China’s Golden Shield Project has several US corporations such as IBM, General Electric, and Honeywell working closely with the Chinese government to install millions of surveillance cameras throughout the country, along with advanced video analysis and facial recognition software, which will identify and track individuals everywhere they go. They will be connected to a centralised database and monitoring station, which will, upon completion of the project, contain a picture of the face of every person in China - over 1.3 billion people.
Law enforcement and intelligence services in the UK and the US possess technology to remotely activate the microphones in cellphones, by accessing the phone’s diagnostic/maintenance features, in order to listen to conversations that take place nearby the person who holds the phone. Mobile phones are also commonly used to collect location data.
In the US, for instance, under the Communications Assistance For Law Enforcement Act, all phone calls, VoIP and broadband internet traffic (emails, web traffic, instant messaging, etc) are required to be available for unimpeded real-time monitoring by federal law enforcement agencies. Computers are also a surveillance target because of the personal data stored on them. If someone is able to install software (either physically or remotely), such as the FBI’s “Magic Lantern” and Computer and IP verification (CIPAV), on a computer system, they can easily gain unauthorised access to this data. Another form of computer surveillance, known as TEMPEST, involves reading electromagnetic emanations from computing devices in order to extract data from them at distances of hundreds of meters.
Surveillance cameras are often connected to a recording device, IP network, and/or watched by a security guard/law enforcement officer. In the UK, for instance, there are about 4.2 million surveillance cameras — one camera for every 14 people.
The Defense Advanced Research Projects Agency (DARPA) is funding a research project called “Combat Zones That See” that will link up cameras across a city to a centralised monitoring station, identify and track individuals and vehicles as they move through the city, and report “suspicious” activity (such as waving arms, looking side-to-side, standing in a group, etc).
Even social networking sites are under scrutiny. Many US government agencies such as the DARPA, NSA and the Department of Homeland Security (DHS) are currently investing heavily in research involving social network analysis. One common form of surveillance is to create maps of social networks based on data from social networking sites such as Facebook, MySpace and Twitter.
You’ve reached your limit of {{free_limit}} free articles this month.
Subscribe now for unlimited access.
Already subscribed? Log in
Subscribe to read the full story →
Smart Quarterly
₹900
3 Months
₹300/Month
Smart Essential
₹2,700
1 Year
₹225/Month
Super Saver
₹3,900
2 Years
₹162/Month
Renews automatically, cancel anytime
Here’s what’s included in our digital subscription plans
Exclusive premium stories online
Over 30 premium stories daily, handpicked by our editors


Complimentary Access to The New York Times
News, Games, Cooking, Audio, Wirecutter & The Athletic
Business Standard Epaper
Digital replica of our daily newspaper — with options to read, save, and share


Curated Newsletters
Insights on markets, finance, politics, tech, and more delivered to your inbox
Market Analysis & Investment Insights
In-depth market analysis & insights with access to The Smart Investor


Archives
Repository of articles and publications dating back to 1997
Ad-free Reading
Uninterrupted reading experience with no advertisements


Seamless Access Across All Devices
Access Business Standard across devices — mobile, tablet, or PC, via web or app
