Useful Links
Computer Science
Cybersecurity
Surveillance and Privacy
1. Foundations of Surveillance and Privacy
2. Technologies of Surveillance
3. Actors in Surveillance
4. Impacts and Consequences of Surveillance
5. Privacy Protection Technologies
6. Legal and Regulatory Frameworks
7. Ethical Dimensions and Future Challenges
Actors in Surveillance
State Surveillance
Intelligence Agencies
National Intelligence Services
Central Intelligence Agency
Federal Bureau of Investigation
National Security Agency
Government Communications Headquarters
Military Intelligence
Defense Intelligence Agency
Military Service Intelligence
Special Operations Intelligence
Cyber Command Units
Law Enforcement Intelligence
Federal Law Enforcement
State and Local Intelligence
Joint Terrorism Task Forces
Fusion Centers
Motivations for State Surveillance
National Security
Foreign Intelligence Collection
Counterintelligence Operations
Terrorism Prevention
Cyber Threat Detection
Law Enforcement
Criminal Investigation
Evidence Collection
Organized Crime Monitoring
Drug Enforcement
Social Control
Political Dissent Monitoring
Protest Surveillance
Journalist Monitoring
Activist Tracking
Legal Frameworks
Warrant Requirements
Probable Cause Standards
Judicial Review Processes
Emergency Exceptions
Administrative Warrants
Intelligence Authorities
Foreign Intelligence Surveillance Act
Executive Order 12333
National Security Letters
Section 702 Collection
International Cooperation
Intelligence Sharing Agreements
Mutual Legal Assistance Treaties
Five Eyes Alliance
European Intelligence Cooperation
Corporate Surveillance
Technology Companies
Social Media Platforms
Facebook/Meta
Google/Alphabet
Twitter/X
TikTok/ByteDance
E-commerce Companies
Amazon
Alibaba
eBay
Online Retailers
Telecommunications Providers
Internet Service Providers
Mobile Network Operators
Cable Companies
Satellite Providers
Business Motivations
Revenue Generation
Targeted Advertising
Data Sales
Premium Services
Market Intelligence
Operational Efficiency
Customer Analytics
Supply Chain Optimization
Fraud Prevention
Risk Management
Competitive Advantage
Market Research
Product Development
Customer Retention
Innovation Insights
Surveillance Business Models
Data Brokerage Industry
Consumer Data Brokers
Business Intelligence Providers
Marketing Data Companies
Identity Verification Services
Surveillance Capitalism
Behavioral Futures Markets
Prediction Products
Extraction Imperatives
Instrumentarian Power
Employee Surveillance
Workplace Monitoring
Computer Activity Monitoring
Email and Communication Surveillance
Location Tracking
Productivity Measurement
Hiring and Background Checks
Social Media Screening
Credit Checks
Criminal Background Checks
Reference Verification
Third-Party Surveillance Actors
Private Investigation Services
Corporate Investigations
Personal Investigations
Insurance Investigations
Legal Support Services
Surveillance Technology Vendors
Spyware Companies
Facial Recognition Vendors
Data Analytics Providers
Surveillance Equipment Manufacturers
Academic and Research Institutions
University Research Programs
Think Tanks
Government Contractors
International Organizations
Individual and Social Surveillance
Interpersonal Surveillance
Domestic Surveillance
Spousal Monitoring
Parental Controls
Elder Care Monitoring
Stalking Behaviors
Social Media Monitoring
Friend and Family Tracking
Professional Networking Surveillance
Dating App Monitoring
Online Reputation Management
Citizen Surveillance
Neighborhood Watch Programs
Community Policing
Citizen Journalism
Crowdsourced Investigations
Vigilante Surveillance
Doxing Activities
Online Harassment Campaigns
Unauthorized Investigations
Public Shaming Efforts
Previous
2. Technologies of Surveillance
Go to top
Next
4. Impacts and Consequences of Surveillance