the surveillance society 91.113-021 instructor: michael krolak 91.113-031 instructor: patrick krolak...

127
The Surveillance Society 91.113-021 Instructor: Michael Krolak 91.113-031 Instructor: Patrick Krolak See also http://www.cs.uml.edu/~pkrolak/ Authors: P. D. & M. S. Krolak Copyright 2005

Post on 18-Dec-2015

217 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: The Surveillance Society 91.113-021 Instructor: Michael Krolak 91.113-031 Instructor: Patrick Krolak See also pkrolak/pkrolak

The Surveillance Society

91.113-021Instructor: Michael Krolak

91.113-031Instructor: Patrick Krolak

See also http://www.cs.uml.edu/~pkrolak/

Authors: P. D. & M. S. Krolak Copyright 2005

Page 2: The Surveillance Society 91.113-021 Instructor: Michael Krolak 91.113-031 Instructor: Patrick Krolak See also pkrolak/pkrolak

Security in the surveillance society

Cartoon Source:http://www.hightowerlowdown.org/node/262

Page 3: The Surveillance Society 91.113-021 Instructor: Michael Krolak 91.113-031 Instructor: Patrick Krolak See also pkrolak/pkrolak

Surveillance Society – Privacy in the 21st century

Privacy is under attack from a variety of technology and economic forces as well as the government policies to address issues of terrorism and natural disasters. The loss is in some cases is subtle and occurs under the guise of ease and productivity.

In other cases governments sell the policy as necessary for security.

Page 4: The Surveillance Society 91.113-021 Instructor: Michael Krolak 91.113-031 Instructor: Patrick Krolak See also pkrolak/pkrolak

Enabling TechnologiesDuring the Cold War government used massive networks of spies, turncoats, and informers:

– To create massive files and later databases on their citizens personal lives, foreign nationals, and other governments, –Followed people’s movements, and –Bugged their phones.

Technology is replacing the massive labor required for surveillance. It is become so cheap and automated that we are rapidly evolving into a world wide surveillance society.

Page 5: The Surveillance Society 91.113-021 Instructor: Michael Krolak 91.113-031 Instructor: Patrick Krolak See also pkrolak/pkrolak

Enabling Technologies

• Micro electronics – low cost, high performance computers with massive storage

• Intelligent cameras and sensors

• DNA and Biometrics

• Unmanned Aerial Vehicles (UAV)s and mobile robotics

• Geo-Position Satellites (GPS)

• Radio Frequency Identification tags (RFID)

• The Internet

Page 6: The Surveillance Society 91.113-021 Instructor: Michael Krolak 91.113-031 Instructor: Patrick Krolak See also pkrolak/pkrolak

Micro-electronics and storage devices

Page 7: The Surveillance Society 91.113-021 Instructor: Michael Krolak 91.113-031 Instructor: Patrick Krolak See also pkrolak/pkrolak

Intelligent cameras and sensors

Page 8: The Surveillance Society 91.113-021 Instructor: Michael Krolak 91.113-031 Instructor: Patrick Krolak See also pkrolak/pkrolak

Intelligent cameras

• The digital camera is based on a charged couple devise technology (basically a RAM chip like in your computer but with its cover off and sensitive to light).

• The digital camera also uses digital storage devices that can store thousands of pictures or an hour of video. This data can be downloaded to computers (on or off the camera) for further image processing.

• Cameras with GPS allow photos to be time & geospatially located and downloaded to social networks to be searched and used in whole new applications.

• The digital camera blurs the difference between a camera and a video camera.

• The digital camera’s marriage with the cell phone allows the public to record and transmit pictures of criminal acts or emergencies to 911 or civil infrastructure problems, e.g. pot holes to 311 (non emergency services)

Page 9: The Surveillance Society 91.113-021 Instructor: Michael Krolak 91.113-031 Instructor: Patrick Krolak See also pkrolak/pkrolak

Gunshot location

• http://criminal-justice-online-courses.blogspot.com/2007/09/law-enforcement-technology.html

Page 10: The Surveillance Society 91.113-021 Instructor: Michael Krolak 91.113-031 Instructor: Patrick Krolak See also pkrolak/pkrolak

Talking Cams

Page 11: The Surveillance Society 91.113-021 Instructor: Michael Krolak 91.113-031 Instructor: Patrick Krolak See also pkrolak/pkrolak

Facial Recognition

Using a camera to recognize a face is a rapidly evolving tool for security.

Government use in the US and in Britain have a muddled record of success.

Page 12: The Surveillance Society 91.113-021 Instructor: Michael Krolak 91.113-031 Instructor: Patrick Krolak See also pkrolak/pkrolak

Facial Recognition Technology

Page 13: The Surveillance Society 91.113-021 Instructor: Michael Krolak 91.113-031 Instructor: Patrick Krolak See also pkrolak/pkrolak

Facial Recognition – An Application

Page 14: The Surveillance Society 91.113-021 Instructor: Michael Krolak 91.113-031 Instructor: Patrick Krolak See also pkrolak/pkrolak

Facial Recognition -- Use in Driver’s License

Page 15: The Surveillance Society 91.113-021 Instructor: Michael Krolak 91.113-031 Instructor: Patrick Krolak See also pkrolak/pkrolak

Facial Recognition -- Demonstration

Page 16: The Surveillance Society 91.113-021 Instructor: Michael Krolak 91.113-031 Instructor: Patrick Krolak See also pkrolak/pkrolak

Facial Recognition – Tampa Super Bowl

Page 17: The Surveillance Society 91.113-021 Instructor: Michael Krolak 91.113-031 Instructor: Patrick Krolak See also pkrolak/pkrolak

Mass. Police Get Facial Recognition App For iPhones

Page 18: The Surveillance Society 91.113-021 Instructor: Michael Krolak 91.113-031 Instructor: Patrick Krolak See also pkrolak/pkrolak

TSA adopts Body Scans

Page 19: The Surveillance Society 91.113-021 Instructor: Michael Krolak 91.113-031 Instructor: Patrick Krolak See also pkrolak/pkrolak

FAA experiments with body scans

• As one can see that the backscatter images does indeed show all.

• This technology and similar efforts are being tested at the Phoenix airport on volunteers.

• Efforts are being devoted to trying to create a system that protects those being searched from embarrassment.

Page 20: The Surveillance Society 91.113-021 Instructor: Michael Krolak 91.113-031 Instructor: Patrick Krolak See also pkrolak/pkrolak

Facial Recognition in age of Social Networks

• Concept articles:• Online photos can reveal our private data say

experts -- http://www.bbc.co.uk/news/technology-14386514

• New emotion detector can see when we're lying -- http://www.bbc.co.uk/news/science-environment-14900800

• Manchester Airport facial recognition gates suspended -- http://www.bbc.co.uk/news/uk-england-manchester-12482156– New face scanners at airport --

http://news.bbc.co.uk/2/hi/uk_news/7571083.stm

Page 21: The Surveillance Society 91.113-021 Instructor: Michael Krolak 91.113-031 Instructor: Patrick Krolak See also pkrolak/pkrolak

Picture Phones

Page 22: The Surveillance Society 91.113-021 Instructor: Michael Krolak 91.113-031 Instructor: Patrick Krolak See also pkrolak/pkrolak

Billboards that observe us

• In advertising these days, the brass ring goes to those who can measure everything — how many people see a particular advertisement, when they see it, who they are.

• Now - Billboards with tiny cameras that gather details about passers-by — their gender, approximate age and how long they looked at the billboard. These details are transmitted to a central database.

Source: http://www.nytimes.com/2008/05/31/business/media/31billboard.html

The ad is equipped with a camera hat gathers details on passers-by.

Page 23: The Surveillance Society 91.113-021 Instructor: Michael Krolak 91.113-031 Instructor: Patrick Krolak See also pkrolak/pkrolak

Geo Positioning Satellite (GPS) Tracking

GPS was designed by the Department of Defense (DOD) for guidance and navigation.GPS has now become integral component in hundreds of civilian applications that involve navigation, timing, and positioning. It is a key component in cell phones and transportation systems.

Page 24: The Surveillance Society 91.113-021 Instructor: Michael Krolak 91.113-031 Instructor: Patrick Krolak See also pkrolak/pkrolak

How GPS works

Click for a GPS Tutorial

Page 25: The Surveillance Society 91.113-021 Instructor: Michael Krolak 91.113-031 Instructor: Patrick Krolak See also pkrolak/pkrolak

GPS Applications

1. Position or Location2. Navigation3. Timing4. Tracking – requires a broadcast or recorder.

Page 26: The Surveillance Society 91.113-021 Instructor: Michael Krolak 91.113-031 Instructor: Patrick Krolak See also pkrolak/pkrolak

Tracking of transit vehicles

• Chicago’s CTA is one of the first major cities to adapt GPS for urban mass transit .

• Allows the public to see when their bus is coming .

This a video of the site in use and will take time to load. We will see the user select a bus stop and watch the busses moving along the route.

Page 27: The Surveillance Society 91.113-021 Instructor: Michael Krolak 91.113-031 Instructor: Patrick Krolak See also pkrolak/pkrolak

Using GPS to track people

In this age of terrorism, violent sex offenders, and a rising elder population of elderly with Alzheimer's and other memory impairments and similar applications based on GPS are arising.

Page 28: The Surveillance Society 91.113-021 Instructor: Michael Krolak 91.113-031 Instructor: Patrick Krolak See also pkrolak/pkrolak

Using a cell phone with GPS to track children

• Cell phone tracking and uses a Mapquest display to locate and track children, etc. Ulocate is Massachusetts based.

• Fee is $ 4.00/month and allows cell phone to cell phone or to pc.

Source: http://www.ulocate.com/

Page 29: The Surveillance Society 91.113-021 Instructor: Michael Krolak 91.113-031 Instructor: Patrick Krolak See also pkrolak/pkrolak

Tracking children using GPS

• A British company has recently announced a children’s winter jacket with GPS in the lining.

• It will send an email or cell text message if the child leaves a designated area or path.

Page 30: The Surveillance Society 91.113-021 Instructor: Michael Krolak 91.113-031 Instructor: Patrick Krolak See also pkrolak/pkrolak

Tracking Sex offenders and others likely to commit sexual and physical abuse

• More cities and states are using GPS anklets to track sexual offenders and those with domestic abuse histories to be monitored to warn the authorities when the individuals enter into areas that they would present a danger, i.e. areas around schools, playgrounds, etc.

Page 31: The Surveillance Society 91.113-021 Instructor: Michael Krolak 91.113-031 Instructor: Patrick Krolak See also pkrolak/pkrolak

UAV and other robots

Unmanned aerial vehicles, under water robots, mobile robots are controlled by humans some thousands of miles away.

These robots may be used in a variety of tasks ranging from surveillance, disarming bombs, in hostage situation, and in attacking a target. They may also be used in a hundred mundane applications.

.

Page 32: The Surveillance Society 91.113-021 Instructor: Michael Krolak 91.113-031 Instructor: Patrick Krolak See also pkrolak/pkrolak

The future -- Autonomous robots

• Autonomous robots are intelligent and not under human control.

• The use sensors like GPS and vision, computers, and sophisticated sofware to perform complex tasks like surveillance and war fighting.

• In a DARPA sponsored competition robotic cars drove over a hundred miles through the desert to win a several $M prize and glory

Page 33: The Surveillance Society 91.113-021 Instructor: Michael Krolak 91.113-031 Instructor: Patrick Krolak See also pkrolak/pkrolak

UAVs come in all sizes

• UAV were developed for surveillance tasks by the military and come in a variety of sizes some as small a few inches for operation in buildings to those the size of a small fighter aircraft.

• They can fly for up to 24-48 hours at altitudes up to 50,000 ft. and are equipped with a variety of cameras and sensors.

• The latest, larger UAVs are war fighters equipped with missiles and other weapons.

Page 34: The Surveillance Society 91.113-021 Instructor: Michael Krolak 91.113-031 Instructor: Patrick Krolak See also pkrolak/pkrolak

Military UAV uses

• UAVs have proven themselves in IRAQ, Afghanistan, and in the middle east. War fighters like the Predators are flown by the air force and the CIA.

• These are operated from a USAF base in Nevada over the secure military Internet.

• Smaller UAVs (e.g. 3 ft wingspan) are used scouting, surveillance, and tactical operations by the army and the marines.

• The control of the army and marine UAVs are done in country.

• The success of the UAVs has lead to fight by the USAF and other branches to own the program.

Raven – smallest Army UAV in Iraq

Page 35: The Surveillance Society 91.113-021 Instructor: Michael Krolak 91.113-031 Instructor: Patrick Krolak See also pkrolak/pkrolak

Civilian UAV applications

• UAVs are being used in border patrol and being investigated for urban police applications in the US.

• Other applications include forest fire reconnaissance and pollution monitoring.

• The FAA is concerned with US airspace and currently requires three days notice for UAV flight plans in order to create a restricted air space.

• The FAA is opposed to UAV flights over urban areas. In Feb 2008 a trial was approved for Miami police using Honeywell's ducted-fan Micro Air Vehicle (MAV).

http://www.prisonplanet.com/articles/february2008/200208uav.htm

Types of UAVs on the US border

Page 36: The Surveillance Society 91.113-021 Instructor: Michael Krolak 91.113-031 Instructor: Patrick Krolak See also pkrolak/pkrolak

DNA and biometrics

Page 37: The Surveillance Society 91.113-021 Instructor: Michael Krolak 91.113-031 Instructor: Patrick Krolak See also pkrolak/pkrolak

What is DNA?

• Deoxyribonucleic acid (DNA) is a nucleic acid that contains the genetic instructions used in the development and functioning of all known living organisms.

• The main role of DNA molecules is the long-term storage of information. DNA is often compared to a set of blueprints, since it contains the instructions needed to construct other components of cells, such as proteins and RNA molecules.

• The DNA segments that carry this genetic information are called genes, but other DNA sequences have structural purposes, or are involved in regulating the use of this genetic information.

Source: http://en.wikipedia.org/wiki/DNA

Page 38: The Surveillance Society 91.113-021 Instructor: Michael Krolak 91.113-031 Instructor: Patrick Krolak See also pkrolak/pkrolak

What is DNA? (more)

• Forensic scientists can use DNA in blood, semen, skin, saliva or hair at a crime scene to identify a perpetrator. This process is called genetic fingerprinting, or more accurately, DNA profiling.

• In DNA profiling, the lengths of variable sections of repetitive DNA, such as short tandem repeats and minisatellites, are compared between people.

• This method is usually an extremely reliable technique for identifying a criminal.[104] However, identification can be complicated if the scene is contaminated with DNA from several people.[105]

• DNA profiling was developed in 1984 by British geneticist Sir Alec Jeffreys,[106] and first used in forensic science to convict Colin Pitchfork in the 1988 Enderby murders case.[107] People convicted of certain types of crimes may be required to provide a sample of DNA for a database. This has helped investigators solve old cases where only a DNA sample was obtained from the scene.

Page 39: The Surveillance Society 91.113-021 Instructor: Michael Krolak 91.113-031 Instructor: Patrick Krolak See also pkrolak/pkrolak

Combine DNA Information System (CODIS)

• CODIS is funded by the FBI and shares information with member laboratories and uses DNA for forensic identification.

• A record in the CODIS database, known as a CODIS profile, – consists of a specimen identifier, – an identifier for the laboratory responsible for the profile, and– the results of the DNA analysis (known as the DNA profile). – Other than the DNA profile, CODIS does not contain any

personal identity information -- the system does not store names, dates of birth, social security numbers, etc.

Source: http://en.wikipedia.org/wiki/CODIS

Page 40: The Surveillance Society 91.113-021 Instructor: Michael Krolak 91.113-031 Instructor: Patrick Krolak See also pkrolak/pkrolak

CODIS

• The original CODIS consisted of two indexes: – the Convicted Offender Index and– the Forensic Index.

• The Convicted Offender Index contains profiles of individuals convicted of crimes; state law governs which specific crimes are eligible for CODIS. (All 50 states have passed DNA legislation authorization the collection of DNA profiles from convicted offenders for submission to CODIS.)

• The Forensic Index contains profiles developed from biological material found at crime-scenes.

• CODIS has added several other indexes, including: an Arrestee Index, a Missing or Unidentified Persons Index, and a Missing Persons Reference Index.

Page 41: The Surveillance Society 91.113-021 Instructor: Michael Krolak 91.113-031 Instructor: Patrick Krolak See also pkrolak/pkrolak

CODIS Size

National DNA Index System NDIS Profile Composition (as of May 2007)

• Forensic Profiles in NDIS: 177,870

• Convicted Offender Profiles in NDIS: 4,582,516

• As of this date the US database is the largest in the world even bigger that Great Britain's but theirs represents a larger per cent of the population  

Source: http://www.fbi.gov/hq/lab/codis/national.htm

Page 42: The Surveillance Society 91.113-021 Instructor: Michael Krolak 91.113-031 Instructor: Patrick Krolak See also pkrolak/pkrolak

Biometric Identification

Page 43: The Surveillance Society 91.113-021 Instructor: Michael Krolak 91.113-031 Instructor: Patrick Krolak See also pkrolak/pkrolak

Fingerprints

Page 44: The Surveillance Society 91.113-021 Instructor: Michael Krolak 91.113-031 Instructor: Patrick Krolak See also pkrolak/pkrolak

IRIS Scans

Page 45: The Surveillance Society 91.113-021 Instructor: Michael Krolak 91.113-031 Instructor: Patrick Krolak See also pkrolak/pkrolak

Radio Frequency ID

Page 46: The Surveillance Society 91.113-021 Instructor: Michael Krolak 91.113-031 Instructor: Patrick Krolak See also pkrolak/pkrolak

How does RFID work?

Page 47: The Surveillance Society 91.113-021 Instructor: Michael Krolak 91.113-031 Instructor: Patrick Krolak See also pkrolak/pkrolak

What are the applications of RFID

Page 48: The Surveillance Society 91.113-021 Instructor: Michael Krolak 91.113-031 Instructor: Patrick Krolak See also pkrolak/pkrolak

Online interactive crime maps

0

10

20

30

40

50

60

70

80

90

1st Qtr 2nd Qtr 3rd Qtr 4th Qtr

East

West

North

Source: http://www.crimereports.com/#

Page 49: The Surveillance Society 91.113-021 Instructor: Michael Krolak 91.113-031 Instructor: Patrick Krolak See also pkrolak/pkrolak

Enabling Government Policy and Laws

Policy and law has seen major changes in surveillance policy and legislation. Much of this of this is due to terrorism and cyber warfare and the rapid growth of enabling technologies.

Page 50: The Surveillance Society 91.113-021 Instructor: Michael Krolak 91.113-031 Instructor: Patrick Krolak See also pkrolak/pkrolak

US Policy and Laws

• The US Patriot Act • Real ID• Homeland Security Act• HIPPA• CAN SPAM of 2003• Sarbanes Oxley Act of 2002• Communications Assistance for Law Enforcement Act (CALEA) 1994• Electronic Communications Privacy Act (1986)• The Freedom of Information Act• Foreign Surveillance Intelligence Act. (FISA), 1978. • Federal Intelligence Surveillance Act • NSA • National Identification cards

– Biometric • National Databases

Page 51: The Surveillance Society 91.113-021 Instructor: Michael Krolak 91.113-031 Instructor: Patrick Krolak See also pkrolak/pkrolak

The Freedom of Information Act

Page 52: The Surveillance Society 91.113-021 Instructor: Michael Krolak 91.113-031 Instructor: Patrick Krolak See also pkrolak/pkrolak

Foreign Surveillance Intelligence Act (FISA), 1978

Page 53: The Surveillance Society 91.113-021 Instructor: Michael Krolak 91.113-031 Instructor: Patrick Krolak See also pkrolak/pkrolak

Federal Intelligence Surveillance Act

Page 54: The Surveillance Society 91.113-021 Instructor: Michael Krolak 91.113-031 Instructor: Patrick Krolak See also pkrolak/pkrolak

Electronic Communications Privacy Act (1986)

• Title I of ECPA protects wire, oral, and electronic communications while in transit. It sets down requirements for search warrants that are more stringent than in other settings.

• Title II of the ECPA, the Stored Communications Act (SCA) protects communication held in electronic storage, most notably messages stored on computers. Its protections are weaker than those of Title I, however, and do not impose heightened standards for warrants.

• Title III prohibits the use of pen register and/or trap and trace devices to record dialing, routing, addressing, and signaling information used in the process of transmitting wire or electronic communications without a search warrant.

Page 55: The Surveillance Society 91.113-021 Instructor: Michael Krolak 91.113-031 Instructor: Patrick Krolak See also pkrolak/pkrolak

HIPPA 1996

Page 56: The Surveillance Society 91.113-021 Instructor: Michael Krolak 91.113-031 Instructor: Patrick Krolak See also pkrolak/pkrolak

No Electronic Theft Act (NET)1997

Page 57: The Surveillance Society 91.113-021 Instructor: Michael Krolak 91.113-031 Instructor: Patrick Krolak See also pkrolak/pkrolak

Digital Millennium Copyright Act 1998

Page 58: The Surveillance Society 91.113-021 Instructor: Michael Krolak 91.113-031 Instructor: Patrick Krolak See also pkrolak/pkrolak

Sarbanes Oxley Act of 2002

• The Sarbanes-Oxley Act of 2002 (Pub. L. No. 107-204, 116 Stat. 745), also known as the Public Company Accounting Reform and Investor Protection Act of 2002;

• Enacted 2002 in response to a number of major corporate and accounting scandals

Source: http://en.wikipedia.org/wiki/Sarbanes-Oxley_Act

Page 59: The Surveillance Society 91.113-021 Instructor: Michael Krolak 91.113-031 Instructor: Patrick Krolak See also pkrolak/pkrolak

FBI CALEA 1994 -- Proposed new amendments

• The FBI claims that expanding the 1994 Communications Assistance for Law Enforcement Act (CALEA) is necessary to thwart criminals and terrorists who have turned to technologies like voice over Internet Protocol, or VoIP.

Source: http://www.news.com/2100-1028_3-6091942.html

Page 60: The Surveillance Society 91.113-021 Instructor: Michael Krolak 91.113-031 Instructor: Patrick Krolak See also pkrolak/pkrolak

CALEA more

• Authorize the expansion of wiretapping requirements to "commercial" Internet services including instant messaging if the FCC deems it to be in the "public interest."

• That would likely sweep in services such as in-game chats offered by Microsoft's Xbox 360 gaming system as well.

Page 61: The Surveillance Society 91.113-021 Instructor: Michael Krolak 91.113-031 Instructor: Patrick Krolak See also pkrolak/pkrolak

CALEA

• Force Internet service providers to sift through their customers' communications to identify, for instance, only VoIP calls. (The language requires companies to adhere to "processing or filtering methods or procedures applied by a law enforcement agency.") That means police could simply ask broadband providers like AT&T, Comcast or Verizon for wiretap info--instead of having to figure out what VoIP service was being used.

Page 62: The Surveillance Society 91.113-021 Instructor: Michael Krolak 91.113-031 Instructor: Patrick Krolak See also pkrolak/pkrolak

CALEA

• Eliminate the current legal requirement saying the Justice Department must publish a public "notice of the actual number of communications interceptions" every year.

• That notice currently also must disclose the "maximum capacity" required to accommodate all of the legally authorized taps that government agencies will "conduct and use simultaneously." The Internet surveillance cash cowAnnalee Newitz , SecurityFocus 2004-04-05

Page 63: The Surveillance Society 91.113-021 Instructor: Michael Krolak 91.113-031 Instructor: Patrick Krolak See also pkrolak/pkrolak

•          

• A few large companies and entrepreneurs stand to profit from the FBI's bid for a wiretap-friendly to sell Internet wiretapping tools and services to cable and DSL companies. Virginia-based Fiducianet is one such company. Company president Michael Warren has worked on CALEA compliance issues for most of his career, first as an FBI agent in charge of bringing telecom companies into line, and today as an entrepreneur. Because CALEA stipulates that telecom carriers must build their networks to be surveillance-ready for law enforcement, Warren's position at the FBI meant that he was responsible for transforming the country's telephone infrastructure. He worked with manufacturers and carriers to design surveillance tools that could be implemented on thousands of switches across the country.

Source: http://www.securityfocus.com/news/8394

Page 64: The Surveillance Society 91.113-021 Instructor: Michael Krolak 91.113-031 Instructor: Patrick Krolak See also pkrolak/pkrolak

• "Companies spend a great deal of money getting ready for intercept requests from law enforcement," he said. "It costs 250 to 350 dollars for a company to process a subpoena, and they get no return on it. Fiducianet can make it faster and cheaper for them."

• What makes CALEA particularly ripe for profit is the law's stipulation that networks must be built with backdoors that meet exacting federal specifications. Experts estimate that CALEA compliance has cost three to five billion dollars since the law's passage in 1994, and if the FBI gets its wish this figure will balloon again as cable companies and DSL carriers scramble to comply. Although the comment period on the FCC petition has just begun, VeriSign is already trumpeting deals with large cable companies that want to stay ahead of the compliance curve. On Monday VeriSign announced a deal with Cox Communications to help with wiretaps on some of the cable company's 6.6 million

Page 65: The Surveillance Society 91.113-021 Instructor: Michael Krolak 91.113-031 Instructor: Patrick Krolak See also pkrolak/pkrolak

Project Shamrock

• Project SHAMROCK, considered to be the sister project for Project MINARET, was an espionage exercise that involved the accumulation of all telegraphic data entering into or exiting from the United States. The Armed Forces Security Agency (AFSA) and its successor NSA were given direct access to daily microfilm copies of all incoming, outgoing, and transiting telegraphs via the Western Union and its associates RCA and ITT. Operation Shamrock lasted well into the 1960s when computerized operations (HARVEST) made it possible to search for keywords rather than read through all communications.

• One result of these investigations was the creation of the Foreign Intelligence Surveillance Act (FISA) which limited the powers of the NSA and put in place a process of warrants and judicial review.

Page 66: The Surveillance Society 91.113-021 Instructor: Michael Krolak 91.113-031 Instructor: Patrick Krolak See also pkrolak/pkrolak

Open Fields Doctrine

• The open fields doctrine is a U.S. legal doctrine created judicially for purposes of evaluating claims of an unreasonable search by the government in violation of the Fourth Amendment of the U.S. Constitution, which states:– The right of the people to be secure in their persons, houses, papers, and

effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.

• The open fields doctrine was first articulated by the U.S. Supreme Court in Hester v. United States[1], which stated that “the special protection accorded by the Fourth Amendment to the people in their ‘persons, houses, papers, and effects,’ is not extended to the open fields."[2] This opinion appears to be decided on the basis that "open fields are not a "constitutionally protected area" because they cannot be construed as "persons, houses, papers, [or] effects."

Page 67: The Surveillance Society 91.113-021 Instructor: Michael Krolak 91.113-031 Instructor: Patrick Krolak See also pkrolak/pkrolak

Open Fields (more)

• This method of reasoning gave way with the arrival of the landmark case Katz v. U.S.,[3] which established a two-part test for what constitutes a search within the meaning of the Fourth Amendment. The relevant criteria are "first that a person have exhibited an actual (subjective) expectation of privacy and, second, that the expectation be one that society is prepared to recognize as reasonable."[4] Under this “new” analysis of the Fourth Amendment, privacy expectations deemed unreasonable by society cannot be validated by any steps taken by the defendant to shield the area from view.

• In Oliver v. United States[5], the Supreme Court held that a privacy expectation regarding an open field is unreasonable:

Page 68: The Surveillance Society 91.113-021 Instructor: Michael Krolak 91.113-031 Instructor: Patrick Krolak See also pkrolak/pkrolak

Open Fields (more)

• …open fields do not provide the setting for those intimate activities that the Amendment is intended to shelter from government interference or surveillance. There is no societal interest in protecting the privacy of those activities, such as the cultivation of crops, that occur in open fields. [6]

• Courts have continuously held that entry into an open field--whether trespass or not--is not a search within the meaning of the Fourth Amendment. No matter what steps a person takes, he or she cannot create a reasonable privacy expectation in an open field, because it is an area incapable of supporting an expectation of privacy as a matter of constitutional law.

Page 69: The Surveillance Society 91.113-021 Instructor: Michael Krolak 91.113-031 Instructor: Patrick Krolak See also pkrolak/pkrolak

Patriot Act

Page 70: The Surveillance Society 91.113-021 Instructor: Michael Krolak 91.113-031 Instructor: Patrick Krolak See also pkrolak/pkrolak

PATRIOT Act Provisions:

– Confirms that in foreign intelligence investigations, FISA governs the interception of electronic communications and the use of pen registers and trap and trace devices (as opposed to Title III) (204)

– Extends FISA pen register or trap and trace devices availability to both wire and electronic communications allowing the government to record or trace e-mail without having to obtain separate court orders from the several jurisdictions through which e-mail messages traveled. Adds the requirement that the investigation cannot be conducted based solely on activities protected by the 1stAmendment. (214)

Page 71: The Surveillance Society 91.113-021 Instructor: Michael Krolak 91.113-031 Instructor: Patrick Krolak See also pkrolak/pkrolak

PATRIOT Act Provisions:

– Allows for pen register and trap and trace authority to be used against  U.S. citizens and lawful permanent aliens if “relevant to an ongoing investigation to protect against international terrorism or clandestine activities” (214)

– Extends the usage of trap and trace devices (previous used in the context of rotary phones to record incoming and outgoing phone numbers) by authorizing the installation of devices to record all computer routing, addressing, and signaling information when it has been certified that the information likely to be obtained is relevant to an ongoing criminal investigation. (216)

Page 72: The Surveillance Society 91.113-021 Instructor: Michael Krolak 91.113-031 Instructor: Patrick Krolak See also pkrolak/pkrolak

PATRIOT Act Provisions:

• Extends the use of pen registers or trap and trace devices beyond the judicial district in which the order was issued (prior law limited use to within that district alone) to authorize nationwide execution of court orders for pen registers, trap and trace devices, and access to stored e-mail or communications (216)

• Other relevant provisions affecting the procedures by which authorization for surveillance is obtained, as summarized in CATEGORY 1: PART G.

http://www.law.duke.edu/publiclaw/civil/index.php?action=showtopic&topicid=4

Page 73: The Surveillance Society 91.113-021 Instructor: Michael Krolak 91.113-031 Instructor: Patrick Krolak See also pkrolak/pkrolak

Real ID Act 2005

Real ID Act set federal standards for the states driver licenses to be used as identification by federal officials.

Source for section: http://www.dhs.gov/xprevprot/laws/gc_1172767635686.shtm

Page 74: The Surveillance Society 91.113-021 Instructor: Michael Krolak 91.113-031 Instructor: Patrick Krolak See also pkrolak/pkrolak

Features of the Real ID Act

• What is REAL ID?– REAL ID is a nationwide effort intended to prevent terrorism,

reduce fraud, and improve the reliability and accuracy of identification documents that State governments issue.

• What is a REAL ID license needed for?– The REAL ID Act requires that a REAL ID driver’s license be

used for “official purposes,” as defined by DHS. In the proposed rule, DHS is proposing to limit the official purposes of a REAL ID license to those listed by Congress in the law: accessing a Federal facility; boarding Federally-regulated commercial aircraft; and entering nuclear power plants.

Page 75: The Surveillance Society 91.113-021 Instructor: Michael Krolak 91.113-031 Instructor: Patrick Krolak See also pkrolak/pkrolak

Is this a National ID card?

• No. The proposed regulations establish common standards for States to issue licenses.

• The Federal Government is not issuing the licenses, is not collecting information about license holders, and is not requiring States to transmit license holder information to the Federal Government that the Government does not already have (such as a Social Security Number).

• Most States already routinely collect the information required by the Act and the proposed regulations.

Page 76: The Surveillance Society 91.113-021 Instructor: Michael Krolak 91.113-031 Instructor: Patrick Krolak See also pkrolak/pkrolak

How will Real ID change Driver Lic?

• The proposed rule does not specify precise designs or layouts of state issued licenses. Instead, DHS is proposing minimum standards that will appear on the face of the card.

• The proposed regulation would require each of the following on the face of REAL IDs; space available for 39 characters for full legal name; address of principal residence; digital photograph; gender; date of birth; signature, document number; and machine readable technology.

Page 77: The Surveillance Society 91.113-021 Instructor: Michael Krolak 91.113-031 Instructor: Patrick Krolak See also pkrolak/pkrolak

How will Real ID change Driver Lic?

• Additionally, temporary REAL IDs would need to clearly state that they are temporary. Non-REAL IDs issued by compliant States would need to clearly state on their face that they are not acceptable for Federal official purposes and use a unique design or color that clearly distinguishes them from REAL ID licenses.

Page 78: The Surveillance Society 91.113-021 Instructor: Michael Krolak 91.113-031 Instructor: Patrick Krolak See also pkrolak/pkrolak

Controversial issues

• http://www.cnn.com/2005/LAW/08/12/ramasastry.ids/index.html

Page 79: The Surveillance Society 91.113-021 Instructor: Michael Krolak 91.113-031 Instructor: Patrick Krolak See also pkrolak/pkrolak
Page 80: The Surveillance Society 91.113-021 Instructor: Michael Krolak 91.113-031 Instructor: Patrick Krolak See also pkrolak/pkrolak

US Government

Page 81: The Surveillance Society 91.113-021 Instructor: Michael Krolak 91.113-031 Instructor: Patrick Krolak See also pkrolak/pkrolak

National Security Agency (NSA)

Page 82: The Surveillance Society 91.113-021 Instructor: Michael Krolak 91.113-031 Instructor: Patrick Krolak See also pkrolak/pkrolak

Project ECHELON

Page 83: The Surveillance Society 91.113-021 Instructor: Michael Krolak 91.113-031 Instructor: Patrick Krolak See also pkrolak/pkrolak

Echelon and the French Airbus

Page 84: The Surveillance Society 91.113-021 Instructor: Michael Krolak 91.113-031 Instructor: Patrick Krolak See also pkrolak/pkrolak

NSA listening in to US

Page 85: The Surveillance Society 91.113-021 Instructor: Michael Krolak 91.113-031 Instructor: Patrick Krolak See also pkrolak/pkrolak

Federal Bureau of Investigation (FBI)

Page 86: The Surveillance Society 91.113-021 Instructor: Michael Krolak 91.113-031 Instructor: Patrick Krolak See also pkrolak/pkrolak

CARNIVORE – now called DCS 1000

• Carnivore is an FBI system is a Windows workstation with packet-sniffing software and a removable disk drive.[1]

• This computer must be physically installed at an Internet service provider (ISP) or other location where it can "sniff" traffic on a LAN segment to look for email messages in transit. The technology itself is not highly advanced but could be filtered to confirm to court orders.

• Reported in 2005 that Carnivore has been replaced with commercial software tools.

Source: http://en.wikipedia.org/wiki/Carnivore_(FBI)

Page 87: The Surveillance Society 91.113-021 Instructor: Michael Krolak 91.113-031 Instructor: Patrick Krolak See also pkrolak/pkrolak

Magic Lantern

Page 88: The Surveillance Society 91.113-021 Instructor: Michael Krolak 91.113-031 Instructor: Patrick Krolak See also pkrolak/pkrolak

Capabilities

Page 89: The Surveillance Society 91.113-021 Instructor: Michael Krolak 91.113-031 Instructor: Patrick Krolak See also pkrolak/pkrolak

NSA and FBI References

• "The Puzzle Palace: Inside the National Security Agency, America's most secret intelligence organization", Author James Bamford, 1983 revision, ISBN 0-14-00.6748-5

• "Body of Secrets: Anatomy of the Ultra Secret National Security Agency", Author James Bamford, 2001, ISBN 0-385-49907-8

• “The Rise of the Computer State", David Burnham, 1984, ISBN 0-394-72375-9

• "Spyworld: Inside the Canadian and American Intelligence Establishments" book by Mike Frost

Use articles: Winter 1996-97, Number 59, Article: "Second Thoughts from the Second Oldest Profession: Inside the US-Canada Spyworld.", By Mike Frost.

Page 90: The Surveillance Society 91.113-021 Instructor: Michael Krolak 91.113-031 Instructor: Patrick Krolak See also pkrolak/pkrolak

The British Surveillance Society

Britain has been fighting terror for much longer than the US and has learned some painful lessons.

What tradeoffs between security and privacy seem to be in balance and must be seen as the cost of safety in a free society and which seem over the top.

Should we ignore the enemy and go about our business or should we allow the creation of Surveillance Society to grow?

Page 91: The Surveillance Society 91.113-021 Instructor: Michael Krolak 91.113-031 Instructor: Patrick Krolak See also pkrolak/pkrolak

The British Surveillance Society

• There are an estimated 4.2 million CCTV cameras in Britain: one for every 14 people.

• An individual can be captured on more than 300 cameras each day.

• There are plans to expand capacity to read vehicle number plates from 35 million reads per day to 50 million by 2008.

• The national DNA database holds profiles on about 3.5 million people.

• The Government also still plans to introduce a new system of biometric ID cards, including "biometrics" - fingerprints and iris scans - linked to a database of personal information.

Source: http://news.independent.co.uk/uk/crime/article1948209.ece

Page 92: The Surveillance Society 91.113-021 Instructor: Michael Krolak 91.113-031 Instructor: Patrick Krolak See also pkrolak/pkrolak

Britain leads the way toward complete and inclusive use of DNA

Britain’s national DNA database is already the largest of any country in the world. 

• The entire UK population and every visitor to Britain should be put on the national DNA database, a top judge said Lord Justice Sedley, one of England's most experienced appeal court judges, described the country's current system as "indefensible".

• "We have a situation where if you happen to have been in the hands of the police, then your DNA is on permanent record. If you haven't, it isn't ... that's broadly the picture," Sir Stephen Sedley told the BBC.

• "

Source: http://www.guardian.co.uk/crime/article/0,,2162745,00.html

Page 93: The Surveillance Society 91.113-021 Instructor: Michael Krolak 91.113-031 Instructor: Patrick Krolak See also pkrolak/pkrolak

Britain leads the way toward complete and inclusive use of DNA

• “It also means that a great many people who are walking the streets, and whose DNA would show them guilty of crimes, go free."

• He said that expanding the existing database to cover the whole population had "serious but manageable implications".

• But he warned that putting everybody's DNA on file should be "for the absolutely rigorously restricted purpose of crime detection and prevention".

• Britain's 12-year-old DNA database is the largest of any country in the world, growing by 30,000 samples a month. According to the Home Office website, 5.2% of the UK population is on the database, compared with 0.5% in the US.

Page 94: The Surveillance Society 91.113-021 Instructor: Michael Krolak 91.113-031 Instructor: Patrick Krolak See also pkrolak/pkrolak

Britain leads the way toward complete and inclusive use of DNA

• He said that expanding the existing database to cover the whole population had "serious but manageable implications".

• But he warned that putting everybody's DNA on file should be "for the absolutely rigorously restricted purpose of crime detection and prevention".

• Britain's 12-year-old DNA database is the largest of any country in the world, growing by 30,000 samples a month. According to the Home Office website, 5.2% of the UK population is on the database, compared with 0.5% in the US.

Page 95: The Surveillance Society 91.113-021 Instructor: Michael Krolak 91.113-031 Instructor: Patrick Krolak See also pkrolak/pkrolak

Great Britain (England & Wales) Vehicle Tracking

It is said that Britain is the most watched society on earth. In London it is claimed that there are more CCTV cameras than all of the US. The cameras are used for a variety of applications including vehicle tracking.

Page 96: The Surveillance Society 91.113-021 Instructor: Michael Krolak 91.113-031 Instructor: Patrick Krolak See also pkrolak/pkrolak

England and Vehicle Tracking

In England a number of innovative projects but highly controversial, are under development. If successful in some form they will likely be tried in the US. At issue are taxes, insurance, and registered vehicle and driver’s license compliance against creating a national database for tracking motorists.

Page 97: The Surveillance Society 91.113-021 Instructor: Michael Krolak 91.113-031 Instructor: Patrick Krolak See also pkrolak/pkrolak

Camera Specifications

Page 98: The Surveillance Society 91.113-021 Instructor: Michael Krolak 91.113-031 Instructor: Patrick Krolak See also pkrolak/pkrolak

Effectiveness

Page 99: The Surveillance Society 91.113-021 Instructor: Michael Krolak 91.113-031 Instructor: Patrick Krolak See also pkrolak/pkrolak

Avoidance techniques

Page 100: The Surveillance Society 91.113-021 Instructor: Michael Krolak 91.113-031 Instructor: Patrick Krolak See also pkrolak/pkrolak

Applications:

• The London Congestion Zone– A daily fee ( £8 about $12 US) was created in 2003 to drive in central London.

• The fee is enforced by 230 CCTV cameras(180 on the roads entering and 50 in the interior).

• It is estimated that the use of ANPR catches 98% of violators.

http://en.wikipedia.org/wiki/London_Congestion_Charge#Technology_and_enforcement

Page 101: The Surveillance Society 91.113-021 Instructor: Michael Krolak 91.113-031 Instructor: Patrick Krolak See also pkrolak/pkrolak

ANPR Applications (more):

• Traffic management of flow and congestion.

• Monitor traffic for expired plates, license, warrants outstanding, etc.

• Collecting tolls• Speeding, reckless

driving, and other moving vehicle offences.

• Pursuit of criminals

http://en.wikipedia.org/wiki/London_Congestion_Charge#Technology_and_enforcement

Page 102: The Surveillance Society 91.113-021 Instructor: Michael Krolak 91.113-031 Instructor: Patrick Krolak See also pkrolak/pkrolak

Automate Number Plate Recognition (ANPR) – How it works

• ANPR works using CCTV cameras and Optical Character Recognition (OCR) to read the numbers on the license plate.

• The camera must be chosen to work with moving cars during night and bad weather.

• The cameras are mounted on fixed poles, stop lights and other structures. Mobile set ups and mounted on ANPR vehicles.

• The data is feed to a central database with information on registrations, insurance, etc. to insure the driver and vehicle are legal.

Page 103: The Surveillance Society 91.113-021 Instructor: Michael Krolak 91.113-031 Instructor: Patrick Krolak See also pkrolak/pkrolak

Surveillance Society References

• A well argued discussion on the British Surveillance Society http://www.ico.gov.uk/upload/documents/library/data_protection/practical_application/surveillance_society_full_report_2006.pdf

Page 104: The Surveillance Society 91.113-021 Instructor: Michael Krolak 91.113-031 Instructor: Patrick Krolak See also pkrolak/pkrolak

The United States

While the US has not been involved in terrorism for as long as the British, 911 was a major turning point. The War on Terrorism has seen the public demand that their government protect them.

Some feel that the government has traded security at the expense of constitutional privacies.

The anti-terrorism policy including the creation of the Department of Homeland Security with huge budgets for research, equipment, and personal.

Page 105: The Surveillance Society 91.113-021 Instructor: Michael Krolak 91.113-031 Instructor: Patrick Krolak See also pkrolak/pkrolak

Government Databases (DB)s

DARPA

NASA

Page 106: The Surveillance Society 91.113-021 Instructor: Michael Krolak 91.113-031 Instructor: Patrick Krolak See also pkrolak/pkrolak

DAPRA’s Total Information Awareness (TIA) – anti-terror surveillance

• Looking ahead to the possible implementation of the system by various U.S. counter intelligence agencies and policy-makers, DARPA did not propose any changes in the laws regulating government access to databases full of information about private commercial transactions, like airplane ticket purchases or apartment rentals.

• "The amounts of data that will need to be stored and accessed will be unprecedented, measured in petabytes," the agency instructions said. A byte amounts to the electronic representation of one letter of the alphabet, and a petabyte is a quadrillion -- 1,000,000,000,000,000 -- bytes.

• Conceived and managed by retired Adm. John Poindexter, the TIA surveillance system is based on his theory that "terrorists must engage in certain transactions to coordinate and conduct attacks against Americans, and these transactions form patterns that may be detectable."

• Other databases DARPA wants to make available to U.S. agents include financial, education, medical and housing records and biometric identification databases based on fingerprints, irises, facial shapes and gait.

Source: http://www.securityfocus.com/news/4944

Page 107: The Surveillance Society 91.113-021 Instructor: Michael Krolak 91.113-031 Instructor: Patrick Krolak See also pkrolak/pkrolak

Small facts create large databases and chains of evidence

• Debit cards like New York's E-ZPass deduct a fee as commuters zip through tollbooths and track our comings and goings on the road; Divorce lawyers are now subpoenaing these records to prove immoral behavior.

• Transit cards chart riders' subway journeys; employee ID cards can show when we arrived at work, when we left, and where we went within the office complex.

• Phone cards mark who we call and, often, from where. Credit card records etch us in time and space more reliably than any eyewitness.

• So do airline tickets - even if you pay cash. • And as for the cell phone: "If you turn it on, you can be tracked,"

says Jim Atkinson, a countersurveillance expert who is president of Granite Island Group in Gloucester, Massachusetts.

Source: http://www.wired.com/wired/archive/9.12/surveillance.html

Page 108: The Surveillance Society 91.113-021 Instructor: Michael Krolak 91.113-031 Instructor: Patrick Krolak See also pkrolak/pkrolak

Talon

• TALON (Threat and Local Observation Notice), is a database maintained by the Air Force after the September 11th terrorist attacks. It was created in 2002 by Deputy Defense Secretary Paul D. Wolfowitz, in order to collect and evaluate information about possible threats to U.S. servicemembers and civilian workers in the US and at overseas military installations. [1]The database included lists of anti-war groups and people who have attend anti-war rallies.[2]

• TALON reports are collected by various US Defense Department agencies including law enforcement, intelligence, counterintelligence and security, and are analyzed by a Pentagon agency, the Counterintelligence Field Activity. CIFA has existed since 2004, and its size and budget are secret. [3]

Page 109: The Surveillance Society 91.113-021 Instructor: Michael Krolak 91.113-031 Instructor: Patrick Krolak See also pkrolak/pkrolak

System for Alien Verification for Entitlements (SAVE)

• System for Alien Verification for Entitlements (SAVE) to verify the legal presence status of a non-citizen applying for a DL/ID

Page 110: The Surveillance Society 91.113-021 Instructor: Michael Krolak 91.113-031 Instructor: Patrick Krolak See also pkrolak/pkrolak

Corporations and massive databases

• Consumer loyalty cards (those plastic cards on key chains) trade our individual purchases.

• Credit and debit cards track the items and the amount of our purchases and the location –– Allows marketing to target the advertising to those

likely to buy.– Allows them to focus offers to loyal and credit worthy

clients and reduce the cost of bad debits.– Creates massive DBs that be datamined and

customer lists can be sold.

Page 111: The Surveillance Society 91.113-021 Instructor: Michael Krolak 91.113-031 Instructor: Patrick Krolak See also pkrolak/pkrolak

Libraries and bookstores

• The terrorists in 9-11 used the library and cyber cafes to send emails and coded messages to coordinate the attack.

• The Patriot Act -- libraries and bookstores can be required to surrender records of customer reading and computer usage. Librarian organizations opposed this as an attack on individual privacy.

Page 112: The Surveillance Society 91.113-021 Instructor: Michael Krolak 91.113-031 Instructor: Patrick Krolak See also pkrolak/pkrolak

Tracking Vehicles

• OnStar, GM's onboard communications system, offers a GPS service to its 1.5 million customers. OnStar can locate each of those 1.5 million cars. (OnStar will track a car only at the request of the driver or, in some instances, the police; the company keeps no historical database of car locations, though if it had the inclination - or was pressured - to gather and store reams of data, it could.)

• Mercedes' TeleAid and Ford's Wingcast provide similar services.

• AirIQ, which Hertz, Avis, and Budget use for their premium fleets: If a car is abandoned, AirIQ can locate it; if it's stolen, the company can disable its motor.

Page 113: The Surveillance Society 91.113-021 Instructor: Michael Krolak 91.113-031 Instructor: Patrick Krolak See also pkrolak/pkrolak

Chicago has been a leader in experimentation

• Chicago is looking for companies interested in putting cameras on all 118 street sweepers.

• A posting on the city's Web site states that every street sweeper would be equipped with a pair of cameras -- one to capture the image of "the illegally parked vehicle and its surroundings," the other to take a picture of the license plate.

Video evidence would be forwarded to the city's Department of Revenue daily, then mailed to motorists along with the $50 ticket. Contractors would be paid an unidentified fee "for each enforceable citation."

Source: http://www.suntimes.com/news/metro/610898,CST-NWS-sweep19.article

Three years after Mayor Daley first raised the idea, City Hall is interested in providing "high-resolution digital cameras" for street sweepers

Page 114: The Surveillance Society 91.113-021 Instructor: Michael Krolak 91.113-031 Instructor: Patrick Krolak See also pkrolak/pkrolak

Urban police use in vehicle cameras

• Patrol car cameras can record incidents, stops, and arrests. Helps to get guilty pleas and create evidence.

• Many urban patrol cars have cameras with ANPR capabilities to record parked and moving vehicles. If the vehicle is involved in an Amber Alerts and other incidents, parking violations, etc. the message is sent to the patrol car’s laptop and alerts the officer.

Source: http://www.norfolk.police.uk/article.cfm?artID=6637&catID=810&bctrail=0

Page 115: The Surveillance Society 91.113-021 Instructor: Michael Krolak 91.113-031 Instructor: Patrick Krolak See also pkrolak/pkrolak

Texas Border Security Cams

• The governor of Texas set up a trial program that used web cams along the border and asked private citizens to watch them and report suspicious activity.

Source: Texas Virtual Neighborhood Border Watch Program

Page 116: The Surveillance Society 91.113-021 Instructor: Michael Krolak 91.113-031 Instructor: Patrick Krolak See also pkrolak/pkrolak

Results of the Texas Border study

• Results on the test site from Nov. 3- 30, 2006 – ~220,000 users registered– 28 Million hits– 8-12 cameras operated along 1200 mile border in 4

counties.– 14,800 Emails from web watchers helped to chase

some illegal entrants– Caught 10 illegals and one drug bust and stopped a

smuggling route– Cost of the trial -- $200,000 – Test was a feasibility test for a full blown deployment

that will cost $5M.FOX NEWS.Com -Report: Border Camera Tests Show Little

Tuesday, January 09, 2007

Page 117: The Surveillance Society 91.113-021 Instructor: Michael Krolak 91.113-031 Instructor: Patrick Krolak See also pkrolak/pkrolak

Passports and other forms of Identity

The modern passport and visaBorder crossing ID for frequent travelers Driver’s licensesNational Identity cards

Page 118: The Surveillance Society 91.113-021 Instructor: Michael Krolak 91.113-031 Instructor: Patrick Krolak See also pkrolak/pkrolak

TSA and Travelers

Page 119: The Surveillance Society 91.113-021 Instructor: Michael Krolak 91.113-031 Instructor: Patrick Krolak See also pkrolak/pkrolak

CAPPS II and Secure Flight

• http://www.eff.org/issues/travel-screening

Page 120: The Surveillance Society 91.113-021 Instructor: Michael Krolak 91.113-031 Instructor: Patrick Krolak See also pkrolak/pkrolak

RFID privacy issues for border crossing id

• But the upcoming People Access Security Service card, referred to as the PASS card, which will be issued to U.S. citizens who frequently cross the borders with Canada and Mexico, is likely to have different privacy considerations.

• Like the RFID-enabled e-passport it resembles, the card, which DHS and the State Department will issue, can contain personal information. If the PASS card is RFID-enabled—and no decision has been made yet—it could require greater privacy protections and a more restrictive reading distance to protect privacy.

• A reader 35 feet overhead wirelessly scans the documents while visitors leave the United States in their vehicles. Readers mounted several feet away along traffic lanes again scan the documents when visitors re-enter the country.

Source: http://www.gcn.com/print/25_8/40409-1.html?topic=RFID

Page 121: The Surveillance Society 91.113-021 Instructor: Michael Krolak 91.113-031 Instructor: Patrick Krolak See also pkrolak/pkrolak

e-passport

Page 122: The Surveillance Society 91.113-021 Instructor: Michael Krolak 91.113-031 Instructor: Patrick Krolak See also pkrolak/pkrolak

Webcam watching

Page 123: The Surveillance Society 91.113-021 Instructor: Michael Krolak 91.113-031 Instructor: Patrick Krolak See also pkrolak/pkrolak

Washington State DOT/ITS

• The state of Washington DOT and Intelligent Transportation Systems has a number of interesting projects to provide real time traffic highway speed and flow.

• One technique uses cameras to estimate the speed.

Source: http://www.wsdot.wa.gov/traffic/seattle/i5_128th.htm

Page 124: The Surveillance Society 91.113-021 Instructor: Michael Krolak 91.113-031 Instructor: Patrick Krolak See also pkrolak/pkrolak

Public Traffic Cams

• Trafficland.com allows access to traffic cams all over the world

• Allows the viewer to register and get a collection of cameras that are of interest.

• Can be used to see what the traffic might be on the way to work and/or the weather.

Source: http://www.trafficland.com/

Page 125: The Surveillance Society 91.113-021 Instructor: Michael Krolak 91.113-031 Instructor: Patrick Krolak See also pkrolak/pkrolak

Surveillance Society References

Page 126: The Surveillance Society 91.113-021 Instructor: Michael Krolak 91.113-031 Instructor: Patrick Krolak See also pkrolak/pkrolak

Balancing Security and Civil Liberties

Source: Weimann, G. “Terror on the Internet”, Chap 7, pp203-240, United States Institute of Peace Press, (2006).

Page 127: The Surveillance Society 91.113-021 Instructor: Michael Krolak 91.113-031 Instructor: Patrick Krolak See also pkrolak/pkrolak

Privacy and Security References

• Holtzman, D, “Privacy lost : how technology is endangering your privacy”, Jossey-Bass, (2006).