-Caveat Lector-

LIGHTS, CAMERA, ACHTUNG!

<http://www.e-venthorizon.net/antimatter/surveillance.html>

by Brian Onley, antiMatter columnist

July 15, 2001

"Take our cameras away and only twits will have cameras..."
--National Covert Surveillance Association

For a long time now, surveillance imaging has been a multi-billion dollar
industry. Everyone from the Defense Department all the way down to the
convenience store on your local street corner has gobs of cameras in plain
sight. In most cases this surveillance gear has primarily been used for
protection from possible theft, robbery, or my personal favorite  "other
criminal activity." Currently though, a disturbing trend towards the use of
surveillance equipment for outright spying on common people going about
normal daily activities in the public community has become equivalent to a
dictatorial police state  something akin to what Russia and Nazi Germany
experienced for so many years.
The increasing use of so-called speed-trap-cameras and facial recognition
systems recently in the news has a more insidious ring to it than anyone is
willing to talk much about.
Since this technology has been staring the general public in the face for
quite awhile, it appears some feel there is not a problem using it for what
borders on questionable issues of constitutionality. Further, at what point
do the machinations of "duly elected" officials' decisions to implement
public safety measures using such technology perform anything but
governmental safety measures and ultimately total control?
After all, paranoia in both government and the private sector has reared
its ugly head in other ways, each time chipping away the gray areas around
our fundamental rights and freedoms. These attempts at "chipping" are
coming dangerously close to the ultimate removal of any personal rights for
what they deem to be the greater good.
This in turn leads to the question  the greater good for whom and why?
                  Legalese
The form of law under which the use of these cameras falls is Search &
Seizure, or S&S. The cameras search for your car tags or face in a crowd
and then they seize your money or your freedom, or both. The pure essence
of S&S can be summed up as clearly warrantless and as we have seen in the
past, does not legally fall under the U.S. Constitution in this particular
form:
Most searches occur without warrants being issued. Over the years, the
courts have defined a number of situations in which a search warrant is not
necessary, either because the search is per se reasonable under the
circumstances or because, due to a lack of a reasonable expectation of
privacy, the Fourth Amendment doesn't apply at all.1
It is the 'reasonable expectation of privacy' at issue here and what
exactly defines 'reasonable expectation.'
Seated within the confines of your privately owned vehicle, you are no
longer within the private domain. Since you are now in public, on a public
street in full view of the authorities at all times, you now have lost the
constitutional rights based solely on privacy.
Decisions to expand the S&S process parameters were simple. What if someone
was in their car on their way to commit a crime, and had a firearm in clear
view on the front seat? Obviously if they were stopped by a police officer
in a routine manner, the sight of the gun on the seat would allow the
officer to conduct a further search of the driver and/or the vehicle
without first obtaining a warrant, based solely upon the officer's judgment
of the circumstances at the time.
This indefinable judgment is another tidy little piece of law referred to
as Probable Cause, which defines the grounds for S&S:
The Fourth Amendment doesn't define "probable cause." Its meaning remains
fuzzy. What is clear is that after 200 years of court interpretations, the
affidavits submitted by police officers to judges have to identify
objectively suspicious activities rather than simply recite the officer's
subjective beliefs. The affidavits also have to establish more than a
"suspicion" that criminal activity is afoot, but do not have to show "proof
beyond a reasonable doubt." The information in the affidavit need not be in
a form that would make it
admissible at trial. However, the circumstances set forth in the affidavit
as a whole should demonstrate the reliability of the information.2
Of course, our patrol officers are only following guidelines passed down to
them by their superiors, the result of decisions ultimately made
elsewhere.  In essence, the officers are only doing their job.
Though both S&S and probable cause have become formal policy and are
designed to aid the enforcement of law, the issue which comes dangerously
close to a state dictatorial power is the gradual inclusion of what
constitutes the basis for Probable Cause, and hence S&S.
Public safety has always been the calling card for new and improved
restrictions on personal liberties. Let's face it; society has changed
somewhat in over 200 years. Advances in 'probable cause' legislation have
widened the gray areas of legal enforcement to the point that there can be
almost no clear-cut method to determine what in fact constitutes probable
cause.
Cars may be searched without a warrant whenever the car has been validly
stopped and the police have probable cause to believe the car contains
contraband or evidence…While a police officer cannot search a car simply
because the car was stopped for a traffic infraction  since routine traffic
stops are not arrests that would justify a "search incident to an
arrest"  the police can order the driver and any passengers out of the car
for safety considerations, even though there is no suspicion of criminal
wrongdoing other than the traffic infraction. The police also can "frisk"
the occupants for weapons so long as they have a "reasonable suspicion"
that the occupants are involved in criminal activity beyond the traffic
violation and are reasonably concerned for their safety. 3
It is the inexactness of the wording here that some find worrisome; words
such as "...'reasonable suspicion' that the occupants are involved in
criminal activity beyond the traffic violation."
Obviously if the suspect appears intoxicated, psychotic, angry, and waving
weapons, it would be natural to any sensible person that this would
constitute 'reasonable suspicion.' But what if you are simply on your way
home from work?
The police are sometimes accused of using technical traffic violations as a
pretext for stopping the car for the real reason of conducting a further
investigation that often includes a frisk and possible search of the vehicle.
Sometimes these types of stops are allegedly based on racial profiling.
Whatever the police officer's motives, however, if the officer had a valid
reason to stop the vehicle, even a ticky-tack one like a broken rear
taillight, the stop is legal. And, if the initial stop is valid, any lawful
frisk, search or arrest that follows the stop is also valid.4
The use of probable cause decisions at the street level can have far-flung
ramifications. Since the definition of probable cause is solely based on
one person's opinion and without further qualifications, it would only be a
matter of time before those opinions could move further from actual defined
criminal activity to something that appears on the surface as "...activity
that might be criminal".
Real crime is in fact a serious problem and should not be taken lightly.
But at what point does the definition of "criminal activity" stop?
Short of pushing that topic to the nth degree, it would not take much to
foresee inclusion of personal habits deemed illegal, activity unbecoming a
citizen, and mere suspicion of either of those. Not unlike the Salem Witch
Hunts in America's illustrious past whereby the ignorance and fears of a
few led to the destruction of many, all based on mere suspicion,
conjecture, and no real foundation.
The use of remote cameras to widen probable cause and further S&S
enforcements on the surface may not actually appear quite so
threatening.  In point of fact, lives may actually be saved through the use
of such stoplight intersection cameras. But it is the ultimate evolution of
definition-of-use further down the road that must be carefully weighed
here  make a buck for the coffers today but define all new criminal
activity for tomorrow.
                  Technology
There is much more involved with these types of systems than one would
think. We're not talking about simple closed-circuit television
anymore.  The days of some guy sitting in front of a monitor watching your
activities are over.
In the past, security personnel had to watch banks of individual camera
monitors. Because in some cases as the shear volume in the proportion of
cameras-to-monitors grew, it became increasingly more difficult for one or
more people to keep up with it. Along came a change in policy as well as
new technology based on an old one, the VCR.
Instead of trying to stop crime as it happened, it became the policy to
simply record the process for later reference, if needed. Special VCRs were
constructed which primarily used multiple tracks on videotape to
accommodate multiple cameras. In many cases, certain security personnel
simply became tape changers.
As in all cases in our society, once someone figures out the costs and
benefits needed to supply such a security force far outweigh profitability
and convenience, automation steps in.
Currently these automated processes are growing exponentially. Research and
development into cost-efficient methods of data processing have pushed
covert surveillance to unprecedented levels bordering on science fiction,
if not surpassing it.
The following comes from Carnegie Mellon School of Computer Sciences:
Keeping track of people, vehicles and their interactions in a complex
environment is a difficult task. The first step of VSAM (Video Surveillance
And Monitoring) video understanding technology is to automatically "parse"
people and vehicles from raw video. We have developed robust routines for
detecting moving objects and tracking them through a video sequence using a
combination of temporal differencing and template tracking. Detected
objects are classified into semantic categories such as human, human group,
car, and truck using shape and color analysis, and these labels are used to
improve tracking using temporal consistency constraints. Further
classification of human activity, such as walking and running, has also
been achieved.5
The development of this type of object detection goes on to include
combinational aspects of the objects and their relationship to one another:
We have developed a prototype activity recognition method that estimates
activities of multiple objects from attributes computed by low-level
detection and tracking subsystems.  The activity label chosen by the system
is the one that maximizes the probability of observing the given attribute
sequence. To obtain this, a Markov model is introduced that describes the
probabilistic relations between attributes and activities. We tested the
functionality of our method with synthetic scenes which have human-vehicle
interaction. In our test system, continuous feature vector output from the
low-level detection and tracking algorithms is quantized into a discrete
set of attributes and values for each tracked blob:
                            - object class: Human, Vehicle, HumanGroup
                            - object action: Appearing, Moving, Stopped,
Disappearing
                            - interaction: Near, MovingAwayFrom,
MovingTowards, NoInteraction
These features were quantized into symbols and used as the input of the
system. The activities to be labeled are 1) A Human entered a Vehicle, 2) A
Human got out of a Vehicle, 3) A Human exited a Building, 4) A Human
entered a Building, 5) A Vehicle parked, and 6) Human Rendezvous.
To train the activity classifier, conditional and joint probabilities of
attributes and actions are obtained by
generating many synthetic activity occurrences in simulation, and measuring
low-level feature vectors such as distance and velocity between objects,
similarity of the object to each class category, and a noise-corrupted
sequence of object action classifications.6
The Forest of Sensors project to specify 'object and activity
classification' in imaging determination comes from the MIT AI (Artificial
Intelligence) Lab and has been running for close to four years:
The most interesting aspect of our work is that it is almost completely
automated. Once the cameras are placed and tracking begins, all the work
performed by the system is done with minimal human intervention. This
includes maintaining a tracking database, relative calibration of the
cameras, and object and activity classification.7
The End?
It shouldn't come as a surprise to anyone that these closed circuit
versions of uberspook are scaring the bejesus out of some of the very
people responsible for its introduction. In recent articles on Tampa's use
of facial recognition systems, some members of the city council responded
in questionable denial:
Now, council members Linda Saul-Selina, Gwen Miller and Rose Ferlita say
they had no idea they had voted to approve the Ybor City camera software
and claim the resolution was buried within pages of other city business and
the associative language "was confusing." The members, some of whom have
appeared on national television shows to express their displeasure with the
system say they're outraged and think the cameras and the digital databases
are a blatant invasion of privacy.
Tampa Councilman Bob Buckhorn, who sponsored the legislation behind the
face-recognition technology, said he didn't call for "full-blown public
hearings on the matter" because the system didn't immediately involve the
expenditure of taxpayer money. Now, Rose Ferlita is demanding that the city
council take up a vote to terminate the contract with the software
manufacturer.8
If elected officials don't know what they are signing, it makes you wonder
what else was "buried within pages of other city business." As a small side
note, not everyone who has their picture taken is in fact a criminal and we
may need to definitely change to more formal definitions:
It's no surprise that the program causes controversy, (Sgt. Ernest) Adams
says. No one likes getting a traffic citation, and cameras are
indiscriminate. At least 10 police officers, he says, have been snapped
running lights and have gone to court to challenge the tickets.9
I do have a small suggestion for anyone considering adding their fair city
to this new technological wastebin  let us aim and monitor those very same
cameras on the council chambers, in their cars, at their homes, and every
place they go. That way we can see what fine, upstanding work they're doing
and whether or not we wish to continue the menage-a-twits.

----------------------

Notes:

1-4 Search Warrants: What They Are and When They're Necessary; www.nolo.com

5-6 VSAM IFD Single Camera Surveillance Technologies; www.cs.cmu.edu

7 A Forest of Sensors; MIT AI Lab; www.ai.mit.edu

8 Fell Through The Cracks" Say Council Members; Bay News; www.baynews9.com

9 Motorists race to court to challenge red-light cameras Photos called
privacy threat; USA Today; www.usatoday.com

----------------------

For more info:

The Unwanted Gaze: The Destruction of Privacy in America; Jeffrey Rosen;
ISBN: 0679445463

Ben Franklin's Web Site: Privacy and Curiosity from Plymouth Rock to the
Internet; Robert Ellis Smith, Sangram Majumdar; ISBN: 0930072146

The End of Privacy: How Total Surveillance Is Becoming a Reality; Reginald
Whitaker; ISBN: 1565845692

The End of Privacy;Charles J. Sykes; ISBN: 0312203500

The Limits of Privacy; Amitai Etzioni; ISBN: 046504090X

Understanding Surveillance Technologies: Spy Devices, Their Origins and
Applications; Julie K. Petersen, Saba Zamir; ISBN: 0849322987

Dirty Tricks or Trump Cards : U.S. Covert Action & Counterintelligence; Roy
Godson; ISBN: 0765806991

Who Elected the Bankers: Surveillance and Control in World Economy (Cornell
Studies in Political Economy); Louis W. Pauly ; ISBN: 0801483751

Surveillance Society: Monitoring Everyday Life (Issues in Society); David
Lyon; ISBN: 0335205461

Stalking the Sociological Imagination: J. Edgar Hoover's FBI Surveillance
of American Sociology (Contributions in Sociology, No. 126); Mike Forrest
Keen; ISBN: 0313298130

The Basement Bugger's Bible: The Professional's Guide to; Shifty Bugman;
ISBN: 1581600224

----------------------

usenet groups

alt.law-enforcement
alt.privacy
alt.privacy.spyware
alt.private.investigator
comp.society.privacy
dejanews.com/surveillance
soc.rights.human

----------------------

websites

[see website for embedded links]

Search & Seizure: Fourth Amendment Issues (about.com)
Understanding Search & Seizure Law (nolo.com)
Search & Seizure (lawinfo.com)
Effective Search & Seizure (Florida State University)
Search & Seizure Bulletin (policecenter.com)
Federal Guidelines for Searching and Seizing Computers (US Dept of Justice)
George Orwell's "1984" (complete text online)
Privacy International
Electronic Privacy Information Center
Privacy Rights Clearinghouse
Privacy Initiatives; (Federal Trade Commission)
privacy.org
Online Privacy Alliance
Washington DC: Police Surveillance
Police Surveillance (British Home Office)

<A HREF="http://www.ctrl.org/";>www.ctrl.org</A>
DECLARATION & DISCLAIMER
==========
CTRL is a discussion & informational exchange list. Proselytizing propagandic
screeds are unwelcomed. Substance—not soap-boxing—please!  These are
sordid matters and 'conspiracy theory'—with its many half-truths, mis-
directions and outright frauds—is used politically by different groups with
major and minor effects spread throughout the spectrum of time and thought.
That being said, CTRLgives no endorsement to the validity of posts, and
always suggests to readers; be wary of what you read. CTRL gives no
credence to Holocaust denial and nazi's need not apply.

Let us please be civil and as always, Caveat Lector.
========================================================================
Archives Available at:
http://peach.ease.lsoft.com/archives/ctrl.html
 <A HREF="http://peach.ease.lsoft.com/archives/ctrl.html";>Archives of
[EMAIL PROTECTED]</A>

http:[EMAIL PROTECTED]/
 <A HREF="http:[EMAIL PROTECTED]/";>ctrl</A>
========================================================================
To subscribe to Conspiracy Theory Research List[CTRL] send email:
SUBSCRIBE CTRL [to:] [EMAIL PROTECTED]

To UNsubscribe to Conspiracy Theory Research List[CTRL] send email:
SIGNOFF CTRL [to:] [EMAIL PROTECTED]

Om

Reply via email to