Quarterly Update on Technology 6 D12 6

Download 187.7 Kb.
Size187.7 Kb.
1   2

Panasonic SD5 cameras: has video motion detection (can be configured to detect and track intruders, and also detect left or removed objects) – http://www.prosecurityzone.com/Customisation/News/Surveillance/IP_and_Megapixel_cameras/SD5_technology_cameras_available_from_Norbain.asp

  • Panasonic IP Cameras - http://catalog2.panasonic.com/webapp/wcs/stores/servlet/ModelDetail?displayTab=O&storeId=11201&catalogId=13051&itemId=373000&catGroupId=14471&surfModel=WV-NW502S; http://catalog2.panasonic.com/webapp/wcs/stores/servlet/ModelDetail?displayTab=O&storeId=11201&catalogId=13051&itemId=360500&catGroupId=14471&surfModel=WV-NP502

  • ONSSI Ocularis: IP Video Management System, incorporating BriefCam24 search and review analytics, enabling – http://www.onssi.com/ocularis.html

  • Vista Bullet Camera VBC520: Discrete IP camera – http://www.vista-cctv.com/news/ref:N4AC47CCD37F0D/

  • Copper Eye IPRS: IP Camera data retention and retrieval system – http://www.coppereye.com/news_press/pressreleases/?id=46

  • Napco iSee Video: Products enabling remote viewing of CCTV camera feeds over internet connections, including “live video on the Apple iPhone, and...live Motion JPG images on any web enabled cell phone”. Latest addition “Single Channel Gateway” extends this ability to analogue camera feeds – http://www.napcosecurity.com/video.html

  • Samsung Techwin SDC-435: Day and Night camera – http://www.samsungtechwin.com/prd/pro_view.asp?pro_uid=4682&cat_uid=14&cat_biz=CTV&cat_lev=AA

  • Vista SmartDisc: IP camera recording and alarm transmission system - http://www.vista-cctv.com/news/ref:N4AE01F49D923B/

    • Axis M3203 Network Camera – Fixed Dome Cameras http://www.axis.com/products/cam_m3203/index.htm

    • Axis P3304 Network Camera – HDTV Fixed Dome Cameras http://www.axis.com/products/cam_p3304/

    • SUI Goodrich’s SU320KTX – Infrared camera, publicised as suitable for covert surveillance http://www.sensorsinc.com/downloads/SU320KTX.pdf

    • SUI Goodrich’s SU640KTSX – Infrared camera, publicised as suitable for covert surveillance http://www.sensorsinc.com/downloads/SU640KTSX.pdf

    • IQeye’ Minidome – IP Dome camera http://www.iqeye.com/component/content/article/120.html?lang=en

    • Texas Instrument’s DMVA1 – IP Camera with built in video analytics http://focus.ti.com/apps/docs/mrktgenpage.tsp?contentId=41246&appId=79

    • Behavioural Recognition Systems’ AIsight 2.1 – Video analytics system that derives models of ‘abnormal behaviour’ on the basis of previous footage, ‘learning’ as it goes http://www.brslabs.com/files/pdf/AISight_2%201_Final.pdf

    • Vista CCTV VBC500 – long range bullet camera with in built infra red illuminators for night vision http://www.vista-cctv.com/go.php?structureID=S45C8A2209666D&ref=I4BAB37EA36149

    • SightLogix Sightsensor Camera – Built in GPS based analytics and night vision http://www.sightlogix.com/visible-sightsensor.html

    Audio Surveillance

    • Range of bugs using GSM, UHF and VHF technology disguised as clocks, plugs etc. e.g. http://www.spycatcheronline.co.uk/spy-phones-c-52.html?spyid=7f03f93e6286532489e51fbcf141f859

    • L3 Provision ATD – Active millimeter wave- full body scanner adapted to output a non individualized person image (‘cookie cutter’ image) and highlights areas of concern on it. Feature also available as an upgrade to the previous scanner. http://www.sds.l-3com.com/products/advancedimagingtech.htm

    • Qinetic SPO-20 – Passive millimeter wave scanner that claims to automate detection of threats in high traffic areas at a distance of up to 20 metres. Does not rely on image screening, instead raises the alert via a red light/green light. Detects a range of threats, including liquids. http://www.qinetiq.com/home/products/spo_20.html

    • Link Microtek’s Emili+1 - Identifies whether liquid held in plastic container is ‘aqueous’, ‘inflammable’ or ‘corrosive’. http://www.linkmicrotek.com/pdfs/Emili%20data%20sheet%20DS280909.pdf

    • Brijot Gen 2 – Passive Millimetre wave full body scanner. Claims to be only checkpoint system in industry not to emit radiation or energy at subject during the screening process.25 Image outputted of subject’s body is not very detailed (brochure claims you would not be able to tell if subject was male or female). Saves all information by time and date and takes snapshot of the subject. http://www.brijot.com/assets/pdf/products/SafeScreen.pdf

    • Millimetre Wave technology Body Scanners for catching people smuggling e.g. weapons. For use at airports. http://www.smithsdetection.com/eng/threat_people_screening.php

    • Body Orifice Security Scanner (Boss). A chair which will search the subject’s body cavities while they are fully clothed. For use in prisons. http://www.bodyorificescanner.com/

    • Cargo container/Truck scanner http://www.smithsdetection.com/eng/narcotics_x-ray.php

    • Narcotics/explosives trace detector. Will pick up traces of TNT, C4, RDX, PETN, Semtex, Detasheet, TATP and Urea Nitrate and Heroin, Cocaine, Amphetamine, Methamphetamine, MDA, THC, LSD and Ecstasy with other substances available on request. http://www.scenttech.com/index.aspx?id=3334

    • Walk through narcotics/explosives detector http://www.smithsdetection.com/eng/Sentinel.php

    • American Science and Engineering Z Backscatter X-ray scanners - http://www.as-e.com/products_solutions/z_backscatter.asp

    • Rapiscan Secure 1000: Back Scatter X Ray Body Scanner – http://rapiscansystems.com/rapiscan-secure-1000.html.26

    • Thermo Fischer Scientific Mobile Advanced Radioisotope Identification System: Radiation detecter – http://www.prosecurityzone.com/Customisation/News/Detection/Radiation_Detection/Washington_Police_successfully_test_dirty_bomb_detector.asp

    • Universal Detection Technology TS 10 5: Handheld device to test sample for presence of anthrax, ricin toxin, botulinum, Y. pestis and staphylococcal – http://www.udetection.com/productDetail.asp?ProdID=38

    • OD Security Soter RS Body Scanners – X Ray Full Body Scanner http://www.odsecurity.com.web06.intention.nl/downloads/soter%20rs%20brochure%202008July.pdf.27

    • L-3’s ProVision – Millimetre Wave Full Body Scanner http://www.dsxray.com/products/mmwave.htm

    • ASE’s Z-Backscatter Van Mobile Screening System now being used by the Bulgarian Customs agency http://prosecurityzone.com/Customisation/News/Detection/X-Ray_Detection/Mobile_X-Ray_Inspection_System_For_Bulgarias_Border_Control.asp

    • Morpho Detection’s System of Systems – Luggage X Ray scanner and explosives detection http://www.morphodetection.com/products-services/xrd-explosives-detection/system-of-systems/.28

    • Smiths Detection’s Bio-Act – ‘Confirmation technology’ for detecting the presence of ‘chemicals, bacteria and bacterial spores, bio-toxins and viruses’ http://www.smithsdetection.com/media/SD_Bio-ACT_Flyer_web.pdf

    • Implant Sciences Quantum Sniffer QS H150 Portable Explosives Detector – detects explosive ‘vapors and particulates’ http://implantsciences.com/QS_H150.html

    Vehicle Trackers

    • Vehicle tracking equipment. http://www.spycatcheronline.co.uk/vehicle-tracking-c-48.html

    • Elsagna’s MPH-900 – Automatic licence plate recognition, works from a stationary location or while mobile and cross references against an onboard ‘hotlist’. Can record 100s of plates a minute and keeps record of image and GPS coordinates of every plate scanned for future reference. Soon to be incorporating i2 analytic capabilities, combining numberplate info with other sources of information.29 http://www.elsagna.com/mph_900_applications.htm

    • TruePosition’s Location Platform – Location tracking technology http://www.trueposition.com/web/guest/trueposition-location-platform30

    Phone Monitoring

    • Landline

    • Mobile

    • Software for mobile phones that, without any change to normal functioning, will notify a third party

    • Whenever the phone is switched on

    • Whenever a text is sent/call is made

    • Will send information on what number has been called/texted

    • Will send a copy of the text

    • Enables you to ‘phone in’ and listen to the call

    • Enables you to phone in and listen in to whatever the microphone can pick up, effectively turning the phone into a bug http://www.spycatcheronline.co.uk/interceptor-software-with-nokia-phone-list-included-p-746.html

    • Range of Mobile Phone Tracking Services http://www.mobilelocate.co.uk/, http://www.google.co.uk/latitude/intro.html

    • Storacall Voistore Systems: Makes recording of all mobile phone calls made on device and can store them on a central server – http://www.storacall.co.uk/svs_voistore.htm

    • ASC InspirationPro 9.0 and EvoIP 9.0: Voice over Internet Protocol products. InspirationPro provides analysis of recorded call data and screen activities. EvoIP captures telephone calls from the network and enables storage, playback and archiving of the entire interaction. http://www.asctelecom.com/download/presse/ASC_Gitex_INSPIRATIONpro_EVOip_9_0.pdf

    Computer Monitoring

    • Key logging equipment: easily installed, keeps a record of the input into a computer http://www.spycatcheronline.co.uk/type-logger-p-585.html

    • Device for recovering deleted texts from mobile phones http://www.eyetek.co.uk/section/0/deleted-text-spy

    • Guidance Software’s Encase Portable Version 2 – USB device which enables searching of computers by keyword and hash value, and viewing of all images stored http://www.guidancesoftware.com/popup.aspx?B=Content&id=2908&terms=usb+encase+portable

    • Mykonos Security Appliance – counter hacking tool that claims to enable real time monitoring, profiling and countermeasures against computer hackers: “Information within the profile includes the location of the hacker, the environment of the attacking computer and details the activities the hacker is employing” http://www.mykonossoftware.com/appliance.php

    • Genetec’s Unified Security Platform – Integrates IP CCTV cameras, access control and automatic numberplate recognition systems http://www.genetec.com/English/Products/Pages/security-center-unified-security-platform.aspx

    Databases and Datamining

    • Vodafone Bespoke Service for South Yorkshire Police: Mobile access (via Blackberry) to Criminal Records Database: http://www.vodafone.com/start/media_relations/news/local_press_releases/uk_press_releases/2007/south_yorkshire_police.html

    • CEM Systems S3020f Portable Fingerprint Reader – handheld device for fingerprint and card reading. Carries up to 100,000 card and biometric records in its onboard database and can store around 8,000 offline card swipe transactions for on-line transmission to the AC2000 system via built-in 802.11g WiFi connection. http://www.cemsys.com/product.php?id=47

    • i2 iBase – Database application enabling the capture, management of data and the dissemination of actionable intelligence http://www.i2group.com/products/analysis-suite/ibase

    • http://www.backgroundchecks.com online resource for general identification information (such as address, occupation etc.) and also checking criminal records, driving records and whether someone is a registered sex offender. It alternatively offers the ability to keep your own records clean.


    • CEM Systems S3020f Portable Fingerprint Reader – handheld device for fingerprint and card reading. Carries up to 100,000 card and biometric records in its onboard database and can store around 8,000 offline card swipe transactions for on-line transmission to the AC2000 system via built-in 802.11g WiFi connection. http://www.cemsys.com/product.php?id=47

    • Cem Systems AC2000 Lite System Controller – Intelligent Network device for access control. http://www.cemsys.com/product.php?id=37

    • Validity Fingerprint Sensors – For controlling access to laptops http://www.validityinc.com/product.aspx?id=131

    • Neurotechnology’s Megamatch 3.1 SDK - Face, fingerprint and palm32 recognition. http://www.neurotechnology.com/mm_sdk.html

    • Neurotechology’s Verieye – iris recognition technology. http://www.neurotechnology.com/verieye_sdk.html

    • Neurotechnology’s Verilook – Face recognition technology. http://www.neurotechnology.com/vl_sdk.html

    • 10 finger and palm print Livescan systems - digitises finger/palm print for cross referencing with central (FBI) databases http://www.crossmatch.com/10print_live_scanners.html 

    • Single/dual fingerprint scanner http://www.crossmatch.com/single_finger_scanners.html 

    • Mobile Finger Scanners http://www.crossmatch.com/mobile_finger_scanners.html 

    • Enrolls, identify and verify detainees, suspects and perpetrators. Matches fingerprints captured at terrorist crime scenes against terrorist and criminal watch databases http://www.crossmatch.com/jump_kits_Guardian_R.html

    • Document Reader http://www.crossmatch.com/D_SCAN_Authenticator_CF.html

    • Document Scanner http://www.crossmatch.com/D_SCAN_Authenticator_100.html 

    • Access Control http://www.crossmatch.com/id_management.html

    • Facial recognition software http://www.crossmatch.com/facial_recognition_solutions.html

    • Iris recognition software http://www.crossmatch.com/I_SCAN_2.html

    • Fingerprint Matching Applications http://www.crossmatch.com/matching_server.html

    • Software for fingerprints from multiple systems. Centralises Electronic Fingerprint Transmission records for transmission to a receiving agency (for example law enforcement) http://www.crossmatch.com/store_forward_solution.html

    • Cognitec FaceVACS-DBScan matches photographs to images from trusted databases of images - http://www.cognitec-systems.de/FaceVACS-DBScan.21.0.html?&L=0

    • Cognitec FaceVACS-VideoScan compares faces in video streams to “possible ‘watch-list’ matches” - http://www.cognitec-systems.de/FaceVACS-VideoScan.20.0.html?&L=0

    • Cognitec FaceVACS-Sentry compares face on video feed with prior photographs - http://www.cognitec-systems.de/FaceVACS-Sentry.14.0.html?&L=0

    • Crossmatch Lookout Matcher: Facial recognition software that compares inputted images to a database or “watchlist” for potential matches - http://www.crossmatch.com/LookoutMatcher.html

    • Crossmatch Lookout Collecter: A combined digital video recorder and facial collection software locate and extract facial images from video footage for automated identification and verification. Available as a standalone unit or can be networked to Lookout Matcher – http://www.crossmatch.com/LookoutCollector.html

    • Cogent Systems Mobile Ident III: Multi-biometric handheld fingerprint identification device for “remote subject identification, disaster scene management, ID document authentication, traffic citation, etc” – http://www.cogentsystems.com/MobileIdentIII.asp

    • Crossmatch Be.U Mobile: Range of handheld fingerprint and smartcard readers. The Be.U SMC-800MC3 ePassport reads RFID chips http://crossmatch.com/BeU_Mobile.html

    • L1 Identity Solution’s 4G FingerVein Reader – Biometric identity recognition on the basis of veins in the fingers http://www.l1id.com/pages/735-4g-finger-vein-reader

    • AOptix Insight – Iris scanner that works at a distance of 2 metres http://www.aoptix.com/biometrics.html

    • Megamatcher Accelerator 2.0 – Fingerprint matching system http://www.neurotechnology.com/download/MegaMatcher_Accelerator_Brochure_2010-04-07.pdf

    • Security Systems Technology’s Time and Attendence Solutions – Record time and attendance, enabling people to ‘clock in’ by scanning a palm print http://www.sstgroup.co.uk/go/products/time-and-attendance/time-and-attendance-solutions

    • Cogent’s Automatic Fingerprint Identification System – range of fingerprint and palm print identification systems including CAPFIS explicitly designed for police forces http://www.cogentsystems.com/downloads/CAFIS_60_EN_sm.pdf; http://www.cogentsystems.com/downloads/CAFIS_EN_sm.pdf; http://www.cogentsystems.com/downloads/CAPFIS_Prime.pdf.33

    • Cross Match’s Mobile Rapid ID – mobile fingerprint identification system http://www.crossmatch.com/mobile-rapid-id.php34

    • Telos’s Mobileassure Access Control – Biometric access control system. Optional add-ons include vehicle tracking http://images.telos.com/files/external//MobileAssure_Access_Control.pdf

    • AuthenTec Biometric Fingerprint Authentification Device – Range of fingerprint scanners enabling access control for mobile device http://www.authentec.com/products-wireless.cfm35

    • Persay’s Vocal Password – Voice biometric identification system. Claims to be language and accent independent http://www.persay.com/vocal-password.asp?round=1 Security services provider G4S are planning to use it for “electronic monitoring projects around the world”36

    Tables of Relative Moral Risks


    Intrusion into ‘Home Spaces’

    Intrusion into Bodily Privacy

    Intrusion into Private Life

    Is information accessible to further people?

    CCTV in public places

    Only problematic if cameras overlook windows into people’s homes, or other ‘home spaces’.

    Otherwise the use of CCTV in public is only mildly intrusive.

    Only problematic if cameras overlook windows into people’s homes or other ‘home spaces’. Otherwise does not invade bodily privacy.

    Smart cameras with video analytics create the possibility of revealing intimate details of private life.

    Otherwise information is too disparate to constitute a threat.

    An additional source of intrusion only if, through the use of video analytics, revealing details of private life are made available to others, or if information from a ‘home space’ is acquired and transmitted.37

    Full Body Scanners

    Since these are used in explicitly ‘public’ places such as airports there is no intrusion of a ‘home space’.

    Very intrusive into bodily privacy if an image of the naked body is produced.
    Much less intrusive if the process is automated, with no need for a viewer to look at an image of the subject’s actual body.

    If detailed image is produced this may reveal some intimate details of private life – embarrassing medical conditions or surgery for example.

    This is avoided if the process is automated, revealing only strictly relevant information.

    Would be very intrusive for an intimate visual image to be available to others.

    Much less intrusive if no image is recorded, as is the case with many scanners.

    Substance Detectors

    Since these are used in explicitly ‘public’ places such as airports there is no intrusion of a ‘home space’.

    If these involve scanning of the human body this constitutes an intrusion, but, as the information acquired is not personal in any way the intrusion is mild.

    Does not penetrate sphere of private life

    Even if information is available more widely, as the information is not personal, this is not intrusive.

    Covert Cameras

    Very intrusive when used in homes and ‘home spaces’.

    When used in home spaces this is likely to result in great bodily intrusion.

    Less revealing of the details of private life than bugging, but still very intrusive.

    More intrusive still if information is accessible to a wider audience.

    Less intrusive the more restricted this further audience is.


    Though less intrusive into bodily privacy than covert cameras, but the intrusiveness of others hearing sounds of bodily function mean this is still an issue.

    Very intrusive into the most intimate details of private life.

    Phone Monitoring

    Listening in to some calls made in private may be considered to invade the sphere of the home.

    Not intrusive into bodily privacy

    Very intrusive into private life.

    Databases and Datamining

    Does not penetrate privacy of the home

    Does not intrude upon bodily privacy

    May intrude into private life is enough information is aggregated.

    More intrusive the more people who have access.

    Location tracking

    Does not reveal details of activity in home.

    Does not intrude into bodily privacy.

    May reveal details of private life – how one chooses to spend one’s leisure time or who one chooses to associate with.

    If details of private life become accessible to a wider audience this worsens the intrusion.

    Internet Monitoring

    For a person who spends much of their home life interacting on the internet, detailed monitoring can be seen to penetrate home life

    Does not penetrate sphere of bodily privacy.

    Very intrusive into private life, potentially revealing matters of conscience, association and sexuality.

    More intrusive still if information is accessible to a wider audience.

    Less intrusive the more restricted this further audience is.

    Error and Discrimination

    Is the information acquired prone to false positives/ambiguity?

    Is sanction possible on the basis of these errors?

    Are errors possible as a result of storing information?

    Can a lack of training by users result in error?

    Are certain social or cultural groups more likely to be subject to error?

    CCTV in public places

    Potential for unclear outputs.
    Video Analytics that makes use of a category of ‘abnormal behaviour’ derived from majority activity may disproportionately target social/cultural minorities.

    Errors, including those that discriminate against particular groups, can result in sanction if the judgement of individual officers
    Some have claimed that CCTV disproportionately results in harassment of minorities, seeming to confirm that this does occur.38

    Little risk from errors resulting from storage.

    Discrimination of users can be reinforced by Analytics which disproportionately target minorities.

    Full Body Scanners

    Some risk of ambiguity from unclear outputs.

    As the technology is being used to indicate areas for further investigation, errors are likely to be corrected before significant sanction is suffered.

    In most cases information is not stored.

    Viewers may be unfamiliar with certain objects that have been implanted as a result of surgery.

    Substance Detectors

    Some risk of false positives.

    Lack of training may lead to errors, but unlikely to do so in a way that disadvantages any particular group.

    Covert Cameras

    Potential for unclear outputs.

    If intelligence is recorded, widely shared, and acted upon the various sources of errors may result in significant sanction. A particularly significant example is no fly lists.

    If intelligence collected is recorded incompletely, suspicion may be registered without adequate opportunity for correction.


    Conversations may be ambiguous out of context.39

    Lack of understanding of political or religious writings may result in the significance of exchanges being misjudged.40

    Phone Monitoring

    Location tracking

    Information can be misleading, seeming to provide evidence of certain associations or engagement in certain activities.

    Lack of training may lead to errors, but unlikely to do so in a way that disadvantages any particular group.

    Internet Monitoring

    Lack of understanding of political or religious writings may result in the significance of exchanges being misjudged.

    Databases and Datamining

    Datamining techniques may cast suspicion on large numbers of innocent people, often disproportionately targeting members of particular social and cultural groups.

    Discrimination of users can be reinforced by datamining programmes which disproportionately target certain groups.

    Trust and Chill

    Perceived Intrusion

    Perceived Risk of Error

    Perceived Discrimination

    Perception of Function Creep

    CCTV in public places

    Widely known about and regarded as moderately intrusive.

    The gathering of footage on legitimate (and non-violent) public protests is likely to have a chilling effect on public protest.

    Perception of discrimination and the targeting of particular groups may undermine trust in the police.

    Widely circulated reports of function creep. Lack of clarity surrounding who has access to footage.

    Full Body Scanners

    Intrusive scanners widely known about: if made mandatory likely to be regarded as illegitimate. Less so if alternatives, like the pat down search are permitted, or automated scanners are used.

    Not significant source of damage to trust or chill.

    Not significant source of damage to trust or chill.

    Not significant source of damage to trust or chill.

    Substance Detectors

    Mildly intrusive, but as it is narrowly focussed on information of strictly related to criminal activity likely to be perceived as legitimate.

    Not significant source of damage to trust or chill.

    Not significant source of damage to trust or chill.

    Not significant source of damage to trust or chill.

    Covert Cameras

    Very intrusive, but less widely known about.

    Worry about the possibility of erroneously becoming a target of suspicion adds to ‘the chilling effect’.

    Perception of discrimination, the targeting of particular groups and the misunderstanding of evidence may undermine trust in the police.

    Purposes for which techniques may be used is not transparent enough, adding to chill.


    Phone Monitoring

    Internet Monitoring Location tracking

    Location tracking

    Perceived as intrusive where known about.

    Databases and datamining

    Fairly unintrusive except where private information is gathered

    The haphazard manner in which suspicion may be cast on innocents by profiling techniques provides a motivation to avoid behaviour associated with crude profiles.

    Perception that discriminatory profiles are in operation likely to undermine trust in police.



    Error and discrimination

    Trust and Chill

    CCTV in public places

    Mostly only mildly intrusive.

    Use of smart cameras may be more so.

    Possibility for errors.

    Because use is widespread, widely known about and there is perception of function creep, the use of CCTV may have significant impacts on trust in the police and political participation.

    Covert Bugging

    Very intrusive.

    Potential for ambiguity and misunderstanding due to context dependence of understanding by third parties.

    Although where discovered the intrusiveness of such measures are likely to weaken trust, they are more likely to remain secret and unknown to the public.

    Phone Monitoring

    Covert Cameras

    Potential for ambiguity.

    Full Body Scanners

    Very intrusive if outputting intimate visual image. If less detailed image outputted, or process is automated, intrusion greatly reduced.

    Possibility of false positives, but unlikely to result in lasting errors.

    Where intrusive scanners are made mandatory as a condition of flight, this is likely to weaken trust in authorities and have a ‘chilling effect’. This is greatly reduced by offering alternatives or using less intrusive scanners.

    Substance Detectors

    Although scans of the body can be considered an invasion of bodily privacy, where this detects only the presence of substances this is a mild intrusion.

    Possibility of false positives, but unlikely to result in lasting errors.

    Use likely to be seen as legitimate intrusion by authorities.

    Databases and Datamining

    Only intrusive if information collected is intimate or sensitive in a way that penetrates the sphere of privacy, or reveals such information as a result of aggregation. Otherwise unintrusive.

    False information can endure for long periods of time without adequate opportunity for correction. Datamining is at great risk of casting suspicion on large numbers of innocent people, often disproportionately affecting social and cultural groups.

    Damaging to trust in the authorities if it is understood to result in sanction for innocent people, especially so if members of ‘suspect communities’ are disproportionately likely to be victims.

    Location Tracking

    Potential for intrusion into private life.

    Potential for misjudging the significance of visiting certain places.

    To the extent that its use is known about, likely to weaken trust in authorities and chill political participation.

    Internet Monitoring

    Very intrusive into private life.

    Great potential for misjudging the significance of visiting certain websites.

    Awareness of internet monitoring is likely to have a severe impact on people’s willingness to seek out information on certain topics.

    1 “This is a person’s default environment of choice, that is, the place he willingly occupies when he has nowhere else to go, and the place from which he typically sets out when he enters public space. Home is also the place to which others have to be invited if they are legitimately to join an individual who is willingly on his own. It is in this sphere that intimate relationships with family and friends are developed over time, and where the liberty to do things as one likes – irrespective of public conventions of cleanliness, tidiness, profanity and so on – is at its greatest.” (Guelke and Sorell, 2010, 8)

    2 “...the naked body, and especially the parts of the body associated with activities that are conventionally shielded from public view: sex and excretion, dressing and undressing.” (ibid)

    3 “The principle that certain matters are beyond the legitimate interest of the state is an important feature of liberal societies. Matters of individual conscience, such as religion, or political beliefs are considered to not be legitimate matters of concern, and for the state to require such information would be seen as overreaching – as upsetting the balance of power between the state and the individual.” (ibid, 20)

    4 See http://www.bbc.co.uk/news/10552630 and Parliament statement http://www.europarl.europa.eu/sides/getDoc.do?pubRef=-//EP//TEXT+TA+P7-TA-2010-0279+0+DOC+XML+V0//EN&language=EN

    5 See http://www.edri.org/edrigram/number8.13/european-parliament-on-internet-of-things and official Parliament statement http://www.europarl.europa.eu/sides/getDoc.do?pubRef=-//EP//TEXT+TA+P7-TA-2010-0207+0+DOC+XML+V0//EN

    6 Document at http://cordis.europa.eu/fp7/ict/enet/documents/tg-rfid-templates-for-pia-framework.pdf

    7 See official Council draft recommendation http://www.coe.int/t/e/legal_affairs/legal_co-operation/steering_committees/cdcj/documents/2010/87th%20CDCJ-BU%20meeting/T-PD-BUR_2009_02rev6_en_Fin%20_2_.pdf and European Digital Rights summary and critique http://www.edri.org/edrigram/number8.13/council-of-europe-recommandation-profiling.

    8 See official statement http://ec.europa.eu/justice_home/fsj/privacy/docs/wpdocs/2010/wp171_en.pdf and http://www.edri.org/edrigram/number8.13/article-29-cookie-eprivacy

    9 See http://www.guardian.co.uk/technology/2010/may/18/google-destroy-wi-fi-networks

    10 See http://www.ft.com/cms/s/2/cdc2a96e-73f3-11df-87f5-00144feabdc0.html

    11 See http://www.guardian.co.uk/technology/2010/jun/22/google-wifi-crime-privacy-international

    12 See official press release http://www.edps.europa.eu/EDPSWEB/webdav/site/mySite/shared/Documents/EDPS/PressNews/Press/2010/EDPS-2010-08_Future_privacy_EN.pdf

    13 See the official document http://ec.europa.eu/transport/air/security/doc/com2010_311_security_scanners_en.pdf and a summary and critique http://www.guardian.co.uk/commentisfree/libertycentral/2010/jun/24/european-commission-fence-sitting-body-scanners

    14 See for example http://www.balkaninsight.com/en/main/news/29380/

    15 See http://www.guardian.co.uk/technology/2010/jul/08/bt-talktalk-challenge-digital-economy-act

    16 See http://www.ft.com/cms/s/0/65126a0e-6376-11df-a844-00144feab49a.html

    17 See http://www.guardian.co.uk/uk/2010/jun/17/birmingham-stops-spy-cameras-project

    18 See http://www.guardian.co.uk/uk/2010/jul/04/anpr-surveillance-numberplate-recognition

    19 See the official site http://yourfreedom.hmg.gov.uk/ and http://www.guardian.co.uk/politics/2010/jul/01/nick-clegg-red-tape-privacy

    20 See http://www.yhumanrightsblog.com/blog/2010/07/06/a-win-for-yahoo-and-for-privacy-in-belgium/

    21 See http://www.guardian.co.uk/world/2010/jul/09/silvio-berlusconi-media-gag-law

    22 See http://www.guardian.co.uk/world/2010/jul/20/silvio-berlusconi-waters-down-wiretaps-bill

    23 “One of the most impressive features of the SCB-3001 is that it brings straight out of the box Intelligent Video Analytic (IVA) functionality to analogue installations, making it possible to enhance security applications with features such as optical tripwire, enter/exit direction detection and an appear/disappear function to detect changes within a pre-defined area. IVA also has a scene change tampering function which creates an alert if, for example, paint is sprayed on a camera lens or there is unauthorised movement of a camera away from its usual field of view” http://www.securitypark.co.uk/security_article264878.html

    24 http://www.onssi.com/component/option,com_news/task,detail/nid,203/id,7/

    25 http://prosecurityzone.com/Customisation/News/Detection/Bomb_and_explosives_detection/Safe_millimetre_wave_imaging_systems_ready_for_airport_deployment.asp

    26 Rapiscan 1000 machines now being used in UK and USA, and OSI have just won a contract to supply them to the Nigerian government http://prosecurityzone.com/Customisation/News/Detection/X-Ray_Detection/Single_Pose_Advanced_Imaging_Scanners_for_Nigeria.asp

    27 Machines recently donated by the US government to Ghana http://prosecurityzone.com/Customisation/News/Detection/X-Ray_Detection/US_Government_Donates_Through-Body_X-Ray_Scanner_to_Ghana.asp and have previously been donated to Nigeria to combat drugs http://prosecurityzone.com/Customisation/News/Detection/X-Ray_Detection/Low_Dosage_Body_Scanners_Improve_Security_At_Nigerian_Airports.asp

    28 Recently contracted by the Israel Airports Authority for up to $50 mil. http://prosecurityzone.com/Customisation/News/Detection/Bomb_and_explosives_detection/Explosive_detection_system_for_checked-in_baggage_to_be_used_at_Israels_Airports.asp

    29 http://prosecurityzone.com/Customisation/News/Surveillance/Intelligence_Software_and_Knowledge_Management/ANPR_data_integration_with_intelligence_software_from_i2.asp

    30 Contracted by Murcia region of Spain to provide location tracking service for emergency services calls http://prosecurityzone.com/Customisation/News/Surveillance/Tracking_and_EAS/Location_Positioning_System_In_Use_By_Wireless_Emergency_Callers_in_the_Murcia_Region_of_Spain.asp

    31 Now being bundled with HP notebooks http://www.validityinc.com/post.aspx?id=200

    32 http://prosecurityzone.com/Customisation/News/Biometrics/Fingerprint_recognition/Palm_print_recognition_added_to_MegaMatcher.asp

    33 Cogent win a contract from the UK National Police Improvement Agency to provide a mobile system for real time identification in the field. http://prosecurityzone.com/Customisation/News/Biometrics/Fingerprint_recognition/UK_National_MobileID_Service_Chooses_Cogent_Systems_for_Automatic_Fingerprint_Identification.asp

    34 Report on use by the Florida Department of Law Enforcement http://www.crossmatch.com/news/Mobile-Rapid-ID-Certified-by-FDLE.php “When coupled with FALCON [the FDLE’s system for crossreferencing biometric information with state and national crime databases], the system provides instantaneous submission of biometric data and access to vital information for use at traffic stops and crime scenes.”

    35 For example being used to provide security for Fujitsu Smart Phones http://prosecurityzone.com/Customisation/News/Biometrics/Fingerprint_recognition/Fingerprint_Sensors_for_Waterproof_Fujitsu_Smartphones.asp

    36 http://prosecurityzone.com/Customisation/News/Biometrics/Voice_Recognition/VocalPassword_Voice_Biometrics_Package_Chosen_by_G4S.asp

    37 See claims of the insecurity of the increasingly widespread practice of transmitting CCTV pictures using Internet Protocol http://prosecurityzone.com/Customisation/News/IT_Security/Network_Security_Routers_and_Data_Centres/ISF_Comments_On_Converged_IP_Security_Networks_Threat_Profile_Increase.asp

    38 “Surveillance therefore seems to be capable of abuse, in terms of unjustified harassment – especially to those from minority communities” Liberty citing the Information Commissioner’s Office http://www.liberty-human-rights.org.uk/issues/3-privacy/pdfs/liberty-privacy-report.pdf

    39 See Detecter Deliverable D05.2 p 29 and 29n.

    40 See Detecter Deliverable D05.2 p 32 and 32n

    Download 187.7 Kb.

    Share with your friends:
  • 1   2

    The database is protected by copyright ©ininet.org 2023
    send message

        Main page