{"id":60,"date":"2021-11-10T19:14:46","date_gmt":"2021-11-10T19:14:46","guid":{"rendered":"https:\/\/blogs.shu.edu\/surveillancecapitalism\/?page_id=60"},"modified":"2021-11-14T03:45:47","modified_gmt":"2021-11-14T03:45:47","slug":"types-of-surveillance","status":"publish","type":"page","link":"https:\/\/blogs.shu.edu\/surveillancecapitalism\/types-of-surveillance\/","title":{"rendered":"Types of Surveillance"},"content":{"rendered":"<p><a class=\"CIDa42a931c-2bdc-4be0-8d4e-23e4662f16fe\" href=\"https:\/\/www.pcmag.com\/how-to\/you-tossed-your-cookies-but-theyre-still-tracking-you-heres-how-to-hide\" data-sessionid=\"6634835b-a71a-9797-574f-5718fd2b3b7e\" data-shapeids=\"168\" data-slideid=\"\">There are four main types of surveillance:<\/a><\/p>\n<p><strong><a class=\"CIDa42a931c-2bdc-4be0-8d4e-23e4662f16fe\" data-sessionid=\"6634835b-a71a-9797-574f-5718fd2b3b7e\" data-shapeids=\"168\" data-slideid=\"\">Biometrics<\/a><\/strong><\/p>\n<p>Biometrics systems are designed to identify or verify the identity of people. It identifies individuals with distinctive physiological or behavioral characteristics.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/cyberhoot.com\/wp-content\/uploads\/2020\/12\/Biometrics-System.jpg\" alt=\"Biometrics - CyberHoot Cyber Library\" \/><\/p>\n<p><strong>______________________________________________________________________________<\/strong><\/p>\n<p><strong><a class=\"CID0b7a572b-579a-4108-8c68-c44c62072020\" data-sessionid=\"6634835b-a71a-9797-574f-5718fd2b3b7e\" data-shapeids=\"82\" data-slideid=\"\">Phone Monitoring<\/a><\/strong><\/p>\n<p>Phone surveillance is the act of performing surveillance on phone conversations, location tracking, and data monitoring of a phone. It gathers data communicated across mobile, fixed, or next-generation networks.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/i.imgur.com\/dmgUWAh.jpg\" alt=\"13+ Most Popular Phone Monitoring Apps You Should Not Miss \u2013 Mageplaza\" \/><\/p>\n<p><strong><a class=\"CIDd480e807-215a-46f6-9f39-349938001f25\" data-sessionid=\"6634835b-a71a-9797-574f-5718fd2b3b7e\" data-shapeids=\"80\" data-slideid=\"\">_____________________________________________________________________________ <\/a><\/strong><a class=\"CIDd480e807-215a-46f6-9f39-349938001f25\" data-sessionid=\"6634835b-a71a-9797-574f-5718fd2b3b7e\" data-shapeids=\"80\" data-slideid=\"\">\u00a0<\/a><a class=\"CIDd480e807-215a-46f6-9f39-349938001f25\" data-sessionid=\"6634835b-a71a-9797-574f-5718fd2b3b7e\" data-shapeids=\"80\" data-slideid=\"\">\u00a0<\/a><a class=\"CID78ce8a70-c245-4359-a19c-800e24b27953\" data-sessionid=\"6634835b-a71a-9797-574f-5718fd2b3b7e\" data-shapeids=\"80\" data-slideid=\"\">\u00a0<\/a><a class=\"CID78ce8a70-c245-4359-a19c-800e24b27953\" data-sessionid=\"6634835b-a71a-9797-574f-5718fd2b3b7e\" data-shapeids=\"80\" data-slideid=\"\">\u00a0<\/a><\/p>\n<p><strong><a class=\"CIDa42a931c-2bdc-4be0-8d4e-23e4662f16fe\" data-sessionid=\"6634835b-a71a-9797-574f-5718fd2b3b7e\" data-shapeids=\"168\" data-slideid=\"\">Internet Monitoring<\/a><\/strong><\/p>\n<p>Internet surveillance is the monitoring of online behavior, activities, or other changing information, usually of people and often in a surreptitious manner. Technologies are able to gather information communicated across the internet.<\/p>\n<p><a class=\"CIDa42a931c-2bdc-4be0-8d4e-23e4662f16fe\" data-sessionid=\"6634835b-a71a-9797-574f-5718fd2b3b7e\" data-shapeids=\"168\" data-slideid=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/cdn.comparitech.com\/wp-content\/uploads\/2018\/12\/Websites.jpg\" alt=\"10 Best Internet Monitoring Software for 2021 Pros &amp;amp; Cons (Free &amp;amp; Paid)\" width=\"674\" height=\"369\" \/> <strong>______________________________________________________________________________<\/strong><\/a><\/p>\n<p><strong>Audio Surveillance<\/strong><\/p>\n<p>Audio surveillance is the act of listening to third-party conversations and recording them. This technique is frequently used by technologies that are able to record and transmit audio.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/media.istockphoto.com\/vectors\/security-camera-signs-cctv-stickers-vector-id846775204\" alt=\"10,440 Security Camera Illustrations &amp;amp; Clip Art - iStock\" \/><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>There are four main types of surveillance: Biometrics Biometrics systems are designed to identify or verify the identity of people. It identifies individuals with distinctive&#8230;<\/p>\n<div class=\"more-link-wrapper\"><a class=\"more-link\" href=\"https:\/\/blogs.shu.edu\/surveillancecapitalism\/types-of-surveillance\/\">Continue reading<span class=\"screen-reader-text\">Types of Surveillance<\/span><\/a><\/div>\n","protected":false},"author":4937,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"class_list":["post-60","page","type-page","status-publish","hentry","entry"],"_links":{"self":[{"href":"https:\/\/blogs.shu.edu\/surveillancecapitalism\/wp-json\/wp\/v2\/pages\/60","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.shu.edu\/surveillancecapitalism\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/blogs.shu.edu\/surveillancecapitalism\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.shu.edu\/surveillancecapitalism\/wp-json\/wp\/v2\/users\/4937"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.shu.edu\/surveillancecapitalism\/wp-json\/wp\/v2\/comments?post=60"}],"version-history":[{"count":4,"href":"https:\/\/blogs.shu.edu\/surveillancecapitalism\/wp-json\/wp\/v2\/pages\/60\/revisions"}],"predecessor-version":[{"id":232,"href":"https:\/\/blogs.shu.edu\/surveillancecapitalism\/wp-json\/wp\/v2\/pages\/60\/revisions\/232"}],"wp:attachment":[{"href":"https:\/\/blogs.shu.edu\/surveillancecapitalism\/wp-json\/wp\/v2\/media?parent=60"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}