Panasonic SD5 cameras: has video motion detection (can be configured to detect and track intruders, and also detect left or removed objects) – http://www.prosecurityzone.com/Customisation/News/Surveillance/IP_and_Megapixel_cameras/SD5_technology_cameras_available_from_Norbain.asp
Panasonic IP Cameras - http://catalog2.panasonic.com/webapp/wcs/stores/servlet/ModelDetail?displayTab=O&storeId=11201&catalogId=13051&itemId=373000&catGroupId=14471&surfModel=WV-NW502S; http://catalog2.panasonic.com/webapp/wcs/stores/servlet/ModelDetail?displayTab=O&storeId=11201&catalogId=13051&itemId=360500&catGroupId=14471&surfModel=WV-NP502
ONSSI Ocularis: IP Video Management System, incorporating BriefCam24 search and review analytics, enabling – http://www.onssi.com/ocularis.html
Vista Bullet Camera VBC520: Discrete IP camera – http://www.vista-cctv.com/news/ref:N4AC47CCD37F0D/
Copper Eye IPRS: IP Camera data retention and retrieval system – http://www.coppereye.com/news_press/pressreleases/?id=46
Napco iSee Video: Products enabling remote viewing of CCTV camera feeds over internet connections, including “live video on the Apple iPhone, and...live Motion JPG images on any web enabled cell phone”. Latest addition “Single Channel Gateway” extends this ability to analogue camera feeds – http://www.napcosecurity.com/video.html
Samsung Techwin SDC-435: Day and Night camera – http://www.samsungtechwin.com/prd/pro_view.asp?pro_uid=4682&cat_uid=14&cat_biz=CTV&cat_lev=AA
Vista SmartDisc: IP camera recording and alarm transmission system - http://www.vista-cctv.com/news/ref:N4AE01F49D923B/
Axis M3203 Network Camera – Fixed Dome Cameras http://www.axis.com/products/cam_m3203/index.htm
Axis P3304 Network Camera – HDTV Fixed Dome Cameras http://www.axis.com/products/cam_p3304/
SUI Goodrich’s SU320KTX – Infrared camera, publicised as suitable for covert surveillance http://www.sensorsinc.com/downloads/SU320KTX.pdf
SUI Goodrich’s SU640KTSX – Infrared camera, publicised as suitable for covert surveillance http://www.sensorsinc.com/downloads/SU640KTSX.pdf
IQeye’ Minidome – IP Dome camera http://www.iqeye.com/component/content/article/120.html?lang=en
Texas Instrument’s DMVA1 – IP Camera with built in video analytics http://focus.ti.com/apps/docs/mrktgenpage.tsp?contentId=41246&appId=79
Behavioural Recognition Systems’ AIsight 2.1 – Video analytics system that derives models of ‘abnormal behaviour’ on the basis of previous footage, ‘learning’ as it goes http://www.brslabs.com/files/pdf/AISight_2%201_Final.pdf
Vista CCTV VBC500 – long range bullet camera with in built infra red illuminators for night vision http://www.vista-cctv.com/go.php?structureID=S45C8A2209666D&ref=I4BAB37EA36149
SightLogix Sightsensor Camera – Built in GPS based analytics and night vision http://www.sightlogix.com/visible-sightsensor.html
Audio Surveillance
Range of bugs using GSM, UHF and VHF technology disguised as clocks, plugs etc. e.g. http://www.spycatcheronline.co.uk/spy-phones-c-52.html?spyid=7f03f93e6286532489e51fbcf141f859
Scanners
L3 Provision ATD – Active millimeter wave- full body scanner adapted to output a non individualized person image (‘cookie cutter’ image) and highlights areas of concern on it. Feature also available as an upgrade to the previous scanner. http://www.sds.l-3com.com/products/advancedimagingtech.htm
Qinetic SPO-20 – Passive millimeter wave scanner that claims to automate detection of threats in high traffic areas at a distance of up to 20 metres. Does not rely on image screening, instead raises the alert via a red light/green light. Detects a range of threats, including liquids. http://www.qinetiq.com/home/products/spo_20.html
Link Microtek’s Emili+1 - Identifies whether liquid held in plastic container is ‘aqueous’, ‘inflammable’ or ‘corrosive’. http://www.linkmicrotek.com/pdfs/Emili%20data%20sheet%20DS280909.pdf
Brijot Gen 2 – Passive Millimetre wave full body scanner. Claims to be only checkpoint system in industry not to emit radiation or energy at subject during the screening process.25 Image outputted of subject’s body is not very detailed (brochure claims you would not be able to tell if subject was male or female). Saves all information by time and date and takes snapshot of the subject. http://www.brijot.com/assets/pdf/products/SafeScreen.pdf
Millimetre Wave technology Body Scanners for catching people smuggling e.g. weapons. For use at airports. http://www.smithsdetection.com/eng/threat_people_screening.php
Body Orifice Security Scanner (Boss). A chair which will search the subject’s body cavities while they are fully clothed. For use in prisons. http://www.bodyorificescanner.com/
Narcotics/explosives trace detector. Will pick up traces of TNT, C4, RDX, PETN, Semtex, Detasheet, TATP and Urea Nitrate and Heroin, Cocaine, Amphetamine, Methamphetamine, MDA, THC, LSD and Ecstasy with other substances available on request. http://www.scenttech.com/index.aspx?id=3334
Walk through narcotics/explosives detector http://www.smithsdetection.com/eng/Sentinel.php
American Science and Engineering Z Backscatter X-ray scanners - http://www.as-e.com/products_solutions/z_backscatter.asp
Rapiscan Secure 1000: Back Scatter X Ray Body Scanner – http://rapiscansystems.com/rapiscan-secure-1000.html.26
Universal Detection Technology TS 10 5: Handheld device to test sample for presence of anthrax, ricin toxin, botulinum, Y. pestis and staphylococcal – http://www.udetection.com/productDetail.asp?ProdID=38
OD Security Soter RS Body Scanners – X Ray Full Body Scanner http://www.odsecurity.com.web06.intention.nl/downloads/soter%20rs%20brochure%202008July.pdf.27
L-3’s ProVision – Millimetre Wave Full Body Scanner http://www.dsxray.com/products/mmwave.htm
ASE’s Z-Backscatter Van Mobile Screening System now being used by the Bulgarian Customs agency http://prosecurityzone.com/Customisation/News/Detection/X-Ray_Detection/Mobile_X-Ray_Inspection_System_For_Bulgarias_Border_Control.asp
Morpho Detection’s System of Systems – Luggage X Ray scanner and explosives detection http://www.morphodetection.com/products-services/xrd-explosives-detection/system-of-systems/.28
Smiths Detection’s Bio-Act – ‘Confirmation technology’ for detecting the presence of ‘chemicals, bacteria and bacterial spores, bio-toxins and viruses’ http://www.smithsdetection.com/media/SD_Bio-ACT_Flyer_web.pdf
Elsagna’s MPH-900 – Automatic licence plate recognition, works from a stationary location or while mobile and cross references against an onboard ‘hotlist’. Can record 100s of plates a minute and keeps record of image and GPS coordinates of every plate scanned for future reference. Soon to be incorporating i2 analytic capabilities, combining numberplate info with other sources of information.29http://www.elsagna.com/mph_900_applications.htm
Will send information on what number has been called/texted
Will send a copy of the text
Enables you to ‘phone in’ and listen to the call
Enables you to phone in and listen in to whatever the microphone can pick up, effectively turning the phone into a bug http://www.spycatcheronline.co.uk/interceptor-software-with-nokia-phone-list-included-p-746.html
Range of Mobile Phone Tracking Services http://www.mobilelocate.co.uk/, http://www.google.co.uk/latitude/intro.html
Storacall Voistore Systems: Makes recording of all mobile phone calls made on device and can store them on a central server – http://www.storacall.co.uk/svs_voistore.htm
ASC InspirationPro 9.0 and EvoIP 9.0: Voice over Internet Protocol products. InspirationPro provides analysis of recorded call data and screen activities. EvoIP captures telephone calls from the network and enables storage, playback and archiving of the entire interaction. http://www.asctelecom.com/download/presse/ASC_Gitex_INSPIRATIONpro_EVOip_9_0.pdf
Computer Monitoring
Key logging equipment: easily installed, keeps a record of the input into a computer http://www.spycatcheronline.co.uk/type-logger-p-585.html
Device for recovering deleted texts from mobile phones http://www.eyetek.co.uk/section/0/deleted-text-spy
Guidance Software’s Encase Portable Version 2 – USB device which enables searching of computers by keyword and hash value, and viewing of all images stored http://www.guidancesoftware.com/popup.aspx?B=Content&id=2908&terms=usb+encase+portable
Mykonos Security Appliance – counter hacking tool that claims to enable real time monitoring, profiling and countermeasures against computer hackers: “Information within the profile includes the location of the hacker, the environment of the attacking computer and details the activities the hacker is employing” http://www.mykonossoftware.com/appliance.php
Genetec’s Unified Security Platform – Integrates IP CCTV cameras, access control and automatic numberplate recognition systems http://www.genetec.com/English/Products/Pages/security-center-unified-security-platform.aspx
Databases and Datamining
Vodafone Bespoke Service for South Yorkshire Police: Mobile access (via Blackberry) to Criminal Records Database: http://www.vodafone.com/start/media_relations/news/local_press_releases/uk_press_releases/2007/south_yorkshire_police.html
CEM Systems S3020f Portable Fingerprint Reader – handheld device for fingerprint and card reading. Carries up to 100,000 card and biometric records in its onboard database and can store around 8,000 offline card swipe transactions for on-line transmission to the AC2000 system via built-in 802.11g WiFi connection. http://www.cemsys.com/product.php?id=47
i2 iBase – Database application enabling the capture, management of data and the dissemination of actionable intelligence http://www.i2group.com/products/analysis-suite/ibase
http://www.backgroundchecks.com online resource for general identification information (such as address, occupation etc.) and also checking criminal records, driving records and whether someone is a registered sex offender. It alternatively offers the ability to keep your own records clean.
Biometrics
CEM Systems S3020f Portable Fingerprint Reader – handheld device for fingerprint and card reading. Carries up to 100,000 card and biometric records in its onboard database and can store around 8,000 offline card swipe transactions for on-line transmission to the AC2000 system via built-in 802.11g WiFi connection. http://www.cemsys.com/product.php?id=47
Cem Systems AC2000 Lite System Controller – Intelligent Network device for access control. http://www.cemsys.com/product.php?id=37
Validity Fingerprint Sensors – For controlling access to laptops http://www.validityinc.com/product.aspx?id=131
Neurotechnology’s Verilook – Face recognition technology. http://www.neurotechnology.com/vl_sdk.html
10 finger and palm print Livescan systems - digitises finger/palm print for cross referencing with central (FBI) databases http://www.crossmatch.com/10print_live_scanners.html
Mobile Finger Scanners http://www.crossmatch.com/mobile_finger_scanners.html
Enrolls, identify and verify detainees, suspects and perpetrators. Matches fingerprints captured at terrorist crime scenes against terrorist and criminal watch databases http://www.crossmatch.com/jump_kits_Guardian_R.html
Software for fingerprints from multiple systems. Centralises Electronic Fingerprint Transmission records for transmission to a receiving agency (for example law enforcement) http://www.crossmatch.com/store_forward_solution.html
Cognitec FaceVACS-DBScan matches photographs to images from trusted databases of images - http://www.cognitec-systems.de/FaceVACS-DBScan.21.0.html?&L=0
Cognitec FaceVACS-VideoScan compares faces in video streams to “possible ‘watch-list’ matches” - http://www.cognitec-systems.de/FaceVACS-VideoScan.20.0.html?&L=0
Cognitec FaceVACS-Sentry compares face on video feed with prior photographs - http://www.cognitec-systems.de/FaceVACS-Sentry.14.0.html?&L=0
Crossmatch Lookout Matcher: Facial recognition software that compares inputted images to a database or “watchlist” for potential matches - http://www.crossmatch.com/LookoutMatcher.html
Crossmatch Lookout Collecter: A combined digital video recorder and facial collection software locate and extract facial images from video footage for automated identification and verification. Available as a standalone unit or can be networked to Lookout Matcher – http://www.crossmatch.com/LookoutCollector.html
Cogent Systems Mobile Ident III: Multi-biometric handheld fingerprint identification device for “remote subject identification, disaster scene management, ID document authentication, traffic citation, etc” – http://www.cogentsystems.com/MobileIdentIII.asp
Crossmatch Be.U Mobile: Range of handheld fingerprint and smartcard readers. The Be.U SMC-800MC3 ePassport reads RFID chips –http://crossmatch.com/BeU_Mobile.html
L1 Identity Solution’s 4G FingerVein Reader – Biometric identity recognition on the basis of veins in the fingers http://www.l1id.com/pages/735-4g-finger-vein-reader
AOptix Insight – Iris scanner that works at a distance of 2 metres http://www.aoptix.com/biometrics.html
Megamatcher Accelerator 2.0 – Fingerprint matching system http://www.neurotechnology.com/download/MegaMatcher_Accelerator_Brochure_2010-04-07.pdf
Security Systems Technology’s Time and Attendence Solutions – Record time and attendance, enabling people to ‘clock in’ by scanning a palm print http://www.sstgroup.co.uk/go/products/time-and-attendance/time-and-attendance-solutions
Cogent’s Automatic Fingerprint Identification System – range of fingerprint and palm print identification systems including CAPFIS explicitly designed for police forces http://www.cogentsystems.com/downloads/CAFIS_60_EN_sm.pdf; http://www.cogentsystems.com/downloads/CAFIS_EN_sm.pdf; http://www.cogentsystems.com/downloads/CAPFIS_Prime.pdf.33
Cross Match’s Mobile Rapid ID – mobile fingerprint identification system http://www.crossmatch.com/mobile-rapid-id.php34
Telos’s Mobileassure Access Control – Biometric access control system. Optional add-ons include vehicle tracking http://images.telos.com/files/external//MobileAssure_Access_Control.pdf
AuthenTec Biometric Fingerprint Authentification Device – Range of fingerprint scanners enabling access control for mobile device http://www.authentec.com/products-wireless.cfm35
Persay’s Vocal Password – Voice biometric identification system. Claims to be language and accent independent http://www.persay.com/vocal-password.asp?round=1 Security services provider G4S are planning to use it for “electronic monitoring projects around the world”36
Tables of Relative Moral Risks
Intrusion
Intrusion into ‘Home Spaces’
Intrusion into Bodily Privacy
Intrusion into Private Life
Is information accessible to further people?
CCTV in public places
Only problematic if cameras overlook windows into people’s homes, or other ‘home spaces’.
Otherwise the use of CCTV in public is only mildly intrusive.
Only problematic if cameras overlook windows into people’s homes or other ‘home spaces’. Otherwise does not invade bodily privacy.
Smart cameras with video analytics create the possibility of revealing intimate details of private life.
Otherwise information is too disparate to constitute a threat.
An additional source of intrusion only if, through the use of video analytics, revealing details of private life are made available to others, or if information from a ‘home space’ is acquired and transmitted.37
Full Body Scanners
Since these are used in explicitly ‘public’ places such as airports there is no intrusion of a ‘home space’.
Very intrusive into bodily privacy if an image of the naked body is produced. Much less intrusive if the process is automated, with no need for a viewer to look at an image of the subject’s actual body.
If detailed image is produced this may reveal some intimate details of private life – embarrassing medical conditions or surgery for example.
This is avoided if the process is automated, revealing only strictly relevant information.
Would be very intrusive for an intimate visual image to be available to others.
Much less intrusive if no image is recorded, as is the case with many scanners.
Substance Detectors
Since these are used in explicitly ‘public’ places such as airports there is no intrusion of a ‘home space’.
If these involve scanning of the human body this constitutes an intrusion, but, as the information acquired is not personal in any way the intrusion is mild.
Does not penetrate sphere of private life
Even if information is available more widely, as the information is not personal, this is not intrusive.
Covert Cameras
Very intrusive when used in homes and ‘home spaces’.
When used in home spaces this is likely to result in great bodily intrusion.
Less revealing of the details of private life than bugging, but still very intrusive.
More intrusive still if information is accessible to a wider audience.
Less intrusive the more restricted this further audience is.
Bugging
Though less intrusive into bodily privacy than covert cameras, but the intrusiveness of others hearing sounds of bodily function mean this is still an issue.
Very intrusive into the most intimate details of private life.
Phone Monitoring
Listening in to some calls made in private may be considered to invade the sphere of the home.
May intrude into private life is enough information is aggregated.
More intrusive the more people who have access.
Location tracking
Does not reveal details of activity in home.
Does not intrude into bodily privacy.
May reveal details of private life – how one chooses to spend one’s leisure time or who one chooses to associate with.
If details of private life become accessible to a wider audience this worsens the intrusion.
Internet Monitoring
For a person who spends much of their home life interacting on the internet, detailed monitoring can be seen to penetrate home life
Does not penetrate sphere of bodily privacy.
Very intrusive into private life, potentially revealing matters of conscience, association and sexuality.
More intrusive still if information is accessible to a wider audience.
Less intrusive the more restricted this further audience is.
Error and Discrimination
Is the information acquired prone to false positives/ambiguity?
Is sanction possible on the basis of these errors?
Are errors possible as a result of storing information?
Can a lack of training by users result in error?
Are certain social or cultural groups more likely to be subject to error?
CCTV in public places
Potential for unclear outputs. Video Analytics that makes use of a category of ‘abnormal behaviour’ derived from majority activity may disproportionately target social/cultural minorities.
Errors, including those that discriminate against particular groups, can result in sanction if the judgement of individual officers Some have claimed that CCTV disproportionately results in harassment of minorities, seeming to confirm that this does occur.38
Little risk from errors resulting from storage.
Discrimination of users can be reinforced by Analytics which disproportionately target minorities.
Full Body Scanners
Some risk of ambiguity from unclear outputs.
As the technology is being used to indicate areas for further investigation, errors are likely to be corrected before significant sanction is suffered.
In most cases information is not stored.
Viewers may be unfamiliar with certain objects that have been implanted as a result of surgery.
Substance Detectors
Some risk of false positives.
Lack of training may lead to errors, but unlikely to do so in a way that disadvantages any particular group.
Covert Cameras
Potential for unclear outputs.
If intelligence is recorded, widely shared, and acted upon the various sources of errors may result in significant sanction. A particularly significant example is no fly lists.
If intelligence collected is recorded incompletely, suspicion may be registered without adequate opportunity for correction.
Bugging
Conversations may be ambiguous out of context.39
Lack of understanding of political or religious writings may result in the significance of exchanges being misjudged.40
Phone Monitoring
Location tracking
Information can be misleading, seeming to provide evidence of certain associations or engagement in certain activities.
Lack of training may lead to errors, but unlikely to do so in a way that disadvantages any particular group.
Internet Monitoring
Lack of understanding of political or religious writings may result in the significance of exchanges being misjudged.
Databases and Datamining
Datamining techniques may cast suspicion on large numbers of innocent people, often disproportionately targeting members of particular social and cultural groups.
Discrimination of users can be reinforced by datamining programmes which disproportionately target certain groups.
Trust and Chill
Perceived Intrusion
Perceived Risk of Error
Perceived Discrimination
Perception of Function Creep
CCTV in public places
Widely known about and regarded as moderately intrusive.
The gathering of footage on legitimate (and non-violent) public protests is likely to have a chilling effect on public protest.
Perception of discrimination and the targeting of particular groups may undermine trust in the police.
Widely circulated reports of function creep. Lack of clarity surrounding who has access to footage.
Full Body Scanners
Intrusive scanners widely known about: if made mandatory likely to be regarded as illegitimate. Less so if alternatives, like the pat down search are permitted, or automated scanners are used.
Not significant source of damage to trust or chill.
Not significant source of damage to trust or chill.
Not significant source of damage to trust or chill.
Substance Detectors
Mildly intrusive, but as it is narrowly focussed on information of strictly related to criminal activity likely to be perceived as legitimate.
Not significant source of damage to trust or chill.
Not significant source of damage to trust or chill.
Not significant source of damage to trust or chill.
Covert Cameras
Very intrusive, but less widely known about.
Worry about the possibility of erroneously becoming a target of suspicion adds to ‘the chilling effect’.
Perception of discrimination, the targeting of particular groups and the misunderstanding of evidence may undermine trust in the police.
Purposes for which techniques may be used is not transparent enough, adding to chill.
The haphazard manner in which suspicion may be cast on innocents by profiling techniques provides a motivation to avoid behaviour associated with crude profiles.
Perception that discriminatory profiles are in operation likely to undermine trust in police.
Overview
Intrusion
Error and discrimination
Trust and Chill
CCTV in public places
Mostly only mildly intrusive.
Use of smart cameras may be more so.
Possibility for errors.
Because use is widespread, widely known about and there is perception of function creep, the use of CCTV may have significant impacts on trust in the police and political participation.
Covert Bugging
Very intrusive.
Potential for ambiguity and misunderstanding due to context dependence of understanding by third parties.
Although where discovered the intrusiveness of such measures are likely to weaken trust, they are more likely to remain secret and unknown to the public.
Phone Monitoring
Covert Cameras
Potential for ambiguity.
Full Body Scanners
Very intrusive if outputting intimate visual image. If less detailed image outputted, or process is automated, intrusion greatly reduced.
Possibility of false positives, but unlikely to result in lasting errors.
Where intrusive scanners are made mandatory as a condition of flight, this is likely to weaken trust in authorities and have a ‘chilling effect’. This is greatly reduced by offering alternatives or using less intrusive scanners.
Substance Detectors
Although scans of the body can be considered an invasion of bodily privacy, where this detects only the presence of substances this is a mild intrusion.
Possibility of false positives, but unlikely to result in lasting errors.
Use likely to be seen as legitimate intrusion by authorities.
Databases and Datamining
Only intrusive if information collected is intimate or sensitive in a way that penetrates the sphere of privacy, or reveals such information as a result of aggregation. Otherwise unintrusive.
False information can endure for long periods of time without adequate opportunity for correction. Datamining is at great risk of casting suspicion on large numbers of innocent people, often disproportionately affecting social and cultural groups.
Damaging to trust in the authorities if it is understood to result in sanction for innocent people, especially so if members of ‘suspect communities’ are disproportionately likely to be victims.
Location Tracking
Potential for intrusion into private life.
Potential for misjudging the significance of visiting certain places.
To the extent that its use is known about, likely to weaken trust in authorities and chill political participation.
Internet Monitoring
Very intrusive into private life.
Great potential for misjudging the significance of visiting certain websites.
Awareness of internet monitoring is likely to have a severe impact on people’s willingness to seek out information on certain topics.
1 “This is a person’s default environment of choice, that is, the place he willingly occupies when he has nowhere else to go, and the place from which he typically sets out when he enters public space. Home is also the place to which others have to be invited if they are legitimately to join an individual who is willingly on his own. It is in this sphere that intimate relationships with family and friends are developed over time, and where the liberty to do things as one likes – irrespective of public conventions of cleanliness, tidiness, profanity and so on – is at its greatest.” (Guelke and Sorell, 2010, 8)
2 “...the naked body, and especially the parts of the body associated with activities that are conventionally shielded from public view: sex and excretion, dressing and undressing.” (ibid)
3 “The principle that certain matters are beyond the legitimate interest of the state is an important feature of liberal societies. Matters of individual conscience, such as religion, or political beliefs are considered to not be legitimate matters of concern, and for the state to require such information would be seen as overreaching – as upsetting the balance of power between the state and the individual.” (ibid, 20)
4 See http://www.bbc.co.uk/news/10552630 and Parliament statement http://www.europarl.europa.eu/sides/getDoc.do?pubRef=-//EP//TEXT+TA+P7-TA-2010-0279+0+DOC+XML+V0//EN&language=EN
5 See http://www.edri.org/edrigram/number8.13/european-parliament-on-internet-of-things and official Parliament statement http://www.europarl.europa.eu/sides/getDoc.do?pubRef=-//EP//TEXT+TA+P7-TA-2010-0207+0+DOC+XML+V0//EN
6 Document at http://cordis.europa.eu/fp7/ict/enet/documents/tg-rfid-templates-for-pia-framework.pdf
7 See official Council draft recommendation http://www.coe.int/t/e/legal_affairs/legal_co-operation/steering_committees/cdcj/documents/2010/87th%20CDCJ-BU%20meeting/T-PD-BUR_2009_02rev6_en_Fin%20_2_.pdf and European Digital Rights summary and critique http://www.edri.org/edrigram/number8.13/council-of-europe-recommandation-profiling.
8 See official statement http://ec.europa.eu/justice_home/fsj/privacy/docs/wpdocs/2010/wp171_en.pdf and http://www.edri.org/edrigram/number8.13/article-29-cookie-eprivacy
9 See http://www.guardian.co.uk/technology/2010/may/18/google-destroy-wi-fi-networks
10 See http://www.ft.com/cms/s/2/cdc2a96e-73f3-11df-87f5-00144feabdc0.html
11 See http://www.guardian.co.uk/technology/2010/jun/22/google-wifi-crime-privacy-international
12 See official press release http://www.edps.europa.eu/EDPSWEB/webdav/site/mySite/shared/Documents/EDPS/PressNews/Press/2010/EDPS-2010-08_Future_privacy_EN.pdf
13 See the official document http://ec.europa.eu/transport/air/security/doc/com2010_311_security_scanners_en.pdf and a summary and critique http://www.guardian.co.uk/commentisfree/libertycentral/2010/jun/24/european-commission-fence-sitting-body-scanners
14 See for example http://www.balkaninsight.com/en/main/news/29380/
15 See http://www.guardian.co.uk/technology/2010/jul/08/bt-talktalk-challenge-digital-economy-act
16 See http://www.ft.com/cms/s/0/65126a0e-6376-11df-a844-00144feab49a.html
17 See http://www.guardian.co.uk/uk/2010/jun/17/birmingham-stops-spy-cameras-project
18 See http://www.guardian.co.uk/uk/2010/jul/04/anpr-surveillance-numberplate-recognition
19 See the official site http://yourfreedom.hmg.gov.uk/ and http://www.guardian.co.uk/politics/2010/jul/01/nick-clegg-red-tape-privacy
20 See http://www.yhumanrightsblog.com/blog/2010/07/06/a-win-for-yahoo-and-for-privacy-in-belgium/
21 See http://www.guardian.co.uk/world/2010/jul/09/silvio-berlusconi-media-gag-law
22 See http://www.guardian.co.uk/world/2010/jul/20/silvio-berlusconi-waters-down-wiretaps-bill
23 “One of the most impressive features of the SCB-3001 is that it brings straight out of the box Intelligent Video Analytic (IVA) functionality to analogue installations, making it possible to enhance security applications with features such as optical tripwire, enter/exit direction detection and an appear/disappear function to detect changes within a pre-defined area. IVA also has a scene change tampering function which creates an alert if, for example, paint is sprayed on a camera lens or there is unauthorised movement of a camera away from its usual field of view” http://www.securitypark.co.uk/security_article264878.html
26 Rapiscan 1000 machines now being used in UK and USA, and OSI have just won a contract to supply them to the Nigerian government http://prosecurityzone.com/Customisation/News/Detection/X-Ray_Detection/Single_Pose_Advanced_Imaging_Scanners_for_Nigeria.asp
27 Machines recently donated by the US government to Ghana http://prosecurityzone.com/Customisation/News/Detection/X-Ray_Detection/US_Government_Donates_Through-Body_X-Ray_Scanner_to_Ghana.asp and have previously been donated to Nigeria to combat drugs http://prosecurityzone.com/Customisation/News/Detection/X-Ray_Detection/Low_Dosage_Body_Scanners_Improve_Security_At_Nigerian_Airports.asp
28 Recently contracted by the Israel Airports Authority for up to $50 mil. http://prosecurityzone.com/Customisation/News/Detection/Bomb_and_explosives_detection/Explosive_detection_system_for_checked-in_baggage_to_be_used_at_Israels_Airports.asp
30 Contracted by Murcia region of Spain to provide location tracking service for emergency services calls http://prosecurityzone.com/Customisation/News/Surveillance/Tracking_and_EAS/Location_Positioning_System_In_Use_By_Wireless_Emergency_Callers_in_the_Murcia_Region_of_Spain.asp
31 Now being bundled with HP notebooks http://www.validityinc.com/post.aspx?id=200
33 Cogent win a contract from the UK National Police Improvement Agency to provide a mobile system for real time identification in the field. http://prosecurityzone.com/Customisation/News/Biometrics/Fingerprint_recognition/UK_National_MobileID_Service_Chooses_Cogent_Systems_for_Automatic_Fingerprint_Identification.asp
34 Report on use by the Florida Department of Law Enforcement http://www.crossmatch.com/news/Mobile-Rapid-ID-Certified-by-FDLE.php “When coupled with FALCON [the FDLE’s system for crossreferencing biometric information with state and national crime databases], the system provides instantaneous submission of biometric data and access to vital information for use at traffic stops and crime scenes.”
35 For example being used to provide security for Fujitsu Smart Phones http://prosecurityzone.com/Customisation/News/Biometrics/Fingerprint_recognition/Fingerprint_Sensors_for_Waterproof_Fujitsu_Smartphones.asp
37 See claims of the insecurity of the increasingly widespread practice of transmitting CCTV pictures using Internet Protocol http://prosecurityzone.com/Customisation/News/IT_Security/Network_Security_Routers_and_Data_Centres/ISF_Comments_On_Converged_IP_Security_Networks_Threat_Profile_Increase.asp
38 “Surveillance therefore seems to be capable of abuse, in terms of unjustified harassment – especially to those from minority communities” Liberty citing the Information Commissioner’s Office http://www.liberty-human-rights.org.uk/issues/3-privacy/pdfs/liberty-privacy-report.pdf