Eye can see you

Jenkins, J.
February 1992
New Statesman & Society;2/21/92, Vol. 5 Issue 190, p14
Explores the exponential growth in the past decade of low-level, high-tech surveillance. Examples of indirect automatic surveillance, such as computerized bus ticket sales and automatic cash-point machines; Rise of systems designed specifically to track people's movements; Implications for privacy rights; Potential for data leakage and abuse; Dangers of greater state control and knowledge of individuals.


Related Articles

  • Bugging. Freeman, J.; Freundlich, N. // Popular Science;Aug87, Vol. 231 Issue 2, p44 

    An amazing arsenal of devices is used in the sinister business of electronic eavesdropping. A look at these diminutive bugs and the prodigious technology on which they are based, and how they're used in the espionage war between the US and the Soviet Union.

  • Surreptitious recording of suspects' conversations. Crawford, Kimberly A. // FBI Law Enforcement Bulletin;Sep93, Vol. 62 Issue 9, p26 

    Discusses the legality of the surreptitious recording of suspects' conversations through listening devices or undercover work. Compliance with the fourth amendment of the United States Constitution; Fifth amendment; Sixth amendment; Compliance with Title III of the Omnibus Crime Control and...

  • Wiretaps.  // Newsweek;11/4/1985, Vol. 106 Issue 19, p66 

    In 1968, Congress set out rules for electronic surveillance in a complex statute that balanced the needs of law enforcement with the Fourth Amendment protection against unreasonable searches. But the lawmakers didn't foresee how quickly Americans would embrace such devices as electronic mail and...

  • What eavesdroppers know (and you should learn). Kaufman, Margo // Redbook;May95, Vol. 185 Issue 1, p62 

    Presents a guide to eavesdropping. Benefits; Drawbacks; Distinction from spying; How eavesdropping enhances or harms; Electronic eavesdropping; Doing it at home. INSET: How to eavesdrop like a pro, by Betty Wong..

  • Privacy in peril. Piller, Charles // Macworld;Jul1993, Vol. 10 Issue 7, p124 

    Discusses how computers are making access to personal information easier. Obsolete and incorrect information; Conflicting values; Personal data as commodity; Data-reselling trade; Question of priorities; Credit records; Conflict between access and privacy; Management of electronic privacy; Role...

  • Lending an Ear.  // Time;6/29/1981, Vol. 117 Issue 26, p18 

    The article offers information on an electronic listening post in the Tian Shan mountains of western China's Xinjiang province run by the U.S. and China.

  • SANTA FE EAVESDROPPER.  // Santa Fe Reporter;4/3/2013, Vol. 40 Issue 14, p5 

    The article presents overheard remarks at various public places in Santa Fe, New Mexico which include Second Street Brewery, Plaza, and Rio Chama Steakhouse.

  • Cheaper electronics makes spying easy. Budiansky, S. // U.S. News & World Report;5/18/87, Vol. 102 Issue 18, p54 

    How sophisticated electronic surveillance equipment is being used in private sectors to spy on phone calls and bank teller machines. How cellular phones can be tapped using radio scanners; Using microwave antennas to pick up long-distance calls; How to defend against spying; Use of scramblers.

  • What was that strange clicking sound, anyway? Mahtesian, Charles // Governing;Jan97, Vol. 10 Issue 4, p40 

    Focuses on the paranoia about eavesdropping that is permeating the whole of state government. Different forms of eavesdropping from illegal wiretapping to concealed video devices; Usual results of eavesdropping investigations; Cellular phone interception as another form of electronic espionage.


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics