77,887 research outputs found

    Towards Coherent Regulation of Law Enforcement Surveillance in the Network Society

    Get PDF
    In this paper, we study the evolution of telecommunications technology and its impact on law enforcement surveillance. Privacy and the need for law enforcement to conduct investigations have not been at the center of the recent public policy debate. Yet, policy environments have approved law enforcement surveillance that can be and is intrusive. Law enforcement surveillance therefore deserves particular attention when discussing the basic human right to privacy. We illustrate that despite the gradual acceptance of the basic human right to privacy, in the digital age the United States (US) government continues its historical pattern of using technology to enhance its power of search . The most recent example is the installation of the Digital Collection System 1000 (DCS1000), formerly known as Carnivore, a classified packet sniffer, on American networks by the American federal law enforcement agency.NSF grant 9985433; HP equipment gran

    Rethinking Pre-Crime Surveillance versus Privacy in an Increasingly Insecure World: Imperative Expediency

    Get PDF
    Till date the United States of America has not overcome the 9/11 shock despite her efficient police and intelligence network. Nigerians would have perhaps saved the horror of the Boko Haram kidnap of the 276 innocent school girls in Maiduguri. Australians in Sydney would perhaps have prevented the death of two citizens in the hand of a man with known history of violence and crime at "the siege in Martin Place" had proper pre-emptive measures been taken. Less than 24 hours to that of Sydney Pakistan suffered its most horrifying attack in the hands of the Pakistan Taliban, causing a massacre of about 126 innocent children. Next, France became the victim. Some world leaders gathered to conduct a solidarity march and protest against terrorism. The clamour among scholars who hold fastidiously to the preservation of privacy against the quest for crime prevention surveillance in an insecure world today may be very rational and worthy of merits. But is it expedient? It appears the various democratic jurisdictions agitate against crime prevention surveillance in a manner detrimental to the same security they concertedly desire to provide for the citizens. Law enforcement agencies seek efficiency, relevance and confidence of the citizens in their role in society but it seems the same society backed by scholars would not listen? What message are we passing to the law enforcement agencies? Who should the population trust more; the citizens or the law enforcement officers? Whose privacy is the state protecting? Whose security is the state obliged to protect? Could the resistance to crime prevention surveillance tie the hands of the state law enforcement and inadvertently provide opportunities for criminals and terrorists? What is the way forward? These are the questions this paper intends to discuss in the light of recent global events of security breaches. Key Words: Adversarial system, Privacy, Surveillance, Criminal justice, Crime prevention, Crime control, Securit

    Rethinking Pre-Crime Surveillance versus Privacy in an Increasingly Insecure World: Imperative Expediency

    Get PDF
    Till date the United States of America has not overcome the 9/11 shock despite her efficient police and intelligence network. Nigerians would have perhaps saved the horror of the Boko Haram kidnap of the 276 innocent school girls in Maiduguri. Australians in Sydney would perhaps have prevented the death of two citizens in the hand of a man with known history of violence and crime at "the siege in Martin Place" had proper pre-emptive measures been taken. Less than 24 hours to that of Sydney Pakistan suffered its most horrifying attack in the hands of the Pakistan Taliban, causing a massacre of about 126 innocent children. Next, France became the victim. Some world leaders gathered to conduct a solidarity march and protest against terrorism. The clamour among scholars who hold fastidiously to the preservation of privacy against the quest for crime prevention surveillance in an insecure world today may be very rational and worthy of merits. But is it expedient? It appears the various democratic jurisdictions agitate against crime prevention surveillance in a manner detrimental to the same security they concertedly desire to provide for the citizens. Law enforcement agencies seek efficiency, relevance and confidence of the citizens in their role in society but it seems the same society backed by scholars would not listen? What message are we passing to the law enforcement agencies? Who should the population trust more; the citizens or the law enforcement officers? Whose privacy is the state protecting? Whose security is the state obliged to protect? Could the resistance to crime prevention surveillance tie the hands of the state law enforcement and inadvertently provide opportunities for criminals and terrorists? What is the way forward? These are the questions this paper intends to discuss in the light of recent global events of security breaches. Key Words: Adversarial system, Privacy, Surveillance, Criminal justice, Crime prevention, Crime control, Securit

    Pelaksanaan Penegakan Hukum Tindak Pidana Judi Togel Berdasarkan Kitab Undang-undang Hukum Pidana di Wilayah Hukum Kepolisian Resort Kota Pekanbaru

    Full text link
    Gambling is a form of the disease among the community and quite unsettling society, one form of gambling that are currently still thrives in the city of pekanbaru is crime gambling pools or sie jie, this gambling problem has long been that failed after. This society that the disease still thrives in the city of Pekanbaru, law enforcement officers have been trying to resort everything possible to eradicate the crime of gambling is but there are still selling these pools, let alone current with supported by an increasingly sophisticated technology where the coupon purchase pools or sie jie can use mobile or through short massage service (sms) so this is what makes the law enforcement apparatus Polresta city of Pekanbaru difficulty to catch bookies pools,in law enforcement against criminal acts of gambling pools there are barriers faced by investigator resort city of Pekanbaru lack of awareness of the law and the openness of society, so that they are only potentially dumb and silent,considered gambling it is something that is natural and only a small infraction, rapid science and technology also makes gambling is increasingly sophisticated, network of lotteries is closed, efforts are being made to overcome those barriers, law enforcement agencies have made efforts to prevention and mitigation, i.e. doing outreach to the community, law formed a special team to spy on a frequent place for pools (informants), patrol and surveillance on the community, doing research and investigation as well as an ambush against the practices of gambling pools

    ConvGRU-CNN: Spatiotemporal Deep Learning for Real-World Anomaly Detection in Video Surveillance System

    Get PDF
    Video surveillance for real-world anomaly detection and prevention using deep learning is an important and difficult research area. It is imperative to detect and prevent anomalies to develop a nonviolent society. Realworld video surveillance cameras automate the detection of anomaly activities and enable the law enforcement systems for taking steps toward public safety. However, a human-monitored surveillance system is vulnerable to oversight anomaly activity. In this paper, an automated deep learning model is proposed in order to detect and prevent anomaly activities. The real-world video surveillance system is designed by implementing the ResNet-50, a Convolutional Neural Network (CNN) model, to extract the high-level features from input streams whereas temporal features are extracted by the Convolutional GRU (ConvGRU) from the ResNet-50 extracted features in the time-series dataset. The proposed deep learning video surveillance model (named ConvGRUCNN) can efficiently detect anomaly activities. The UCF-Crime dataset is used to evaluate the proposed deep learning model. We classified normal and abnormal activities, thereby showing the ability of ConvGRU-CNN to find a correct category for each abnormal activity. With the UCF-Crime dataset for the video surveillance-based anomaly detection, ConvGRU-CNN achieved 82.22% accuracy. In addition, the proposed model outperformed the related deep learning models

    Drone Surveillance: The FAA’s Obligation to Respond to the Privacy Risks

    Get PDF

    Fighting Cybercrime After \u3cem\u3eUnited States v. Jones\u3c/em\u3e

    Get PDF
    In a landmark non-decision last term, five Justices of the United States Supreme Court would have held that citizens possess a Fourth Amendment right to expect that certain quantities of information about them will remain private, even if they have no such expectations with respect to any of the information or data constituting that whole. This quantitative approach to evaluating and protecting Fourth Amendment rights is certainly novel and raises serious conceptual, doctrinal, and practical challenges. In other works, we have met these challenges by engaging in a careful analysis of this “mosaic theory” and by proposing that courts focus on the technologies that make collecting and aggregating large quantities of information possible. In those efforts, we focused on reasonable expectations held by “the people” that they will not be subjected to broad and indiscriminate surveillance. These expectations are anchored in Founding-era concerns about the capacity for unfettered search powers to promote an authoritarian surveillance state. Although we also readily acknowledged that there are legitimate and competing governmental and law enforcement interests at stake in the deployment and use of surveillance technologies that implicate reasonable interests in quantitative privacy, we did little more. In this Article, we begin to address that omission by focusing on the legitimate governmental and law enforcement interests at stake in preventing, detecting, and prosecuting cyber-harassment and healthcare fraud

    PRECEPT:a framework for ethical digital forensics investigations

    Get PDF
    Purpose: Cyber-enabled crimes are on the increase, and law enforcement has had to expand many of their detecting activities into the digital domain. As such, the field of digital forensics has become far more sophisticated over the years and is now able to uncover even more evidence that can be used to support prosecution of cyber criminals in a court of law. Governments, too, have embraced the ability to track suspicious individuals in the online world. Forensics investigators are driven to gather data exhaustively, being under pressure to provide law enforcement with sufficient evidence to secure a conviction. Yet, there are concerns about the ethics and justice of untrammeled investigations on a number of levels. On an organizational level, unconstrained investigations could interfere with, and damage, the organization’s right to control the disclosure of their intellectual capital. On an individual level, those being investigated could easily have their legal privacy rights violated by forensics investigations. On a societal level, there might be a sense of injustice at the perceived inequality of current practice in this domain. This paper argues the need for a practical, ethically-grounded approach to digital forensic investigations, one that acknowledges and respects the privacy rights of individuals and the intellectual capital disclosure rights of organisations, as well as acknowledging the needs of law enforcement. We derive a set of ethical guidelines, then map these onto a forensics investigation framework. We subjected the framework to expert review in two stages, refining the framework after each stage. We conclude by proposing the refined ethically-grounded digital forensics investigation framework. Our treatise is primarily UK based, but the concepts presented here have international relevance and applicability.Design methodology: In this paper, the lens of justice theory is used to explore the tension that exists between the needs of digital forensic investigations into cybercrimes on the one hand, and, on the other, individuals’ rights to privacy and organizations’ rights to control intellectual capital disclosure.Findings: The investigation revealed a potential inequality between the practices of digital forensics investigators and the rights of other stakeholders. That being so, the need for a more ethically-informed approach to digital forensics investigations, as a remedy, is highlighted, and a framework proposed to provide this.Practical Implications: Our proposed ethically-informed framework for guiding digital forensics investigations suggest a way of re-establishing the equality of the stakeholders in this arena, and ensuring that the potential for a sense of injustice is reduced.Originality/value: Justice theory is used to highlight the difficulties in squaring the circle between the rights and expectations of all stakeholders in the digital forensics arena. The outcome is the forensics investigation guideline, PRECEpt: Privacy-Respecting EthiCal framEwork, which provides the basis for a re-aligning of the balance between the requirements and expectations of digital forensic investigators on the one hand, and individual and organizational expectations and rights, on the other

    Pervasively Distributed Copyright Enforcement

    Get PDF
    In an effort to control flows of unauthorized information, the major copyright industries are pursuing a range of strategies designed to distribute copyright enforcement functions across a wide range of actors and to embed these functions within communications networks, protocols, and devices. Some of these strategies have received considerable academic and public scrutiny, but much less attention has been paid to the ways in which all of them overlap and intersect with one another. This article offers a framework for theorizing this process. The distributed extension of intellectual property enforcement into private spaces and throughout communications networks can be understood as a new, hybrid species of disciplinary regime that locates the justification for its pervasive reach in a permanent state of crisis. This hybrid regime derives its force neither primarily from centralized authority nor primarily from decentralized, internalized norms, but instead from a set of coordinated processes for authorizing flows of information. Although the success of this project is not yet assured, its odds of success are by no means remote as skeptics have suggested. Power to implement crisis management in the decentralized marketplace for digital content arises from a confluence of private and public interests and is amplified by the dynamics of technical standards processes. The emergent regime of pervasively distributed copyright enforcement has profound implications for the production of the networked information society
    • …
    corecore