hyper-surveillance
   HOME

TheInfoList



OR:

Hyper surveillance is the intricate surveillance of an entire or a substantial fraction of a population in order to monitor that group of citizens that specifically utilizes technology and security breaches to access information. As the reliance on the internet economy grows, smarter technology with higher surveillance concerns and snooping means workers to have increased surveillance at their workplace. Hyper surveillance is highly targeted and intricate observation and monitoring among an individual, group of people, or faction.


History

In the middle of the 1970s, the American
penal system A prison, also known as a jail, gaol (dated, standard English, Australian, and historically in Canada), penitentiary (American English and Canadian English), detention center (or detention centre outside the US), correction center, correct ...
or prison system expanded rapidly. As a result, 1 in 35 adults are in correctional supervision nationwide. The surveillance systems has created targeted and specific supervision. The use of surveillance systems has been targeted against black and Latino men. Consequently, men of color are found to be stopped by police at higher rates.  For example, in some neighborhoods, police stop over 500 out of 1000 residents in their lifetime due to hyper surveillance systems. Hyper surveillance extends beyond the crime control agents and police system as it has been documented in schools, community organizations, and other places.Research finds that hyper surveillance can lead to targeted and specific focus on an individual leading to profiling and
predictive policing Predictive policing is the usage of mathematics, predictive analytics, and other analytical techniques in law enforcement to identify potential criminal activity. A report published by the RAND Corporation identified four general categories pred ...
.


Hyper-surveillance technology


Facial recognition systems

Constructed through computer programs, facial recognition systems analyze images and biometrics of human faces for the purpose of identification. Compared to other facial systems, recognition software has been used for surveillance and security. Alongside public video cameras, they can be used in a passive structure. Therefore, facial recognition software can be used without the knowledge or consent of a person. Practically, this technology can be used in state centers, offices, and workplaces. State departments possess photographs of constituents and utilize this information as a resource alongside public surveillance tools to create a system of identification and tracking.


Mobile tracking systems

Mobile phone tracking Mobile phone tracking is a process for identifying the location of a mobile phone, whether stationary or moving. Localization may be effected by a number of technologies, such as the multilateration of radio signals between (several) cell towers ...
is a system and process that identifies the location of a mobile phone. It specifically locates the phone through radio signals or through the internal built GPS system.The technology has been used for observing objects or people on the move through specific and ordered locational processing.


Use of Hyper-surveillance

A consumer technology that has created hyper surveillance technology is
Clearview AI Clearview AI is an American facial recognition company, providing software to companies, law enforcement, universities, and individuals. The company's algorithm matches faces to a database of more than 20 billion images indexed from the Interne ...
. Some advantages that Clearview AI possess include security and efficiency. Using the technology, law enforcement is able to detect shoplifters, sex traffickers, child abusers, or homicide cases. The software allows enforcement to a database of over three billion pictures allowing police to identify suspects efficiently. However, there are multiple potential negatives including personal abuse, racial bias, inaccurate results, and data security. With access to millions of images, law enforcement could abuse the technology to identify romantic partners or foreign governments can identify people of social status to blackmail. The availability of information makes it more difficult for individual security. In addition, Clearview AI has been proven to mistaken or misidentify suspects before. The use of facial recognition technologies have biases leading to misclassifications causing wrongful arrests. In fact, the company stated that the tool finds matches 75% of the time. Therefore, there are situations where data is inaccurate. A major concern with Clearview AI and facial recognition systems is the data security. In the past, Clearview AI has been hacked and the client base list has been leaked.


References

{{reflist, refs= {{Cite web, last=Ohm, first=Paul, date=November 1, 2018, title=The Many Revolutions of Carpenter, url=https://osf.io/preprints/lawarxiv/bsedj/, url-status=live, archive-url=, archive-date=, access-date=2020-12-09, website=osf.io {{Citation, last=Capers, first=I. Bennett, title=Citizenship Talk, date=2019, url=https://www.cambridge.org/core/books/cambridge-handbook-of-policing-in-the-united-states/citizenship-talk/FEB9CAC4EC34467A2274AFC371AF42CA, work=The Cambridge Handbook of Policing in the United States, pages=473–490, editor-last=Miller, editor-first=Eric J., series=Cambridge Law Handbooks, place=Cambridge, publisher=Cambridge University Press, isbn=978-1-108-42055-6, access-date=2020-12-09, editor2-last=Lave, editor2-first=Tamara Rice {{Cite journal, last1=Campos-Manzo, first1=Ana Lilia, last2=Flores, first2=Marisol, last3=Pérez, first3=Denise, last4=Halpert, first4=Zoe, last5=Zevallos, first5=Kevin, date=2020-07-01, title=Unjustified: Youth of Color Navigating Police Presence Across Sociospatial Environments, url=https://doi.org/10.1177/2153368717741346, journal=Race and Justice, language=en, volume=10, issue=3, pages=297–319, doi=10.1177/2153368717741346, s2cid=158363063 , issn=2153-3687 {{Citation, last=Glover, first=Karen S., title=Citizenship, hyper-surveillance, and double-consciousness: Racial profiling as panoptic governance, date=2008-01-01, url=https://doi.org/10.1016/S1521-6136(07)00211-4, work=Surveillance and Governance: Crime Control and Beyond, volume=10, pages=241–256, editor-last=Deflem, editor-first=Mathieu, series=Sociology of Crime, Law and Deviance, publisher=Emerald Group Publishing Limited, doi=10.1016/S1521-6136(07)00211-4, isbn=978-0-7623-1416-4, access-date=2020-12-09, editor2-last=T. Ulmer, editor2-first=Jeffrey {{Cite journal, last=Gidaris, first=Constantine, date=2020-03-01, title=The Carceral Airport, url=https://www.ingentaconnect.com/content/intellect/public/2020/00000030/00000060/art00007;jsessionid=831l24nqsppu.x-ic-live-01, journal=Public, volume=30, issue=60, pages=76–91, doi=10.1386/public_00007_7, s2cid=216160207 {{Cite web, title=UCLA professor explains hyper-surveillance of black males, url=https://www.statepress.com/article/2015/04/ucla-professor-explains-hyper-surveillance-of-black-males, access-date=2020-12-09, website=The Arizona State Press {{Cite web, last=Reed, first=Andrew, date=2019-10-24, title=Reed '21: Preventing a new era of hyper-surveillance, url=https://www.browndailyherald.com/2019/10/24/preventing-new-era-hyper-surveillance/, access-date=2020-12-09, website=Brown Daily Herald, language=en-US {{Cite journal, last=Jeffries, first=Fiona, date=2011-04-01, title=Saying Something: The Location of Social Movements in the Surveillance Society, url=https://doi.org/10.1080/14742837.2011.562362, journal=Social Movement Studies, volume=10, issue=2, pages=175–190, doi=10.1080/14742837.2011.562362, s2cid=145635074 , issn=1474-2837 {{Cite web, last=Odella, first=Francesca, date=, title=Privacy Awareness and the Networking Generation, url=https://www.igi-global.com/gateway/chapter/213856, url-status=live, archive-url=, archive-date=, access-date=2020-12-09, website=, language=English {{Cite web, last=Pina, first=Pedro, date=, title=Electronic Surveillance, Privacy and Enforcement of Intellectual Property Rights : A Digital Panopticon?, url=https://www.igi-global.com/gateway/chapter/60988, url-status=live, archive-url=, archive-date=, access-date=2020-12-09, website=, language=English {{Cite web, date=2020-04-23, title=Facial Recognition » Avigilon, url=https://www.avigilon.com/products/ai-video-analytics/facial-recognition, access-date=2020-12-09, website=www.avigilon.com, language=en {{Cite web, title=SSRN Electronic Library, url=https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3273483, access-date=2020-12-09, website=papers.ssrn.com, ssrn=3273483 {{Cite book, last=Wilcox, first=Walter M., title=Quantum Principles & Particles , date=2019-08-23, chapter=Quantum Particle Scattering, chapter-url=https://www.taylorfrancis.com/, access-date=2020-12-09, website=Quantum Principles and Particles, Second Edition, pages=429–487 , language=en, doi=10.1201/b22285-11, isbn=9781138090439 , s2cid=203041991 {{Cite journal, last1=Zhang, first1=Y., last2=Li, first2=M., last3=Dong, first3=Z. Y., last4=Meng, first4=K., date=June 2019, title=Probabilistic anomaly detection approach for data-driven wind turbine condition monitoring, journal=CSEE Journal of Power and Energy Systems, volume=5, issue=2, pages=149–158, doi=10.17775/CSEEJPES.2019.00010, issn=2096-0042, doi-access=free {{Cite journal, last=Giroux, first=Henry A., date=2015-03-04, title=Totalitarian Paranoia in the Post-Orwellian Surveillance State, url=https://doi.org/10.1080/09502386.2014.917118, journal=Cultural Studies, volume=29, issue=2, pages=108–140, doi=10.1080/09502386.2014.917118, s2cid=143580193 , issn=0950-2386 {{Cite journal, last1=Timan, first1=Tjerk, last2=Albrechtslund, first2=Anders, date=2018-06-01, title=Surveillance, Self and Smartphones: Tracking Practices in the Nightlife, url= , journal=Science and Engineering Ethics, language=en, volume=24, issue=3, pages=853–870, doi=10.1007/s11948-015-9691-8, issn=1471-5546, pmc=5972155, pmid=26319296 {{Cite journal, last=Wittenberg, first=David, date=1970-01-01, title=Seeing around the next corner, url=http://www.liverpooluniversitypress.co.uk/journals/article/21002, access-date=2020-12-09, journal=Science Fiction Film & Television, volume=12 , issue=2 , pages=195–223 , language=en, doi=10.3828/sfftv.2019.12, s2cid=198622264 {{Cite journal, last=Peters, first=Najarian, date=2020-01-01, title=The Right to Be and Become: Black Home-Educators as Child Privacy Protectors, url=https://repository.law.umich.edu/mjrl/vol25/iss1/3, journal=Michigan Journal of Race and Law, volume=25, issue=1, pages=21–60, doi=10.36643/mjrl.25.1.issn=1095-2721, doi-access=free Surveillance Crime prevention Facial recognition software Law enforcement Law enforcement techniques Mass surveillance National security Privacy Security