7,576 research outputs found

    An approach to license plate recognition in real time using multi-stage computational intelligence classifier

    Get PDF
    Automatic car license plate recognition (LPR) is widely used nowadays. It involves plate localization in the image, character segmentation and optical character recognition. In this paper, a set of descriptors of image segments (characters) was proposed as well as a technique of multi-stage classification of letters and digits using cascade of neural network and several parallel Random Forest or classification tree or rule list classifiers. The proposed solution was applied to automated recognition of number plates which are composed of capital Latin letters and Arabic numerals. The paper presents an analysis of the accuracy of the obtained classifiers. The time needed to build the classifier and the time needed to classify characters using it are also presented

    Characterization of the newly isolated lytic bacteriophages KTN6 and KT28 and their efficacy against Pseudomonas aeruginosa biofilm

    Get PDF
    We here describe two novel lytic phages, KT28 and KTN6, infecting Pseudomonas aeruginosa, isolated from a sewage sample from an irrigated field near Wroclaw, in Poland. Both viruses show characteristic features of Pbunalikevirus genus within the Myoviridae family with respect to shape and size of head/tail, as well as LPS host receptor recognition. Genome analysis confirmed the similarity to other PB1-related phages, ranging between 48 and 96%. Pseudomonas phage KT28 has a genome size of 66,381 bp and KTN6 of 65,994 bp. The latent period, burst size, stability and host range was determined for both viruses under standard laboratory conditions. Biofilm eradication efficacy was tested on peg-lid plate assay and PET membrane surface. Significant reduction of colony forming units was observed (70-90%) in 24 h to 72 h old Pseudomonas aeruginosa PAO1 biofilm cultures for both phages. Furthermore, a pyocyanin and pyoverdin reduction tests reveal that tested phages lowers the amount of both secreted dyes in 48-72 h old biofilms. Diffusion and goniometry experiments revealed the increase of diffusion rate through the biofilm matrix after phage application. These characteristics indicate these phages could be used to prevent Pseudomonas aeruginosa infections and biofilm formation. It was also shown, that PB1-related phage treatment of biofilm caused the emergence of stable phage-resistant mutants growing as small colony variants

    An Approach to License Plate Recognition in Real Time Using Multi-stage Computational Intelligence Classifier

    Get PDF
    Automatic car license plate recognition (LPR) is widely used nowadays. It involves plate localization in the image, character segmentation and optical character recognition. In this paper, a set of descriptors of image segments (characters) was proposed as well as a technique of multi-stage classification of letters and digits using cascade of neural network and several parallel Random Forest or classification tree or rule list classifiers. The proposed solution was applied to automated recognition of number plates which are composed of capital Latin letters and Arabic numerals. The paper presents an analysis of the accuracy of the obtained classifiers. The time needed to build the classifier and the time needed to classify characters using it are also presented

    Transportation, Terrorism and Crime: Deterrence, Disruption and Resilience

    Get PDF
    Abstract: Terrorists likely have adopted vehicle ramming as a tactic because it can be carried out by an individual (or “lone wolf terrorist”), and because the skills required are minimal (e.g. the ability to drive a car and determine locations for creating maximum carnage). Studies of terrorist activities against transportation assets have been conducted to help law enforcement agencies prepare their communities, create mitigation measures, conduct effective surveillance and respond quickly to attacks. This study reviews current research on terrorist tactics against transportation assets, with an emphasis on vehicle ramming attacks. It evaluates some of the current attack strategies, and the possible mitigation or response tactics that may be effective in deterring attacks or saving lives in the event of an attack. It includes case studies that can be used as educational tools for understanding terrorist methodologies, as well as ordinary emergencies that might become a terrorist’s blueprint

    Diversity, genetic mapping, and signatures of domestication in the carrot (Daucus carota L.) genome, as revealed by Diversity Arrays Technology (DArT) markers

    Get PDF
    Carrot is one of the most economically important vegetables worldwide, but genetic and genomic resources supporting carrot breeding remain limited. We developed a Diversity Arrays Technology (DArT) platform for wild and cultivated carrot and used it to investigate genetic diversity and to develop a saturated genetic linkage map of carrot. We analyzed a set of 900 DArT markers in a collection of plant materials comprising 94 cultivated and 65 wild carrot accessions. The accessions were attributed to three separate groups: wild, Eastern cultivated and Western cultivated. Twenty-seven markers showing signatures for selection were identified. They showed a directional shift in frequency from the wild to the cultivated, likely reflecting diversifying selection imposed in the course of domestication. A genetic linkage map constructed using 188 F2 plants comprised 431 markers with an average distance of 1.1 cM, divided into nine linkage groups. Using previously anchored single nucleotide polymorphisms, the linkage groups were physically attributed to the nine carrot chromosomes. A cluster of markers mapping to chromosome 8 showed significant segregation distortion. Two of the 27 DArT markers with signatures for selection were segregating in the mapping population and were localized on chromosomes 2 and 6. Chromosome 2 was previously shown to carry the Vrn1 gene governing the biennial growth habit essential for cultivated carrot. The results reported here provide background for further research on the history of carrot domestication and identify genomic regions potentially important for modern carrot breeding

    System for Detecting Vehicle Features from Low Quality Data

    Get PDF
    The paper presents a system that recognizes the make, colour and type of the vehicle. The classification has been performed using low quality data from real-traffic measurement devices. For detecting vehicles’ specific features three methods have been developed. They employ several image and signal recognition techniques, e.g. Mamdani Fuzzy Inference System for colour recognition or Scale Invariant Features Transform for make identification. The obtained results are very promising, especially because only on-site equipment, not dedicated for such application, has been employed. In case of car type, the proposed system has better performance than commonly used inductive loops. Extensive information about the vehicle can be used in many fields of Intelligent Transport Systems, especially for traffic supervision. Normal 0 21 false false false PL JA X-NONE <w:LatentStyles DefLockedState="false" DefUnhideWhenUsed="false" DefSemiHidden="false" DefQFormat="false" DefPriority="99" LatentStyleCount="371"> <w:LsdException Locked="false" Priority="9" SemiHidden="true" UnhideWhenUsed="true" QFormat="true" Name="heading 2"/> <w:LsdException Locked="false" Priority="9" SemiHidden="true" UnhideWhenUsed="true" QFormat="true" Name="heading 3"/> <w:LsdException Locked="false" Priority="9" SemiHidden="true" UnhideWhenUsed="true" QFormat="true" Name="heading 4"/> <w:LsdException Locked="false" Priority="9" SemiHidden="true" UnhideWhenUsed="true" QFormat="true" Name="heading 5"/> <w:LsdException Locked="false" Priority="9" SemiHidden="true" UnhideWhenUsed="true" QFormat="true" Name="heading 6"/> <w:LsdException Locked="false" Priority="9" SemiHidden="true" UnhideWhenUsed="true" QFormat="true" Name="heading 7"/> <w:LsdException Locked="false" Priority="9" SemiHidden="true" UnhideWhenUsed="true" QFormat="true" Name="heading 8"/> <w:LsdException Locked="false" Priority="9" SemiHidden="true" UnhideWhenUsed="true" QFormat="true" Name="heading 9"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="index 1"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="index 2"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="index 3"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="index 4"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="index 5"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="index 6"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="index 7"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="index 8"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="index 9"/> <w:LsdException Locked="false" Priority="39" SemiHidden="true" UnhideWhenUsed="true" Name="toc 1"/> <w:LsdException Locked="false" Priority="39" SemiHidden="true" UnhideWhenUsed="true" Name="toc 2"/> <w:LsdException Locked="false" Priority="39" SemiHidden="true" UnhideWhenUsed="true" Name="toc 3"/> <w:LsdException Locked="false" Priority="39" SemiHidden="true" UnhideWhenUsed="true" Name="toc 4"/> <w:LsdException Locked="false" Priority="39" SemiHidden="true" UnhideWhenUsed="true" Name="toc 5"/> <w:LsdException Locked="false" Priority="39" SemiHidden="true" UnhideWhenUsed="true" Name="toc 6"/> <w:LsdException Locked="false" Priority="39" SemiHidden="true" UnhideWhenUsed="true" Name="toc 7"/> <w:LsdException Locked="false" Priority="39" SemiHidden="true" UnhideWhenUsed="true" Name="toc 8"/> <w:LsdException Locked="false" Priority="39" SemiHidden="true" UnhideWhenUsed="true" Name="toc 9"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Normal Indent"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="footnote text"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="annotation text"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="header"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="footer"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="index heading"/> <w:LsdException Locked="false" Priority="35" SemiHidden="true" UnhideWhenUsed="true" QFormat="true" Name="caption"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="table of figures"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="envelope address"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="envelope return"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="footnote reference"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="annotation reference"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="line number"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="page number"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="endnote reference"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="endnote text"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="table of authorities"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="macro"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="toa heading"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="List"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="List Bullet"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="List Number"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="List 2"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="List 3"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="List 4"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="List 5"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="List Bullet 2"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="List Bullet 3"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="List Bullet 4"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="List Bullet 5"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="List Number 2"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="List Number 3"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="List Number 4"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="List Number 5"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Closing"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Signature"/> <w:LsdException Locked="false" Priority="1" SemiHidden="true" UnhideWhenUsed="true" Name="Default Paragraph Font"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Body Text"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Body Text Indent"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="List Continue"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="List Continue 2"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="List Continue 3"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="List Continue 4"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="List Continue 5"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Message Header"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Salutation"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Date"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Body Text First Indent"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Body Text First Indent 2"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Note Heading"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Body Text 2"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Body Text 3"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Body Text Indent 2"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Body Text Indent 3"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Block Text"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Hyperlink"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="FollowedHyperlink"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Document Map"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Plain Text"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="E-mail Signature"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="HTML Top of Form"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="HTML Bottom of Form"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Normal (Web)"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="HTML Acronym"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="HTML Address"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="HTML Cite"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="HTML Code"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="HTML Definition"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="HTML Keyboard"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="HTML Preformatted"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="HTML Sample"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="HTML Typewriter"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="HTML Variable"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Normal Table"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="annotation subject"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="No List"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Outline List 1"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Outline List 2"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Outline List 3"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Simple 1"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Simple 2"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Simple 3"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Classic 1"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Classic 2"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Classic 3"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Classic 4"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Colorful 1"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Colorful 2"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Colorful 3"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Columns 1"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Columns 2"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Columns 3"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Columns 4"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Columns 5"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Grid 1"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Grid 2"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Grid 3"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Grid 4"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Grid 5"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Grid 6"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Grid 7"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Grid 8"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table List 1"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table List 2"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table List 3"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table List 4"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table List 5"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table List 6"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table List 7"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table List 8"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table 3D effects 1"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table 3D effects 2"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table 3D effects 3"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Contemporary"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Elegant"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Professional"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Subtle 1"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Subtle 2"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Web 1"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Web 2"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Web 3"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Balloon Text"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Theme"/> <w:LsdException Locked="false" Priority="34" QFormat="true" Name="List Paragraph"/> <w:LsdException Locked="false" Priority="30" QFormat="true" Name="Intense Quote"/> <w:LsdException Locked="false" Priority="71" Name="Colorful

    East-West Technology Transfer: Basic Knowledge and Reflections

    Get PDF
    This report was commissioned by the International Council for New Initiatives in East West Cooperation (the "Vienna Council"). The rapid economic transition in many East West European countries has brought into sharp focus the need to modernize services, methods, management and specialized skills as well as products and processes in the manufacturing sector. In spite of the recent expansion of economic cooperation between eastern and western enterprises the economic and technical importance of these joint ventures are of little strategic importance to real economic reform. They are mostly small low-investment and mostly in the low sophistication services sector. The relevance of the technology to be transferred is of obvious importance in any joint venture or cooperative business arrangement. However, the major reasons for slow progress is rooted in other factors, such as management skills, existence of services and maintenance infrastructure, availability of supplies, availability of transport and logistics, to name a few. It was to provide some background in these non-technological aspects of technological transfer that prompted this Working Paper. It is in that context that this Working Paper should be viewed

    Location Tracking by Police: The Regulation of ‘Tireless and Absolute Surveillance’

    Get PDF
    Location information reveals people’s whereabouts, but can also tell much about their habits, preferences, and, ultimately, much of their private lives. Current surveillance technologies used in criminal investigation include many techniques to track someone’s movements; not all are equally intrusive. This raises the following questions: how do jurisdictions draw boundaries between lesser and more serious privacy intrusions? What factors play a role? How are geolocational privacy interests framed? In this Article, we answer these questions through a comparative analysis of location-tracking regulation in eight jurisdictions: Canada, Czechia, Germany, Italy, the Netherlands, Poland, the United Kingdom, and the United States. We analyze the legal status of location tracking through human observation, GPS tracking, cell-phone tracking, IMSI catchers (Stingrays), silent SMS, automated license-plate recognition, and directional Wi-Fi tracking in these countries. This results in highly context-dependent and case-specific assessments, in which eight factors play a role: use of a technical device, place, intensity, duration, degree of suspicion, object of tracking, covertness, and active generation of data. At a deeper level of analysis, we identify different conceptualizations of privacy underlying these assessments: not only classic privacy frames, such as communications secrecy, protection of home and body, and informational privacy, but also two new privacy frames: freedom of movement in combination with anonymity, and the mosaic theory. Thus, we discern a tentative but unmistakable shift in how lawmakers and courts assess the intrusiveness of location tracking, particularly of people’s movements in public space. Traditional privacy frames tend to downplay the seriousness of the privacy infringement enabled by location tracking, and our analysis demonstrates an increasing discomfort with this tendency, leading to the emergence of novel privacy frames (or theories) to regulate what might easily turn into what the Supreme Court of the United States has called “tireless and absolute surveillance.” We conclude that legal privacy frameworks developed in past centuries prove ill-suited for assessing the privacy-intrusiveness of contemporary location-tracking investigation methods, and that emerging, novel frameworks for understanding and protecting privacy may provide lawmakers and courts with the tools needed to address the challenge of preserving (geolocational) privacy in the twenty-first century

    Location Tracking by Police: The Regulation of ‘Tireless and Absolute Surveillance’

    Get PDF
    Location information reveals people’s whereabouts, but can also tell much about their habits, preferences, and, ultimately, much of their private lives. Current surveillance technologies used in criminal investigation include many techniques to track someone’s movements; not all are equally intrusive. This raises the following questions: how do jurisdictions draw boundaries between lesser and more serious privacy intrusions? What factors play a role? How are geolocational privacy interests framed? In this Article, we answer these questions through a comparative analysis of location-tracking regulation in eight jurisdictions: Canada, Czechia, Germany, Italy, the Netherlands, Poland, the United Kingdom, and the United States. We analyze the legal status of location tracking through human observation, GPS tracking, cell-phone tracking, IMSI catchers (Stingrays), silent SMS, automated license-plate recognition, and directional Wi-Fi tracking in these countries. This results in highly context-dependent and case-specific assessments, in which eight factors play a role: use of a technical device, place, intensity, duration, degree of suspicion, object of tracking, covertness, and active generation of data. At a deeper level of analysis, we identify different conceptualizations of privacy underlying these assessments: not only classic privacy frames, such as communications secrecy, protection of home and body, and informational privacy, but also two new privacy frames: freedom of movement in combination with anonymity, and the mosaic theory. Thus, we discern a tentative but unmistakable shift in how lawmakers and courts assess the intrusiveness of location tracking, particularly of people’s movements in public space. Traditional privacy frames tend to downplay the seriousness of the privacy infringement enabled by location tracking, and our analysis demonstrates an increasing discomfort with this tendency, leading to the emergence of novel privacy frames (or theories) to regulate what might easily turn into what the Supreme Court of the United States has called “tireless and absolute surveillance.” We conclude that legal privacy frameworks developed in past centuries prove ill-suited for assessing the privacy-intrusiveness of contemporary location-tracking investigation methods, and that emerging, novel frameworks for understanding and protecting privacy may provide lawmakers and courts with the tools needed to address the challenge of preserving (geolocational) privacy in the twenty-first century
    corecore