Difference between revisions of "Surveillance Technologies"

From SI410
Jump to: navigation, search
Line 42: Line 42:
 
====Domestic Abuse & Surveillance Technologies====
 
====Domestic Abuse & Surveillance Technologies====
  
"Smart abuse" has become a more prevalent issue with constant advancement of surveillance and "smart home" technology. Surveillance technologies are being utilized to monitor and track a partner's whereabouts in domestic abuse relationships. These technologies were created to help keep intruders out and provide an added sense of protection, but they are being misused to torment partners in abusive relationships. Abusers will use these technologies to frighten and keep their partners from trying to leave the relationship in fear of getting caught.<ref>Reilly, C. 2018. Cameras, surveillance and the sinister tech behind domestic abuse. CNET. https://www.cnet.com/news/cameras-surveillance-and-the-sinister-tech-behind-domestic-abuse/</ref> Abusers also utilize other technologies like remote control locks and other "smart" house technologies to harass and manipulate their partners when they aren't even home. New apps and other resources for educating women on how to maintain online privacy and best handle these situations are becoming more prominent.  
+
"Smart abuse" has become a more prevalent issue with constant advancement of surveillance and "smart home" technology. Surveillance technologies are being utilized to monitor and track a partner's whereabouts in domestic abuse relationships. These technologies were created to help keep intruders out and provide an added sense of protection, but they are being misused to torment partners in abusive relationships. Abusers will use these technologies to frighten and keep their partners from trying to leave the relationship in fear of getting caught.<ref>Reilly, C. 2018. Cameras, surveillance and the sinister tech behind domestic abuse. CNET. https://www.cnet.com/news/cameras-surveillance-and-the-sinister-tech-behind-domestic-abuse/</ref> Abusers also utilize other technologies like remote control locks and other "smart" house technologies to harass and manipulate their partners when they aren't even home. New apps and other resources for educating women on how to maintain online privacy and best handle these situations are becoming more prominent because of the alarming increase in this problem.
  
 
===Voyeurism===
 
===Voyeurism===

Revision as of 00:24, 22 April 2019

Surveillance Technology is the use of computer equipment to monitor people’s behaviors and actions. It is often implemented by companies and organizations with the goal of increasing safety, efficiency, or cost-effectiveness. These technologies are becoming more universal and changing rapidly in the 21st century. This presents issues because policy regarding surveillance technology is unable to keep up with its growth due to Moor's law.[1] Subjects of surveillance technologies are often unaware and unconsenting, and technologies themselves are subject to misuses such as targeting, voyeurism, and violation of privacy.

Types of Surveillance Technologies

There are many types of surveillance technologies in existence, and they are often used in conjunction with one another to conduct comprehensive monitoring of an area either in the real world or in the infosphere. These technologies can be used to monitor people in public places, employees in the workplace, criminal suspects, or a person of interest. Each technology presents the user with its own set of ethical issues.

Hidden Subway Camera[3]

Video Surveillance

Video surveillance is one of the most commonly used and well-known surveillance technologies. The uses of video surveillance is society vary from utilizing its monitoring capabilities in high-risk areas (i.e. government buildings) to the monitoring of personal property and all environments in which the monitoring of activities should be present. Video surveillance works to keep a watchful eye over an area to keep the inhabitants and possessions safe from potential threats. Video cameras allow many areas to be monitored at once by the same person and eliminate physical barriers that often obscure the view of human security guards. Problems arise when public spaces become “blanketed” with video cameras[4]. Many public spaces, such as subways in NYC, have hidden cameras[5] which can be problematic because individuals are not aware they are being watched and their privacy is violated unconsciously. Video surveillance technology is easily misused as a tool for voyeurism, especially because it has become so accessible in recent years.[6] When public spaces are covered with video surveillance technology, individuals lose their ability to go about their lives anonymously and are subject to biased perceptions of their identity when being recorded out of context.

International Usage

Closed-ciruit television or CCTV, has an international presence with the majority of surveillance being in Asia and the United Kingdom. In China, it's there was a reported amount of over 170 million surveillance cameras -- all which are capable to facial recognition [7]. The United Kingdom, which is one of the most surveilled nations in the world, has at least one surveillance camera for every 11 people in the United Kingdom [8]. However, with this much footage, authorities in the United Kingdom struggle to filter through all of the footage obtained when needed. [9] However, CCTV is not limited to China and the United Kingdom, and is present across Europe, Asia, South Africa, Latin America, and North America as well.

Body Cameras

Police body cameras are a form of video surveillance and an example of sousveillance. They are used to oversee police actions and have been implemented in recent years in order to combat police violence. Similar to security cameras, they present an issue of people being unaware their actions are being recorded, but are used to combat police bias and violence. A study published in October 2017 by David Yokum et al [10] was conducted on 2,600 police officers in Washington D.C. Metropolitan Police Department, ultimately concluding no statistical significance in the use of body cameras in reducing the amount of force that police officers use in law enforcement. The study found that body cameras may inhibit police officers from making the decision to use profanity or make a crude comment, in a lucid state, with awareness of the camera being attached to their vests. However, in situations that involve potential violence, and/or physical combat, such inhibitions from awareness of the bodycam are rendered useless, and an officer's fight-or-flight instincts cause similar behavior to the behavior exhibited by a police officer lacking a bodycam. However, the discourse among commentators is unanimous that the value-add of public knowledge and opportunity for police to engage in discourse exploring the implications of the actions of their colleagues across the nation, is a crucial factor in creating a well-equipped police force.

Big Data

Corporations collect big data containing individuals online data patterns and public data dumps. This data which corporations are collecting gives them the power construct profiles about individuals (i.e. data brokers). These online data packets of information formed from the collection of big data is packaged together to be sold to other businesses who are interested in consumer's habits, which causes many privacy issues. When individuals online actions are being monitored, the ability to be anonymous in the infosphere is limited. Data mining is a violation of privacy, even when the information is public because there is no context for a subject's actions.[11] This violation can lead to biased targeting of vulnerable populations by large corporations and others who obtain such data.

Biometrics

Fingerprint ID [12]

Biometrics are ways to identify someone based on their physical characteristics such as fingerprints, DNA, eyes, voice, face, etc. Many technologies have been developed to recognize these characteristics. The FBI has a “Next Generation Identification” (NGI) system[13] which is a bank of biometric information about individuals that allows them to use someone's physical characteristics to identify them. For example, if someone is caught on a surveillance camera, facial recognition technology can be used alongside their NGI database to identify the subject. Social media companies[14] and other technology companies[15] have also been developing and implementing these tools to increase legitimacy in authentication. The consequences of these new technologies cannot be predicted, but they increase the ability to identify and track individuals based on their physical identity, eliminating anonymity. Because aspects of one's physical identity (i.e. fingerprint) do not change like other identifying characteristics (i.e. phone number), this locks people into their identity permanently.[16] This is a violation of peoples autonomy and therefore their privacy.
Face Recognition Technology is a common example of a biometric surveillance technology. Today, while generally used for technological advancements such as unlocking phones or logging into applications, the technology can still be used for general wary surveillance purposes. For example, state motor vehicle departments have high resolution photographs of their residents that can be used with public surveillance in order to track and identify. [17] Today, facial recognition technologies are known to be less effective and reliable than Iris Recognition

Domestic Drones

Domestic drones are used in combination with other technologies to surveil people without their knowledge, eliminating their ability to be anonymous. Drones can be equipped with microphones, GPS tracking, infrared detection, and facial recognition to detect and track people in many different circumstances with great discretion, usually going unnoticed by the subject. This is a violation of contextual privacy because even if someone is acting a certain way in a public space, there is no context of their life included in the surveillance.

Sunpass contactless toll collection[18]

Radio Frequency Identity (RFID) Chips

RFID chips are placed on or on physical objects to allow for contactless authentication. Examples include electronic toll collection passes, passports, and contactless entry keys, and they allow users to be identified and tracked without their knowledge. Because subjects are not in control of the collection of this information, people's privacy is violated by tracking them this way, and their ability to move about the world anonymously is taken away.

Stingray Tracking Devices

Stingray tracking devices are cell phone surveillance devices that act like cell towers and send out signals to cell phones to get their location and identifying information. They are often used by law enforcement in solving crime in order to geolocate people. When identifying information is collected about a subject without their knowledge, their privacy and opportunity for anonymity are violated.

Advantages

Surveillance technologies aid in solving crimes and can even deter criminals. They are more effective than traditional surveillance methods because they are not disrupted by distance or physical barriers. They are less labor intensive and often less expensive than traditional surveillance methods. Data generated by surveillance technology can be shared easily, and a reduced informational friction[19] allows for this information to be used effectively by multiple people in a time of need.

Ethics

Privacy

The most prominent ethical issue arising from with surveillance technology is the violation of privacy. Humans have control over how we present ourselves based on the context we are in and what we know about our surroundings and social circles. Constant surveillance of individuals without their knowledge violate the subject’s privacy because it takes away their control over their public portrayal.[20] The limitation theory of privacy states that privacy is the area that others cannot get to,[21] but if society is creating environments in which individuals are under unconscious surveillance, the ability to shape public persona disappears and privacy begins to disappear.

Domestic Abuse & Surveillance Technologies

"Smart abuse" has become a more prevalent issue with constant advancement of surveillance and "smart home" technology. Surveillance technologies are being utilized to monitor and track a partner's whereabouts in domestic abuse relationships. These technologies were created to help keep intruders out and provide an added sense of protection, but they are being misused to torment partners in abusive relationships. Abusers will use these technologies to frighten and keep their partners from trying to leave the relationship in fear of getting caught.[22] Abusers also utilize other technologies like remote control locks and other "smart" house technologies to harass and manipulate their partners when they aren't even home. New apps and other resources for educating women on how to maintain online privacy and best handle these situations are becoming more prominent because of the alarming increase in this problem.

Voyeurism

Surveillance technology has created opportunity for voyeurism, or surveillance for pleasure of the surveyor. There have been incidents of security cameras being used as a tool for voyeurism, a misuse of technology designed to protect people. Many parties who use surveillance technology are facing legal issues, often because there is not up-to-date legislation to guide their use. When subjects being monitored are completely unaware they are being tracked and watched, they have not consented to it. Parties using these technologies should be open about their uses to protect the rights of the people they are surveilling,[23] and to combat voyeurism.

Bias

Surveillance technologies are never neutral because they are designed by humans who have their own biases. These biases, or "embedded values,"[24] affect the way technology surveils. For example, Amazon's new facial recognition technology, Rekognition, has been reported to falsely match photos of people of color to mugshot databases at a higher rate than it falsely matches photos of white people.[25] The software has learned this racial bias from its creators and the digital world it interacts with. While it would seem that technical analysis would be less biased than human analysis, the implementation of such technology into society would amplify existing racial prejudice instead of eliminating it.

Anonymity

Surveillance technology decreases and can even eliminate people's anonymity online and in the physical world. As people's online interactions are tracked, turned into data, and sold, they are no longer anonymous online. As public spaces are increasingly blanketed with video monitors and contactless scanning devices, people can be unknowingly tracked as they move through their daily lives. These aspects of surveillance technology and its integration into society don't allow anyone to slip by unnoticed, thereby eradicating anonymity in the 21st century.

References

  1. The Information Society "The Information Society and Its Philosophy: Introduction to the Special Issue on The Philosophy of Information, Its Nature, and Future Developments" Luciano Floridi 2009
  2. Chin, Monica. "Nvidia is creating surveillance cameras with built-in face recognition. Uh, great?" 15 Feb 2018. Mashable.
  3. Buiso, Gary. "The hidden cameras in NYC's subways. 18 Jan 2015. New York Post.
  4. "Surveillance Technologies". ACLU.
  5. New York Post "The Hidden Cameras in NYC's Subways" Gary Buiso 2015
  6. NBC News "Tiny Cameras, Big Crimes: Peeping Toms Go High-Tech" 2014
  7. “Chinese Man Caught by Facial Recognition at Pop Concert.” BBC News, BBC, 13 Apr. 2018, www.bbc.com/news/world-asia-china-43751276.
  8. Barrett, David. “One Surveillance Camera for Every 11 People in Britain, Says CCTV Survey.” The Telegraph, Telegraph Media Group, 10 July 2013, www.telegraph.co.uk/technology/10172298/One-surveillance-camera-for-every-11-people-in-Britain-says-CCTV-survey.html.
  9. Temperton, James. “One Nation under CCTV: the Future of Automated Surveillance.” WIRED, WIRED UK, 4 Oct. 2017, www.wired.co.uk/article/one-nation-under-cctv.
  10. Yokum et al (2017), The Lab DC, Evaluating the Effects of Police Body-Worn Cameras:A Randomized Controlled Trial https://bwc.thelab.dc.gov/TheLabDC_MPD_BWC_Working_Paper_10.20.17.pdf
  11. Stanford University Press Privacy In Context Hellen Nissenbaum 2009
  12. "How Biometrics on Smartphones is Changing our Lives", Second Image
  13. FBI "Next Generation Identification (NGI)"
  14. USA Today "Facebook wants to save your face. Should you say yes to facial recognition?" Jessica Guynn 2018
  15. Apple inc. "About Face ID advanced technology" 2018
  16. opusresearch "Biometrics – the Good, the Bad and the Reality" Ravin Sanjith 2018
  17. https://www.aclu.org/issues/privacy-technology/surveillance-technologies/face-recognition-technology "FACE RECOGNITION TECHNOLOGY" American Civil Liberties Union
  18. News Service of Florida. "SunPass continues to catch up on toll transactions". 10 July 2018. Flapol.
  19. Oxford University Press The 4th Revolution Luciano Floridi 2014
  20. Information Technology and Moral Philosophy "Plural Selves and Relational Identity" Dean Docking 2008
  21. Ethics and Information Technology "Self-exposure and exposure of the self: informational privacy and the presentation of identity" David Shoemaker 2010
  22. Reilly, C. 2018. Cameras, surveillance and the sinister tech behind domestic abuse. CNET. https://www.cnet.com/news/cameras-surveillance-and-the-sinister-tech-behind-domestic-abuse/
  23. "Surveillance Technologies". ACLU
  24. Cambridge University Press "Values in technology and disclosive computer ethics" Philip Brey 2010
  25. Snow, Jacob. "Amazon's Face Recognition Falsely Matched 28 Members of Congress with Mugshots". 26 July 2018. ACLU.