Table Of ContentOTHER INFORMATION SECURITY BOOKS FROM AUERBACH
Assessing and Managing Security Risk in IT Information Security Management Handbook, Fifth
Systems: A Structured Methodology Edition, Volume 2
John McCumber Harold F Tipton; Micki Krause
ISBN: 0-8493-2232-4 ISBN: 0-8493-3210-9
Audit and Trace Log Management: Consolidation Information Security Management Handbook, Fifth
and Analysis Edition, Volume 3
Phillip Q Maier Harold F Tipton; Micki Krause
ISBN: 0-8493-2725-3 ISBN: 0-8493-9561-5
Building and Implementing Security Certification Information Security Policies and Procedures:
and Accreditation Program A Practitioner's Reference, Second Edition
Patrick D Howard Thomas R Peltier
ISBN: 0-8493-2062-3 ISBN: 0-8493-1958-7
The CISO Handbook: A Practical Guide to Securing Information Security Risk Analysis, Second Edition
Your Company Thomas R Peltier
Michael Gentile; Ronald D Collette; Thomas D August ISBN: 0-8493-3346-6
ISBN: 0-8493-1952-8
Information Technology Control and Audit,
The Complete Guide for CPP Examination Second Edition
Preparation Frederick Gallegos; Daniel P Manson;
James P Muuss; David Rabern Sandra Senft; Carol Gonzales
ISBN: 0-8493-2896-9 ISBN: 0-8493-2032-1
Curing the Patch Management Headache Intelligence Support Systems: Technologies
Felicia M Nicastro for Lawful Intercepts
ISBN: 0-8493-2854-3 Kornel Terplan; Paul Hoffmann
ISBN: 0-8493-2855-1
Cyber Crime Investigator's Field Guide,
Second Edition Managing an Information Security and Privacy
Bruce Middleton Awareness and Training Program
ISBN: 0-8493-2768-7 Rebecca Herold
ISBN: 0-8493-2963-9
Database and Applications Security: Integrating
Information Security and Data Management Network Security Technologies, Second Edition
Bhavani Thuraisingham Kwok T Fung
ISBN: 0-8493-2224-3 ISBN: 0-8493-3027-0
The Ethical Hack: A Framework for Business Value The Practical Guide to HIPAA Privacy and
Penetration Testing Security Compliance
James S Tiller Kevin Beaver; Rebecca Herold
ISBN: 0-8493-1609-X ISBN: 0-8493-1953-6
Guide to Optimal Operational Risk and Basel II A Practical Guide to Security Assessments
Ioannis S Akkizidis; Vivianne Bouchereau Sudhanshu Kairab
ISBN: 0-8493-3813-1 ISBN: 0-8493-1706-1
The Hacker's Handbook: The Strategy Behind The Security Risk Assessment Handbook:
Breaking into and Defending Networks A Complete Guide for Performing Security
Susan Young; Dave Aitel Risk Assessments
ISBN: 0-8493-0888-7 Douglas J Landoll
ISBN: 0-8493-2998-1
The HIPAA Program Reference Handbook
Ross Leo Strategic Information Security
ISBN: 0-8493-2211-1 John Wylder
ISBN: 0-8493-2041-0
Information Security Architecture: An Integrated
Approach to Security in the Organization, Surviving Security: How to Integrate People,
Second Edition Process, and Technology, Second Edition
Jan Killmeyer Tudor Amanda Andress
ISBN: 0-8493-1549-2 ISBN: 0-8493-2042-9
Information Security Fundamentals Wireless Security Handbook
Thomas R Peltier; Justin Peltier; John A Blackley Aaron E Earle
ISBN: 0-8493-1957-9 ISBN: 0-8493-3378-4
AUERBACH PUBLICATIONS
www.auerbach-publications.com
To Order Call: 1-800-272-7737 • Fax: 1-800-374-3401
E-mail: [email protected]
AU8319_C000a.indd 2 12/4/06 10:11:43 AM
Boca Raton New York
Auerbach Publications is an imprint of the
Taylor & Francis Group, an informa business
Auerbach Publications
Taylor & Francis Group
6000 Broken Sound Parkway NW, Suite 300
Boca Raton, FL 33487‑2742
© 2007 by Taylor & Francis Group, LLC
Auerbach is an imprint of Taylor & Francis Group, an Informa business
No claim to original U.S. Government works
Printed in the United States of America on acid‑free paper
10 9 8 7 6 5 4 3 2 1
International Standard Book Number‑10: 0‑8493‑8319‑6 (Hardcover)
International Standard Book Number‑13: 978‑0‑8493‑8319‑9 (Hardcover)
This book contains information obtained from authentic and highly regarded sources. Reprinted material is quoted
with permission, and sources are indicated. A wide variety of references are listed. Reasonable efforts have been made to
publish reliable data and information, but the author and the publisher cannot assume responsibility for the validity of
all materials or for the consequences of their use.
No part of this book may be reprinted, reproduced, transmitted, or utilized in any form by any electronic, mechanical, or
other means, now known or hereafter invented, including photocopying, microfilming, and recording, or in any informa‑
tion storage or retrieval system, without written permission from the publishers.
For permission to photocopy or use material electronically from this work, please access www.copyright.com (http://
www.copyright.com/) or contact the Copyright Clearance Center, Inc. (CCC) 222 Rosewood Drive, Danvers, MA 01923,
978‑750‑8400. CCC is a not‑for‑profit organization that provides licenses and registration for a variety of users. For orga‑
nizations that have been granted a photocopy license by the CCC, a separate system of payment has been arranged.
Trademark Notice: Product or corporate names may be trademarks or registered trademarks, and are used only for
identification and explanation without intent to infringe.
Library of Congress Cataloging‑in‑Publication Data
Petersen, Julie K.
Understanding surveillance technologies : spy devices, privacy, history & applications / J.K.
Petersen. ‑‑ 2nd ed.
p. cm.
Includes bibliographical references and index.
ISBN‑13: 978‑0‑8493‑8319‑9 (alk. paper)
ISBN‑10: 0‑8493‑8319‑6 (alk. paper)
1. Electronic surveillance. I. Title.
TK7882.E2P48 2007
621.389’28‑‑dc22 2006035040
Visit the Taylor & Francis Web site at
http://www.taylorandfrancis.com
and the Auerbach Web site at
http://www.auerbach‑publications.com
C
ONTENTS
Dedication vii
About this Book vii
Preface viii
Format x
About the Author xi
To Be Supplied
Section 1 ◊ Introduction
Chapter 1 - Introduction & Overview 3
Section 2 ◊ Acoustic Surveillance
By
Chapter 2 - Audio 105
Chapter 3 - Infra/Ultrasound 195
Chapter 4 - Sonar 223
Section 3 ◊ Electromagnetic Surveillance
Publisher
Chapter 5 - Radio 295
Chapter 6 - Radar 353
Chapter 7 - Infrared 415
Chapter 8 - Visual 469
Chapter 9 - Aerial 559
Chapter 10 - Ultraviolet 613
Chapter 11 - X-Rays 653
Section 4 ◊ Chemical & Biological Surveillance
Chapter 12 - Chemical & Biological 683
Chapter 13 - Biometrics 733
Chapter 14 - Animals 767
Chapter 15 - Genetics 801
Section 5 ◊ Miscellaneous Surveillance
Chapter 16 - Magnetic 873
Chapter 17 - Cryptologic 907
Chapter 18 - Computers 947
Section 6 ◊ Index
Index 981
0Surveil.indd 5 12/7/06 2:31:26 PM
i
0Surveil.indd 6 12/7/06 2:31:26 PM
D
EDICATION
This book is dedicated Araminta Ross, who climbed every
mountain and used whatever surveillance devices were at her
disposal to further the quality of life and well-being of others.
May we all make such wise choices.
A
BOUT THIS BOOK
T
his was an enormous project. It required several years of research plus
more than a year of 60-hour weeks to write, illustrate, and produce the first
edition. The second edition, while essentially an update, required equally
dedicated commitment because surveillance technologies are changing
faster than books can be written.
One of the biggest problems encountered by the author while creating this
reference was the discovery of fallacies and errors in supposedly reputable
texts. While no text can be perfect, no matter how well researched (and
much of the information about the inner workings of intelligence agencies
is not public knowledge), there is a surprising amount of erroneous infor-
mation in supposedly accurate references even about mundane and widely
researched subjects related to surveillance.
For example, misinformation abounds about the invention and develop-
ment of radar. The author encountered many references that unequivocably
stated that radar was invented during World War II. As can be seen from
the information included in the Radar Surveillance chapter, the concept for
radar was discussed in the 1800s, radio-ranging instruments existed by the
1890s and were patented at least by 1904, long before WWII began. In fact,
one of the early radar instruments was offered to the Germans for the war
effort and rejected. While it is true that radar received priority development
and funding during the war, especially in England, it is still important to
recognize the developmental steps that led to the technology as we know it
today. Similar incorrect information has been written regarding many other
important inventions, including the telegraph and the telephone.
The author made an extra effort to locate original sources (patent diagrams,
oral histories, engineering texts, etc.) to try to sort fiction from fact and has
corrected a number of widespread inaccuracies (with references and patent
numbers so readers can verify the information for themselves).
ii
0Surveil.indd 7 12/7/06 2:31:27 PM
Another complication to producing a comprehensive text is the volatile po-
litical climate surrounding spies and widespread public use of spy technolo-
gies. The destruction of the World Trade Center and the subsequent creation
of the department of Homeland Security wrought significant changes in
focus and funding and the structure of the U.S. Intelligence Community.
Allegations of unwarranted wiretapping by the government and illegal use
of surveillance devices by regular citizens have both been much in the news
lately. Some of the concerns are justified—criminals have unprecedented
tools for committing crimes, but the potential for invasion of privacy and
loss of constitutional freedoms stemming from the proliferation of surveil-
lance technologies is enormous, as well, and must be considered as much
of a priority as national security.
It is hoped that this text will help lawmakers, installers, government officials,
educators, surveillance users, and journalists better understand surveillance
technologies, so they can make proactive decisions to protect health and
safety, while still safeguarding our basic freedoms.
P
REFACE
T
his book sets the groundwork for understanding surveillance technolo-
gies by describing contemporary devices and current legislation in their
historical context. These stepping stones will make it easier to understand
more specialized texts on radar, sonar, video cameras, satellite imaging,
and genetic profiling.
This book is suitable as a general reference for a variety of professions and
also as a foundation text for post-secondary institutions offering surveil-
lance studies courses.
Understanding Surveillance Technologies is the first comprehensive, in-
troductory overview of the field of surveillance devices, first published in
2000 and remains the only comprehensive text on the subject. It comprises
18 chapters with more than 700 photos and illustrations and is suitable for
college surveillance studies in sociology and political science, professional
recruiting programs, and as a reference for beginning professionals in the
fields of law enforcement, forensics, and military surveillance. It is also an
indispensable reference for journalists, lawmakers, and community plan-
ners. It has been designed with a flexible, modular format so the chapters
can be read in almost any order (chapters that share common topics are
cross-referenced to alert the reader).
We are all being surveilled. It is no longer possible to avoid cameras, DNA
iii
0Surveil.indd 8 12/7/06 2:31:27 PM
tests, identity chips, border crossing cameras, highway monitors, ATMs, and other
devices that record our movements, finances, and even our health. Many people
don’t realize that their activities are cataloged and stored in a multitude of data-
bases, many of which are accessible on the Internet without the surveillee’s knowl-
edge or permission. Here are examples that illustrate this unsettling trend:
• Detailed information about people who have never logged onto the Net
nor even used a computer is available to anyone with an Internet connec-
tion. Even ages and occupations are freely distributed by commercial sites
and it is possible to acquire the names, addresses, and phone numbers,
ages, and occupations of a person’s neighbors quite easily, as well, which
provides the data to create a composite picture of a neighborhood’s social
and economic characteristics. This book provides a better understanding
of who is collecting this information, how they are doing it, and what
they are doing with the data once they have it.
• Some hospitals now routinely take DNA samples of newborn babies.
Similarly, the U.S. armed forces require submission of a DNA sample
from new service members. This book explains the background and
origins of DNA matching and possible social consequences of its use.
In many instances, your DNA can reveal your gender, race, medical
tendencies, and physical characteristics.
• Semi-nude and nude photos of unwary victims are sold on the Internet
without the knowledge or permission of the surveillee. How is this pos-
sible? This book explains how these technologies work and why bootleg
images may not be illegal. It further describes the ethical and social
consequences of new forms of exploitation.
• Gaming centers, hotels, and trade shows use magnetic access cards to
keep track of their guests. In casinos they can tell how often patrons play,
how much they spend, and how frequently they visit the establishment.
Even universities issue student cards that double as access cards. They
allow access to vending machines, copy machines, and various retail
services on campus. In some instances, this information is stored in
sophisticated databases. This text describes a variety of user access and
property surveillance technologies that provide travel suppliers, casinos,
hotels, and retail outlets with detailed information on their patrons.
• Law enforcement agencies are consolidating their forensic and criminal
databases and providing Internet access to authorized personnel from
any part of the country. This provides new ways to solve serial murders
and to catch felons who move from state to state, but it also makes a
criminal less distinguishable from a law-abiding citizen because of the
way databases are designed and used to store general information on
ix
0Surveil.indd 9 12/7/06 2:31:28 PM
Description:Understanding Surveillance Technologies demystifies spy devices and describes how technology is used to observe and record intimate details of people’s lives—often without their knowledge or consent. From historical origins to current applications, it explains how satellites, pinhole cameras, ce