1 / 4

STRATEGIC INTELLIGENCE MANAGEMENT

STRATEGIC INTELLIGENCE MANAGEMENT. Chapter 10 - Emerging Technologies and the Human Rights Challenge of Rapidly Expanding State Surveillance Capacities , Pg. 108. Chapter by Mohammad Dastbaz , Eddie Halpin , Steve Wright . Section 2: The public, Communication, Risk, and National Security .

zizi
Download Presentation

STRATEGIC INTELLIGENCE MANAGEMENT

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. STRATEGIC INTELLIGENCE MANAGEMENT Chapter 10 - Emerging Technologies and the Human Rights Challenge of Rapidly Expanding State Surveillance Capacities, Pg. 108 Chapter by Mohammad Dastbaz, Eddie Halpin, Steve Wright

  2. Section 2: The public, Communication, Risk, and National Security • 10. Emerging Technologies and the Human Rights Challenge of Rapidly Expanding State Surveillance Capacities, Pg. 108 • There is a well-trodden history to the development of the surveillance capacities within the state; however, for the purposes of this chapter we will attempt to look at what might be described as the new era of intelligence gathering and security. • The images of societies where the state is constantly tracking its citizen's personal and quite often very private data can be used to change people's behavior is nothing short of the 1984 Orwellian nightmarish society where everybody is watched by “big brother.” • Fingerprint recognition is one of the first and original biometric technologies that have been grouped loosely under digital forensics. With the ever-growing number of video surveillance cameras mushrooming in large cities, the use of the data captured by these cameras has been at the center of a number of privacy and human rights storms.

  3. Section 2: The public, Communication, Risk, and National Security • 10. Emerging Technologies and the Human Rights Challenge of Rapidly Expanding State Surveillance Capacities, Pg. 108 • As well as GPS systems, we also now have a Global System for Mobile Communications (GSM), which provides a wealth of data including locations to mobile operators and providers. For example, GSM signals transmitted from mobile devices can be used to monitor a traveling car and its passengers. • Law enforcement agencies began developing technologies that were capable of detecting human movements and positioning behind enclosed spaces and solid walls. The technology, loosely termed through-the-wall surveillance, used radar technologies aimed at providing vital information to security forces dealing with difficult emergency situations. • VR technology is used to provide a state-of-the-art training environment for key decision makers and people dealing with national emergencies, is capable of receiving data from a variety of different sources and has been used to create surveillance and security systems.

  4. Section 2: The public, Communication, Risk, and National Security • 10. Emerging Technologies and the Human Rights Challenge of Rapidly Expanding State Surveillance Capacities, Pg. 108 • The need to increase bureaucratic efficiency necessitated by shrinking budgets proved a powerful imperative for improved identification and monitoring of individuals. Fingerprints, ID cards, data matching, and other privacy-invading techniques were originally fielded on populations with little political power such as immigrants, welfare recipients, criminals, and members of the military. • This Science and Technology Options Assessment (STOA) report called for a European Commission (EC)-wide oversight of interception procedures and activities after revealing that millions of e-mails, telephone calls, and faxes were routinely intercepted each hour by the secretive U.S. National Security Agency—often in direct contravention of privacy guarantees enshrined in individual Member State's national legislation (Wright, 2000). • While technology marches on and surveillance capabilities are developing it is also important to recognize that the human rights of citizens should also be recognized as part and parcel of the national security of a country. It is the ethics of development and the ethics of practical application mICT that we need to balk at and rigorously, to ensure that they are justified within a democratic and free society.

More Related