This presentation was delivered by Katina Michael on 8 October 2015, as a keynote at the International Women in Law Enforcement Conference – Leadership, Collaboration & Security at SVP Police Academy, Hyderabad, India. More here: https://www.csu.edu.au/conference/policing
3. Examples of Security Contexts
Personal
Security
National
Security
International
Security
Responsibility for action taken by
Local/Provincial Police National/State Police International Police
• Crime/policing
• Economic security
• Health security
• Food security
• Building safety
• Workplace safety
• Organised crime
• Identity theft
• Natural disasters
• Emergencies
• Contamination:
• Food
• Water
• Domestic extremism
• Espionage
• CI attack
• CBRNE attack
• Transnational
organised crime
• Illegal entry
• Armed conflict
• Failing/failed
states
• Border security
• Aviation
security
• Marine security
• Cybersecurity
• Terrorism
• Global poverty
• Environmental
degradation
• Climate change
• Overpopulation
• Limited resources
4. Technology Responses to
Breaches in Security (AS-IS)
Personal
Security
National
Security
International
Security
Responsibility for action taken by
Local/Provincial Police National/State Police International Police
5. Technology Responses to
Breaches in Security (AS-IS)
Personal
Security
National
Security
International
Security
• Vehicle ID
• ANPR
• Biometric
schemes
• PATRIOT Act
• GPS logs
• Drones
• Passport
• E-passport
• VISA
• ESTA
• Full-body
scanners
• Health
scanners
• FISA Act
• NDNAD
• Driver’s license
• Bank card
• Health card
• Transport travel cards
• E-tags
• Workplace ID card
• Insurance
• Housing
• Health
• Vehicle
• Third-party
• National ID
• Telephony
• Internet
• Integrated
public number
database
• Dash cams
• Body-worn
video
• Meta-data
laws
• Schengen Convention
• Satellites
• SIRENE Database
• SIS + SIS II
• Prüm Treaty
• EUVIS
• EUCARIS
Responsibility for action taken by
Local/Provincial Police National/State Police International Police
6. Enhanced Border Security and Visa Entry
Reform Act of 2002
• “Secure borders, open
doors” policy
• A visa applicant who
refuses to be
fingerprinted would
have his or her visa
application denied on
the basis that it is
incomplete.
7. Take-up of Biometric Passports
• A combined paper and electronic passport that contains
biometric information that can be used to authenticate
the identity of travelers.
8. The Australian ePassport
• The chip embedded in the centre page stores the holder's digitised
photograph, name, gender, date of birth, nationality, passport
number, and the passport expiry date.
11. European Parliament Vote 6/07/11
• Deploy technology which
is the least harmful for
human health and
addresses privacy
concerns.
• Due to health risks
scanners using ionising
radiation should be
prohibited in the EU
• Right to opt for alternative
screening
17. Technology Responses to
Breaches in Security (TO-BE)
Companies + Police + Military + Emergency Services + Transnational Corporations
Personal
Security
National
Security
International
Security
Responsibility for action taken by
18. Technology Responses to
Breaches in Security (TO-BE)
Companies + Police + Military + Emergency Services + Transnational Corporations
Personal
Security
National
Security
International
Security
Responsibility for action taken by
• Cloud technologies
• Drones
• DropCams
• NEST-style devices
• eWallets, Apple Watch
• Wearable technologies
• FitBits
• Lifelogging
• Chip implants
• Nanotech; e-tattoos
• DNA – celluloid sample
• OpenMaps
• Open source
• Open data
• Mobile CCTV
• Crowdsourcing
• Social media
• Activity
monitoring
• Auto-tagging
• Drones
• Sensor-based
alert systems
• Emergency
warnings
• Crowd-sourcing
coordination platform
• Autonomous drones
• Pandemic response systems
• ID management systems
• DNA on a chip tech
• Amplified humans
• Uberveillance
• Virus detect
• Rapid health
assessment
• Autonomous
data
collection
robots
• Robot
soldiers
• Kill lists
29. Posting Evidence to Taser
http://www.taser.com/products/on-officer-video/taser-cam
30.
31.
32.
33.
34.
35.
36.
37.
38.
39.
40.
41. The Uberveillace Trajectory
The term uberveillance is in the Australian Macquarie Dictionary. Conceived by MG
Michael in 2006. Not to be confused with Google’s Uber taxi, car pooling application.
46. The Struggle for Power
• Who can record who?
• Who can film who?
• Who can gather evidence on another?
• Who can access evidence on another?
– Axis of access?
• Living off the grid?
• The incidence of “black spots”
• Control from government hands to mega
corporates in charge
– Government attempts to mandate through regulation
47. Toward an Evidence-Based Existence
• Evidence-based everything
– Retrospective use
• What are the limits to
“watching”?
• Do we need tech to keep us
in line?
• Loss of context
– Technology can lie
• Loss of freedom
• Playing to a theatre
• Diversity diluted
48. The Limitations of an
Uberveillant Approach
• Omniscience
– having infinite awareness, understanding, and insight
– possessed of universal or complete knowledge
• Omnipresence
– present in all places at all times
• Ubiquity
– presence everywhere or in many places especially
simultaneously (omnipresence)
49. The Star of David which by order of the Nazis, all Jews had to stitch onto the left hand
side of their outer garment. Courtesy of the US Holocaust Memorial Museum.
Learning from the Past
The United States is committed to “secure borders, open doors,” by welcoming and facilitating legitimate travel to the United States by international visitors while maintaining the integrity and security of our borders and our nation. The U.S. continues to work to ensure that access to our country is not impeded for legitimate international travelers.
Legal Requirement
In the Enhanced Border Security and Visa Entry Reform Act of 2002, the U.S. Congress mandated the use of biometrics in U.S. visas. This law requires that Embassies and Consulates abroad must issue to international visitors, "only machine-readable, tamper-resistant visas and other travel and entry documents that use biometric identifiers. Additionally, the Homeland Security Council decided that the U.S. standard for biometric screening is ten fingerprint scans collected at all U.S. embassies for visa applicants seeking to come to the United States.
What is a Biometric?
A biometric or biometric identifier is an objective measurement of a physical characteristic of an individual which, when captured in a database, can be used to verify the identity or check against other entries in the database. The best known biometric is the fingerprint, but others include facial recognition and iris scans.
Making Us Safer – International Visitors
The use of these identifiers is an important link in U.S. national security, because fingerprints taken will be compared with similarly collected fingerprints at US ports of entry under the US-VISIT program. This will verify identity to reduce use of stolen and counterfeit visas, and protect against possible use by terrorists or others who might represent a security risk to the U.S. These two important programs (collecting fingerprints for visa issuance and verifying travelers’ fingerprints when they enter the United States) will make travel to the U.S. safer for legitimate travelers, and also improve safety and national security for all Americans. This transition to ten prints will enable the Departments of State and Homeland Security to more effectively process visa applicant fingerprints.
What This Means - Traveling to the U.S.
For U.S. Visas the chosen biometric identifier method is a digital photo and electronic fingerprints. All fingers of a visa applicant are electronically scanned in a quick, inkless process during the consular officer's interview with the applicant.
Travel without a Visa - Visa Waiver Program - Each traveler holding a valid passport from any of the Visa Waiver Program (VWP) countries, regardless of age or passport used, must present an individual machine-readable passport (MRP) in order to enter the United States without a visa. Depending on the date the traveler's passport was issued, other passport requirements apply. If a prospective traveler does not meet requirements to travel without a visa, he/she will need to apply for a U.S. visa, and cannot travel on VWP. See Visa Waiver Program for complete details. Additionally, all VWP travelers are required to have an approved Electronic System for Travel Authorization (ESTA) before traveling to the U.S.
Admission into the U.S. - Select US-VISIT to learn more about the Department of Homeland Security US-VISIT program at U.S. ports of entry, which verifies the identity of the traveler using the electronic fingerprint data and digital photographs.
Applicant Refusal to be Fingerprinted at Visa Interview
A visa applicant who refuses to be fingerprinted would have his or her visa application denied on the basis that it is incomplete. However, an applicant who then later decided to provide fingerprints would have his or her visa application re-considered without prejudice.
About the Information Collected
The electronic data from the ten fingerprints is stored in a database and is made available at U.S. ports of entry to Department of Homeland Security immigration inspectors. The electronic fingerprint data is associated with an issued visa for verification and the privacy of the data is protected by storage in the database.
The U.S. Department of State makes data available in accordance with the law governing the use of visa records, to U.S. law enforcement agencies that require the information for law enforcement purposes. Visa records are, by law, confidential. Requests for access to visa records by law enforcement are subject to statutory, regulatory and other legal restrictions.
We Want You to Know
Visa News
Adoption Alerts
Diversity Visa
Visa Waiver Program (VWP)
Iraqis & Afghans-SIV
Business Visa Center
Customer Service Statement to Visa Applicants
Fraud Warning
http://travel.state.gov/visa/immigrants/info/info_1336.html
A combined paper and electronic passport that contains biometric information that can be used to authenticate the identity of travelers. It uses contactless smart card technology, including a microprocessor chip (computer chip) and antenna (for both power to the chip and communication) embedded in the front or back cover, or center page, of the passport. Document and chip characteristics are documented in the International Civil Aviation Organisation's (ICAO) Doc 9303.[1][2][3] The passport's critical information is both printed on the data page of the passport and stored in the chip.
The chip embedded in the centre page stores the holder's digitised photograph, name, gender, date of birth, nationality, passport number, and the passport expiry date. This is exactly the same information that appears on the printed data page of the passport.
The ePassport offers several important advantages. It:
provides greater protection against fraudulent misuse and tampering
reduces the risk of identity fraud, currently estimated to cost the Australian economy billions each year
enhances the protection of Australia's border through speedy and secure verification of incoming Australian passport holders.
THE SOPHIA ECHO
The European Parliament's vote comes just ahead of an expected decision by the European Commission to allow EU member states to use body scanners at airports. The European Parliament will have the power to overturn that decision within three months.MEPs accepted that body scanners would enhance aviation security, but asked EU member states "to deploy technology which is the least harmful for human health" and addresses privacy concerns.Due to health risks "scanners using ionising radiation should be prohibited in the EU".No discriminationSelection for scanning should be random, without any discriminatory criteria, MEPs said, emphasising that "any form of profiling based on, for example, sex, race, colour, ethnicity, genetic features, language, religion or belief is unacceptable".Particular attention should be paid to the welfare of pregnant women, children, the elderly and the disabled, they said.Right to opt for alternative screeningPassengers should have the right to refuse body scanning and opt for alternative screening methods that guarantee the same level of effectiveness while respecting their rights and dignity."Such a refusal should not give rise to any suspicion of the passenger," MEPs said.The European Parliament also asked EU countries to supplement checkpoints and security staff, to ensure that passengers are not kept waiting.No body images, no storageTo protect human dignity, privacy and intimacy, "only stick figures should be used" and "no body images may be produced," MEPs said.The data "must be destroyed right after the person has passed through the security control and may not be stored", and "the technology used must not have the capabilities to store or save data".Liquid ban should be lifted in 2013The carry-on liquids ban must end in 2013, MEPs said, urging EU states and airports to "ensure that adequate technology is available in good time" so that this does not undermine security.Stricter checks on air cargoThe resolution also called for better checks on air cargo, especially from non-EU countries, particularly when carried on passenger aircraft.Pointing out that "100 per cent scanning of cargo is not practicable," they asked the European Commission to lay down criteria for determining "high-risk" cargo.Financing aviation securitySecurity charges should be transparent and only cover security costs.EU countries that impose more stringent measures should bear the resulting additional costs, according to the resolution, which also recommended that every passenger’s ticket should show the cost of security measures.MEPs called for mutual recognition of security measures and one-stop security checks, so that passengers, luggage and cargo at EU airports are screened only once.
http://www.sofiaecho.com/2011/07/06/1118921_airport-body-scanners-european-parliament-demands-strict-safeguards
http://www.theaustralian.com.au/travel/news/airline-passengers-stand-up-against-airport-security-pat-downs-and-body-scans/story-e6frg8ro-1225956435617
A SECURITY OFFICER DOES A PAT-DOWN SEARCH ON A PASSENGER AT DENVER INTERNATIONAL AIRPORT. PICTURE: AP AP
AIRLINE PASSENGERS ARE THREATENING TO UNLEASH CHAOS AT AMERICAN AIRPORTS DURING THE BUSY THANKSGIVING PERIOD NEXT WEEK WITH A CAMPAIGN OF MASS DISOBEDIENCE AGAINST INCREASINGLY INVASIVE SECURITY PROCEDURES.
TWO INTERNET CAMPAIGNS, ONE CALLING FOR A FLIGHT BOYCOTT ON THE EVE OF THANKSGIVING, THE OTHER URGING TRAVELLERS TO REFUSE FULL-BODY SCANS, HAVE SPRUNG UP IN PROTEST AT MEASURES SEEN AS HEAVY-HANDED FROM THE TRANSPORTATION SECURITY ADMINISTRATION.
CIVIL LIBERTIES GROUPS ARE PURSUING SEVERAL LAWSUITS AGAINST BOTH THE USE OF SCANNERS AND THE INVASIVE PAT-DOWNS TRAVELLERS MUST SUBMIT TO IF THEY REFUSE TO GO THROUGH THE MACHINES.
SINCE THE SEPTEMBER 11, 2001, ATTACKS, AIRLINE PASSENGERS HAVE BEEN SUBJECT TO AN EVER-INCREASING ARRAY OF CHECKS AND PROHIBITIONS.
THEY HAVE RICHARD REID, THE SO-CALLED SHOE-BOMBER, TO THANK WHEN THEY ARE FORCED TO REMOVE THEIR FOOTWEAR. THE FOILED "LIQUID-BOMB" PLOT IS RESPONSIBLE FOR THE PROHIBITION OF ALL BUT THE SMALLEST QUANTITIES OF LIQUIDS, CREAMS AND GELS FROM HAND LUGGAGE.
START OF SIDEBAR. SKIP TO END OF SIDEBAR.
END OF SIDEBAR. RETURN TO START OF SIDEBAR.
THE FULL-BODY SCANNER, BY CONTRAST, OWES ITS ROLLOUT NATIONWIDE TO THE CHRISTMAS DAY BOMBER WHO HID EXPLOSIVES NOT IN A GIFT PACKAGE BUT IN HIS UNDERPANTS.
CHELSEY "SULLY" SULLENBERGER, THE PILOT WHO BECAME A NATIONAL HERO FOR LANDING HIS US AIRWAYS FLIGHT SAFELY IN THE HUDSON RIVER AFTER A COLLISION WITH A FLOCK OF GEESE, IS AMONG THOSE WHO REFUSE TO PASS THROUGH THE SCANNERS. HE SAYS THAT THEY EXPOSE CREW TO EXCESSIVE RADIATION, WHICH THEY ALREADY SUFFER FROM WHILE FLYING. MOST PASSENGERS OBJECT ON THE GROUNDS THAT THE "PORNO SCANNERS" ARE AN INVASION OF PRIVACY.
THOSE WHO REFUSE TO COMPLY MUST SUBMIT TO AN "ENHANCED PAT-DOWN" SO THOROUGH THAT IT HAS LED TO BRAWLS AND ACCUSATIONS OF MOLESTATION. JOHN TYNER BECAME A HERO TO MILLIONS OF PASSENGERS WHEN HE WAS THROWN OUT OF SAN DIEGO AIRPORT AFTER THREATENING A SECURITY GUARD WITH THE WORDS: "YOU TOUCH MY JUNK AND I'LL HAVE YOU ARRESTED".
PROTESTERS ORGANISING THE OPTOUTDAY.COM CAMPAIGN OVER THANKSGIVING ARE URGING PASSENGERS TO INSIST ON HAVING A PAT-DOWN, IN THE HOPE OF BRINGING AIRPORTS TO A STANDSTILL. ANOTHER CAMPAIGN, WEWONTFLY.COM, IS ASKING TRAVELLERS WHO ARE ABLE TO TAKE ALTERNATIVE TRANSPORT TO ESCHEW AIR TRAVEL ALTOGETHER.
http://arstechnica.com/tech-policy/2012/03/boston-pays-170k-to-settle-cell-phone-recording-lawsuit/
Boston pays $170k to settle cell phone recording lawsuit
The City of Boston will pay $170,000 after police wrongly arrested a man for …
by Timothy B. Lee - Mar 28 2012, 1:55am AUSEDT
94
Photograph by Karen Blumberg
The City of Boston has agreed to pay Simon Glik $170,000 in damages and legal fees to settle a civil rights lawsuit. Glik was arrested in 2007 on Boston Common for using his cell phone to record the arrest of another man. Police then arrested Glik, too, and charged him under the strict Massachusetts wiretapping statute. They eventually dropped the charges, but with the help of the Massachusetts ACLU, Glik filed a civil lawsuit against the city for false arrest.
Last year, the United States Court of Appeals for the First Circuit unanimously ruled that Glik had a "clearly established" First Amendment right to record the actions of public officials on a public sidewalk. Boston finally admitted it had made a mistake earlier this year, and Boston taxpayers will now be paying for the screw-up.
"The law had been clear for years that openly recording a video is not a crime," Glik said in a statement. "It's sad that it takes so much for police to learn the laws they were supposed to know in the first place. I hope Boston police officers will never again arrest someone for openly recording their public actions."
Glik claims that officers in Boston's Internal Affairs Division made fun of him when he filed his original complaint with the police department; he says they suggested he'd be better off filing a civil lawsuit instead. They probably aren't laughing today.
The Massachusetts ACLU says that the City of Boston has changed its practices since Glik filed his lawsuit. The city "developed a training video based on facts similar to the Glik case, instructing police officers not to arrest people who openly record what they are doing in public."
An Massachusetts ACLU spokesman tells Ars that Glik himself will receive $50,000 of the money; the rest will go to cover the costs of his legal case.
We've also sought a comment from the City of Boston and will update our story if they respond.
The Wolfcom 3rd Eye is more than just a Body Camera. It is a Multi-Purpose, Multi-Functional, Indispensable Law Enforcement tool that will assist officers in their everyday duties. Whether it be a routine traffic stop, a domestic violence call, a criminal investigation, evidence gathering, a vehicle pursuit, or an officer involved shooting, the Wolfcom 3rd Eye will be with you every step of the way.
http://www.taser.com/products/on-officer-video/taser-cam
A picture is worth a thousand words, a Video is even better.
The TASER CAM™ law enforcement video recorder offers increased accountability - not just for police officers, but for the people they arrest. Without video, it can be the officer's word against the suspect's word. Now with the TASER CAM recorder, every potential TASER X26 deployment can be documented with full audio and camera video.
With our already proven AFID tracking system and dataport firing log download, TASER ECDs have pioneered the use of technology in accountability. Accountability works: agencies with TASER Officer Safety Programs reported decreases of up to 50% in citizen complaints.
The TASER CAM police and law enforcement video system is an audio-video recording camera integrated into a rechargeable TASER X26 power supply that replaces the standard Digital Power Magazine (DPM) battery pack. The TASER CAM audio video recorder is activated any time the safety is in the off position "ARMED". This allows officers to capture vital audio and video information prior to, during, and after the potential deployment of an X26 ECD.
Audio and video data is downloaded via a USB cable. The TASER CAM camera and recorder is an optional upgrade compatible with all X26 ECDs and provides another layer of accountability to support law enforcement officers' reports.
Features
Records MPEG-4 Video
Records approximately 4.5 hours of audio and MPEG-4 video (black & white) at 15 frames per second in VGA format (640 x 480).
Improved Design
The TASER CAM features improved design and increased robustness.
Rechargeable Power Supply
Rechargeable power supply compatible with all X26 ECDs.
Visual Warning
Central Information Display (CID) provides a warning if the camera lens is blocked.
USB Download/Recharge
Unit comes complete with USB download cable and wall charger.
Storage Bay
Storage bay for spare TASER cartridge.
Evidence Sync
Free Evidence Sync software allows for easy download and review of videos.
Published on 30 Nov 2014
Microsoft's Silicon Valley campus has a new security team-- 300-pound robots equipped with high-def, omnidirectional video capture, thermal imaging, infrared, radar, and more are patrolling around. They're called K5 from a company called Knightscope, and they have an interesting strategy to deter crime-- will it work? Kim Horcher, Michele Morrow (Host, Spokesperson for http://donategames.org/), and special guest Claire Hummel (Production Designer - HBO) discuss!