Cyber Security |Defense | Methods Of Surveillance

1.Computer Surveillance:-

Computer surveillance refers to monitoring computer activities at home or workplace. Meaning, it’s keeping an eye on all the activities and tasks that are being done on any computer you chose.

Image for post

2.Phones Surveillance:-

Phone surveillance is the act of performing surveillance on phone conversations, location tracking and data monitoring of a phone.

Image for post

3.Cameras Surveillance:-

Surveillance cameras are video cameras used for the purpose of observing an area. They are often connected to a recording device or IP network, and may be watched by a security guard or law enforcement officer.

Image for post

4.Social network analysis:-

Social network analysis (SNA) is the process of investigating social structures through the use of networks and graph theory. It characterizes networked structures in terms of nodes (individual actors, people, or things within the network) and the ties, edges, or links (relationships or interactions) that connect them.

Image for post

5. Biometrics Surveillance :-

Biometrics in video surveillance refers to those biometrics in which biometric images, e.g., those of face, gait or iris, are captured using surveillance videos operating at a distance from the human body. They are among the most challenging forms of biometric technologies.

Image for post

6.Aerial Surveillance:-

Aerial surveillance is the gathering of surveillance, usually visual imagery or video, from an airborne vehicle — such as an unmanned aerial vehicle, helicopter, or spy plane. Military surveillance aircraft use a range of sensors (e.g. radar) to monitor the battlefield.

Image for post

7.Corporate Surveillance:-

Corporate surveillance is the monitoring of a person or group’s behavior by a corporation. The data collected is most often used for marketing purposes or sold to other corporations, but is also regularly shared with government agencies.

Image for post

8.Data mining:-

Data Mining is the process of identifying patterns in the pre-built database.

Image for post

9.Data profiling :-

is the process of examining the data available from an existing information source (e.g. a database or a file) and collecting statistics or informative summaries about that data. The purpose of these statistics may be to: Find out whether existing data can be easily used for other purposes.

Image for post

10.Human operatives:-

An informant (also called an informer) is a person who provides privileged information about a person or organization to an agency.

The term is usually used within the law enforcement world, where they are officially known as confidential human source (CHS), cooperating witness (CW), or criminal informants (CI).

Image for post

11.Satellite imagery:-

reconnaissance satellite or spy satellite is a low-orbiting satellite that collects information about civilian and military installations in other countries using an optical or radar system

Image for post

12.Identification and credentials

13.Wireless Tracking :-

Wireless RTLS tags are attached to objects or worn by people, and in most RTLS, fixed reference points receive wireless signals from tags to determine their location. … RTLS are a form of local positioning system, and do not usually refer to GPS or to mobile phone tracking.

Image for post

14.Mobile phones Tracker:-

Mobile phone tracking is a process for identifying the location of a mobile phone, whether stationary or moving.

Localization may be effected by a number of technologies, such as using multilateration of radio signals between cell towers of the network and the phone, or simply using GPS.

Image for post

15. RFID tagging:-

Radio-frequency identification (RFID) uses electromagnetic fields to automatically identify and track tags attached to objects.

An RFID tag consists of a tiny radio transponder; a radio receiver and transmitter. RFID is one method of automatic identification and data capture (AIDC).

Image for post

16. RFID tagging on humans:-

A human microchip implant is typically an identifying integrated circuit device or RFID transponder encased in silicate glass and implanted in the body of a human being.

This type of subdermal implant usually contains a unique ID number that can be linked to information contained in an external database, such as personal identification, law enforcement, medical history, medications, allergies, and contact information.

Image for post

17. Geolocation devices:-

Geolocation is a technology that uses data acquired from an individual’s computer or mobile device to identify or describe the user’s actual physical location.

Geolocation data have a variety of uses, each of which can be tailored to particular apps, environments or enterprises.

Image for post

18.Postal services:-

Mail Covers: Snail Mail Surveillance.

mail cover is a surveillance tool used by the Postal Service to monitor the mail of a person suspected of criminal activity by recording the information on the outside of all letters and packages delivered to a home or business

Image for post

19.Stakeout:-

surveillance maintained by the police of an area or a person suspected of criminal activity.

Image for post

20.Internet of things:-

The Internet of Things (IoT) is helping create safer cities, homes, and businesses by enabling both private and public organizations to securely and remotely monitor facilities and public spaces in real-time with smart security and surveillance solutions.

Image for post

Leave a Reply

error: Content is protected !!