Surveillance With The Introduction of Ict: by John Onyango

You might also like

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 6

By John Onyango

SURVEILLANCE WITH THE INTRODUCTION


OF ICT
WHAT IS SURVEILLANCE?
Surveillance is commonly described as keeping a close
observation of a person or group
With the addition of Computer aided surveillance
systems, close observations are able to be achieved
without drawing suspicion to oneself towards the
person depending upon the situation.
With the advancement in technology, the grip that
surveillance has on society has increased drastically
over the years.

EXAMPLES OF SURVEILLANCE
Originally Surveillance was used to make people feel secure.
Business could use this to their advantage as an act of motivation,
the sense of security would well indeed motivated workers to
increase on the yield of their work. Such examples of Surveillance
are:
Video Surveillance: The most common of the means of
Surveillance, for example Traffic lights, Bank cameras and
warehouse surveillance
Audio Surveillance: Another form of surveillance with use of
Audio input devices, for example Tape Recorders hidden
microphones.

SURVEILLANCE AGAINST SOFTWARE
MALICIOUSNESS
Surveillance can also be carried out against the threat of malicious computer software's.
This is done by examining data stored on a computer hard drives and in some cases
monitoring the activity of the user. Certain surveillance programs are installed on a
computer which can search the contents of the hard drive for suspicious data also
monitoring computer usage and report back activities in real -time to the owner of the
computer or its operator through the Internet connection.
Such malicious software's include:
Spyware
Computer virus
Trojan
COMPUTER MONITORING
With the advancement of technology, surveillance of an individual can
be done through his or her laptop/desktop from a distance.
This form of computer surveillance, known as TEMPEST.
This is done by detecting the given off by the Cathode Ray Tube
monitor. Also involving reading electromagnetic emanations from
computing devices as means of extracting data from them at distances
of hundreds of meters.
Research has also shown that majority of computer Keyboards each
emit slightly different noises when pressed. This means that observers
can identify individual CPU users and monitor there progress.
FINISHED
Special thanks to John
Onyango

You might also like