TITLE

Eye to eye with the cat network

AUTHOR(S)
Gibbs, Mark
PUB. DATE
November 1999
SOURCE
Network World;11/29/99, Vol. 16 Issue 48, p82
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
Discusses the concept of using animals as electronic eavesdropping equipment. Cats and dogs with electronic implants as recorders; Need for using other animals as relays.
ACCESSION #
2565928

 

Related Articles

  • How Birds Learn Foreign Languages.  // Australasian Science;Oct2015, Vol. 36 Issue 8, p11 

    The article discusses a 2015 study by Robert Magrath and colleagues at The Australian National University and published in the journal "Current Biology" that reveals the ability of birds to eavesdrop on the calls of other species and highlights the potential of helping train animals to recognize...

  • Eye can see you. Jenkins, J. // New Statesman & Society;2/21/92, Vol. 5 Issue 190, p14 

    Explores the exponential growth in the past decade of low-level, high-tech surveillance. Examples of indirect automatic surveillance, such as computerized bus ticket sales and automatic cash-point machines; Rise of systems designed specifically to track people's movements; Implications for...

  • Bugging. Freeman, J.; Freundlich, N. // Popular Science;Aug87, Vol. 231 Issue 2, p44 

    An amazing arsenal of devices is used in the sinister business of electronic eavesdropping. A look at these diminutive bugs and the prodigious technology on which they are based, and how they're used in the espionage war between the US and the Soviet Union.

  • Surreptitious recording of suspects' conversations. Crawford, Kimberly A. // FBI Law Enforcement Bulletin;Sep93, Vol. 62 Issue 9, p26 

    Discusses the legality of the surreptitious recording of suspects' conversations through listening devices or undercover work. Compliance with the fourth amendment of the United States Constitution; Fifth amendment; Sixth amendment; Compliance with Title III of the Omnibus Crime Control and...

  • Wiretaps.  // Newsweek;11/4/1985, Vol. 106 Issue 19, p66 

    In 1968, Congress set out rules for electronic surveillance in a complex statute that balanced the needs of law enforcement with the Fourth Amendment protection against unreasonable searches. But the lawmakers didn't foresee how quickly Americans would embrace such devices as electronic mail and...

  • What eavesdroppers know (and you should learn). Kaufman, Margo // Redbook;May95, Vol. 185 Issue 1, p62 

    Presents a guide to eavesdropping. Benefits; Drawbacks; Distinction from spying; How eavesdropping enhances or harms; Electronic eavesdropping; Doing it at home. INSET: How to eavesdrop like a pro, by Betty Wong..

  • Privacy in peril. Piller, Charles // Macworld;Jul1993, Vol. 10 Issue 7, p124 

    Discusses how computers are making access to personal information easier. Obsolete and incorrect information; Conflicting values; Personal data as commodity; Data-reselling trade; Question of priorities; Credit records; Conflict between access and privacy; Management of electronic privacy; Role...

  • Lending an Ear.  // Time;6/29/1981, Vol. 117 Issue 26, p18 

    The article offers information on an electronic listening post in the Tian Shan mountains of western China's Xinjiang province run by the U.S. and China.

  • SANTA FE EAVESDROPPER.  // Santa Fe Reporter;4/3/2013, Vol. 40 Issue 14, p5 

    The article presents overheard remarks at various public places in Santa Fe, New Mexico which include Second Street Brewery, Plaza, and Rio Chama Steakhouse.

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics