The New York Times ran an article on the use of surveillance tech in China. One wishes they would do the same for the U.S.
The NYT article came to some scary conclusions about autocratic China. Chinese authorities implement facial recognition tech everywhere they can, the police seek to connect electronic activity (making a call) to physical location, biometric information such as fingerprint and DNA is collected on a mass scale, and the government wants to tie together all of this data to build comprehensive profiles on troublesome citizens. The latter is the Holy Grail of surveillance, a single source to know all there is known about a person.
Should the Times (or China) wish to expand its review of invasive government surveillance technology, particularly those technologies which integrate multiple systems, it need look no further than its hometown police force, the NYPD, and data aggregated into the little-known Consular Consolidated Database (CCD) by the U.S. State Department.
Prior to 2021, when the New York City Council passed the Public Oversight of Surveillance Technology (POST) Act, citizens were left to piece together the various technologies used to surveil them based on scattered media reports. We know now the NYPD deploys facial recognition surveillance (and can retroactively employ facial recognition against video saved from one of 20,000 cameras), x-ray vans, Stingrays, ShotSpotters, and drones, among others, equipment all originally deployed in the Iraq and Afghan wars. But we still don’t know how many of these technologies are used in coordination with each other, and, as in China, that is the key to understanding their real effectiveness.
POST reporting and other sources offer some clues. The NYPD uses the smartphone-based Domain Awareness System (DAS), “one of the world’s largest networks of cameras, license plate readers, and radiological censors,” all created by Microsoft with video analytics by IBM. DAS also utilizes automated license plate reader (ALPRs) devices attached to police cars or fixed on poles to capture the license plates of all cars passing by. ALPRs can also capture photographs of cars, along with photos of the driver and passengers. This information is uploaded to a database where it can be analyzed to study movements, associations, and relationships. Facial Identification can then run photos, including from databases of arrest photos, juvenile arrest photos of children as young as 11, and photos connected to handgun permits. The system analyzes an image against those databases and generates potential matches in real-time.
Included in DAS is a translator application which helps officers communicate with community members who do not speak English, while of course also recording and storing their remarks. DAS ties in to ShotSpotter, a technology developed for the Iraq War which pinpoints the sound of gunfire with real-time locations, even when no one calls 911. This technology triangulates where a shooting occurred and alerts police officers to the scene, letting them know relevant information, including the number of shots fired, if the shooter was moving at the time of the incident (e.g., in a vehicle), and the direction of the shooter’s movement. DNA data can also be accessed, so wide-spread collection is a must. One area of activity outlined in Chief of Detectives Memo #17 instructs on how to collect “abandoned” DNA samples from objects such as water bottles, gum, and apple cores. For example, police officers are taught to wait for the suspect to take a drink or smoke, and collect the sample once a suspect throws the cup or butt away.
What is deployed in New York to aggregate sensor and bio data (including social media monitoring and cell phone locator services, which when tied to facial recognition can identify individuals, say who attend a protest, visit an AIDs clinic, etc.) will no doubt be coming soon to your town as the weapons of war all come home. The next step would be to tie together cities into regional and then state-wide networks. The extent to which information obtained from DAS is shared with federal agencies, such as immigration authorities, remains unknown. What we do know is the phrase “reasonable expectation of privacy” needs some updating.
Perhaps the largest known data aggregator within the Federal government is the innocent-sounding Consular Consolidated Database (CCD) administered by the U.S. Department of State. Originally a simple database created in the 1990s to track visa and passport issuances, the CCD is now one of the largest global databases of personal information, growing at a rate of some 35,000 records a day. The system collects data from both foreign visa applicants and American citizens to include but not limited to imagery for use with facial recognition, biometric data such as ten-fingerprint samples, home/business addresses, phone numbers, email addresses, financial information, race, gender, social security and alien registration numbers, passport information, certain Federal benefits, medical information, legal information, education information, family information, travel history, arrests and convictions, and social media indicators.
The CCD is especially valuable in that it is a database of databases, pulling together information collected elsewhere including abroad, as well as from some commercial databases and public records, and making the aggregate available both for individual search by identifiers like name, social security number or facial recognition, but also for very large scale analytic searches to identify patterns and trends. This massive pool of data is then made accessible to the Department of Homeland Security, Department of Commerce, Department of Defense, Department of Justice, Office of Personnel Management, Federal Bureau of Investigation, and “other interagency partners” to include potentially intelligence services. In addition to the State Department, information is regularly input into the CCD by the FBI, the Integrated Automated Fingerprint Identification System, DEA, ICE, IRS, DOD, Treasury, Health and Human Services (HHS), DHS, Interpol, and U.S. Marshal Service (USMS.)
Numbers of records held by CCD are not available, with the last public tallies documented in 2016 showing 290 million passport records on American citizens, 25 million records pertaining to American citizens living abroad, 184 million visa records of foreigners, and over 75 million photographs. Some 35,000 records are added to the CCD daily, so do the math given the existing tallies are up to 13 years old. As a point of comparison, Google’s database of landmark photos holds only five million records. The Library of Congress database lists 29 million books.
The New York Times article about surveillance in China is scary, showing what a vast, interconnected system is capable of doing in exposing a person’s life to scrutiny. The Chinese authorities are, however, realistic about their technological limitations. According to one bidding document, the Ministry of Public Security, China’s top police agency, believed one of their biggest problems was data had not been centralized. That Chinese problem appears well on its way to resolution inside the United States, and that is also quite scary.
Copyright © 2020. All rights reserved. The views expressed here are solely those of the author(s) in their private capacity.
I hate these people. I hate them for who they are and for what they are doing and most of all I hate them for the larger thing they are a part of.
The people I hate call themselves sedition hunters. They give themselves war names glorified by a liberal press, names like Deep State Dogs and Capitol Terrorists Exposers. What these people do, as a sort of Orwellian hobby, is identify people who participated in the January 6 Capitol riot. They spend their days slithering around the Internet looking for evidence that can put a name to a press photo and then turn what they find over to the FBI in hopes the Feds will play Sturmtruppen to their Gestapo and kick some doors down. They turn neighbors in to law enforcement as a hobby.
One specific goal they have is to find higher quality images of a suspect that the FBI or their more tech-savvy fellow fascists can run against facial recognition tools. They spend hours on PimEyes, a facial recognition website, copying and pasting photos from CNN freeze frames and Facebook profiles. And unlike the FBI, whose use of facial recognition is at least nominally controlled by law, these amateurs are free to use and misuse the tech on behalf of the FBI without legal or moral fetter.
Here’s how one hagiographic journalist described the sedition hunters: “There are archivists with the encyclopedic knowledge of the timeline, locations and key players. There are hashtaggers who generate catchy, memorable nicknames [example: NaziGrayHat, AuntRageFace, MAGAGuy] to help the community track the actions of suspects still at large. There are the computer whizzes who create slick websites that let you explore evidence in a user-friendly format. There are the diplomats who serve as liaisons between break off groups in the larger sedition hunters network.”
One of those slick websites, January 6 Evidence, offers a minute-by-minute timeline linking photos and videos, overlaid with a geolocator map for suspects. You can filter for AntiAbortionTrumpers and CapitolFireExtinguishers, or chose to target only Proud Boys or Oath Keepers. The Persons of Interest page displays almost 1,800 faces, photos we assume were taken from the press coverage but who knows, of those ID’ed and those pending ID, updated with links for people busted by the Feds. One of the page developers, K2theSky, runs a companion Twitter account all about tracking down the January 6 participants that plays out like a serial killer’s bulletin board. You can almost hear her greasy sounds of self-pleasure in the background as a crusader tags another victim. It goes well beyond the “revenge of the nerds” meme the MSM employs to humanize these people.
The web site is an extraordinary obsession. While you were walking the dog, or volunteering at the food bank, these people did all this work on their own, for free. It takes a lot of hate to inspire thousands of painstaking, detail-oriented hours of free work over a period of months. Imagine that much hate channeled by a charismatic leader. It would be a triumph of will.
Putting the events of January 6 in perspective is important to understanding my hate for these people. January 6 just was not anything significant, despite all the heat and noise. The most perfect way to know that is to look at the convictions resulting out of all this Scooby “sleuthing” and FBI work. To date 702 people have been arrested. Of the completed cases, the majority have been plead guilty to things like trespassing, unlawful entry, and picketing in a Federal building, the kind of things which follow a rowdy Ohio State-Michigan game. There have been no convictions for treason, sedition, incitement or insurrection (though Stewart Rhodes, the Oath Keepers founder, has been charged with conspiracy related to sedition.) Things are so far from reality that one rioter just skipped prison time because the judge noted she came to the Capitol in a tutu and not tactical gear.
The Capitol riots were goonish, embarrassing, but in the end about as historically meaningful as a floor brawl in the Taiwanese legislature. For it to be a coup, insurrection, etc., it would have needed a path toward accomplishing a change of government. There never was any. Joe Biden was always going to be president just like the election said should happen. All the mob accomplished was a meaningless few hours’ delay in a largely ceremonial christening by the House. Trump’s actions vacillated between bizarre and shameful, but hardly Weimar material. As the fat kid in Jojo Rabbit said, “Not a good time for Nazis.”
We must also dismiss the notion that the sedition hunters are some sort of modern day crime fighting superheroes. They are politically motivated vigilantes. They don’t hunt pedophiles or murders, they hunt Trump supporters over misdemeanor trespassing cases. Their actions are not aimed at justice but rather toward contributing to a propaganda meme that says what happened on January 6 was the most significant events of their meaningless lives. They do not want to solve crimes; they want to ruin the lives of people pictured by the media.
In the aftermath of the Rittenhouse trial it has become common to rhetorically ask “What would have happened if Kyle Rittenhouse was black?” So let us try the same here. Imagine a group of online sleuths dedicating themselves to identifying the young black men who busted windows and burned stores during BLM riots. Imagine people devoting their lives to creating online resources with real-life consequences for Americans not charged with any crime, feeding everything from rumors to facial recognition results to law enforcement so they could kick down some uptown door and drag a 24-year-old black kid to jail.
I hate the sedition hunters because they do not realize they are pawns in a larger game. Democrats and mainstream media are trying to sell the events of January 6 to frightened Americans as a new 9/11. This is in service to two goals: electing a Democrat in 2024, and using the tools of law enforcement against Republican supporters. You, too, should hate that.
Copyright © 2020. All rights reserved. The views expressed here are solely those of the author(s) in their private capacity.
I’ll unpack the Constitutional issues in a bit, but first, the technology.
Michigan State University professor who holds six U.S. patents for fingerprint recognition technology was asked by police to help catch a murderer. The cops scans of the victim’s fingerprints and thought that unlocking his phone might provide clues as to who killed him.
The professor converted the fingerprint scans and 3D printed versions of all 10 digits. He then coated them with a micro-layer of metallic particles to mimic skin’s conductivity. The final 3D-printed fingers aren’t finished, but they’ll be ready for police to try out soon.
The potential Constitutional issues here are an amazing challenge to the Fourth Amendment’s assurances against unwarranted search, and the Fifth’s protections against self-incrimination. They don’t apply to this current case, as the prints in question comes from a dead man, but…
In in 2014 a judge controversially ruled that (living) suspects can be required to unlock a phone with a fingerprint. While the Fifth Amendment protects the right to avoid self-incrimination and makes it illegal to force someone to give out a passcode, biometric indicators like fingerprints are not covered by the Fifth Amendment, according to the ruling. So, if your phone or other device is protected with a fingerprint, the current law says cops can compel you to open it. If the phone is protected by a PIN number, the cops cannot compel you to open it.
The judge’s logic is interesting. He wrote giving police a fingerprint is akin to providing a DNA or handwriting sample, or presumably an iris scan or facial recognition, which the law permits. A pass code, though, requires the defendant to divulge knowledge, which the law protects against.
It is not hard to imagine a future court ruling that all a bunch of nonsense and (hopefully) declaring the police cannot compel you to unlock your phone for them. But of course the cops can fingerprint you, and can have those prints 3D reproduced, and might be able to open your phone that way. So is or is that not Constitutional?
And cool: if the police already have your iris scan, facial data or prints on file, they don’t even need to bother to talk to you about any of this at some point.
In the age of Snowden’s revelations, big data and all sorts of electronic spy gear we have yet to learn about or invent, has technology finally outrun the otherwise pretty good record of the Bill of Rights for keeping up with the times?
BONUS: Protect your phone with a strong PIN at the minimum.
Copyright © 2020. All rights reserved. The views expressed here are solely those of the author(s) in their private capacity.
Cleveland Police Chief Calvin Williams issued a warning to an undisclosed number of masked protesters outside the Republican National Convention: “If you are a member of a group that causes you to have to hide your face, then you probably need a different cause.”
Police claim they have received at least a dozen calls related to concerns about the small groups of black-clad “anarchists” with masks.
So why is Chief Williams so concerned about the face masks? Too early for Halloween?
Nope, facial recognition.
Law enforcement aggressively employs facial recognition technology at events such as the Republican National Convention to identify “persons of interest” and to catalog new persons of interest. Masked faces don’t play as well with the technology (though newer tech can get around some limitations, and iris scan tech needs only to see your, well, eyes. More below.)
With facial recognition, a computer digitizes an image of someone’s face in a way that makes fooling the system difficult, stuff like measuring the distance between eyes, the angle of one’s nose, ear lobe shape and other tough to alter things.
Like this:
Reports suggest in addition to public gatherings where people are enjoying their First Amendment rights to assemble and speak, airports scan passengers, hotels scan lobbies, stores scan aisles, casinos scan their gambling floors and many police street cameras are tied into the systems.
A publicly-known example occurred after the Boston Marathon bombing of April 2013. The subsequent Boston Calling music fest was subject to heavy use facial recognition surveillance, one guesses in case there were more Tsarnaev brothers out there. Law enforcement in the UK used facial recognition technology to scan the faces of thousands of attendees at the Download music festival without their knowledge.
And, oh, yeah, those iris scanners.
Iris scanners have quickly moved from the realm of science fiction into everyday public use by governments and private businesses.
Iris recognition is rarely impeded by contact lenses or eyeglasses, and can work with blind individuals as well. The scanners can catalog up to 50 people a minute without requiring the individuals to stop and stand in front of the scanners.
Information gathered from iris scanners or facial recognition in multiple locations can be sent to a central database that can be used to track an individual’s movement throughout the city, or to determine which individuals in the database associate together.
So hippie protesters, have a great time in Cleveland! Actually, the cops will know if you are having a good time, because they are watching.
Copyright © 2020. All rights reserved. The views expressed here are solely those of the author(s) in their private capacity.
Hey, Big Brother? It’s me. Can we talk about facial recognition please?
The Download Festival
See, the police used facial recognition technology to scan the faces of thousands of attendees at the Download music festival in the UK without their knowledge.
The excuse the Leicestershire Police used was that they were trying to catch “organized criminals” who specifically target music festivals to “steal mobile phones,” according to a report in Police Oracle. The collected footage is compared against a database of custody images to identify the criminals, in this case, an alleged music festival phone-robbing crime ring that nobody seemed to have heard about prior to it becoming the justification for searching an entire crowd who did nothing but show up to hear some tunes.
The festival saw 91 arrests out of 100,000 people. Most were for alcohol-related mishaps, none for phone theft.
Facial Recognition Technology
Facial recognition technology is big business. The tech is evolving rapidly. Basically a computer digitizes an image of someone’s face in a way that makes fooling the system difficult, stuff like measuring the distance between eyes, the angle of one’s nose, ear lobe shape, the sort of stuff that can’t be thrown off by face paint, a hat, sunglasses or the like. And the software can be configured to zero in on someone who is wearing face paint, a hat and sunglasses, so nice try, you in the back row. You’re now a person of interest.
Facial recognition is increasingly being used by law enforcement. In the U.S., it’s used by the FBI and local police departments. The largest scale use of the tech in America is at major sporting events like the Super Bowl, supposedly because terrorists are flocking there, even though they never have.
Reports suggest airports scan passengers, hotels scan lobbies, stores scan aisles, casinos scan their gambling floors and many police street cameras are tied into the systems. Another publicly-known example occurred after the Boston Marathon bombing of April 2013. The subsequent Boston Calling music fest was subject to heavy use facial recognition surveillance, one guesses in case there were more Tsarnaev brothers out there.
Nobody wants the World Series blown up by terrorists. And guess what — neither before nor after 9/11 has any terror group carried out a mass casualty attack (if you want to count the goofball Tsarnaev brothers in Boston as a terror group, and the [unfortunate] deaths of the three spectators there was “mass,” be my guest.) And of course neither facial recognition tech nor anything else seems to deter our regularly-scheduled mass shootings (been to the movies lately?)
Why It Matters
The concern over widespread and indiscriminate use of mass surveillance technology, such as facial recognition, is that it is widespread and indiscriminate, a form of search (your location) and seizure (your image and location data) that, in the U.S. at least, thumbs its nose at the Constitution’s Fourth Amendment protections against unwarranted actions. So it is simply wrong on its, well, face.
Someone inevitably will respond to all this with a hearty “Well, I’ve got nothing to hide.”
Good for you. You are quite a person if you indeed have nothing at all to hide. And maybe you really don’t, at least under today’s laws.
But information collected never goes away. Your “nothing to hide” argument has built into it your full and true faith that every government, every company, every hacker that can, will or might gain access to that data will never do anything with it against your self-interest. You are asserting that no new technologies will emerge to manipulate that data in a way you blearily can’t conceive of now.
That, my friend, is a lot of faith in Big Brother.
Copyright © 2020. All rights reserved. The views expressed here are solely those of the author(s) in their private capacity.