Skip to main content

Home/ Dystopias/ Group items matching "policing" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
Ed Webb

AI Causes Real Harm. Let's Focus on That over the End-of-Humanity Hype - Scientific American - 0 views

  • Wrongful arrests, an expanding surveillance dragnet, defamation and deep-fake pornography are all actually existing dangers of so-called “artificial intelligence” tools currently on the market. That, and not the imagined potential to wipe out humanity, is the real threat from artificial intelligence.
  • Beneath the hype from many AI firms, their technology already enables routine discrimination in housing, criminal justice and health care, as well as the spread of hate speech and misinformation in non-English languages. Already, algorithmic management programs subject workers to run-of-the-mill wage theft, and these programs are becoming more prevalent.
  • Corporate AI labs justify this posturing with pseudoscientific research reports that misdirect regulatory attention to such imaginary scenarios using fear-mongering terminology, such as “existential risk.”
  • ...9 more annotations...
  • Because the term “AI” is ambiguous, it makes having clear discussions more difficult. In one sense, it is the name of a subfield of computer science. In another, it can refer to the computing techniques developed in that subfield, most of which are now focused on pattern matching based on large data sets and the generation of new media based on those patterns. Finally, in marketing copy and start-up pitch decks, the term “AI” serves as magic fairy dust that will supercharge your business.
  • output can seem so plausible that without a clear indication of its synthetic origins, it becomes a noxious and insidious pollutant of our information ecosystem
  • Not only do we risk mistaking synthetic text for reliable information, but also that noninformation reflects and amplifies the biases encoded in its training data—in this case, every kind of bigotry exhibited on the Internet. Moreover the synthetic text sounds authoritative despite its lack of citations back to real sources. The longer this synthetic text spill continues, the worse off we are, because it gets harder to find trustworthy sources and harder to trust them when we do.
  • the people selling this technology propose that text synthesis machines could fix various holes in our social fabric: the lack of teachers in K–12 education, the inaccessibility of health care for low-income people and the dearth of legal aid for people who cannot afford lawyers, just to name a few
  • the systems rely on enormous amounts of training data that are stolen without compensation from the artists and authors who created it in the first place
  • the task of labeling data to create “guardrails” that are intended to prevent an AI system’s most toxic output from seeping out is repetitive and often traumatic labor carried out by gig workers and contractors, people locked in a global race to the bottom for pay and working conditions.
  • employers are looking to cut costs by leveraging automation, laying off people from previously stable jobs and then hiring them back as lower-paid workers to correct the output of the automated systems. This can be seen most clearly in the current actors’ and writers’ strikes in Hollywood, where grotesquely overpaid moguls scheme to buy eternal rights to use AI replacements of actors for the price of a day’s work and, on a gig basis, hire writers piecemeal to revise the incoherent scripts churned out by AI.
  • too many AI publications come from corporate labs or from academic groups that receive disproportionate industry funding. Much is junk science—it is nonreproducible, hides behind trade secrecy, is full of hype and uses evaluation methods that lack construct validity
  • We urge policymakers to instead draw on solid scholarship that investigates the harms and risks of AI—and the harms caused by delegating authority to automated systems, which include the unregulated accumulation of data and computing power, climate costs of model training and inference, damage to the welfare state and the disempowerment of the poor, as well as the intensification of policing against Black and Indigenous families. Solid research in this domain—including social science and theory building—and solid policy based on that research will keep the focus on the people hurt by this technology.
Ed Webb

Lack of Transparency over Police Forces' Covert Use of Predictive Policing Software Raises Concerns about Human Rights Abuses - Byline Times - 0 views

  • Currently, through the use of blanket exemption clauses – and without any clear legislative oversight – public access to information on systems that may be being used to surveil them remains opaque. Companies including Palantir, NSO Group, QuaDream, Dark Matter and Gamma Group are all exempt from disclosure under the precedent set by the police, along with another entity, Dataminr.
  • has helped police in the US monitor and break up Black Lives Matter and Muslim rights activism through social media monitoring. Dataminr software has also been used by the Ministry of Defence, Foreign Commonwealth and Development Office, and the Cabinet Office,
  • New research shows that, far from being a ‘neutral’ observational tool, Dataminr produces results that reflect its clients’ politics, business goals and ways of operating.
  • ...3 more annotations...
  • teaching the software to associate certain kinds of images, text and hashtags with a ‘dangerous’ protest results in politically and racially-biased definitions of what dangerous protests look like. This is because, to make these predictions, the system has to decide whether the event resembles other previous events that were labelled ‘dangerous’ – for example, past BLM protests. 
  • When in 2016 the ACLU proved that Dataminr’s interventions were contributing to racist policing, the company was subsequently banned from granting fusion centres in the US direct access to Twitter’s API. Fusion centres are state-owned and operated facilities and serve as focal points to gather, analyse and redistribute intelligence among state, local, tribal and territorial (SLTT), federal and private sector partners to detect criminal and terrorist activity.  However, US law enforcement found  a way around these limitations by continuing to receive Dataminr alerts outside of fusion centres.
  • Use of these technologies have, in the past, not been subject to public consultation and, without basic scrutiny at either a public or legislative level, there remains no solid mechanism for independent oversight of their use by law enforcement.
Ed Webb

Iran Says Face Recognition Will ID Women Breaking Hijab Laws | WIRED - 0 views

  • After Iranian lawmakers suggested last year that face recognition should be used to police hijab law, the head of an Iranian government agency that enforces morality law said in a September interview that the technology would be used “to identify inappropriate and unusual movements,” including “failure to observe hijab laws.” Individuals could be identified by checking faces against a national identity database to levy fines and make arrests, he said.
  • Iran’s government has monitored social media to identify opponents of the regime for years, Grothe says, but if government claims about the use of face recognition are true, it’s the first instance she knows of a government using the technology to enforce gender-related dress law.
  • Mahsa Alimardani, who researches freedom of expression in Iran at the University of Oxford, has recently heard reports of women in Iran receiving citations in the mail for hijab law violations despite not having had an interaction with a law enforcement officer. Iran’s government has spent years building a digital surveillance apparatus, Alimardani says. The country’s national identity database, built in 2015, includes biometric data like face scans and is used for national ID cards and to identify people considered dissidents by authorities.
  • ...5 more annotations...
  • Decades ago, Iranian law required women to take off headscarves in line with modernization plans, with police sometimes forcing women to do so. But hijab wearing became compulsory in 1979 when the country became a theocracy.
  • Shajarizadeh and others monitoring the ongoing outcry have noticed that some people involved in the protests are confronted by police days after an alleged incident—including women cited for not wearing a hijab. “Many people haven't been arrested in the streets,” she says. “They were arrested at their homes one or two days later.”
  • Some face recognition in use in Iran today comes from Chinese camera and artificial intelligence company Tiandy. Its dealings in Iran were featured in a December 2021 report from IPVM, a company that tracks the surveillance and security industry.
  • US Department of Commerce placed sanctions on Tiandy, citing its role in the repression of Uyghur Muslims in China and the provision of technology originating in the US to Iran’s Revolutionary Guard. The company previously used components from Intel, but the US chipmaker told NBC last month that it had ceased working with the Chinese company.
  • When Steven Feldstein, a former US State Department surveillance expert, surveyed 179 countries between 2012 and 2020, he found that 77 now use some form of AI-driven surveillance. Face recognition is used in 61 countries, more than any other form of digital surveillance technology, he says.
Ed Webb

DHS built huge database from cellphones, computers seized at border - The Washington Post - 0 views

  • U.S. government officials are adding data from as many as 10,000 electronic devices each year to a massive database they’ve compiled from cellphones, iPads and computers seized from travelers at the country’s airports, seaports and border crossings, leaders of Customs and Border Protection told congressional staff in a briefing this summer.WpGet the full experience.Choose your planArrowRightThe rapid expansion of the database and the ability of 2,700 CBP officers to access it without a warrant — two details not previously known about the database — have raised alarms in Congress
  • captured from people not suspected of any crime
  • many Americans may not understand or consent to
  • ...6 more annotations...
  • the revelation that thousands of agents have access to a searchable database without public oversight is a new development in what privacy advocates and some lawmakers warn could be an infringement of Americans’ Fourth Amendment rights against unreasonable searches and seizures.
  • CBP officials declined, however, to answer questions about how many Americans’ phone records are in the database, how many searches have been run or how long the practice has gone on, saying it has made no additional statistics available “due to law enforcement sensitivities and national security implications.”
  • Law enforcement agencies must show probable cause and persuade a judge to approve a search warrant before searching Americans’ phones. But courts have long granted an exception to border authorities, allowing them to search people’s devices without a warrant or suspicion of a crime.
  • The CBP directive gives officers the authority to look and scroll through any traveler’s device using what’s known as a “basic search,” and any traveler who refuses to unlock their phone for this process can have it confiscated for up to five days.
  • CBP officials give travelers a printed document saying that the searches are “mandatory,” but the document does not mention that data can be retained for 15 years and that thousands of officials will have access to it.
  • Officers are also not required to give the document to travelers before the search, meaning that some travelers may not fully understand their rights to refuse the search until after they’ve handed over their phones
Ed Webb

Elise Armani with Piotr Szyhalski - The Brooklyn Rail - 0 views

  • During the entire history of America, the US has not been at war for 17 years. That's incredible, mainly because if you talk to people who maybe aren't that much that interested in history, they would say, “That’s crazy. What are you talking about? There’s no war.”
  • Our relationship with war and how our country functions in the world is so warped and twisted. Every time the word “war” is introduced into the cultural discourse, you know that it is already corrupted. That's why it’s paired here with “back to normal,” because it's another combination of phrases that stood out…Everybody keeps talking about things getting back to normal. Then the pronouncements that this is a war and we’re fighting an invisible enemy. It just seems so disturbing really because what that means is that we're about to start doing things that are ethically questionable. To me, what was happening is that the pronouncement was made so that anything goes, and there's no culpability, nobody will be held responsible for making any decisions whatsoever because it was war and things had to be done.
  • if I think about how “war” has been used strategically in this context of COVID-19, it doesn’t feel like rhetoric that was raised to be alarmist, but almost to be comforting. That this is a familiar experience. We have a handle on it. We are attacking it like a war. War is our normal.
  • ...8 more annotations...
  • The funny thing about history is that you always look back from the luxury of time and you can see these massive events taking place, you can understand the dynamics. We don't have that perspective when we are in it, so my idea of studying history was to remap the past onto the present, so that we might gain insight into what’s happening now.
  • This weird concept that we have developed, essential, non-essential work, this arbitrary division of what will matter and what will not matter. It wasn't until I was swept up in the uprising and really asking myself what's happening—there was this amazing video of this silent moment of people with their fists up, thousands of people on their knees, and it was just incredibly moving—I had this realization that this was the essential work, the work that we need to be doing.
  • I think we all lack a historical distance right now to make sense of this moment. But art can provide us with an abstracted or a historical lens, that gives us distance or a sense of a time bigger than the moment we're in.
  • When you were describing this 1990s utopian idea of the internet as public space, I was struck by the contrast with how things turned out. In both our physical and digital reality, we have lost the commons. Is Instagram a public space?
  • there's something virus-like about social media anyway, in the way that it operates, in the way that it taps into our physiology on a chemical level in our brain. It’s designed to function that way. And combining that kind of functionality with our addiction to or the dominance of visual culture, it's just sort of like a deadly combination. We get addicted and we just consume incredible amounts of visual information every day.
  • It really is true that very rarely you will see a photograph of a dead body in the printed newspaper. It reminds me, for example, of the absence of the flag-draped coffins that come when soldiers return from war. Because we're taught to think about COVID-19 as a kind of war, maybe it makes sense to really think about that.
  • If you don't see the picture of the dead body, there's no dead body. It's the reason why if I teach a foundation class, I always show the students this famous Stan Brakhage film, The Act of Seeing with One's Own Eyes (1971). It’s a half hour silent film of multiple autopsies. We have this extended conversation about just how completely absent images of our bodies like that are from our cultural experience.
  • those are the images that people wanted to see. They were widely distributed; you could buy postcards of lynched men and women because people wanted to celebrate that. There is a completely different attitude at work. One could say they're doing the work of the same ideology, but in opposite directions. It would be hard to talk about a history of photography in this country and not talk about lynching photographs.
Ed Webb

Nine million logs of Brits' road journeys spill onto the internet from password-less number-plate camera dashboard * The Register - 0 views

  • In a blunder described as "astonishing and worrying," Sheffield City Council's automatic number-plate recognition (ANPR) system exposed to the internet 8.6 million records of road journeys made by thousands of people
  • The Register learned of the unprotected dashboard from infosec expert and author Chris Kubecka, working with freelance writer Gerard Janssen, who stumbled across it using search engine Censys.io. She said: "Was the public ever told the system would be in place and that the risks were reasonable? Was there an opportunity for public discourse – or, like in Hitchhiker's Guide to the Galaxy, were the plans in a planning office at an impossible or undisclosed location?"
  • The dashboard was taken offline within a few hours of The Register alerting officials. Sheffield City Council and South Yorkshire Police added: "As soon as this was brought to our attention we took action to deal with the immediate risk and ensure the information was no longer viewable externally. Both Sheffield City Council and South Yorkshire Police have also notified the Information Commissioner's Office. We will continue to investigate how this happened and do everything we can to ensure it will not happen again."
Ed Webb

What we still haven't learned from Gamergate - Vox - 0 views

  • Harassment and misogyny had been problems in the community for years before this; the deep resentment and anger toward women that powered Gamergate percolated for years on internet forums. Robert Evans, a journalist who specializes in extremist communities and the host of the Behind the Bastards podcast, described Gamergate to me as partly organic and partly born out of decades-long campaigns by white supremacists and extremists to recruit heavily from online forums. “Part of why Gamergate happened in the first place was because you had these people online preaching to these groups of disaffected young men,” he said. But what Gamergate had that those previous movements didn’t was an organized strategy, made public, cloaking itself as a political movement with a flimsy philosophical stance, its goals and targets amplified by the power of Twitter and a hashtag.
  • The hate campaign, we would later learn, was the moment when our ability to repress toxic communities and write them off as just “trolls” began to crumble. Gamergate ultimately gave way to something deeper, more violent, and more uncontrollable.
  • Police have to learn how to keep the rest of us safe from internet mobs
  • ...20 more annotations...
  • the justice system continues to be slow to understand the link between online harassment and real-life violence
  • In order to increase public safety this decade, it is imperative that police — and everyone else — become more familiar with the kinds of communities that engender toxic, militant systems of harassment, and the online and offline spaces where these communities exist. Increasingly, that means understanding social media’s dark corners, and the types of extremism they can foster.
  • Businesses have to learn when online outrage is manufactured
  • There’s a difference between organic outrage that arises because an employee actually does something outrageous, and invented outrage that’s an excuse to harass someone whom a group has already decided to target for unrelated reasons — for instance, because an employee is a feminist. A responsible business would ideally figure out which type of outrage is occurring before it punished a client or employee who was just doing their job.
  • Social media platforms didn’t learn how to shut down disingenuous conversations over ethics and free speech before they started to tear their cultures apart
  • Dedication to free speech over the appearance of bias is especially important within tech culture, where a commitment to protecting free speech is both a banner and an excuse for large corporations to justify their approach to content moderation — or lack thereof.
  • Reddit’s free-speech-friendly moderation stance resulted in the platform tacitly supporting pro-Gamergate subforums like r/KotakuInAction, which became a major contributor to Reddit’s growing alt-right community. Twitter rolled out a litany of moderation tools in the wake of Gamergate, intended to allow harassment targets to perpetually block, mute, and police their own harassers — without actually effectively making the site unwelcome for the harassers themselves. And YouTube and Facebook, with their algorithmic amplification of hateful and extreme content, made no effort to recognize the violence and misogyny behind pro-Gamergate content, or police them accordingly.
  • All of these platforms are wrestling with problems that seem to have grown beyond their control; it’s arguable that if they had reacted more swiftly to slow the growth of the internet’s most toxic and misogynistic communities back when those communities, particularly Gamergate, were still nascent, they could have prevented headaches in the long run — and set an early standard for how to deal with ever-broadening issues of extremist content online.
  • Violence against women is a predictor of other kinds of violence. We need to acknowledge it.
  • Somehow, the idea that all of that sexism and anti-feminist anger could be recruited, harnessed, and channeled into a broader white supremacist movement failed to generate any real alarm, even well into 2016
  • many of the perpetrators of real-world violence are radicalized online first
  • It remains difficult for many to accept the throughline from online abuse to real-world violence against women, much less the fact that violence against women, online and off, is a predictor of other kinds of real-world violence
  • Politicians and the media must take online “ironic” racism and misogyny seriously
  • Gamergate masked its misogyny in a coating of shrill yelling that had most journalists in 2014 writing off the whole incident as “satirical” and immature “trolling,” and very few correctly predicting that Gamergate’s trolling was the future of politics
  • Gamergate was all about disguising a sincere wish for violence and upheaval by dressing it up in hyperbole and irony in order to confuse outsiders and make it all seem less serious.
  • Gamergate simultaneously masqueraded as legitimate concern about ethics that demanded audiences take it seriously, and as total trolling that demanded audiences dismiss it entirely. Both these claims served to obfuscate its real aim — misogyny, and, increasingly, racist white supremacy
  • The public’s failure to understand and accept that the alt-right’s misogyny, racism, and violent rhetoric is serious goes hand in hand with its failure to understand and accept that such rhetoric is identical to that of President Trump
  • deploying offensive behavior behind a guise of mock outrage, irony, trolling, and outright misrepresentation, in order to mask the sincere extremism behind the message.
  • many members of the media, politicians, and members of the public still struggle to accept that Trump’s rhetoric is having violent consequences, despite all evidence to the contrary.
  • The movement’s insistence that it was about one thing (ethics in journalism) when it was about something else (harassing women) provided a case study for how extremists would proceed to drive ideological fissures through the foundations of democracy: by building a toxic campaign of hate beneath a veneer of denial.
Ed Webb

Border Patrol, Israel's Elbit Put Reservation Under Surveillance - 0 views

  • The vehicle is parked where U.S. Customs and Border Protection will soon construct a 160-foot surveillance tower capable of continuously monitoring every person and vehicle within a radius of up to 7.5 miles. The tower will be outfitted with high-definition cameras with night vision, thermal sensors, and ground-sweeping radar, all of which will feed real-time data to Border Patrol agents at a central operating station in Ajo, Arizona. The system will store an archive with the ability to rewind and track individuals’ movements across time — an ability known as “wide-area persistent surveillance.” CBP plans 10 of these towers across the Tohono O’odham reservation, which spans an area roughly the size of Connecticut. Two will be located near residential areas, including Rivas’s neighborhood, which is home to about 50 people. To build them, CBP has entered a $26 million contract with the U.S. division of Elbit Systems, Israel’s largest military company.
  • U.S. borderlands have become laboratories for new systems of enforcement and control
  • these same systems often end up targeting other marginalized populations as well as political dissidents
  • ...16 more annotations...
  • the spread of persistent surveillance technologies is particularly worrisome because they remove any limit on how much information police can gather on a person’s movements. “The border is the natural place for the government to start using them, since there is much more public support to deploy these sorts of intrusive technologies there,”
  • the company’s ultimate goal is to build a “layer” of electronic surveillance equipment across the entire perimeter of the U.S. “Over time, we’ll expand not only to the northern border, but to the ports and harbors across the country,”
  • In addition to fixed and mobile surveillance towers, other technology that CBP has acquired and deployed includes blimps outfitted with high-powered ground and air radar, sensors buried underground, and facial recognition software at ports of entry. CBP’s drone fleet has been described as the largest of any U.S. agency outside the Department of Defense
  • Nellie Jo David, a Tohono O’odham tribal member who is writing her dissertation on border security issues at the University of Arizona, says many younger people who have been forced by economic circumstances to work in nearby cities are returning home less and less, because they want to avoid the constant surveillance and harassment. “It’s especially taken a toll on our younger generations.”
  • Border militarism has been spreading worldwide owing to neoliberal economic policies, wars, and the onset of the climate crisis, all of which have contributed to the uprooting of increasingly large numbers of people, notes Reece Jones
  • In the U.S., leading companies with border security contracts include long-established contractors such as Lockheed Martin in addition to recent upstarts such as Anduril Industries, founded by tech mogul Palmer Luckey to feed the growing market for artificial intelligence and surveillance sensors — primarily in the borderlands. Elbit Systems has frequently touted a major advantage over these competitors: the fact that its products are “field-proven” on Palestinians
  • Verlon Jose, then-tribal vice chair, said that many nation members calculated that the towers would help dissuade the federal government from building a border wall across their lands. The Tohono O’odham are “only as sovereign as the federal government allows us to be,”
  • Leading Democrats have argued for the development of an ever-more sophisticated border surveillance state as an alternative to Trump’s border wall. “The positive, shall we say, almost technological wall that can be built is what we should be doing,” House Speaker Nancy Pelosi said in January. But for those crossing the border, the development of this surveillance apparatus has already taken a heavy toll. In January, a study published by researchers from the University of Arizona and Earlham College found that border surveillance towers have prompted migrants to cross along more rugged and circuitous pathways, leading to greater numbers of deaths from dehydration, exhaustion, and exposure.
  • “Walls are not only a question of blocking people from moving, but they are also serving as borders or frontiers between where you enter the surveillance state,” she said. “The idea is that at the very moment you step near the border, Elbit will catch you. Something similar happens in Palestine.”
  • CBP is by far the largest law enforcement entity in the U.S., with 61,400 employees and a 2018 budget of $16.3 billion — more than the militaries of Iran, Mexico, Israel, and Pakistan. The Border Patrol has jurisdiction 100 miles inland from U.S. borders, making roughly two-thirds of the U.S. population theoretically subject to its operations, including the entirety of the Tohono O’odham reservation
  • Between 2013 and 2016, for example, roughly 40 percent of Border Patrol seizures at immigration enforcement checkpoints involved 1 ounce or less of marijuana confiscated from U.S. citizens.
  • the agency uses its sprawling surveillance apparatus for purposes other than border enforcement
  • documents obtained via public records requests suggest that CBP drone flights included surveillance of Dakota Access pipeline protests
  • CBP’s repurposing of the surveillance tower and drones to surveil dissidents hints at other possible abuses. “It’s a reminder that technologies that are sold for one purpose, such as protecting the border or stopping terrorists — or whatever the original justification may happen to be — so often get repurposed for other reasons, such as targeting protesters.”
  • The impacts of the U.S. border on Tohono O’odham people date to the mid-19th century. The tribal nation’s traditional land extended 175 miles into Mexico before being severed by the 1853 Gadsden Purchase, a U.S. acquisition of land from the Mexican government. As many as 2,500 of the tribe’s more than 30,000 members still live on the Mexican side. Tohono O’odham people used to travel between the United States and Mexico fairly easily on roads without checkpoints to visit family, perform ceremonies, or obtain health care. But that was before the Border Patrol arrived en masse in the mid-2000s, turning the reservation into something akin to a military occupation zone. Residents say agents have administered beatings, used pepper spray, pulled people out of vehicles, shot two Tohono O’odham men under suspicious circumstances, and entered people’s homes without warrants. “It is apartheid here,” Ofelia Rivas says. “We have to carry our papers everywhere. And everyone here has experienced the Border Patrol’s abuse in some way.”
  • Tohono O’odham people have developed common cause with other communities struggling against colonization and border walls. David is among numerous activists from the U.S. and Mexican borderlands who joined a delegation to the West Bank in 2017, convened by Stop the Wall, to build relationships and learn about the impacts of Elbit’s surveillance systems. “I don’t feel safe with them taking over my community, especially if you look at what’s going on in Palestine — they’re bringing the same thing right over here to this land,” she says. “The U.S. government is going to be able to surveil basically anybody on the nation.”
Ed Webb

America's Forgotten Mass Imprisonment of Women Believed to Be Sexually Immoral - HISTORY - 0 views

  • the “American Plan.” From the 1910s through the 1950s, and in some places into the 1960s and 1970s, tens of thousands—perhaps hundreds of thousands—of American women were detained and forcibly examined for STIs. The program was modeled after similar ones in Europe, under which authorities stalked “suspicious” women, arresting, testing and imprisoning them.
  • If the women tested positive, U.S. officials locked them away in penal institutions with no due process. While many records of the program have since been lost or destroyed, women’s forced internment could range from a few days to many months. Inside these institutions, records show, the women were often injected with mercury and forced to ingest arsenic-based drugs, the most common treatments for syphilis in the early part of the century. If they misbehaved, or if they failed to show “proper” ladylike deference, these women could be beaten, doused with cold water, thrown into solitary confinement—or even sterilized.
  • beginning in 1918, federal officials began pushing every state in the nation to pass a “model law,” which enabled officials to forcibly examine any person “reasonably suspected” of having an STI. Under this statute, those who tested positive for an STI could be held in detention for as long as it took to render him or her noninfectious. (On paper, the law was gender-neutral; in practice, it almost exclusively focused on regulating women and their bodies.)
  • ...4 more annotations...
  • In all, the morals squad arrested 22 women on February 25, all for the crime of suspicion of STIs. But because Margaret Hennessey alone of these women gave a statement to the newspapers, it is her story that exemplifies the rest.The STI examinations showed that neither Hennessey nor Bradich had an STI, and officers released them at about 8:00 pm, with orders to appear for court the next morning. At 9:30 a.m., Hennessey stormed into court—ready, she declared to the Sacramento Bee, to “defend myself,” but “I would have no chance.” She was informed the charges had been dismissed. Nonetheless, the arrest left a mark. “I dare not venture on the streets,” she told the Bee later that day, “for fear I will be arrested again.”
  • Nearly every person examined and locked up under these laws was a woman. And the vague standard of “reasonable suspicion” enabled officials to pretty much detain any woman they wanted. Records exist in archives that document women being detained and examined for sitting at a restaurant alone; for changing jobs; for being with a man; for walking down a street in a way a male official found suspicious; and, often, for no reason at all.
  • Many women were also detained if they refused to have sex with police or health officers, contemporaneous exposés reveal. In the late 1940s, San Francisco police officers sometimes threatened to have women “vagged”—vaginally examined—if they didn’t accede to sexual demands. Women of color and immigrant women, in particular, were targeted—and subjected to a higher degree of abuse once they were locked up.
  • the American Plan laws—the ones passed in the late 1910s, enabling officials to examine people merely “reasonably suspected” of having STIs—are still on the books, in some form, in every state in the nation. Some of these laws have been altered or amended, and some have been absorbed into broader public-health statutes, but each state still has the power to examine “reasonably suspected” people and isolate the infected ones, if health officials deem such isolation necessary.
Ed Webb

Drone warfare's deadly civilian toll: a very personal view | James Jeffrey | Comment is free | guardian.co.uk - 0 views

  • Both Pakistan and Yemen are arguably less stable and more hostile to the west as a result of President Obama's increased reliance on drones. When surveying the poisoned legacy left to the Iraqi people, and what will be left to the Afghan people, it's beyond depressing to hear of the hawks circling around other theatres like Pakistan and Yemen, stoking the flames of interventionism.I fear the folly in which I took part will never end, and society will be irreversibly enmeshed in what George Orwell's 1984 warned of: constant wars against the Other, in order to forge false unity and fealty to the state.
  • in Afghanistan, the linguistic corruption that always attends war meant we'd refer to "hot spots", "multiple pax on the ground" and "prosecuting a target", or "maximising the kill chain".
  • encroachment of drones into the civilian realm is also gaining momentum. President Obama signed a federal law on 14 February 2012, allowing drones for a variety of commercial uses and for police law enforcement. The skies above may never be the same. As with most of America's darker elements, such as its gun culture, there's profit to be made – the market for drones is already valued at $5.9bn and is expected to double in 10 years.
  • ...1 more annotation...
  • Technological advancements in warfare don't have a good track record in terms of unintended consequences
Ed Webb

Obama and the Age of Surveillance | Indypendent Reader - 0 views

  • “Flowing through its servers and routers and stored in near-bottomless databases will be all forms of communication, including the complete contents of private emails, cell phone calls, and Google searches, as well as all sorts of personal data trails—parking receipts, travel itineraries, bookstore purchases, and other digital 'pocket litter.'”
  • To be fair, the US government has given significant contributions to the research and development of free speech and anonymity technologies, such as the Tor Project.[26] Technologies created and fostered by the US government have been invaluable in the fight for freedom all around the globe. After all, it was the US military that created the precursor to the internet, called ARPANET. But without the ability to be accountable for its own crimes, and to protect the rights of those in opposition to its own policies, the US continues its greatest tradition of hypocrisy. The Obama administration lifts up the struggles of those fighting its enemies with one hand, while attacking those who speak up about injustices of US-sponsored regimes with the other. All the while, it is slowly and secretly building up its omni-present police state at home.
1 - 20 of 31 Next ›
Showing 20 items per page