February 17, 2023

Takeaways for Week No.6

Surveillance Technology

  • Used by various law enforcement agencies
  • Ankle Monitors, GPS, cell phones, automated license plate readers (ALPR)
  • Stingrays/DRT Boxes, devices used by law enforcement to gather data from nearby cellphones. There are a lot of privacy issues with the volume of data these devices can collect.
  • 5G and its security measures have made stingrays and similar devices less effective.
  • WiFi Pineapples, and other devices can be used to intercept traffic on public WiFi - which is known as a man in the middle attack.

Privacy concerns 

  •  The fourth amendment prohibits unreasonable search and seizure by the government
  • Use of surveillance is generally considered a search when the government has access to real time tracking of your location or generally invades your privacy in a significant way
  • This means for law enforcement to track someone through GPS or cell phone signals they need a warrant and probable cause.
  • Use of ALPR is not a search, it gathers publicly displayed information.
  • By tracking someones movement you may be able to gather information they'd like to keep private.

University/Utah State ALPR Regulation

  • We had a group discussion on how ALPR is used for parking enforcement by the university. 
  •  The university has its own policy for ALPR use in addition to the States own law.
  • Collected license plate data is stored locally on the computers that gather them and is deleted after 24 hours, it is only used for and by parking management, any law enforcement request to access the data requires a warrant.
  • Compliance to the policy is audited quarterly.
  • Utah's ALPR law only applies to the government and limits its use to public safety, toll collection, and traffic law enforcement. Data collected is kept private unless law enforcement has a search warrant. 16 other states regulate this technology

No comments:

Post a Comment

Week 12 Takeaways

 Week 12 focused on the three levels of internet protection: Strong Protection Password hygiene Best practices for Authentication (2FA, Bett...