The SAGE Encyclopedia of Surveillance, Security, and Privacy
eBook - ePub

The SAGE Encyclopedia of Surveillance, Security, and Privacy

  1. 1,248 pages
  2. English
  3. ePUB (mobile friendly)
  4. Available on iOS & Android
eBook - ePub

The SAGE Encyclopedia of Surveillance, Security, and Privacy

About this book

Although surveillance hit the headlines with revelations by Edward Snowden that the National Security Agency had been tracking phone calls worldwide, surveillance of citizens by their governments actually has been conducted for centuries. Only now, with the advent of modern technologies, it has exponentially evolved so that today you can barely step out your door without being watched or recorded in some way. In addition to the political and security surveillance unveiled by the Snowden revelations, think about corporate surveillance: each swipe of your ID card to enter your office is recorded, not to mention your Internet activity. Or economic surveillance: what you buy online or with a credit card is recorded and your trip to the supermarket is videotaped. Drive through a tollbooth, and your license plate is recorded. Simply walk down a street and your image could be recorded again and again and again. Where does this begin and end?

In all levels of social structure, from the personal to the political to the economic to the judicial, The SAGE Encyclopedia of Surveillance, Security, and Privacy uncovers and explains how surveillance has come to be an integral part of how our contemporary society operates worldwide and how it impacts our security and privacy.


Key Features:

  • Approximately 450 signed entries from contributors around the globe
  • Further readings and cross-references conclude each article to guide students further as they explore a topic
  • A Reader?s Guide organizes entries by broad thematic areas

Frequently asked questions

Yes, you can cancel anytime from the Subscription tab in your account settings on the Perlego website. Your subscription will stay active until the end of your current billing period. Learn how to cancel your subscription.
No, books cannot be downloaded as external files, such as PDFs, for use outside of Perlego. However, you can download books within the Perlego app for offline reading on mobile or tablet. Learn more here.
Perlego offers two plans: Essential and Complete
  • Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
  • Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Both plans are available with monthly, semester, or annual billing cycles.
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, we’ve got you covered! Learn more here.
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Yes! You can use the Perlego app on both iOS or Android devices to read anytime, anywhere — even offline. Perfect for commutes or when you’re on the go.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Yes, you can access The SAGE Encyclopedia of Surveillance, Security, and Privacy by Bruce A. Arrigo in PDF and/or ePUB format, as well as other popular books in Politics & International Relations & Science & Technology Law. We have over one million books available in our catalogue for you to explore.

Index

Entry titles and their page numbers are in bold. Page numbers follow the number of the volume they are found in (1:, 2:, 3:).
  • Abducted children alerts program (AMBER Alerts), 1:35–37, 1:352, 1:353
  • Abdulmutallab, Umar Farouk, 1:22, 1:320, 3:879
  • “Able Danger” program, 1:281
  • Aborigines of Australia, 1:218
  • Abortion, 1:1–4, 1:78
    • fascist states and, 2:385
    • pro-life movement, 2:766
    • Roe v. Wade, 1:37, 1:128, 2:766, 3:805–806
  • Abu Ghraib, 1:5–7, 2:620, 2:779, 3:944–945
  • Abu Sayyaf, 3:1113
  • Access Agents, 1:152
  • Accountability
    • Copwatching, 1:225–226
    • future of policing and, 2:761
    • moral agency, 1:21
    • responsibility, 3:860–862
    • See also Ethics; Inverse surveillance; Sousveillance; Transparency
  • Acheson-Lillienthal Report, 2:700
  • Adam Walsh Child Protection and Safety Act of 2006, 1:8–9, 2:547–548, 2:608, 3:906–907, 3:909
  • Adorno, Theodor W., 1:9–12, 1:76, 1:248, 2:403, 2:404, 3:870
  • Advance Passenger Information System (APIS), 2:732
  • Advanced Research Projects Agency Network (ARPANET), 1:345–346
  • Advertising and marketing research, 1:12–16
    • computer surveillance, 1:213
    • consumer watchdog groups and, 3:1119
    • cookies, 1:14, 1:221–223, 3:802
    • cybermarketing, 1:263–264
    • data mining and profiling, 1:280–281
    • Google and, 2:444–445
    • MySpace and, 2:643
    • See also Data mining
  • ADX (Administrative Maximum Facility), 3:978
  • Aerial reconnaissance and surveillance, 1:16–19
    • border surveillance, 2:496
    • CIA photoreconnaissance, 1:150, 1:154
    • Cold War era, 2:622–623, 3:994, 3:995
    • Cuban Missile Crisis and, 1:251, 3:995
    • drone technology, 1:325, 2:413, 2:496. See also Drones
    • drug trafficking interdiction, 1:332–333
    • espionage and, 1:364
    • Google Earth, 2:445–447
    • homing pigeons, 1:140
    • legal issues, 1:18–19
    • military intelligence, surveillance, and reconnaissance (ISR) systems, 2:622–626
    • modern U.S. manned military aircraft, 2:623–625
    • paparazzi and journalistic applications, 2:720–721
    • satellites, 1:18, 1:364, 3:995
    • speed enforcement, 2:472
    • UFO surveillance, 3:1055–1057
    • See also Drones; U-2 aircraft
  • Affordable Care Act, 1:309–310, 2:738–740
  • Afghanistan, 3:1112
    • al Qaeda and 9/11, 2:685, 3:1010–1011, 3:1112–1113
    • al Qaeda origins, 1:32
    • antiwar movement, 1:61
    • Bagram prison, 1:7
    • drug trade, 3:1010–1011
    • NATO and, 2:694, 2:695
    • 9/11 attack responses, 2:687–688, 3:1010–1011, 3:1112–1113, 3:1114–1115
    • private security contractors and, 2:619–620
    • Soviet intervention and U.S. response, 1:203–204
    • the Taliban, 3:1009–1012
    • U.S. use of drones, 1:323, 3:1011
    • WikiLeaks and, 3:1127
  • Africa, great power interventions, 1:313–314
  • Africa, U.S. counterterrorism activities, 3:1113
  • African Americans
    • capital punishment and, 1:136
    • COINTELPRO operations versus, 1:196–197
    • racial segregation, 3:900–902
    • stop and frisk policy and, 3:970
    • War on Drugs and, 3:824, 3:918, 3:1110
    • See also Civil Rights Movement; Slavery
  • African National Congress (ANC), 3:1024
  • AFRICOM, 1:314
  • Agamben, Giorgio, 1:110–111
  • Agency, 1:20–21
    • autonomous, 1:80–81
    • moral, 1:21, 1:79–80
    • rational, 1:79
    • See also Autonomy
  • Agnew, Spiro, 3:877
  • AIDS disinformation campaign, 1:312
  • AIDS/HIV, 2:584, 3:1013
  • Air Force Intelligence, 2:514–515
  • Air marshals, 3:1075, 3:1076
  • Airborne warning and control system, 2:623
  • Airport security, 1:22–26, 1:30, 3:1084
    • air...

Table of contents

  1. Cover
  2. Half Title
  3. Acknowledgements
  4. Title Page
  5. Copyright Page
  6. Contents
  7. Publisher Note
  8. About the Editor
  9. Contributors
  10. Introduction
  11. A
  12. Abortion
  13. Abu Ghraib
  14. Adam Walsh Child Protection and Safety Act of 2006
  15. Adorno, Theodor W.
  16. Advertising and Marketing Research
  17. Aerial Reconnaissance and Surveillance
  18. Affordable Healthcare Act
  19. Agency
  20. Airport Security
  21. Airport Terminal Security Screenings
  22. Al Qaeda
  23. Alcoholics Anonymous
  24. AMBER Alerts
  25. American Civil Liberties Union and Electronic Privacy Information Center
  26. American Protective League
  27. Amnesty International
  28. Anarchism
  29. Ancient Greek Surveillance
  30. Anonymous
  31. Anti-Defamation League
  32. Antiglobalization
  33. Antinuclear Movement
  34. Antipsychiatry Movement
  35. Antiwar Movement, History in United States
  36. Antiwar Protest Surveillance, 1960s
  37. Apartheid
  38. Apple
  39. Arab Spring
  40. ATM Cards
  41. Australia
  42. Authoritarianism
  43. Autonomy
  44. B
  45. Beck, Ulrech
  46. Beijing, China, Surveillance in
  47. Benjamin, Walter
  48. Bentham, Jeremy
  49. Berlin Wall
  50. Biblical Surveillance
  51. Big Data
  52. Bill of Rights
  53. Bioengineering
  54. Bioinformatics
  55. Biometrics
  56. Biopolitical Tattooing
  57. Biosurveillance
  58. Blockades
  59. Border Patrol Checkpoints
  60. Botnets
  61. Brazil
  62. Breathometer and Breathalyzer Machines
  63. Brown v. Board of Education (1954)
  64. C
  65. Camp David Accords
  66. Canada
  67. Capital Punishment
  68. Carrier Pigeons
  69. Castration, Chemical
  70. Castration, Surgical
  71. Catholic Church and the Sexual Abuse of Minors
  72. Cell Phone Tracking
  73. Cell Phones
  74. Central Intelligence Agency
  75. Chain Gangs
  76. Chicago, Illinois, Surveillance in
  77. Child Pornography
  78. China
  79. Choice: Security or Civil Liberties
  80. Citizens United v. Federal Election Commission (2010)
  81. Citizenship
  82. Citywide Sweeps of the Homeless
  83. Civil Commitment
  84. Civil Disobedience
  85. Civil Liberties
  86. Civil Rights Movement
  87. Civil War
  88. Closed-Circuit Television
  89. Cloud Computing
  90. COINTELPRO
  91. Cold War
  92. Colonialism
  93. Commodification of the Body
  94. Communication Studies
  95. Community
  96. Computer Surveillance
  97. Concentration Camps
  98. Constructivism
  99. Cookies
  100. Copenhagen School
  101. Copwatch
  102. Corporate Personhood
  103. Corporate Surveillance
  104. Cosmopolitanism
  105. Counterintelligence
  106. Creeping
  107. Crime
  108. Crime Control
  109. Crime Mapping
  110. Critical Security Studies
  111. Cuba
  112. Cuban Missile Crisis
  113. Cults
  114. Cultural Studies
  115. Curfews
  116. Cyberbullying
  117. Cybercities
  118. Cybermarketing
  119. Cybermurder
  120. Cyberprostitution
  121. Cybersecurity Legislation*
  122. Cyberstalking
  123. Cybertheft
  124. Cyberwar
  125. D
  126. Data Mining and Profiling in Big Data
  127. Data Mining and Profiling in Social Network Analysis
  128. Data-Doubles
  129. Dataveillance
  130. Death Penalty
  131. Death Row
  132. Deleuze, Gilles, and Félix Guattari
  133. Deportation
  134. Détente
  135. Deviance
  136. Dictators and Dictatorships
  137. Digital Divide
  138. Digital Passwords
  139. Digital Privacy
  140. Diplomacy
  141. Diplomatic Envoys
  142. Disease Model in Psychiatry
  143. Disinformation Campaigns
  144. Djibouti
  145. DNA Technology
  146. Domestic Terrorist Groups
  147. Drone Strikes
  148. Drones, Commercial Applications of
  149. Drug Testing
  150. Drug Testing Kits
  151. Drug Therapy
  152. Drug Trade
  153. Drug Trafficking
  154. Dumpster Diving
  155. E
  156. E-Government
  157. Electronic Harassment
  158. Electronic Monitoring
  159. Electronic Restraint Devices
  160. Electronic Surveillance
  161. Email
  162. Embargoes
  163. Emergency Alert Systems
  164. Eminent Domain
  165. Environmental Security
  166. Equality
  167. Espionage
  168. Espionage in Ancient Egypt
  169. Ethics
  170. Ethiopia
  171. Eugenics Industrial Complex
  172. European Convention on Human Rights
  173. F
  174. Facebook
  175. Fascism
  176. Fast Capitalism
  177. Fear, Culture of
  178. Federal Bureau of Investigation
  179. Federal Trade Commission’s Bureau of Consumer Protection
  180. Federal Violent Crime Control and Law Enforcement Act
  181. Fingerprints
  182. Foreign Intelligence Surveillance Act
  183. Foucault, Michel
  184. Frankfurt School
  185. Franklin, Benjamin
  186. Free Speech
  187. Freedom of Expression
  188. Freedom of Information Act
  189. G
  190. Garland, David
  191. Gated Communities
  192. Germany
  193. Glasnost
  194. Global Justice
  195. Global Mobility
  196. Global Positioning Systems
  197. Global Surveillance
  198. Global Village
  199. Globalization
  200. Goffman, Erving
  201. Google
  202. Google Earth
  203. Governing Through Crime
  204. Governmentality
  205. Gramsci, Antonio
  206. Greece
  207. Guantanamo Bay
  208. Guatemala
  209. H
  210. Habeas Corpus
  211. Hamas
  212. Hate Crimes
  213. Health Management Organizations
  214. Hepting v. AT&T
  215. Highway and Interstate Surveillance
  216. Hobbes, Thomas
  217. Home Surveillance
  218. Hoover, J. Edgar
  219. Houston, Texas, Surveillance in
  220. Human Trafficking
  221. Hunger Games, The
  222. I
  223. Iceland
  224. Identity Politics
  225. Identity Theft
  226. Immigration
  227. Immigration and Naturalization Service
  228. Incapacitation
  229. India
  230. Information Security
  231. Information Warfare*
  232. Infotainment
  233. Insanity
  234. Intellectual Property Rights
  235. Intelligence Community
  236. International Diplomacy*
  237. International Monetary Fund
  238. International Relations Theory
  239. Internet Pornography
  240. Internment Camps
  241. INTERPOL
  242. Inverse Surveillance
  243. iPhones
  244. Iran
  245. Iran-Contra Affair
  246. Iranian Hostage Crisis (1979)
  247. Iraq
  248. Israel
  249. Italy
  250. J
  251. Jacob Wetterling Crimes Against Children and Sexually Violent Offender Registration Act
  252. Jennicam
  253. K
  254. Kafka, Franz
  255. Katz v. United States (1967)
  256. KGB
  257. Knowledge
  258. Kyllo v. United States (2001)
  259. L
  260. Latour, Bruno
  261. Law*
  262. Law and Digital Technology*
  263. Legal Moralism
  264. Libertarian Party
  265. Libya
  266. Lie Detector Instrumentation
  267. Life Sciences Surveillance and Security
  268. Life Without Parole
  269. Locke, John
  270. London, England, Surveillance in
  271. M
  272. Machine Learning
  273. Martial Law
  274. Marx, Gary T.
  275. Marxism
  276. Mass Incarceration
  277. Mass Surveillance
  278. Matrix, The
  279. McCarthyism
  280. Medieval Castles
  281. Megan’s Law
  282. Mental Disability Laws
  283. Mental Health Inpatient Facilities
  284. Methadone Maintenance
  285. Mexico
  286. Military Industrial Complex
  287. Military Intelligence
  288. Minority Report
  289. Mobile Phones
  290. Modernism
  291. Monitor Versus Merrimac
  292. Moral Panic
  293. Morality
  294. Mountain Surveillance
  295. Movie Theater Security
  296. Municipal Surveillance
  297. Myspace
  298. N
  299. Narcissism
  300. National Security
  301. National Security Agency
  302. National Security Agency Leaks
  303. National Security Council
  304. Nazism
  305. Neighborhood Watch Programs and Citizen Patrol
  306. Network Security
  307. Neuroscience and Brain Biology
  308. New Penology
  309. New York, New York, Surveillance in
  310. News Media
  311. Nigeria
  312. 9/11
  313. North Atlantic Treaty Organization*
  314. North Korea
  315. Nuclear Treaties
  316. Nuclear War
  317. O
  318. Offender Reentry Programs
  319. Online Shopping
  320. Open Source Computing
  321. Orwell, George
  322. P
  323. Panopticon, The
  324. Paparazzi
  325. Paramilitarization
  326. Parental Surveillance
  327. Parks
  328. Parole
  329. Passenger Data
  330. Passenger Profiling
  331. Paternalism and Parens Patriae
  332. Patient Protection and Affordable Care Act of 2010
  333. PATRIOT Act
  334. Peace Talks and Peace Agreements
  335. Perestroika
  336. Phishing and Scams
  337. Play-Dates and Play-Spaces
  338. Plessy v. Ferguson (1896)
  339. Plethysmograph
  340. Police State
  341. Policing and Society
  342. Political Action Committees
  343. Political Dissidents
  344. Political Psychology
  345. Politics
  346. Port Security
  347. Postcolonialism
  348. Poststructural Theory
  349. Power
  350. Prison and Jail Segregation Units
  351. Prisons and Jails
  352. Privacy
  353. Privacy, Internet
  354. Privacy, Medical
  355. Privacy, Right to
  356. Privacy, Types of
  357. Privacy Act of 1974
  358. Private Law Enforcement
  359. Private Prisons
  360. Probation
  361. Profiling, Racial
  362. Propaganda
  363. Protection Orders
  364. Psychological Assessment
  365. Psychotherapy
  366. Public Health, Surveillance in
  367. Punishment
  368. Punishment and Society
  369. R
  370. Radio-Frequency Identification Devices
  371. Religion
  372. Religious Freedom Restoration Act of 1993
  373. Republican Party
  374. Researching Cybercrime
  375. Responsibility
  376. Restraining Orders
  377. Revolutions and Revolts
  378. Riot Control
  379. Risk Society Thesis
  380. Russia
  381. S
  382. Scandals, Political
  383. Scanners
  384. School Surveillance: Colleges and Universities
  385. School Surveillance: Primary and Secondary Schools
  386. Search and Seizure
  387. Secure Fence Act of 2006
  388. Securities and Exchange Commission
  389. Securitization
  390. Security, Concepts of
  391. Security Screenings at Sporting Events
  392. Security Theater
  393. Segregation, Residential
  394. Self-Deportation
  395. Sex Offender Laws
  396. Sex Offender Registries
  397. Sexting
  398. Shopping Mall Security
  399. Situationists
  400. Slave Trade
  401. Smart Borders
  402. Smartphones
  403. Smuggling
  404. Social Contract Theory
  405. Social Control
  406. Social Justice
  407. Social Media
  408. Social Network Analysis
  409. Social Sorting
  410. Sociality
  411. Society of Captives Thesis
  412. Solitary Confinement
  413. Sousveillance
  414. South Africa
  415. Sovereignty
  416. Spain
  417. Spam
  418. Special Operation Forces
  419. Specialty Courts for Domestic Violence
  420. Specialty Courts for Mental Health
  421. Specialty Courts for Substance Abuse
  422. Spectacle, The
  423. Spies
  424. Spyware
  425. Stand Your Ground Laws
  426. Stigma
  427. Stop and Frisk
  428. Stuxnet Virus
  429. Subjectivity
  430. Substance Abuse Treatment Facilities
  431. Supermax Prisons
  432. Surveillance, Culture of
  433. Surveillance, Theories of
  434. Surveillance & Society
  435. Surveillance Art
  436. Surveillance Deterrence
  437. Surveillance During the Age of Reason
  438. Surveillance During the Cold War
  439. Surveillance During World War I and World War II
  440. Surveillance Investigator
  441. Surveillant Assemblage
  442. Swatting Hack
  443. Synology Surveillance Station
  444. Synopticon, The
  445. Syria
  446. T
  447. Taliban
  448. Tarasoff v. Regents of the University of California (1976)
  449. Tasers and Other Less-Than-Lethal Devices
  450. Tea Party
  451. Technology
  452. Telemetric Policing
  453. Terrorism
  454. Tet Offensive
  455. Texting
  456. Threat Assessment
  457. Torture
  458. Totalitarian Surveillance Societies
  459. Traffic Control
  460. Traitors
  461. Transparency
  462. Trinidad and Tobago
  463. Truman Doctrine
  464. Truth
  465. Twitter
  466. U
  467. UFO Surveillance (History, Purpose, Examples)
  468. UN Peacekeeping and Security Forces
  469. U.S. Constitution*
  470. U.S. Customs and Border Protection
  471. U.S. Department of Homeland Security
  472. U.S. Secret Service
  473. U.S. Transportation Security Administration
  474. United Kingdom
  475. United Nations
  476. United States
  477. United States v. Jones (2012)
  478. United States v. Miller (1976)
  479. United States v. Spy Factory, Inc. (1997)
  480. Unregulated Cyber Currencies
  481. V
  482. Vagrancy Laws
  483. Vehicle Tracking Systems
  484. Victim-Offender Mediation
  485. Violence Against Women Act
  486. Voting
  487. Voyeurism, Digital
  488. W
  489. War on Drugs
  490. War on Terror
  491. Warrants
  492. Watchdog Groups
  493. Watergate and White House Tapes
  494. Weapons of Mass Destruction
  495. Whistle-Blowers
  496. WikiLeaks
  497. Wire Taps
  498. Women, Girls, and the Body
  499. Work Surveillance
  500. Wrist and Ankle Monitoring Devices
  501. Y
  502. Youth Detention Centers and Facilities
  503. YouTube
  504. Index