43,250 research outputs found

    Watching You: Systematic Federal Surveillance of Ordinary Americans

    Get PDF
    To combat terrorism, Attorney General John Ashcroft has asked Congress to "enhance" the government's ability to conduct domestic surveillance of citizens. The Justice Department's legislative proposals would give federal law enforcement agents new access to personal information contained in business and school records. Before acting on those legislative proposals, lawmakers should pause to consider the extent to which the lives of ordinary Americans already are monitored by the federal government. Over the years, the federal government has instituted a variety of data collection programs that compel the production, retention, and dissemination of personal information about every American citizen. Linked through an individual's Social Security number, these labor, medical, education and financial databases now empower the federal government to obtain a detailed portrait of any person: the checks he writes, the types of causes he supports, and what he says "privately" to his doctor. Despite widespread public concern about preserving privacy, these data collection systems have been enacted in the name of "reducing fraud" and "promoting efficiency" in various government programs. Having exposed most areas of American life to ongoing government scrutiny and recording, Congress is now poised to expand and universalize federal tracking of citizen life. The inevitable consequence of such constant surveillance, however, is metastasizing government control over society. If that happens, our government will have perverted its most fundamental mission and destroyed the privacy and liberty that it was supposed to protect

    Group Threat, Police Officer Diversity and the Deadly Use of Police Force

    Get PDF
    Prior research indicates that (perceived) group threat measured in terms of population shares and race-specific crime rates are important explanations for variations in police killings across cities in the United States. The authors argue that a diverse police force that proportionally represents the population it serves mitigates group threat and thereby reduces the number of officer-involved killings. The findings represent one of the first analysis of a highly relevant contemporary issue based on a recent and high-quality dataset from 2013 to 2015. By highlighting the interaction between group threat and the proportional representation of minority groups in police departments, the research advances group conflict and threat theories with important theoretical and policy implications for law enforcement and representative bureaucracies more broadly

    Performing the Union: the Prüm Decision and the European dream

    Get PDF
    In 2005, seven European countries signed the so-called Prüm Treaty to increase transnational collaboration in combating international crime, terrorism and illegal immigration. Three years later, the Treaty was adopted into EU law. EU member countries are obliged to have systems in place to allow authorities of other member states access to nationally held data on DNA, fingerprints, and vehicles by August 2011. In this paper, we discuss the conditions of possibility for the Prüm network to emerge, and argue that rather than a linear story of technological and political convergence and harmonisation, the (hi)story of Prüm is heterogeneous and patchy. This is reflected also in the early stages of implementing the Prüm Decision which proves to be more difficult than it was hoped by the drivers of the Prüm process. In this sense, the Prüm network sits uncomfortably with success stories of forensic science (many of which served the goal of justifying the expansion of technological and surveillance systems). Instead of telling a story of heroic science, the story of Prüm articulates the European dream: One in which goods, services, and people live and travel freely and securely

    Responding to Cross Border Child Trafficking in South Asia: An Analysis of the Feasibility of a Technologically Enabled Missing Child Alert System

    Get PDF
    This report examines the feasibility of a technologically enabled system to help respond to the phenomenon of cross-border child trafficking in South Asia, and makes recommendations on how to proceed with a pilot project in the selected areas of Bangladesh, Nepal and India. The study was commissioned by the Missing Child Alert (MCA) programme which is an initiative led by Plan. MCA is an initiative to address cross-border child trafficking in South Asia, led by Plan. The aim of the programme is to link existing institutions, mechanisms and resources in order to tackle the phenomenon from a regional perspective. To achieve this, Plan propose to implement a technologically equipped, institutionalised system of alert that can assist in the rescue, rehabilitation, repatriation and reintegration of children who are at risk of, or are victims of, cross-border trafficking

    The Politics of Voter Fraud

    Get PDF
    The purpose of this report is to disentangle the myth from the reality and to separate the politics of voter fraud from legitimate administrative concerns about the integrity of the electoral process. To make the argument, we present a usable definition of voter fraud, discuss the problem of evidence, and explain how and why the dynamics of electoral competition drive the use of baseless fraud claims in American politics. We present several contemporary examples to illustrate how poor election administration and voter mistakes are misleadingly labeled "fraud." Recent allegations against voter registration campaigns highlight the need for an analysis sensitive to the partisanship and race and class issues just beneath the surface of most voter fraud claims. The last section of the report makes policy recommendations for improving public understanding and removing the canard of voter fraud from the election reform debate. The appendix discusses what to look for in evaluating voter fraud allegations

    A Blockchain-based Approach for Data Accountability and Provenance Tracking

    Full text link
    The recent approval of the General Data Protection Regulation (GDPR) imposes new data protection requirements on data controllers and processors with respect to the processing of European Union (EU) residents' data. These requirements consist of a single set of rules that have binding legal status and should be enforced in all EU member states. In light of these requirements, we propose in this paper the use of a blockchain-based approach to support data accountability and provenance tracking. Our approach relies on the use of publicly auditable contracts deployed in a blockchain that increase the transparency with respect to the access and usage of data. We identify and discuss three different models for our approach with different granularity and scalability requirements where contracts can be used to encode data usage policies and provenance tracking information in a privacy-friendly way. From these three models we designed, implemented, and evaluated a model where contracts are deployed by data subjects for each data controller, and a model where subjects join contracts deployed by data controllers in case they accept the data handling conditions. Our implementations show in practice the feasibility and limitations of contracts for the purposes identified in this paper
    • …
    corecore