Surveillance Stocks List

Related ETFs - ETFs which own some of the above listed stocks. Ordered by greatest concentration to least concentration.

Symbol Grade Name Weight

Compare ETFs

Recent Signals

Date Stock Signal Type
2020-08-03 ABPR Crossed Above 20 DMA Bullish
2020-08-03 ABPR Crossed Above 50 DMA Bullish
2020-08-03 ABPR Narrow Range Bar Range Contraction
2020-08-03 ABPR Bollinger Band Squeeze Range Contraction
2020-08-03 DIRV Doji - Bullish? Reversal
2020-08-03 HWKE Pocket Pivot Bullish Swing Setup
2020-08-03 HWKE Upper Bollinger Band Walk Strength
2020-08-03 HWKE Parabolic Rise Strength
2020-08-03 IDTY New 52 Week High Strength
2020-08-03 IVDA Narrow Range Bar Range Contraction
2020-08-03 IWSY Boomer Sell Setup Bearish Swing Setup
2020-08-03 IWSY 1,2,3 Retracement Bearish Bearish Swing Setup
2020-08-03 IWSY Non-ADX 1,2,3,4 Bearish Bearish Swing Setup
2020-08-03 IWSY NR7 Range Contraction
2020-08-03 IWSY Narrow Range Bar Range Contraction
2020-08-03 NTSFF Gilligan's Island Sell Setup Bearish Swing Setup
2020-08-03 NTSFF 200 DMA Resistance Bearish
2020-08-03 SITS Non-ADX 1,2,3,4 Bearish Bearish Swing Setup
2020-08-03 SITS Narrow Range Bar Range Contraction
2020-08-03 SITS Bollinger Band Squeeze Range Contraction
2020-08-03 SKVY Narrow Range Bar Range Contraction
2020-08-03 SKVY Non-ADX 1,2,3,4 Bullish Bullish Swing Setup
2020-08-03 SMRL New Uptrend Bullish
2020-08-03 SMRL MACD Bullish Signal Line Cross Bullish
2020-08-03 SMRL Non-ADX 1,2,3,4 Bullish Bullish Swing Setup
2020-08-03 SMRL Expansion Pivot Buy Setup Bullish Swing Setup
2020-08-03 SMRL Pocket Pivot Bullish Swing Setup
2020-08-03 SMRL Crossed Above 200 DMA Bullish
2020-08-03 SMRL Volume Surge Other
2020-08-03 SMRL Crossed Above 20 DMA Bullish
2020-08-03 SMRL Crossed Above 50 DMA Bullish
2020-08-03 UNIV Fell Below 20 DMA Bearish
2020-08-03 UNIV Fell Below 50 DMA Bearish
2020-08-03 UNIV MACD Bearish Signal Line Cross Bearish
2020-08-03 UNIV Narrow Range Bar Range Contraction
2020-08-03 VSYM 50 DMA Support Bullish
2020-08-03 VSYM Narrow Range Bar Range Contraction
2020-08-03 ZSTN Bollinger Band Squeeze Range Contraction
2020-08-03 ZSTN Stochastic Reached Oversold Weakness
2020-08-03 ZSTN Narrow Range Bar Range Contraction

In espionage and counterintelligence, surveillance ( or ) is the monitoring of behavior, activities, or other changing information for the purpose of influencing, managing, directing, or protecting people. This can include observation from a distance by means of electronic equipment (such as closed-circuit television (CCTV) cameras) or interception of electronically transmitted information (such as Internet traffic or phone calls). It can also include simple no- or relatively low-technology methods such as human intelligence agent and postal interception. The word surveillance comes from a French phrase for "watching over" (sur means "from above" and veiller means "to watch") and is in contrast to more recent developments such as sousveillance.Surveillance is used by governments for intelligence gathering, prevention of crime, the protection of a process, person, group or object, or the investigation of crime. It is also used by criminal organisations to plan and commit crimes, such as robbery and kidnapping, by businesses to gather intelligence, and by private investigators.
Surveillance can be viewed as a violation of privacy, and as such is often opposed by various civil liberties groups and activists. Liberal democracies have laws which restrict domestic government and private use of surveillance, usually limiting it to circumstances where public safety is at risk. Authoritarian government seldom have any domestic restrictions, and international espionage is common among all types of countries.
The area of surveillance is increasingly a topic of academic study, including through research centers, books, and peer-reviewed academic journals. "In the future, intelligence services might use the internet of things for identification, surveillance, monitoring, location tracking, and targeting for recruitment, or to gain access to networks or user credentials," Clapper said.

More about Surveillance