890 resultados para counter-surveillance
Resumo:
This paper examines the use of visual technologies by political activists in protest situations to monitor police conduct. Using interview data with Australian video activists, this paper seeks to understand the motivations, techniques and outcomes of video activism, and its relationship to counter-surveillance and police accountability. Our data also indicated that there have been significant transformations in the organization and deployment of counter-surveillance methods since 2000, when there were large-scale protests against the World Economic Forum meeting in Melbourne accompanied by a coordinated campaign that sought to document police misconduct. The paper identifies and examines two inter-related aspects of this: the act of filming and the process of dissemination of this footage. It is noted that technological changes over the last decade have led to a proliferation of visual recording technologies, particularly mobile phone cameras, which have stimulated a corresponding proliferation of images. Analogous innovations in internet communications have stimulated a coterminous proliferation of potential outlets for images Video footage provides activists with a valuable tool for safety and publicity. Nevertheless, we argue, video activism can have unintended consequences, including exposure to legal risks and the amplification of official surveillance. Activists are also often unable to control the political effects of their footage or the purposes to which it is used. We conclude by assessing the impact that transformations in both protest organization and media technologies might have for counter-surveillance techniques based on visual surveillance.
Resumo:
This paper discusses the idea and demonstrates an early prototype of a novel method of interacting with security surveillance footage using natural user interfaces in place of traditional mouse and keyboard interaction. Current surveillance monitoring stations and systems provide the user with a vast array of video feeds from multiple locations on a video wall, relying on the user’s ability to distinguish locations of the live feeds from experience or list based key-value pair of location and camera IDs. During an incident, this current method of interaction may cause the user to spend increased amounts time obtaining situational and location awareness, which is counter-productive. The system proposed in this paper demonstrates how a multi-touch screen and natural interaction can enable the surveillance monitoring station users to quickly identify the location of a security camera and efficiently respond to an incident.
Resumo:
Espionage, surveillance and clandestine operations by secret agencies and governments were something of an East–West obsession in the second half of the twentieth century, a fact reflected in literature and film. In the twenty-first century, concerns of the Cold War and the threat of Communism have been rearticulated in the wake of 9/11. Under the rubric of ‘terror’ attacks, the discourses of security and surveillance are now framed within an increasingly global context. As this article illustrates, surveillance fiction written for young people engages with the cultural and political tropes that reflect a new social order that is different from the Cold War era, with its emphasis on spies, counter espionage, brainwashing and psychological warfare. While these tropes are still evident in much recent literature, advances in technology have transformed the means of tracking, profiling and accumulating data on individuals’ daily activities. Little Brother, The Hunger Games and Article 5 reflect the complex relationship between the real and the imaginary in the world of surveillance and, as this paper discusses, raise moral and ethical issues that are important questions for young people in our age of security.
Resumo:
The stock assessment task group report (1991) mentions that fish counters could play a key role in providing data on the size of the adult stock, and in particular the migratory salmonid stock. This report assesses the performance of the 'logie' fish counter at Forge Weir on the River Lune. Using video surveillance, a total of 1137 hours time lapse and 15 hours real time were used for validation purposes. This report looks at materials and methods, counting accuracy, sizing ability and environmental conditions, performance across the electrode array and salmonid swimming speed.
Resumo:
This paper examines the main EU-level initiatives that have been put forward in the weeks following the attacks in Paris in January 2015, which will be discussed in the informal European Council meeting of 12 February 2015. It argues that a majority of these proposals predated the Paris shootings and had until that point proved contentious as regards their efficacy, legitimacy and lawfulness. The paper finds that EU counterterrorism responses raise two fundamental challenges: A first challenge is posed to the freedom of movement, Schengen and EU citizenship. Priority is being given to the expanded use of large-scale surveillance and systematic monitoring of all travellers including EU citizens, which stands in contravention of Schengen and the free movement principle. A second challenge concerns EU democratic rule of law. Current pressures calling for the adoption of measures such as the EU Passenger Name Record challenge the scrutiny roles held by the European Parliament and the Court of Justice of the EU on counterterrorism measures in a post-Lisbon Treaty setting. The paper proposes that the EU adopts a new European Agenda on Security and Liberty based on an EU security (criminal justice-led) cooperation model that is firmly anchored in current EU legal principles and rule of law standards. This model would call for ‘less is more’ concerning the use, processing and retention of data by police and intelligence communities. Instead, it would pursue better and more accurate use of data meeting the quality standards of evidence in criminal judicial proceedings.
Resumo:
This paper examines the EU’s counter-terrorism policies responding to the Paris attacks of 13 November 2015. It argues that these events call for a re-think of the current information-sharing and preventive-justice model guiding the EU’s counter-terrorism tools, along with security agencies such as Europol and Eurojust. Priority should be given to independently evaluating ‘what has worked’ and ‘what has not’ when it comes to police and criminal justice cooperation in the Union. Current EU counter-terrorism policies face two challenges: one is related to their efficiency and other concerns their legality. ‘More data’ without the necessary human resources, more effective cross-border operational cooperation and more trust between the law enforcement authorities of EU member states is not an efficient policy response. Large-scale surveillance and preventive justice techniques are also incompatible with the legal and judicial standards developed by the Court of Justice of the EU. The EU can bring further added value first, by boosting traditional policing and criminal justice cooperation to fight terrorism; second, by re-directing EU agencies’ competences towards more coordination and support in cross-border operational cooperation and joint investigations, subject to greater accountability checks (Europol and Eurojust +); and third, by improving the use of policy measures following a criminal justice-led cooperation model focused on improving cross-border joint investigations and the use of information that meets the quality standards of ‘evidence’ in criminal judicial proceedings. Any EU and national counter-terrorism policies must not undermine democratic rule of law, fundamental rights or the EU’s founding constitutional principles, such as the free movement of persons and the Schengen system. Otherwise, these policies will defeat their purpose by generating more insecurity, instability, mistrust and legal uncertainty for all.
Resumo:
More than a century ago in their definitive work “The Right to Privacy” Samuel D. Warren and Louis D. Brandeis highlighted the challenges posed to individual privacy by advancing technology. Today’s workplace is characterised by its reliance on computer technology, particularly the use of email and the Internet to perform critical business functions. Increasingly these and other workplace activities are the focus of monitoring by employers. There is little formal regulation of electronic monitoring in Australian or United States workplaces. Without reasonable limits or controls, this has the potential to adversely affect employees’ privacy rights. Australia has a history of legislating to protect privacy rights, whereas the United States has relied on a combination of constitutional guarantees, federal and state statutes, and the common law. This thesis examines a number of existing and proposed statutory and other workplace privacy laws in Australia and the United States. The analysis demonstrates that existing measures fail to adequately regulate monitoring or provide employees with suitable remedies where unjustifiable intrusions occur. The thesis ultimately supports the view that enacting uniform legislation at the national level provides a more effective and comprehensive solution for both employers and employees. Chapter One provides a general introduction and briefly discusses issues relevant to electronic monitoring in the workplace. Chapter Two contains an overview of privacy law as it relates to electronic monitoring in Australian and United States workplaces. In Chapter Three there is an examination of the complaint process and remedies available to a hypothetical employee (Mary) who is concerned about protecting her privacy rights at work. Chapter Four provides an analysis of the major themes emerging from the research, and also discusses the draft national uniform legislation. Chapter Five details the proposed legislation in the form of the Workplace Surveillance and Monitoring Act, and Chapter Six contains the conclusion.
Resumo:
Sexual harassment can be conceptualised as an interaction between harassers and targets. Utilising 23 detailed legal transcripts, this study explored evidence of a range of perpetrator tactics and target counter-tactics. These tactics can be readily fitted into the backfire framework, which proposes that powerful perpetrators of perceived unjust acts are likely to cover up the actions, devalue the target, reinterpret the events, use official channels to give an appearance of justice, and intimidate or bribe people involved. Targets can respond using counter-tactics of exposure, validation, reframing, mobilisation of support, and resistance. The findings have implications for raising awareness of harassing tactics and recommendations for effective informal responses in organisations.
Resumo:
In Australia, the Queensland fruit fly (B. tryoni), is the most destructive insect pest of horticulture, attacking nearly all fruit and vegetable crops. This project has researched and prototyped a system for monitoring fruit flies so that authorities can be alerted when a fly enters a crop in a more efficient manner than is currently used. This paper presents the idea of our sensor platform design as well as the fruit fly detection and recognition algorithm by using machine vision techniques. Our experiments showed that the designed trap and sensor platform is capable to capture quality fly images, the invasive flies can be successfully detected and the average precision of the Queensland fruit fly recognition is 80% from our experiment.