When Counting is Not Enough: Limitations of NSA's Effectiveness Assessment of Surveillance Technology

Author(s):  
Michelle Cayford ◽  
Coen Van Gulijk ◽  
P. H. A. J. M. Gelder
2018 ◽  
Vol 7 (12) ◽  
pp. 471 ◽  
Author(s):  
Adam Dąbrowski ◽  
Piotr Matczak ◽  
Andrzej Wójtowicz ◽  
Michael Leitner

Progress in surveillance technology has led to the development of Closed-Circuit Television (CCTV) systems in cities around the world. Cameras are considered instrumental in crime reduction, yet existing research does not unambiguously answer the question whether installing them affects the number of crimes committed. The quasi-experimental method usually applied to evaluate CCTV systems’ effectiveness faces difficulties with data quantity and quality. Data quantity has a bearing on the number of crimes that can be conclusively inferred using the experimental procedure. Data quality affects the level of crime data aggregation. The lack of the exact location of a crime incident in the form of a street address or geographic coordinates hinders the selection procedure of experimental and control areas. In this paper we propose an innovative method of dealing with data limitations in a quasi-experimental study on the effectiveness of CCTV systems in Poland. As police data on crime incidents are geocoded onto a neighborhood or a street, we designed a method to overcome this drawback by applying similarity measures to time series and landscape metrics. The method makes it possible to determine experimental (test) and control areas which are necessary to conduct the study.


1992 ◽  
Author(s):  
Victor H. Appel ◽  
Carol Murray Quintana ◽  
Richard W. Cole ◽  
Mark D. Shermis ◽  
Paul D. Grubb ◽  
...  

Author(s):  
Felicity Amaya Schaeffer

I argue that we are entering an automated era of border control that I label a border-biosecurity industrial complex. Funded in great part by the Department of Homeland Security (DHS), scientific research and automated surveillance technologies promise the state innovative and supposedly unbiased solutions to the challenge of border control and security. This article spotlights a border surveillance technology called AVATAR (Automated Virtual Agent for Truth Assessment in Real-Time). Analyzing this technology, which was funded by the DHS and developed by faculty at the University of Arizona’s National Center for Border Security and Immigration (BORDERS), allows me to assess how the emphasis on novel technologies to detect terrorists unleashes the search for ubiquitous surveillance devices programmed to detect deviant behavioral and physiological movements. I offer a wider view of this technology-in-the-making by analyzing how university research in aerial defense, the psychology of deception, the life sciences, and computer engineering influences the development of surveillance devices and techniques. I explore how, during a posthuman era, automated technologies detect and racialize “suspect life” under the guise of scientific neutrality and supposedly free from human interference. Suspect life refers to the racial bias preprogrammed into algorithms that compute danger or risk into certain human movements and regions such as border zones. As these technologies turn the body into matter, they present biological life as a more scientifically verifiable truth than human verbal testimony, moving border control from the adjudication of law through the subjective interview to the automated body that speaks a truth more powerful than a complex story can tell.


Author(s):  
L.T. Snitko ◽  
◽  
А.А. Firsova ◽  
О.А. Кlindukhova ◽  
◽  
...  

Sign in / Sign up

Export Citation Format

Share Document