TO ACCESS DATA
TO IDENTIFY
SURVEILLANCE
TO MONITOR
AN INVASION OF PRIVACY
TO STORE THE INFORMATION
AUTHORITIES
DETERRENT TO CRIME