|
|
Books > Business & Economics > Industry & industrial studies > Service industries > Security services > Surveillance services
The challenges to humanity posed by the digital future, the first
detailed examination of the unprecedented form of power called
"surveillance capitalism," and the quest by powerful corporations
to predict and control our behavior. In this masterwork of original
thinking and research, Shoshana Zuboff provides startling insights
into the phenomenon that she has named surveillance capitalism. The
stakes could not be higher: a global architecture of behavior
modification threatens human nature in the twenty-first century
just as industrial capitalism disfigured the natural world in the
twentieth. Zuboff vividly brings to life the consequences as
surveillance capitalism advances from Silicon Valley into every
economic sector. Vast wealth and power are accumulated in ominous
new "behavioral futures markets," where predictions about our
behavior are bought and sold, and the production of goods and
services is subordinated to a new "means of behavioral
modification." The threat has shifted from a totalitarian Big
Brother state to a ubiquitous digital architecture: a "Big Other"
operating in the interests of surveillance capital. Here is the
crucible of an unprecedented form of power marked by extreme
concentrations of knowledge and free from democratic oversight.
Zuboff's comprehensive and moving analysis lays bare the threats to
twenty-first century society: a controlled "hive" of total
connection that seduces with promises of total certainty for
maximum profit -- at the expense of democracy, freedom, and our
human future. With little resistance from law or society,
surveillance capitalism is on the verge of dominating the social
order and shaping the digital future -- if we let it.
'Fascinating and powerful.' Sunday Times What do you do with a
hundred thousand idle spies? By 1990 the Berlin Wall had fallen and
the East German state security service folded. For forty years,
they had amassed more than a billion pages in manila files
detailing the lives of their citizens. Almost a hundred thousand
Stasi employees, many of them experienced officers with access to
highly personal information, found themselves unemployed overnight.
This is the story of what they did next. Former FBI agent Ralph
Hope uses present-day sources and access to Stasi records to track
and expose ex-officers working everywhere from the Russian energy
sector to the police and even the government department tasked with
prosecuting Stasi crimes. He examines why the key players have
never been called to account and, in doing so, asks if we have
really learned from the past at all. He highlights a man who
continued to fight the Stasi for thirty years after the Wall fell,
and reveals a truth that many today don't want spoken. The Grey Men
comes as an urgent warning from the past at a time when governments
the world over are building an unprecedented network of
surveillance over their citizens. Ultimately, this is a book about
the present.
Almost all incidences of cheating, theft, fraud, or loss can be detected through the surveillance of critical transactions, audit observations, and reviews of key metrics. Providing proven-techniques for detecting and mitigating the ever-evolving threats to casino security, this book covers the core skills, knowledge, and techniques needed to protect casino assets, guests, and employees.
Drawing on the authors’ six decades of combined experience in the industry, Casino Security and Gaming Surveillance identifies the most common threats to casino security and provides specific solutions for addressing these threats. From physical security and security management to table and gaming surveillance, it details numerous best practice techniques, strategies, and tactics, in addition to the metrics required to effectively monitor operations. The authors highlight valuable investigation tools, including interview techniques and evidence gathering. They also cover IOU patrol, tri-shot coverage, surveillance audits, threat analysis, card counting, game protection techniques, players’ club theft and fraud, surveillance standard operating procedures, nightclub and bar security, as well as surveillance training.
Complete with a glossary of gaming terms and a resource-rich appendix that includes helpful forms, this book covers everything surveillance and security professionals need to know to avoid high-profile incidents, costly compliance violations and damage to property and revenue.
Table of Contents
Section I: Surveillance in Gaming Operations
Chapter 1: Camera Operational Techniques
Chapter 2: Game Protection
Chapter 3: Internal Theft and Fraud
Chapter 4: Security Surveillance
Chapter 5: Standard Operating Procedures
Chapter 6: Investigations
Chapter 7: Surveillance Training and Education
Chapter 8: Statistical Information and Analysis
Chapter 9: Surveillance in the Future
Section II: Physical Security in Gaming Operations
Chapter 10: The Gaming Security Officer’s Role
Chapter 11: Security Patrols and Assignments in the Gaming Environment
Chapter 12: Alcohol and the Gaming Environment
Chapter 13: Table Game Fills, Credits, Drops, and Money
Chapter 14: Managing and Controlling Incidents
Chapter 15: Removing Undesirables
Chapter 16: Arrests and Detainments
Chapter 17: Theft, Larceny, and Other Property Crimes
Chapter 18: The Major Security Incident
Chapter 19: Training Gaming Security Officers
Chapter 20: Common Casino Scams and Crimes
Chapter 21: Managing Casino Security
A critical look at how the US military is weaponizing technology
and data for new kinds of warfare-and why we must resist. War
Virtually is the story of how scientists, programmers, and
engineers are racing to develop data-driven technologies for
fighting virtual wars, both at home and abroad. In this landmark
book, Roberto J. Gonzalez gives us a lucid and gripping account of
what lies behind the autonomous weapons, robotic systems,
predictive modeling software, advanced surveillance programs, and
psyops techniques that are transforming the nature of military
conflict. Gonzalez, a cultural anthropologist, takes a critical
approach to the techno-utopian view of these advancements and their
dubious promise of a less deadly and more efficient warfare. With
clear, accessible prose, this book exposes the high-tech
underpinnings of contemporary military operations-and the cultural
assumptions they're built on. Chapters cover automated battlefield
robotics; social scientists' involvement in experimental defense
research; the blurred line between political consulting and
propaganda in the internet era; and the military's use of big data
to craft new counterinsurgency methods based on predicting
conflict. Gonzalez also lays bare the processes by which the
Pentagon and US intelligence agencies have quietly joined forces
with Big Tech, raising an alarming prospect: that someday Google,
Amazon, and other Silicon Valley firms might merge with some of the
world's biggest defense contractors. War Virtually takes an
unflinching look at an algorithmic future-where new military
technologies threaten democratic governance and human survival.
With thorough analysis and balanced reporting, Ghost Guns:
Hobbyists, Hackers, and the Homemade Weapons Revolution is an
essential resource for readers seeking to understand the rise of
homemade firearms and future options for managing them. For more
than a century, strict gun control was possible because firearms
were produced in centralized industrial factories. Today, the
Fourth Industrial Revolution, combining old and new technologies,
threatens to upend this arrangement. An increasing number of
hobbyists, "makers," technology provocateurs, and sophisticated
criminals are proving that you don't need a factory to make guns
anymore. The security challenges of this transformation are
increasingly apparent, but the technologies behind it hold
tremendous potential, and while ignoring the security implications
would entail risks, the costs of new policies also must be
evaluated. "Do-it-yourself," or DIY, weapons will bring significant
ramifications for First and Second Amendment law, international and
homeland security, crime control, technology, privacy, innovation,
and the character of open source culture itself. How can a liberal
society adjust to technologies that make it easier to produce
weapons and contraband? Informative and thought-provoking, Ghost
Guns: Hobbyists, Hackers, and the Homemade Weapons Revolution
carefully analyzes the technical, legal, social, political, and
criminological trends behind this challenging new area of illicit
weapons activity. Provides readers with informative background on
DIY gun laws and legislative trends and fascinating descriptions of
legal and illegal practices with homemade weapons around the world
Presents in-depth explanations of the consumer appeal, technology,
economics, politics, and enforcement challenges behind America's
quickly growing DIY gun-making phenomenon Evaluates the current and
future appeal of homemade weapons for differing types of crime and
terrorism Offers a series of forward-looking recommendations for
weapons control and security policy in an increasingly
"post-industrial" 21st century
A practical, user-friendly handbook for understanding and
protecting our personal data and digital privacy. Our Data,
Ourselves addresses a common and crucial question: What can we as
private individuals do to protect our personal information in a
digital world? In this practical handbook, legal expert Jacqueline
D. Lipton guides readers through important issues involving
technology, data collection, and digital privacy as they apply to
our daily lives. Our Data, Ourselves covers a broad range of
everyday privacy concerns with easily digestible, accessible
overviews and real-world examples. Lipton explores the ways we can
protect our personal data and monitor its use by corporations, the
government, and others. She also explains our rights regarding
sensitive personal data like health insurance records and credit
scores, as well as what information retailers can legally gather,
and how. Who actually owns our personal information? Can an
employer legally access personal emails? What privacy rights do we
have on social media? Answering these questions and more, Our Data,
Ourselves provides a strategic approach to assuming control over,
and ultimately protecting, our personal information.
Cracking open the politics of transparency and secrecy In an era of
open data and ubiquitous dataveillance, what does it mean to
"share"? This book argues that we are all "shareveillant" subjects,
called upon to be transparent and render data open at the same time
as the security state invests in practices to keep data closed.
Drawing on Jacques Ranciere's "distribution of the sensible," Clare
Birchall reimagines sharing in terms of a collective political
relationality beyond the veillant expectations of the state.
In spite of Edward Snowden's disclosures about government abuses of
dragnet communication surveillance, the surveillance industry
continues to expand around the world. Many people have become
resigned to a world where they cannot have a reasonable expectation
of privacy. The author looks at what can be done to rein in these
powers and restructure how they are used beyond the limited and
often ineffective reforms that have been attempted. Using southern
Africa as a backdrop, and its liberation history, Jane Duncan
examines what an anti-capitalist perspective on intelligence and
security powers could look like. Are the police and intelligence
agencies even needed, and if so, what should they do and why? What
lessons can be learnt from how security was organised during the
struggles for liberation in the region? Southern Africa is seeing
thousands of people in the region taking to the streets in
protests. In response, governments are scrambling to acquire
surveillance technologies to monitor these new protest movements.
Southern Africa faces no major terrorism threats at the moment,
which should make it easier to develop clearer anti-surveillance
campaigns than in Europe or the US. Yet, because of tactical and
strategic ambivalence about security powers, movements often engage
in limited calls for intelligence and policing reforms, and fail to
provide an alternative vision for policing and intelligence.
Surveillance and Intelligence in Southern Africa examines what that
vision could look like.
Featuring chapters authored by leading scholars in the fields of
criminology, critical race studies, history, and more, The
Cambridge Handbook of Race and Surveillance cuts across history and
geography to provide a detailed examination of how race and
surveillance intersect throughout space and time. The volume
reviews surveillance technology from the days of colonial conquest
to the digital era, focusing on countries such as the United
States, Canada, the UK, South Africa, the Philippines, India,
Brazil, and Palestine. Weaving together narratives on how
technology and surveillance have developed over time to reinforce
racial discrimination, the book delves into the often-overlooked
origins of racial surveillance, from skin branding, cranial
measurements, and fingerprinting to contemporary manifestations in
big data, commercial surveillance, and predictive policing. Lucid,
accessible, and expertly researched, this handbook provides a
crucial investigation of issues spanning history and at the
forefront of contemporary life.
Collect data and build trust. With the rise of data science and
machine learning, companies are awash in customer data and powerful
new ways to gain insight from that data. But in the absence of
regulation and clear guidelines from most federal or state
governments, it's difficult for companies to understand what
qualifies as reasonable use and then determine how to act in the
best interest of their customers. How do they build, not erode,
trust? Customer Data and Privacy: The Insights You Need from
Harvard Business Review brings you today's most essential thinking
on customer data and privacy to help you understand the tangled
interdependencies and complexities of this evolving issue. The
lessons in this book will help you develop strategies that allow
your company to be a good steward, collecting, using, and storing
customer data responsibly. Business is changing. Will you adapt or
be left behind? Get up to speed and deepen your understanding of
the topics that are shaping your company's future with the Insights
You Need from Harvard Business Review series. Featuring HBR's
smartest thinking on fast-moving issues—blockchain,
cybersecurity, AI, and more—each book provides the
foundational introduction and practical case studies your
organization needs to compete today and collects the best research,
interviews, and analysis to get it ready for tomorrow. You can't
afford to ignore how these issues will transform the landscape of
business and society. The Insights You Need series will help you
grasp these critical ideas—and prepare you and your
company for the future.
2020 Foreword Indie Award Winner (Gold) in the "Science &
Technology" Category "Chilling, eye-opening, and timely, Cyber
Privacy makes a strong case for the urgent need to reform the laws
and policies that protect our personal data. If your reaction to
that statement is to shrug your shoulders, think again. As April
Falcon Doss expertly explains, data tracking is a real problem that
affects every single one of us on a daily basis." -General Michael
V. Hayden, USAF, Ret., former Director of CIA and NSA and former
Principal Deputy Director of National Intelligence You're being
tracked. Amazon, Google, Facebook, governments. No matter who we
are or where we go, someone is collecting our data: to profile us,
target us, assess us; to predict our behavior and analyze our
attitudes; to influence the things we do and buy-even to impact our
vote. If this makes you uneasy, it should. We live in an era of
unprecedented data aggregation, and it's never been more difficult
to navigate the trade-offs between individual privacy, personal
convenience, national security, and corporate profits. Technology
is evolving quickly, while laws and policies are changing slowly.
You shouldn't have to be a privacy expert to understand what
happens to your data. April Falcon Doss, a privacy expert and
former NSA and Senate lawyer, has seen this imbalance in action.
She wants to empower individuals and see policy catch up. In Cyber
Privacy, Doss demystifies the digital footprints we leave in our
daily lives and reveals how our data is being used-sometimes
against us-by the private sector, the government, and even our
employers and schools. She explains the trends in data science,
technology, and the law that impact our everyday privacy. She
tackles big questions: how data aggregation undermines personal
autonomy, how to measure what privacy is worth, and how society can
benefit from big data while managing its risks and being clear-eyed
about its cost. It's high time to rethink notions of privacy and
what, if anything, limits the power of those who are constantly
watching, listening, and learning about us. This book is for
readers who want answers to three questions: Who has your data? Why
should you care? And most important, what can you do about it?
Video surveillance, public records, fingerprints, hidden
microphones, RFID chips: in contemporary societies the intrusive
techniques of surveillance used in daily life have increased
dramatically. The "war against terror" has only exacerbated this
trend, creating a world that is closer than one might have imagined
to that envisaged by George Orwell in 1984.How have we reached this
situation? Why have democratic societies accepted that their rights
and freedoms should be taken away, a little at a time, by
increasingly sophisticated mechanisms of surveillance?From the
anthropometry of the 19th Century to the Patriot Act, through an
analysis of military theory and the Echelon Project, Armand
Mattelart constructs a genealogy of this new power of control and
examines its globalising dynamic. This book provides an essential
wake-up call at a time when democratic societies are becoming less
and less vigilant against the dangers of proliferating systems of
surveillance.
'Unique and engaging characters woven into the fabric of a
fantastic plot. Jason Dean is one to watch' Marc Cameron, New York
Times bestselling author of Tom Clancy Code of Honor What is a
death sentence to a dead man?He was a man with many names. Moving
from country to country, changing his face constantly so as to
remain in the shadows, he was nothing more than a ghost. For now,
he is known simply as Korso. A covert salvage operative, he
recovers lost artefacts and items, often stolen, for rich
benefactors unable to operate through normal channels. But his
shadowy existence is shattered upon the arrival at his Bermuda home
of the man he had hoped never to see again... Tasked with
recovering a missing, one-of-a-kind shipment in only four days, his
elite skill set will be tested to its limits. Failure will result
in his identity being revealed to his former boss, the ruthless
Nikolic, who would stop at nothing to eliminate the one man who
walked away from his organisation. An exceptional, white-knuckle
thriller full of intrigue and suspense, perfect for fans of Rob
Sinclair, Mark Dawson and Adam Hamdy. Praise for Tracer 'Tracer,
Korso's first outing, is everything you could want in a thriller;
fast-pace, suspense, mystery, just the right amount of wickedness,
but above all else a protagonist who the reader will want to read
more and more of. A real page turner' Rob Sinclair, million copy
bestselling author of The Red Cobra 'Meet Korso, a mysterious and
unique character you won't be able to get enough of. In a thriller
novel I want tension, pace and ample action, and in Tracer, Jason
Dean has delivered by the bucketful' Matt Hilton, author of the Joe
Hunter thrillers 'A relentless round of fast and furious set
pieces, out-pacing Reacher for tension and with non-stop violence
and intrigue to satisfy any thriller fans' Adrian Magson, author of
The Watchman 'A thrilling, race-against-time ride ... a great start
to what I'm sure will be a hugely successful thriller series' A. A.
Chaudhuri, author of The Scribe 'The most explosive book I've read
in ages' D. L. Marshall, author of Anthrax Island 'A superb,
fast-paced thriller which literally ticks like a time-bomb' Nick
Oldham, author of the Henry Christie series
A quick, easy-to-read synthesis of theory, guidelines, and
evidence-based research, this book offers timely, practical
guidance for library and information professionals who must
navigate ethical crises in information privacy and stay on top of
emerging privacy trends. Emerging technologies create new concerns
about information privacy within library and information
organizations, and many information professionals lack guidance on
how to navigate the ethical crises that emerge when information
privacy and library policy clash. What should we do when a patron
leaves something behind? How do we justify filtering internet
access while respecting accessibility and privacy? How do we
balance new technologies that provide anonymity with the library's
need to prevent the illegal use of their facilities? Library
Patrons' Privacy presents clear, conversational, evidence-based
guidance on how to navigate these ethical questions in information
privacy. Ideas from professional organizations, government
entities, scholarly publications, and personal experiences are
synthesized into an approachable guide for librarians at all stages
of their career. This guide, designed by three experienced LIS
scholars and professionals, is a quick and enjoyable read that
students and professionals of all levels of technical knowledge and
skill will find useful and applicable to their libraries. Presents
practical, evidence-based guidance for navigating common ethical
problems in library and information science Introduces library and
information professionals and students to emerging issues in
information privacy Provides students and practitioners with a
foundation of practical problem-solving strategies for handling
information privacy issues in emerging technologies Guides the
design of new information privacy policy in all types of libraries
Encourages engagement with information privacy technologies to
assist in fulfilling the American Library Association's core values
Political discourse on immigration in the United States has largely
focused on what is most visible, including border walls and
detention centers, while the invisible information systems that
undergird immigration enforcement have garnered less attention.
Tracking the evolution of various surveillance-related systems
since the 1980s, Borderland Circuitry investigates how the
deployment of this information infrastructure has shaped
immigration enforcement practices. Ana Muniz illuminates three
phenomena that are becoming increasingly intertwined: digital
surveillance, immigration control, and gang enforcement. Using
ethnography, interviews, and analysis of documents never before
seen, Muniz uncovers how information-sharing partnerships between
local police, state and federal law enforcement, and foreign
partners collide to create multiple digital borderlands. Diving
deep into a select group of information systems, Borderland
Circuitry reveals how those with legal and political power deploy
the specter of violent cross-border criminals to justify intensive
surveillance, detention, brutality, deportation, and the
destruction of land for border militarization.
What our health data tell American capitalism about our value-and
how that controls our lives. Afterlives of Data follows the curious
and multiple lives that our data live once they escape our control.
Mary F. E. Ebeling's ethnographic investigation shows how
information about our health and the debt that we carry becomes
biopolitical assets owned by healthcare providers, insurers,
commercial data brokers, credit reporting companies, and platforms.
By delving into the oceans of data built from everyday medical and
debt traumas, Ebeling reveals how data about our lives come to
affect our bodies and our life chances and to wholly define us.
Investigations into secretive data collection and breaches of
privacy by the likes of Cambridge Analytica have piqued concerns
among many Americans about exactly what is being done with their
data. From credit bureaus and consumer data brokers like Equifax
and Experian to the secretive military contractor Palantir, this
massive industry has little regulatory oversight for health data
and works to actively obscure how it profits from our data. In this
book, Ebeling traces the health data-medical information extracted
from patients' bodies-that are digitized and repackaged into new
data commodities that have afterlives in database lakes and oceans,
algorithms, and statistical models used to score patients on their
creditworthiness and riskiness. Critical and disturbing, Afterlives
of Data examines how Americans' data about their health and their
debt are used in the service of marketing and capitalist
surveillance.
|
|