SlideShare a Scribd company logo
1 of 34
Surveillance and Use of ICT for Social
Control in Different Cultures: Emerging
   Trends in Europe, Iran and other
               Countries
             Fatemeh Ahmadi Zeleti
         Tampere University of Technology

             FP7 RESPECT Project
           Steering Committee Meeting
                   June 13, 2012
Coverage

•   Government
•   Police and Security (Hardware and Software)
•   Road Traffic Control
•   Airport Control
•   Healthcare Technology
•   Other forms of surveillance
Surveillance and Use of ICT for Social Control
                    Iran
Government: National Internet in Iran




• Government moving ahead with plans for National Internet (From
  2011). Functional by August 2012
• Aggressively restrict Internet freedom, Blocks access to outside world
• Creating thier own ’clean’ Internet
• Is heavily requlated by the government
• Government determine the websites to be accessible
• Creat national electronic main service and search engine (Ya Hagh)
• Content available in national Internet is tightly controlled
• Close all citizens access to International Internet => Proxy and VPN
• Allow Banks, ministeries and big companies continue accessing to
  International Internet => Discrimination
Government: Filtering in Iran



•   Filtering/ sensorship
•   All Social Networks
•   BBC, VOA, CNN and …
•   Youtube, Yahoo messenger, Skype, MSN
•   All outside Iranian websites
•   In 2006, 6000 websites and blogs had been filtered
•   In 2009, 5 million websites and blogs had been blocked
Government: March 2012: China vs. Iran




• Government surveillance
• China sold a sophisticated surveillance equipment to
  Telecommunication Company in Iran
• 98.6 million Euro contract, how despite tightening global
  sanctions signed in December 2010
• Illustrates, Iran manage to obtain the technology
• Iran uses the equipment to track possible dissenters at
  home by monitoring personal landline, mobile and
  Internet communications of potential dissidents
Government: Media and communication
• During the protests in 2009, the government
  began more strictly monitoring Skype, which
  made it difficult to keep in touch with people
  over the Skype
• Citizens use proxies to communicate
• Citizens (protesters) use mobile phones to tell the
  stories from the street to outside world
• Mobile phones protestors are using are not safe
  and authorities can easily track them
Government control over the Media
  • TV, Radio, Cinema and Internet are not privately
    owned (Tightly controlled by the government)
  • No private ISPs (who uses Internet? How many
    bytes or GB is used?)
  • A special court has authority to monitor the print
    media and may suspend publication
  • Information detrimental to the national interest
    are banned
  • All media facing censorship, dictatorship and
    suppression
  • Iranian Cinema Under Siege
http://www.youtube.com/watch?v=4OBAJnvOh4c
State Media Control Extends To Provinces,
               Airwaves
• Iranian government steer public perceptions
  through media restrictions are not limited to
  mainstream newspaper
• They curb access to foreign satellite broadcasts
• Use of radar and camera in air control
RFID and automated toll system

• RFID is now used for automatic toll payment
• Government control over the citizen’s
  travelling
• Use of the technology to spy on people and
  control their social and political movements
Police + 10
 • Police +10 offices in every Zone in big cities
 • Offer police e-services:
        Issue of passport
        Enforcement services (Bill payment)
        Identification services
        License
        Family services
        Public services
        Military services
        Fuel Card Services
        Car numbering and registration



http://www.epolice.ir
Surveillance and Use of ICT for Social Control
               Other Examples
EU data retention directive

• The EU Data retention directive
• Enabling law enforcement authorities to ascertain the
  identity of a person using a public network to communicate
  by mobile, fixed line, email, or internet telephony
• Landline and mobile companies + ISPs are collecting info
• Numbers called, time and duration of call, customer name
  except the content - would have to be recorded and stored
  for between six months and two years
• Police and security agencies can request access to details,
  with permission to access the information granted only by a
  court
• For access to be granted to stored data under the EU
  directive, a request must meet requirements under Section
  8 of the European Convention for the Protection of Human
  Rights and Fundamental Freedoms.
Australia Follows EU Example

• Following the EU data retention directive
• Australian government surveillance powers over its
  citizens
• ISPs asked to store the browsing and calling logs of
  Australian subscribers for three months at a time

• On Sep 01, 2010, Western Australian judge made it
  legal for Wilson Parking (a private company) to have
  unrestricted access to 10,000 names in the Dept of
  Transport's database to seek out parking offenders and
  fine them
March 2012: France vs. Google

• Google controls all user’s activities
• Sending user’s information of one service to another service
• By login -> Google controls the activities -> identifys the
  interest -> sends email and ads to your gmail

Government of France: Google is Vague and incomprehensible
French regulatory agency criticizes Google about French user’s
  privacy
Police and Security (PS): CCTV

• CCTV Cameras (Video Surveillance)

   5 to 10% growth in the coming 4 to 5 years (Video
   Surveillance & VCA Group IMS Research: Italy)

   Switching to IP Cameras (IP Security)

   SD to HD
   CCTV as a service

   Future focus is on access control and security than
   security equipment (Samsung)
PS: CCTV Examples


USA: SkyWatch (Police State of America)
http://www.youtube.com/watch?v=BVRxNWraLsc

UK: Mobile CCTV in Dartford (Available for hire for anti-
social behavior in social events)

Westminster Police in London: Mobile CCTV -> black spots
areas -> busy and winding streets -> keen to use latest
mobile tech => creating tailored mobile CCTV (IP Cameras,
excellent quality) unit (Van) to dramatically improve
surveillance

CCTV UK Market in 2010 for the security equipment was
1.2 Billions Dollars (Gary Wong of IMS Research)
PS: China
China: CCTV Cameras (fast-growing
surveillance industry)
CCTV in entire country

Watch over University campuses,
Hospitals, Mosque, Theaters

Control political and religious dissidents
(The New York Times)

Loksag, a Tibetan Buddhist monk in
Gansu Province said quote “ There are
video cameras all over our monastery,
and their only purpose is to make us
feel fear.” (The New York Times)
PS: Face Recognition

• Face Scanner & Facial Recognition
   Scan-> Capture-> Upload-> Recognized

   USA: FBI’s Operational Technology
   Division (Operation failure in FBI
   (Resolution, Position, Lighting, Image
   detail and System Maintenance)
   www.fbi.gov


   Australia: “Potent Tool” by Australian
   Federal Police for linking criminals to
   crime. Australia is at the forefront in FR
   technologies
PS: Face-Tek

 USA, Australia and Taiwan: Face-Tek face
 recognition core technology -> Integrating
 R&D from USA, Australia and Taiwan
 Access control system
      Identification system (1:N)*
      Verification system (1:1)
 GateKeeper (Application access
   control)+*
 Login control system*
www.face-tek.com
PS: NotiFace II

    NotiFace II: Face recognition surveillance system
           Analyses the input from CCTV cameras
           Compare the image with database
           Recognize
   Can distinguish the visitor as VIP, stranger or in blacklist with different
   warning alarm

   Applications: (Taiwan)
   Law Enforcement, Airports, Casinos, Clubs, Sport arenas, Banks &
   Buildings requiring high security




www.face-tek.com
PS:IZENSE
  • Voice / Speech Recognition
     IZENSE's voice recognition technology
        Hong Kong, China
        Mainly for mobile phones
        ‘Listen' to discrete commands
        Understand conversations
  Current tech: Lie Detector

  Expected Future: Integration of IZENSE's tech with lie detector
  tech

  Expected users: Police, Private investigation surveillance, HR
  (Job Interview), Law enforcement, Justice

www.youtube.com/watch?v=CjVVNuraly8
PS: ThermoVison
• Thermal Imaging and Sensors
   USA Department of Defense and Military :
   ThermoVision 2000/3000 Series. QWIP Sensors
     20 KMs, day/ night sensor, mapping
     software, GPS, digital magnetic compass,
     intelligent alarming, control with Windows
     Based Software Console
PS: Smarter Surveillance

• Software for Smarter Surveillance
   Software that automatically detect human
   motion, behavior, facial expressions and
   generates a running commentary of what’s
   happening .

HERMES (Human-expressive representations of
motion and their evaluation in sequences) project:
Team of researchers from five European countries

Funding from the ICT strand of the EU’s Sixth
Framework Programme for research
Road Traffic Control (RTC): CCTV

• CCTV Cameras
Finland: CCTV and Road Management
Tool (Finnish Transport Agency)

Working with IBM to built a single view of
road and traffic info. One single view and
utilizing this complete view to analyze
info.
RTC: Iran

   Secret police car surveillance, Speed recognition
   camera and police surveillance parked, CCTV
   cameras, Gas station

   Still high road traffic injuries in Iran
   30,000 people die annually
   Main Supplier: Middle East ITS
   (Dubai, Tehran)




http://www.middleeast-its.com
RTC: Auto-Driving Car
• Auto-Driving Car (Toyota)
Designed by Google
First used in Nevada, USA
No accident

Nevada Police had to change the
driving rules and regulation on April 2012

California is now changing the driving
rules in order to use the car

Uses:
Camera(Detects movements), Radar system, GPS and Laser
system
Airport Control

• Body Scanning Technology
   Anti-Terrorist Security System
   Does not recognize face
   Still does not cover all the risks

USA: Available in at least 19 US airports
EU: Limited use in European airports
(limited to passengers approval)
Healthcare Technology
• Personal Health System (PHS)
   PHS2007 Research is funded by FP7
   Use of ICT in PHS and enable distance monitoring
   Monitor-> Diagnose-> Treat
   Patients visit clinic or hospitals when they are already so
   ill

ICT offers:
New generation of lightweight monitoring systems
Patient can wear while going about their daily business

System provide:
Reliable data, transmit them to remote locations
Other Surveillance Tech


• NFC (Near Field Communication)
  Control over the crowded areas,
  restaurants, hotels, hospitals and
  etc.

Duty: Personal info reading (ID card),
payment, ticketing, booking, data and
info sharing, access control
Other Form of Surveillance


• Research plan is sent to FP7: ICT
• Automated Software System and Architecture
Software surveillance
   Monitoring the behavior and activities of
   software or service users
   Add and remove feature
Conclusion

• People are the objects of surveillance
• I do not mind if others are the subject to
  surveillance, but I do mind if I am the subject. (If I
  am an honorable citizen, then surveillance is an
  unnecessary action and may even be insulting)
• Not knowing whether there is surveillance, what
  the scope of that surveillance is, who is carrying
  out the surveillance and what will be done with
  the data can make people feel uncomfortable
• However, public and society suppose to benefit
  from surveillance by the authorities
Conclusion

• Technology Export Control: Surveillance
  Technology (ST) sales should be closely
  monitored (Monitoring approach differs in
  different countries)
• No sales of ST to repressive regimes (Syria:
  People will die earlier)
• Local trade shows and conferences to be held to
  increase public awareness and education
• More regulation on who should sell and buy
• Tighter regulation in less developed countries
Thank you for your kind attention

   I welcome your questions,
  Suggestions and Comments!


          Fatemeh Ahmadi Zeleti
       Fatemeh.AhmadiZeleti@tut.fi

More Related Content

What's hot

Ethipoia power point
Ethipoia power pointEthipoia power point
Ethipoia power pointalvareztori
 
Ecommerce country report vietnam
Ecommerce country report vietnamEcommerce country report vietnam
Ecommerce country report vietnamrrrifki
 
The Philippine Cybercrime Prevention Act of 2012
The Philippine Cybercrime Prevention Act of 2012The Philippine Cybercrime Prevention Act of 2012
The Philippine Cybercrime Prevention Act of 2012Jim Ayson
 
Censorship, Surveillance and Cyber Threats in Hong Kong.pdf
Censorship, Surveillance and Cyber Threats in Hong Kong.pdfCensorship, Surveillance and Cyber Threats in Hong Kong.pdf
Censorship, Surveillance and Cyber Threats in Hong Kong.pdfCharles Mok
 
Cyber Crime in Government
Cyber Crime in GovernmentCyber Crime in Government
Cyber Crime in GovernmentJacqueline Fick
 
The Benefits and Harms of National Security Technologies
The Benefits and Harms of National Security TechnologiesThe Benefits and Harms of National Security Technologies
The Benefits and Harms of National Security TechnologiesKatina Michael
 
Reporte de naciones unidas no restricion
Reporte de naciones unidas no restricionReporte de naciones unidas no restricion
Reporte de naciones unidas no restricionPipe Quiñonez
 
Mobile: Location Privacy and Apps_Michael Hanley
Mobile: Location Privacy and Apps_Michael HanleyMobile: Location Privacy and Apps_Michael Hanley
Mobile: Location Privacy and Apps_Michael HanleySara Quinn
 
Indian Cyber laws
Indian Cyber lawsIndian Cyber laws
Indian Cyber lawsmulikaa
 
International convention on cyber crime
International convention on cyber crimeInternational convention on cyber crime
International convention on cyber crimeIshitaSrivastava21
 
Getting the social side of pervasive computing right
Getting the social side of pervasive computing rightGetting the social side of pervasive computing right
Getting the social side of pervasive computing rightblogzilla
 
Cyber Crime Prevention Act 2012
Cyber Crime Prevention Act 2012Cyber Crime Prevention Act 2012
Cyber Crime Prevention Act 2012John Macasio
 
Lim Jus394 Chinese
Lim Jus394 ChineseLim Jus394 Chinese
Lim Jus394 Chinesemerlyna
 
EU Export Controls And Sanctions Update
EU Export Controls And Sanctions UpdateEU Export Controls And Sanctions Update
EU Export Controls And Sanctions Updatejasperhelder
 

What's hot (19)

Ethipoia power point
Ethipoia power pointEthipoia power point
Ethipoia power point
 
Internet Freedom 2.1
Internet Freedom 2.1Internet Freedom 2.1
Internet Freedom 2.1
 
Ecommerce country report vietnam
Ecommerce country report vietnamEcommerce country report vietnam
Ecommerce country report vietnam
 
The Philippine Cybercrime Prevention Act of 2012
The Philippine Cybercrime Prevention Act of 2012The Philippine Cybercrime Prevention Act of 2012
The Philippine Cybercrime Prevention Act of 2012
 
HRC Res A 1
HRC Res A 1HRC Res A 1
HRC Res A 1
 
Censorship, Surveillance and Cyber Threats in Hong Kong.pdf
Censorship, Surveillance and Cyber Threats in Hong Kong.pdfCensorship, Surveillance and Cyber Threats in Hong Kong.pdf
Censorship, Surveillance and Cyber Threats in Hong Kong.pdf
 
Using Technologies in Crime Prevention and Detection in Nigeria: Legal Issues...
Using Technologies in Crime Prevention and Detection in Nigeria: Legal Issues...Using Technologies in Crime Prevention and Detection in Nigeria: Legal Issues...
Using Technologies in Crime Prevention and Detection in Nigeria: Legal Issues...
 
Cyber Crime in Government
Cyber Crime in GovernmentCyber Crime in Government
Cyber Crime in Government
 
The Benefits and Harms of National Security Technologies
The Benefits and Harms of National Security TechnologiesThe Benefits and Harms of National Security Technologies
The Benefits and Harms of National Security Technologies
 
Oni Iran 2009
Oni Iran 2009Oni Iran 2009
Oni Iran 2009
 
Reporte de naciones unidas no restricion
Reporte de naciones unidas no restricionReporte de naciones unidas no restricion
Reporte de naciones unidas no restricion
 
Legal and Technical Standards for Lawful Intercepts
Legal and Technical Standards for Lawful InterceptsLegal and Technical Standards for Lawful Intercepts
Legal and Technical Standards for Lawful Intercepts
 
Mobile: Location Privacy and Apps_Michael Hanley
Mobile: Location Privacy and Apps_Michael HanleyMobile: Location Privacy and Apps_Michael Hanley
Mobile: Location Privacy and Apps_Michael Hanley
 
Indian Cyber laws
Indian Cyber lawsIndian Cyber laws
Indian Cyber laws
 
International convention on cyber crime
International convention on cyber crimeInternational convention on cyber crime
International convention on cyber crime
 
Getting the social side of pervasive computing right
Getting the social side of pervasive computing rightGetting the social side of pervasive computing right
Getting the social side of pervasive computing right
 
Cyber Crime Prevention Act 2012
Cyber Crime Prevention Act 2012Cyber Crime Prevention Act 2012
Cyber Crime Prevention Act 2012
 
Lim Jus394 Chinese
Lim Jus394 ChineseLim Jus394 Chinese
Lim Jus394 Chinese
 
EU Export Controls And Sanctions Update
EU Export Controls And Sanctions UpdateEU Export Controls And Sanctions Update
EU Export Controls And Sanctions Update
 

Viewers also liked

20120329 Cybercrime threats on e-world
20120329 Cybercrime threats on e-world20120329 Cybercrime threats on e-world
20120329 Cybercrime threats on e-worldLuc Beirens
 
Ch 7 Deivance and Social Control
Ch 7 Deivance and Social ControlCh 7 Deivance and Social Control
Ch 7 Deivance and Social ControlMBurke1621
 
Chapter 16 Reproduction in Plants Lesson 3 - Fertilization & post fertilizati...
Chapter 16 Reproduction in Plants Lesson 3 - Fertilization & post fertilizati...Chapter 16 Reproduction in Plants Lesson 3 - Fertilization & post fertilizati...
Chapter 16 Reproduction in Plants Lesson 3 - Fertilization & post fertilizati...j3di79
 
In Vitro Fertilization
In Vitro FertilizationIn Vitro Fertilization
In Vitro Fertilizationlebroniv
 

Viewers also liked (7)

20120329 Cybercrime threats on e-world
20120329 Cybercrime threats on e-world20120329 Cybercrime threats on e-world
20120329 Cybercrime threats on e-world
 
Justice in bangladesh
Justice in bangladesh Justice in bangladesh
Justice in bangladesh
 
Ch 7 Deivance and Social Control
Ch 7 Deivance and Social ControlCh 7 Deivance and Social Control
Ch 7 Deivance and Social Control
 
Deviant behavior
Deviant behaviorDeviant behavior
Deviant behavior
 
Deviant Behavior Sumugat
Deviant Behavior SumugatDeviant Behavior Sumugat
Deviant Behavior Sumugat
 
Chapter 16 Reproduction in Plants Lesson 3 - Fertilization & post fertilizati...
Chapter 16 Reproduction in Plants Lesson 3 - Fertilization & post fertilizati...Chapter 16 Reproduction in Plants Lesson 3 - Fertilization & post fertilizati...
Chapter 16 Reproduction in Plants Lesson 3 - Fertilization & post fertilizati...
 
In Vitro Fertilization
In Vitro FertilizationIn Vitro Fertilization
In Vitro Fertilization
 

Similar to Surveillance and Use of ICT for Social Control in Different Cultures: Emerging Trends in Europe, Iran and other Countries

International trends in mobile law
International trends in mobile lawInternational trends in mobile law
International trends in mobile lawJacqueline Fick
 
03-02-15 SENTIGUARD PresentationFA
03-02-15 SENTIGUARD PresentationFA03-02-15 SENTIGUARD PresentationFA
03-02-15 SENTIGUARD PresentationFAChristopher Born
 
Crime Crime and Cyber crime Investigation.ppt
Crime Crime and Cyber crime Investigation.pptCrime Crime and Cyber crime Investigation.ppt
Crime Crime and Cyber crime Investigation.pptOlusegun Mosugu
 
TRACE - The role of technology in human trafficking.
TRACE - The role of technology in human trafficking.TRACE - The role of technology in human trafficking.
TRACE - The role of technology in human trafficking.Trilateral Research
 
The role of technology in human trafficking
The role of technology in human trafficking The role of technology in human trafficking
The role of technology in human trafficking TRACE Project
 
Digital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismDigital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismCharles Mok
 
Eyewatch a versatile mobile platform for security and M-governance - Cdr (Ret...
Eyewatch a versatile mobile platform for security and M-governance - Cdr (Ret...Eyewatch a versatile mobile platform for security and M-governance - Cdr (Ret...
Eyewatch a versatile mobile platform for security and M-governance - Cdr (Ret...IPPAI
 
Chinese Digital Repression
Chinese Digital RepressionChinese Digital Repression
Chinese Digital RepressionCharles Mok
 
Next Generation Emergency Warning System
Next Generation Emergency Warning SystemNext Generation Emergency Warning System
Next Generation Emergency Warning SystemSyam Madanapalli
 
The potential impact of legislation on AI and Machine Learning (New Zealand f...
The potential impact of legislation on AI and Machine Learning (New Zealand f...The potential impact of legislation on AI and Machine Learning (New Zealand f...
The potential impact of legislation on AI and Machine Learning (New Zealand f...Daniil Ivshin
 
Presentation on Internet of Things
Presentation on Internet of ThingsPresentation on Internet of Things
Presentation on Internet of ThingsPranay Prabhat
 
L12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptxL12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptxtalhajann43
 
Internet Content Regulation: What it means in 2010
Internet Content Regulation: What it means in 2010Internet Content Regulation: What it means in 2010
Internet Content Regulation: What it means in 2010Wendy Qi
 
IOT Security - ICCT College of Engineering
IOT Security - ICCT College of EngineeringIOT Security - ICCT College of Engineering
IOT Security - ICCT College of EngineeringPotato
 
An overview of Global regulatory trends
An overview of Global regulatory trendsAn overview of Global regulatory trends
An overview of Global regulatory trendsCullen International
 

Similar to Surveillance and Use of ICT for Social Control in Different Cultures: Emerging Trends in Europe, Iran and other Countries (20)

International trends in mobile law
International trends in mobile lawInternational trends in mobile law
International trends in mobile law
 
03-02-15 SENTIGUARD PresentationFA
03-02-15 SENTIGUARD PresentationFA03-02-15 SENTIGUARD PresentationFA
03-02-15 SENTIGUARD PresentationFA
 
Crime Crime and Cyber crime Investigation.ppt
Crime Crime and Cyber crime Investigation.pptCrime Crime and Cyber crime Investigation.ppt
Crime Crime and Cyber crime Investigation.ppt
 
TRACE - The role of technology in human trafficking.
TRACE - The role of technology in human trafficking.TRACE - The role of technology in human trafficking.
TRACE - The role of technology in human trafficking.
 
The role of technology in human trafficking
The role of technology in human trafficking The role of technology in human trafficking
The role of technology in human trafficking
 
Digital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismDigital Repression and Techno-Authoritarianism
Digital Repression and Techno-Authoritarianism
 
Eyewatch a versatile mobile platform for security and M-governance - Cdr (Ret...
Eyewatch a versatile mobile platform for security and M-governance - Cdr (Ret...Eyewatch a versatile mobile platform for security and M-governance - Cdr (Ret...
Eyewatch a versatile mobile platform for security and M-governance - Cdr (Ret...
 
Chinese Digital Repression
Chinese Digital RepressionChinese Digital Repression
Chinese Digital Repression
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Glass Fiber Boxes
Glass Fiber BoxesGlass Fiber Boxes
Glass Fiber Boxes
 
Next Generation Emergency Warning System
Next Generation Emergency Warning SystemNext Generation Emergency Warning System
Next Generation Emergency Warning System
 
The potential impact of legislation on AI and Machine Learning (New Zealand f...
The potential impact of legislation on AI and Machine Learning (New Zealand f...The potential impact of legislation on AI and Machine Learning (New Zealand f...
The potential impact of legislation on AI and Machine Learning (New Zealand f...
 
Presentation on Internet of Things
Presentation on Internet of ThingsPresentation on Internet of Things
Presentation on Internet of Things
 
L12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptxL12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptx
 
Internet Content Regulation: What it means in 2010
Internet Content Regulation: What it means in 2010Internet Content Regulation: What it means in 2010
Internet Content Regulation: What it means in 2010
 
Day 02 - EDPS Technology & Privacy unit.pdf
Day 02 - EDPS Technology & Privacy unit.pdfDay 02 - EDPS Technology & Privacy unit.pdf
Day 02 - EDPS Technology & Privacy unit.pdf
 
IOT Security - ICCT College of Engineering
IOT Security - ICCT College of EngineeringIOT Security - ICCT College of Engineering
IOT Security - ICCT College of Engineering
 
An overview of Global regulatory trends
An overview of Global regulatory trendsAn overview of Global regulatory trends
An overview of Global regulatory trends
 
CTO Cybersecurity Forum 2013 Auguste Yankey
CTO Cybersecurity Forum 2013 Auguste YankeyCTO Cybersecurity Forum 2013 Auguste Yankey
CTO Cybersecurity Forum 2013 Auguste Yankey
 
10 hot IoT applications
10 hot IoT applications10 hot IoT applications
10 hot IoT applications
 

More from Fatemeh Ahmadi

Benefits, Adoption Barriers and Myths of Open Data and Open Governmnet
Benefits, Adoption Barriers and Myths of Open Data and Open GovernmnetBenefits, Adoption Barriers and Myths of Open Data and Open Governmnet
Benefits, Adoption Barriers and Myths of Open Data and Open GovernmnetFatemeh Ahmadi
 
Emerging Business Models for the Open Data Industry and Open Data Value Capab...
Emerging Business Models for the Open Data Industry and Open Data Value Capab...Emerging Business Models for the Open Data Industry and Open Data Value Capab...
Emerging Business Models for the Open Data Industry and Open Data Value Capab...Fatemeh Ahmadi
 
Open Data-Driven Innovation and Smart Cities_Open Data Business Model and Pat...
Open Data-Driven Innovation and Smart Cities_Open Data Business Model and Pat...Open Data-Driven Innovation and Smart Cities_Open Data Business Model and Pat...
Open Data-Driven Innovation and Smart Cities_Open Data Business Model and Pat...Fatemeh Ahmadi
 
Emerging business models for the open data industry: characterization and ana...
Emerging business models for the open data industry: characterization and ana...Emerging business models for the open data industry: characterization and ana...
Emerging business models for the open data industry: characterization and ana...Fatemeh Ahmadi
 
A tale of open data in five smart cities
A tale of open data in five smart citiesA tale of open data in five smart cities
A tale of open data in five smart citiesFatemeh Ahmadi
 
Capability Matrix for Open Data Businesses
Capability Matrix for Open Data BusinessesCapability Matrix for Open Data Businesses
Capability Matrix for Open Data BusinessesFatemeh Ahmadi
 
5th sas tech_slides_fatemeh ahmadi zeleti
5th sas tech_slides_fatemeh ahmadi zeleti5th sas tech_slides_fatemeh ahmadi zeleti
5th sas tech_slides_fatemeh ahmadi zeletiFatemeh Ahmadi
 
Entrepreneurism and e-government in finland
Entrepreneurism and e-government in finlandEntrepreneurism and e-government in finland
Entrepreneurism and e-government in finlandFatemeh Ahmadi
 
Surveillance and E-Government: Real and Potential Threats to Privacy in Europ...
Surveillance and E-Government: Real and Potential Threats to Privacy in Europ...Surveillance and E-Government: Real and Potential Threats to Privacy in Europ...
Surveillance and E-Government: Real and Potential Threats to Privacy in Europ...Fatemeh Ahmadi
 

More from Fatemeh Ahmadi (10)

Benefits, Adoption Barriers and Myths of Open Data and Open Governmnet
Benefits, Adoption Barriers and Myths of Open Data and Open GovernmnetBenefits, Adoption Barriers and Myths of Open Data and Open Governmnet
Benefits, Adoption Barriers and Myths of Open Data and Open Governmnet
 
Emerging Business Models for the Open Data Industry and Open Data Value Capab...
Emerging Business Models for the Open Data Industry and Open Data Value Capab...Emerging Business Models for the Open Data Industry and Open Data Value Capab...
Emerging Business Models for the Open Data Industry and Open Data Value Capab...
 
Lecture week 5 -
Lecture week 5 -Lecture week 5 -
Lecture week 5 -
 
Open Data-Driven Innovation and Smart Cities_Open Data Business Model and Pat...
Open Data-Driven Innovation and Smart Cities_Open Data Business Model and Pat...Open Data-Driven Innovation and Smart Cities_Open Data Business Model and Pat...
Open Data-Driven Innovation and Smart Cities_Open Data Business Model and Pat...
 
Emerging business models for the open data industry: characterization and ana...
Emerging business models for the open data industry: characterization and ana...Emerging business models for the open data industry: characterization and ana...
Emerging business models for the open data industry: characterization and ana...
 
A tale of open data in five smart cities
A tale of open data in five smart citiesA tale of open data in five smart cities
A tale of open data in five smart cities
 
Capability Matrix for Open Data Businesses
Capability Matrix for Open Data BusinessesCapability Matrix for Open Data Businesses
Capability Matrix for Open Data Businesses
 
5th sas tech_slides_fatemeh ahmadi zeleti
5th sas tech_slides_fatemeh ahmadi zeleti5th sas tech_slides_fatemeh ahmadi zeleti
5th sas tech_slides_fatemeh ahmadi zeleti
 
Entrepreneurism and e-government in finland
Entrepreneurism and e-government in finlandEntrepreneurism and e-government in finland
Entrepreneurism and e-government in finland
 
Surveillance and E-Government: Real and Potential Threats to Privacy in Europ...
Surveillance and E-Government: Real and Potential Threats to Privacy in Europ...Surveillance and E-Government: Real and Potential Threats to Privacy in Europ...
Surveillance and E-Government: Real and Potential Threats to Privacy in Europ...
 

Recently uploaded

Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 

Recently uploaded (20)

Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 

Surveillance and Use of ICT for Social Control in Different Cultures: Emerging Trends in Europe, Iran and other Countries

  • 1. Surveillance and Use of ICT for Social Control in Different Cultures: Emerging Trends in Europe, Iran and other Countries Fatemeh Ahmadi Zeleti Tampere University of Technology FP7 RESPECT Project Steering Committee Meeting June 13, 2012
  • 2. Coverage • Government • Police and Security (Hardware and Software) • Road Traffic Control • Airport Control • Healthcare Technology • Other forms of surveillance
  • 3. Surveillance and Use of ICT for Social Control Iran
  • 4. Government: National Internet in Iran • Government moving ahead with plans for National Internet (From 2011). Functional by August 2012 • Aggressively restrict Internet freedom, Blocks access to outside world • Creating thier own ’clean’ Internet • Is heavily requlated by the government • Government determine the websites to be accessible • Creat national electronic main service and search engine (Ya Hagh) • Content available in national Internet is tightly controlled • Close all citizens access to International Internet => Proxy and VPN • Allow Banks, ministeries and big companies continue accessing to International Internet => Discrimination
  • 5. Government: Filtering in Iran • Filtering/ sensorship • All Social Networks • BBC, VOA, CNN and … • Youtube, Yahoo messenger, Skype, MSN • All outside Iranian websites • In 2006, 6000 websites and blogs had been filtered • In 2009, 5 million websites and blogs had been blocked
  • 6. Government: March 2012: China vs. Iran • Government surveillance • China sold a sophisticated surveillance equipment to Telecommunication Company in Iran • 98.6 million Euro contract, how despite tightening global sanctions signed in December 2010 • Illustrates, Iran manage to obtain the technology • Iran uses the equipment to track possible dissenters at home by monitoring personal landline, mobile and Internet communications of potential dissidents
  • 7. Government: Media and communication • During the protests in 2009, the government began more strictly monitoring Skype, which made it difficult to keep in touch with people over the Skype • Citizens use proxies to communicate • Citizens (protesters) use mobile phones to tell the stories from the street to outside world • Mobile phones protestors are using are not safe and authorities can easily track them
  • 8. Government control over the Media • TV, Radio, Cinema and Internet are not privately owned (Tightly controlled by the government) • No private ISPs (who uses Internet? How many bytes or GB is used?) • A special court has authority to monitor the print media and may suspend publication • Information detrimental to the national interest are banned • All media facing censorship, dictatorship and suppression • Iranian Cinema Under Siege http://www.youtube.com/watch?v=4OBAJnvOh4c
  • 9. State Media Control Extends To Provinces, Airwaves • Iranian government steer public perceptions through media restrictions are not limited to mainstream newspaper • They curb access to foreign satellite broadcasts • Use of radar and camera in air control
  • 10. RFID and automated toll system • RFID is now used for automatic toll payment • Government control over the citizen’s travelling • Use of the technology to spy on people and control their social and political movements
  • 11. Police + 10 • Police +10 offices in every Zone in big cities • Offer police e-services: Issue of passport Enforcement services (Bill payment) Identification services License Family services Public services Military services Fuel Card Services Car numbering and registration http://www.epolice.ir
  • 12. Surveillance and Use of ICT for Social Control Other Examples
  • 13. EU data retention directive • The EU Data retention directive • Enabling law enforcement authorities to ascertain the identity of a person using a public network to communicate by mobile, fixed line, email, or internet telephony • Landline and mobile companies + ISPs are collecting info • Numbers called, time and duration of call, customer name except the content - would have to be recorded and stored for between six months and two years • Police and security agencies can request access to details, with permission to access the information granted only by a court • For access to be granted to stored data under the EU directive, a request must meet requirements under Section 8 of the European Convention for the Protection of Human Rights and Fundamental Freedoms.
  • 14. Australia Follows EU Example • Following the EU data retention directive • Australian government surveillance powers over its citizens • ISPs asked to store the browsing and calling logs of Australian subscribers for three months at a time • On Sep 01, 2010, Western Australian judge made it legal for Wilson Parking (a private company) to have unrestricted access to 10,000 names in the Dept of Transport's database to seek out parking offenders and fine them
  • 15. March 2012: France vs. Google • Google controls all user’s activities • Sending user’s information of one service to another service • By login -> Google controls the activities -> identifys the interest -> sends email and ads to your gmail Government of France: Google is Vague and incomprehensible French regulatory agency criticizes Google about French user’s privacy
  • 16. Police and Security (PS): CCTV • CCTV Cameras (Video Surveillance) 5 to 10% growth in the coming 4 to 5 years (Video Surveillance & VCA Group IMS Research: Italy) Switching to IP Cameras (IP Security) SD to HD CCTV as a service Future focus is on access control and security than security equipment (Samsung)
  • 17. PS: CCTV Examples USA: SkyWatch (Police State of America) http://www.youtube.com/watch?v=BVRxNWraLsc UK: Mobile CCTV in Dartford (Available for hire for anti- social behavior in social events) Westminster Police in London: Mobile CCTV -> black spots areas -> busy and winding streets -> keen to use latest mobile tech => creating tailored mobile CCTV (IP Cameras, excellent quality) unit (Van) to dramatically improve surveillance CCTV UK Market in 2010 for the security equipment was 1.2 Billions Dollars (Gary Wong of IMS Research)
  • 18. PS: China China: CCTV Cameras (fast-growing surveillance industry) CCTV in entire country Watch over University campuses, Hospitals, Mosque, Theaters Control political and religious dissidents (The New York Times) Loksag, a Tibetan Buddhist monk in Gansu Province said quote “ There are video cameras all over our monastery, and their only purpose is to make us feel fear.” (The New York Times)
  • 19. PS: Face Recognition • Face Scanner & Facial Recognition Scan-> Capture-> Upload-> Recognized USA: FBI’s Operational Technology Division (Operation failure in FBI (Resolution, Position, Lighting, Image detail and System Maintenance) www.fbi.gov Australia: “Potent Tool” by Australian Federal Police for linking criminals to crime. Australia is at the forefront in FR technologies
  • 20. PS: Face-Tek USA, Australia and Taiwan: Face-Tek face recognition core technology -> Integrating R&D from USA, Australia and Taiwan Access control system Identification system (1:N)* Verification system (1:1) GateKeeper (Application access control)+* Login control system* www.face-tek.com
  • 21. PS: NotiFace II  NotiFace II: Face recognition surveillance system Analyses the input from CCTV cameras Compare the image with database Recognize Can distinguish the visitor as VIP, stranger or in blacklist with different warning alarm Applications: (Taiwan) Law Enforcement, Airports, Casinos, Clubs, Sport arenas, Banks & Buildings requiring high security www.face-tek.com
  • 22. PS:IZENSE • Voice / Speech Recognition IZENSE's voice recognition technology Hong Kong, China Mainly for mobile phones ‘Listen' to discrete commands Understand conversations Current tech: Lie Detector Expected Future: Integration of IZENSE's tech with lie detector tech Expected users: Police, Private investigation surveillance, HR (Job Interview), Law enforcement, Justice www.youtube.com/watch?v=CjVVNuraly8
  • 23. PS: ThermoVison • Thermal Imaging and Sensors USA Department of Defense and Military : ThermoVision 2000/3000 Series. QWIP Sensors 20 KMs, day/ night sensor, mapping software, GPS, digital magnetic compass, intelligent alarming, control with Windows Based Software Console
  • 24. PS: Smarter Surveillance • Software for Smarter Surveillance Software that automatically detect human motion, behavior, facial expressions and generates a running commentary of what’s happening . HERMES (Human-expressive representations of motion and their evaluation in sequences) project: Team of researchers from five European countries Funding from the ICT strand of the EU’s Sixth Framework Programme for research
  • 25. Road Traffic Control (RTC): CCTV • CCTV Cameras Finland: CCTV and Road Management Tool (Finnish Transport Agency) Working with IBM to built a single view of road and traffic info. One single view and utilizing this complete view to analyze info.
  • 26. RTC: Iran Secret police car surveillance, Speed recognition camera and police surveillance parked, CCTV cameras, Gas station Still high road traffic injuries in Iran 30,000 people die annually Main Supplier: Middle East ITS (Dubai, Tehran) http://www.middleeast-its.com
  • 27. RTC: Auto-Driving Car • Auto-Driving Car (Toyota) Designed by Google First used in Nevada, USA No accident Nevada Police had to change the driving rules and regulation on April 2012 California is now changing the driving rules in order to use the car Uses: Camera(Detects movements), Radar system, GPS and Laser system
  • 28. Airport Control • Body Scanning Technology Anti-Terrorist Security System Does not recognize face Still does not cover all the risks USA: Available in at least 19 US airports EU: Limited use in European airports (limited to passengers approval)
  • 29. Healthcare Technology • Personal Health System (PHS) PHS2007 Research is funded by FP7 Use of ICT in PHS and enable distance monitoring Monitor-> Diagnose-> Treat Patients visit clinic or hospitals when they are already so ill ICT offers: New generation of lightweight monitoring systems Patient can wear while going about their daily business System provide: Reliable data, transmit them to remote locations
  • 30. Other Surveillance Tech • NFC (Near Field Communication) Control over the crowded areas, restaurants, hotels, hospitals and etc. Duty: Personal info reading (ID card), payment, ticketing, booking, data and info sharing, access control
  • 31. Other Form of Surveillance • Research plan is sent to FP7: ICT • Automated Software System and Architecture Software surveillance Monitoring the behavior and activities of software or service users Add and remove feature
  • 32. Conclusion • People are the objects of surveillance • I do not mind if others are the subject to surveillance, but I do mind if I am the subject. (If I am an honorable citizen, then surveillance is an unnecessary action and may even be insulting) • Not knowing whether there is surveillance, what the scope of that surveillance is, who is carrying out the surveillance and what will be done with the data can make people feel uncomfortable • However, public and society suppose to benefit from surveillance by the authorities
  • 33. Conclusion • Technology Export Control: Surveillance Technology (ST) sales should be closely monitored (Monitoring approach differs in different countries) • No sales of ST to repressive regimes (Syria: People will die earlier) • Local trade shows and conferences to be held to increase public awareness and education • More regulation on who should sell and buy • Tighter regulation in less developed countries
  • 34. Thank you for your kind attention I welcome your questions, Suggestions and Comments! Fatemeh Ahmadi Zeleti Fatemeh.AhmadiZeleti@tut.fi