PRIVACY IS DECENCY PRIVACY IS HUMAN DIGNITY RESPECT OTHERS PRIVACY NO PRIVACY IS INDECENCY ABUSING O - PowerPoint PPT Presentation

1 / 30
About This Presentation
Title:

PRIVACY IS DECENCY PRIVACY IS HUMAN DIGNITY RESPECT OTHERS PRIVACY NO PRIVACY IS INDECENCY ABUSING O

Description:

Computer databases have fallen in unsafe hands of nosy busybodies & housewives, ... Personal privacy is core of human dignity & a civilized society. ... – PowerPoint PPT presentation

Number of Views:147
Avg rating:3.0/5.0
Slides: 31
Provided by: yourprivac
Category:

less

Transcript and Presenter's Notes

Title: PRIVACY IS DECENCY PRIVACY IS HUMAN DIGNITY RESPECT OTHERS PRIVACY NO PRIVACY IS INDECENCY ABUSING O


1
PRIVACY IS DECENCYPRIVACY IS HUMAN
DIGNITYRESPECT OTHERS PRIVACY NO PRIVACY IS
INDECENCYABUSING OTHERS PRIVACY IS ABUSING
HUMAN DIGNITYDISRESPECTING OTHERS PRIVACY IS
DISRESPECTING HUMANITYLAW IS SMALL ETHICS IS
BIG
2
TECHNOLOGY IS INFILTRATING THE LIVES OF COMMON
PEOPLE UNWARE OF ITS ABUSIVE IMPLICATIONS.
Assurances of security of personal information
in digital era is a smoke screen, a deceptive
lie, to dupe innocent ignorant COMMON
PEOPLE. BEWARE, WAKE UP FIGHT FOR YOUR RIGHTS.
3
YOUR PRIVACY YOU PERSONAL INFORMATION IMPLICATIO
NS OF INVASIVE TECHNOLOGIES ON YOUR PRIVACY.
BEWARE OF THEFT OF YOUR OFF-LINE DATA BY OTHERS
THROUGH ELECTRO-MAGNETIC RADIATIONS USING TEMPEST
TECHNOLOGY AND SEE-THROUGH-WALL TECHNOLOGY
AMOUNTING TO HUMAN RIGHTS ABUSES OF YOUR PRIVACY,
PERSONAL INFORMATION PRIVATE DATA. YOUR LIFE IS
INSECURE EVEN ON YOUR OFF-LINE COMPUTER
HARD-DRIVES, FLOPPY DISKS, COMPACT AND ZIP
DRIVES, ETC DUE TO ELECTROMAGNETIC RADIATIONS
TEMPEST TECHNOLOGY USED FROM NEIGHBORHOODS ,
NEIGHBORHOOD CARS PASSING CARS. YOUR LIFE IS
INSECURE BEHIND THE CLOSED WALLS AND DOORS OF
YOUR HOMES AND OFFICES DUE TO SEE-THROUGH WALL
TECHNOLOGIES PROBABLE ILLEGAL USE UNDER LEGAL
DISGUISE.
4
PRIVACY - CORE OF HUMAN DIGNITY, CORNERSTONE OF
ALL CIVIL RIGHTS AND IMPERATIVE FOR A CIVILIZED
SOCIETY. IN OTHER WORDS, ESPECIALLY FOR THE
DUMBOS, INATTENTIVE AND THE INDIFFERENT,
VIOLATION OF PRIVACY MEANS VIOLATION OF HUMAN
DIGNITY AND THIS WILL CREATE AN UNCIVILIZED
SOCIETY. THE SENSIBLE CAN ALREADY SENSE IT
THOSE WHO CANT THE INSENSIBLE , THE ARROGANT
THE POWER ABUSIVE, ARE RESPONSIBLE FOR THE ILLS
OF OUR SOCIETIES TODAY. DOES THAT CALL FOR
CELEBRATION OR DOES THAT CALL FOR URGENT
ACTION? EXERCISE YOUR RIGHTS TO PROTECT YOUR
PERSONAL INFORMATION. IT IS A PREREQUISITE FOR
EXERCISING YOUR OTHER FUNDAMENTAL RIGHTS - YOUR
RIGHT TO FREEDOM OF SPEECH, CONSCIENCE, PRIVATE
LIFE, ETC. PRIVACY IS THE CORNERSTONE OF ALL
CIVIL RIGHTS IS ANYONE DUMB ENOUGH NOT TO
COMPREHEND THESE BASICS? WHOM ARE THE PRIVACY
ABUSERS TRYING TO KID? THEMSELVES??
5
INFILTRATING INFORMATION AND SURVEILLANCE
TECHNOLOGIES Computer databases have fallen in
unsafe hands of nosy busybodies housewives,
good for nothing people self-proclaimed
detectives having nothing better to do. These
incapable idiots with narrow minded rigid
perceptions do data entry and store information
about the daily lives activities of
individuals. Credit companies, public-private
health-care facilities, banks mortgage
companies, supermarkets, telephone, electricity,
gas, heat water companies, municipalities,
police, motor vehicle licensing departments, etc,
all use greedy alogrithms nerds geeks to
hoard information about their customers clients
other stupid people will buy sell these
informations to churn the economy in its
artificiality before bubble-burst. Surveillance
devices are ill-mannerdly pointed at humans.
Video cameras, CCTV, satellite monitoring through
implanted transmitters, biometric scanners
monitoring people from far linking them to
commercial government databases in unsafe hands
of incapable, wrong, humanely unhealthy
personnel, FM radios infiltrating into your
cordless phone-calls, hi-tech gadgets
intercepting your cell-mobile phone-calls,
computer programmers their programs that
infiltrate into networked personal computers,
small size wireless cameras shoved into clocks,
lit unlit signs signboards, smoke fire
detectors, nanny cams, audio bug devices
microphones broadcasting nice easy to your next
room, across the hall, to your neighbors house
nice and dandy they know your every move.
Are you gonna be a coward let them get away
with it or are you gonna be a brave - a real
human in Gods eyes, do Something about this
evil?? Come on, DO IT!
6
CREEPING SURVEILLANCE BEWARE OF CREEPING
SURVEILLANCE THE TIP OF THE ICEBERG
FOREWARNED IS FOREARMED. Surveillance creeps
into workforce, schools, colleges, universities,
shopping centers, streets, public spaces, even
in your personal lives at your home. Employees
face constant scrutiny through surveillance
technologies at work enabling employers to
monitor communications control workers in their
silly ideas to increase productivity reduce
costs with a probable net result same as the
dot-com burst. Security forces police use
surveillance cameras installed in public
private spaces that are also linked for
transmission via internet web cams. They dont
care about devastation of individual privacy
human rights abuses that these technologies have
prematurely given birth to TIP OF THE ICEBERG
INDEED!
7
Implications of infiltrating technologies Your
right to privacy is the core of your human
dignity and your freedom. Privacy is key to
democracy with which individuals protect
themselves as healthy human beings (in mind,
body, and soul) free of state control.
Technologies foment eavesdropping erosion of
your individual privacy. Your personal
information is acquired without your informed
consent and the collected information is misused
in ways which you dont come to know. Scammers
trick companies of private financial records.
Privacy supporters dare to question whether
information databases excess of surveillance
technologies are capable of being managed
responsibly since they have fallen into the
unsafe hands of incapable, arrogant, unhealthy
humans misusing and abusing technology through
the application of evil human intellect. Privacy
supporters maintain that privacy should be viewed
as your personal space your private space that
should be under your exclusive control . Do you
want that to be taken away from you? Are you
gonna do nothing about it? Or are you gonna be a
BRAVE? WAKE UP RIGHT NOW.
8
If you aint done nothing wrong, you aint got
nothing to hide, so you aint got nothing to
fear so they tell ya. But, does that mean that
if you aint done nothing wrong, got nothing to
hide, got nothing to fear, that you should
allow yourselves to be stripped naked in public
by UGLY unsafe hands MINDS of incapable,
INHUMANE so-called authorities AND THEIR
BONELESS YES-MEN? When your privacy is
infiltrated, you are turned inside out your
feelings, thoughts, words, actions and your past,
present and even future are exposed
dehumanizingly to the eyes of ugly, incapable
humans instead of TO THE EYES OF THE Lord above,
All this often happens without your esteemed
rightful consent knowledge. When your privacy
is breached, distrust becomes institutionalized
Sacred componentS of societal bond ARE
irreversibly damaged for you others you deal
with. Privacy infiltrators fail to realize that
they shall be wiped out from the book of life in
Kingdom Come. At present, laws dont have a ball
nor bone to restrict scrutinize the
acquisition, sale, correctness, security of
personal information of esteemed humans that are
creatures of God same as other creatures, and not
to be ill-treated cruelly for selfish purposes.
Due to human inaction, ignorance, fear,
gutlessness lack of Braves in present times,
privacy laws to protect us are frozen in
Pre-historic concepts.
9
Conveniently forgetting their past wrong-doings
of slavery, mass genocides, invasions, wars
displacements, post 9-11, infiltrating
surveillance has become legalized extensive
with little or no public consultations in-depth
knowledge of issues respect for human values.
Public policies have clashed with privacy
regulations. Privacy protection is at a
dangerously low ebb with the creation of records
on innocent, often ignorant but law-abiding
people fearing revering the law more than
ethics big mistake, monitoring of
communications systematic police observation of
civilians an unjustified issue of one group of
humans abusing their powers making judgments on
other groups of humans through misuse of
technology in wrong, unsafe hands of morally
incapable people. There is hunger starvation
for personal information that is intense hence
evil due to spread of cultures of fear mistrust
commercial fervor targeted marketing .
10
STOP THIEVES - TEMPEST SEE-THROUGH-WALL TEMPES
T Once upon a time, researching dickheads learned
that computers generate electromagnetic radiation
called EMR that reconstruct information about the
data being processed by the devices that are
emitting it. The term TEMPEST means Transient
Electromagnetic Pulse Emanation Standard.
Information leaks through EMR emissions is
easily reconstructed as images and text displayed
on a cathode ray tube monitor by intercepting
radio frequency signals. Thieving dickheads use
this process to eavesdrop on the contents of your
computer CRT display using your computers
electromagnetic radiations and thus they hack
into your off-line computers hard-drives,
floppy-drives, compact drives, zip drives, etc.
Dont you get it you dont have to be
connected to the internet to have your privacy
hacked nowadays, they can hack into your
computers privacy even on a computer that is
never connected to the internet! Anything you
type on an electronic screen is susceptible to
loss of privacy. What can you do about it. Join
the privacy supporters group tell others who
dont know.
11
This electronic eavesdropping using EMR is the
most sinister type of information piracy since
many dont know about it yet. Using ordinary
equipment, an ugly evil eavesdropper can
construct a complete transcript of your actions
every keystroke piece of data viewed on your
computer screen or sent to a printer/scanner can
be hijacked by these ugly eavesdroppers lurking
in your neighborhood in parked passing cars
from 10-1000 feet or more. This is a nasty
threat to your information security because
whatever is on your computer screen, even
offline, is being transmitted to hackers and
anti-social elements lurking around to hijack
your privacy talk about character and quality
of humans nowadays. The computer industry is
just waking up to realize that most computer
terminals screens radiate emanations strong
enough so as to enable a sensitive receiver to
decipher its screens contents. Nobody seems
to be taking coercive action against this dirty
issue of infiltrating your privacy and personal
information under the disguise of incapable legal
structures and the law that have shoved ethics in
trash.
12
AN EVEN MORE EVIL SEE-THROUGH-WALL TECHNOLOGY -
STOP THIEVES Some ugly monstrous indecent dirty
inhumane humans invented these equipments to see
through your walls as well. For example,
infra-red high-sensitivity equipment, thermal
imaging, and through-the-wall technologies can
detect your activities behind the walls of your
home and even in darkness. Thus, they get access
to information on the location and movement of
people inside buildings and homes as well talk
about an axis of evil technology being wrongly
used against civilians under the outer disguise
of being used for earthquakes and criminals but
actually being used abusively by authorities on
or off-duty or others on their behalf or
acquiring it illegally and are being used to play
harassing dehumanizing games against innocent
common people. Through-the-wall radar devices
are lightweight, portable, able to focus up to
20 -30 meters ahead are available only to
municipalities law enforcement agencies
officially examples RadarVision, Prism 100.
They detect the presence of objects through
walls. Moving objects appear as a moving blobs
so if you in your home, anyone using this
equipment from outside can come to know that you
are moving in your home, so your privacy is
devastated, thanks to the characterless cowards
using it on uneven playgrounds against the
have-nots. These sensitive devices can detect
even the presence of someone sitting still on the
other side of the wall, the machines detect the
rise fall of the persons chest with every beat
of their heart and breath. It is supposed to be
used for emergency and security but its abuse and
misuse is the tip of the iceberg that should not
be swept under the carpet by the public and
policy makers blinded by terrorism and using it
to harass common people.
13
  • Radar Flashlights can see through doors and walls
    detect a stationary humans presence through
    solid wood thick walls from 4 feet away. It
    uses microwave technology emitting an invisible
    beam of electromagnetic radiation similar to
    automatic door sensors that sense movement. Its
    cost only 500. Tempted to buy it?
  • Celldar uses radar technology to allow
    surveillance of anyone, anytime, anywhere where
    there is an ugly phone signal. It uses mobile
    phone masts to allow authorities to watch
    vehicles individuals also almost anywhere. It
    has X-ray vision the capability to see through
    walls and look into peoples homes and clothes.
    Tempted to buy it?
  • Who are authorized to buy it and use it for what
    legal or illegal, official or unofficial, said or
    unsaid purposes becomes an issue that the
    well-dressed law and enforcement agencies seems
    to be too poor, unhealthy, inhumane, intoxicated
    in abusive power and incapable to answer in front
    of the big human quality of ethics of
    character-worthy healthy humans. Which one of
    these would you rather be?

14
Illegal Users These technologies are supposed to
be available only to military law enforcement
agencies. However, the people in those
departments using them are humans and humans are
susceptible to corruption and absolute power
corrupts these technologies can and are being
used by these authorities on off-duty, and also
through a smoke-screen of their trusted civilian
followers to illegally and dehumanizingly harass
innocent people whom they dont like for one
reason or the other. It is conveniently
forgotten that officially these devices are to be
used only for emergency, crime prevention, and
disaster relief purposes. Thus, there is no
accountability transparency on part of
authorities , manufacturers, sellers users of
these equipments to give the public a minute by
minute, day by day account of its use or abuse
as if they care! Diffusion of these technologies
into the population creates unanswered questions
about the privacy impact of these equipments,
their effects on everyday lives of urban
civilians such as you and others, as well as the
legal implications of these profiling
technologies. What a shameful disgrace for
humanity when privacy core of human dignity is
abused.
15
  • UNCOUTH Repressive Potential of Surveillance
    Technologies
  • These technologies can have great repressive
    potential
  • There are significant concerns that these
    security measures are being abused by
    authorities, following the abuse of Tasers.
  • They can also fall into wrong hands or be used
    for nefarious reasons when done slyly in
    closed syndicates, the lack of evidence time,
    money, energy on part of victims may make it
    difficult for them to prove these evil happenings
    also the narrow limitations of weak laws
    functioning only on physical evidence abuse of
    power money may enable the abusers of these
    technologies to make hay victimize and harass
    innocent people.
  • These technologies create a variety of troubling
    issues such as injustice, intrusion, denial of
    due process, absence of informed consent,
    deception, manipulation, errors, harassment,
    misuse of property and reduced autonomy.
  • Over-enthusiasm with innovation infatuation
    with technological progress and gimmickry have
    obscured real dangers.

16
Privacy, Democracy, Civilized Society,
Surveillance Personal privacy is core of human
dignity a civilized society. There is urgent
serious need for more investigation on the
consequences of these surveillance technologies
on common people. There is urgent serious need
for more public education about privacy the
cornerstone of all civil rights. There is
urgent serious need for transparency
accountability from authorities whose powers is
enhanced by surveillance technologies. It is
imperative that elaborate mechanisms are
initiated ASAP for handling of personal
information, ensuring accountability punishing
those who abuse their power with unchecked
surveillance. There is urgent serious need to
understand the issue of surveillance technology
to be an issue of institutional accountability
that acknowledges surveillance as a structural
problem of power. At present, there arent enough
protections against privacy invasion because it
is a relatively new phenomenon unknown to many
innocent people. There is urgent serious need
for public awareness, ethical assessment social
analysis of new technologies. There is urgent
serious need to immediately and instantly deal
with human rights privacy repercussions of
surveillance technologies through policy-making
without further ado.
17
On a final analysis, several invasive
technologies, for example, electromagnetic
radiations EMR through electronic devices such as
TEMPEST technology , the SEE-THROUGH-WALL
technologies, are nefarious for the implications
of their misuse and abuse by authorities on and
off-duty and their misuse and abuse by
authorities entrusting these devices to their
inside syndicate of trusted civilians functions
as their eyes and ears. There is urgent
serious need for increased vigilance using
research, public education demand for
government accountability and transparency about
those stealthy technologies that can infiltrate
into your personal privacy that is at the core of
human dignity a civilized society. The right
to protection of your personal information is a
prerequisite for exercise of your other
fundamental rights, for example, the right to
freedom of your speech freedom of your
conscience. Privacy is the cornerstone of all
civil rights. The so-called democratic
societies are becoming surveillance societies a
hallmark of unhealthy societies. Beware wakeup
soon before the tip of the iceberg shatters your
privacy.
18
Post 911, there has been a capitalization on
fear silencing the intrusive nature of
surveillance information mechanisms. There is
urgent and serious need to guard against not only
the misuse of physical coercion but also against
misuse and abuse of supposedly benign forms of
secret and manipulative techniques that are
subtle, indirect, invisible, deceptive and
shrouded in security justifications, especially
at a time when human rights, data protection
privacy concerns are flowing at an extremely low
ebb. You have been empowered with this
information. Now, get up and do something about
it for yourself and others. May the good triumph
over evil that has become shrouded in for your
protection disguise.
19
References for your further information Amato,
I. (2001). Big Brother logs on. Technology
Review, 104(7), 59. Bahadur, G., Chan, W.,
Weber, C. (2002). Privacy defended Protecting
yourself online. Indianapolis, IN Que.
Bradsher, K. (1991). Experts say it is easy to
pick up conversations on cellular phones. The
New York Times, June 16, p. 8, 14. Budiansky,
S. (1987). Cheaper electronics make it a snap to
snoop. USA News World Report, May 18, pp.
54-56. Burke, J. Warren, P. (2002). How mobile
phones let spies see our every move. The
Observer, October 13. Available online at
http//observer.guardian.co.uk/uk_news/story/0,69
03,811027,00.html Bush, S. (2006, November 17).
Police will use radar to see through walls.
Electronics Weekly. Available online at
http//www.electronicsweekly.com/Articles/2006/11
/17/40181/Policewil luseradartoseethroughwa
lls.htm
20
Bush, S. (2002, August 12). Radar with Cell
Phones? Look at CellDar. Available online at
http//3nw.com/pda/radar_with_cell_phones__look_a
t_celldar.htm Campbell, J. E. Carlson, M.
(2002). Panopticon.com Online surveillance and
the commodification of privacy. Journal of
Broadcasting and Electronic Media, 46,
586-606. Chan, H. (1999, June 4). Cops have eyes
on x-ray vision. New technology would let police
see through walls. New York APBNews.com.
Available online at http//www.angelfire.com/nj3/
soundweapon/xray.htm Crawford, P. (1992).
Computer security Locking up open systems.
Security Management, 36(2), 42-45. Davies, S.
(1995). Privacy International calls for CCTV
debate. Privacy Forum Digest 4(21). Available
online at http//www.eyetap.org/wearcam/netcam_pr
ivacy_issues/privacy_forum_dig est_on_CCTV.html D
empsey, J. X. (2002, Winter). Civil liberties in
a time of crisis. Human Rights Magazine.
Available online at http//www.abanet.org/irr/hr/
winter02/dempsey.html
21
Farmer, D., Mann, C. (2003). Surveillance
nation. (Part one). Technology Review, 106(3),
34-42. Free, J., Freundlich, N. Gilmore, C. P.
(1987). Bugging. Popular Science, August, 231,
pp. cover-9. Froomkin, M. A. (2000). The death
of privacy? Stanford Law Review, 52(5),
1461-1543. Gandy Jr., O. H. (1989). The
surveillance society Information technology and
bureaucratic social control. Journal of
Communication 39(3) 61-76. Garfinkel, S.
(2001). Web security, privacy and commerce (2nd
ed.). Sebastopol, CA O'Reilly. Gehling, R.,
Ashley, R. C., Griffin, T. (2007). Electronic
emissions security Danger in the air.
Information Systems Management, 24,
305-310. Gould, J. B. (2002). Playing with fire
The civil liberties implications of September
11th. Public Administration Review, 62, 74-79.
22
Greiner, B. (1995, November 8). Lack of privacy
in a networked world is a real threat. Computing
Canada, 21(23), 44-45. Griffin, J. A. (1998).
Privacy and security in the digital age. IEEE
Spectrum Online. Gumpert, G., Drucker, S. J.
(2001). Public boundaries Privacy and
surveillance in a technological world.
Communication Quarterly, 49(2), 115-129.
Haggerty, K. D. Ericson, R. V. (2000). The
surveillant assemblage. British Journal of
Sociology, 51, 283-306. Hearn, Kelly. (2001,
April 18). High tech cop tools see through
walls. United Press International cited on
CommonDreams.org. Available online at
http//www.commondreams.org/headlines01/0418-04.h
tm Higgs, E. (2001). The rise of the information
state The development of central state
surveillance of the citizen in England,
1500-2000. Journal of Historical Sociology, 14,
175-197.
23
Hunt, A., Tillery, C., Wild, N. (2001).
Through-the-wall surveillance technologies.
Available online at http//www.ncjrs.gov/pdffiles
1/nij/07_01.pdf Jones, W. D. (2005, November).
No place to hide Portable radar devices see
through walls and report whats inside. IEEE
Spectrum Online. Available online at
http//www.spectrum.ieee.org/nov05/2146 Kuhn,
M. G., Anderson, R. J. (1998). Soft tempest
Hidden data transmission using electromagnetic
emanations. In D. Aucsmith (Ed.), Information
hiding Second International Workshop, vol. 1525
of Lecture Notes in Computer Science (pp.
124-148). Berlin, Germany Springer-Verlag.
Retrieved February 4, 2008, from
http//groups.csail.mit.edu/cis/crypto/classes/6.
857/papers/ih98-temp est.pdf Lacayo, R. (1991).
Nowhere to hide Using computers, high-tech
gadgets and mountains of data, an army of snoops
is assaulting our privacy. Time, November 11,
pp. 34-40. Lamb, G. M. (2006). Does digital age
spell privacys doom? Christian Science Monitor,
98(149).
24
Lehtinen, R. Gangemi, Sr., G. T. (2006).
Computer security basics. Sebastopol, CA
O'Reilly. Lyon, D. (2001a). Surveillance
society Monitoring everyday life. Buckingham,
UK Open University Press. Lyon, D. (2001b).
Facing the future Seeking ethics for everyday
surveillance. Ethics and Information Technology,
3, 171-181. Lyon, D. (2001c). Surveillance after
September 11. Surveillance after September 11.
Sociological Research Online 6(3). Lyon, D.
(2002a). Editorial. Surveillance Studies
Understanding visibility, mobility and the
phenetic fix. Surveillance Society, 1(1),
1-7. Lyon, D. (2002b). Surveillance in
cyberspace The internet, personal data, and
social control. Queens Quarterly, 109,
354-356. Lyon, D. (2004). Surveillance
technologies Trends and social implications.
The Security Economy (pp. 127-148). OECD
report. Marx, G. (1991). Privacy and technology.
Whole Earth Review, 73, 90-96.
25
Marx, G. T. (1986). The iron fist and the velvet
glove Totalitarian potentials within democratic
structures. Available online at
http//web.mit.edu/gtmarx/www.iron.html Marx, G.
T. (1996, November-December). Monitoring on the
job How to protect privacy as well as property.
Technology Review. Available online at
http//web.mit.edu/gtmarx/www/privacy.html Marx,
G. T. (1998). An ethics for the new surveillance.
The Information Society, 14(3). Available online
at http//web.mit.edu/gtmarx/www/ncolin5.html Mar
x, G. T. (2001). Murky conceptual waters The
public and the private. Ethics and Information
Technology, 3(3), 157-159. Available online at
http//web.mit.edu/gtmarx/www/murkypublicandprivat
e.html Mejia, R. (2002). More surveillance on
the way. The Nation, October 30. Retrieved March
2, 2008, from http//www.thenation.com/doc/200211
11/mejia20021030
26
Menzies, D. (1998, November). Know the enemy
(Hackers). CIO Canada, 6(11), 28. Retrieved
February 2, 2008, from http//www.w3.org/TR/html4
/loose.dtd McGowan, D. (2000, June). Sonys
Magic cameras. Available online at
http//www.davesweb.cnchost.com/cameras.htm
Miles, D. (2006, January 3). New device will
sense through concrete walls. American Forces
Information Service. US Department of Defense.
Available online at http//www.defenselink.mil/n
ews/Jan2006/20060103_3822.html National Law
Enforcement and Corrections Technology Center.
(2000). Looking through walls. Available online
at http//www.nlectc.org/techbeat/summer2000/Look
WallsSum2000.pdf Nunn, S. (2001). Police
technologies in cities Changes and challenges.
Technology in Society, 23, 11-27. Patton, J. W.
(2000). Protecting privacy in public?
Surveillance technologies and the value of
public places. Ethics and Information
Technology, 2, 181-187.
27
Pecora, V. P. (2002). The culture of
surveillance. Qualitative Sociology, 25,
345-358. Poster, M. (1990). The mode of
information Post-structuralism and social
context. Chicago, IL University of Chicago
Press. Radwanski, G. (2003). Erosion of human
rights begins with the loss of the right to
privacy. Canadian Speeches, 17(1), 16-22.
Redden, J. (2001). Snitch culture How citizens
are turned into the eyes and ears of the state.
Los Angeles, CA Feral House. Rothfeder, J.,
Galen, M. and Driscoll, L. (1990, January 15). Is
your boss spying on you? Business Week, pp.
74-76. Saetnan, A. R. (2007). Nothing to hide,
nothing to fear? Assessing technologies for
diagnosis of security risks. International
Criminal Justice Review, 17(3), 193-206.
28
Sanders, Jane (2001, April 12). Flash of force
Radar flashlight could help police detect
suspects hiding behind doors and 8-inch thick
walls. Georgia Institute of Technology Research
News. Available online at http//gtresearchnews.
gatech.edu/newsrelease/RADARFLASH.html Scott,
L. (1997, October 13). A flashlight that sees
through walls. Business Week. Shenk, D. (2003).
Watching you. The world of high-tech
surveillance. National Geographic, 204(5), 2-27.
Simonite, Tom. (2006, November 14). Compact
radar tracks movement through a wall. New
Scientist. Available online at http//www.newscie
ntisttech.com/channel/tech/weapons/dn10524
Solove, D. (2004). The digital person
Technology and privacy in the information age.
New York, New York University Press.
29
Stalder, F. (2002). Opinion. Privacy is not the
antidote to surveillance. Surveillance
Society, 1(1), 120-124. Staples, W. G. 1997. The
culture of surveillance Discipline and social
control in the United States. New York, NY St.
Martins Press. Van Eck, W. (1985).
Electromagnetic radiation from video display
units An eavesdropping risk? Withers Jr., R.
A. Albrecht, S. (1997). Pssstwanna buy some
data? Security Management, 41(12), 113-117.
Zalewski, M. (2005). Silence on the wire. San
Francisco, California No Starch Press. Zalud,
B. (2004). War of the walls. Security, 41(2), 58.
30
SAVE YOURSELVES YOUR PRIVACY
Write a Comment
User Comments (0)
About PowerShow.com