presentation on survellance introduction it is the monitoring of the behavior, activities, or other...
TRANSCRIPT
![Page 1: PRESENTATION ON SURVELLANCE Introduction It is the monitoring of the behavior, activities, or other changing information, usually of people. It is sometimes](https://reader036.vdocuments.site/reader036/viewer/2022062519/5697c0221a28abf838cd34b3/html5/thumbnails/1.jpg)
PRESENTATION ON SURVELLANCE
CREATED BY SWAPNIL SAHOO
![Page 2: PRESENTATION ON SURVELLANCE Introduction It is the monitoring of the behavior, activities, or other changing information, usually of people. It is sometimes](https://reader036.vdocuments.site/reader036/viewer/2022062519/5697c0221a28abf838cd34b3/html5/thumbnails/2.jpg)
Introduction
It is the monitoring of the behavior, activities, or other changing information, usually of people. It is sometimes done in a surreptitious manner.
The word surveillance may be applied to observation from a distance by means of electronic equipment .
![Page 3: PRESENTATION ON SURVELLANCE Introduction It is the monitoring of the behavior, activities, or other changing information, usually of people. It is sometimes](https://reader036.vdocuments.site/reader036/viewer/2022062519/5697c0221a28abf838cd34b3/html5/thumbnails/3.jpg)
Government
Surveillance is very useful to governments and law enforcement to
maintain social control, recognize and monitor threats, and
prevent/investigate criminal activity.
![Page 4: PRESENTATION ON SURVELLANCE Introduction It is the monitoring of the behavior, activities, or other changing information, usually of people. It is sometimes](https://reader036.vdocuments.site/reader036/viewer/2022062519/5697c0221a28abf838cd34b3/html5/thumbnails/4.jpg)
Types of Survelliance
![Page 5: PRESENTATION ON SURVELLANCE Introduction It is the monitoring of the behavior, activities, or other changing information, usually of people. It is sometimes](https://reader036.vdocuments.site/reader036/viewer/2022062519/5697c0221a28abf838cd34b3/html5/thumbnails/5.jpg)
Computer surveillance
The vast majority of computer surveillance involves the monitoring of data and traffic on the internet. In the United States for example, all phone calls and broadband Internet traffic (emails, web traffic, instant messaging, etc.) are required to be available for real-time monitoring by Federal law enforcement agencies.
![Page 6: PRESENTATION ON SURVELLANCE Introduction It is the monitoring of the behavior, activities, or other changing information, usually of people. It is sometimes](https://reader036.vdocuments.site/reader036/viewer/2022062519/5697c0221a28abf838cd34b3/html5/thumbnails/6.jpg)
Telephones
The official and unofficial tapping of telephone lines is widespread. In the United States for instance, it is required that all telephone communications will be available for real-time wiretapping by Federal law enforcement and intelligence agencies.
![Page 7: PRESENTATION ON SURVELLANCE Introduction It is the monitoring of the behavior, activities, or other changing information, usually of people. It is sometimes](https://reader036.vdocuments.site/reader036/viewer/2022062519/5697c0221a28abf838cd34b3/html5/thumbnails/7.jpg)
Surveillance cameras Surveillance cameras such as these are
installed by the millions in many countries, and are nowadays monitored by automated computer programs instead of humans.
Surveillance cameras are video cameras used for the purpose of observing an area.
The amount of footage is also drastically reduced by motion sensors which only record when motion is detected.
![Page 8: PRESENTATION ON SURVELLANCE Introduction It is the monitoring of the behavior, activities, or other changing information, usually of people. It is sometimes](https://reader036.vdocuments.site/reader036/viewer/2022062519/5697c0221a28abf838cd34b3/html5/thumbnails/8.jpg)
Social network analysis One common form of surveillance is to create
maps of social networks based on data from social networking sites such as Facebook, My space, Twitter.
![Page 9: PRESENTATION ON SURVELLANCE Introduction It is the monitoring of the behavior, activities, or other changing information, usually of people. It is sometimes](https://reader036.vdocuments.site/reader036/viewer/2022062519/5697c0221a28abf838cd34b3/html5/thumbnails/9.jpg)
Biometric surveillance Biometric surveillance refers to technologies that measure
and analyze human physical and/or behavioral characteristics for authentication, identification, or screening purposes. Examples of physical characteristics include fingerprints, DNA, and facial patterns. Examples of mostly behavioral characteristics include gait (a person's manner of walking) or voice.
![Page 10: PRESENTATION ON SURVELLANCE Introduction It is the monitoring of the behavior, activities, or other changing information, usually of people. It is sometimes](https://reader036.vdocuments.site/reader036/viewer/2022062519/5697c0221a28abf838cd34b3/html5/thumbnails/10.jpg)
SOME OTHER RELATED TERMS…..
![Page 11: PRESENTATION ON SURVELLANCE Introduction It is the monitoring of the behavior, activities, or other changing information, usually of people. It is sometimes](https://reader036.vdocuments.site/reader036/viewer/2022062519/5697c0221a28abf838cd34b3/html5/thumbnails/11.jpg)
Countersurveillance, sousveillance
Counter surveillance is the practice of avoiding surveillance or making surveillance difficult.
Sousvelliance is the type of surveillance that includes the recording of an activity by a participant in the activity.
![Page 12: PRESENTATION ON SURVELLANCE Introduction It is the monitoring of the behavior, activities, or other changing information, usually of people. It is sometimes](https://reader036.vdocuments.site/reader036/viewer/2022062519/5697c0221a28abf838cd34b3/html5/thumbnails/12.jpg)
Bibliography
• Images: www.images.google.com• Videos: www.youtube.com• Information: www.wikipedia.com
![Page 13: PRESENTATION ON SURVELLANCE Introduction It is the monitoring of the behavior, activities, or other changing information, usually of people. It is sometimes](https://reader036.vdocuments.site/reader036/viewer/2022062519/5697c0221a28abf838cd34b3/html5/thumbnails/13.jpg)
Thank you