21st Century Debates - Surveillance: The Impact on Our Lives 0739831747, 0739831720, 9780739831724

“Includes bibliographical references (page 61) and index Today's social and headline-making dilemmas, with their v

113 4 8MB

English Pages 72 Year 2001

Report DMCA / Copyright

DOWNLOAD PDF FILE

Recommend Papers

21st Century Debates - Surveillance: The Impact on Our Lives
 0739831747, 0739831720, 9780739831724

  • 0 0 0
  • Like this paper and download? You can publish your own PDF file online for free in a few minutes! Sign Up
File loading please wait...
Citation preview

MCT

OIXI

O >?

;#

#

^»|*.^>':#\,.

11

m ^4

kAi^-'«^JVr

;?*

;-..^

LETT ^^S^g^SS^SS

i^

I

GEO 3 03905 8687^ \j^)'c^

Digitized by the Internet Archive in

2011

http://www.archive.org/details/surveillanceOOscar

eisT

CEIMTURY

DEBATES

SURVEILLANCE THE

IIVIPACT DIM

OUR LIVES

SCARLETT IVIccGWIRE

^•^xi

RAINTREE

l^fl STECKAAUGHN

ES3 PUBLISHERS A Harcourt Company Austin

New York

www.steck-vaughn.com

21st Century Debates Series Climate Change

Energy

Genetics

Internet

Media

Rain Forests

Surveillance

Waste and Recycling

©

text, Steck- Vaughn

Copyright 2001,

All rights reserved.

No

part o{ this

Company

book may be reproduced

or utilized in any

form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage and retrieval system, without

permission in writing from the Publisher. Inquiries should be addressed

to:

Copyright Permissions, Steck- Vaughn Company, P.O. Box 26015, Austin,

TX

78755.

Published by Raintree Steck-Vaughn Publishers,

an imprint of Steck-Vaughn Company Library of Congress Cataloging-in-Publication Data

MccGwire,

Scarlett.

Surveillance: the impact

cm.

p.



on our

lives

Scarlett

/

MccGwire.

(21st century debates)

Includes bibliographical references and index.

ISBN 0-7398-3174-7 Surveillance

1.

[1. I.

Title.

Printed in 1

2

3



^Juvenile literature.

Surveillance.]

Bound

Italy.

4 5 6

Series.

II.

7

8 9

in the

United

States.

04 03 02 01 00

Picture acknowledgments: AFP/Corbis 11; Barclays 46; Bettmann/Corbis 10, 19;

Boots

Company

(Digital Art), 15

33

pic 47; Cellnet 37; Corbis 5, 9

(The Purcell Team), 12

(Tim Wright), 27 (Steve Raymer), 28 (Roger Ressmeyer),

(Amos Nachoum), 36 (Kelly-Mooney Photography), 45

56 (Kit Kittle); Mary Evans Picture Library 13, 52, 53;

The Ronald Grant Archive

USMC/Reuters/Popperfoto

6;

News

4;

8, 34,

(Peter Tumley),

Genesis Space Photo Library 40; HO/Official

International Syndication/Times

Newspapers Ltd. 38 (Andy Watts); Norbain pic 30, 35; Panos Pictures 29 (Jeremy Homer); Popperfoto 18, 41; Popperfoto/Reuters 48; Quadrant Picture Library 58; Racal 44; Reuters

Newsmedia Inc/Corbis

42;

Reuters/Popperfoto 16; Science Photo Library 21 (James King-Holmes), 32 (Victor de Schwanberg), 51 (U.S. Geological Survey);

(Kevin R. Morris), 23 (David

Joel),

Tony Stone Images

31 (Alan Thornton), 49 (Bob Schatz), 54 (Doug Armand), 55

(Dan

Bosler),

59 (Don Spiro).

Cover: foreground picture shows a U.S. Airforce Lockheed spy plane

(Quadrant Picture Library); background picture shows a colored radar satellite

image of farmland used

(NASA/Science Photo

for

17

24 (Roger Tully), 26 (Jim Krantz),

mechanized agriculture

in the

Library).

ui Wlen County PutJ^c

7

Webster Street

900 PO Box 2270

^^^^^

FortWnvne,lN^^S^^"^^

'

Ukraine

CDIMTEIXITS The Development

of Surveillance

Government Surveillance

4

;

9

Police Surveillance

28

Corporate Surveillance

46

Protecting the Citizen

57

Glossary

60

Books to Read

61

Useful Addresses

62

Index

63



THE DEVELOPIVIEIMT OF SURVEILLAIMCE High-Tech Watching A Goad or Bad Thing? Surveillance

FACT until

German pnlice employed half a

the monitoring and documenting

of various aspects of people's lives to find out

the end of the Cold War, the East

Up

is

milllan

secret informers,

ia,DDD of whom were needed just to listen to and transcribe citizens' phone calls.

when

rules are being

obeyed or broken.

has been

It

with us for centuries. Governments have always

employed spies to keep an eye on their enemies and sometimes even on their allies. The police have had people tailed (followed), and they have paid informers to tip

them

off

about crimes that are

being planned. Today, surveillance

carried out in

is

person, or by using photographic, video, or audio

techniques.

New

technology makes the tracking of

far easier than computer technology

people

it

used to be. Businesses use

to gain useful information

about their customers, remote-control cameras An

American magazine from

shows a private eye

tailing

the

1

930s

a suspect.

watch

us as

we walk down

the street, and our

telephone conversations and e-mails can be monitored. In the United States, e-mails are subject to intelligence scanning for key words at a rate of

When

two million per hour.

emperors, kings and queens, czars, or

dictators

governed countries, these

rulers

had

when people began to elect own governments, they started to question authority of those who monitor the activities

absolute power. But their

the

of other citizens. In

modern

society, technological

surveillance serves a positive purpose:

It is

widely

used to apprehend criminals, for example. But surveillance technology

many people

are

now

is

also

open

to abuse,

and

asking questions about the

nature and uses of surveillance.

THE DEVELDPIVIENT OF SURVEILLANCE This book examines the effect that technology has

had on surveillance and

its

VIEWPOINTS

implications for our

How much

do the government, the police, and business corporations know, and how much do they have a right to know? What laws, if any, are needed to protect us? rights as citizens.

A slow process Until the 1960s, most surveillance was low-tech

and expensive. If you wanted to watch suspects, you had to tail them. To follow a person, at least six people, organized in teams of two, were required daily to

work three eight-hour

material and contacts gathered

shifts.

had

All the

to be typed

up

"The right of the individual to be protected against intrusion into his life or affairs, or those of his family, by direct physical means or by publication of information." A definition of privacLj by David Calcutt OO. from a 1990 Report of the Committee on Privacy and Related Matters

personal

away, which

meant that cross-checking man who had committed a robbery) took a long time. Even electronic surveillance, like phone tapping, was highly labor- intensive because the results had to be and

filed

(for

example, finding a red-headed

new forms of had emerged, many of

"What the East German secret police could only

dream of

is

rapidly realitg in

typed up. However, by the 1980s,

becoming a

electronic surveillance

the free world."

which were aimed at making phone taps and other interceptions of communications automatic. Today, the development of computer technology has made

David Danisan Privacy International [a surveillance

privacy monitoriny oryanizationj

cross-checking almost instantaneous.

Before the introduction of

new

technology, the checking of surveillance

data was a laborious process Federal Bureau staff

.

Here

of Investigation (FBI)

check fingerprint

files.

SURVEILLANCE Surveillance technology consists of devices and

systems that can monitor, track, and assess the

movements

of people

and

their property. In

western democracies, this technology

is

used to

track people suspected of being involved in

organized crime, such as terrorism and drug

running.

It is

also used

by employers to track the

behavior of their employees and by private investigators seeking evidence for their clients.

However,

it is

also

sometimes used to follow the

activities of political dissidents,

environmental

activists

Elsewhere surveillance

such

and animal

is

as

liberationists.

are perceived to be a threat to the state;

include

human

who these may

used to track people

rights activists, journalists, student

leaders, minorities,

union

leaders,

and

political

opponents. Businesses use surveillance extensively. In shopping malls, video

A soldier tests

out

his night-vision

(CCTV)

cameras or closed circuit television

cameras provide a record of customers'

technology can also be used for

movements. The random monitoring of customer phone calls helps businesses gain a profile of their clients so that they can target their products more

surveillance purposes.

effectively.

goggles prior to a

combat

exercise in

the dark in the Persian Gulf. This

A growth industry A huge range of surveillance technologies has evolved.

Night-vision goggles allow spies to see in the dark.

Parabolic microphones detect

conversations over a mile away, and the laser version

can pick up a conversation through a closed window. The Danish Jai stroboscopic camera can take hundreds of pictures in a matter of seconds

and

is

capable of

THE DEVELOPMENT DP SURVEILLANCE photographing every single participant

in a

FACT

demonstration or march. Automatic vehicle recognition systems track cars around a city by way

New

of a system of maps.

technologies, originally

developed for the defense and intelligence sectors

War between what

during the Cold

used to be the

Soviet Bloc and the West, have, since the collapse of

communism,

become

rapidly

available to the

in the developed world is located, on average, on three hundred databases. IVIany people in the West are entangled in a web of

surveillance that

and private companies.

police

An adult

embraces everything from bank accounts

The West has

led the

way

surveillance technology.

development of

in the

It

to e-mail.

has provided, and

continues to provide, invaluable support to military

and

totalitarian regimes

British

throughout the world.

computer firm provided the technology

the South African automated Passbook, a

One for

means of

identification used by the apartheid regime in that

country to discriminate against nonwhite citizens. In the 1980s, an Israeli

company developed and

exported the technology for a computerized death list

used by the Guatemalan police. Surveillance

is

an important activity in the pursuit of intelligence

and

political control

regimes.

Many

by military and totalitarian

countries in transition to democracy

also rely heavily

on

surveillance to satisfy the

demands of the police and the

New

military.

technology makes possible the mass

surveillance of populations. In the past, regimes relied

on targeted

surveillance.

With new

technology, the financial transactions,

and geographic movements of millions of people can be tracked, analyzed, and transmitted cheaply and efficiently.

communications

activities,

In 1948, George Orwell's novel

was a

published.

It

which the

citizens

J

984 was

terrible vision of a society in

were constantly under the

surveillance of a dictator called Big Brother. course,

we do not have

televisions in our

Of

homes

SURVEILLANCE i

John Hurt as Winston Smith

tries to

evade the ever-watchful eye of Big

^^^^^^M^l^^^^^^H

^^^^B

Brother in the film version of George

^^P'^'i^B

Orvuells novel 1984-

g Ih ^^B Hh H Hj B m 1

Wm

^^^^^^^^^^^^^^^^^^^^^^^^RR[u^L

1

v^kB

nmm fi

VIEWPOINT "The telescreen received

and transmitted simultaneously. Any sound that Winston

made, above the

level of

a very low whisper, would be picked up by it; moreover, so long as he remained within the field of vision which the metal plaque commanded, he could be seen as well as heard. There was, of course, no way of I knowing whether you I were being watched at

^^j^^^^^^^^Bfl

I^^^^^^^H^^^^^s

^BBJ^II^y#t»7^^»^5^^

wtsS 1 JiffHI ;

'-^SSl^-a^HI

^^s^^^sP

recording our every move. However, the

information that

is

known ahout each

considerable. In Orwell's

J

^MHHB!

amount

of us

of

is

984, government power

was obvious and frightening. As reahlife

citizens at

dawn of a new millennium, we have no idea who is watching, listening, or keeping tabs on us. the

But

if

someone wants

to, it

is

only too easy.

In most democracies there are laws that control the

any given moment."

use of surveillance by state bodies.

Eeorge 1984

usually

Orwell,

f'

These laws

from his navel fall

into

two groups: those controlling the

act of surveillance, such as telephone tapping

(including e-mails) and bugging devices; and those regulating the personal information that

gained from surveillance. However, not

may be

all

surveillance techniques are covered and, as

we

shall discover during the course of this book,

serious questions

ipJEBATI^ ^iHfow ,

J,

do we balance our

right to privacy with

the government's need know what we are doing so that we do not cause harm?

\to

effectiveness of

much

Clearly there are surveillance.

of

many

It

still

arise

concerning the

surveillance legislation.

many good

reasons for

has not only resulted in the arrest

criminals, but also prevented crimes from

being committed. But, as

we

shall see,

it is

an

increasingly powerful tool that can be abused.

GOVERIMIVIEIXIT

SURVEILLAIMCE Security Strategies or 5tate Snooping?

What happens when

a

government abuses

its

power? In countries governed by totalitarian

know

regimes, such as China, citizens

that they are

under surveillance. But what happens when appear to contradict the meaning of

the word democracy? As citizens, how do we know whether the state is protecting us or defending its

own

FACT

Every year, about 15 to

democratic governments carry out surveillance strategies that

t 2D

billion dollars

spent on Comint, mostly by the United States, Canada, Great Britain, Australia, and is

New

Zealand.

interests?

Government

surveillance in the

West

uses

advanced technology to provide the most sophisticated are spent

methods

available. Billions of dollars

on developing

state-of-the-art techniques

that are later sold to commercial companies

developing countries.

intelligence about foreign countries as

citizens.

The

on

their

own

secret interception of

communications has been practiced by almost every advanced

foreign

nation since international

telecommunications were invented. This communications intelligence,

known

Comint, provides governments with information about foreign events. In the developed world, as

information

is

the key to maintaining

power and influence.

In China, citizens actions

may

authorities.

Governments concentrate on gathering well as keeping an eye

and

know

that their

he scrutinized by the

SURVEILLANCE The most

traditional

Comint

targets are

military messages and diplomatic communications between national capitals and missions abroad. This means that, for

example, the British intelligence

on communications between the Chinese Embassy in London service listens in

and

Beijing. Since the 1960s, following

the growth of world communications, the

gathering of information about economic, scientific,

become

and technical development has

increasingly important.

More

recent targets for intelligence gathering The

intelligence services use

surveillance techniques to monitor the activities

Here FBI agents

house of Mafia boss

m

stake out the

Sam Giancana

launderers,

At home,

the government uses the interception of

telecommunications to spy on people

dictatorships, political

some

FACT the United States

from the mid-IG^Os until 1974, the Red Squad, comprising members of the Michigan State police, kept files on people suspected of being

communists even though they had committed no crime. It was believed that such people posed a threat to the political system of the country.

it

believes are

a danger to the state. In democracies these tend to

be organized gangs of criminals or

1963.

In

money

and organized criminals.

of organized criminals. Until

recently these techniques were fairly basic.

include drug traffickers, terrorists,

human

terrorists.

In

rights groups, reporters,

opponents are the most

common

and

targets. In

Honduras and Paraguay, the state-owned telecommunications companies actively help the security services monitor those fighting for human rights. Also, intelligence gathered for one purpose can be used for another. Between 1967 and 1975, the United States and British intelligence services used information from Comint that had been collected primarily for other purposes to countries, such as

provide data about political opposition figures.

5py

satellites The United States has the most powerful network It can intercept communications signals anywhere on the planet. The United States is part of the USA/UK alliance, which includes the English-speaking countries of Australia, New Zealand, Canada, and Great Britain. This alliance uses the Echelon network of satellites.

of spy satellites in the world.

00 CO 00 in

o CO o cc cr oc

I

.1

EDVERNMENT SURVEILLANCE Other spy relays

satellites

include Russia's FAPSI, which

information via large collection

Lourdes in France, Cuba, and at

Vietnam; Germany's

The

latter

site at

two

BND; and

Cam Ranh France's

Bay,

DGSE.

are said to collaborate at a collection

Kourou, Guyana, and are targeted on North

and South American

satellite

communications.

Most people have no idea of the number of government satellites orbiting the Earth, taking pictures of us and listening in on our telephone conversations. These are secret operations. We may be photographed and have all our electronic communications intercepted without even being aware that somewhere in space a satellite is

J

Most democracies have laws that limit the

powers of government surveillance. In the United States, for

example, the National Security Agency is prohibited from deliberately eavesdropping on U.S. citizens unless it can establish probable cause to suggest that they are agents of a foreign government,

committing espionage or other crimes.

passing overhead.

However, some of these

FACT

sites at

satellites are

tracked by

amateur w^atchers. The orbital paths and schedules

known U.S. spy satellites are posted on Armed with a personal computer and a basic understanding of astronomy, it is now possible to calculate when the satellites will pass

In recent years surveillance technology

of the five

has become ever more complex. Here

the Internet.

Gerry Adams, leader of Sinn Fein,

over any point on Earth.

political

wing of

the

IRA,

holds a

bugging device he claims the British security services planted in his car.

the

SURVEILLANCE work by picking up radio signals that pass directly into space. These signals are used to provide global communication and to intercept such communications in space and on land. Long distance microwave radio relay links may require dozens of intermediate stations to receive and retransmit communications. Each subsequent receiving station picks up only a tiny fraction of Satellites

the original signal, while the remainder passes over the horizon and on into space. This

is

known

as

microwave spillage. The best position for satellites to pick up on microwave spillage is not above the chosen target, but up to 80 degrees of longitude, away. This technique was used during the 1960s to provide intelligence gathering from space. An

artist's

impression of a

relaying signals to

satellite

and from a

receiving station.

i FACT

Echelon an integrated global network of satellite and associated relays. It is the most powerful spy satellite network we know about. It is used to intercept ordinary e-mails, faxes, telexes, and Echelon

is

telephone conversations throughout most of the world.

It

targets

governments, organizations,

Echelon has existed since the 197Ds and was greatly enlarged

businesses,

between 1975 and

Echelon are the United States National Security Agency (NSA), the New Zealand Government

1995.

In

the mid-198as.

began to make heavy use of the American and British global communications It

network.

In 1991, a British television

and individuals, but

almost anyone.

The

could affect

five security agencies that

run

Communications Security Bureau (GCSB), the British Government Communications Headquarters (GCHQ), Canada's Communications Security Establishment (CSE), and the Defense

program reported that the system secretly

Signals Directorate

intercepts every single telex passing through London. It picks up thousands of diplomatic, business,

Echelon

and personal messages every day.

it

is

(DSD)

in Australia.

not designed to eavesdrop on a

particular individual's e-mail or fax link. Instead,

it

intercepts very large quantities of communications and uses computers to identify and extract messages of interest from the mass of unwanted ones. A chain of secret interception facilities has been established around the world: some monitor

.

GOVERNMENT SURVEILLANCE communications satellites, others monitor lanJbased communications netwc:)rks, and others monitor radio communications. Echek^n links all these facilities together, providing the United States

and

Its allies

with the

ability to intercept a large

proportion ot the communications on the planet.

An

important point about the

new system

before Echelon, different countries

knew what was being

stations

whom

it

was being

sent.

Now

and

is

that,

different

intercepted and to

FACT During the Cold War, the United States used spy satellites to record the activities of the Soviet Union and China. Scientists are now using some of these pictures to measure ecological changes such

as global warming.

a tiny proportion of

A

straight to the

The rest are sent National Security Agency in the

United

which means that the other

used for taking photographs and

the messages are read locally.

are

States,

no longer being kept

fully

allies

informed.

Russian spy

the

pyramids

satellite

photograph of

in Egypt. Satellites are

intercepting communications

v\\\

'€

'

*

%^'

\

i ..

^

/

/

f

J

SURVEILLANCE Until recently, Echelon was a closely guarded

VIEWPOINTS f we can no "We feel

longer remain silent regarding that which we regard to be gross malpractice and negligence within the

establishment

we

in

which

operate."

secret.

But some members of the

intelligence service

New

Zealand

became worried about the

powerfulness of the system and feared that

being abused by the countries running particular the

United

revealed the existence

of Echelon in an article in the

And

magazine.

in

States. In 1988, the British

Duncan Campbell

journalist

it,

was

it

in 1996, a

New

book

Statesman

called Secret

Power

IntElligencE aperitives at ECHO, the British militarLj

was published by

intelligence center

Hagar, also revealing details of the Echelon system.

New

Zealand author Nicky

In 1998 a British newspaper. The Sunday Times,

discovered that the United States was using

information from Echelon to help U.S. companies "1 can sag categoricallg that MSA is as careful as ang civil libertarian

would want

it

to be in

adhering to the rules. There is an ingrained discipline about that, right down to the lowest levels of tbe agencg." Stewart A Baker. N5A's former general counsel

bid for contracts against competitors in other

The paper

countries.

Menwith

reported that the U.S. -run

Hill interception station in

North

Yorkshire in Great Britain was monitoring

information about business deals.

Inside informatian have also shown

Journalists

that Echelon has

benefited U.S. companies involved in arms deals

because

it

has provided

them with

inside

information. In 1990, the U.S. intercepted secret negotiations between Indonesia and Japan and

persuaded Indonesia to include the huge U.S.

company

AT&T

in a multibillion-doUar

telecommunications deal that going solely to Japan's

at

one point was

NEC. And

in 1995,

when

the United States was in crucial World Trade

Organization talks with Europe over a dispute with

Japan over car part exports, Echelon provided information about the Japanese that strengthened the U.S. position.

It is

alleged that the

NSA has,

through Echelon,

intercepted conversations between the

German

company Volkswagen and General Motors. And the French have complained that their electronics

.

GOVERNMENT SURVEILLANCE company, Thompson CSF, lost a $1.4 million deal to supply Brazil with a radar system because the

NSA

intercepted details of the ne^H)tiations and

company Raytheon, which subsequently won the contract. The

passed

them on

to the U.S.

European company, Airbus Industrie, believes it lost a $1 billion contract to the U.S. companies Boeing and McDonnell Douglas because of information intercepted by United States surveillance systems.

Reaction to the news of Echelon and, in particular, to the

way

UK, was

it

on European countries from the

spied

swift

and

critical.

The

leading Italian

Mondo, featured the issue its cover story for two weeks in 1998. The following week, the French daily newspaper business magazine,

Liberation

devoted

11

its first

under the headline Planet." suit

the

US

NSA

Listens to the

Other European countries quickly followed

by questioning the right of the

to the

m^

"How

four pages to the

as

United States in

this way.

UK to play host

The American Sugar Grove

Electronic

Surveillance Center, photographed here in

1992, has become one of the NSA's

top listening posts

SLIRVEILLAMCE It is

VIEWPOINTS

understandable that countries spy on each

other to protect their citizens from outside threats.

InteUigence gathered from surveillance might alert

"MajDr governments are routinely utilizing

a country to the danger of falling

communications

potential

intelligence to provide

provide information that would allow a country to

commercial advantage to companies and trade." Duncan Campbell.

enemy

in the

behind a

arms race, or

it

could

take evasive action to avoid conflict. But

it is

not

commercial surveillance, as the European reaction to Echelon demonstrated. so easy to justify

Brltl5h

JaurnaliEt

-

..^-

So, does commercial surveillance provide any positive benefits to society, or does

it

simply benefit

"The nation^s spy

the nation that carries

satellites typically produce far too much information for

poker game, then

overworked and under-

control of the system at a distinct advantage.

trained intelligence analysts to handle."

Echelon system is set up to maintain the status quo, which means that the existing inequalities

U. 5. reCirBd

Jeremiah,

admiral Daniel

in

a classified

can see

all

it

out?

If

a secret spy system

the hands in the international business it

automatically places those in

The in

the global power struggle are reinforced.

report ta the CIA. IDQE It is

An

artist's

Helios spy

representation of the satellite.

,a;K •4

w

not only commercial companies that have

their communications intercepted. In the 1970s and 1980s, the British military intelligence center, GCHQ, spied on charities including Amnesty

GOVERNMENT SURVEILLANCE Aid hy monitorini^

International and Christian all

their

communications. But

should he

it

remembered that most countries play dirty when they can. The French spy on the United States and on other western countries' telephone and cable traffic by way of the Helios J A spy satellite. However, western countries do not have a completely free hand in using their theory, all the countries using

satellites.

In

Echelon have laws

that govern the kind of interceptions that gather

communications intelligence under

this system.

Underwater cable interception Cables laid under the sea take an

enormous amount of international telecommunications for a

traffic

and,

long time, were believed to

be secure from interception. How^ever, in 1971, an

American

submarine successfully tapped a cable off the coast of the former

The when a

Soviet Union.

tap continued

until 1982,

NSA

employee sold information to the Soviets about the operation,

code-named "Ivy

Bells."

The

part

of the "Ivy Bells" that was used to

now on Moscow museum

make the recordings display in the

the former police).

KGB

is

of

(Russia's secret

The United

States

the only naval power

is still

known

to

have deployed

deep-sea technology for that purpose, and greatly

extended

its

last fifteen years. It

it

has

cable-tapping operations in the appears that the richer

countries of the world can buy the technology

necessary to break any code or infiltrate any

network. as a

What

whole?

impact might

this

have on society

A

U.S. Navy nuclear submarine

surfacing off the coast of ALiska.

United States

known

to

is

the only naval

have used deep-sea

technoloo;y for cable -tapping.

The

power

a

SURVEILLANCE

Telephone tapping



FACT

Telephone tapping the interception of spoken and electronic communications is extensively

During the mid-igSOs, French counter-



used by the state in surveillance. In the

intelligence agents tapped the telephones of prominent journalists and political leaders. They also monitored the phones in the bars and restaurants they

have been numerous cases

frequented.

tapping, the technology

in

which

it

UK there

was revealed

that the British intelligence services tapped the

phones of

social activists, labor unions,

liberties groups.

and

civil

However, while there are and other law

legitimate reasons for the police

enforcement agencies to be involved in telephone is

so easy to use that

organized criminals, ruthless businesses, or obsessive individuals can tap telephones as easily as the police or

It

government

intelligence.

does not require a high level of

skill

or technology to intercept a voice

communication. For example, the microphone in many older telephones may be replaced with one that can also transmit to a remote receiver. Taps

may

also be placed in telephone wiring

systems in the basements of buildings,

on the

on the

lines outside a house, or

telephone poles near the target of surveillance.

System X ^

UK during the

In the

1980s, British

Telecom introduced System digital

X—

technology designed to

revolutionize the telephone system.

has the capacity to activate a line the phone

is

in

its

cradle.

The

It

when

result

is

that most models of telephone start to It is relatively

easy to intercept a voice

communication. Back

in

1957, author

and journalist Bob Keston was eager demonstrate the threat

to

to

privacy posed

by a simple phone-tapping mechanism.

transmit surrounding sounds. System

X

was

designed as wiretap-friendly technology, allowing

any that

line to it is

be bugged from anywhere. This means

not

just

phone conversations that

tapped, but any conversation in the room.

are

How

.

BDVERNMENT SURVEILLANCE much

does

it

matter that the conversations of

people who have no invoK^ement in criminal or subversive activity are monitored?

Recent revelations indicate that a

in the

UK

magazine Statcwatch

new worldwide arrangement

been made

for the producers of

exchanges.

The arrangement

has

telecommunications

states that all

exchanges must enable the interception of telecommunications. But what violations might occur

if

human

rights

a tyrannical regime

suddenly has access to a national telephone tapping system?

New

cellular

more

difficult to intercept

phones use

a digital system,

which

is

than that of the old

mobile phones and provides clearer conversations. It is

also easier to secure these telephones

from

James McCord, one of

the

main

eavesdropping through scrambling. However,

figures in the Watergate scandal of

United States and other countries have attempted to restrict the use of improved scrambling technology. In Pakistan,

to

intelligence agencies in the

1972, with a wiretapping device used monitor

the calls of President

Richard Nixon's

political

opponents

P-

^^^i^l^ ^V-

'If

rinM

SURVEILLANCE the government shut

FACT

company

until

it

down

a cellular

provided equipment to allow easy

United

over-the-air interception. In the

President Lyndon B. Johnson had the phone of his vice president Hubert Humphrey tapped during the 19B8 presidential campaign.

He was concerned that Humphrey would not remain true to the official government line on the war in Vietnam.

phone States, the

cellular telephone industry agreed to adopt a

weakened scrambling standard after pressure from the NSA. Experts who have seen the standard say that it provides almost no protection against eavesdropping. Intelligence agencies in other countries have also lobbied to limit the security feature in digital cellular phones.

Intelligence agencies believe that telephone

tapping

is

on

essential to keeping tabs

subversives, foreign agents,

and the

terrorists,

like.

They

theretore monitor mobile phones as extensively as

they can with landlines. But civil liberties groups argue that individual citizens have the right to

There is also the question of whether private telephone companies should act as an arm of government by not allowing scrambling devices on their phones.

private telephone conversations.

Identity cards

Many

people

li\'ing

around the world have to carry

an identity (ID) card with them

all

the time.

Originally these cards were introduced to ensure

A Wisconsin drivers doubles as an

ID

license,

card

uhich

that enemies of the state would be forced either to register or exist

without documents; then

it

would

be easy for the police to pick them up. In

some

countries, like Spain,

and Singapore, becoming part of the

Portugal, Thailand,

ID cards are government administration. Magnetic strips and microprocessor technology

mean

that they will be

used to obtain welfare benefits and other services. This means that the

government will be able to keep a closer eye on people's movements and activities. While, from the

— GDVERNMENT SURVEILLANCE point of view of government, the security services

makes sense to use ID cards more widely, many individuals might feel that like George Orwell's Big Brother the state and the

police,

it

clearly



knows too much about them.

Biometrics Advances

in technology are

making another form

of mass surveillance possible. Biometrics

is

the

VIEWPOINT "Any discussion of biometrics and privacy has to be rooted firmly in the realities of the technology. The truth is biometrics cannot be used to find you/* James Wayman. Director U.S. National Biometric Test

process of collecting, processing, and storing details

Center

of a person's physical characteristics for the purposes of identification and authentication.

popular forms of biometric ID geometry,

thumb

The most

are retina scans,

scans, fingerprints, voice

hand

Biometric identification

—a view

fingerprint being scanned

of a

SURVEILLANCE recognition, and digitized (electronically stored)

FACT the whole papulation is being screened for a DNA database. In Iceland,

photographs. interest of

The technology

has aroused the

governments and companies because,

unlike other forms of ID such as cards or papers

(which can be forged),

it

has the capacity to

identify the target subject accurately

and

intimately.

Biometrics schemes are being implemented across the world. Spain has begun a national fingerprint

system for unemployment benefits and health care entitlement. Russia has announced plans for a

national electronic fingerprint system for banks.

Jamaicans are required to scan their thumbs into a database before qualifying to vote at elections. In

France and Germany,

equipment that onto credit shops,

tests are

underway with

transfers fingerprint information

cards.

The technology

is

being used in

government agencies, child-care

centers,

and automated-teller machines.

FACT In 1380, the United States Census Bureau claimed that it had never given out information about individuals. However, during World War II it produced

reports for war agencies,

which used them to round up Japanese Americans for internment.

An

automated immigration system, developed by

the U.S. Immigration and Naturalization Service,

hand geometry. In this project, frequent travelers have their hand geometry stored in uses

smart computer chip card.

The

a

traveler places a

hand on the scanner and the card

into a slot.

More

than 70,000 people have enrolled in the trial. The plan may ultimately result in a worldwide identification system for travelers.

DNA

identification The most controversial form of biometrics, identification,

is

benefiting from

DNA

new scanning

technology, which can automatically

match

DNA

samples against a large database in minutes. Police forces in several countries, such as the States,

United

Germany, and Canada, are creating national DNA. In the United Kingdom and the

databases of

United States, when a particularly violent crime committed, such as rape or murder, police may

is

i

GDVERNMENT SURVEILLANCE demand

that

all

individuals in a particular area

should voluntarily provide samples or face hein^ placed under scrutiny as a suspect.

Is

DNA

identification a marvelous invention or an

invasion of privacy?

The

police say that widespread

DNA testing would be a boon to crime-fighting. According to testimony before the U.S. National

Commission on the Future of DNA Evidence, 30 percent of crime scenes have traces of semen, blood, or saliva, all of which contain human DNA. Do you agree with the argument that if we have nothing to hide, we should not have anything to be frightened of? Critics of extensive

DNA testing say that

it

reveal a predisposition to hereditary disease

information that hints at orientation.

What

traits like

can and

sexual

other uses could be

made

of

DNA samples? Certainly insurance companies would be wary of insuring a person whose DNA pointed to a history of genetic disease.

A researcher examines DNA sequencing data. information

unique

it is

From

this

possible to identify the

DNA code of any

individual.

SURVEILLANCE

Computers and the Internet It

computers are connected to any form of network



if

they are part of an office network or

the Internet

—they

if

they use

are likely to be subject to

surveillance. Businesspeople carrying laptops

have

when they enter the UK. may be checked and encrypted files decoded.

these routinely scanned

Disks

According to

we

are concerned, there

an encrvpted travelers

to

UK Customs

have

file

and

is

and Excise: "So far as no difference between

a locked suitcase. All

entermg the country should be prepared equipment scanned." The routine

their

scans are allegedly to locate illegal material, such as child pornography. People using computers at an Internet cafe in arui

Bonn, Germany. The

may be

Those who

fail

to cooperate

arrested.

police

governments interception of

Over the

past decade, the Internet has

become an

electronic mail messages for

important tool for communication and research.

suneillance purposes has alarmed

The technology

civil rights

groups.

is

growing phenomenally

millions of users going

on

line

each

year.

fast,

The

with

BDVERNIVIEIMT SURVEILLANCE Internet

also used increasingly as a tool for

is

buying and

selling.

reliability of

The

capability, speed,

the Internet are constantly improving,

resulting in the continued uses for the

and

development of new

medium.

and governments have moved to intercept anything on the Internet, often using the search for child pornography as an excuse. They argue that Police

VIEWPOINTS "In the past, technology has been the friend of the fMSA, but in the last four or five years technology has moved from being the friend to being the

enemg."

agreements between police and Internet Service

John Mills. ex-OA afficor and HEad of Staff of Che House of Representatives on the

Providers (the channels for Internet

growth of antisurveillance technology

the interception of e-mail traffic should be through

traffic).

This

move has caused alarm, and civil rights groups have demanded that e-mail interception should not be treated any differently than telephone

UK, legislation passed in 2000 now the case. In Singapore, all

interception. In the

means that

this

is

Internet Service Providers are operated by

government-controlled or related organizations.

However,

it

may

well be that any legislation

"[Encryption

will]

devastate our ability to fight crime and prevent terrorism." Attorney Eeneral Janet Reno

governing the interception of e-mails has been passed too

late.

Scrambling messages Encryption has become the most important tool to protect against surveillance.

message

is

With

encryption, a

scrambled so that only the intended

and subsequently read, the contents. The United States and UK governments have sought to limit encryption. Because terrorists and other criminals are likely to encode their communications, the UK government recipient

is

able to unscramble,

has argued that encryption

is

a national security

But the European Union was concerned that, member governments could unscramble any

risk. if

messages, this would limit an individual's right to

privacy and hinder plans to promote electronic

commerce

in Europe.

enforcement agencies

The police and other lawnow have to obtain a

warrant for decryption by the person concerned.

AC Anonymous

remailers

strip identifying

information from e-mails, and can stop traffic analysis. They are the Internet equivalent of P.D. Box addresses. The police and intelligence services are opposed to them. In Finland, a popular

anongmous remailer had to be shut down because of legal challenges that forced the remailer to reveal the name of one of its users.

5LRVEILLAIMCE

Future develapments

VIEWPOINTS cryptography can protect the trade secrets and proprietary information of business and thereby reduce economic espionage

During the twenty-first century, telecommunications will shift to high-capacity fiber-optic networks.

"If

(which

it

can],

it

also

supports in a most important manner the job of law enforcement. If cryptography can help protect nationally critical information systems and networks against unauthorized penetration (which it can] it also supports the national security of the United States." National Research Council's CammlttEE to 5tudLj National CrLjptograpfiLj Policy. U. 5.

"There is always a temptation to invqke security 'necessities* ^^ to justify an ..^p^encroachment upon v ^ ctvil liberties. For that reason, the militarysecurity argument rnust be approached with a healthy skepticism." The late Supreme Court Justice WiUiam Brennan

Encrypted computer information for protection against hackers

These networks cannot be intercepted from a distance but require physical access; this will

more

difficult for foreign

make

it

powers to tap them. For

example, the United States will not be able to tap into such lines in Russia unless they can physically

attach a bugging device. There will

no longer be

radio waves to intercept.

The United

government used to have a substantial lead in computers and information technology, but now their computers are the same standard as those used by leading industrial and academic organizations. The academic and industrial communities are using cryptography, which is a way of coding messages to keep them secure. States

GDVERNMENT SURVEILLANCE

Some

countries have freedom of information laws

can find out much of what goes name, but government surveillance is often specifically excluded from the list of things that people have a right to know. The problem with government surveillance is that we are told it must be confidential or else other countries will know all our secrets. But the big question for citizens of western democracies is can we really trust our own governments?

Surveillance technology

so that the citizens

the operation of

on

forces. In

in their

Swedish

this

is

important

a nations armed

1996 photograph,

sailors use surveillance

equipment on

the

HMS

Stromstad a ,

high-speed missile attack boat designed to

thwart Russian amphibious attack

ships in the Baltic.



The other question international

power

is is

The

United States has the resources to keep tabs on everybody else. The countries of Western Europe cannot match its resources and therefore lag behind in access to information. And developing countries are not even players in this international

game.

If

knowledge

is

DEBATE

the extent to which linked to money.

power,

it

seems that the

countries with the most effective surveillance

operations will win every time.

to

Government surveillance carried out in the of the people and with public money. But is

name

the people do not know

what

is being monitored, or why, or how it is being monitored. Is it right that this should be the case?



POLICE SURVEILLAIMCE Catching Criminals or Manitaring Minariti

The police use a variety of surveillance methods both to catch criminals and to prevent crimes from being committed. Police surveillance needs to be covert, or hidden, so that criminals are not

aware that they are being watched. The object of covert surveillance

is

to obtain information

either evidence or intelligence The

police are hard-pressed to keep

track of white-collar criminals,

are involved in

an ever-increasing

range of activities suspects

.

These Japanese

worked for

Corporation spying on

,

who

the Hitachi

which was accused of

IBM.



that

is

impossible

to obtain in any other way. Covert surveillance

is

often used alongside other policing methods, such as the use of informers officers.

Most forms of

and undercover police legal surveillance are

justified as anticrime measures.

asked whether, in

many

But

it

needs to be

countries, the considerable

powers afforded the police are sometimes abused.

The to

police are under constant pressure

keep up with the technological

advances employed by criminals. White-collar criminals, so called

because they are well educated and middle-class, are involved in

an ever-

increasing range of activities. These

include information warfare, breaking copyright, international financial crime,

national security threats, and Internet

crime (such as charging

for,

but never

supplying, products ordered over the Internet).

With

their

advanced

understanding of digital technology, these criminals are

way ahead of the

average police officer in these

fields.

1

POLICE SURVEILLANCE Because they have no criminal record, they are x'irtually invisible to

and governments, moving huge amounts of money each day throughout hundreds of

is this conflict of interest between,

entities.

on the one hand, the reasonable expectation of individuals to engage private activities, including telephone in

running. For these crimes, the police often use

which there would undoubtedly be more organized and serious crime. The risk is that the same surveillance methods will increasingly be used on common offenses without public debate. The European Charter for Human surveillance, without

Rights ensures that, in Europe, police forces are

under scrutiny to comply with a recognized

set of

conversations, without being overheard or recorded, and, on the other hand, the need to use sophisticated techniques to combat serious crime." MadelBine Colvin of the UK organization Justice. 1393

rights standards. Bugging, using informers,

and undercover legal

"At the core of the

debate

However, most police activity is focused on the more traditional crimes: from burglary to drug

human

VIEWPOINTS

conventional law enforcement;

yet they control the fortunes of banks, corporations,

officers are all

accepted

as part of a

framework.

"Undercover work offers a means of activeig pursuing crime through direct involvement and

Criminal intelligence information has been described as the lifeblood of the

Information about

service.

modern

known

police

criminals,

and their associates ways, but mainly through technical surveillance suspects,

is

gathered in various

(CCTV) much policing

intelligence, skill

is

aimed at gathering intelligence information rather than evidence. But the reliability and relevance of this intelligence

information

may

vary.

' *

1

1

^

1

JMmL

'

""W" jKk:.M..,

fits

and

finesse, rather than brute force and coercion." Earij Marx, author of Undercaver Work: A Necessary Evil

JIn dru^'running cases, the police

'

V *^.'>/dtijtMT^^^''-

^^^^^^^^Tl

It

the notion of the *

modern police officer prevailing via

operations, closed-circuit television

cameras, and informers. Indeed,

police initiative. vyith

^^

..^^B^B*

J^^ 'IS'

army

and

often use surveillance methods

ichen working closely together. Here

members of

the Bolivian

illegally

grown coca

used to

make

army hwi\

leaves.

cocaine.

Coca

is

.

SURVEILLANCE ^X^ereas criminal record information

hard Today, CCTV systems are capable of reading a cigarette packet from 33D feet [IDD m) away.

Many CCTV cameras can work

in pitch-dark, bringing images up to daylight level.

and

facts,

criminal intelligence

difficult to verify.

know where

is

based on

is

often speculative

Even with CCTV, one might

people are at a certain time, but not

where they came from or where they are going. Certainly this sort of information has led to successful convictions.

many

However, during the course of

surveillance, irrelevant information of a noncriminal

nature will be collected about individuals and events.

There has been a

political shift in targeting in recent

years. Instead of investigating a

crime

after

it

happens, police forces are increasingly tracking the sort of

people they think are most likely to commit a

crime: certain social classes and races of people living in specific areas. This type of preemptive policing

called data-veillance

which the

and

is

military gather

is

based on the way in

huge quantities of low-

grade intelligence for tactical purposes.

CCTV In most industrial countries, just a cities.

normal part of modern

Few people worry

on; they are In

many

like the

part of

countries

CCTV cameras

,

more

CCTV cameras life

in

are

towns and

that they are being spied

cameras

likely to regard the

way of preventing crime.

as a

CCTV cameras operate

one helow, are an accepted

by filming everything that appears in front of them.

modern

The images

life

they record are normally displayed on a television screen or

monitor.

The

be watched like

when

uses

CCTV

screen can

all

the time,

a security guard

to

check what

happening outside a Sometimes the film is saved so that it can is

building.

be looked at

later, if

necessary; for instance, to

help identify the suspects in the case of a robbery.

POLICE SURVEILLANCE

CCTV

technology has become increasingly

sophisticated. Features include night vision,

computer- assisted operation, and motion detection

which allow the operator to instruct the system to switch on only when something moves in tront of the camera. Some camera systems have bulletproof casing and automated self-defense mechanisms, so that it is very difficult to put them tacilities,

out of action.

Recent years have witnessed an explosion use of CCTV cameras. In some towns and

CCTV

is

This

cities,

mug^ng a woman

seen to be as essential as the electricity

supply or telephone network.

commonplace

now

has become quite

and even phone booths. Some

expect to be filmed from the

they leave their front door. installed in

It

to find cameras placed in buses,

trains, elevators,

people

in the

movie

moment

Hidden cameras

are

theaters, red-light districts,

on housing estates. Some considering fitting Minicams into

locker rooms, and

police

forces are

police

helmets and clothing.

CCT\^ footage

shows a

man

in the street.

I- "Ma

SURVEILLANCE

A security guard with a bank of security monitors

.

Each screen shows

a view of a shopping center taken from a different

CCTV camera.

The

UK leads the world

surveillance cameras per

Up

in CCTV. There are more head than anywhere else.

$500 million a year is spent on CCTV, with about 95 percent of towns and cities installing CCTV equipment in town centers, shopping malls, parking garages, and on public transportation. About half a million low-budget CCTV kits have been sold, mostly to smaller store owners. In North America and Australia, cameras are increasingly being used to monitor public squares. In Singapore to

they are widely used to limits

and other

rules

make

and

drivers stick to speed

to prevent people

from

littering.

Many

public buildings use

United

States, Utah's Salt

CCTV cameras. Lake City

In the

district

spent

over $200,000 installing video surveillance cameras

and recorders. The cameras scan parking lots and, in some cases, school hallways. They are not, however, used in bathrooms, showers, or other private areas. lots to

Many

schools use

curb intrusions or fights

them in parking among rival gangs.

POLICE SURVEILLANCE With

all this

use of visual surveillance, there are

in the

wrong place

at the

wrong time.

If

you are

a

CCTV can only protect you. once strongly opposed to CCTV in

law-abiding citizen,

Even Sweden, public places, laws. In

is

considering relaxing

Norway, filming by

there are restrictions used. In the

UK,

CCTV

is

its

in Denmark, CCTV camerci^ are banned

in

public places.

privacy

legal,

but

on how the information

is

data protection laws cover the

film records obtained by

CCTV,

no placed and

but there

regulation about where the cameras are

how

FACT

The

remarkably few laws to protect the individual.

general attitude seems to be that you should not be

is

they are operated.

CCTV cameras

are supposed to prevent crime

help people feel safer in public places. After

and

all,

theory goes, not only will the

cameras catch the

criminals in the act, but also,

if

the criminals

the

know

that the cameras are there, they will be less likely to

commit

crimes. Therefore, the general public

will feel safer

when

they see the

CCTV cameras.

Unfortunately, the research does not entirely support this theory.

While

a recent study claimed

CCTV was successful, two out of three studies into the effects of CCTV show that both crime and

that

fear of

crime have increased.

A

traffic sigit

wanis

will he inonitored

measuring

drivers that they

hy cameras

their speed.

SURVEILLANCE There have undoubtedly been cases in which CCTV cameras have led to the arrest of criminals. In a famous British case, two boys abducted James Bulger, a two-year-old, from a Liverpool shopping mall and later killed him. The abduction was recorded on video by the CCTV cameras in the mall, and the boys were identified from their images on tape.

However,

CCTV surveillance

While cameras

are

is also open to abuse. sometimes installed in changing

rooms and public toilets for security purposes, they are clearly an intrusion into an individual's privacy. In one case, a store owner had installed a video in his changing room and used it mainly to spy on female customers The character

Bond how

Q shows James

to operate

a miniaturized

surveillance device hidden in a cigarette lighter in the

Tomorrow Never

movie

W

than two

hundred obscenity charges after using cameras to spy on women and then making obscene calls to them from the control room.

Dies.

5ecret visual surveillance The art of visual surveillance has changed dramatically over recent years. Police and intelligence officers still photograph demonstrations and individuals of interest, but

^^^B

'^^^^^^^^1

1 1 ^O^^H K^il1 KXh ^ "^

^^^k

M

i ^HQI 1 ^^yv^ ^^^^^^^^^^^^^^'

they undressed. In Wales, a

CCTV operator was convicted of more

^^^B I BHI

m^^

as

-'

'

^^^1

(

^^^^1

increasingly such images can be stored and searched. In Denmark, the police want to ban the use of masks by

demonstrators so that

it

will

be

possible to identify every participant.

One

of the major technological

advances has been miniaturization, or

making things much, much

smaller.

This means that cameras can be made so small that they are virtually

undetectable.

A technological

development such

as this

opens up

.

POLICE SURVEILLANCE

new

possibilities of

companies, and

abuse by individuals,

official agencies.

Surveillance

cameras for covert, or undercover, operations have been modified to the point where they are little

more than a microchip and a pinhead lens. Cameras the size of a matchbox are commonplace.

Tiny cameras can be hidden

common clocks

The future New technology means able to do far in front of

them

that

more than

them.

It is

CCTV cameras are

what goes on now possible to program just record

to recognize certain individuals, turning

CCTV from passive

to active surveillance

and

movement of certain people in a particular area. This is known as algorithmic surveillance data analysis. Already a U.S. company targeting the

and Systems has piloted a system in London that can scan crowds and match faces against a database of images held in a remote computer. New algorithmic CCTV cameras can pick up the behavioral quirks of petty criminals and car thieves. Criminals approach the scene of a potential crime differently than noncriminal, and the camera can identify them and alert security staff that an offense is about to be committed. called Software

in

household objects such as

and smoke alarms

;

SURVEILLANCE The

VIEWPOINTS "it

is

linking ot

CCTV

systems using facial

recognition technology to databases holding

photographs of individuals makes for a highly

the right of our

powerful surveillance tool. This technology has

citizens to live in

fMewham without fear

already been used at an English soccer stadium to

of crime."

help spot

known

Germany

to restrict areas to authorized personnel

Robin Wales, leader of

Newham

council.

UK

M^ "I'm not sure want to live in a society in I

which, when walk down the road, my face Is compared with a couple of hundred local criminals." Uz Parrat. /Jberty B^eat Bitjain's I

DOLMial for cKil liberties

In places where

lots

only. In the

troublemakers and at the Bank of

London borough

of

Newham,

CCTV

cameras are programmed to recognize know^n criminals

who

visit

the town center. So what kind

on the register? How -erious do their crimes need to be? How long ago have these crimes been committed? The police will not say who is on the database or how many offenders are included. All this is being done m the name of law and order, but individuals are being watched without any public debate about the -extent to which they should be watched.

of people are gathered,

oi criminals are included

CCT\'

has been used with facial recognition technology to spot trouhlems.ke

jC'^-r-L^^-^-

:-^4Sj^^S^s^r'y.7^^^,

e*

-.

POLICE SURVEILLANCE

5tatG-as5istGd telephone tapping Pt^lice

telephone tapping, or wiretapping,

(

is

conducted in nearly every country in the world. Although it has undoubtedly led to the arrest of

In the United States, wiretaps led to the

many criminals, it has also been frequently abused. The U.S. State Department, in its annual Country Reports on

Human

FACT 1

conviction of EE.ODO serious criminals

between 1984 and

Rights Practices for 1994,

1994.

reported widespread illegal or uncontrolled use of wiretaps by governments and private groups in

Are any of our calls Do we ever know that we are being,

more than 70 private?

countries.

have been, bugged



who is bugging know? Can we trust or

we have a right to or do we need a system

that

is

less

us?

or

Should

the police,

open

to abuse?

Cordless telephones are becoming more and more

popular in the West. In the United States alone,

more than 40 million

cordless

phones

well as millions of cellular phones. In

are in use as Italy,

there

more mobile phones than landline telephones. In developing countries, wireless communications such as cellular and satellite-based telephones are also popular as a means to avoid laying new are

telephone lines in areas that were previously

The

undeveloped.

intercepted using inexpensive scanners.

signals

from mobile phones can be

Signals from each of these

devices

— —

cordless telephones in

particular

Many

0^

are easy to intercept.

N

of the older models

transmit just above the top range of the

AM radio band, and

conversations can easily be

overheard with any

Newer models

49MHz

di

AM radio.

operate in the

range and can be

intercepted with an inexpensive radio scanner available from stores.

The range

can be up to

1

many

of interception

mile (1.6 km).

1

HKT^IftiM 1

SURVEILLANCE Cellular, or mobile,

FACT

)

Seventy percent of United States citizens think tliat all wiretaps should be banned.

phones are

also

open

to

interception. They, too, broadcast over the airwaves like a radio.

Inexpensive scanners are available to

intercept conversations.

More

mobile phone gives away a tracking device. it

its

importantly, just using a

position and turns

When a mobile phone

regularly broadcasts

its

is

it

into

turned on,

location to the local

transmitters so that they can direct calls to the correct place. In

an incident in Denmark, a murder

reopened against a member of the because

new evidence was

Hell's

trial

was

Angels

found: Records from the

telephone company proved that he had been near the scene of the crime

when

proximity to London's Houses of

Modem snoopers

can buy specially adapted laptop

Parliament means that the user can

computers and simply tune in to

This laptop computer intercept mobile

listen in

is

phone

being used to

the murder took place.

calls. Its

on MPs' phone conversations.

all

the mobile

phones active in the area by moving the cursor

POLICE SURVEILLANCE down will

phone numher. The machine numbers to see if they are active.

to the relevant

even search

for

British poliLE^ (rjinliiLt

Pagers

A pager,

around 2,100 bugging or beeper,

another electronic device

is

that can be intercepted easily. Pagers receive signals over the airwaves

Computer programs

with no scrambling.

are available that

can monitor

upon which pagers Such programs can automatically retain

the entire frequency spectrum operate.

every message that

is

sent.

wiretaps. Before this law,

each wiretap had to be

approved by a judge, but

now

think might be used

suspect. This

means

that

if

police can tap into any by, or

is

close to, a

the police see someone

they think might be a criminal entering your house or place of business, they can tap your

phone without

a warrant.

The

police say that roving wiretaps will allow

on criminals who are phone to avoid interception.

investigators to eavesdrop

moving from phone

to

But the law already permits through a court.

this,

provided

Many Americans

it

goes

believe that

requiring the police to get the permission of a judge is

essential to protect the privacy of the individual.

More than 80 percent

of calls intercepted by wiretap

are innocent; roving wiretaps intercept

higher percentage of

who

While roving wiretaps United

an even

placed by innocent parties

calls

are not suspected of

any crime.

commonplace in the no roving wiretaps in the

are

States, there are

UK, although one warrant (which

gives permission'

phone numbers of the person targeted. A Canadian report on wiretapping estimated that a single phone tap can affect up to

can include

200 people.

all

the

aperatians a gear. Mo^tlg, officers enter

premises and plant small, camouflaged transmitters. These pick up the conversations in a room and broadcast them to a listening station

In 1988, Congress passed a law allowing roving

line they

FACT

about 1.8 mi. [3 km] awag. Since 1999 the police have had to appig for permission from a High Court Judge to conduct most bugging operations.

.

SURVEILLANCE

New

VIEWPOINT

technology means that phone

less likely to

"[The EU-FBI Surveillance System] is a sniper's bullet to the heart of privacy." /an Brown. Pn'vaoLj International

be tapped. But in Europe and the

been introduced that the telephone companies to build in a

United forces

now

calls are

States, legislation has

facility for police

bugging.

The 1994 Communications Enforcement Act

(GALEA)

Law

Assistance in

gave the Federal

Bureau of Investigation (FBI) extraordinary powers to

demand

that telephone companies restructure

their networks to

make wiretapping

Until

easier.

1994 the police had had to find the correct copper Now telephone exchanges have

wire to tap into.

can be tapped. Manufacturers must work with industry and lawto be designed so that lines

enforcement

officials to

ensure that their

equipment meets federal standards. A court can company $10,000 a day for each product

fine a

that does not comply.

The EU-FBI Surveillance System The

1

998 movie Enemy of the State

involves a lawyer (Will Smith,

who

is

hunted by the

NSA

left)

using

all

the surveillance technology at their

disposal.

An

the film read:

they

're

advertising ''It's

campaign for

not paranoia

really out to get you..

" .

if

European police forces have for a massive

intercepting

foundations

laid the

eavesdropping system capable of all

mobile phone

communications,

calls,

Internet

and pager messages. This

fax,

part of a strategy to create a seamless

web

is

of

telecommunications surveillance across national boundaries.

The move

to establish the system

follows a five-year lobbying exercise by agencies like the

FBI.

The

plans for this

surveillance program, as the

known

EU'FBI Surveillance

System, were laid in secret. All Internet Service Providers (ISPs) will have to provide agencies with

complete access to

communications, regardless of country of origin.

POLICE SURVEILLANCE

This system will be capable of tracking suspects

Anyone

wherever they travel by means of subject tagging.

Known

as the International

User Requirements

using a cash card

that his or her transaction

may is

find

tracked.

for

Interception (lUR), the tagging system will create a

data processing and transmission network. This

network

will

have

details of the

phone numbers of targets and

names, addresses, and

associates;

have their e-mail addresses, credit card

it

will also

details,

PINs

(personal identification numbers), and passwords.

It is

In the United States, courts show that

reasonable to expect police forces from

different countries to Terrorists

work together

and organized criminals

one country to another, especially its lax'

to stop crime.

travel easily in

from

Europe with

border controls, so a global interception

system must be a positive development. But some people are concerned that the EU-FBI

System was conceived democratic scrutiny.

in secret, with

Surveillance

no

federal electronic intercepts have increased by up to 40 percent since President Bill Clinton took office in 1992. No federal

magistrate has turned a federal request for an intercept order since 1988.

down

SURVEILLANCE Call

analysis

In 1992, a group of senior law-enforcement officers

met

FBI headquarters in Washington, D.C., to devise a strategy for dealing with environmental at

activists.

The group

hit

on

a plan that has

among police forces world. The FBI subpenaed

become

increasingly popular

throughout the official

(gave

written orders to supply documentation)

600 leading environmental

activists regarding their

telephone billing information. To most people, the information on a telephone

bill is relatively

unimportant: a few numbers, times, and dates. But to the FBI,

it

was a goldmine. By combining the

calling information of all The

security services are able to

compile "friendship networks" of

groups they suspect; environmentalists, like these

come

people demonstrating helovu,

into this cateogory.

known

activists,

the

authorities were able to build a vast tree involving

They could who worked with whom. They knew how the

tens of thousands of environmentalists. tell

networks were formed and

how

they communicated.

In a nutshell, the FBI was able to expose the

POLICE SURVEILLANCE intimate details of

all

the interrelationships

The

within the environmental mcn'ement.

environmental strategy was not unique. the

phone records of more than

in the

That

year,

a million people

United States were subpenaed by law-

United Kingdom this is called metering, and the police do not even need a warrant for it. The European Court of Human Rights ruled more than a decade ago that the practice, unless it w^as In the

properly regulated, violated the European

Human

Rights, but the

operations has grow^n steadily. In 1997, fifteen times

FACT

number it

of

was

more prevalent than phone tapping.

confidential business information to the Wal/ Street Journal. The authorities secured 35 million records

Most police analysis

forces in the

UK are

now

using call

failed to pinpoint the

programs that are many times more

source of the leaks.

The WatCall and Watson systems, produced by Cambridge company Harlequin Intelligence

the

Systems, can collect, collate, and analyze

information on any fax or telephone call

made

UK. Called numbers are identified by name and address, and this mass

subscriber is

in

of data

then merged with information from powerful

police intelligence systems such as

HOLMES.

WatCall system to secure details of your network of friends, which they then combine with intelligence data in HOLMES and finally build a comprehensive profile of your friends Police can use the

and family via the Watson intelligence system.

Once

again, the question surrounding this issue

mainly about safeguards. Is

Who

is

who

has no respect for the law and a concerned

environmentalist

who

organizes demonstrations

changed? Should the activities of both be monitored in the same way? to get the law^

is

being targeted?

there a difference between an ecoterrorist

from

850,000 homes, but

powerful than those used by the U.S. authorities.

the

,

1993, tfip multinatianal giant Procter & Gamble persuaded a judge to order the seizure of the telephone records of the long-distance calls of virtuallg the entire population of Cincinnati. Dhio. The aim? To trace the person who had been leaking In

enforcement agencies.

Convention on

L

SURVEILLANCE

The

talon system, above, recognizes

vehicle license plates to track

and can he used

a car around a

city.

Traffic Vehicle recognition systems have been developed

and then

that can identify a car's license plate

track the car around a city using a computerized

geographic information system. Systems such Racal, are is

now commercially

as the

UK company

talon system, introduced in 1994 by

available. This system

designed to recognize license plates and works

during the day and at night. Initially traffic

monitoring, but

its

it

was used

for

function has been

adapted in recent years to cover security surveillance.

It

has been incorporated in the "ring

of steel," a series of roadblocks set up around the financial district of

Republican record district

all

London

Army bomb

after

attack.

an

Irish

The system can

the vehicles that entered or

on any

left

the

particular day.

Surveillance systems such as this raise significant issues of accountability, particularly

when

they are

used by authoritarian regimes.

The cameras

Tiananmen Square

China, were sold

advanced

in Beijing,

traffic systems.

used in

Yet they recorded the

as

POLICE SURVEILLANCE demonstrations by students in 1989. After the

Chinese miUtary had crushed the demonstrations, images of suspected subversives were repeatedly broadcast on Chinese television with the offer of a

reward for information about them. Foreign companies are exporting

traffic

control

systems to Lhasa in Tibet, but Lhasa does not as yet

have any

traffic

New

is

DEBATE

J

Dti Irivv-fihirliiirj riti/f>ns

need to fear telephone tapping and CCTV if the technologies used target criminals and help to make the world a safer place?

: