A photograph taken by Stasi operatives of suspected defectors at an abandoned restaurant in Kreuzberg, Berlin, in 1962.
Stasi Records Agency Berlin/Bild
30 years after the fall of the Berlin Wall, covert surveillance images offer us an unparalleled look at the lives of people trying to escape from the east to the west.
Uighurs wait in line at a face scan checkpoint in Turpan, Xinjiang in northwest China on April 11, 2018.
An anthropologist who interviewed Uighurs in China found different ways in which Chinese authorities used checkpoints, social media and smartphones to identify, categorize and control this group.
Toohey writes, among other things, about laws hustled through parliament in recent years that hamper journalistic inquiry.
A new book takes apart Australia's recent move towards a more secret state, and the implications it might have for the health of our democracy.
Surveillance software that identifies people from CCTV is eroding human rights and democracy.
Young people in a study discussed feeling left to their own devices to face the future.
Researchers examined how youth on three continents think about digital technology today and conducted an experiment to learn what youth said after living without their phones for a week.
Those money-saving black boxes reveal a lot about the rules that govern our lives.
Nursing home staff report feeling demoralized by the use of web-endabled cameras to monitor the care of patients.
Ever more Americans are using digital cameras to keep an eye on elderly relatives who live in nursing homes. This surveillance may violate patients' privacy and demoralize their caretakers.
Camera never lies.
If you thought police surveillance was mere CCTV, it's time to catch up on what's happening on the other side of the lens.
ParentsNext requires places like libraries and public pools to monitor parents' attendance at activities. This undermines their role as spaces of inclusion and support.
The dominant reading of George Orwell’s dystopian novel, “1984” has been that it was a dire prediction of what could be.
Denis Hamel Côté
In the year 1984, there was self-congratulatory coverage that the dystopia of the novel had not been realized. However, an expert argues that the technologies described in the novel are here and watching us.
Campaigners in the UK are pushing to protect privacy and make the security services more accountable.
The constitutionality of South Africa’s surveillance law is being challenged in court.
South Africa's law that regulates the Interception of communications is being challenged on the basis it can be abused by rogue elements in intelligence.
According to FBI memos, King witnessed and encouraged a rape in a hotel room.
King was once thought of as a saint beyond reproach. It eventually emerged that he was a womanizer. But we now have to ask the unthinkable: Did King enable abuse?
The Northern Territory government is expanding the CCTV surveillance network.
Darwin is one of the aspiring 'smart cities' that is adopting Chinese technology that can identify and track individuals. Add changes in Australian law, and we have the makings of a surveillance state.
Are tracking technologies changing parenting?
Apps these days allow parents to track their children. An expert explains, why these technologies should be a reason for worry if you are a parent,
In the Boston bombing case, police used CCTV footage to help identify the suspects.
These days surveillance isn't just CCTV. Police now have access to body cams, drones and facial recognition systems – and it's helping police not only solve crime, but prevent it too.
Technology can significantly improve governments’ surveillance abilities.
Even governments in democracies with strong traditions of rule of law find themselves tempted to abuse these new abilities.
A SenseTime artificial intelligence system monitors an intersection in China.
AI can help make government more efficient – but at what cost? Citizens' lives could be better or worse, based on how the technology is used.
For a small fee, anyone can post sensitive documents publicly on a blockchain.
Chinese users have started posting sensitive materials, like documents of sexual assault, on the blockchain. But the government has taken its own steps to crack down on this practice.
Facial recognition is already in our schools.
New technologies like facial recognition are coming – whether we like it or not. We can't turn back the tide, but we can manage new technology to do the least harm and most good.