SURVEILLANCE 7
Social network analysis allows governments to obtain information about peoples'
family members, friends, and other contacts. Since the users voluntarily make much of this
data public, it is often treated as a way of open-source intelligence. The most common form
of surveillance is building maps of social networks using data mined from social networks
including Facebook, MySpace and Twitter. These social network "maps" give important
information such as personal hobbies, friendships & affiliations, needs, beliefs, thoughts, and
activities. The information given over social sites may be critical to the privacy of
individuals, as a result, to the extent that one must provide such information to use a site; it
ceases to be voluntary in some way. The society needs to come up with policies that dictate
how much data one must provide in a social site in order to use the resource.
Economic transactions in modern society leave behind prominent amounts of stored
records and data. This type of data was documented in the paper or was just not documented
at all. Paper-based records were a laborious process and required human interventions to dig
manually through documents, which was erratic. However, today many of this information
are electronic, yielding to an "electronic trail". This is evident in activities such as use of a
banking device, payment by credit card, checking out rented video and a library book, which
create new complete electronic records. Records, especially public records such as birth, tax
compliance, court records and other records are being digitized and made available for
follow-ups.
Electronic record keeping makes information easily storable, collectable, and
accessible such that efficient aggregation, high-volume and analysis becomes possible at
importantly lower costs. When large number of this kind of transactions are combined, they
build a elaborated profile showing the locations frequented visited, social connections and
habits of the preferences of the individual. Personal information accessed by these methods
are difficult to erase, in addition, the information can be used by the government as well as