Concept image of Geolocation tracking. A man is shown holding a phone.
Technology

Stingray: The Secret Tracking System

July 16, 2021

Stingray helps the government collect your geolocation data without your knowledge or consent. The technology behind Stingray has been kept secret. This is problematic as it leads to conflict between secrecy and transparency. […]

3-d rendering of a phone with map and geolocations.
Technology

Geolocation: Necessity and Pseudonymity

July 16, 2021

While in some instances, we volunteer information about our location to the world around us, in others, geolocation data are collateral information that is necessarily collected as part of some other process, like making a phone call. […]

Image of earth surrounded by many satellites moving in their orbits.
Technology

Geolocation: Applications and Privacy Issues

July 16, 2021

Geolocation identifies where a person is physically, and uses that to derive certain inferences from that information. This has led to the Supreme Court thinking hard about the Fourth Amendment protections against unreasonable searches and seizures. […]

Police video surveillance system in the most sensitive areas of the city
Technology

NYPD: Surfing the Wave of Technology

July 14, 2021

Police surveillance has increasingly become more sophisticated and efficient. And, catering to the urban centers demands for effective policing. The NYPD has an array of gadgets helping it not only solve but also deter crime. […]

A Police Unmanned Aircraft System, (UAS) Drone Flying Above A Neighborhood.
Technology

Technology and Anti-crime Surveillance

July 14, 2021

No one can question the importance of surveillance in policing a state. The issue is the intention as well as the outcome it generates. It may not always be in our best interest. […]

A picture of three men having cameras instead of heads.
Technology

The Good and the Bad of CCTV Surveillance

July 14, 2021

When it comes to crime and policing, one might think CCTV surveillance would be the key. In reality, its deterrence capabilities are ambiguous. It also poses privacy issues and is open to misuse. […]

A picture showing hacked logo on laptop and lock icon hologram.
Technology

Cyberattack and Espionage: The Easy Way In?

July 13, 2021

From a seemingly harmless email to sophisticated back entry malware, cyber attacks are extremely effective tools for surveillance. With many often traced to China by the US, they still remain difficult to either predict or stop. […]

1 2 3 4 5 6 7