Those who conduct surveillance -- either for nefarious or protective security reasons -- frequently have used available technology to aid them in their efforts. In earlier times, employing such technology might have meant simply using a telescope, but in more recent years, surveillants have used photographic and video gear, night vision aids and electronic equipment such as covert listening devices, beacons and programmable scanners. These efforts have been greatly enhanced by the advent of personal computers, which can be used to database and analyze information, and the Internet, which has revolutionized information gathering....