Sunday, May 11, 2008

TRESPASSERS SHALL BE PROSECUTED

TRESPASSERS SHALL BE PROSECUTED:

Amato, I. (2001). Big Brother logs on. Technology Review, 104(7), 59.

Bahadur, G., Chan, W., & Weber, C. (2002). Privacy defended: Protecting yourself online. Indianapolis, IN: Que.

Bradsher, K. (1991). Experts say it is easy to pick up conversations on cellular phones. The New York Times, June 16, p. 8, 14.

Budiansky, S. (1987). Cheaper electronics make it a snap to snoop. USA News & World Report, May 18, pp. 54-56.

Burke, J. & Warren, P. (2002). How mobile phones let spies see our every move. The Observer, October 13. Available online at http://observer.guardian.co.uk/uk_news/story/0,6903,811027,00.html

Bush, S. (2006, November 17). Police will use radar to see through walls. Electronics Weekly. Available online at http://www.electronicsweekly.com/Articles/2006/11/17/40181/Police+will+use+radar+to+see+through+walls.htm

Bush, S. (2002, August 12). Radar with Cell Phones? Look at CellDar. Available online at http://3nw.com/pda/radar_with_cell_phones__look_at_celldar.htm

Campbell, J. E. & Carlson, M. (2002). Panopticon.com: Online surveillance and the commodification of privacy. Journal of Broadcasting and Electronic Media, 46, 586-606.

Chan, H. (1999, June 4). Cops have eyes on x-ray vision. New technology would let police see through walls. New York: APBNews.com. Available online at http://www.angelfire.com/nj3/soundweapon/xray.htm

Crawford, P. (1992). Computer security: Locking up open systems. Security Management, 36(2), 42-45.

Davies, S. (1995). Privacy International calls for CCTV debate. Privacy Forum Digest 4(21). Available online at http://www.eyetap.org/wearcam/netcam_privacy_issues/privacy_forum_digest_on_CCTV.html

Dempsey, J. X. (2002, Winter). Civil liberties in a time of crisis. Human Rights Magazine. Available online at http://www.abanet.org/irr/hr/winter02/dempsey.html

Farmer, D., & Mann, C. (2003). Surveillance nation. (Part one). Technology Review, 106(3), 34-42.

Free, J., Freundlich, N. & Gilmore, C. P. (1987). Bugging. Popular Science, August, 231, pp. cover-9.

Froomkin, M. A. (2000). The death of privacy? Stanford Law Review, 52(5), 1461-1543.

Gandy Jr., O. H. (1989). The surveillance society: Information technology and bureaucratic social control. Journal of Communication 39(3): 61-76.

Garfinkel, S. (2001). Web security, privacy and commerce (2nd ed.). Sebastopol, CA: O'Reilly.

Gehling, R., Ashley, R. C., & Griffin, T. (2007). Electronic emissions security: Danger in the air. Information Systems Management, 24, 305-310.

Gould, J. B. (2002). Playing with fire: The civil liberties implications of September 11th. Public Administration Review, 62, 74-79.

Greiner, B. (1995, November 8). Lack of privacy in a networked world is a real threat. Computing Canada, 21(23), 44-45.

Griffin, J. A. (1998). Privacy and security in the digital age. IEEE Spectrum Online.

Gumpert, G., & Drucker, S. J. (2001). Public boundaries: Privacy and surveillance in a technological world. Communication Quarterly, 49(2), 115-129.

Haggerty, K. D. & Ericson, R. V. (2000). The surveillant assemblage. British Journal of Sociology, 51, 283-306.

Hearn, Kelly. (2001, April 18). High tech cop tools see through walls. United Press International cited on CommonDreams.org. Available online at http://www.commondreams.org/headlines01/0418-04.htm

Higgs, E. (2001). The rise of the information state: The development of central state surveillance of the citizen in England, 1500-2000. Journal of Historical Sociology, 14, 175-197.

Hunt, A., Tillery, C., & Wild, N. (2001). Through-the-wall surveillance technologies. Available online at http://www.ncjrs.gov/pdffiles1/nij/07_01.pdf

Jones, W. D. (2005, November). No place to hide: Portable radar devices see through walls and report what’s inside. IEEE Spectrum Online. Available online at http://www.spectrum.ieee.org/nov05/2146

Kuhn, M. G., & Anderson, R. J. (1998). Soft tempest: Hidden data transmission using electromagnetic emanations. In D. Aucsmith (Ed.), Information hiding: Second International Workshop, vol. 1525 of Lecture Notes in Computer Science (pp. 124-148). Berlin, Germany: Springer-Verlag. Available online at http://groups.csail.mit.edu/cis/crypto/classes/6.857/papers/ih98-tempest.pdf

Lacayo, R. (1991). Nowhere to hide: Using computers, high-tech gadgets and mountains of data, an army of snoops is assaulting our privacy. Time, November 11, pp. 34-40.

Lamb, G. M. (2006). Does digital age spell privacy’s doom? Christian Science Monitor, 98(149).

Lehtinen, R. & Gangemi, Sr., G. T. (2006). Computer security basics. Sebastopol, CA : O'Reilly.

Lyon, D. (2001a). Surveillance society: Monitoring everyday life. Buckingham, UK: Open University Press.

Lyon, D. (2001b). Facing the future: Seeking ethics for everyday surveillance. Ethics and Information Technology, 3, 171-181.

Lyon, D. (2001c). Surveillance after September 11. Surveillance after September 11. Sociological Research Online 6(3). Available online at http://www.socresonline.org.uk/6/3/lyon.html

Lyon, D. (2002a). Editorial. Surveillance Studies: Understanding visibility, mobility and the phenetic fix. Surveillance & Society, 1(1), 1-7.

Lyon, D. (2002b). Surveillance in cyberspace: The internet, personal data, and social control. Queen’s Quarterly, 109, 354-356.

Lyon, D. (2004). Surveillance technologies: Trends and social implications. The Security Economy (pp. 127-148). OECD report.

Marx, G. (1991). Privacy and technology. Whole Earth Review, 73, 90-96.

Marx, G. T. (1986). The iron fist and the velvet glove: Totalitarian potentials within democratic structures. Available online at http://web.mit.edu/gtmarx/www.iron.html

Marx, G. T. (1996, November-December). Monitoring on the job: How to protect privacy as well as property. Technology Review. Available online at http://web.mit.edu/gtmarx/www/privacy.html

Marx, G. T. (1998). An ethics for the new surveillance. The Information Society, 14(3). Available online at http://web.mit.edu/gtmarx/www/ncolin5.html

Marx, G. T. (2001). Murky conceptual waters: The public and the private. Ethics and Information Technology, 3(3), 157-159. Available online at http://web.mit.edu/gtmarx/www/murkypublicandprivate.html

Mejia, R. (2002). More surveillance on the way. The Nation, October 30. Retrieved March 2, 2008, from http://www.thenation.com/doc/20021111/mejia20021030

Menzies, D. (1998, November). Know the enemy (Hackers). CIO Canada, 6(11), 28. Retrieved February 2, 2008, from http://www.w3.org/TR/html4/loose.dtd

McGowan, D. (2000, June). Sony’s Magic cameras. Available online at http://www.davesweb.cnchost.com/cameras.htm

Miles, D. (2006, January 3). New device will sense through concrete walls. American Forces Information Service. US Department of Defense. Available online at http://www.defenselink.mil/news/Jan2006/20060103_3822.html

National Law Enforcement and Corrections Technology Center. (2000). Looking through walls. Available online at http://www.nlectc.org/techbeat/summer2000/LookWallsSum2000.pdf

Nunn, S. (2001). Police technologies in cities: Changes and challenges. Technology in Society, 23, 11-27.

Patton, J. W. (2000). Protecting privacy in public? Surveillance technologies and the value of public places. Ethics and Information Technology, 2, 181-187.

Pecora, V. P. (2002). The culture of surveillance. Qualitative Sociology, 25, 345-358.

Poster, M. (1990). The mode of information: Post-structuralism and social context. Chicago, IL: University of Chicago Press.

Radwanski, G. (2003). Erosion of human rights begins with the loss of the right to privacy. Canadian Speeches, 17(1), 16-22.

Redden, J. (2001). Snitch culture: How citizens are turned into the eyes and ears of the state. Los Angeles, CA: Feral House.

Rothfeder, J., Galen, M. and Driscoll, L. (1990, January 15). Is your boss spying on you? Business Week, pp. 74-76.

Saetnan, A. R. (2007). Nothing to hide, nothing to fear? Assessing technologies for diagnosis of security risks. International Criminal Justice Review, 17(3), 193-206.

Sanders, Jane (2001, April 12). Flash of force: Radar flashlight could help police detect suspects hiding behind doors and 8-inch thick walls. Georgia Institute of Technology Research News. Available online at http://gtresearchnews.gatech.edu/newsrelease/RADARFLASH.html

Scott, L. (1997, October 13). A flashlight that ‘sees’ through walls. Business Week.

Shenk, D. (2003). Watching you. The world of high-tech surveillance. National Geographic, 204(5), 2-27.

Simonite, Tom. (2006, November 14). Compact radar tracks movement through a wall. New Scientist. Available online at http://www.newscientisttech.com/channel/tech/weapons/dn10524

Solove, D. (2004). The digital person: Technology and privacy in the information age. New York, New York University Press.

Stalder, F. (2002). Opinion. Privacy is not the antidote to surveillance. Surveillance & Society, 1(1), 120-124.

Staples, W. G. 1997. The culture of surveillance: Discipline and social control in the United States. New York, NY: St. Martin’s Press.

Van Eck, W. (1985). Electromagnetic radiation from video display units: An eavesdropping risk?

Withers Jr., R. A. & Albrecht, S. (1997). Pssst…wanna buy some data? Security Management, 41(12), 113-117.

Zalewski, M. (2005). Silence on the wire. San Francisco, California: No Starch Press.

Zalud, B. (2004). War of the walls. Security, 41(2), 58.