Skip to main content

Home/ Digit_al Society/ Group items tagged surveillance location

Rss Feed Group items tagged

dr tech

Still flattening the curve?: Increased risk of digital authoritarianism after... - 0 views

  •  
    "The main rationale for increasing state surveillance was to tackle the pandemic effectively to save people's lives. Yet, states are not enthusiastic about abandoning these digital tools, even though the pandemic is winding down. Instead, they are determined to preserve their surveillance capacities under the pretext of national security or preparation for future pandemics. In the face of increasing state surveillance, however, we should thoroughly discuss the risk of digital authoritarianism and the possible use of surveillance technologies to violate privacy, silence political opposition, and oppress minorities. For example, South Korea's sophisticated contact tracing technology that involves surveillance camera footage, cell-phone location data, and credit card purchases has disclosed patients' personal information, such as nationality. It raised privacy concerns, particularly for ethnic minorities, and underlined the risk of technology-enabled ethnic mapping and discrimination."
dr tech

Digital surveillance and the specter of AI in Mexico · Global Voices Advox - 0 views

  •  
    "The problem extends beyond the Pegasus project. Installed in Mexico City is one of the largest urban surveillance systems in the Americas: El Centro de Comando, Control, Cómputo, Comunicaciones y Contacto Ciudadano, better known as El C5. The network, connected to panic buttons and command centers, is spread over 1,485 kilometers with software designed to automatically detect license plates. On top of that, the number of installed cameras grew from 18 million to 65 million between 2018 and 2022, with stated plans to add at least an additional 16 million more. Despite its apparent pre-eminence, issues have arisen with the C5, from false identifications to mishandling of personal data. Technological malfunctions have also been shown to impact the outcomes of criminal cases because of the assumption of objectivity that video surveillance supposedly construes. The sprawling C5 system is dwarfed only by the Titan, an expansive intelligence and security database, both in terms of scale and threat to civil liberties. The software is used by several Mexican state governments to combine location data with other private information, including financial, government, and telecom data, to geolocate individuals across the country in real time. Governmental officials have been criticized for the controversial use of the database to target public figures, but, more problematically, access to Titan-enabled intel can be gained through an underground market, making it a further liability. The extent to which artificial intelligence has been incorporated into the C5 and Titan is still not clear, but the specter of surveillance remains large and is set to cause more worries with the addition of new smart technologies."
dr tech

MPs and peers call for 'immediate stop' to live facial recognition surveillance | Facia... - 0 views

  •  
    "The campaign is spearheaded by the privacy advocate Big Brother Watch and is also backed by 31 groups including Liberty, Amnesty International and the Race Equality Foundation. Police have deployed live facial recognition at large-scale public events, including King Charles's coronation. The statement said: "We hold differing views about live facial recognition surveillance, ranging from serious concerns about its incompatibility with human rights, to the potential for discriminatory impact, the lack of safeguards, the lack of an evidence base, an unproven case of necessity or proportionality, the lack of a sufficient legal basis, the lack of parliamentary consideration, and the lack of a democratic mandate. "We call on UK police and private companies to immediately stop using live facial recognition for public surveillance.""
dr tech

Opinion | They Stormed the Capitol. Their Apps Tracked Them. - The New York Times - 0 views

  •  
    "Surrendering our privacy to the government would be foolish enough. But what is more insidious is the Faustian bargain made with the marketing industry, which turns every location ping into currency as it is bought and sold in the marketplace of surveillance advertising. Now, one year later, we're in a very similar position. But it's far worse. A source has provided another data set, this time following the smartphones of thousands of Trump supporters, rioters and passers-by in Washington, D.C., on January 6, as Donald Trump's political rally turned into a violent insurrection. At least five people died because of the riot at the Capitol. Key to bringing the mob to justice has been the event's digital detritus: location data, geotagged photos, facial recognition, surveillance cameras and crowdsourcing."
dr tech

ExpressVPN's Research on Phone Location Tracking | ExpressVPN - 0 views

  •  
    "In these cases, we call the SDKs "trackers" or "tracker SDKs." We follow the lead of the Electronic Frontier Foundation, Fight for the Future, and other digital rights organizations and use the term broadly: "Trackers" encompasses traditional advertisement surveillance, behavioral, and location monitoring. Legitimate uses may include user feedback mechanisms, telemetry, and crash reporters. App developers have decided to include tracker SDKs in apps for a variety of reasons, and we do not categorize all usage of trackers as malicious or condemn the app authors. Additionally, given the complexity and pace of software development, some developers may not be aware that trackers are in their app or may not know the full implications of bundling such code before publishing."
dr tech

The Met's helicopter snap of Michael McIntyre is a wake-up call to all of us | James Ba... - 0 views

  •  
    "On the surface of it, the incident is entirely trivial: in a thoughtless moment, a police officer on a surveillance helicopter decides to tweet a photo of a celebrity he's spotted (in this case Michael McIntyre), briefly adding the Metropolitan police to the ranks of London paparazzi. The Met's snap had a few features a standard press photo lacks, though, including an exact timestamp, location data, and a vantage point from an expensive and taxpayer-funded aerial spot. Online reaction to the photograph was predictably bad - why are police invading the privacy of someone who's doing nothing wrong? - and was followed by questioning whether the photo breached the Data Protection Act, which it may well have done."
dr tech

Tech tool offers police 'mass surveillance on a budget' | AP News - 0 views

  •  
    "What distinguishes Fog Reveal from other cellphone location technologies used by police is that it follows the devices through their advertising IDs, unique numbers assigned to each device. These numbers do not contain the name of the phone's user, but can be traced to homes and workplaces to help police establish pattern-of-life analyses."
dr tech

Meet Jack. Or, What The Government Could Do With All That Location Data | American Civi... - 0 views

  •  
    "Now that we have finalized our systems for the acquisition and processing of Americans' location data (using data from cell phone and license plate readers as well as other sources), I wanted to give you a quick taste of our new system's capabilities in the domestic policing context."
dr tech

Myanmar's Military Deploys Digital Arsenal of Repression in Crackdown - The New York Times - 0 views

  •  
    "The software is made by BlackBag Technologies, an American company that was bought last year by Cellebrite of Israel. Both companies also make other sophisticated tools to infiltrate locked or encrypted devices and suck out their data, including location-tracking information."
dr tech

'Missing from desk': AI webcam raises remote surveillance concerns | Working from home ... - 0 views

  •  
    "Explained by "Anna", a desk-sitting avatar complete with an artificial voice, the video introduces TP Observer as "a risk-mitigation tool that monitors and tracks real time employee behaviour, and detects any violations to pre-set business rules". Anna explains that this means home workers will have an AI-enabled webcam added to their computers that recognises their face, tags their location and scans for "breaches" of rules at random points during a shift."
dr tech

The Trump 2020 app is a voter surveillance tool of extraordinary power | MIT Technology... - 0 views

  •  
    "Data collection-as Parscale's comment suggested-is perhaps the most powerful thing the Trump 2020 app does. On signing up, users are required to provide a phone number for a verification code, as well as their full name, email address, and zip code. They are also highly encouraged to share the app with their existing contacts. This is part of a campaign strategy for reaching the 40 to 50 million citizens expected to vote for Trump's reelection: to put it bluntly, the campaign says it intends to collect every single one of these voters' cell-phone numbers. This strategy means the app also makes extensive permission requests, asking for access to location data, phone identity, and control over the handset's Bluetooth function."
dr tech

Surveillance tech only adds to a culture of fear | Financial Times - 0 views

  •  
    "Once you gather up every reported incident of violence in one place, however, the threat seems far greater. A record of up to date criminal activity might be useful if you are new to an area. Businesses considering locations and homeowners interested in moving might use it to get certain information. But it can also facilitate panic and unjustified accusations."
dr tech

Locating The Netherlands' Most Wanted Criminal By Scrutinising Instagram - bellingcat - 0 views

  •  
    "Locating The Netherlands' Most Wanted Criminal By Scrutinising Instagram"
dr tech

TechScape: suspicious of TikTok? You're not alone | TikTok | The Guardian - 0 views

  •  
    "Perkins' report offers a dizzying list of data the TikTok app can access while it's running, including the device location, calendar, contacts, other running applications, wi-fi networks, phone number and even the SIM card serial number. He concludes: For the TikTok application to function properly, most of the access and device data collection is not required. This leads us to believe that the only reason this information has been gathered is for data harvesting. It is also notable that the device only needs to ask the user for permission to perform each of these actions once and then follow the user's preferences. The application however has a culture of persistent access or continuously asking for a decision reversal by the user. The hourly checking of location is also unnecessary. Finally, device mapping, external storage access, contacts and third-party applications data collection allows TikTok the ability to reimage the phone in the likeness of the original device."
dr tech

What Are Geofence Warrants? - The Markup - 0 views

  •  
    "Geofence warrants, or reverse-location warrants, are a fairly new concept. With permission from a judge, they allow law enforcement to obtain anonymized data from Google from almost any device that was in a certain geographic area at a specific time. Police can then go back to Google for more specific user information on anyone they deem a suspect."
1 - 15 of 15
Showing 20 items per page