1,879 research outputs found

    CCTV Surveillance System, Attacks and Design Goals

    Get PDF
    Closed Circuit Tele-Vision surveillance systems are frequently the subject of debate. Some parties seek to promote their benefits such as their use in criminal investigations and providing a feeling of safety to the public. They have also been on the receiving end of bad press when some consider intrusiveness has outweighed the benefits. The correct design and use of such systems is paramount to ensure a CCTV surveillance system meets the needs of the user, provides a tangible benefit and provides safety and security for the wider law-abiding public. In focusing on the normative aspects of CCTV, the paper raises questions concerning the efficiency of understanding contemporary forms of ‘social ordering practices’ primarily in terms of technical rationalities while neglecting other, more material and ideological processes involved in the construction of social order. In this paper, a 360-degree view presented on the assessment of the diverse CCTV video surveillance systems (VSS) of recent past and present in accordance with technology. Further, an attempt been made to compare different VSS with their operational strengths and their attacks. Finally, the paper concludes with a number of future research directions in the design and implementation of VSS

    The significance of video evidence analysis in the investigation of murder cases against the police

    Get PDF
    The researcher attempts to establish the significance of video evidence analysis in the investigation of murder cases against the police. The evidence obtained could be crucial and admissible in court and ultimately resulted in the successful prosecution of an accused person. In order for investigators to conduct an effective investigation, it is important that they become familiar with the application of video evidence, its purpose, benefits and shortfalls. In order to achieve the intended goals and objectives of video evidence, the investigators should know how to collect, package, process and analyse video evidence. The clarification and processing of the crime scene of video evidence as well as the identification of a suspect at the scene of crime is very much important and without video evidence it would be difficult to convict an accused person in a court of law.Police PracticeM. Tech. (Forensic Investigation

    Balancing End-to-End Encryption and Public Safety

    Get PDF
    Over the last decade, there has been a significant debate around end-to-end encryption (E2EE) and its implications for public safety. At the forefront of the discourse is a false dichotomy between protecting privacy and ensuring national security. At the extreme ends of this deeply polarised debate are two key arguments. On the privacy side, it is believed that governments and law enforcement agencies desire unrestrained exceptional access to E2EE communications to spy on their citizens. On the security side, it is maintained that obtaining lawful exceptional access is the only way to protect citizens and uphold national security. The debate has reached a deadlock, with both sides perpetuating zero-sum views.However, experts are calling for a more nuanced conversation about possible solutions to the criminal use of E2EE services. It is vital that a range of views are considered in order to identify the key issues and inform a more productive debate. Through a review of the existing literature and insights from 22 semi-structured interviews, this paper balances the perspectives from a range of relevant stakeholders on the main elements of the E2EE debate and presents some key takeaways in an effort to move away from a crude privacy-versus-security binary.The paper presents the following key findings:There are clear and significant cyber security and privacy benefits to E2EE. Efforts to weaken or restrict its access would be a net loss for all.Criminal use of E2EE is a significant risk to public safety and solutions are vital. Yet, it should also be acknowledged that technology is an enabler of criminal and harmful activity and should not be treated as the root cause.The possibility of developing technical tools which could assist law enforcement investigations should not be categorically ruled out, but future proposals must be measured against the principles of proportionality, legality and technical robustness.Alternative options for law enforcement investigations such as metadata analysis and legal hacking should be considered, but they are not without their drawbacks. Legal hacking could be proportionate but its reliance on software vulnerabilities is largely at odds with strong cyber security. Metadata analysis is promising but more research is needed to determine the extent to which it can be used to aid law enforcement investigations.Industry do have a responsibility to make their platforms safer and free from criminal abuse. This requires implementation of safety-by-design principles and the provision of resources for better digital literacy and education. Governments must have oversight over the technical tools developed.A more nuanced debate must continue which actively moves away from zero-sum views of absolute privacy versus absolute security, and focuses more on how the risks to public safety can be reduced in proportion with the need to protect citizens' rights and freedoms

    Re-Righting the Right to Privacy: The Supreme Court and the Constitutional Right to Privacy in Criminal Law

    Get PDF
    Since the 1970\u27s, federal legislation has expanded privacy rights in nonconstitutional areas. Juxtaposed against this more liberal legislative trend is the action of a significantly more conservative judiciary which has, and is, contracting that right in those areas governed by the Constitution. An examination of the Supreme Court\u27s most recent decisions in the criminal law arena readily bears witness to this proclivity

    Interdisciplinary perspectives on privacy awareness in lifelogging technology development

    Get PDF
    Population aging resulting from demographic changes requires some challenging decisions and necessary steps to be taken by different stakeholders to manage current and future demand for assistance and support. The consequences of population aging can be mitigated to some extent by assisting technologies that can support the autonomous living of older individuals and persons in need of care in their private environments as long as possible. A variety of technical solutions are already available on the market, but privacy protection is a serious, often neglected, issue when using such (assisting) technology. Thus, privacy needs to be thoroughly taken under consideration in this context. In a three-year project PAAL (‘Privacy-Aware and Acceptable Lifelogging Services for Older and Frail People’), researchers from different disciplines, such as law, rehabilitation, human-computer interaction, and computer science, investigated the phenomenon of privacy when using assistive lifelogging technologies. In concrete terms, the concept of Privacy by Design was realized using two exemplary lifelogging applications in private and professional environments. A user-centered empirical approach was applied to the lifelogging technologies, investigating the perceptions and attitudes of (older) users with different health-related and biographical profiles. The knowledge gained through the interdisciplinary collaboration can improve the implementation and optimization of assistive applications. In this paper, partners of the PAAL project present insights gained from their cross-national, interdisciplinary work regarding privacy-aware and acceptable lifelogging technologies.Open Access funding enabled and organized by Projekt DEAL. This work is part of the PAAL-project (“Privacy-Aware and Acceptable Lifelogging services for older and frail people”). The support of the Joint Programme Initiative “More Years, Better Lives” (award number: PAAL_JTC2017), the German Federal Ministry of Education and Research (grant no: 16SV7955), the Swedish Research Council for Health, Working Life, and Welfare (grant no: 2017–02302), the Spanish Agencia Estatal de Investigacion (PCIN-2017-114), the Italian Ministero dell’Istruzione dell’Universitá e della Ricerca, (CUP: I36G17000380001), and the Canadian Institutes of Health Research is gratefully acknowledged

    Fourth Amendment Time Machines (And What They Might Say About Police Body Cameras)

    Get PDF

    The Need for the Federal Wiretap Act to Expand Protection of our Wireless Communications

    Get PDF

    Grounding Drones: Big Brother’s Tool Box Needs Regulation Not Elimination

    Get PDF
    The Ford Model A was advertised as “the latest and best” in the world in 1903 and sparked global interest to design and create better, faster, and more complex machines than had ever traveled on land. Fast forward to the 21st century and creating machines that can travel around the world’s airspace appears to be the latest fascination. Until relatively recently, only airplanes and helicopters dominated the friendly skies. But now, the public is catching on to the idea that building an aircraft is easier that one might expect. In fact, a pilot is no longer necessary. Drones, also referred to as unmanned aerial vehicles (UAVs) or remotely piloted aircraft (RPA), can fly without a human operator
    • 

    corecore