Jump to content
Cultural Healing and Life

Search the Community

Showing results for tags 'surveillance'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • The story of Jon & Deb and the beginning of Cultural Healing and Life
    • The story of Jon & Deb and the beginning of Cultural Healing and Life
  • Cultural
    • Community Board
    • Humanity
    • Society
    • News & Interesting
  • Healing & Life
    • Life & Health
    • Garden Earth
    • Pharmacy Earth

Calendars

  • Community Calendar

Categories

  • Member Files

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me

Found 2 results

  1. China's CCTV surveillance network took just 7 minutes to capture BBC reporter Jon Russell,TechCrunch It took Chinese authorities just seven minutes to locate and apprehend BBC reporter John Sudworth using its powerful network of CCTV camera and facial recognition technology. This wasn't a case of a member of the media being forcibly removed from the country. The chase was a stunt set up to illustrate just how powerful and effective the Chinese government's surveillance system can be. It's a stark example of the type of monitoring that China has invested heavily in over recent years with the aim of helping police do their job more efficiently. Such systems are also used in private organizations, for example to monitor workers and processes in factories, but government critics have warned of the potential for abuse in the hands of the state. China has the largest monitoring system in the world. There are some 170 million CCTV cameras across the country, and that's tipped to grow more than three-fold with 400 million more set to be installed by 2020. Beyond the sheer numbers of lookout points, China is harvesting information with a new-found focus on intelligence. The government also works with facial recognition and AI companies, such as unicorn Face++, which can pour through data to extract meaningful information such as faces, ages, registration plates and more. The full video of Sudworth's 'capture' is on the BBC website, with a snippet is below -- hat-tip The Next Web. pic.twitter.com/vLGQYN7ZB9 In China's surveillance state, a reporter's game of hide and seek had a sinister edge http://www.newsweek.com/tasked-trying-remain-undetected-long-possible-sudworth-filmed-himself-selfie-747843 BY CHRISTINA ZHAO ON 12/14/17 AT 6:54 AM China currently boasts the largest monitoring system in the world, with approximately 176 million CCTV cameras in public and private hands. According to The Wall Street Journal, China will add another 450 million cameras by 2020. The U.S., by comparison, has around 50 million. CCTV is also used in China by private organizations to monitor workers and mine human data, a practice that has attracted criticism from activists as an abuse of human rights. China has no enforceable protections for privacy rights against state surveillance, reported Human Rights Watch (HRW). “Until China has meaningful privacy rights and an accountable police force, the government should immediately cease these efforts,” said Sophie Richardson, China director at HRW. Officials told Sudworth that only criminals need to fear the technology, but recent reports suggest that the software has been used to monitor and intimidate ethnic minorities like the Uighurs in western China. Beyond the cameras, China has also been gathering information by using new facial recognition intelligence and working with artificial intelligence companies, which can quickly shift through data to extract information on people’s faces, ages, registration plates and more. Facial recognition cameras and software are also being used in China for routine activities, such as gaining entrance to a workplace, withdrawing cash from an ATM and unlocking a smartphone, reported WSJ. A KFC restaurant in China’s capital is now scanning customers’ faces and then making menu suggestions based on gender and age. And a popular park in Beijing has deployed smart intelligence to fight toilet paper theft in public restrooms by using face-scanning dispensers that limit each person to a limited amount of paper every nine minutes, the newspaper claimed.
  2. SCOTUS considers limits to the government's surveillance powers over personal technology http://www.abajournal.com/magazine/article/carpenter_v_united_states/P1 This article was published in the December 2017 issue of the ABA Journal with the title "Cell Block: The high court considers limits to the government’s surveillance powers over personal technology." SCOTUS = Supreme Court of the united States. ABA = American Bar Association In 2011, the police and the FBI used data from cellular telephone towers to help connect a suspect to a string of armed robberies of Radio Shack and T-Mobile stores in the Detroit area. The authorities didn’t rely on a warrant based on probable cause but on a broad court order under a 1986 federal law, the Stored Communications Act. They collected more than 120 days’ worth of records from two wireless carriers for the cell-site data of the suspect’s mobile phone. The records helped show that the suspect, Timothy I. Carpenter, was in close proximity to the stores at the time of the crimes. Combined with other evidence that Carpenter was the leader of the robbery ring, the records led to his conviction on federal robbery- and weapons-related charges. Carpenter challenged the warrantless collection of cell-site data as an unconstitutional search under the Fourth Amendment. He lost in the lower courts. But the U.S. Supreme Court granted review of a case that several legal observers predict will have enormous implications for privacy in the digital age for generations to come. “It’s hugely important,” says Orin S. Kerr, a professor at the George Washington University Law School and an expert on the Fourth Amendment. “This is the case that is going to determine the limits on the government’s surveillance power at the state and federal level in new technologies for years to come. I think the justices know that.” Andrew G. Ferguson, a professor at the University of the District of Columbia law school and a privacy expert, says the case affects cell towers and individuals’ data from email, smart watches, activity-tracker bands and so-called smart appliances—devices as conventional as refrigerators, which now have some models that connect to the internet. “This is not about just one technology and one criminal defendant,” says Ferguson, author of The Rise of Big Data Policing: Surveillance, Race, and the Future of Law Enforcement. “It is really about how the Fourth Amendment will or will not protect all Americans in the digital age.” The closely watched case was scheduled to be heard Nov. 29, which falls under the court’s December argument calendar. TRACKING STORED COMMUNICATION Authorities initially arrested four suspects in spring 2011 in the string of robberies at Radio Shack and T-Mobile stores. One suspect identified an ensemble of 15 others who had participated in some or all the crimes, which involved small groups of robbers entering a store, herding employees into the back at gunpoint, and ordering them to fill bags with new smartphones. Court testimony later suggested that Carpenter organized a string of such robberies in Michigan and Ohio during a four-month period. He supplied the guns and typically waited in the getaway car, testimony showed. The police received Carpenter’s cellphone number from the informing suspect. The FBI sought orders from federal magistrate judges to require the release of cell-tower information for Carpenter’s phone. The magistrates granted the orders under the Stored Communications Act, which requires the government to show “reasonable grounds” for believing that the records were “relevant and material to an ongoing investigation.” Carpenter’s cellphone provider, MetroPCS, provided 186 pages of the suspect’s “call detail records” that covered 127 days, while Sprint provided records for Carpenter’s phone for two days in Warren, Ohio, where one robbery took place. (Sprint was the roaming provider in that area because MetroPCS did not have its own towers there.) At trial, FBI Special Agent Christopher Hess, a cellular analysis specialist, testified for the prosecution. “If you dial a number and you hit send, that tower information is populated in the call detail record,” he said. Hess identified eight calls to or from Carpenter’s phone that happened around the time of four of the robberies. He presented maps of the cell towers that connected those calls to demonstrate that Carpenter’s phone was within a half-mile to 2 miles of the crime scenes. On cross-examination, the agent acknowledged that he could not say that Carpenter’s phone was located within a particular spot or intersection, and he agreed that the cellular analysis was “not an exact science.” At closing argument, a prosecutor argued to the jury that the cellular data provided another overlay of corroboration, showing that Carpenter was “right where the first robbery was at the exact time of the robbery, the exact sector.” The cell-tower evidence may well have been, in this case, another layer of corroboration. There also was incriminating testimony from seven of Carpenter’s accomplices. Carpenter was convicted of all six robbery charges he faced under the federal Hobbs Act and five of six firearms charges. He was sentenced to 116 years in prison. THIRD-PARTY BUSINESS RECORDS But on appeal, Carpenter pressed his motion to suppress the cell-tower evidence, which the district court had rejected. The 6th U.S. Circuit Court of Appeals at Cincinnati also turned away his arguments, holding that Carpenter lacked any property interest or reasonable expectation of privacy in the cell-tower records acquired by the government under the Stored Communications Act. The 6th Circuit panel acknowledged that in United States v. Jones, a 2012 Supreme Court case about long-term GPS monitoring of a suspected drug dealer, five justices had agreed that people have a reasonable expectation of privacy in information very similar to cell-site data. But the appeals court said Carpenter’s case was different because it “involves business records obtained from a third party.” Those records are closer to the landline call records that the high court had held were not entitled to Fourth Amendment protection in Smith v. Maryland in 1979. “Cell-site data—like mailing addresses, phone numbers and IP addresses—are information that facilitate personal communications, rather than part of the content of those communications themselves,” the 6th Circuit said. “The government’s collection of business records containing these data therefore is not a search.” Nathan Wessler, an American Civil Liberties Union lawyer representing Carpenter, says the Smith decision and the Stored Communications Act were products of an era when few Americans were carrying phones in their pockets. “In this case, law enforcement went to Mr. Carpenter’s cellphone providers and got more than four months of cellphone records that created a granular map of everywhere he went,” Wessler says. “That is a chilling power.” DIGITAL CRIME AND PRIVACY U.S. Solicitor General Noel J. Francisco argued in the federal government’s brief that the “third-party doctrine” long recognized by the high court applies here. “Cellphone users voluntarily reveal to their providers information about their proximity to cell towers, so the providers can connect their calls,” Francisco said in the brief. “Users cannot reasonably expect that the providers will not reveal that business information to the government.” John M. Castellano wrote an amicus brief on the federal government’s side for the Arlington, Virginia-based National District Attorneys Association. He says prosecutors use cell-site location data as an important investigative tool. They also use grand jury subpoenas and court orders short of a warrant to investigate identity theft, fraud, public corruption and other offenses. Those investigations would be seriously hampered by any restriction on the third-party doctrine, he says. “You don’t always have probable cause at the time you are issuing a subpoena,” says Castellano, the deputy executive assistant district attorney for the Queens County DA’s office in Kew Gardens, New York. “The nature of crime has changed. It has taken full advantage of the digital era.” But Wessler of the ACLU says the government “misreads Americans’ expectations of privacy in the digital age and sets the bar way too low.” Ferguson of the University of the District of Columbia wrote an amicus brief on Carpenter’s side for a group of scholars of criminal procedure and privacy. The basic thrust is that the third-party doctrine is ill-suited for an age in which smart devices that transmit all manner of personal information to third parties are pervasive. These include cellphones, smart cars, smart homes and smart medical devices within the body. “It used to be that police officers had to sit in hot cars drinking cold coffee to conduct surveillance,” Ferguson says. “The idea of a 1970s-era law about old telephone technology governing this area just doesn’t make a lot of sense now.”
×
×
  • Create New...