colorful List Accent 3\"\/>\n<w:LsdException Locked=\"false\" Priority=\"73\" SemiHidden=\"false\"\nUnhideWhenUsed=\"false\" Name=\"Colorful Grid Accent 3\"\/>\n<w:LsdException Locked=\"false\" Priority=\"60\" SemiHidden=\"false\"\nUnhideWhenUsed=\"false\" Name=\"Light Shading Accent 4\"\/>\n<w:LsdException Locked=\"false\" Priority=\"61\" SemiHidden=\"false\"\nUnhideWhenUsed=\"false\" Name=\"Light List Accent 4\"\/>\n<w:LsdException Locked=\"false\" Priority=\"62\" SemiHidden=\"false\"\nUnhideWhenUsed=\"false\" Name=\"Light Grid Accent 4\"\/>\n<w:LsdException Locked=\"false\" Priority=\"63\" SemiHidden=\"false\"\nUnhideWhenUsed=\"false\" Name=\"Medium Shading 1 Accent 4\"\/>\n<w:LsdException Locked=\"false\" Priority=\"64\" SemiHidden=\"false\"\nUnhideWhenUsed=\"false\" Name=\"Medium Shading 2 Accent 4\"\/>\n<w:LsdException Locked=\"false\" Priority=\"65\" SemiHidden=\"false\"\nUnhideWhenUsed=\"false\" Name=\"Medium List 1 Accent 4\"\/>\n<w:LsdException Locked=\"false\" Priority=\"66\" SemiHidden=\"false\"\nUnhideWhenUsed=\"false\" Name=\"Medium List 2 Accent 4\"\/>\n<w:LsdException Locked=\"false\" Priority=\"67\" SemiHidden=\"false\"\nUnhideWhenUsed=\"false\" Name=\"Medium Grid 1 Accent 4\"\/>\n<w:LsdException Locked=\"false\" Priority=\"68\" SemiHidden=\"false\"\nUnhideWhenUsed=\"false\" Name=\"Medium Grid 2 Accent 4\"\/>\n<w:LsdException Locked=\"false\" Priority=\"69\" SemiHidden=\"false\"\nUnhideWhenUsed=\"false\" Name=\"Medium Grid 3 Accent 4\"\/>\n<w:LsdException Locked=\"false\" Priority=\"70\" SemiHidden=\"false\"\nUnhideWhenUsed=\"false\" Name=\"Dark List Accent 4\"\/>\n<w:LsdException Locked=\"false\" Priority=\"71\" SemiHidden=\"false\"\nUnhideWhenUsed=\"false\" Name=\"Colorful Shading Accent 4\"\/>\n<w:LsdException Locked=\"false\" Priority=\"72\" SemiHidden=\"false\"\nUnhideWhenUsed=\"false\" Name=\"Colorful List Accent 4\"\/>\n<w:LsdException Locked=\"false\" Priority=\"73\" SemiHidden=\"false\"\nUnhideWhenUsed=\"false\" Name=\"Colorful Grid Accent 4\"\/>\n<w:LsdException Locked=\"false\" Priority=\"60\" SemiHidden=\"false\"\nUnhideWhenUsed=\"false\" Name=\"Light Shading Accent 5\"\/>\n<w:LsdException Locked=\"false\" Priority=\"61\" SemiHidden=\"false\"\nUnhideWhenUsed=\"false\" Name=\"Light List Accent 5\"\/>\n<w:LsdException Locked=\"false\" Priority=\"62\" SemiHidden=\"false\"\nUnhideWhenUsed=\"false\" Name=\"Light Grid Accent 5\"\/>\n<w:LsdException Locked=\"false\" Priority=\"63\" SemiHidden=\"false\"\nUnhideWhenUsed=\"false\" Name=\"Medium Shading 1 Accent 5\"\/>\n<w:LsdException Locked=\"false\" Priority=\"64\" SemiHidden=\"false\"\nUnhideWhenUsed=\"false\" Name=\"Medium Shading 2 Accent 5\"\/>\n<w:LsdException Locked=\"false\" Priority=\"65\" SemiHidden=\"false\"\nUnhideWhenUsed=\"false\" Name=\"Medium List 1 Accent 5\"\/>\n<w:LsdException Locked=\"false\" Priority=\"66\" SemiHidden=\"false\"\nUnhideWhenUsed=\"false\" Name=\"Medium List 2 Accent 5\"\/>\n<w:LsdException Locked=\"false\" Priority=\"67\" SemiHidden=\"false\"\nUnhideWhenUsed=\"false\" Name=\"Medium Grid 1 Accent 5\"\/>\n<w:LsdException Locked=\"false\" Priority=\"68\" SemiHidden=\"false\"\nUnhideWhenUsed=\"false\" Name=\"Medium Grid 2 Accent 5\"\/>\n<w:LsdException Locked=\"false\" Priority=\"69\" SemiHidden=\"false\"\nUnhideWhenUsed=\"false\" Name=\"Medium Grid 3 Accent 5\"\/>\n<w:LsdException Locked=\"false\" Priority=\"70\" SemiHidden=\"false\"\nUnhideWhenUsed=\"false\" Name=\"Dark List Accent 5\"\/>\n<w:LsdException Locked=\"false\" Priority=\"71\" SemiHidden=\"false\"\nUnhideWhenUsed=\"false\" Name=\"Colorful Shading Accent 5\"\/>\n<w:LsdException Locked=\"false\" Priority=\"72\" SemiHidden=\"false\"\nUnhideWhenUsed=\"false\" Name=\"Colorful List Accent 5\"\/>\n<w:LsdException Locked=\"false\" Priority=\"73\" SemiHidden=\"false\"\nUnhideWhenUsed=\"false\" Name=\"Colorful Grid Accent 5\"\/>\n<w:LsdException Locked=\"false\" Priority=\"60\" SemiHidden=\"false\"\nUnhideWhenUsed=\"false\" Name=\"Light Shading Accent 6\"\/>\n<w:LsdException Locked=\"false\" Priority=\"61\" SemiHidden=\"false\"\nUnhideWhenUsed=\"false\" Name=\"Light List Accent 6\"\/>\n<w:LsdException Locked=\"false\" Priority=\"62\" SemiHidden=\"false\"\nUnhideWhenUsed=\"false\" Name=\"Light Grid Accent 6\"\/>\n<w:LsdException Locked=\"false\" Priority=\"63\" SemiHidden=\"false\"\nUnhideWhenUsed=\"false\" Name=\"Medium Shading 1 Accent 6\"\/>\n<w:LsdException Locked=\"false\" Priority=\"64\" SemiHidden=\"false\"\nUnhideWhenUsed=\"false\" Name=\"Medium Shading 2 Accent 6\"\/>\n<w:LsdException Locked=\"false\" Priority=\"65\" SemiHidden=\"false\"\nUnhideWhenUsed=\"false\" Name=\"Medium List 1 Accent 6\"\/>\n<w:LsdException Locked=\"false\" Priority=\"66\" SemiHidden=\"false\"\nUnhideWhenUsed=\"false\" Name=\"Medium List 2 Accent 6\"\/>\n<w:LsdException Locked=\"false\" Priority=\"67\" SemiHidden=\"false\"\nUnhideWhenUsed=\"false\" Name=\"Medium Grid 1 Accent 6\"\/>\n<w:LsdException Locked=\"false\" Priority=\"68\" SemiHidden=\"false\"\nUnhideWhenUsed=\"false\" Name=\"Medium Grid 2 Accent 6\"\/>\n<w:LsdException Locked=\"false\" Priority=\"69\" SemiHidden=\"false\"\nUnhideWhenUsed=\"false\" Name=\"Medium Grid 3 Accent 6\"\/>\n<w:LsdException Locked=\"false\" Priority=\"70\" SemiHidden=\"false\"\nUnhideWhenUsed=\"false\" Name=\"Dark List Accent 6\"\/>\n<w:LsdException Locked=\"false\" Priority=\"71\" SemiHidden=\"false\"\nUnhideWhenUsed=\"false\" Name=\"Colorful Shading Accent 6\"\/>\n<w:LsdException Locked=\"false\" Priority=\"72\" SemiHidden=\"false\"\nUnhideWhenUsed=\"false\" Name=\"Colorful List Accent 6\"\/>\n<w:LsdException Locked=\"false\" Priority=\"73\" SemiHidden=\"false\"\nUnhideWhenUsed=\"false\" Name=\"Colorful Grid Accent 6\"\/>\n<w:LsdException Locked=\"false\" Priority=\"19\" SemiHidden=\"false\"\nUnhideWhenUsed=\"false\" QFormat=\"true\" Name=\"Subtle Emphasis\"\/>\n<w:LsdException Locked=\"false\" Priority=\"21\" SemiHidden=\"false\"\nUnhideWhenUsed=\"false\" QFormat=\"true\" Name=\"Intense Emphasis\"\/>\n<w:LsdException Locked=\"false\" Priority=\"31\" SemiHidden=\"false\"\nUnhideWhenUsed=\"false\" QFormat=\"true\" Name=\"Subtle Reference\"\/>\n<w:LsdException Locked=\"false\" Priority=\"32\" SemiHidden=\"false\"\nUnhideWhenUsed=\"false\" QFormat=\"true\" Name=\"Intense Reference\"\/>\n<w:LsdException Locked=\"false\" Priority=\"33\" SemiHidden=\"false\"\nUnhideWhenUsed=\"false\" QFormat=\"true\" Name=\"Book Title\"\/>\n<w:LsdException Locked=\"false\" Priority=\"37\" Name=\"Bibliography\"\/>\n<w:LsdException Locked=\"false\" Priority=\"39\" QFormat=\"true\" Name=\"TOC Heading\"\/>\n<\/w:LatentStyles>\n<\/xml><![endif]--><!--[if !mso]><object classid=\"clsid:38481807-CA0E-42D2-BF39-B33AF135CC4D\" id=ieooui><\/object>\n\n\n\n<style>\nst1\\:*{behavior:url(#ieooui) }\n<\/style>\n\n<![endif]--><!--[if gte mso 10]>\n\n\n\n<style>\n \/* Style Definitions *\/\n table.MsoNormalTable\n\t{mso-style-name:\"Table Normal\";\n\tmso-tstyle-rowband-size:0;\n\tmso-tstyle-colband-size:0;\n\tmso-style-noshow:yes;\n\tmso-style-priority:99;\n\tmso-style-parent:\"\";\n\tmso-padding-alt:0in 5.4pt 0in 5.4pt;\n\tmso-para-margin:0in;\n\tmso-para-margin-bottom:.0001pt;\n\tmso-pagination:widow-orphan;\n\tfont-size:10.0pt;\n\tfont-family:\"Times New Roman\",\"serif\";}\n<\/style>\n\n<![endif]--><\/p>\n<p class=\"MsoNormal\" style=\"line-height: 200%;\"><span style=\"font-size: 11.0pt; line-height: 200%;\">Surveillance is a double-edged sword. On the one hand it is necessary for security, safety, and a multitude of other reasons. On the other, it is a sinister tool ripe for abuse. Surveillance intersects with peoples\u2019 lives in many ways. The three main intersections include in the workplace, as a consumer, and through the government. There are a number of surveillance techniques available to be used by these entities. These techniques are not mutually exclusive. However, certain techniques are more common to certain venues. Some of the more common techniques for each venue will be discussed. Surveillance is not restricted to any particular geographic location. Surveillance is commonly practiced around the globe to varying degrees. One of the countries that have higher rates of surveillance, Malaysia, and one that has a lower rate, Italy, will be explored. After a clear understanding of the current state of surveillance and surveillance techniques are presented an attempt to project into the future of the field will be discussed. All of this information will lead to possible implications that may be created as a result of the future state of surveillance. In the end, it should be obvious that surveillance serves many useful purposes, but seems to be heading towards an extreme throughout the world.<\/span><\/p>\n<p class=\"MsoNormal\" style=\"line-height: 200%;\"><span style=\"font-size: 11.0pt; line-height: 200%;\"><span style=\"mso-tab-count: 1;\">\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 <\/span>Businesses have increasingly been concerned with the activities of their employees. It is in any businesses best interest to maintain the highest level of efficiency in an effort to reach maximum profitability. Surveillance in the workplace can be used for many purposes including asset protection and dispute resolution. In an effort to achieve these goals, industry has gone to great lengths to implement many surveillance measures. Originally, workplace surveillance was mostly for the purpose of asset protection. However, an increased measure of surveillance was onset by the introduction of computers in the workplace. From that point in history it was important for employers to make sure their employees were actually using this new tool for work purposes. The increasing role of surveillance in the workplace has continued to reach new heights. Currently in the workplace there are five main types of surveillance of employees. First, employees are continuously monitored through their work computers and telephones. Computer monitoring is largely accomplished through the use of specialized software. Software of this type can enable employers to remotely view what an employee is viewing on their computer screen, can allow access to the contents of an employees hard drive, can monitor keystrokes (number of strokes and\/or keys pressed), can retrieve deleted data, can view e-mail messages, and monitor the amount of time an employees computer remains idle. Telephone monitoring is a little more legally complicated, but can usually be accomplished to some extent under the guise of quality control. Telephone usage is monitored via real-time listening (most difficult legally) or through the use of a pen register to record numbers dialed and length of calls.<a style=\"mso-footnote-id: ftn1;\" title=\"\" href=\"#_ftn1\" name=\"_ftnref1\"><span class=\"MsoFootnoteReference\"><span style=\"mso-special-character: footnote;\"><span class=\"MsoFootnoteReference\"><span style=\"font-size: 11.0pt; font-family: 'Times New Roman','serif'; mso-fareast-font-family: 'Times New Roman'; mso-ansi-language: EN-US; mso-fareast-language: EN-US; mso-bidi-language: AR-SA;\">[1]<\/span><\/span><\/span><\/span><\/a> Second, employers use video surveillance. Video cameras, both overt and covert, are commonly used in the workplace for asset protection. However, this type of surveillance is sometimes used to review employee productivity, aide in dispute resolution, and for tragedy prevention.<a style=\"mso-footnote-id: ftn2;\" title=\"\" href=\"#_ftn2\" name=\"_ftnref2\"><span class=\"MsoFootnoteReference\"><span style=\"mso-special-character: footnote;\"><span class=\"MsoFootnoteReference\"><span style=\"font-size: 11.0pt; font-family: 'Times New Roman','serif'; mso-fareast-font-family: 'Times New Roman'; mso-ansi-language: EN-US; mso-fareast-language: EN-US; mso-bidi-language: AR-SA;\">[2]<\/span><\/span><\/span><\/span><\/a> Third, employers commonly require DNA samples as a condition for employment. This is usually gathered through a urinalysis or a hair sample. The purpose of this DNA gathering is mostly to monitor for illegal drug use.<a style=\"mso-footnote-id: ftn3;\" title=\"\" href=\"#_ftn3\" name=\"_ftnref3\"><span class=\"MsoFootnoteReference\"><span style=\"mso-special-character: footnote;\"><span class=\"MsoFootnoteReference\"><span style=\"font-size: 11.0pt; font-family: 'Times New Roman','serif'; mso-fareast-font-family: 'Times New Roman'; mso-ansi-language: EN-US; mso-fareast-language: EN-US; mso-bidi-language: AR-SA;\">[3]<\/span><\/span><\/span><\/span><\/a> However, there have been cases where employers have used this to test for current medical conditions such as pregnancy. Fourth, employers are requiring employees to carry work access badges. These work badges may monitor the movement of employees inside the building and upon entrance or exit. The final main method of workplace surveillance is for employees that use company vehicles. Many companies are outfitting their vehicles with Global Positioning Systems (GPS).<a style=\"mso-footnote-id: ftn4;\" title=\"\" href=\"#_ftn4\" name=\"_ftnref4\"><span class=\"MsoFootnoteReference\"><span style=\"mso-special-character: footnote;\"><span class=\"MsoFootnoteReference\"><span style=\"font-size: 11.0pt; font-family: 'Times New Roman','serif'; mso-fareast-font-family: 'Times New Roman'; mso-ansi-language: EN-US; mso-fareast-language: EN-US; mso-bidi-language: AR-SA;\">[4]<\/span><\/span><\/span><\/span><\/a> These GPS systems are fairly sophisticated with the ability for an employer to view the vehicles movement on computerized maps. <\/span><\/p>\n<p class=\"MsoNormal\" style=\"line-height: 200%;\"><span style=\"font-size: 11.0pt; line-height: 200%;\"><span style=\"mso-tab-count: 1;\">\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 <\/span>Surveillance of the average citizen is being performed by governments. This is accomplished through actively seeking information on citizens or through \u201cthe creation of junctures in life where citizens have no choice but to identify and document themselves\u201d<a style=\"mso-footnote-id: ftn5;\" title=\"\" href=\"#_ftn5\" name=\"_ftnref5\"><span class=\"MsoFootnoteReference\"><span style=\"mso-special-character: footnote;\"><span class=\"MsoFootnoteReference\"><span style=\"font-size: 11.0pt; font-family: 'Times New Roman','serif'; mso-fareast-font-family: 'Times New Roman'; mso-ansi-language: EN-US; mso-fareast-language: EN-US; mso-bidi-language: AR-SA;\">[5]<\/span><\/span><\/span><\/span><\/a>. Surveillance that focuses on the \u201cjunctures in life\u201d is so ingrained into societies that it goes unnoticed. Examples of this type of surveillance include things that are usually considered common everyday activities that are documented. Governments documents marriages, deaths, births, property ownership, taxes levied, issued passports, issued drivers licenses, and issued social security cards<a style=\"mso-footnote-id: ftn6;\" title=\"\" href=\"#_ftn6\" name=\"_ftnref6\"><span class=\"MsoFootnoteReference\"><span style=\"mso-special-character: footnote;\"><span class=\"MsoFootnoteReference\"><span style=\"font-size: 11.0pt; font-family: 'Times New Roman','serif'; mso-fareast-font-family: 'Times New Roman'; mso-ansi-language: EN-US; mso-fareast-language: EN-US; mso-bidi-language: AR-SA;\">[6]<\/span><\/span><\/span><\/span><\/a>. All of these documents are integrated into the system of society are made to be necessary for one purpose or another. However, they also are solid government record snapshots of people\u2019s lives ranging from birth to death. A government actively seeking information on their citizens is usually more secretive. This may take the form of electronic eavesdropping, searching library records, reviewing cellular phone logs, or obtaining medical records. One example of a highly secretive mechanism for actively seeking information is Project ECHELON. Project ECHELON is believed to be a data interception tool run by the National Security Agency (NSA). This project is headed by the United States of America in conjunction with the governments of the United Kingdom, Australia, Canada, and New Zealand. This project is constructed by strategically placed satellites and satellite interception stations. It has been speculated that Project ECHELON has the capability to monitor cellular phone traffic, ground telephone line chats and faxes, telexes and satellite communications links, and e-mail on a global scope for further processing.<a style=\"mso-footnote-id: ftn7;\" title=\"\" href=\"#_ftn7\" name=\"_ftnref7\"><span class=\"MsoFootnoteReference\"><span style=\"mso-special-character: footnote;\"><span class=\"MsoFootnoteReference\"><span style=\"font-size: 11.0pt; font-family: 'Times New Roman','serif'; mso-fareast-font-family: 'Times New Roman'; mso-ansi-language: EN-US; mso-fareast-language: EN-US; mso-bidi-language: AR-SA;\">[7]<\/span><\/span><\/span><\/span><\/a><\/span><\/p>\n<p class=\"MsoNormal\" style=\"line-height: 200%;\"><span style=\"font-size: 11.0pt; line-height: 200%;\"><span style=\"mso-tab-count: 1;\">\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 <\/span><span style=\"mso-spacerun: yes;\">\u00a0<\/span>As a consumer, people are subject to the surveillance practices of corporations. The surveillance camera is commonplace in many shopping areas. However, this technology has increased in sophistication for use by retailers. For example, some systems have the ability to create color-coded outlines of a person\u2019s image on the surveillance monitor if they remain in one location for a specified period of time. Data mining is the other major surveillance tool aimed at consumers. Corporations make the argument that this surveillance is performed to provide customers with the desired consumer experience. Others argue that \u201cconsumers are [the] subject of efforts aimed at directing their buying behavior and educating them in consumer skills\u201d<a style=\"mso-footnote-id: ftn8;\" title=\"\" href=\"#_ftn8\" name=\"_ftnref8\"><span class=\"MsoFootnoteReference\"><span style=\"mso-special-character: footnote;\"><span class=\"MsoFootnoteReference\"><span style=\"font-size: 11.0pt; font-family: 'Times New Roman','serif'; mso-fareast-font-family: 'Times New Roman'; mso-ansi-language: EN-US; mso-fareast-language: EN-US; mso-bidi-language: AR-SA;\">[8]<\/span><\/span><\/span><\/span><\/a>. The commercial data industry is a global multi-billion dollar business. Traditionally, data mining was used for one of the two previously mentioned purposes by \u201ccombining socio-economic with geo-demographic data\u201d<a style=\"mso-footnote-id: ftn9;\" title=\"\" href=\"#_ftn9\" name=\"_ftnref9\"><span class=\"MsoFootnoteReference\"><span style=\"mso-special-character: footnote;\"><span class=\"MsoFootnoteReference\"><span style=\"font-size: 11.0pt; font-family: 'Times New Roman','serif'; mso-fareast-font-family: 'Times New Roman'; mso-ansi-language: EN-US; mso-fareast-language: EN-US; mso-bidi-language: AR-SA;\">[9]<\/span><\/span><\/span><\/span><\/a>. In modern times, some of this information is obtained through major credit reporting agencies. Some of the data that is collect through this method is highly controversial: \u201csuch reports, containing names, addresses, Social Security numbers, and credit history, [etc.]\u201d<a style=\"mso-footnote-id: ftn10;\" title=\"\" href=\"#_ftn10\" name=\"_ftnref10\"><span class=\"MsoFootnoteReference\"><span style=\"mso-special-character: footnote;\"><span class=\"MsoFootnoteReference\"><span style=\"font-size: 11.0pt; font-family: 'Times New Roman','serif'; mso-fareast-font-family: 'Times New Roman'; mso-ansi-language: EN-US; mso-fareast-language: EN-US; mso-bidi-language: AR-SA;\">[10]<\/span><\/span><\/span><\/span><\/a>. Many have argued that valid reasons for corporations obtaining Social Security and driver\u2019s license numbers for the purpose of better serving their customers is ludicrous. <\/span><\/p>\n<p class=\"MsoNormal\" style=\"line-height: 200%;\"><span style=\"font-size: 11.0pt; line-height: 200%;\"><span style=\"mso-tab-count: 1;\">\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 <\/span>Surveillance trends around the globe vary widely. For the most part, the same technologies are available for use by any country. The only constraints that occur are legal, financial, or technological know-how. To give examples of the range of surveillance trends around the globe a country with severe restrictions (Malaysia) and a country with more personal protections against intrusion (Italy) will be explored. However, it should be noted that there are virtually no countries that are the polar opposite of severe restrictions. <\/span><\/p>\n<p class=\"MsoNormal\" style=\"line-height: 200%;\"><span style=\"font-size: 11.0pt; line-height: 200%;\"><span style=\"mso-tab-count: 1;\">\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 <\/span>Malaysia is one of the worst countries in terms of being a surveillance society. The constitution of Malaysia does not specifically recognize a right to privacy, but does include a conclusive list of fundamental rights. These fundamental rights include freedom of speech, assembly, and movement. These fundamental rights were implemented in 1956 resulting from the treat of Communist influence. However, in resent years the government has effectively reduced the effectiveness of these fundamental rights by law or practice in the name of anti-terrorism. Data protection is currently wishful thinking in Malaysia. A Personal Data Protection Bill has repeatedly been introduced to the Malaysian Parliament since 1998 and has yet to be adopted. One of Malaysia\u2019s most controversial laws is the Internal Security Act (ISA). The ISA allows police to enter homes and conduct searches in the name of national security without a warrant. Judicial review of arrest made under ISA is limited. In this case, authorities are not required to produce evidence or detailed charges. Police regularly use the ISA to search homes and to make seizures, monitor conversations, and take persons into custody without a warrant. Persons arrested under ISA can be held for sixty days without being charged. However, the internal security minister can extend detention for up to two years, renewable indefinitely. In addition, the ISA does not require that detainees be informed of the accusations against them or that they have the right make an appeal to the advisory board every six months. Other laws with implications for privacy include the Anti-Corruption Act, the Companies Act, and the Penal Code. The Anti-Corruption Act empowers the Attorney General to authorize the interception of any messages sent or received through any means of communication and wiretapping of telephones in corruption investigations. The Companies Act grants the Registrar of Companies broad powers to block or disband organizations deemed to threaten to national security or the national interest. This authority has been used to prevent international human rights organizations from establishing domestic operations. Section 509 of the Penal Code provides criminal penalties for insulting \u201cthe modesty of any person or intruding upon the privacy of any person by uttering any word, sound or gesture, or exhibiting any object, intending that such word or sound shall be heard, or that such gesture or object shall be seen by such person.\u201d A new anti-terrorism amendment to the Penal Code gives the government broader authority to secretly install surveillance devices on private property. Most government agencies plan to implement Oracle Corporation\u2019s citizen data hub. This database would include information on individuals including background, <\/span><span style=\"font-size: 11.0pt; line-height: 200%;\"><span style=\"font-size: 11.0pt; line-height: 200%;\"><img decoding=\"async\" class=\"alignright\" title=\"Flags at the UN by WorldIslandInfo.com\" alt=\"UN flags photo\" src=\"http:\/\/studentsagain.com\/home\/wp-content\/uploads\/2014\/04\/383337161_2cf2d2290f_m_UN-flags.jpg\" \/><\/span>educational achievements, and health records. In 2005, the government began implementing a biometric system to keep records of foreigners in the country. In 2004, the government decided to install closed circuit television (CCTV) cameras in major cities. Currently, additional temporary cameras are being installed in less populated areas. In 1999, Malaysia was one of the first countries in the world to use a chip-based identification card that is also a multipurpose smart card. The card, named MyKad, incorporates both photo identification and fingerprint biometric technology. MyKad currently has seven functions other than mere identification: driver&#8217;s license, passport information, health information, e-cash function, toll payment, automated teller machine, and public key infrastructure. Rights pertaining to freedom of information do not exist in Malaysia. Due to the absence of this right, the government has sometimes directly restricted the release of information deemed embarrassing or prejudicial to national interests. For example, the government has had a policy of prohibiting public disclosure of air pollution readings and deaths due to dengue fever.<a style=\"mso-footnote-id: ftn11;\" title=\"\" href=\"#_ftn11\" name=\"_ftnref11\"><span class=\"MsoFootnoteReference\"><span style=\"mso-special-character: footnote;\"><span class=\"MsoFootnoteReference\"><span style=\"font-size: 11.0pt; font-family: 'Times New Roman','serif'; mso-fareast-font-family: 'Times New Roman'; mso-ansi-language: EN-US; mso-fareast-language: EN-US; mso-bidi-language: AR-SA;\">[11]<\/span><\/span><\/span><\/span><\/a><\/span><\/p>\n<p class=\"MsoNormal\" style=\"line-height: 200%;\"><span style=\"font-size: 11.0pt; line-height: 200%;\"><span style=\"mso-tab-count: 1;\">\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 <\/span>Italy is in the middle of the road when it comes to a surveillance society. The Italian Constitution, adopted in 1948, has several limited provisions relating to privacy. Article 14 states, &#8220;(1) Personal domicile is inviolable. (2) Inspection and search may not be carried out save in cases and in the manner laid down by law in conformity with guarantees prescribed for safeguarding personal freedom. (3) Special laws regulate verifications and inspections for reasons of public health and safety, or for economic and fiscal purposes.&#8221; Article 15 states, &#8220;(1) the liberty and secrecy of correspondence and of every form of communication are inviolable. (2) Limitations upon them may only be enforced by decision, for which motives must be given, of the judicial authorities with the guarantees laid down by law.&#8221; The Privacy Code relating to the protection of personal data was enacted by a Legislative Decree of 30 June 2003. The Code creates more protections for personal data. The Code consist of three sections with the first containing provisions dealing with the rules applicable to the processing of personal information in the public and private sector; the second dealing with &#8220;special requirements,&#8221; which would apply to specific sectors, such as debtors or the health sector; and the third concerning administrative and judicial issues. Violators of the Code may face harsh administrative or criminal penalties. Wiretapping is regulated by Articles 266-271 of the Penal Procedure Code and may only be authorized in the case of legal proceedings. Government interceptions of telephone and all other forms of communications must be approved by a court order. The law on computer crime includes penalties on interception of electronic communications. Interception orders are granted for 15 days at a time and can be extended for the same length of time by a judge. The judge also monitors procedures for storing recordings and transcripts. Any recordings or transcripts that are not used must be destroyed. The conversations of religious ministers, lawyers, doctors or others subject to professional confidentiality rules can not be intercepted. In light of these limited protections a number of abuses in communications surveillance have occurred. In 2005 the Italian police placed a backdoor into an Internet Service Providers (ISP) server, and monitored all transactions of the ISP\u2019s 30,000 subscribers. Another example includes Telecom Italy which collected thousands of files on stars and influential people.<a style=\"mso-footnote-id: ftn12;\" title=\"\" href=\"#_ftn12\" name=\"_ftnref12\"><span class=\"MsoFootnoteReference\"><span style=\"mso-special-character: footnote;\"><span class=\"MsoFootnoteReference\"><span style=\"font-size: 11.0pt; font-family: 'Times New Roman','serif'; mso-fareast-font-family: 'Times New Roman'; mso-ansi-language: EN-US; mso-fareast-language: EN-US; mso-bidi-language: AR-SA;\">[12]<\/span><\/span><\/span><\/span><\/a><\/span><\/p>\n<p class=\"MsoNormal\" style=\"line-height: 200%;\"><span style=\"font-size: 11.0pt; line-height: 200%;\"><span style=\"mso-tab-count: 1;\">\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 <\/span>Considering all of these future trends, what is the future of surveillance technologies? Given the inherently secretive nature of surveillance it is difficult to determine what is on the horizon, especially over the next thirty years. However, there are a few future surveillance technologies that are often mentioned. These future technologies often are the result of the miniaturization or improvement of current technologies.<\/span><\/p>\n<p class=\"MsoNormal\" style=\"line-height: 200%;\"><span style=\"font-size: 11.0pt; line-height: 200%;\"><span style=\"mso-tab-count: 1;\">\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 <\/span>One possible future surveillance technology is iris scanning capabilities. This technology is already possible for identity purposes. However, this technology is in its infancy. It remains limited in the sense that the subject must be relatively close to the scanner and must remain still. <span style=\"mso-spacerun: yes;\">\u00a0<\/span>In the future it has been speculated that iris scan will be used for a number of applications. An iris scanner may be more practical in the future by only requiring a light to be flashed in a subject\u2019s direction<a style=\"mso-footnote-id: ftn13;\" title=\"\" href=\"#_ftn13\" name=\"_ftnref13\"><span class=\"MsoFootnoteReference\"><span style=\"mso-special-character: footnote;\"><span class=\"MsoFootnoteReference\"><span style=\"font-size: 11.0pt; font-family: 'Times New Roman','serif'; mso-fareast-font-family: 'Times New Roman'; mso-ansi-language: EN-US; mso-fareast-language: EN-US; mso-bidi-language: AR-SA;\">[13]<\/span><\/span><\/span><\/span><\/a>. Once a scan is obtained the information available about that individual could be endless when instantly cross referencing an informational database. In a moments glance, the surveillance person administering the scan can know your personal information, criminal history, consumer habits, financial status, and the list goes on. <\/span><\/p>\n<p class=\"MsoNormal\" style=\"line-height: 200%;\"><span style=\"font-size: 11.0pt; line-height: 200%;\"><span style=\"mso-tab-count: 1;\">\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 <\/span>A future technology being explored is small flying surveillance devices. These devices may be as small as the tip of a person\u2019s finger. Due to their size, they may be able to fly around and collect data undetected not receiving any more attention that a flying insect.<a style=\"mso-footnote-id: ftn14;\" title=\"\" href=\"#_ftn14\" name=\"_ftnref14\"><span class=\"MsoFootnoteReference\"><span style=\"mso-special-character: footnote;\"><span class=\"MsoFootnoteReference\"><span style=\"font-size: 11.0pt; font-family: 'Times New Roman','serif'; mso-fareast-font-family: 'Times New Roman'; mso-ansi-language: EN-US; mso-fareast-language: EN-US; mso-bidi-language: AR-SA;\">[14]<\/span><\/span><\/span><\/span><\/a> <span style=\"mso-spacerun: yes;\">\u00a0<\/span>In fact, that is another possibility, cyborg insects. This possibility is being explored by researchers using moths. The idea is: 1) scientists harvest moth eggs 2) when it reaches the PUPA stage a scientist will implant a microchip into its thorax which will serve as the information hub for directional controls and external surveillance equipment. 3) a video camera, GPS system, and air sampler (to identify explosives signatures) are mounted to the adult moth. 4) The completed cyborg is operational at a range of one half mile.<a style=\"mso-footnote-id: ftn15;\" title=\"\" href=\"#_ftn15\" name=\"_ftnref15\"><span class=\"MsoFootnoteReference\"><span style=\"mso-special-character: footnote;\"><span class=\"MsoFootnoteReference\"><span style=\"font-size: 11.0pt; font-family: 'Times New Roman','serif'; mso-fareast-font-family: 'Times New Roman'; mso-ansi-language: EN-US; mso-fareast-language: EN-US; mso-bidi-language: AR-SA;\">[15]<\/span><\/span><\/span><\/span><\/a><\/span><\/p>\n<p class=\"MsoNormal\" style=\"line-height: 200%;\"><span style=\"font-size: 11.0pt; line-height: 200%;\"><span style=\"mso-tab-count: 1;\">\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 <\/span>Another surveillance technology poised for future development is Unmanned Aerial Vehicles (UAV). This can be used in a number of surveillance capacities from military to police use. These UAV would hover wirelessly in the sky monitoring everything below.<a style=\"mso-footnote-id: ftn16;\" title=\"\" href=\"#_ftn16\" name=\"_ftnref16\"><span class=\"MsoFootnoteReference\"><span style=\"mso-special-character: footnote;\"><span class=\"MsoFootnoteReference\"><span style=\"font-size: 11.0pt; font-family: 'Times New Roman','serif'; mso-fareast-font-family: 'Times New Roman'; mso-ansi-language: EN-US; mso-fareast-language: EN-US; mso-bidi-language: AR-SA;\">[16]<\/span><\/span><\/span><\/span><\/a><\/span><\/p>\n<p class=\"MsoNormal\" style=\"line-height: 200%;\"><span style=\"font-size: 11.0pt; line-height: 200%;\"><span style=\"mso-tab-count: 1;\">\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 <\/span>CCTV cameras are being studied and improved for the future. Some of these improvements include identification without a facial image. This type of CCTV camera will assess your height, weight, the way you walk, and other elements to instantly determine your identity. Another CCTV camera idea being explored is cameras that use radio waves to determine if anyone is on the other side of a wall. These types of cameras will even be able to determine your breathing and heart rates. It has even been speculated that these cameras will advance to the point of being able to read thoughts.<a style=\"mso-footnote-id: ftn17;\" title=\"\" href=\"#_ftn17\" name=\"_ftnref17\"><span class=\"MsoFootnoteReference\"><span style=\"mso-special-character: footnote;\"><span class=\"MsoFootnoteReference\"><span style=\"font-size: 11.0pt; font-family: 'Times New Roman','serif'; mso-fareast-font-family: 'Times New Roman'; mso-ansi-language: EN-US; mso-fareast-language: EN-US; mso-bidi-language: AR-SA;\">[17]<\/span><\/span><\/span><\/span><\/a><\/span><\/p>\n<p class=\"MsoNormal\" style=\"line-height: 200%;\"><span style=\"font-size: 11.0pt; line-height: 200%;\"><span style=\"mso-tab-count: 1;\">\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 <\/span>Radio-frequency identification (RFID) is another promising future surveillance tool. RFID is already being implemented in a number of ways. The main uses at this time are related to inventory management. The future idea of RFID is that everything and everyone will have an RFID tags embedded (subcutaneously, in clothes, in products, etc.). This embedded tag has a unique number association which will identify anything it is attached to. These tags can be so small that even if the traditional idea of using RFID is not accepted it could have future covert applications.<a style=\"mso-footnote-id: ftn18;\" title=\"\" href=\"#_ftn18\" name=\"_ftnref18\"><span class=\"MsoFootnoteReference\"><span style=\"mso-special-character: footnote;\"><span class=\"MsoFootnoteReference\"><span style=\"font-size: 11.0pt; font-family: 'Times New Roman','serif'; mso-fareast-font-family: 'Times New Roman'; mso-ansi-language: EN-US; mso-fareast-language: EN-US; mso-bidi-language: AR-SA;\">[18]<\/span><\/span><\/span><\/span><\/a><\/span><\/p>\n<p class=\"MsoNormal\" style=\"line-height: 200%;\"><span style=\"font-size: 11.0pt; line-height: 200%;\"><span style=\"mso-tab-count: 1;\">\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 <\/span>What are the implications of the development of all of this surveillance technology? The biggest argument is over security versus privacy. Americans tend to believe that privacy is an American concept. The truth is that privacy is a valued human right the world over.<a style=\"mso-footnote-id: ftn19;\" title=\"\" href=\"#_ftn19\" name=\"_ftnref19\"><span class=\"MsoFootnoteReference\"><span style=\"mso-special-character: footnote;\"><span class=\"MsoFootnoteReference\"><span style=\"font-size: 11.0pt; font-family: 'Times New Roman','serif'; mso-fareast-font-family: 'Times New Roman'; mso-ansi-language: EN-US; mso-fareast-language: EN-US; mso-bidi-language: AR-SA;\">[19]<\/span><\/span><\/span><\/span><\/a> Many constitutions have privacy provisions implemented in the text. Many other countries have privacy element established through case law. When the threshold of the people for the tolerance of <\/span><span style=\"font-size: 11.0pt; line-height: 200%;\"><span style=\"font-size: 11.0pt; line-height: 200%;\"><img decoding=\"async\" class=\"alignleft\" title=\"Cam\u00e9ra de vid\u00e9o-surveillance by zigazou76\" alt=\"surveillance photo\" src=\"http:\/\/studentsagain.com\/home\/wp-content\/uploads\/2014\/04\/7670892420_a9fcf496c6_m_surveillance.jpg\" \/><\/span>surveillance is crossed what may happen? One main implication can be linked to the judicial system. If surveillance succeeds in becoming so powerful the enforcement agencies, courts, and prisons may be overstretched to the point of uselessness. On the other hand, if public outcry over surveillance societies becomes dominate what may happen? This may lead to a breakdown in the whole social structure resulting in an anarchical movement. Unintended consequences are another serious impact of increased surveillance. For example, professional data mining companies are perfect targets for identity thieves. There are a number of other possible implications related to freedom, trust, choice, opportunity, and problem solving. The issue of most concern is where will it all end?<\/span><\/p>\n<p class=\"MsoNormal\" style=\"line-height: 200%;\"><span style=\"font-size: 11.0pt; line-height: 200%;\"><span style=\"mso-tab-count: 1;\">\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 <\/span>Given all of this information it should now be obvious that surveillance is heading towards an extreme that may be commonly abused to the detriment of mankind. Humans are already under surveillance in nearly every facet of their lives from birth to death. Yet, surveillance technologies are being explored to further the degree of monitoring. This is a trend around the world. Countries are increasing their surveillance practices from year to year that is leading to a bleak outcome for its citizenry. This trend provides a bevy of ammunition for possible negative implications in the future.<\/span><\/p>\n<p class=\"MsoNormal\" style=\"line-height: 200%; text-align: left;\" align=\"center\"><span style=\"font-size: 11.0pt; line-height: 200%;\">Works Cited<\/span><\/p>\n<p class=\"MsoNormal\" style=\"margin-left: .5in; text-indent: -.5in; line-height: 200%;\"><span style=\"font-size: 11.0pt; line-height: 200%;\">Cvrk, Luka. <span style=\"text-decoration: underline;\">Iris Scan Technology Sees Me Through My Eyes<\/span>. 24 Sep. 2007. Surveillance World. 10 Mar. 2008. &lt; http:\/\/www.surveillance-world.co.uk\/category\/in-the-future\/&gt;.<\/span><\/p>\n<p class=\"MsoNormal\" style=\"margin-left: .5in; text-indent: -.5in; line-height: 200%;\"><span style=\"font-size: 11.0pt; line-height: 200%;\">David, Lenord. <span style=\"text-decoration: underline;\">Project Echelon: Orbiting Big Brother?<\/span>. 21 Nov. 2001. Imaginova Corp. 19 Mar. 2008. &lt;http:\/\/www.space.com\/businesstechnology\/technology\/echelon_011121-1.html&gt;.<\/span><\/p>\n<p class=\"MsoNormal\" style=\"line-height: 200%;\"><span style=\"font-size: 11.0pt; line-height: 200%;\">Lane III, Frederick S. <span style=\"text-decoration: underline;\">The Naked Employee<\/span>. New York: AMACOM, 2003.<\/span><\/p>\n<p class=\"MsoNormal\" style=\"line-height: 200%;\"><span style=\"font-size: 11.0pt; line-height: 200%;\">Lyon, David. <span style=\"text-decoration: underline;\">The Electronic Eye<\/span>. Minneapolis: University of Minnesota Press, 1994.<\/span><\/p>\n<p class=\"MsoNormal\" style=\"margin-left: .5in; text-indent: -.5in; line-height: 200%;\"><span style=\"font-size: 11.0pt; line-height: 200%;\">Millar, Megan. \u201cThe Cyborgs Are Coming!.\u201d <span style=\"text-decoration: underline;\">Outside Magazine<\/span>. Jan. 2008.<\/span><\/p>\n<p class=\"MsoNormal\" style=\"margin-left: .5in; text-indent: -.5in; line-height: 200%;\"><span style=\"font-size: 11.0pt; line-height: 200%;\">N.A. <span style=\"text-decoration: underline;\">Employee Monitoring: Is There Privacy In The Workplace?<\/span>. Feb. 2006. Privacy Rights Clearinghouse \/ UCAN. 17 Mar. 2008. &lt;http:\/\/www.privacyrights.org\/FS\/fs7-work.htm&gt;.<\/span><\/p>\n<p class=\"MsoNormal\" style=\"margin-left: .5in; text-indent: -.5in; line-height: 200%;\"><span style=\"font-size: 11.0pt; line-height: 200%;\">N.A. <span style=\"text-decoration: underline;\">PHR2006 \u2013 Malaysia<\/span>. 18 Dec. 2007. Privacy International. 24 Mar. 2008. &lt; http:\/\/www.privacyinternational.org\/article.shtml?cmd[347]=x-347-559517&gt;.<\/span><\/p>\n<p class=\"MsoNormal\" style=\"margin-left: .5in; text-indent: -.5in; line-height: 200%;\"><span style=\"font-size: 11.0pt; line-height: 200%;\">N.A. <span style=\"text-decoration: underline;\">PHR2006 \u2013 Italian Republic<\/span>. 18 Dec. 2007. Privacy International. 24 Mar. 2008. &lt; http:\/\/www.privacyinternational.org\/article.shtml?cmd[347]=x-347-559525&gt;.<\/span><\/p>\n<p class=\"MsoNormal\" style=\"margin-left: .5in; text-indent: -.5in; line-height: 200%;\"><span style=\"font-size: 11.0pt; line-height: 200%;\">N.A. <span style=\"text-decoration: underline;\">World\u2019s Smallest and Thinnest RFID Tag is Powder Made By Hitachi<\/span>. 24 Mar. 2008. Digitaljournal.com. 31 Oct. 2007. &lt; http:\/\/www.digitaljournal.com\/article\/244321\/World_s_smallest_and_thinnest_RFID_tag_is_powder_made_by_Hitachi&gt;.<\/span><\/p>\n<p class=\"MsoNormal\" style=\"margin-left: .5in; text-indent: -.5in; line-height: 200%;\"><span style=\"font-size: 11.0pt; line-height: 200%;\">Polmar, Norman. <span style=\"text-decoration: underline;\">Army Embarks On Ambitious UAV Plan<\/span>. 19 Mar. 2008 Military Advantage. 19 Mar. 2008. &lt;http:\/\/www.military.com\/soldiertech\/0,14632,Soldiertech_MAV,,00.html&gt;.<\/span><\/p>\n<p class=\"MsoNormal\" style=\"line-height: 200%;\"><span style=\"font-size: 11.0pt; line-height: 200%;\">Rule, James B. <span style=\"text-decoration: underline;\">Privacy In Peril<\/span>. New York: Oxford University Press, 2007.<\/span><\/p>\n<p class=\"MsoNormal\" style=\"margin-left: .5in; text-indent: -.5in; line-height: 200%;\"><span style=\"font-size: 11.0pt; line-height: 200%;\">Weiss, Rick. \u201cDragon Fly or Insect Spy? Scientists At Work On Robobugs.\u201d <span style=\"text-decoration: underline;\">Washington<\/span><span style=\"text-decoration: underline;\"> Post<\/span> 9 Oct. 2007, A03.<\/span><\/p>\n<p class=\"MsoNormal\" style=\"margin-left: .5in; text-indent: -.5in; line-height: 200%;\"><span style=\"font-size: 11.0pt; line-height: 200%;\">Years, Stephen. <span style=\"text-decoration: underline;\">Future Surveillance Technology Can Tell How You Feel<\/span>. 17 Sept. 2007. Futurismic. 24 Mar. 2008. &lt; http:\/\/futurismic.com\/2007\/09\/17\/future-surveillance-technology-can-tell-how-you-feel\/&gt;.<\/span><\/p>\n<div style=\"mso-element: footnote-list;\"><br clear=\"all\" \/><\/p>\n<hr align=\"left\" size=\"1\" width=\"33%\" \/>\n<div id=\"ftn1\" style=\"mso-element: footnote;\">\n<p class=\"MsoFootnoteText\"><a style=\"mso-footnote-id: ftn1;\" title=\"\" href=\"#_ftnref1\" name=\"_ftn1\"><span class=\"MsoFootnoteReference\"><span style=\"mso-special-character: footnote;\"><span class=\"MsoFootnoteReference\"><span style=\"font-size: 10.0pt; font-family: 'Times New Roman','serif'; mso-fareast-font-family: 'Times New Roman'; mso-ansi-language: EN-US; mso-fareast-language: EN-US; mso-bidi-language: AR-SA;\">[1]<\/span><\/span><\/span><\/span><\/a> N.A. <span style=\"text-decoration: underline;\">Employee Monitoring: Is There Privacy In The Workplace?<\/span>.<\/p>\n<\/div>\n<div id=\"ftn2\" style=\"mso-element: footnote;\">\n<p class=\"MsoFootnoteText\"><a style=\"mso-footnote-id: ftn2;\" title=\"\" href=\"#_ftnref2\" name=\"_ftn2\"><span class=\"MsoFootnoteReference\"><span style=\"mso-special-character: footnote;\"><span class=\"MsoFootnoteReference\"><span style=\"font-size: 10.0pt; font-family: 'Times New Roman','serif'; mso-fareast-font-family: 'Times New Roman'; mso-ansi-language: EN-US; mso-fareast-language: EN-US; mso-bidi-language: AR-SA;\">[2]<\/span><\/span><\/span><\/span><\/a> Lane III, <span style=\"text-decoration: underline;\">The Naked <\/span>Employee, 16 \u2013 20.<\/p>\n<\/div>\n<div id=\"ftn3\" style=\"mso-element: footnote;\">\n<p class=\"MsoFootnoteText\"><a style=\"mso-footnote-id: ftn3;\" title=\"\" href=\"#_ftnref3\" name=\"_ftn3\"><span class=\"MsoFootnoteReference\"><span style=\"mso-special-character: footnote;\"><span class=\"MsoFootnoteReference\"><span style=\"font-size: 10.0pt; font-family: 'Times New Roman','serif'; mso-fareast-font-family: 'Times New Roman'; mso-ansi-language: EN-US; mso-fareast-language: EN-US; mso-bidi-language: AR-SA;\">[3]<\/span><\/span><\/span><\/span><\/a> Ibid, 165 -79.<\/p>\n<\/div>\n<div id=\"ftn4\" style=\"mso-element: footnote;\">\n<p class=\"MsoFootnoteText\"><a style=\"mso-footnote-id: ftn4;\" title=\"\" href=\"#_ftnref4\" name=\"_ftn4\"><span class=\"MsoFootnoteReference\"><span style=\"mso-special-character: footnote;\"><span class=\"MsoFootnoteReference\"><span style=\"font-size: 10.0pt; font-family: 'Times New Roman','serif'; mso-fareast-font-family: 'Times New Roman'; mso-ansi-language: EN-US; mso-fareast-language: EN-US; mso-bidi-language: AR-SA;\">[4]<\/span><\/span><\/span><\/span><\/a> Ibid, ix.<\/p>\n<\/div>\n<div id=\"ftn5\" style=\"mso-element: footnote;\">\n<p class=\"MsoFootnoteText\"><a style=\"mso-footnote-id: ftn5;\" title=\"\" href=\"#_ftnref5\" name=\"_ftn5\"><span class=\"MsoFootnoteReference\"><span style=\"mso-special-character: footnote;\"><span class=\"MsoFootnoteReference\"><span style=\"font-size: 10.0pt; font-family: 'Times New Roman','serif'; mso-fareast-font-family: 'Times New Roman'; mso-ansi-language: EN-US; mso-fareast-language: EN-US; mso-bidi-language: AR-SA;\">[5]<\/span><\/span><\/span><\/span><\/a> Rule, <span style=\"text-decoration: underline;\">Privacy In Peril<\/span>, 58.<\/p>\n<\/div>\n<div id=\"ftn6\" style=\"mso-element: footnote;\">\n<p class=\"MsoFootnoteText\"><a style=\"mso-footnote-id: ftn6;\" title=\"\" href=\"#_ftnref6\" name=\"_ftn6\"><span class=\"MsoFootnoteReference\"><span style=\"mso-special-character: footnote;\"><span class=\"MsoFootnoteReference\"><span style=\"font-size: 10.0pt; font-family: 'Times New Roman','serif'; mso-fareast-font-family: 'Times New Roman'; mso-ansi-language: EN-US; mso-fareast-language: EN-US; mso-bidi-language: AR-SA;\">[6]<\/span><\/span><\/span><\/span><\/a> Ibid., 46 \u2013 48<\/p>\n<\/div>\n<div id=\"ftn7\" style=\"mso-element: footnote;\">\n<p class=\"MsoFootnoteText\"><a style=\"mso-footnote-id: ftn7;\" title=\"\" href=\"#_ftnref7\" name=\"_ftn7\"><span class=\"MsoFootnoteReference\"><span style=\"mso-special-character: footnote;\"><span class=\"MsoFootnoteReference\"><span style=\"font-size: 10.0pt; font-family: 'Times New Roman','serif'; mso-fareast-font-family: 'Times New Roman'; mso-ansi-language: EN-US; mso-fareast-language: EN-US; mso-bidi-language: AR-SA;\">[7]<\/span><\/span><\/span><\/span><\/a> David, Lenord. <span style=\"text-decoration: underline;\">Project Echelon: Orbiting Big Brother?<\/span>.<\/p>\n<\/div>\n<div id=\"ftn8\" style=\"mso-element: footnote;\">\n<p class=\"MsoFootnoteText\"><a style=\"mso-footnote-id: ftn8;\" title=\"\" href=\"#_ftnref8\" name=\"_ftn8\"><span class=\"MsoFootnoteReference\"><span style=\"mso-special-character: footnote;\"><span class=\"MsoFootnoteReference\"><span style=\"font-size: 10.0pt; font-family: 'Times New Roman','serif'; mso-fareast-font-family: 'Times New Roman'; mso-ansi-language: EN-US; mso-fareast-language: EN-US; mso-bidi-language: AR-SA;\">[8]<\/span><\/span><\/span><\/span><\/a> Lyon, 140.<\/p>\n<\/div>\n<div id=\"ftn9\" style=\"mso-element: footnote;\">\n<p class=\"MsoFootnoteText\"><a style=\"mso-footnote-id: ftn9;\" title=\"\" href=\"#_ftnref9\" name=\"_ftn9\"><span class=\"MsoFootnoteReference\"><span style=\"mso-special-character: footnote;\"><span class=\"MsoFootnoteReference\"><span style=\"font-size: 10.0pt; font-family: 'Times New Roman','serif'; mso-fareast-font-family: 'Times New Roman'; mso-ansi-language: EN-US; mso-fareast-language: EN-US; mso-bidi-language: AR-SA;\">[9]<\/span><\/span><\/span><\/span><\/a> Ibid., 142.<\/p>\n<\/div>\n<div id=\"ftn10\" style=\"mso-element: footnote;\">\n<p class=\"MsoFootnoteText\"><a style=\"mso-footnote-id: ftn10;\" title=\"\" href=\"#_ftnref10\" name=\"_ftn10\"><span class=\"MsoFootnoteReference\"><span style=\"mso-special-character: footnote;\"><span class=\"MsoFootnoteReference\"><span style=\"font-size: 10.0pt; font-family: 'Times New Roman','serif'; mso-fareast-font-family: 'Times New Roman'; mso-ansi-language: EN-US; mso-fareast-language: EN-US; mso-bidi-language: AR-SA;\">[10]<\/span><\/span><\/span><\/span><\/a> Ibid.<\/p>\n<\/div>\n<div id=\"ftn11\" style=\"mso-element: footnote;\">\n<p class=\"MsoFootnoteText\"><a style=\"mso-footnote-id: ftn11;\" title=\"\" href=\"#_ftnref11\" name=\"_ftn11\"><span class=\"MsoFootnoteReference\"><span style=\"mso-special-character: footnote;\"><span class=\"MsoFootnoteReference\"><span style=\"font-size: 10.0pt; font-family: 'Times New Roman','serif'; mso-fareast-font-family: 'Times New Roman'; mso-ansi-language: EN-US; mso-fareast-language: EN-US; mso-bidi-language: AR-SA;\">[11]<\/span><\/span><\/span><\/span><\/a> N.A. <span style=\"text-decoration: underline;\">PHR2006 \u2013 Malaysia<\/span>.<\/p>\n<\/div>\n<div id=\"ftn12\" style=\"mso-element: footnote;\">\n<p class=\"MsoFootnoteText\"><a style=\"mso-footnote-id: ftn12;\" title=\"\" href=\"#_ftnref12\" name=\"_ftn12\"><span class=\"MsoFootnoteReference\"><span style=\"mso-special-character: footnote;\"><span class=\"MsoFootnoteReference\"><span style=\"font-size: 10.0pt; font-family: 'Times New Roman','serif'; mso-fareast-font-family: 'Times New Roman'; mso-ansi-language: EN-US; mso-fareast-language: EN-US; mso-bidi-language: AR-SA;\">[12]<\/span><\/span><\/span><\/span><\/a> N.A. <span style=\"text-decoration: underline;\">PHR2006 \u2013 Italian Republic<\/span>.<\/p>\n<\/div>\n<div id=\"ftn13\" style=\"mso-element: footnote;\">\n<p class=\"MsoFootnoteText\"><a style=\"mso-footnote-id: ftn13;\" title=\"\" href=\"#_ftnref13\" name=\"_ftn13\"><span class=\"MsoFootnoteReference\"><span style=\"mso-special-character: footnote;\"><span class=\"MsoFootnoteReference\"><span style=\"font-size: 10.0pt; font-family: 'Times New Roman','serif'; mso-fareast-font-family: 'Times New Roman'; mso-ansi-language: EN-US; mso-fareast-language: EN-US; mso-bidi-language: AR-SA;\">[13]<\/span><\/span><\/span><\/span><\/a> Cvrk, Luka. <span style=\"text-decoration: underline;\">Iris Scan Technology Sees Me Through My Eyes<\/span>.<\/p>\n<\/div>\n<div id=\"ftn14\" style=\"mso-element: footnote;\">\n<p class=\"MsoFootnoteText\"><a style=\"mso-footnote-id: ftn14;\" title=\"\" href=\"#_ftnref14\" name=\"_ftn14\"><span class=\"MsoFootnoteReference\"><span style=\"mso-special-character: footnote;\"><span class=\"MsoFootnoteReference\"><span style=\"font-size: 10.0pt; font-family: 'Times New Roman','serif'; mso-fareast-font-family: 'Times New Roman'; mso-ansi-language: EN-US; mso-fareast-language: EN-US; mso-bidi-language: AR-SA;\">[14]<\/span><\/span><\/span><\/span><\/a> Weiss, Rick. \u201cDragon Fly or Insect Spy? Scientists At Work On Robobugs.\u201d<\/p>\n<\/div>\n<div id=\"ftn15\" style=\"mso-element: footnote;\">\n<p class=\"MsoFootnoteText\"><a style=\"mso-footnote-id: ftn15;\" title=\"\" href=\"#_ftnref15\" name=\"_ftn15\"><span class=\"MsoFootnoteReference\"><span style=\"mso-special-character: footnote;\"><span class=\"MsoFootnoteReference\"><span style=\"font-size: 10.0pt; font-family: 'Times New Roman','serif'; mso-fareast-font-family: 'Times New Roman'; mso-ansi-language: EN-US; mso-fareast-language: EN-US; mso-bidi-language: AR-SA;\">[15]<\/span><\/span><\/span><\/span><\/a> Millar, Megan. \u201cThe Cyborgs Are Coming!.\u201d<\/p>\n<\/div>\n<div id=\"ftn16\" style=\"mso-element: footnote;\">\n<p class=\"MsoFootnoteText\"><a style=\"mso-footnote-id: ftn16;\" title=\"\" href=\"#_ftnref16\" name=\"_ftn16\"><span class=\"MsoFootnoteReference\"><span style=\"mso-special-character: footnote;\"><span class=\"MsoFootnoteReference\"><span style=\"font-size: 10.0pt; font-family: 'Times New Roman','serif'; mso-fareast-font-family: 'Times New Roman'; mso-ansi-language: EN-US; mso-fareast-language: EN-US; mso-bidi-language: AR-SA;\">[16]<\/span><\/span><\/span><\/span><\/a> Polmar, Norman. <span style=\"text-decoration: underline;\">Army Embarks On Ambitious UAV Plan<\/span>.<\/p>\n<\/div>\n<div id=\"ftn17\" style=\"mso-element: footnote;\">\n<p class=\"MsoFootnoteText\"><a style=\"mso-footnote-id: ftn17;\" title=\"\" href=\"#_ftnref17\" name=\"_ftn17\"><span class=\"MsoFootnoteReference\"><span style=\"mso-special-character: footnote;\"><span class=\"MsoFootnoteReference\"><span style=\"font-size: 10.0pt; font-family: 'Times New Roman','serif'; mso-fareast-font-family: 'Times New Roman'; mso-ansi-language: EN-US; mso-fareast-language: EN-US; mso-bidi-language: AR-SA;\">[17]<\/span><\/span><\/span><\/span><\/a> Years, Stephen. <span style=\"text-decoration: underline;\">Future Surveillance Technology Can Tell How You Feel<\/span>.<\/p>\n<\/div>\n<div id=\"ftn18\" style=\"mso-element: footnote;\">\n<p class=\"MsoFootnoteText\"><a style=\"mso-footnote-id: ftn18;\" title=\"\" href=\"#_ftnref18\" name=\"_ftn18\"><span class=\"MsoFootnoteReference\"><span style=\"mso-special-character: footnote;\"><span class=\"MsoFootnoteReference\"><span style=\"font-size: 10.0pt; font-family: 'Times New Roman','serif'; mso-fareast-font-family: 'Times New Roman'; mso-ansi-language: EN-US; mso-fareast-language: EN-US; mso-bidi-language: AR-SA;\">[18]<\/span><\/span><\/span><\/span><\/a> N.A. <span style=\"text-decoration: underline;\">World\u2019s Smallest and Thinnest RFID Tag is Powder Made By Hitachi<\/span>.<\/p>\n<\/div>\n<div id=\"ftn19\" style=\"mso-element: footnote;\">\n<p class=\"MsoFootnoteText\"><a style=\"mso-footnote-id: ftn19;\" title=\"\" href=\"#_ftnref19\" name=\"_ftn19\"><span class=\"MsoFootnoteReference\"><span style=\"mso-special-character: footnote;\"><span class=\"MsoFootnoteReference\"><span style=\"font-size: 10.0pt; font-family: 'Times New Roman','serif'; mso-fareast-font-family: 'Times New Roman'; mso-ansi-language: EN-US; mso-fareast-language: EN-US; mso-bidi-language: AR-SA;\">[19]<\/span><\/span><\/span><\/span><\/a> Universal Declaration of Human Rights, Article 12.<\/p>\n<\/div>\n<\/div>\n<p><small>Photo by <a href=\"http:\/\/www.flickr.com\/photos\/92544710@N00\/94403705\" target=\"_blank\" data-wpel-link=\"external\" rel=\"nofollow external noopener noreferrer\" class=\"ext-link wpel-icon-right\">miss_rogue<span class=\"wpel-icon wpel-image wpel-icon-9\"><\/span><\/a> <a title=\"Attribution-ShareAlike License\" href=\"http:\/\/creativecommons.org\/licenses\/by-sa\/2.0\/\" target=\"_blank\" rel=\"nofollow external noopener noreferrer\" data-wpel-link=\"external\" class=\"ext-link\"><img decoding=\"async\" alt=\"\" src=\"http:\/\/studentsagain.com\/home\/wp-content\/plugins\/wp-inject\/images\/cc.png\" \/><\/a><\/small><\/p>\n<p><small>Photo by <a href=\"http:\/\/www.flickr.com\/photos\/38712296@N07\/7670892420\" target=\"_blank\" data-wpel-link=\"external\" rel=\"nofollow external noopener noreferrer\" class=\"ext-link wpel-icon-right\">zigazou76<span class=\"wpel-icon wpel-image wpel-icon-9\"><\/span><\/a> <a title=\"Attribution License\" href=\"http:\/\/creativecommons.org\/licenses\/by\/2.0\/\" target=\"_blank\" rel=\"nofollow external noopener noreferrer\" data-wpel-link=\"external\" class=\"ext-link\"><img decoding=\"async\" alt=\"\" src=\"http:\/\/studentsagain.com\/home\/wp-content\/plugins\/wp-inject\/images\/cc.png\" \/><\/a><\/small><\/p>\n<p><small>Photo by <a href=\"http:\/\/www.flickr.com\/photos\/76074333@N00\/383337161\" target=\"_blank\" data-wpel-link=\"external\" rel=\"nofollow external noopener noreferrer\" class=\"ext-link wpel-icon-right\">WorldIslandInfo.com<span class=\"wpel-icon wpel-image wpel-icon-9\"><\/span><\/a> <a title=\"Attribution License\" href=\"http:\/\/creativecommons.org\/licenses\/by\/2.0\/\" target=\"_blank\" rel=\"nofollow external noopener noreferrer\" data-wpel-link=\"external\" class=\"ext-link\"><img decoding=\"async\" alt=\"\" src=\"http:\/\/studentsagain.com\/home\/wp-content\/plugins\/wp-inject\/images\/cc.png\" \/><\/a><\/small><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Surveillance is a double-edged sword. On the one hand it is necessary for security, safety, and a multitude of other reasons. On the other, it is a sinister tool ripe for abuse. Surveillance intersects with peoples\u2019 lives in many ways. The three main intersections include in the workplace, as a consumer, and through the government. There are a number of surveillance techniques available to be used by these entities. These techniques are not mutually exclusive. However, certain techniques are more common to certain venues. Some of the more common techniques for each venue will be discussed. Surveillance is not restricted to any particular geographic location. Surveillance is commonly practiced around the globe to varying degrees.<br \/><a href=\"http:\/\/studentsagain.com\/home\/political-science\/surveillance-technologies\/\" class=\"more-link\" data-wpel-link=\"internal\">Continue reading&#8230;<\/a><\/p>\n","protected":false},"author":1,"featured_media":144,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[24,3],"tags":[27,59,26,29,56,30,55,28,25,73],"class_list":["post-54","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-global-futures","category-political-science","tag-act","tag-fiscal","tag-future","tag-future-surveillance-technology","tag-government","tag-in-the-workplace","tag-policy","tag-privacy","tag-surveillance","tag-system"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Surveillance Technologies | Students Again<\/title>\n<meta name=\"description\" content=\"Surveillance is a double-edged sword. On the one hand it is necessary for security, safety, and a multitude of other reasons. On the other, it is a sinister tool ripe for abuse. Surveillance intersects with peoples\u2019 lives in many ways. The three main intersections include in the workplace, as a consumer, and through the government. There are a number of surveillance techniques available to be used by these entities. These techniques are not mutually exclusive. However, certain techniques are more common to certain venues. Some of the more common techniques for each venue will be discussed. Surveillance is not restricted to any particular geographic location. Surveillance is commonly practiced around the globe to varying degrees.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"http:\/\/studentsagain.com\/home\/political-science\/surveillance-technologies\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Surveillance Technologies | Students Again\" \/>\n<meta property=\"og:description\" content=\"Surveillance is a double-edged sword. On the one hand it is necessary for security, safety, and a multitude of other reasons. On the other, it is a sinister tool ripe for abuse. Surveillance intersects with peoples\u2019 lives in many ways. The three main intersections include in the workplace, as a consumer, and through the government. There are a number of surveillance techniques available to be used by these entities. These techniques are not mutually exclusive. However, certain techniques are more common to certain venues. Some of the more common techniques for each venue will be discussed. Surveillance is not restricted to any particular geographic location. Surveillance is commonly practiced around the globe to varying degrees.\" \/>\n<meta property=\"og:url\" content=\"http:\/\/studentsagain.com\/home\/political-science\/surveillance-technologies\/\" \/>\n<meta property=\"og:site_name\" content=\"Students Again\" \/>\n<meta property=\"article:published_time\" content=\"2014-04-02T01:28:46+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2014-04-09T20:17:10+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/studentsagain.com\/home\/wp-content\/uploads\/2014\/04\/94403705_3cdc2febb4_surveillance.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"500\" \/>\n\t<meta property=\"og:image:height\" content=\"375\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"students\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"students\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"17 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"http:\/\/studentsagain.com\/home\/political-science\/surveillance-technologies\/#article\",\"isPartOf\":{\"@id\":\"http:\/\/studentsagain.com\/home\/political-science\/surveillance-technologies\/\"},\"author\":{\"name\":\"students\",\"@id\":\"http:\/\/studentsagain.com\/home\/#\/schema\/person\/ffef62fb0dd57ba585f3200ff949470f\"},\"headline\":\"Surveillance Technologies\",\"datePublished\":\"2014-04-02T01:28:46+00:00\",\"dateModified\":\"2014-04-09T20:17:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"http:\/\/studentsagain.com\/home\/political-science\/surveillance-technologies\/\"},\"wordCount\":3386,\"image\":{\"@id\":\"http:\/\/studentsagain.com\/home\/political-science\/surveillance-technologies\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/studentsagain.com\/home\/wp-content\/uploads\/2014\/04\/94403705_3cdc2febb4_surveillance.jpg\",\"keywords\":[\"act\",\"fiscal\",\"future\",\"future surveillance technology\",\"government\",\"in the workplace\",\"policy\",\"privacy\",\"surveillance\",\"system\"],\"articleSection\":[\"Global Futures\",\"Political Science\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"http:\/\/studentsagain.com\/home\/political-science\/surveillance-technologies\/\",\"url\":\"http:\/\/studentsagain.com\/home\/political-science\/surveillance-technologies\/\",\"name\":\"Surveillance Technologies | Students Again\",\"isPartOf\":{\"@id\":\"http:\/\/studentsagain.com\/home\/#website\"},\"primaryImageOfPage\":{\"@id\":\"http:\/\/studentsagain.com\/home\/political-science\/surveillance-technologies\/#primaryimage\"},\"image\":{\"@id\":\"http:\/\/studentsagain.com\/home\/political-science\/surveillance-technologies\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/studentsagain.com\/home\/wp-content\/uploads\/2014\/04\/94403705_3cdc2febb4_surveillance.jpg\",\"datePublished\":\"2014-04-02T01:28:46+00:00\",\"dateModified\":\"2014-04-09T20:17:10+00:00\",\"author\":{\"@id\":\"http:\/\/studentsagain.com\/home\/#\/schema\/person\/ffef62fb0dd57ba585f3200ff949470f\"},\"description\":\"Surveillance is a double-edged sword. On the one hand it is necessary for security, safety, and a multitude of other reasons. On the other, it is a sinister tool ripe for abuse. Surveillance intersects with peoples\u2019 lives in many ways. The three main intersections include in the workplace, as a consumer, and through the government. There are a number of surveillance techniques available to be used by these entities. These techniques are not mutually exclusive. However, certain techniques are more common to certain venues. Some of the more common techniques for each venue will be discussed. Surveillance is not restricted to any particular geographic location. Surveillance is commonly practiced around the globe to varying degrees.\",\"breadcrumb\":{\"@id\":\"http:\/\/studentsagain.com\/home\/political-science\/surveillance-technologies\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"http:\/\/studentsagain.com\/home\/political-science\/surveillance-technologies\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"http:\/\/studentsagain.com\/home\/political-science\/surveillance-technologies\/#primaryimage\",\"url\":\"http:\/\/studentsagain.com\/home\/wp-content\/uploads\/2014\/04\/94403705_3cdc2febb4_surveillance.jpg\",\"contentUrl\":\"http:\/\/studentsagain.com\/home\/wp-content\/uploads\/2014\/04\/94403705_3cdc2febb4_surveillance.jpg\",\"width\":500,\"height\":375},{\"@type\":\"BreadcrumbList\",\"@id\":\"http:\/\/studentsagain.com\/home\/political-science\/surveillance-technologies\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"http:\/\/studentsagain.com\/home\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Political Science\",\"item\":\"http:\/\/studentsagain.com\/home\/category\/political-science\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Global Futures\",\"item\":\"http:\/\/studentsagain.com\/home\/category\/political-science\/global-futures\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Surveillance Technologies\"}]},{\"@type\":\"WebSite\",\"@id\":\"http:\/\/studentsagain.com\/home\/#website\",\"url\":\"http:\/\/studentsagain.com\/home\/\",\"name\":\"Students Again\",\"description\":\"From Application To Graduation\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"http:\/\/studentsagain.com\/home\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"http:\/\/studentsagain.com\/home\/#\/schema\/person\/ffef62fb0dd57ba585f3200ff949470f\",\"name\":\"students\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Surveillance Technologies | Students Again","description":"Surveillance is a double-edged sword. On the one hand it is necessary for security, safety, and a multitude of other reasons. On the other, it is a sinister tool ripe for abuse. Surveillance intersects with peoples\u2019 lives in many ways. The three main intersections include in the workplace, as a consumer, and through the government. There are a number of surveillance techniques available to be used by these entities. These techniques are not mutually exclusive. However, certain techniques are more common to certain venues. Some of the more common techniques for each venue will be discussed. Surveillance is not restricted to any particular geographic location. Surveillance is commonly practiced around the globe to varying degrees.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"http:\/\/studentsagain.com\/home\/political-science\/surveillance-technologies\/","og_locale":"en_US","og_type":"article","og_title":"Surveillance Technologies | Students Again","og_description":"Surveillance is a double-edged sword. On the one hand it is necessary for security, safety, and a multitude of other reasons. On the other, it is a sinister tool ripe for abuse. Surveillance intersects with peoples\u2019 lives in many ways. The three main intersections include in the workplace, as a consumer, and through the government. There are a number of surveillance techniques available to be used by these entities. These techniques are not mutually exclusive. However, certain techniques are more common to certain venues. Some of the more common techniques for each venue will be discussed. Surveillance is not restricted to any particular geographic location. Surveillance is commonly practiced around the globe to varying degrees.","og_url":"http:\/\/studentsagain.com\/home\/political-science\/surveillance-technologies\/","og_site_name":"Students Again","article_published_time":"2014-04-02T01:28:46+00:00","article_modified_time":"2014-04-09T20:17:10+00:00","og_image":[{"width":500,"height":375,"url":"http:\/\/studentsagain.com\/home\/wp-content\/uploads\/2014\/04\/94403705_3cdc2febb4_surveillance.jpg","type":"image\/jpeg"}],"author":"students","twitter_misc":{"Written by":"students","Est. reading time":"17 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"http:\/\/studentsagain.com\/home\/political-science\/surveillance-technologies\/#article","isPartOf":{"@id":"http:\/\/studentsagain.com\/home\/political-science\/surveillance-technologies\/"},"author":{"name":"students","@id":"http:\/\/studentsagain.com\/home\/#\/schema\/person\/ffef62fb0dd57ba585f3200ff949470f"},"headline":"Surveillance Technologies","datePublished":"2014-04-02T01:28:46+00:00","dateModified":"2014-04-09T20:17:10+00:00","mainEntityOfPage":{"@id":"http:\/\/studentsagain.com\/home\/political-science\/surveillance-technologies\/"},"wordCount":3386,"image":{"@id":"http:\/\/studentsagain.com\/home\/political-science\/surveillance-technologies\/#primaryimage"},"thumbnailUrl":"http:\/\/studentsagain.com\/home\/wp-content\/uploads\/2014\/04\/94403705_3cdc2febb4_surveillance.jpg","keywords":["act","fiscal","future","future surveillance technology","government","in the workplace","policy","privacy","surveillance","system"],"articleSection":["Global Futures","Political Science"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"http:\/\/studentsagain.com\/home\/political-science\/surveillance-technologies\/","url":"http:\/\/studentsagain.com\/home\/political-science\/surveillance-technologies\/","name":"Surveillance Technologies | Students Again","isPartOf":{"@id":"http:\/\/studentsagain.com\/home\/#website"},"primaryImageOfPage":{"@id":"http:\/\/studentsagain.com\/home\/political-science\/surveillance-technologies\/#primaryimage"},"image":{"@id":"http:\/\/studentsagain.com\/home\/political-science\/surveillance-technologies\/#primaryimage"},"thumbnailUrl":"http:\/\/studentsagain.com\/home\/wp-content\/uploads\/2014\/04\/94403705_3cdc2febb4_surveillance.jpg","datePublished":"2014-04-02T01:28:46+00:00","dateModified":"2014-04-09T20:17:10+00:00","author":{"@id":"http:\/\/studentsagain.com\/home\/#\/schema\/person\/ffef62fb0dd57ba585f3200ff949470f"},"description":"Surveillance is a double-edged sword. On the one hand it is necessary for security, safety, and a multitude of other reasons. On the other, it is a sinister tool ripe for abuse. Surveillance intersects with peoples\u2019 lives in many ways. The three main intersections include in the workplace, as a consumer, and through the government. There are a number of surveillance techniques available to be used by these entities. These techniques are not mutually exclusive. However, certain techniques are more common to certain venues. Some of the more common techniques for each venue will be discussed. Surveillance is not restricted to any particular geographic location. Surveillance is commonly practiced around the globe to varying degrees.","breadcrumb":{"@id":"http:\/\/studentsagain.com\/home\/political-science\/surveillance-technologies\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["http:\/\/studentsagain.com\/home\/political-science\/surveillance-technologies\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"http:\/\/studentsagain.com\/home\/political-science\/surveillance-technologies\/#primaryimage","url":"http:\/\/studentsagain.com\/home\/wp-content\/uploads\/2014\/04\/94403705_3cdc2febb4_surveillance.jpg","contentUrl":"http:\/\/studentsagain.com\/home\/wp-content\/uploads\/2014\/04\/94403705_3cdc2febb4_surveillance.jpg","width":500,"height":375},{"@type":"BreadcrumbList","@id":"http:\/\/studentsagain.com\/home\/political-science\/surveillance-technologies\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"http:\/\/studentsagain.com\/home\/"},{"@type":"ListItem","position":2,"name":"Political Science","item":"http:\/\/studentsagain.com\/home\/category\/political-science\/"},{"@type":"ListItem","position":3,"name":"Global Futures","item":"http:\/\/studentsagain.com\/home\/category\/political-science\/global-futures\/"},{"@type":"ListItem","position":4,"name":"Surveillance Technologies"}]},{"@type":"WebSite","@id":"http:\/\/studentsagain.com\/home\/#website","url":"http:\/\/studentsagain.com\/home\/","name":"Students Again","description":"From Application To Graduation","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"http:\/\/studentsagain.com\/home\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"http:\/\/studentsagain.com\/home\/#\/schema\/person\/ffef62fb0dd57ba585f3200ff949470f","name":"students"}]}},"_links":{"self":[{"href":"http:\/\/studentsagain.com\/home\/wp-json\/wp\/v2\/posts\/54","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/studentsagain.com\/home\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/studentsagain.com\/home\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/studentsagain.com\/home\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/studentsagain.com\/home\/wp-json\/wp\/v2\/comments?post=54"}],"version-history":[{"count":5,"href":"http:\/\/studentsagain.com\/home\/wp-json\/wp\/v2\/posts\/54\/revisions"}],"predecessor-version":[{"id":148,"href":"http:\/\/studentsagain.com\/home\/wp-json\/wp\/v2\/posts\/54\/revisions\/148"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/studentsagain.com\/home\/wp-json\/wp\/v2\/media\/144"}],"wp:attachment":[{"href":"http:\/\/studentsagain.com\/home\/wp-json\/wp\/v2\/media?parent=54"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/studentsagain.com\/home\/wp-json\/wp\/v2\/categories?post=54"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/studentsagain.com\/home\/wp-json\/wp\/v2\/tags?post=54"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}