SlideShare ist ein Scribd-Unternehmen logo
1 von 51
The Benefits and Harms of
National Security Technologies
Katina Michael
University of Wollongong
BIT, MTransCrimPrev, PhD
Security Contexts
Personal
Security
National
Security
International
Security
Responsibility for action taken by
Local/Provincial Police National/State Police International Police
Examples of Security Contexts
Personal
Security
National
Security
International
Security
Responsibility for action taken by
Local/Provincial Police National/State Police International Police
• Crime/policing
• Economic security
• Health security
• Food security
• Building safety
• Workplace safety
• Organised crime
• Identity theft
• Natural disasters
• Emergencies
• Contamination:
• Food
• Water
• Domestic extremism
• Espionage
• CI attack
• CBRNE attack
• Transnational
organised crime
• Illegal entry
• Armed conflict
• Failing/failed
states
• Border security
• Aviation
security
• Marine security
• Cybersecurity
• Terrorism
• Global poverty
• Environmental
degradation
• Climate change
• Overpopulation
• Limited resources
Technology Responses to
Breaches in Security (AS-IS)
Personal
Security
National
Security
International
Security
Responsibility for action taken by
Local/Provincial Police National/State Police International Police
Technology Responses to
Breaches in Security (AS-IS)
Personal
Security
National
Security
International
Security
• Vehicle ID
• ANPR
• Biometric
schemes
• PATRIOT Act
• GPS logs
• Drones
• Passport
• E-passport
• VISA
• ESTA
• Full-body
scanners
• Health
scanners
• FISA Act
• NDNAD
• Driver’s license
• Bank card
• Health card
• Transport travel cards
• E-tags
• Workplace ID card
• Insurance
• Housing
• Health
• Vehicle
• Third-party
• National ID
• Telephony
• Internet
• Integrated
public number
database
• Dash cams
• Body-worn
video
• Meta-data
laws
• Schengen Convention
• Satellites
• SIRENE Database
• SIS + SIS II
• Prüm Treaty
• EUVIS
• EUCARIS
Responsibility for action taken by
Local/Provincial Police National/State Police International Police
Enhanced Border Security and Visa Entry
Reform Act of 2002
• “Secure borders, open
doors” policy
• A visa applicant who
refuses to be
fingerprinted would
have his or her visa
application denied on
the basis that it is
incomplete.
Take-up of Biometric Passports
• A combined paper and electronic passport that contains
biometric information that can be used to authenticate
the identity of travelers.
The Australian ePassport
• The chip embedded in the centre page stores the holder's digitised
photograph, name, gender, date of birth, nationality, passport
number, and the passport expiry date.
Airport Body Scanners
Heathrow Full Body Scanner
European Parliament Vote 6/07/11
• Deploy technology which
is the least harmful for
human health and
addresses privacy
concerns.
• Due to health risks
scanners using ionising
radiation should be
prohibited in the EU
• Right to opt for alternative
screening
The Full Body Pat-Down Search
Example: Aadhaar Unique ID
Multi-modal Biometrics
Technology Responses to
Breaches in Security (TO-BE)
Companies + Police + Military + Emergency Services + Transnational Corporations
Personal
Security
National
Security
International
Security
Responsibility for action taken by
Technology Responses to
Breaches in Security (TO-BE)
Companies + Police + Military + Emergency Services + Transnational Corporations
Personal
Security
National
Security
International
Security
Responsibility for action taken by
• Cloud technologies
• Drones
• DropCams
• NEST-style devices
• eWallets, Apple Watch
• Wearable technologies
• FitBits
• Lifelogging
• Chip implants
• Nanotech; e-tattoos
• DNA – celluloid sample
• OpenMaps
• Open source
• Open data
• Mobile CCTV
• Crowdsourcing
• Social media
• Activity
monitoring
• Auto-tagging
• Drones
• Sensor-based
alert systems
• Emergency
warnings
• Crowd-sourcing
coordination platform
• Autonomous drones
• Pandemic response systems
• ID management systems
• DNA on a chip tech
• Amplified humans
• Uberveillance
• Virus detect
• Rapid health
assessment
• Autonomous
data
collection
robots
• Robot
soldiers
• Kill lists
Google Earth
Policing Technology: from
Dash Cams to Tool Cams to Body Cams
http://arstechnica.com/tech-policy/2012/03/
http://www.wolfcomusa.com/
Posting Evidence to Taser
http://www.taser.com/products/on-officer-video/taser-cam
The Uberveillace Trajectory
The term uberveillance is in the Australian Macquarie Dictionary. Conceived by MG
Michael in 2006. Not to be confused with Google’s Uber taxi, car pooling application.
Resultant Effect of
Too Much Technology
The Struggle for Power
• Who can record who?
• Who can film who?
• Who can gather evidence on another?
• Who can access evidence on another?
– Axis of access?
• Living off the grid?
• The incidence of “black spots”
• Control from government hands to mega
corporates in charge
– Government attempts to mandate through regulation
Toward an Evidence-Based Existence
• Evidence-based everything
– Retrospective use
• What are the limits to
“watching”?
• Do we need tech to keep us
in line?
• Loss of context
– Technology can lie
• Loss of freedom
• Playing to a theatre
• Diversity diluted
The Limitations of an
Uberveillant Approach
• Omniscience
– having infinite awareness, understanding, and insight
– possessed of universal or complete knowledge
• Omnipresence
– present in all places at all times
• Ubiquity
– presence everywhere or in many places especially
simultaneously (omnipresence)
The Star of David which by order of the Nazis, all Jews had to stitch onto the left hand
side of their outer garment. Courtesy of the US Holocaust Memorial Museum.
Learning from the Past
The Benefits and Harms of National Security Technologies
The Benefits and Harms of National Security Technologies

Weitere ähnliche Inhalte

Was ist angesagt?

Fundamentals Of Pistol Marksmanship
Fundamentals Of Pistol MarksmanshipFundamentals Of Pistol Marksmanship
Fundamentals Of Pistol Marksmanshipbubut97
 
Non kinetic warfare share
Non kinetic warfare shareNon kinetic warfare share
Non kinetic warfare share104016032
 
Anti-terrorism training
Anti-terrorism trainingAnti-terrorism training
Anti-terrorism trainingjturner67
 
National Defense, International Security, & Globalization in the Post-Cold Wa...
National Defense, International Security, & Globalization in the Post-Cold Wa...National Defense, International Security, & Globalization in the Post-Cold Wa...
National Defense, International Security, & Globalization in the Post-Cold Wa...Carl B. Forkner, Ph.D.
 
National Security & National Interests – Implications
National Security & National Interests – ImplicationsNational Security & National Interests – Implications
National Security & National Interests – Implicationsrajaram.muthukrishnan
 
Human security basic overview
Human security basic overviewHuman security basic overview
Human security basic overviewLindsey Cottle
 
Counterintelligence
CounterintelligenceCounterintelligence
Counterintelligencekelsports
 
POLICE INTELLIGENCE ppt.pptx
POLICE INTELLIGENCE ppt.pptxPOLICE INTELLIGENCE ppt.pptx
POLICE INTELLIGENCE ppt.pptxRoland994165
 
Terrorism..what breeds it
Terrorism..what breeds itTerrorism..what breeds it
Terrorism..what breeds itSaba Saif
 
Fundamentalsof Crime Mapping 1
Fundamentalsof Crime Mapping 1Fundamentalsof Crime Mapping 1
Fundamentalsof Crime Mapping 1Osokop
 
What are the Voluntary Principles on Security and Human Rights?
What are the Voluntary Principles on Security and Human Rights?What are the Voluntary Principles on Security and Human Rights?
What are the Voluntary Principles on Security and Human Rights?Ethical Sector
 
Information Operations: What It Is and Why It Matters
Information Operations:  What It Is and Why It MattersInformation Operations:  What It Is and Why It Matters
Information Operations: What It Is and Why It MattersJeffrey Malone
 
SECURITY AND STRATEGIC STUDIES COURSE RECAP ON SSS.pptx
SECURITY AND STRATEGIC STUDIES COURSE RECAP ON SSS.pptxSECURITY AND STRATEGIC STUDIES COURSE RECAP ON SSS.pptx
SECURITY AND STRATEGIC STUDIES COURSE RECAP ON SSS.pptxTANKO AHMED fwc
 

Was ist angesagt? (20)

Close protection
Close protectionClose protection
Close protection
 
Terrorism
TerrorismTerrorism
Terrorism
 
Fundamentals Of Pistol Marksmanship
Fundamentals Of Pistol MarksmanshipFundamentals Of Pistol Marksmanship
Fundamentals Of Pistol Marksmanship
 
Non kinetic warfare share
Non kinetic warfare shareNon kinetic warfare share
Non kinetic warfare share
 
Terrorism
TerrorismTerrorism
Terrorism
 
THE DOVAL DOCTRINE – INDIA’S HYBRID WAR AGAINST PAKISTAN
THE DOVAL DOCTRINE – INDIA’S HYBRID WAR AGAINST PAKISTANTHE DOVAL DOCTRINE – INDIA’S HYBRID WAR AGAINST PAKISTAN
THE DOVAL DOCTRINE – INDIA’S HYBRID WAR AGAINST PAKISTAN
 
Anti-terrorism training
Anti-terrorism trainingAnti-terrorism training
Anti-terrorism training
 
National Defense, International Security, & Globalization in the Post-Cold Wa...
National Defense, International Security, & Globalization in the Post-Cold Wa...National Defense, International Security, & Globalization in the Post-Cold Wa...
National Defense, International Security, & Globalization in the Post-Cold Wa...
 
National Security & National Interests – Implications
National Security & National Interests – ImplicationsNational Security & National Interests – Implications
National Security & National Interests – Implications
 
Human security basic overview
Human security basic overviewHuman security basic overview
Human security basic overview
 
Counterintelligence
CounterintelligenceCounterintelligence
Counterintelligence
 
POLICE INTELLIGENCE ppt.pptx
POLICE INTELLIGENCE ppt.pptxPOLICE INTELLIGENCE ppt.pptx
POLICE INTELLIGENCE ppt.pptx
 
Terrorism
TerrorismTerrorism
Terrorism
 
Terrorism..what breeds it
Terrorism..what breeds itTerrorism..what breeds it
Terrorism..what breeds it
 
Terrorism
TerrorismTerrorism
Terrorism
 
Terrorism
TerrorismTerrorism
Terrorism
 
Fundamentalsof Crime Mapping 1
Fundamentalsof Crime Mapping 1Fundamentalsof Crime Mapping 1
Fundamentalsof Crime Mapping 1
 
What are the Voluntary Principles on Security and Human Rights?
What are the Voluntary Principles on Security and Human Rights?What are the Voluntary Principles on Security and Human Rights?
What are the Voluntary Principles on Security and Human Rights?
 
Information Operations: What It Is and Why It Matters
Information Operations:  What It Is and Why It MattersInformation Operations:  What It Is and Why It Matters
Information Operations: What It Is and Why It Matters
 
SECURITY AND STRATEGIC STUDIES COURSE RECAP ON SSS.pptx
SECURITY AND STRATEGIC STUDIES COURSE RECAP ON SSS.pptxSECURITY AND STRATEGIC STUDIES COURSE RECAP ON SSS.pptx
SECURITY AND STRATEGIC STUDIES COURSE RECAP ON SSS.pptx
 

Ähnlich wie The Benefits and Harms of National Security Technologies

Internet of things, New Challenges in Cyber Crime
Internet of things, New Challenges in Cyber CrimeInternet of things, New Challenges in Cyber Crime
Internet of things, New Challenges in Cyber CrimeMurray Security Services
 
Framework of responsible state behaviour in cyberspace - for Marshall Center ...
Framework of responsible state behaviour in cyberspace - for Marshall Center ...Framework of responsible state behaviour in cyberspace - for Marshall Center ...
Framework of responsible state behaviour in cyberspace - for Marshall Center ...Benjamin Ang
 
hybrid_threats.pdf
hybrid_threats.pdfhybrid_threats.pdf
hybrid_threats.pdfdarg0001
 
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...WCIT 2014
 
Experiences from the use of CovTracer: A contact tracing tool deployed in Cyp...
Experiences from the use of CovTracer: A contact tracing tool deployed in Cyp...Experiences from the use of CovTracer: A contact tracing tool deployed in Cyp...
Experiences from the use of CovTracer: A contact tracing tool deployed in Cyp...Andreas Kamilaris
 
Cybersecurity in the blue economy | 2022
Cybersecurity in the blue economy | 2022Cybersecurity in the blue economy | 2022
Cybersecurity in the blue economy | 2022KharimMchatta
 
Drone Security & Law Enforcement (Chris Church) - DroneSec GDSN#2
Drone Security & Law Enforcement (Chris Church) - DroneSec GDSN#2Drone Security & Law Enforcement (Chris Church) - DroneSec GDSN#2
Drone Security & Law Enforcement (Chris Church) - DroneSec GDSN#2DroneSec
 
Achieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyAchieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyShiva Bissessar
 
Aviation security challenges: practical solutions
Aviation security challenges: practical solutionsAviation security challenges: practical solutions
Aviation security challenges: practical solutionsTristan Wiggill
 
COVID-19 and Contact Tracing Apps - What Should Ireland Do? - Webinar
COVID-19 and Contact Tracing Apps - What Should Ireland Do? - WebinarCOVID-19 and Contact Tracing Apps - What Should Ireland Do? - Webinar
COVID-19 and Contact Tracing Apps - What Should Ireland Do? - Webinardri_ireland
 
Trust, Privacy and Biometrics
Trust, Privacy and BiometricsTrust, Privacy and Biometrics
Trust, Privacy and Biometricsblogzilla
 
Cybersecurity environment in malaysia and the function of internal auditor
Cybersecurity environment in malaysia and the function of internal auditorCybersecurity environment in malaysia and the function of internal auditor
Cybersecurity environment in malaysia and the function of internal auditorKhalizan Halid
 
Security Challenges in Emerging Technologies
Security Challenges in Emerging TechnologiesSecurity Challenges in Emerging Technologies
Security Challenges in Emerging TechnologiesSmart Assessment
 
Security Challenges in Emerging Technologies
Security Challenges in Emerging TechnologiesSecurity Challenges in Emerging Technologies
Security Challenges in Emerging TechnologiesPraveen Vackayil
 
IOT Security - ICCT College of Engineering
IOT Security - ICCT College of EngineeringIOT Security - ICCT College of Engineering
IOT Security - ICCT College of EngineeringPotato
 

Ähnlich wie The Benefits and Harms of National Security Technologies (20)

Internet of things, New Challenges in Cyber Crime
Internet of things, New Challenges in Cyber CrimeInternet of things, New Challenges in Cyber Crime
Internet of things, New Challenges in Cyber Crime
 
Framework of responsible state behaviour in cyberspace - for Marshall Center ...
Framework of responsible state behaviour in cyberspace - for Marshall Center ...Framework of responsible state behaviour in cyberspace - for Marshall Center ...
Framework of responsible state behaviour in cyberspace - for Marshall Center ...
 
hybrid_threats.pdf
hybrid_threats.pdfhybrid_threats.pdf
hybrid_threats.pdf
 
Sued or Suing: Introduction to Digital Forensics
Sued or Suing: Introduction to Digital ForensicsSued or Suing: Introduction to Digital Forensics
Sued or Suing: Introduction to Digital Forensics
 
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
 
Experiences from the use of CovTracer: A contact tracing tool deployed in Cyp...
Experiences from the use of CovTracer: A contact tracing tool deployed in Cyp...Experiences from the use of CovTracer: A contact tracing tool deployed in Cyp...
Experiences from the use of CovTracer: A contact tracing tool deployed in Cyp...
 
Cybersecurity in the blue economy | 2022
Cybersecurity in the blue economy | 2022Cybersecurity in the blue economy | 2022
Cybersecurity in the blue economy | 2022
 
File000154
File000154File000154
File000154
 
Drone Security & Law Enforcement (Chris Church) - DroneSec GDSN#2
Drone Security & Law Enforcement (Chris Church) - DroneSec GDSN#2Drone Security & Law Enforcement (Chris Church) - DroneSec GDSN#2
Drone Security & Law Enforcement (Chris Church) - DroneSec GDSN#2
 
Achieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyAchieving Caribbean Cybersecuirty
Achieving Caribbean Cybersecuirty
 
Aviation Security Challenges: Practical Solutions
Aviation Security Challenges: Practical SolutionsAviation Security Challenges: Practical Solutions
Aviation Security Challenges: Practical Solutions
 
Aviation security challenges: practical solutions
Aviation security challenges: practical solutionsAviation security challenges: practical solutions
Aviation security challenges: practical solutions
 
COVID-19 and Contact Tracing Apps - What Should Ireland Do? - Webinar
COVID-19 and Contact Tracing Apps - What Should Ireland Do? - WebinarCOVID-19 and Contact Tracing Apps - What Should Ireland Do? - Webinar
COVID-19 and Contact Tracing Apps - What Should Ireland Do? - Webinar
 
Trust, Privacy and Biometrics
Trust, Privacy and BiometricsTrust, Privacy and Biometrics
Trust, Privacy and Biometrics
 
It and safety
It and safetyIt and safety
It and safety
 
Cybersecurity environment in malaysia and the function of internal auditor
Cybersecurity environment in malaysia and the function of internal auditorCybersecurity environment in malaysia and the function of internal auditor
Cybersecurity environment in malaysia and the function of internal auditor
 
Security Challenges in Emerging Technologies
Security Challenges in Emerging TechnologiesSecurity Challenges in Emerging Technologies
Security Challenges in Emerging Technologies
 
Security Challenges in Emerging Technologies
Security Challenges in Emerging TechnologiesSecurity Challenges in Emerging Technologies
Security Challenges in Emerging Technologies
 
IOT Security - ICCT College of Engineering
IOT Security - ICCT College of EngineeringIOT Security - ICCT College of Engineering
IOT Security - ICCT College of Engineering
 
Cyberterrorismv1
Cyberterrorismv1Cyberterrorismv1
Cyberterrorismv1
 

Mehr von Katina Michael

Beyond Brain on the Bench: Broader Implications
Beyond Brain on the Bench: Broader ImplicationsBeyond Brain on the Bench: Broader Implications
Beyond Brain on the Bench: Broader ImplicationsKatina Michael
 
Microchipping People - The Risks (Engineers Australia)
Microchipping People - The Risks (Engineers Australia)Microchipping People - The Risks (Engineers Australia)
Microchipping People - The Risks (Engineers Australia)Katina Michael
 
Internet of Us - RADCOMMS2017
Internet of Us - RADCOMMS2017Internet of Us - RADCOMMS2017
Internet of Us - RADCOMMS2017Katina Michael
 
Artificial Intelligence in Biodiversity and Citizen Science
Artificial Intelligence in Biodiversity and Citizen ScienceArtificial Intelligence in Biodiversity and Citizen Science
Artificial Intelligence in Biodiversity and Citizen ScienceKatina Michael
 
Robots for Aged Care: Socio-ethical Issues
Robots for Aged Care: Socio-ethical IssuesRobots for Aged Care: Socio-ethical Issues
Robots for Aged Care: Socio-ethical IssuesKatina Michael
 
Self authentication – is it possible or plausible?
Self authentication – is it possible or plausible?Self authentication – is it possible or plausible?
Self authentication – is it possible or plausible?Katina Michael
 
Deep Brain Stimulation for Therapeutics: What is the prognosis?
Deep Brain Stimulation for Therapeutics: What is the prognosis?Deep Brain Stimulation for Therapeutics: What is the prognosis?
Deep Brain Stimulation for Therapeutics: What is the prognosis?Katina Michael
 
Artificial Intelligence & Machine Learning. Is it Planet Saving Tech?
Artificial Intelligence & Machine Learning. Is it Planet Saving Tech?Artificial Intelligence & Machine Learning. Is it Planet Saving Tech?
Artificial Intelligence & Machine Learning. Is it Planet Saving Tech?Katina Michael
 
Repurposing Medical Implants: from Therapeutics to Augmentation
Repurposing Medical Implants: from Therapeutics to AugmentationRepurposing Medical Implants: from Therapeutics to Augmentation
Repurposing Medical Implants: from Therapeutics to AugmentationKatina Michael
 
Methodological Approaches to Location-Based Social Networking Research
Methodological Approaches to Location-Based Social Networking ResearchMethodological Approaches to Location-Based Social Networking Research
Methodological Approaches to Location-Based Social Networking ResearchKatina Michael
 
The Pros and Cons of Implantables
The Pros and Cons of ImplantablesThe Pros and Cons of Implantables
The Pros and Cons of ImplantablesKatina Michael
 

Mehr von Katina Michael (11)

Beyond Brain on the Bench: Broader Implications
Beyond Brain on the Bench: Broader ImplicationsBeyond Brain on the Bench: Broader Implications
Beyond Brain on the Bench: Broader Implications
 
Microchipping People - The Risks (Engineers Australia)
Microchipping People - The Risks (Engineers Australia)Microchipping People - The Risks (Engineers Australia)
Microchipping People - The Risks (Engineers Australia)
 
Internet of Us - RADCOMMS2017
Internet of Us - RADCOMMS2017Internet of Us - RADCOMMS2017
Internet of Us - RADCOMMS2017
 
Artificial Intelligence in Biodiversity and Citizen Science
Artificial Intelligence in Biodiversity and Citizen ScienceArtificial Intelligence in Biodiversity and Citizen Science
Artificial Intelligence in Biodiversity and Citizen Science
 
Robots for Aged Care: Socio-ethical Issues
Robots for Aged Care: Socio-ethical IssuesRobots for Aged Care: Socio-ethical Issues
Robots for Aged Care: Socio-ethical Issues
 
Self authentication – is it possible or plausible?
Self authentication – is it possible or plausible?Self authentication – is it possible or plausible?
Self authentication – is it possible or plausible?
 
Deep Brain Stimulation for Therapeutics: What is the prognosis?
Deep Brain Stimulation for Therapeutics: What is the prognosis?Deep Brain Stimulation for Therapeutics: What is the prognosis?
Deep Brain Stimulation for Therapeutics: What is the prognosis?
 
Artificial Intelligence & Machine Learning. Is it Planet Saving Tech?
Artificial Intelligence & Machine Learning. Is it Planet Saving Tech?Artificial Intelligence & Machine Learning. Is it Planet Saving Tech?
Artificial Intelligence & Machine Learning. Is it Planet Saving Tech?
 
Repurposing Medical Implants: from Therapeutics to Augmentation
Repurposing Medical Implants: from Therapeutics to AugmentationRepurposing Medical Implants: from Therapeutics to Augmentation
Repurposing Medical Implants: from Therapeutics to Augmentation
 
Methodological Approaches to Location-Based Social Networking Research
Methodological Approaches to Location-Based Social Networking ResearchMethodological Approaches to Location-Based Social Networking Research
Methodological Approaches to Location-Based Social Networking Research
 
The Pros and Cons of Implantables
The Pros and Cons of ImplantablesThe Pros and Cons of Implantables
The Pros and Cons of Implantables
 

Kürzlich hochgeladen

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 

Kürzlich hochgeladen (20)

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 

The Benefits and Harms of National Security Technologies

  • 1. The Benefits and Harms of National Security Technologies Katina Michael University of Wollongong BIT, MTransCrimPrev, PhD
  • 2. Security Contexts Personal Security National Security International Security Responsibility for action taken by Local/Provincial Police National/State Police International Police
  • 3. Examples of Security Contexts Personal Security National Security International Security Responsibility for action taken by Local/Provincial Police National/State Police International Police • Crime/policing • Economic security • Health security • Food security • Building safety • Workplace safety • Organised crime • Identity theft • Natural disasters • Emergencies • Contamination: • Food • Water • Domestic extremism • Espionage • CI attack • CBRNE attack • Transnational organised crime • Illegal entry • Armed conflict • Failing/failed states • Border security • Aviation security • Marine security • Cybersecurity • Terrorism • Global poverty • Environmental degradation • Climate change • Overpopulation • Limited resources
  • 4. Technology Responses to Breaches in Security (AS-IS) Personal Security National Security International Security Responsibility for action taken by Local/Provincial Police National/State Police International Police
  • 5. Technology Responses to Breaches in Security (AS-IS) Personal Security National Security International Security • Vehicle ID • ANPR • Biometric schemes • PATRIOT Act • GPS logs • Drones • Passport • E-passport • VISA • ESTA • Full-body scanners • Health scanners • FISA Act • NDNAD • Driver’s license • Bank card • Health card • Transport travel cards • E-tags • Workplace ID card • Insurance • Housing • Health • Vehicle • Third-party • National ID • Telephony • Internet • Integrated public number database • Dash cams • Body-worn video • Meta-data laws • Schengen Convention • Satellites • SIRENE Database • SIS + SIS II • Prüm Treaty • EUVIS • EUCARIS Responsibility for action taken by Local/Provincial Police National/State Police International Police
  • 6. Enhanced Border Security and Visa Entry Reform Act of 2002 • “Secure borders, open doors” policy • A visa applicant who refuses to be fingerprinted would have his or her visa application denied on the basis that it is incomplete.
  • 7. Take-up of Biometric Passports • A combined paper and electronic passport that contains biometric information that can be used to authenticate the identity of travelers.
  • 8. The Australian ePassport • The chip embedded in the centre page stores the holder's digitised photograph, name, gender, date of birth, nationality, passport number, and the passport expiry date.
  • 11. European Parliament Vote 6/07/11 • Deploy technology which is the least harmful for human health and addresses privacy concerns. • Due to health risks scanners using ionising radiation should be prohibited in the EU • Right to opt for alternative screening
  • 12. The Full Body Pat-Down Search
  • 13.
  • 14. Example: Aadhaar Unique ID Multi-modal Biometrics
  • 15.
  • 16.
  • 17. Technology Responses to Breaches in Security (TO-BE) Companies + Police + Military + Emergency Services + Transnational Corporations Personal Security National Security International Security Responsibility for action taken by
  • 18. Technology Responses to Breaches in Security (TO-BE) Companies + Police + Military + Emergency Services + Transnational Corporations Personal Security National Security International Security Responsibility for action taken by • Cloud technologies • Drones • DropCams • NEST-style devices • eWallets, Apple Watch • Wearable technologies • FitBits • Lifelogging • Chip implants • Nanotech; e-tattoos • DNA – celluloid sample • OpenMaps • Open source • Open data • Mobile CCTV • Crowdsourcing • Social media • Activity monitoring • Auto-tagging • Drones • Sensor-based alert systems • Emergency warnings • Crowd-sourcing coordination platform • Autonomous drones • Pandemic response systems • ID management systems • DNA on a chip tech • Amplified humans • Uberveillance • Virus detect • Rapid health assessment • Autonomous data collection robots • Robot soldiers • Kill lists
  • 19.
  • 20.
  • 22. Policing Technology: from Dash Cams to Tool Cams to Body Cams
  • 23.
  • 24.
  • 26.
  • 27.
  • 29. Posting Evidence to Taser http://www.taser.com/products/on-officer-video/taser-cam
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41. The Uberveillace Trajectory The term uberveillance is in the Australian Macquarie Dictionary. Conceived by MG Michael in 2006. Not to be confused with Google’s Uber taxi, car pooling application.
  • 42.
  • 43.
  • 44.
  • 45. Resultant Effect of Too Much Technology
  • 46. The Struggle for Power • Who can record who? • Who can film who? • Who can gather evidence on another? • Who can access evidence on another? – Axis of access? • Living off the grid? • The incidence of “black spots” • Control from government hands to mega corporates in charge – Government attempts to mandate through regulation
  • 47. Toward an Evidence-Based Existence • Evidence-based everything – Retrospective use • What are the limits to “watching”? • Do we need tech to keep us in line? • Loss of context – Technology can lie • Loss of freedom • Playing to a theatre • Diversity diluted
  • 48. The Limitations of an Uberveillant Approach • Omniscience – having infinite awareness, understanding, and insight – possessed of universal or complete knowledge • Omnipresence – present in all places at all times • Ubiquity – presence everywhere or in many places especially simultaneously (omnipresence)
  • 49. The Star of David which by order of the Nazis, all Jews had to stitch onto the left hand side of their outer garment. Courtesy of the US Holocaust Memorial Museum. Learning from the Past

Hinweis der Redaktion

  1. Adapted from: http://www.pco-bcp.gc.ca/docs/images/NS-circle-450_e.jpg
  2. The United States is committed to “secure borders, open doors,” by welcoming and facilitating legitimate travel to the United States by international visitors while maintaining the integrity and security of our borders and our nation. The U.S. continues to work to ensure that access to our country is not impeded for legitimate international travelers. Legal Requirement In the Enhanced Border Security and Visa Entry Reform Act of 2002, the U.S. Congress mandated the use of biometrics in U.S. visas. This law requires that Embassies and Consulates abroad must issue to international visitors, "only machine-readable, tamper-resistant visas and other travel and entry documents that use biometric identifiers. Additionally, the Homeland Security Council decided that the U.S. standard for biometric screening is ten fingerprint scans collected at all U.S. embassies for visa applicants seeking to come to the United States. What is a Biometric? A biometric or biometric identifier is an objective measurement of a physical characteristic of an individual which, when captured in a database, can be used to verify the identity or check against other entries in the database. The best known biometric is the fingerprint, but others include facial recognition and iris scans. Making Us Safer – International Visitors The use of these identifiers is an important link in U.S. national security, because fingerprints taken will be compared with similarly collected fingerprints at US ports of entry under the US-VISIT program. This will verify identity to reduce use of stolen and counterfeit visas, and protect against possible use by terrorists or others who might represent a security risk to the U.S. These two important programs (collecting fingerprints for visa issuance and verifying travelers’ fingerprints when they enter the United States) will make travel to the U.S. safer for legitimate travelers, and also improve safety and national security for all Americans. This transition to ten prints will enable the Departments of State and Homeland Security to more effectively process visa applicant fingerprints. What This Means - Traveling to the U.S. For U.S. Visas the chosen biometric identifier method is a digital photo and electronic fingerprints. All fingers of a visa applicant are electronically scanned in a quick, inkless process during the consular officer's interview with the applicant. Travel without a Visa - Visa Waiver Program - Each traveler holding a valid passport from any of the Visa Waiver Program (VWP) countries, regardless of age or passport used, must present an individual machine-readable passport (MRP) in order to enter the United States without a visa. Depending on the date the traveler's passport was issued, other passport requirements apply. If a prospective traveler does not meet requirements to travel without a visa, he/she will need to apply for a U.S. visa, and cannot travel on VWP. See Visa Waiver Program for complete details. Additionally, all VWP travelers are required to have an approved Electronic System for Travel Authorization (ESTA) before traveling to the U.S. Admission into the U.S. - Select US-VISIT to learn more about the Department of Homeland Security US-VISIT program at U.S. ports of entry, which verifies the identity of the traveler using the electronic fingerprint data and digital photographs. Applicant Refusal to be Fingerprinted at Visa Interview A visa applicant who refuses to be fingerprinted would have his or her visa application denied on the basis that it is incomplete. However, an applicant who then later decided to provide fingerprints would have his or her visa application re-considered without prejudice. About the Information Collected The electronic data from the ten fingerprints is stored in a database and is made available at U.S. ports of entry to Department of Homeland Security immigration inspectors. The electronic fingerprint data is associated with an issued visa for verification and the privacy of the data is protected by storage in the database. The U.S. Department of State makes data available in accordance with the law governing the use of visa records, to U.S. law enforcement agencies that require the information for law enforcement purposes. Visa records are, by law, confidential. Requests for access to visa records by law enforcement are subject to statutory, regulatory and other legal restrictions. We Want You to Know Visa News Adoption Alerts Diversity Visa Visa Waiver Program (VWP) Iraqis & Afghans-SIV Business Visa Center Customer Service Statement to Visa Applicants Fraud Warning http://travel.state.gov/visa/immigrants/info/info_1336.html
  3. A combined paper and electronic passport that contains biometric information that can be used to authenticate the identity of travelers. It uses contactless smart card technology, including a microprocessor chip (computer chip) and antenna (for both power to the chip and communication) embedded in the front or back cover, or center page, of the passport. Document and chip characteristics are documented in the International Civil Aviation Organisation's (ICAO) Doc 9303.[1][2][3] The passport's critical information is both printed on the data page of the passport and stored in the chip.
  4. The chip embedded in the centre page stores the holder's digitised photograph, name, gender, date of birth, nationality, passport number, and the passport expiry date. This is exactly the same information that appears on the printed data page of the passport. The ePassport offers several important advantages. It: provides greater protection against fraudulent misuse and tampering reduces the risk of identity fraud, currently estimated to cost the Australian economy billions each year enhances the protection of Australia's border through speedy and secure verification of incoming Australian passport holders.
  5. THE SOPHIA ECHO The European Parliament's vote comes just ahead of an expected decision by the European Commission to allow EU member states to use body scanners at airports. The European Parliament will have the power to overturn that decision within three months. MEPs accepted that body scanners would enhance aviation security, but asked EU member states "to deploy technology which is the least harmful for human health" and addresses privacy concerns. Due to health risks "scanners using ionising radiation should be prohibited in the EU". No discrimination Selection for scanning should be random, without any discriminatory criteria, MEPs said, emphasising that "any form of profiling based on, for example, sex, race, colour, ethnicity, genetic features, language, religion or belief is unacceptable". Particular attention should be paid to the welfare of pregnant women, children, the elderly and the disabled, they said. Right to opt for alternative screening Passengers should have the right to refuse body scanning and opt for alternative screening methods that guarantee the same level of effectiveness while respecting their rights and dignity. "Such a refusal should not give rise to any suspicion of the passenger," MEPs said. The European Parliament also asked EU countries to supplement checkpoints and security staff, to ensure that passengers are not kept waiting. No body images, no storage To protect human dignity, privacy and intimacy, "only stick figures should be used" and "no body images may be produced," MEPs said. The data "must be destroyed right after the person has passed through the security control and may not be stored", and "the technology used must not have the capabilities to store or save data". Liquid ban should be lifted in 2013 The carry-on liquids ban must end in 2013, MEPs said, urging EU states and airports to "ensure that adequate technology is available in good time" so that this does not undermine security. Stricter checks on air cargo The resolution also called for better checks on air cargo, especially from non-EU countries, particularly when carried on passenger aircraft. Pointing out that "100 per cent scanning of cargo is not practicable," they asked the European Commission to lay down criteria for determining "high-risk" cargo. Financing aviation security Security charges should be transparent and only cover security costs. EU countries that impose more stringent measures should bear the resulting additional costs, according to the resolution, which also recommended that every passenger’s ticket should show the cost of security measures. MEPs called for mutual recognition of security measures and one-stop security checks, so that passengers, luggage and cargo at EU airports are screened only once. http://www.sofiaecho.com/2011/07/06/1118921_airport-body-scanners-european-parliament-demands-strict-safeguards
  6. http://www.theaustralian.com.au/travel/news/airline-passengers-stand-up-against-airport-security-pat-downs-and-body-scans/story-e6frg8ro-1225956435617 A SECURITY OFFICER DOES A PAT-DOWN SEARCH ON A PASSENGER AT DENVER INTERNATIONAL AIRPORT. PICTURE: AP AP AIRLINE PASSENGERS ARE THREATENING TO UNLEASH CHAOS AT AMERICAN AIRPORTS DURING THE BUSY THANKSGIVING PERIOD NEXT WEEK WITH A CAMPAIGN OF MASS DISOBEDIENCE AGAINST INCREASINGLY INVASIVE SECURITY PROCEDURES. TWO INTERNET CAMPAIGNS, ONE CALLING FOR A FLIGHT BOYCOTT ON THE EVE OF THANKSGIVING, THE OTHER URGING TRAVELLERS TO REFUSE FULL-BODY SCANS, HAVE SPRUNG UP IN PROTEST AT MEASURES SEEN AS HEAVY-HANDED FROM THE TRANSPORTATION SECURITY ADMINISTRATION. CIVIL LIBERTIES GROUPS ARE PURSUING SEVERAL LAWSUITS AGAINST BOTH THE USE OF SCANNERS AND THE INVASIVE PAT-DOWNS TRAVELLERS MUST SUBMIT TO IF THEY REFUSE TO GO THROUGH THE MACHINES. SINCE THE SEPTEMBER 11, 2001, ATTACKS, AIRLINE PASSENGERS HAVE BEEN SUBJECT TO AN EVER-INCREASING ARRAY OF CHECKS AND PROHIBITIONS. THEY HAVE RICHARD REID, THE SO-CALLED SHOE-BOMBER, TO THANK WHEN THEY ARE FORCED TO REMOVE THEIR FOOTWEAR. THE FOILED "LIQUID-BOMB" PLOT IS RESPONSIBLE FOR THE PROHIBITION OF ALL BUT THE SMALLEST QUANTITIES OF LIQUIDS, CREAMS AND GELS FROM HAND LUGGAGE. START OF SIDEBAR. SKIP TO END OF SIDEBAR. END OF SIDEBAR. RETURN TO START OF SIDEBAR. THE FULL-BODY SCANNER, BY CONTRAST, OWES ITS ROLLOUT NATIONWIDE TO THE CHRISTMAS DAY BOMBER WHO HID EXPLOSIVES NOT IN A GIFT PACKAGE BUT IN HIS UNDERPANTS. CHELSEY "SULLY" SULLENBERGER, THE PILOT WHO BECAME A NATIONAL HERO FOR LANDING HIS US AIRWAYS FLIGHT SAFELY IN THE HUDSON RIVER AFTER A COLLISION WITH A FLOCK OF GEESE, IS AMONG THOSE WHO REFUSE TO PASS THROUGH THE SCANNERS. HE SAYS THAT THEY EXPOSE CREW TO EXCESSIVE RADIATION, WHICH THEY ALREADY SUFFER FROM WHILE FLYING. MOST PASSENGERS OBJECT ON THE GROUNDS THAT THE "PORNO SCANNERS" ARE AN INVASION OF PRIVACY. THOSE WHO REFUSE TO COMPLY MUST SUBMIT TO AN "ENHANCED PAT-DOWN" SO THOROUGH THAT IT HAS LED TO BRAWLS AND ACCUSATIONS OF MOLESTATION. JOHN TYNER BECAME A HERO TO MILLIONS OF PASSENGERS WHEN HE WAS THROWN OUT OF SAN DIEGO AIRPORT AFTER THREATENING A SECURITY GUARD WITH THE WORDS: "YOU TOUCH MY JUNK AND I'LL HAVE YOU ARRESTED". PROTESTERS ORGANISING THE OPTOUTDAY.COM CAMPAIGN OVER THANKSGIVING ARE URGING PASSENGERS TO INSIST ON HAVING A PAT-DOWN, IN THE HOPE OF BRINGING AIRPORTS TO A STANDSTILL. ANOTHER CAMPAIGN, WEWONTFLY.COM, IS ASKING TRAVELLERS WHO ARE ABLE TO TAKE ALTERNATIVE TRANSPORT TO ESCHEW AIR TRAVEL ALTOGETHER.
  7. http://arstechnica.com/tech-policy/2012/03/boston-pays-170k-to-settle-cell-phone-recording-lawsuit/ Boston pays $170k to settle cell phone recording lawsuit The City of Boston will pay $170,000 after police wrongly arrested a man for … by Timothy B. Lee - Mar 28 2012, 1:55am AUSEDT 94 Photograph by Karen Blumberg The City of Boston has agreed to pay Simon Glik $170,000 in damages and legal fees to settle a civil rights lawsuit. Glik was arrested in 2007 on Boston Common for using his cell phone to record the arrest of another man. Police then arrested Glik, too, and charged him under the strict Massachusetts wiretapping statute. They eventually dropped the charges, but with the help of the Massachusetts ACLU, Glik filed a civil lawsuit against the city for false arrest. Last year, the United States Court of Appeals for the First Circuit unanimously ruled that Glik had a "clearly established" First Amendment right to record the actions of public officials on a public sidewalk. Boston finally admitted it had made a mistake earlier this year, and Boston taxpayers will now be paying for the screw-up. "The law had been clear for years that openly recording a video is not a crime," Glik said in a statement. "It's sad that it takes so much for police to learn the laws they were supposed to know in the first place. I hope Boston police officers will never again arrest someone for openly recording their public actions." Glik claims that officers in Boston's Internal Affairs Division made fun of him when he filed his original complaint with the police department; he says they suggested he'd be better off filing a civil lawsuit instead. They probably aren't laughing today. The Massachusetts ACLU says that the City of Boston has changed its practices since Glik filed his lawsuit. The city "developed a training video based on facts similar to the Glik case, instructing police officers not to arrest people who openly record what they are doing in public." An Massachusetts ACLU spokesman tells Ars that Glik himself will receive $50,000 of the money; the rest will go to cover the costs of his legal case. We've also sought a comment from the City of Boston and will update our story if they respond.
  8. The Wolfcom 3rd Eye is more than just a Body Camera. It is a Multi-Purpose, Multi-Functional, Indispensable Law Enforcement tool that will assist officers in their everyday duties. Whether it be a routine traffic stop, a domestic violence call, a criminal investigation, evidence gathering, a vehicle pursuit, or an officer involved shooting, the Wolfcom 3rd Eye will be with you every step of the way.
  9. http://www.taser.com/products/on-officer-video/taser-cam A picture is worth a thousand words, a Video is even better. The TASER CAM™ law enforcement video recorder offers increased accountability - not just for police officers, but for the people they arrest. Without video, it can be the officer's word against the suspect's word. Now with the TASER CAM recorder, every potential TASER X26 deployment can be documented with full audio and camera video. With our already proven AFID tracking system and dataport firing log download, TASER ECDs have pioneered the use of technology in accountability. Accountability works: agencies with TASER Officer Safety Programs reported decreases of up to 50% in citizen complaints. The TASER CAM police and law enforcement video system is an audio-video recording camera integrated into a rechargeable TASER X26 power supply that replaces the standard Digital Power Magazine (DPM) battery pack. The TASER CAM audio video recorder is activated any time the safety is in the off position "ARMED". This allows officers to capture vital audio and video information prior to, during, and after the potential deployment of an X26 ECD. Audio and video data is downloaded via a USB cable. The TASER CAM camera and recorder is an optional upgrade compatible with all X26 ECDs and provides another layer of accountability to support law enforcement officers' reports. Features Records MPEG-4 Video Records approximately 4.5 hours of audio and MPEG-4 video (black & white) at 15 frames per second in VGA format (640 x 480).   Improved Design The TASER CAM features improved design and increased robustness.   Rechargeable Power Supply Rechargeable power supply compatible with all X26 ECDs.   Visual Warning Central Information Display (CID) provides a warning if the camera lens is blocked.   USB Download/Recharge Unit comes complete with USB download cable and wall charger.   Storage Bay Storage bay for spare TASER cartridge.   Evidence Sync Free Evidence Sync software allows for easy download and review of videos.
  10. http://fusion.net/story/158292/fitbit-data-just-undermined-a-womans-rape-claim/
  11. Published on 30 Nov 2014 Microsoft's Silicon Valley campus has a new security team-- 300-pound robots equipped with high-def, omnidirectional video capture, thermal imaging, infrared, radar, and more are patrolling around. They're called K5 from a company called Knightscope, and they have an interesting strategy to deter crime-- will it work? Kim Horcher, Michele Morrow (Host, Spokesperson for http://donategames.org/), and special guest Claire Hummel (Production Designer - HBO) discuss!