Archive for category Panopticon as a metaphor
The U.S. Department of Justice now says its use of a cellphone-tracking device in a controversial Arizona case could be considered a “search” under the Fourth Amendment, a tactical move legal experts say is designed to protect the secrecy of the gadgets known as “stingrays.”
For more than a year, federal prosecutors have argued in U.S. District Court that the use of the stingray device—which can locate a mobile phone even when it’s not being used to make a call—wasn’t a search, in part because the user had no reasonable expectation of privacy while using Verizon Wireless cellphone service. Under that argument, authorities wouldn’t need to obtain a search warrant before using one of the devices.
Forensic video analysis is the scientific examination, comparison and/or evaluation of video in legal matters.
Listed below are common techniques that are required of forensic video analysts.
- Reliably digitize video tape footage onto a computer system. (This is commonly done via Non-Linear Editor (NLE) software.)
- Be able to demultiplex or separate camera views from multiplexed CCTV footage.
- Convert digital video from DVR (Digital Video Recorder) devices into digital video formats usable for forensic analysis.
- Perform clarification techniques such as frame averaging.
- Highlight someone or something of interest in the video.
- Enlarge portions of the video for areas of interest.
Technology is evolving us, says Amber Case, as we become a screen-staring, button-clicking new version of homo sapiens. We now rely on “external brains” (cell phones and computers) to communicate, remember, even live out secondary lives. But will these machines ultimately connect or conquer us? Case offers surprising insight into our cyborg selves.
From warrantless wiretapping to ever-present surveillance cameras, our world is right now in the midst of a long war on anonymity.
We know that we are always being monitored in high traffic areas like parks, malls, airports and stadiums and technology is available today to have apps on all of our smartphones that let us identify random faces in a crowd. Imagine every action will be scrutinized and recorded. Who will be judge? Who will be jury?
10,746 known sex offenders deleted since 2007
2,800 known sex offenders deleted since 2008
Perverted-Justice operates a site that targets groups and individuals it identifies as being involved in the pedophile activism community, a site that provides information to abuse victims on their legal recourse, a site that gives advice to children and teenagers on dealing with grooming on the internet, and a site that targets organizations that Perverted-Justice believes allow pedophile activists to use their services. The foundation also offers free online training to law enforcement officers and has an intern program for college students.
The SLIC analysis of over one million social media posts in the U.S. indicates significant increases in:
Social media activity from Occupy supporters and activists promoting physical destruction and violent action
- Direct and specific threats from Occupy “hacktivist” groups against specific financial and law enforcement targets
- Funding and support from national labor unions including the AFL-CIO, SEIU, Transit Workers Union, United Auto Workers, and the United Federation of Teachers
- Support from community organizations, including MoveOn.org, ACORN, and Rebuild the Dream
- Social media posts, videos and images specifically targeting an expanding list of corporate entities and the wealthy, specifically 1) all financial institutions that issue mortgages, foreclosures, and student loans and 2) all corporate entities that received bailout money or government subsidies, pay high executive salaries or bonuses, or are perceived to be paying exceedingly low taxes.
The government is trying to push through a set of electronic surveillance laws that will invade your privacy and cost you money.
The plan is to force every phone and Internet provider to allow “authorities to collect the private information of any Canadian, at any time, without a warrant.
- Warrantless: A range of “authorities” will have the ability to invade the private lives of law-abiding Canadians and our families using wired Internet and mobile devices, without justification.
- Invasive: The laws leave our personal and financial information less secure and more susceptible to cybercrime.
- Costly: Internet services providers may be forced to install millions of dollars worth of spying technology and the cost will be passed down to YOU.