· web viewcollaborative project quarterly update on technology 8 d12.2.8 project co-funded by...

39
FP7-SECT-2007-217862 DETECTER Detection Technologies, Terrorism, Ethics and Human Rights Collaborative Project Quarterly Update on Technology 8 D12.2.8 Project co-funded by the European Commission within the Seventh Framework Programme (2002-2006) Dissemination Level PU Public X PP Restricted to other programme participants (including the RE Restricted to a group specified by the consortium CO Confidential, only for members of the consortium (including the Commission Services) Due date of deliverable: 28/02/2011 Actual submission date: Start date of project: 1.12.2008 Duration: 36 months 1

Upload: truongkiet

Post on 15-Mar-2018

215 views

Category:

Documents


3 download

TRANSCRIPT

Page 1: · Web viewCollaborative Project Quarterly Update on Technology 8 D12.2.8 Project co-funded by the European Commission within the Seventh Framework Programme (2002-2006) Dissemination

FP7-SECT-2007-217862

DETECTERDetection Technologies, Terrorism, Ethics and Human Rights

Collaborative Project

Quarterly Update on Technology 8

D12.2.8

Project co-funded by the European Commission within the Seventh Framework Programme (2002-2006)Dissemination Level

PU Public XPP Restricted to other programme participants (including the Commission Services)RE Restricted to a group specified by the consortium (including the Commission

Services)CO Confidential, only for members of the consortium (including the Commission

Services)

Due date of deliverable: 28/02/2011Actual submission date:

Start date of project: 1.12.2008 Duration: 36 months

WP02 Professor Tom SorellAuthor(s): Dr. John Guelke UoB

1

Page 2: · Web viewCollaborative Project Quarterly Update on Technology 8 D12.2.8 Project co-funded by the European Commission within the Seventh Framework Programme (2002-2006) Dissemination

Detection Technology Survey no. 8

This is the eighth of ten surveys and a work in progress. It should not be treated in any way as a ‘final analysis’. The taxonomy of risks and harms employed here is evolving and will not necessarily be the same used for subsequent surveys. Any comments, suggestions, errata or requests for more information should be sent to the author, John Guelke, at [email protected].

Alternative Approaches

The PRISE project categorises privacy dangers arising from applications of security technology. It conceives basic technologies (e.g. sensor, communications technology) and identifies specific vulnerabilities each suffers from. Thus more complex applications which involve a variety of the above inherit the problems of all: e.g. Machine Readable Travel Documents involve communications technology, sensors, data storage and biometrics.

However, the categorisation departs from those used by industry quite substantially – there is no systematic presentation of the risks posed by the categories of DT as understood by industry. My categorisation of the technologies is written so as to be as continuous with, and user friendly to, industry as is practical.

Note on the Table of Moral Risks

The table introduced in this survey is designed to visualise some of the analysis of the relative risks of detection technology from DETECTER Deliverable D05.2. Each table compares the moral risks incurred by CCTV in public places, full body scanners, substance detectors, covert cameras, bugging, phone monitoring, location tracking, internet monitoring and databases and datamining. There are four tables in total. Three dealing with the three key moral risks identified in D05.2 – intrusion, error and chill – and one final table summarising this information.

2

Page 3: · Web viewCollaborative Project Quarterly Update on Technology 8 D12.2.8 Project co-funded by the European Commission within the Seventh Framework Programme (2002-2006) Dissemination

Necessarily the analysis presented in the tables is simplified but in all cases more detailed argumentation backing up the conclusions reached can be found in paper D05.2.

The table highlights the severity of moral risks taken on the basis of a colour code: green to indicate the least risk, yellow to indicate an intermediate risk, and red to indicate the greatest risk.

In the table on intrusiveness I identify four sources of intrusion: invasions that penetrate the privacy of the home and what I call after deliverable D05.2 ‘home spaces’;1 Invasions that penetrate the zone covering the body;2 invasions into private life;3 and accessibility of information acquired by further agents.

In the table on error I examine four issues affecting each technology’s risk of producing mistakes. First, whether the information acquired is itself prone to false positives/ambiguity. Second, whether sanction against the individual is possible on the basis of errors generated. Third, whether errors can result from the storage of information. Fourth, whether errors can result from a lack of training. In the case of each of these four issues I further consider whether these sources of error raise problems of a particularly significant species of error: discrimination.

News

Europe

Google admits that the email information its Street View service acquired included both individual emails, URL’s and passwords.4 The British Information Commissioner’s Office reopens its investigation into Google Street View. The Communications Minister Ed Vaizey suggests Google may be

1 “This is a person’s default environment of choice, that is, the place he willingly occupies when he has nowhere else to go, and the place from which he typically sets out when he enters public space. Home is also the place to which others have to be invited if they are legitimately to join an individual who is willingly on his own. It is in this sphere that intimate relationships with family and friends are developed over time, and where the liberty to do things as one likes – irrespective of public conventions of cleanliness, tidiness, profanity and so on – is at its greatest.” (Guelke and Sorell, 2010, 8)2 “...the naked body, and especially the parts of the body associated with activities that are conventionally shielded from public view: sex and excretion, dressing and undressing.” (ibid)3 “The principle that certain matters are beyond the legitimate interest of the state is an important feature of liberal societies. Matters of individual conscience, such as religion, or political beliefs are considered to not be legitimate matters of concern, and for the state to require such information would be seen as overreaching – as upsetting the balance of power between the state and the individual.” (ibid, 20)

4 http://www.reuters.com/article/2010/10/22/us-google-idUSTRE69L4KW20101022 3

Page 4: · Web viewCollaborative Project Quarterly Update on Technology 8 D12.2.8 Project co-funded by the European Commission within the Seventh Framework Programme (2002-2006) Dissemination

fined and that in the future Internet companies providing a similar service would be requested to work with the ICO on ‘ground rules’ before intruding on privacy.5

The Article 29 Data Protection Working Party calls for a stricter EU/US privacy agreement, describing the agreement reached over access to the SWIFT banking database ‘unsatisfactory’.6

France

The controversial ‘Loppsi 2’ law is passed after much discussion in parliament. The proposed legislation is criticized as enabling websites to be blocked without judicial control and police to install spyware without the need for justification.7

UK

The Information Commissioners Office begins exercising its new powers to issue fines, fining Hertfordshire County Council £100,000 (€115,000) for twice sending sensitive information to the wrong recipient and employment company A4e £60,000 (€68,000) for giving an unencrypted laptop with the personal information of 24,000 people to an employee to take home which was subsequently stolen.8

Spain

The Data Protection Authority says Google violated ‘right to be forgotten’, encoded in a Spanish law entitling individuals to a measure of control over information about themselves, calling on Google to address search results linking to out of date or inaccurate articles about individual complainants. Google rejects the request as a form of censorship.9

Denmark

5 http://www.telegraph.co.uk/technology/google/8095954/Google-escapes-prosecution-over-Streetview-data.html#

6 http://ec.europa.eu/justice/policies/privacy/news/docs/pr_19_11_10_en.pdf

7 http://www.edri.org/edrigram/number9.1/loppsi-2-adopted-assembly 8 http://www.guardian.co.uk/technology/2010/nov/24/hertfordshire-council-child-sex-abuse-data

9 http://www.bbc.co.uk/news/technology-12239674 4

Page 5: · Web viewCollaborative Project Quarterly Update on Technology 8 D12.2.8 Project co-funded by the European Commission within the Seventh Framework Programme (2002-2006) Dissemination

A new law is proposed that would enable tax authorities to mirror/copy entire hard drives of companies without any need for a court order as is currently the case.10

Austria

The European Commission refers Austria to the European Court of Justice for failure to keep its Data Protection Authority independent. Previously the Commission had offered an opinion under EU infringement procedures, which the Austrian government has not implemented.11

Portugal

There is a new scheme putting cameras in traffic police cars. The cameras can be upgraded to have Automatic Number Plate Recognition capabilities.12

New Products

Trends

Biometric voice identification over mobile phones.

Access to CCTV system over mobile devices.

Increasing prevalence of audio surveillance functions on new CCTV cameras

10 http://www.loc.gov/lawweb/servlet/lloc_news?disp3_l205402373_text

11 http://europa.eu/rapid/pressReleasesAction.do?reference=IP/10/1430&format=HTML&aged=0&language=EN

12 http://www.prosecurityzone.com/News/Surveillance/Mobile_and_rapid_deployment_cameras/In-car_traffic_police_surveillance_in_use_in_portugal_15895.asp#axzz1DHh0iOJ1

5

Page 6: · Web viewCollaborative Project Quarterly Update on Technology 8 D12.2.8 Project co-funded by the European Commission within the Seventh Framework Programme (2002-2006) Dissemination

Trackers

Portman Security Weapons Intelligent Tracking System - Weapon, dog and body armour tracking http://www.prosecurityzone.com/News/Surveillance/Tracking_and_eas/Weapon_tracking_added_to_portman_protection_range_15710.asp#axzz1DHh0iOJ1

Cameras

Samsung’s SRD-450 – Digital Video Recorder aimed at the home security market, enabling viewing of camera feeds online http://www.samsungsecurity.co.uk/news/product_view.asp?iPage=1&seq=331&selSearch=all&txtSearch=

Toshiba’s IK-WD12A – Mini Dome Internet Protocol camera with day/night capability http://www.toshibasecurity.com/products/prod_camera_detail_ikwd12a.jsp

SUI Goodrich’s SU640KTS – Compact thermal imaging camera http://www.sensorsinc.com/downloads/SU640KTS.pdf

Siqura’s MSD 620 – Internet Protocol Point, Tilt and Zoom camera with day/night capability, 2 way audio, and privacy masking. http://www.sourcesecurity.com/docs/fullspec/MSD620-EN.pdf

Basler IP Cameras – range of Internet Protocol cameras with day/night functionality, motion detection and intelligent alarms.

6

Page 7: · Web viewCollaborative Project Quarterly Update on Technology 8 D12.2.8 Project co-funded by the European Commission within the Seventh Framework Programme (2002-2006) Dissemination

http://www.baslerweb.com/downloads/21425/BAS1102_8S_IP_Camera_AE_Web_110211.pdf

Vista VBC600 – Long range bullet camera with day/night capability. http://www.vista-cctv.com/news/ref:N4D00C565489E9/

Toshiba IKWB80A – Day/night Internet Protocol camera http://www.toshibasecurity.com/products/prod_camera_detail_ikwb80a.jsp

Samsung SCO 2370 – Day/night bullet camera with motion detection and privacy masking http://www.samsungsecurity.co.uk/product/product_view_feature.asp?p=1150.

Vista VBC503 – Long range dual infrared bullet camera. http://www.vista-cctv.com/news/ref:N4D2ED5247698C/.

Intamac Halo – Home Monitoring Service enabling online access to camera feeds in the home. Applications cited includes ‘Smart Energy, Home Security, Telecare, View, and Home Automation & remote control’. Now enabled for 3G access.13 http://www.home-halo.co.uk/

Basler BIP2-D1300c-dn - High Definition Internet Protocol Dome Camera with day/night functionality. Equipped with microphones for audio capability http://www.baslerweb.com/beitraege/beitrag_en_118102.html

Lilin DVR-304 – Digital video recorder able to recognise preset alarms (which can be used to trigger higher quality recording, as a hard drive maximising

13 http://www2.intamac.com/media-relations/intamac-systems-ltd-launches-next-generation-of-3genabled-connected-home-services.html

7

Page 8: · Web viewCollaborative Project Quarterly Update on Technology 8 D12.2.8 Project co-funded by the European Commission within the Seventh Framework Programme (2002-2006) Dissemination

function) and supporting remote online access including smart phone specific applications. http://www.meritlilin.co.uk/generic_62.htm

Sony Image Sensing Solutions Micro XCD – Miniaturised camera (19x29x29mm) http://www.imveurope.com/products/product_details.php?product_id=1201

Stemmer Imaging Miniature High Definition Board Level Camera – 42 x 42 x 34 mm camera, marketed as low cost and suitable for mounting in awkward positions or on moving objects http://www.stemmer-imaging.co.uk/en/pages/news/item.php?item=4135

Synectics Simplicity – Digital video recorder enabling remote access and programmable to respond to specified alerts http://www.synx.com/simplicity/?s=about

Smartec STR-0484 – Digital video recorder equipped for audio inputs, programmable alerts and search capabilities http://smartec-security.eu/en/product/str-0484.htm

Ethernet Direct EDS-741WH - Outdoor Internet Protocol camera, equipped with two way audio http://www.controlglobal.com/vendors/products/2010/388.html

Samsung Techwin SNP-3430H - Long range dome camera, with day/night functionality, intelligent video analytics and privacy masking http://www.samsungtechwin.com/product/file_data/manual/20101027_0_1009.SNP-3430H_E(10.09.28).pdf

8

Page 9: · Web viewCollaborative Project Quarterly Update on Technology 8 D12.2.8 Project co-funded by the European Commission within the Seventh Framework Programme (2002-2006) Dissemination

Oncam Global IPZoom – Internet protocol 360 degree vision camera complete with video analytics software enabling, in addition to identification of preset events, may also target abnormal behaviour and enables the operator to tag an item or individual for tracking by other co-located cameras on the system http://www.oncamglobal.com/ipzoom.html

Ovation System - Covert surveillance system with digital video recorder for use with additional miniaturised camera, microphones and GPS receiver http://www.ovation.co.uk/FlashBack-3-Connectors/FlashBack-3-digital-video-recorder-with-connectors.html

Face Watch – ‘Internet based partnership between business and police’ to combat low level crime by enabling the sharing of images between users http://facewatch.co.uk/home/about-what

Scanners

Morpho Detection CTX 5800 – Cargo screener which carries out detailed 3D imaging of scanned items http://www.morpho.com/IMG/pdf/CTX_5800_en.pdf

Biometrics

Neurotechnology Mega Matcher 3.0 – Fingerprint and iris and face matching system http://www.neurotechnology.com/download/MegaMatcher_Accelerator_Brochure_2011-02-22.pdf

9

Page 10: · Web viewCollaborative Project Quarterly Update on Technology 8 D12.2.8 Project co-funded by the European Commission within the Seventh Framework Programme (2002-2006) Dissemination

Persay FreeSpeech – Voice biometric system designed for use on conversation between callers and agents in contact centres http://www.persay.com/freespeech.asp

iEvo Reader - Fingerprint reader for access control http://www.ievoreader.com/

Neurotechnology Mega Matcher 4.0 – Fingerprint, iris, face and palm matching system http://www.neurotechnology.com/megamatcher.html

Previously Surveyed Products

Cameras

Secura Systems Mobile Video Unit - Stand-alone container equipped with pneumatic telescopic pole of 6 meters, 230V power connector with inverter, backup power supply with a 1000 Ah battery and cameras and recording equipment. Optional intra red illuminators. Can be equipped with GPRS / UMTS / HSDPA and/ or Wavesight Wireless Transmission products. http://www.securasystems.de/index_en.php?content=mobile&item=p04

OnSSI’s NetDVMS – multi site, multi server, network video recorder and camera management system, with integrated video analytics. http://www.onssi.com/component/option,com_product/Itemid,30/attributes,2/option_id,2/task,attributes/id,1/detail,description/

Redvision RV Dome Camera – Built in infra red illumination http://www.norbain.co.uk/news/ref:N4B1E3AA8A0276/

Pentax Atmospheric Interference Reduction Technology – Enables surveillance cameras to continue working effectively in adverse weather conditions.

10

Page 11: · Web viewCollaborative Project Quarterly Update on Technology 8 D12.2.8 Project co-funded by the European Commission within the Seventh Framework Programme (2002-2006) Dissemination

http://prosecurityzone.com/Customisation/News/Surveillance/Optics_and_components/Surveillance_lens_overcomes_weather_interference.asp

Samsung SID-70 – Day and night dome camera. http://www.samsungtechwin.com/product/pro_view_eng.asp?pro_uid=4753&cat_uid=16&cat_biz=CTV&cat_lev=AC

Xeno Bullet Cameras – Discrete CCTV cameras. http://www.norbain.co.uk/go.php?structureID=search&searchType=products&keywords=xeno&x=0&y=0

IndigoVision PTZ 11000 – IP HD dome camera. http://prosecurityzone.com/Customisation/News/Surveillance/Fixed_and_PTZ_dome_cameras/Low_bandwidth_High_Definition_IP_dome_camera.asp

Napco IVR250 – Internet based video recorder. Access to footage via password protected website (actively marketed at security dealers who can maintain control and cut off access in the event of non-payment). http://www.napcosecurity.com/images/web%20pdf/A594_Napco%20iSee-IVT-250.pdf

Samsung iPOLIS Dome Camera Range – Features MPEG-4 and JPEG codecs to enable multiple streaming. http://www.sovereigncctv.co.uk/cat--Samsung-Techwin-IP-Monitoring-home--7.8.9.html

FLIR SR 304 – Long range infra red camera. Can identify human at 2 km. http://www.flir.com/uploadedfiles/Eurasia/MMC/Comm_sec/SS_0020_EN.pdf

Mel Secure Systems Talkback System – Enable user of a CCTV system to communicate via a loudspeaker with the subject. http://prosecurityzone.com/Customisation/News/Alarms/Alarm_signalling_transmission_and_notification/Talkback_system_enables_warnings_to_be_broadcast.asp

Smartvue Network Video Surveillance Systems: An integrated network video system with wireless and wired cameras, network video recorders, and remote access. http://www.kanecomputing.co.uk/smartvue.htm

Genetec – Security Center Unified Security platform: Integrates IP camera network, IP access control and licence plate recognition. http://www.genetec.com/English/Products/Pages/security-center-unified-security-platform.aspx

TSS DVR: Mobile CCTV (mounted on police vehicles) - http://www.tssltd.co.uk/mobile-cctv.html

11

Page 12: · Web viewCollaborative Project Quarterly Update on Technology 8 D12.2.8 Project co-funded by the European Commission within the Seventh Framework Programme (2002-2006) Dissemination

Agent Vi Analytics: Allows search of CCTV video “by event (e.g. crossing a line, movement) or target parameters, including type (people, vehicle, object), size and color” and performs real time ‘analysis’ which identifies and generates alerts for a variety of user-defined events “relating to people, vehicles and objects” – http://www.agentvi.com/category.aspx?catid=2

Ioimage Ioicam Sc1dn: Integrated system combining IP CCTV cameras (with night vision) with onboard video analytics (for example can Intrusion Detection, Tripwire Crossover, Fence Trespassing and Camera Tampering. The unit can also be easily configured to detect unattended baggage, object removal, loitering and stopped vehicles. ) – http://www.ioimage.com/?p=ProductDetails&ClusterID=1599&ParentID=624&FatherID=775

Smart Witness Journey Recorder: Camera and GPS device for evidence gathering on a vehicle – http://www.smartwitness.com/product/3/vehicle_journey_recorder_with_cctv_camera_and_gps_logging

Panasonic SD5 cameras: has video motion detection (can be configured to detect and track intruders, and also detect left or removed objects) – http://www.prosecurityzone.com/Customisation/News/Surveillance/IP_and_Megapixel_cameras/SD5_technology_cameras_available_from_Norbain.asp

Panasonic IP Cameras - http://catalog2.panasonic.com/webapp/wcs/stores/servlet/ModelDetail?displayTab=O&storeId=11201&catalogId=13051&itemId=373000&catGroupId=14471&surfModel=WV-NW502S; http://catalog2.panasonic.com/webapp/wcs/stores/servlet/ModelDetail?displayTab=O&storeId=11201&catalogId=13051&itemId=360500&catGroupId=14471&surfModel=WV-NP502

ONSSI Ocularis: IP Video Management System, incorporating BriefCam14 search and review analytics, enabling – http://www.onssi.com/ocularis.html

Vista Bullet Camera VBC520: Discrete IP camera – http://www.vista-cctv.com/news/ref:N4AC47CCD37F0D/

Copper Eye IPRS: IP Camera data retention and retrieval system – http://www.coppereye.com/news_press/pressreleases/?id=46

Napco iSee Video: Products enabling remote viewing of CCTV camera feeds over internet connections, including “live video on the Apple iPhone,

14 http://www.onssi.com/component/option,com_news/task,detail/nid,203/id,7/12

Page 13: · Web viewCollaborative Project Quarterly Update on Technology 8 D12.2.8 Project co-funded by the European Commission within the Seventh Framework Programme (2002-2006) Dissemination

and...live Motion JPG images on any web enabled cell phone”. Latest addition “Single Channel Gateway” extends this ability to analogue camera feeds – http://www.napcosecurity.com/video.html

Samsung Techwin SDC-435: Day and Night camera – http://www.samsungtechwin.com/prd/pro_view.asp?pro_uid=4682&cat_uid=14&cat_biz=CTV&cat_lev=AA

Vista SmartDisc: IP camera recording and alarm transmission system - http://www.vista-cctv.com/news/ref:N4AE01F49D923B/

Axis M3203 Network Camera – Fixed Dome Cameras http://www.axis.com/products/cam_m3203/index.htm

Axis P3304 Network Camera – HDTV Fixed Dome Cameras http://www.axis.com/products/cam_p3304/

SUI Goodrich’s SU320KTX – Infrared camera, publicised as suitable for covert surveillance http://www.sensorsinc.com/downloads/SU320KTX.pdf

SUI Goodrich’s SU640KTSX – Infrared camera, publicised as suitable for covert surveillance http://www.sensorsinc.com/downloads/SU640KTSX.pdf

IQeye’ Minidome – IP Dome camera http://www.iqeye.com/component/content/article/120.html?lang=en

Texas Instrument’s DMVA1 – IP Camera with built in video analytics http://focus.ti.com/apps/docs/mrktgenpage.tsp?contentId=41246&appId=79

Behavioural Recognition Systems’ AIsight 2.1 – Video analytics system that derives models of ‘abnormal behaviour’ on the basis of previous footage, ‘learning’ as it goes http://www.brslabs.com/files/pdf/AISight_2%201_Final.pdf

13

Page 14: · Web viewCollaborative Project Quarterly Update on Technology 8 D12.2.8 Project co-funded by the European Commission within the Seventh Framework Programme (2002-2006) Dissemination

Vista CCTV VBC500 – long range bullet camera with in built infra red illuminators for night vision http://www.vista-cctv.com/go.php?structureID=S45C8A2209666D&ref=I4BAB37EA36149

SightLogix Sightsensor Camera – Built in GPS based analytics and night vision http://www.sightlogix.com/visible-sightsensor.html

NDI Recognition System’s ST200 – Portable Automatic Number Plate Recognition system. http://ndi-rs.com/ukrs/st200

Samsung Techwin SCP – Fixed dome Internet Protocol cameras with video analytics. http://www.samsungtechwin.com/prd/pro_view.asp?pro_uid=5502&cat_uid=129&cat_biz=CTV&cat_lev=AG

Sanyo HD CCTV Cameras http://www.fullhdcctv.com/ and http://prosecurityzone.com/Customisation/News/Surveillance/Analogue_and_HD_Cameras/Full_HD_Cameras_Draw_IFSEC_Visitors_to_Sanyo_Stand.asp

iOmiscient Smart Cameras http://iomniscient.com/index.html and http://prosecurityzone.com/Customisation/News/Surveillance/Video_Analytics_and_ANPR/Crowded_Scene_Analysis_Brings_BAE_Award_To_iOmniscient.asp

Vivotek’s IP7361 – Internet Protocol Bullet Camera http://norbain.co.uk/go.php?structureID=S3EC0C6423876F&ref=G4C04CB7326550

Samsung/Techwin SCB-3001 – Analogue day and night camera with built in video analytics15 http://www.sourcesecurity.com/docs/fullspec/SCB-3001ENG%20Catalog.pdf

Vista VBC 300 – Day and night bullet cameras http://www.vista-cctv.com/go.php?structureID=S45C8A2209666D&ref=I4C07631ADF13A

15 “One of the most impressive features of the SCB-3001 is that it brings straight out of the box Intelligent Video Analytic (IVA) functionality to analogue installations, making it possible to enhance security applications with features such as optical tripwire, enter/exit direction detection and an appear/disappear function to detect changes within a pre-defined area. IVA also has a scene change tampering function which creates an alert if, for example, paint is sprayed on a camera lens or there is unauthorised movement of a camera away from its usual field of view” http://www.securitypark.co.uk/security_article264878.html

14

Page 15: · Web viewCollaborative Project Quarterly Update on Technology 8 D12.2.8 Project co-funded by the European Commission within the Seventh Framework Programme (2002-2006) Dissemination

Human Recognition System’s Mguardian – Video analytic management system (including facial recognition) http://www.hrsltd.com/solution.php?page=27

Vi-System Event Dispatcher – Sends real time notifications of particular events identified by video analytic systems http://www.agentvi.com/61-Products-62-Vi_System

Smart-tec STC-3002 – Day and night CCTV camera http://smartec-security.eu/en/new/2010/stc-3002.htm

Vista VBC440 – Day and night bullet CCTV camera http://www.vista-cctv.com/go.php?structureID=S45C8A2209666D&ref=I4C0FB953DAE45

Bosch Autodome Easy – Internet Protocol dome camera. Can be adapted to have point, tilt and zoom, day and night or motion tracking functionality. http://www.autodome.com/

Nanjing Yuan Tuo’s HRC-168-IIATM – Digital Video Recorder designed for use of footage of bank atm machines. Enables search by, for example, card no. Date or time. Also certain algorithms can be set to trigger alarms. http://yuantuo.en.alibaba.com/product/298405830-209836346/ATM_DVR.html

Nextiva S5000 – Internet Protocol dome camera http://verint.com/video_solutions/section2b.cfm?article_level2_category_id=7&article_level2a_id=359&article_level2b_id=759

Vicon’s MPD-980DN-O – CCTV dome camera. Uses compression technology. Functional both in day and night and has a removable infrared filter. http://www.sourcesecurity.com/new-products/listing/1/technical-details/cctv/image-capture/domes/vicon-mpd-980dn-o.html

Bosch’s MIC 500 – High speed ‘pan, tilt and zoom’ CCTV camera. http://www.boschsecurity.co.uk/content/language1/html/5971_ENU_XHTML.asp

Y-Cam Bullet – Internet Protocol enabled bullet camera with infrared night vision, two way audio and automated motion alerts. http://www.y-cam.com/y-cam-bullet

Honeywell’s HD4MDIPX – Internet protocol enabled high definition mini dome camera, with infrared capabilities. http://www.security.honeywell.com/uk/video/products/cameras/ip/292538.html

15

Page 16: · Web viewCollaborative Project Quarterly Update on Technology 8 D12.2.8 Project co-funded by the European Commission within the Seventh Framework Programme (2002-2006) Dissemination

Logitech Alert Web Commander and Mobile Commander – Video security system for viewing the user’s CCTV camera feeds from internet browsers and smart phones. Can be set so that motion triggers alerts. http://www.logitech.com/en-gb/webcam-communications/video-security-systems/monitoring-services/devices/7261

Airlive’s WL-350-HD – Internet protocol enabled camera that can network via mains electricity. Built in web interface for viewing via web browser or smart phone. http://www.airlive.com/product/product_3.jsp?pdid=PD1269281040999

Optibase’s FITIS (Fully Integrated Tactical IPTV System) – Stores and analyses video and data from range of different sources, including unmanned aerial vehicles. Designed for government and military use. http://www.optibase.com/FITIS/

Toshiba’s IK-WB30A – Internet protocol enables ‘point, tilt and zoom’ camera with day and night capability. http://www.toshibasecurity.com/products/prod_camera_detail_ikwb30a.jsp

SUI Goodrich SU640HSX – Compact infrared camera, capable of “persistent surveillance, laser detection, and penetration through fog, dust, and smoke” as well night vision. Suitable for covert surveillance and capable of being used on unmanned aerial vehicles.16 http://www.sensorsinc.com/downloads/SU640HSX.pdf

Draganflyer X8 – Unmanned Aerial Vehicle for still and video photography. Offered with a range of camera options including high definition and infrared. Delivers live pictures to laptop and can be set up so that pictures can be viewed via a web browser.http://www.draganfly.com/uav-helicopter/draganflyer-x8/index.php

Audio Surveillance

Range of bugs using GSM, UHF and VHF technology disguised as clocks, plugs etc. e.g. http://www.spycatcheronline.co.uk/spy-phones-c-52.html?spyid=7f03f93e6286532489e51fbcf141f859

Connexion 2’s Lone Worker Device – covert bug to designed to be worn by social workers going in to potentially hostile situations. When activated works as a bug. Also available as software to be loaded onto a blackberry smart phone. http://www.connexion2.com/content/88/index.html

16 SUI Goodrich is producing other small infrared cameras for use with unmanned aerial vehicles http://prosecurityzone.com/Customisation/News/Surveillance/Thermal_Imaging_and_Infrared_Cameras/Short_Wave_IR_Camera_For_Unmanned_Vehicles.asp

16

Page 17: · Web viewCollaborative Project Quarterly Update on Technology 8 D12.2.8 Project co-funded by the European Commission within the Seventh Framework Programme (2002-2006) Dissemination

Scanners

L3 Provision ATD – Active millimeter wave- full body scanner adapted to output a non individualized person image (‘cookie cutter’ image) and highlights areas of concern on it. Feature also available as an upgrade to the previous scanner. http://www.sds.l-3com.com/products/advancedimagingtech.htm

Qinetic SPO-20 – Passive millimeter wave scanner that claims to automate detection of threats in high traffic areas at a distance of up to 20 metres. Does not rely on image screening, instead raises the alert via a red light/green light. Detects a range of threats, including liquids. http://www.qinetiq.com/home/products/spo_20.html

Link Microtek’s Emili+1 - Identifies whether liquid held in plastic container is ‘aqueous’, ‘inflammable’ or ‘corrosive’. http://www.linkmicrotek.com/pdfs/Emili%20data%20sheet%20DS280909.pdf

Brijot Gen 2 – Passive Millimetre wave full body scanner. Claims to be only checkpoint system in industry not to emit radiation or energy at subject during the screening process.17 Image outputted of subject’s body is not very detailed (brochure claims you would not be able to tell if subject was male or female). Saves all information by time and date and takes snapshot of the subject. http://www.brijot.com/assets/pdf/products/SafeScreen.pdf

Millimetre Wave technology Body Scanners for catching people smuggling e.g. weapons. For use at airports. http://www.smithsdetection.com/eng/threat_people_screening.php

Body Orifice Security Scanner (Boss). A chair which will search the subject’s body cavities while they are fully clothed. For use in prisons. http://www.bodyorificescanner.com/

Cargo container/Truck scanner http://www.smithsdetection.com/eng/narcotics_x-ray.php

Narcotics/explosives trace detector. Will pick up traces of TNT, C4, RDX, PETN, Semtex, Detasheet, TATP and Urea Nitrate and Heroin, Cocaine, Amphetamine, Methamphetamine, MDA, THC, LSD and Ecstasy with other substances available on request. http://www.scenttech.com/index.aspx?id=3334

Walk through narcotics/explosives detector http://www.smithsdetection.com/eng/Sentinel.php

American Science and Engineering Z Backscatter X-ray scanners - http://www.as-e.com/products_solutions/z_backscatter.asp

17 http://prosecurityzone.com/Customisation/News/Detection/Bomb_and_explosives_detection/Safe_millimetre_wave_imaging_systems_ready_for_airport_deployment.asp

17

Page 18: · Web viewCollaborative Project Quarterly Update on Technology 8 D12.2.8 Project co-funded by the European Commission within the Seventh Framework Programme (2002-2006) Dissemination

Rapiscan Secure 1000: Back Scatter X Ray Body Scanner – http://rapiscansystems.com/rapiscan-secure-1000.html.18

Thermo Fischer Scientific Mobile Advanced Radioisotope Identification System: Radiation detecter – http://www.prosecurityzone.com/Customisation/News/Detection/Radiation_Detection/Washington_Police_successfully_test_dirty_bomb_detector.asp

Universal Detection Technology TS 10 5: Handheld device to test sample for presence of anthrax, ricin toxin, botulinum, Y. pestis and staphylococcal – http://www.udetection.com/productDetail.asp?ProdID=38

OD Security Soter RS Body Scanners – X Ray Full Body Scanner http://www.odsecurity.com.web06.intention.nl/downloads/soter%20rs%20brochure%202008July.pdf.19

L-3’s ProVision – Millimetre Wave Full Body Scanner http://www.dsxray.com/products/mmwave.htm

ASE’s Z-Backscatter Van Mobile Screening System now being used by the Bulgarian Customs agency http://prosecurityzone.com/Customisation/News/Detection/X-Ray_Detection/Mobile_X-Ray_Inspection_System_For_Bulgarias_Border_Control.asp

Morpho Detection’s System of Systems – Luggage X Ray scanner and explosives detection http://www.morphodetection.com/products-services/xrd-explosives-detection/system-of-systems/.20

Smiths Detection’s Bio-Act – ‘Confirmation technology’ for detecting the presence of ‘chemicals, bacteria and bacterial spores, bio-toxins and viruses’ http://www.smithsdetection.com/media/SD_Bio-ACT_Flyer_web.pdf

Implant Sciences Quantum Sniffer QS H150 Portable Explosives Detector – detects explosive ‘vapors and particulates’ http://implantsciences.com/QS_H150.html

18 Rapiscan 1000 machines now being used in UK and USA, and OSI have just won a contract to supply them to the Nigerian government http://prosecurityzone.com/Customisation/News/Detection/X-Ray_Detection/Single_Pose_Advanced_Imaging_Scanners_for_Nigeria.asp

19 Machines donated by the US government to Ghana http://prosecurityzone.com/Customisation/News/Detection/X-Ray_Detection/US_Government_Donates_Through-Body_X-Ray_Scanner_to_Ghana.asp and have previously been donated to Nigeria to combat drugs http://prosecurityzone.com/Customisation/News/Detection/X-Ray_Detection/Low_Dosage_Body_Scanners_Improve_Security_At_Nigerian_Airports.asp

20 Contracted by the Israel Airports Authority for up to $50 mil. http://prosecurityzone.com/Customisation/News/Detection/Bomb_and_explosives_detection/Explosive_detection_system_for_checked-in_baggage_to_be_used_at_Israels_Airports.asp

18

Page 19: · Web viewCollaborative Project Quarterly Update on Technology 8 D12.2.8 Project co-funded by the European Commission within the Seventh Framework Programme (2002-2006) Dissemination

Iscon 1000D – Full body scanner based on infrared screening to detect objects of a different temperature. Image does not show the body underneath clothing but does highlight foreign objects. Stores images and makes use of facial recognition technology. http://www.isconimaging.com/iscon1000d.html

Iscon GamechangeIR – Handheld scanner based on infrared scanning. http://www.isconimaging.com/gamechanger.html

Thruvision TS4 – Passive body scanner revealing minimal body detail. Detects weapons, drugs and other contraband. http://www.thruvision.com/Our_Products/TS4_Sub_Pages/TS4%20Info%20Page.htm

Vision Pacific’s Colourscan UVSS (Under Vehicle Surveillance System) - automatically scans and digitally captures a clear image of the car undercarriage to locate explosives, guns, attached packages and other foreign objects. For use at airports, military installations and other secured areas. http://www.visionpacific.co.th/colourscan.htm

Vision Pacific’s Videoscan UVSS (Under Vehicle Surveillance System) – Provides high resolution video to help detect explosives and other materials hidden under vehicles. Can also be fitted with numberplate recognition technology. http://www.visionpacific.co.th/videoscan.htm

Perceptic’s UVIS (Under Vehicle Inspection System) – Produces high resolution image of the underside of vehicles. Can be fitted with numberplate recognition technology. http://www.perceptics.com/products/uvis

Unival’s HEDD1 – Scanner detecting ‘all types of commercial and military explosives’ at a range between 2 and 100 metres and through all types of barriers. http://www.unival-group.com/hedd1.htm

Thermal Matrix’s ACT – Thermal imaging scanner detecting objects that block the body’s natural body heat. http://www.thermalmatrixusa.net/act.html

Thermal Matrix’s TMI – Makes use of multiple different passive sensors to detect “anomalies, explosives, weapons, and…liquids” http://www.thermalmatrixusa.net/tm-1.html

Vehicle Trackers19

Page 20: · Web viewCollaborative Project Quarterly Update on Technology 8 D12.2.8 Project co-funded by the European Commission within the Seventh Framework Programme (2002-2006) Dissemination

Vehicle tracking equipment. http://www.spycatcheronline.co.uk/vehicle-tracking-c-48.html

Elsagna’s MPH-900 – Automatic licence plate recognition, works from a stationary location or while mobile and cross references against an onboard ‘hotlist’. Can record 100s of plates a minute and keeps record of image and GPS coordinates of every plate scanned for future reference. Soon to be incorporating i2 analytic capabilities, combining numberplate info with other sources of information.21 http://www.elsagna.com/mph_900_applications.htm

TruePosition’s Location Platform – Location tracking technology http://www.trueposition.com/web/guest/trueposition-location-platform22

Trueposition LMU-Universal - Software-defined receiver, installed at wireless cell towers and used to locate people who dial emergency numbers from their mobile phone. http://www.trueposition.com/web/guest/press-releases?p_p_id=62_INSTANCE_lSc3&p_p_lifecycle=0&p_p_state=maximized&p_p_mode=view&p_p_col_id=column-2&p_p_col_count=1&_62_INSTANCE_lSc3_struts_action=%2Fjournal_articles%2Fview&_62_INSTANCE_lSc3_groupId=10124&_62_INSTANCE_lSc3_articleId=28038&_62_INSTANCE_lSc3_version=1.0

Ascom Wireless Solutions telePROTECT – Designed for use by warders in prisons: location based duress alarm system. http://www.ascom.co.uk/uk-en/index-uk/news/ascom_provides_high_security_prison_with_teleprotect_duress_system/news-country.htm

Portman Security’s CTS 100 – compact covert GPS vehicle tracker. GPS and GSM antenna. http://www.portmansecurity.com/tcomm.php

Phone Monitoring

LandlineMobile

Software for mobile phones that, without any change to normal functioning, will notify a third party:

- Whenever the phone is switched on- Whenever a text is sent/call is made- Will send information on what number has been called/texted- Will send a copy of the text- Enables you to ‘phone in’ and listen to the call

21 http://prosecurityzone.com/Customisation/News/Surveillance/Intelligence_Software_and_Knowledge_Management/ANPR_data_integration_with_intelligence_software_from_i2.asp

22 Contracted by Murcia region of Spain to provide location tracking service for emergency services calls http://prosecurityzone.com/Customisation/News/Surveillance/Tracking_and_EAS/Location_Positioning_System_In_Use_By_Wireless_Emergency_Callers_in_the_Murcia_Region_of_Spain.asp

20

Page 21: · Web viewCollaborative Project Quarterly Update on Technology 8 D12.2.8 Project co-funded by the European Commission within the Seventh Framework Programme (2002-2006) Dissemination

- Enables you to phone in and listen in to whatever the microphone can pick up, effectively turning the phone into a bug http://www.spycatcheronline.co.uk/interceptor-software-with-nokia-phone-list-included-p-746.html

Range of Mobile Phone Tracking Services http://www.mobilelocate.co.uk/, http://www.google.co.uk/latitude/intro.html

Storacall Voistore Systems: Makes recording of all mobile phone calls made on device and can store them on a central server – http://www.storacall.co.uk/svs_voistore.htm

ASC InspirationPro 9.0 and EvoIP 9.0: Voice over Internet Protocol products. InspirationPro provides analysis of recorded call data and screen activities. EvoIP captures telephone calls from the network and enables storage, playback and archiving of the entire interaction. http://www.asctelecom.com/download/presse/ASC_Gitex_INSPIRATIONpro_EVOip_9_0.pdf

Computer Monitoring

Key logging equipment: easily installed, keeps a record of the input into a computer http://www.spycatcheronline.co.uk/type-logger-p-585.html

Device for recovering deleted texts from mobile phones http://www.eyetek.co.uk/section/0/deleted-text-spy

Guidance Software’s Encase Portable Version 2 – USB device which enables searching of computers by keyword and hash value, and viewing of all images stored http://www.guidancesoftware.com/popup.aspx?B=Content&id=2908&terms=usb+encase+portable

Mykonos Security Appliance – counter hacking tool that claims to enable real time monitoring, profiling and countermeasures against computer hackers: “Information within the profile includes the location of the hacker, the environment of the attacking computer and details the activities the hacker is employing” http://www.mykonossoftware.com/appliance.php

Genetec’s Unified Security Platform – Integrates IP CCTV cameras, access control and automatic numberplate recognition systems http://www.genetec.com/English/Products/Pages/security-center-unified-security-platform.aspx

Spector 360 – Internet monitoring software package aimed at employers. Records email/webmail, online searches, file transfers, chat/instant messages, key strokes, document, websites visited and programme use. http://www.spector360.com/

PC Pandora 6.0 – Internet monitoring software package aimed primarily at parents. Records email, instant message and keystrokes and allows live remote monitoring. http://www.pcpandora.com/

21

Page 22: · Web viewCollaborative Project Quarterly Update on Technology 8 D12.2.8 Project co-funded by the European Commission within the Seventh Framework Programme (2002-2006) Dissemination

Q1 Lab’s QRadar 7.0 – System for monitoring social networking services including Twitter, Facebook, Gmail, LinkedIn and Skype. Enables the user to monitor the usage of social media from within their own network, including identifying which users are accessing which social media services, the volume and pattern of usage, and inspect and alert on the content being transmitted to those services;  the ability to detect anomalous behavior of both network and application usage by specific users and the ability to identify a network's most vulnerable assets, and then detect and alert immediately when these systems engage in activity that potentially exposes those vulnerabilities – e.g. unpatched applications, devices and systems. http://q1labs.com/content/press-details/q1-labs-introduces-real-time-social-media-monitoring-and-correlation-in-latest-version-of-security-intelligence-platform/86.aspx

Databases and Datamining

Vodafone Bespoke Service for South Yorkshire Police: Mobile access (via Blackberry) to Criminal Records Database: http://www.vodafone.com/start/media_relations/news/local_press_releases/uk_press_releases/2007/south_yorkshire_police.html

CEM Systems S3020f Portable Fingerprint Reader – handheld device for fingerprint and card reading. Carries up to 100,000 card and biometric records in its onboard database and can store around 8,000 offline card swipe transactions for on-line transmission to the AC2000 system via built-in 802.11g WiFi connection. http://www.cemsys.com/product.php?id=47

i2 iBase – Database application enabling the capture, management of data and the dissemination of actionable intelligence http://www.i2group.com/products/analysis-suite/ibas e

http://www.backgroundchecks.com online resource for general identification information (such as address, occupation etc.) and also checking criminal records, driving records and whether someone is a registered sex offender. It alternatively offers the ability to keep your own records clean.

Biometrics

CEM Systems S3020f Portable Fingerprint Reader – handheld device for fingerprint and card reading. Carries up to 100,000 card and biometric records in its onboard database and can store around 8,000 offline card

22

Page 23: · Web viewCollaborative Project Quarterly Update on Technology 8 D12.2.8 Project co-funded by the European Commission within the Seventh Framework Programme (2002-2006) Dissemination

swipe transactions for on-line transmission to the AC2000 system via built-in 802.11g WiFi connection. http://www.cemsys.com/product.php?id=47

Cem Systems AC2000 Lite System Controller – Intelligent Network device for access control. http://www.cemsys.com/product.php?id=37

Validity Fingerprint Sensors – For controlling access to laptops http://www.validityinc.com/product.aspx?id=123

Neurotechnology’s Megamatch 3.1 SDK - Face, fingerprint and palm24 recognition. http://www.neurotechnology.com/mm_sdk.html

Neurotechology’s Verieye – iris recognition technology. http://www.neurotechnology.com/verieye_sdk.html

Neurotechnology’s Verilook – Face recognition technology. http://www.neurotechnology.com/vl_sdk.html

10 finger and palm print Livescan systems - digitises finger/palm print for cross referencing with central (FBI) databases http://www.crossmatch.com/10print_live_scanners.html 

Single/dual fingerprint scanner http://www.crossmatch.com/single_finger_scanners.html 

Mobile Finger Scanners http://www.crossmatch.com/mobile_finger_scanners.html 

Enrolls, identify and verify detainees, suspects and perpetrators. Matches fingerprints captured at terrorist crime scenes against terrorist and criminal watch databases http://www.crossmatch.com/jump_kits_Guardian_R.html

Document Reader http://www.crossmatch.com/D_SCAN_Authenticator_CF.html

Document Scanner http://www.crossmatch.com/D_SCAN_Authenticator_100.html 

Access Control http://www.crossmatch.com/id_management.html

Facial recognition software http://www.crossmatch.com/facial_recognition_solutions.html

Iris recognition software http://www.crossmatch.com/I_SCAN_2.html

23 Now being bundled with HP notebooks http://www.validityinc.com/post.aspx?id=200

24 http://prosecurityzone.com/Customisation/News/Biometrics/Fingerprint_recognition/Palm_print_recognition_added_to_MegaMatcher.asp

23

Page 24: · Web viewCollaborative Project Quarterly Update on Technology 8 D12.2.8 Project co-funded by the European Commission within the Seventh Framework Programme (2002-2006) Dissemination

Fingerprint Matching Applications http://www.crossmatch.com/matching_server.html

Software for fingerprints from multiple systems. Centralises Electronic Fingerprint Transmission records for transmission to a receiving agency (for example law enforcement) http://www.crossmatch.com/store_forward_solution.html

Cognitec FaceVACS-DBScan matches photographs to images from trusted databases of images - http://www.cognitec-systems.de/FaceVACS-DBScan.21.0.html?&L=0

Cognitec FaceVACS-VideoScan compares faces in video streams to “possible ‘watch-list’ matches” - http://www.cognitec-systems.de/FaceVACS-VideoScan.20.0.html?&L=0

Cognitec FaceVACS-Sentry compares face on video feed with prior photographs - http://www.cognitec-systems.de/FaceVACS-Sentry.14.0.html?&L=0

Crossmatch Lookout Matcher: Facial recognition software that compares inputted images to a database or “watchlist” for potential matches - http://www.crossmatch.com/LookoutMatcher.html

Crossmatch Lookout Collecter: A combined digital video recorder and facial collection software locate and extract facial images from video footage for automated identification and verification. Available as a standalone unit or can be networked to Lookout Matcher – http://www.crossmatch.com/LookoutCollector.html

Cogent Systems Mobile Ident III: Multi-biometric handheld fingerprint identification device for “remote subject identification, disaster scene management, ID document authentication, traffic citation, etc” – http://www.cogentsystems.com/MobileIdentIII.asp

Crossmatch Be.U Mobile: Range of handheld fingerprint and smartcard readers. The Be.U SMC-800MC3 ePassport reads RFID chips – http://crossmatch.com/BeU_Mobile.html

L1 Identity Solution’s 4G FingerVein Reader – Biometric identity recognition on the basis of veins in the fingers http://www.l1id.com/pages/735-4g-finger-vein-reader

AOptix Insight – Iris scanner that works at a distance of 2 metres http://www.aoptix.com/biometrics.html

Megamatcher Accelerator 2.0 – Fingerprint matching system http://www.neurotechnology.com/download/MegaMatcher_Accelerator_Brochure_2010-04-07.pdf

24

Page 25: · Web viewCollaborative Project Quarterly Update on Technology 8 D12.2.8 Project co-funded by the European Commission within the Seventh Framework Programme (2002-2006) Dissemination

Security Systems Technology’s Time and Attendence Solutions – Record time and attendance, enabling people to ‘clock in’ by scanning a palm print http://www.sstgroup.co.uk/go/products/time-and-attendance/time-and-attendance-solutions

Cogent’s Automatic Fingerprint Identification System – range of fingerprint and palm print identification systems including CAPFIS explicitly designed for police forces http://www.cogentsystems.com/downloads/CAFIS_60_EN_sm.pdf; http://www.cogentsystems.com/downloads/CAFIS_EN_sm.pdf; http://www.cogentsystems.com/downloads/CAPFIS_Prime.pdf.25

Cross Match’s Mobile Rapid ID – mobile fingerprint identification system http://www.crossmatch.com/mobile-rapid-id.php26

Telos’s Mobileassure Access Control – Biometric access control system. Optional add-ons include vehicle tracking http://images.telos.com/files/external//MobileAssure_Access_Control.pdf

AuthenTec Biometric Fingerprint Authentification Device – Range of fingerprint scanners enabling access control for mobile device http://www.authentec.com/products-wireless.cfm27

Persay’s Vocal Password – Voice biometric identification system. Claims to be language and accent independent http://www.persay.com/vocal-password.asp?round=1 Security services provider G4S are planning to use it for “electronic monitoring projects around the world”28

Validity VSF5111 – Biometric Fingerprint Sensors http://www.validityinc.com/post.aspx?id=228

Human Recognition System’s Msite – Biometric access control aimed at construction companies http://www.hrsltd.com/solution.php?page=32

25 Cogent win a contract from the UK National Police Improvement Agency to provide a mobile system for real time identification in the field. http://prosecurityzone.com/Customisation/News/Biometrics/Fingerprint_recognition/UK_National_MobileID_Service_Chooses_Cogent_Systems_for_Automatic_Fingerprint_Identification.asp

26 Report on use by the Florida Department of Law Enforcement http://www.crossmatch.com/news/Mobile-Rapid-ID-Certified-by-FDLE.php “When coupled with FALCON [the FDLE’s system for crossreferencing biometric information with state and national crime databases], the system provides instantaneous submission of biometric data and access to vital information for use at traffic stops and crime scenes.”

27 For example being used to provide security for Fujitsu Smart Phones http://prosecurityzone.com/Customisation/News/Biometrics/Fingerprint_recognition/Fingerprint_Sensors_for_Waterproof_Fujitsu_Smartphones.asp

28 http://prosecurityzone.com/Customisation/News/Biometrics/Voice_Recognition/VocalPassword_Voice_Biometrics_Package_Chosen_by_G4S.asp

25

Page 26: · Web viewCollaborative Project Quarterly Update on Technology 8 D12.2.8 Project co-funded by the European Commission within the Seventh Framework Programme (2002-2006) Dissemination

Human Recognition System’s Msecure – Biometric Access control system designed for airports http://www.hrsltd.com/solution.php?page=28

Authenware 2.0 – Identifies individuals through the development of a user specific ‘signature’ based on the way a person types, for example, username and password information. http://www.authenware.com/whatis.php

Persay’s VocalPassword App – Voice recognition biometric application for iPod, iPad and iPhone. http://www.persay.com/news-content.asp?pageId=news&newsId=08_03_2010

Timeneto Plus – Fingerprint based biometric system for recording ‘clock in’ time of employees. http://timeneto.com/en-us/products/timeneto_fingerprint/

Fulcrum FbF Timeclock – System for remote web based ‘clocking in’ with fingerprint readers. http://www.fulcrumbiometrics.com/en/solutions/time-and-attendance

Persay’s VocalPassword App – Voice recognition biometric application for iPod, iPad and iPhone. http://www.persay.com/news-content.asp?pageId=news&newsId=08_03_2010

Tables of Relative Moral Risks

IntrusionIntrusion into ‘Home Spaces’

Intrusion into Bodily Privacy

Intrusion into Private Life

Is information accessible to further people?

CCTV in public places

Only problematic if cameras overlook windows into people’s homes, or other ‘home spaces’.Otherwise the use of CCTV in public is only mildly intrusive.

Only problematic if cameras overlook windows into people’s homes or other ‘home spaces’. Otherwise does not invade bodily privacy.

Smart cameras with video analytics create the possibility of revealing intimate details of private life.Otherwise information is too disparate to constitute a threat.

An additional source of intrusion only if, through the use of video analytics, revealing details of private life are made available to others, or if information from a ‘home space’ is acquired and transmitted.29

Full Body Scanners

Since these are used in explicitly ‘public’ places such as airports there is no intrusion of a ‘home space’.

Very intrusive into bodily privacy if an image of the naked body is produced.

If detailed image is produced this may reveal some intimate details of private life –

Would be very intrusive for an intimate visual image to be available to others.Much less intrusive if no

26

Page 27: · Web viewCollaborative Project Quarterly Update on Technology 8 D12.2.8 Project co-funded by the European Commission within the Seventh Framework Programme (2002-2006) Dissemination

Much less intrusive if the process is automated, with no need for a viewer to look at an image of the subject’s actual body.

embarrassing medical conditions or surgery for example.This is avoided if the process is automated, revealing only strictly relevant information.

image is recorded, as is the case with many scanners.

Substance Detectors

Since these are used in explicitly ‘public’ places such as airports there is no intrusion of a ‘home space’.

If these involve scanning of the human body this constitutes an intrusion, but, as the information acquired is not personal in any way the intrusion is mild.

Does not penetrate sphere of private life

Even if information is available more widely, as the information is not personal, this is not intrusive.

Covert Cameras

Very intrusive when used in homes and ‘home spaces’.

When used in home spaces this is likely to result in great bodily intrusion.

Less revealing of the details of private life than bugging, but still very intrusive.

More intrusive still if information is accessible to a wider audience.Less intrusive the more restricted this further audience is.Bugging Though less intrusive into

bodily privacy than covert cameras, but the intrusiveness of others hearing sounds of bodily function mean this is still an issue.

Very intrusive into the most intimate details of private life.

Phone Monitoring

Listening in to some calls made in private may be considered to invade the sphere of the home.

Not intrusive into bodily privacy

Very intrusive into private life.

Databases and Datamining

Does not penetrate privacy of the home

Does not intrude upon bodily privacy

May intrude into private life is enough information is aggregated.

More intrusive the more people who have access.

Location tracking

Does not reveal details of activity in home.

Does not intrude into bodily privacy.

May reveal details of private life – how one chooses to spend one’s leisure time or who one chooses to associate with. Unproblematic in the case of emergency calls.

If details of private life become accessible to a wider audience this worsens the intrusion.

Internet Monitoring

For a person who spends much of their home life interacting on the internet, detailed monitoring can be seen to penetrate home life

Does not penetrate sphere of bodily privacy.

Very intrusive into private life, potentially revealing matters of conscience, association and sexuality.

More intrusive still if information is accessible to a wider audience.Less intrusive the more restricted this further audience is.

Error and DiscriminationIs the information acquired prone to false positives/ambiguity?

Is sanction possible on the basis of these errors?

Are errors possible as a result of storing information?

Can a lack of training by users result in error?

Are certain social or cultural groups more likely to be subject to error?CCTV in Potential for unclear

outputs.Errors, including those that discriminate against

Little risk from errors resulting from storage.

Discrimination of users can be reinforced by

29 See claims of the insecurity of the increasingly widespread practice of transmitting CCTV pictures using Internet Protocol http://prosecurityzone.com/Customisation/News/IT_Security/Network_Security_Routers_and_Data_Centres/ISF_Comments_On_Converged_IP_Security_Networks_Threat_Profile_Increase.asp

27

Page 28: · Web viewCollaborative Project Quarterly Update on Technology 8 D12.2.8 Project co-funded by the European Commission within the Seventh Framework Programme (2002-2006) Dissemination

public places Video Analytics that makes

use of a category of ‘abnormal behaviour’ derived from majority activity may disproportionately target social/cultural minorities.

particular groups, can result in sanction if the judgement of individual officers

Some have claimed that CCTV disproportionately results in harassment of minorities, seeming to confirm that this does occur.30

Analytics which disproportionately target minorities.

Full Body Scanners

Some risk of ambiguity from unclear outputs.

As the technology is being used to indicate areas for further investigation, errors are likely to be corrected before significant sanction is suffered.

In most cases information is not stored.

Viewers may be unfamiliar with certain objects that have been implanted as a result of surgery.

Substance Detectors

Some risk of false positives. Lack of training may lead to errors, but unlikely to do so in a way that disadvantages any particular group.

Covert Cameras

Potential for unclear outputs.

If intelligence is recorded, widely shared, and acted upon the various sources of errors may result in significant sanction. A particularly significant example is no fly lists.

If intelligence collected is recorded incompletely, suspicion may be registered without adequate opportunity for correction.

Bugging Conversations may be ambiguous out of context.31

Lack of understanding of political or religious writings may result in the significance of exchanges being misjudged.32

Phone Monitoring

Location tracking

Information can be misleading, seeming to provide evidence of certain associations or engagement in certain activities.

Lack of training may lead to errors, but unlikely to do so in a way that disadvantages any particular group.

Internet Monitoring

Lack of understanding of political or religious writings may result in the significance of exchanges being misjudged.

Databases and Datamining

Datamining techniques may cast suspicion on large numbers of innocent people, often disproportionately targeting members of particular social and cultural groups.

Discrimination of users can be reinforced by datamining programmes which disproportionately target certain groups.

Trust and ChillPerceived Intrusion

Perceived Risk of Error

Perceived Discrimination

Perception of Function Creep

CCTV in public Widely known about and regarded as

The gathering of footage on legitimate

Perception of discrimination and the

Widely circulated reports of function creep. Lack

30 “Surveillance therefore seems to be capable of abuse, in terms of unjustified harassment – especially to those from minority communities” Liberty citing the Information Commissioner’s Office http://www.liberty-human-rights.org.uk/issues/3-privacy/pdfs/liberty-privacy-report.pdf

31 See Detecter Deliverable D05.2 p 29 and 29n.

32 See Detecter Deliverable D05.2 p 32 and 32n28

Page 29: · Web viewCollaborative Project Quarterly Update on Technology 8 D12.2.8 Project co-funded by the European Commission within the Seventh Framework Programme (2002-2006) Dissemination

places moderately intrusive. (and non-violent) public protests is likely to have a chilling effect on public protest.

targeting of particular groups may undermine trust in the police.

of clarity surrounding who has access to footage.

Full Body Scanners

Intrusive scanners widely known about: if made mandatory likely to be regarded as illegitimate. Less so if alternatives, like the pat down search are permitted, or automated scanners are used.

Not significant source of damage to trust or chill.

Perception of discrimination if groups for whom the use of intrusive scanners is particularly offensive are given no alternative.

If a pat down is permitted this eliminates the source of damage to trust or chill.

Not significant source of damage to trust or chill.

Substance Detectors

Mildly intrusive, but as it is narrowly focussed on information of strictly related to criminal activity likely to be perceived as legitimate.

Not significant source of damage to trust or chill.

Not significant source of damage to trust or chill.

Not significant source of damage to trust or chill.

Covert Cameras

Very intrusive, but less widely known about.

Worry about the possibility of erroneously becoming a target of suspicion adds to ‘the chilling effect’.

Perception of discrimination, the targeting of particular groups and the misunderstanding of evidence may undermine trust in the police.

Purposes for which techniques may be used is not transparent enough, adding to chill.Bugging

Phone MonitoringInternet Monitoring Location trackingLocation tracking

Perceived as intrusive where known about.

Databases and datamining

Fairly unintrusive except where private information is gathered

The haphazard manner in which suspicion may be cast on innocents by profiling techniques provides a motivation to avoid behaviour associated with crude profiles.

Perception that discriminatory profiles are in operation likely to undermine trust in police.

29

Page 30: · Web viewCollaborative Project Quarterly Update on Technology 8 D12.2.8 Project co-funded by the European Commission within the Seventh Framework Programme (2002-2006) Dissemination

OverviewIntrusion Error and

discriminationTrust and Chill

CCTV in public places

Mostly only mildly intrusive.Use of smart cameras may be more so.

Possibility for errors. Because use is widespread, widely known about and there is perception of function creep, the use of CCTV may have significant impacts on trust in the police and political participation.

Covert Bugging

Very intrusive. Potential for ambiguity and misunderstanding due to context dependence of understanding by third parties.

Although where discovered the intrusiveness of such measures are likely to weaken trust, they are more likely to remain secret and unknown to the public.Phone

MonitoringCovert Cameras

Potential for ambiguity.

Full Body Scanners

Very intrusive if outputting intimate visual image. If less detailed image outputted, or process is automated, intrusion greatly reduced.

Possibility of false positives, but unlikely to result in lasting errors.

Where intrusive scanners are made mandatory as a condition of flight, this is likely to weaken trust in authorities and have a ‘chilling effect’. This is greatly reduced by offering alternatives or using less intrusive scanners.

Substance Detectors

Although scans of the body can be considered an invasion of bodily privacy, where this detects only the presence of substances this is a mild intrusion.

Possibility of false positives, but unlikely to result in lasting errors.

Use likely to be seen as legitimate intrusion by authorities.

Databases and Datamining

Only intrusive if information collected is intimate or sensitive in a way that penetrates the sphere of privacy, or reveals such information as a result of aggregation. Otherwise unintrusive.

False information can endure for long periods of time without adequate opportunity for correction. Datamining is at great risk of casting suspicion on large numbers of innocent people, often disproportionately affecting social and cultural groups.

Damaging to trust in the authorities if it is understood to result in sanction for innocent people, especially so if members of ‘suspect communities’ are disproportionately likely to be victims.

Location Tracking

Potential for intrusion into private life with the exception of emergency calls.

Potential for misjudging the significance of visiting certain places.

To the extent that its use is known about, likely to weaken trust in authorities and chill political participation.

Internet Monitoring

Very intrusive into private life. Great potential for misjudging the significance of visiting certain websites.

Awareness of internet monitoring is likely to have a severe impact on people’s willingness to seek out information on certain topics.

30