SlideShare a Scribd company logo
1 of 29
Terrorism: A Study in Public Safety – Public Safety vs.
Individual Freedom Transcript
Note. Transcript is for supplementary audio provided by
clicking on the speaker icon on the Introduction page.
Public Safety vs. Individual Freedom
Fundamental to terrorist is the ability to operate in secrecy as
invisible as the wind and as deadly as the tools at their disposal.
Terrorist succeed only when their plans can be carried out
without discovery or detection. Accordingly proactive
government intelligence gathering and intervention has proven
to be the best approach to preventing future terrorist attacks. To
discover secrets however certain impositions must be made
government intrusions and incursions that go along with
fighting terrorism bring to light the balance between public
safety and individual freedom.
Copyright © 2011 Pearson Education, Inc. All Rights Reserved.
Criminology Interviews: Chief of Victimization Statistics, U.S.
Bureau of Justice Statistics Transcript
Michael Rand
Introduction
I’m Michael Rand. I’m Chief of Victimization Statistics at the
U.S. Bureau of Justice Statistics and BJS is the statistical arm
of the department of justice.
How would you describe the field of criminology?
Well, criminology to me, and I’m not a criminologist I’m a
political scientist, criminology is the study of crime and its
attributes and it’s ideology and everything surrounding it and
it’s such a diverse field that it encompasses an incredible wide
range of subjects related to crime and victims and offenders and
the criminal justice system.
What are some current trends in criminology?
Victimization surveys have taught us an awful lot about crime
and um, the extent in nature of crimes people experience. But
there’s still so much more to learn and we, we’re gonna be
moving probably into a lot of new directions. I know that we’re
moving into some areas that we had not intended or thought we
would be in such as looking at identity theft, looking at internet
predating, things like that, new subjects. But also we face
challenges related to technology and how we conduct surveys
and how we can best reach the public and um, get the best
answers from them. So there are huge challenges to be faced,
um, both for the survey that I work on and for survey
methodology in general.
As a political scientist, what does your research indicate?
One of the things that – one of the key parts of my job is to look
at trends in crime and our country has experienced in the past
decade uh, and a half a very broad and long-standing decline in
violent property crime. That seems possibly to be ending in the
last couple of years. As a matter of fact, our survey has shown
this year that there really was no change between 2004 and 2005
in the level of crime whereas police reported crime has actually
increased by about 1% so there’s a huge discussion in the field
as to whether we’ve seen the end of the decline and we’re
entering a new period of increase in crime rates or whether this
is possibly just an interruption in the decline. So we won’t
know that for a few years. We’ll have to wait and see where that
question takes us.
Is your research more concerned with practice or theory?
As the statistical arm of the department of justice, we collect
information about crime and about the criminal justice system,
not so much to apply any theory or to validate any theories, but
to inform about crime and the criminal justice system. So we’re
not really related – specifically associated with either practice
per se or theory.
As a statistician, what does your day tend to look like?
I am in charge of the largest victimization survey conducted,
um, in the country, and I have a staff that works with me and
for me to analyze data and collect the data. The data are
collected for us by the census bureau. So I work with them. So
my day involves a lot of meetings, a lot of meetings with staff,
a lot of meetings with other agencies to maintain and continue
developing the survey, to analyze the data, and in my spare
moments I get a chance to actually hands on work with the data
myself.
Since you study statistics, does this allow you to predict trends?
We avoid projecting because it’s a quagmire. Um, we don’t
know enough about why crime rates decline to be able to predict
why they may increase in the future. I mean we can look and see
what’s going on today, some of the theories that are being
discussed related to this possible increase have to do with
changes in drug markets, changes – increased youth
involvement as offenders, um, changes possibly in police levels,
levels of policing, and um, some of those – those are some of
the questions that are being looked at to see how they, um,
influence changes in crime rates.
Copyright © 2011 Pearson Education, Inc. All Rights Reserved.
Transcripts:
Targeting Terrorism
3 September, 2004. Beslan's number one schoolis overrun by Ch
echen separatists. More than1,000 children and adults are held c
aptive.Russian special forces storm the building. And the
siege leaves 331 dead, 186 of them children. Thisis the archetyp
al terrorist act, calculated violenceaimed at innocents for politic
al ends.
[SPEAKING FOREIGN LANGUAGE]
We've not only had to deal with murderers, butwith people who
use weapons againstdefenseless children.
But many terrorists describe themselves asfreedom fighters.
[SPEAKING FOREIGN LANGUAGE]
The aim of our operation in Beslan was to stop thewar, stop the
genocide of the
Chechen people,and force the withdrawal of the Russianoccupyi
ng troops.
The demands became known right away--
endthe war in Chechnya, withdraw the troops fromChechnya. B
ut apparently, the federal authoritiesdidn't like that. They made
it sound as if thehostage taking had happened for no reason.
After centuries of religiously motivated terrorism,many 19th an
d 20th century movements acted inthe name of self-
determination. The 9/11 terrorattacks epitomized a swing in the
1990s backtowards religious terrorism, even deadlier actssuppos
edly sanctioned by God.
Muslims all over the world, I strongly advise youto sacrifice thi
s life for
the hereafter. Saveyourselves from the fire and torment. Come
backto your religion, and bring back your honor.
Many analysts feared terrorists would useweapons of mass destr
uction, such as nuclear orbiological weapons. Iran and North Ko
rea, bothstates believed to sponsor terrorism, have soughtto acq
uire nuclear technology.
Any country that aims to acquire a nuclearweapon is the grave t
hreat to international peaceand security, particularly in a region
like the MiddleEast, which is full of hostility, full of lack, full o
fdistrust.
Governments rarely give into terrorists, yet evenmore rarely do
they work to alleviate the causesof terrorism, such as poverty an
d [INAUDIBLE]discrimination.
The more the Americans are supporting Israel,the more popular
Bin Laden and his like becomes.
In this film, we look at the current terrorist threat in
a range of countries, as well as how historyshapes the governme
nt's response.
[GUNSHOTS]
Gun!
[GUNSHOTS]
These tunnels are tiny. Literally, you've got
toreally squeeze to get through. They criss-
crossall of Bajaur. That's where the militants used tocome in
and hide and move around and store theirarms.
From homegrown terrorists with nationalist andcommunist goals
in the 1960s and '70s, Americanterrorist movements turned agai
nst the federalgovernment in the 1980s, culminating with theOkl
ahoma City bombing in 1995. At the sametime, US citizens beca
me more vulnerable toterrorist attacks abroad. In 1993, foreign t
erroristsmade their first major strike on US soil, a truckbomb de
tonated beneath the World Trade Center,killing six and woundin
g 1,000.
Eight years later, al-
Qaeda again attacked on USsoil, hijacking four planes and reduc
ing the WorldTrade Center to rubble, killing 2,700 innocentpeop
le.
Saudi Osama bin Laden founded al-
Qaeda in1988 with the goal of establishing a global Islamicstate
. 10 years later, he declared it, quote, "theduty of all Muslims to
kill US citizens, civilians, andmilitary and their allies everywh
ere." Hisobjections to the US are Washington's support ofIsrael,
the US military presence in the Middle East,and the non-
Islamic values the US is spreading.
This time, when
the shouting and screaming ofMuslims has become loud through
out the world,Palestine and Iraq, Afghanistan and Chechnya,this
time we say to the old world and declare it as
a thunderous scream-- the resolve
of Muslims willnot weaken. We wish to offer our lives in
the way of God, to please Him, to take revenge on our
enemies, the Jews and the Crusaders.
Prior to 2001, Bin Laden had made threesuccessful attacks again
st the US-- the twoseparate suicide truck bombings of
the USembassies in Tanzania and Kenya in 1998 andthe suicide
bombing of the USS Cole, moored offYemen in the year 2000.
Following 9/11, President George W.
Bushlaunched a massive military campaign to huntdown Bin La
den in a war on terror, starting withthe invasion of Afghanistan
to try to oust hardlineIslamists, the Taliban. Bush defined an axi
s of evilas consisting of Iraq, Iran, and North Korea. Hewas crit
icized for expanding the war to includeIraq without a concrete li
nk between Baghdad andBin Laden.
Bush also gave law enforcement authorities wide-
sweeping powers under the 2001 Patriot Act.Greater powers of s
urveillance, wiretapping, theuse of secret evidence, and closed c
ourt hearingsbecame part of the war on terror.
The Patriot Act now legalizes many things that, inmy opinion an
d the opinion of many legal scholars,are in direct contradiction
of our Constitution.
The US Constitution guarantees suspectedcriminals protection fr
om detention without charge,the right to a speedy public trial, a
nd protectionfrom cruel and unusual punishment. In war, thegov
ernment may curb these rights. Terrorsuspects captured in Afgh
anistan were classifiedas enemy combatants and transferred toG
uantanamo Bay, a US naval facility in Cuba.
We shouldn't forget that the reason they're here inGuantanamo i
s because they are terrorists.
The detainees there were largely left in limbo,without formal ch
allenges. But the pursuit ofinternational terrorists under military
rather thancivilian rules alienated many US allies.
You don't just hold people by casting them into ablack hole and
say that no one can oversee whatthey do because we are the US
military. That'snot the rule of law. That's military rule.
In 2006, US policy at Guantanamo came underfire, especially th
e use of simulated drowning orwaterboarding, sleep deprivation,
and forcefeeding. Humanitarian agencies said all prisonersthere
were entitled to a trial or release under theGeneva Convention.
These were not mastermind hardened terrorists.Most
of them probably did
not even though theABC of warfare or guerrilla warfare. And th
eywere caught up in a whirlpool of hysteria andJihad fervor, eg
ged on by their local mullahs in thevillages.
--in the past year.
Criticism also mounted over the policy ofextraordinary renditio
n, in which the US sentsuspects to countries that practiced tortu
re, suchas Egypt, Syria, or Morocco, for interrogation.
What this is is state-
sponsored abduction. Andthat's a violation of international law.
When President Barack Obama took office in2009, he signaled a
different direction in the waron terror, recognizing that military
might alonecannot protect the US. He banned waterboardingand
announced he would close Guantanamowithin a year. He also a
nnounced a timetable forUS combat troops to leave Iraq. Bush's
anti-
terrortactics had been widely discredited, not leastbecause Osa
ma bin Laden had never beencaught, and the Taliban had regrou
ped inPakistan.
After the war in Afghanistan in 2001, it should beremembered t
he Taliban were never defeated.They were simply routed by the
Americans. Manythousands escaped into Pakistan, includingalm
ost the entire Taliban leadership.
The Pakistani Taliban vows to destroy thePakistan government a
nd army for joining theAmerican fight against it. In 2008, the T
aliban andits associated groups crippled Pakistan with 60suicide
bombings, 140 kidnappings, theassassination of former Prime
Minister BenazirBhutto, and the shutting down of NATO's main
supply route into Afghanistan. Many are callingPakistan the ne
w front line in the war on terror,with the Taliban now seeing the
mselves as part ofa global Jihad.
[SPEAKING FOREIGN LANGUAGE]
Prophet Muhammad said
the Jihad will continueuntil the day of judgment. Our future atta
cks willbe fast and severe, God willing.
Today's prayer meeting followed the troubles lastnight, when su
pporters of
the imam tried to breakinto the building. Extra police had been
drafted tothe troubled mosque after a judge ordered--
In Britain, decades of dealing with the IrishRepublican Army--
IRA-- have left the securityservices relatively well-
equipped. But the UK wascaught off guard by homegrown Islam
ic terroristswho struck in 2005. Fighting for a united Ireland,the
IRA began a series of bombings againstBritish targets in the 19
60s. Living with thisperpetual threat led the British government
tocreate a response based on decentralization andpublic awarene
ss, including evacuations after IRAtip-offs.
By
the early 1990s, having achieved little throughviolence, IRA lea
ders began to focus on a politicalsolution. In 1998, the British a
nd Irishgovernments agreed the Good Friday Accord. Itincluded
the establishment of a Northern Irelandassembly and the releas
e of IRA prisoners. GerryAdams, head of the IRA's political bra
nch, SinnFein, called upon IRA militants to demobilize.
What Republicans have to be is very strategic inour attitude--
think beyond the difficulties nextyear, think beyond the proble
ms that have beenunheard from the last number of years, think o
fwhere we want to be in 10 years' time, and thenfed ourselves in
to a process which helps to bringthat about.
Meanwhile, throughout the 1990s, the UK'sgenerous asylum law
s and relaxed politicalclimate had made it a popular destination
forMuslim extremists exiled from other countries.
Remember, 6 million Muslims in the UK. We needan army of 6
million.
On July 7, 2005, four young men blew themselvesup on London'
s transport system, killing 52passengers. Al-
Qaeda claimed responsibility. AllEnglish-
born, three of the bombers had attendedradical Islamic schools i
n Pakistan.
Most of these lads are respectable lads. They
hadgood backgrounds. The families were wellrespectable people
in the area. That's not
thereason. But that is something that the Britishcommunity need
to look at, learn what makes aperson do such a thing.
They
were general lads, just like ourselves,working, educated, financi
ally secure. They werefrom financially secure families. What pu
t the picture in their mind is
the media. They're seeingtheir own brethren get killed day
in, day out. And itdoes affect you.
During the 1990s, firebrand imams had taken oversome mosques
to preach hate.
The imam from the
pulpit can influence thecommunity in many respects, which nee
d to besupervised, needs to be controlled.
One of these imams was Sheikh Omar BakriMohammed. He rais
ed money and inspiredrecruits to the fundamentalist calls throug
h hisgroup, Al-
Muhajiroun. Hundreds of his youngfollowers have gone oversea
s to train and fight inMuslim conflicts. In 2004, Bakri disbande
d Al-
Muhajiroun under increasing pressure from theUK authorities a
nd
was refused reentry into theUK after travelling to Lebanon in 20
05.
Another Muslim cleric with clear links to terrorismis Abu Hamz
a al-
Mazri. He preached at London'sFinsbury Park Mosque, which ha
s beenconnected to terrorist attacks in the Yemen, theBrixton sh
oe bomber, and British Taliban fighterslater held in Guantanam
o Bay.
If they want to retaliate for the dead because youdon't listen, the
n I can no way say to
them, we arenot allowed to do these things, because they alsoha
ve civilians whom you've killed with your bombsand your polici
es and your sanctions.
Abu Hamza had a close alliance with anotherIslamic extremist,
Abu Qatada, whosefundamentalist teachings inspired at least fo
uryoung men to join al-
Qaeda. One was ZacariasMoussaoui, the so-
called 20th hijacker of theWorld Trade Center. Jihadi activists i
n Britainwere swimming in a sea of like-minded individuals.
London. It's London. It's the safe haven. Thereare many people,
as well as Abu Hamza or Abu
Qatada, who, if they were in France, for example,a long time ag
o they'd be in prison.
The UK's 1974 Prevention of Terrorism Act hadbanned the IRA.
But new counter-
terror legislationwas introduced following the London bombings
,including the right to hold suspects withoutcharges for 28 days,
and a new charge ofglorifying terrorism. Both aspects werecont
roversial, with critics claiming the glorificationoffense would d
amage legitimate freedom ofspeech.
Britain had been revealed as a key launchpad foral-
Qaeda, a base for recruitment, and thechannelling of terrorist m
oney. But by shifting itsemphasis to terror groups based in the
UK sincethe London bombings, Britain foiled a suspectedplot to
blow up as many as 10 passenger jetsleaving the UK for the US
in 2006. It not onlyaverted what could have been another 9/11,
butunderscored the UK's determination to counterthe threat of Is
lamic terror.
Responses to terrorism are often constrained, asin Germany and
Japan, by
a nation's military past.Both these countries have constitutions
which limittheir responses and mean terrorism isapproached as a
legal, rather than military,problem. Both countries faced left-
wing groups inthe 1970s, but found their laws insufficient to de
alwith religious terrorism from the 1990s onwards.
The Japanese doomsday cult, Aum Shinrikyo,attracted scientists
capable of developingbiological and chemical weapons. Led by
ShokoAsahara, the group demanded loyalty throughacts of viole
nce and suffering. And those startingto doubt the movement wer
e killed. Aum attracted10,000 members across Japan, and by 19
94, hadbranches worldwide. The 1951 ReligiousCorporation La
w precluded the government fromintruding on their activities.
In 1993, the Aum began experiments withchemical weapons. So
me of the work was goingon right in the middle of downtown To
kyo. In 1995,members of Aum released sarin, a highly toxicnerv
e gas, into the Tokyo subway system. 12people died, and 5,002
were injured. Aum's sarinfactory was the brainchild of chemist
MasamiTsuchiya.
[SPEAKING JAPANESE]
I sensed a crisis in contemporary society. I wasinterested in brin
ging a spiritual dimension tomodern science and harmonizing th
e two. I wasalways looking to join a group which shared thiside
a.
The Aum subway attack caught the Japanesegovernment unprep
ared. In the wake of theattack, an emergency secretariat was cre
ated tocoordinate emergency response. Japan's primarycounter-
terrorism strategy is internationalcooperation. Since 1960, its se
curity has beenguaranteed by
a treaty with the US, as the 1947Japanese constitution renounce
s the right to an army.
But the 9/11 attacks transformed Japanese anti-
terrorist strategy. Tokyo gave logistical support tothe US in bot
h Afghanistan and the Middle East.The terrorist threat is now be
ing used to persuadeJapanese citizens of the merits of
a remilitarizedJapan.
In our case, North Korea is kidnapping our people.People know
that. And they shoot missilestowards our territory. So now peop
le are gettingmore and more concerned about nationalsecurity.
Germany's approach to terrorism has been basedon diplomacy ra
ther than military action. AlthoughGermany contributed troops t
o help oust theTaliban from Afghanistan, it refused to back the
US-led war on Iraq, a rift which has led
toproblems with intelligence sharing between the USand Germa
ny. Unlike Britain, Germany has notfaced widespread terrorist a
ttacks. Yet al-
Qaedamembers prepared for the 9/11 attacks inGermany. At leas
t three of the hijackers lived inHamburg, but had
not raised any suspicions,including the ringleader, Mohamed At
ta.
He saw all of the licentiousness of the West. Andvery commonl
y, this experience causes youngMuslim men to become much mo
re traditional,much more fundamentalist.
Germany's legal system is a reaction to its Nazipast. Reacting to
the central police force createdby the Nazis, Germany's police f
orce is highlydecentralized, with no centralized force forterroris
t prevention. Specific laws were drafted forfighting 1970s left-
wing terror group, Baader-
Meinhof. But prior to 9/11, Germany had no lawsbanning foreig
n terrorist organizations.
Since 2001, German law forbids joining or helpingforeign terror
ist organizations and allowed for thebanning of religious groups
thought to promoteterrorism. One of those groups banned was
Hizbut-
Tahrir, a group which, as of 2009, was stillactive in Britain.
[SPEAKING SPANISH]
Columbia suffers from narcoterrorism, wheregroups are complic
it in drug trafficking in order tofund politically motivated viole
nce. Colombia hasno clear laws on terrorism. The main thread t
oguerrillas, paramilitaries, and drug cartels alike areextradition
laws with the US.
Pablo Escobar, infamous leader of the Medellindrug cartel, surr
endered to Colombian authoritiesin 1991 only after a ban on ext
radition. Columbiahas had two left-
wing insurgencies since the1960s and a right-
wing paramilitary group, allthree of which have been drawn into
the cocainetrade. The guerrilla and narcotics networks havebec
ome intertwined, as the drug cartels seekprotection from the ins
urgencies and theinsurgencies seek funding from the cartels.Fou
nded in 1964 to be the military branch of theColombian Commu
nist Party, the RevolutionaryArmed Forces of Colombia, FARC,
has nowdiversified into bombing, kidnapping, and drugrunning.
[SPEAKING SPANISH]
In Colombia, there are just some terrorist groups.This image of
guerrillas that's projectedinternationally, it's long out of date.
[SPEAKING SPANISH]
The FARC collect tax from the cattle farmers, thecoffee farmers
, those who grow banana,soybeans, and we also tax the buyers o
f thecoca.
The National Liberation Army, ELN, is the smallerof Columbia'
s two left-
wing insurgents, alsofounded in 1964. It also kidnaps foreign na
tionalsand finances its activities through drugs. A right-
wing militia was formed in 1997 from groupsfrequently targeted
by the guerrillas, economicleaders, drug traffickers, and rural c
ommunities. Italso gets 70% of its income from cocaine.
[SPEAKING SPANISH]
If you have a banana plantation, they won't buythe bananas. If y
ou're a pigsty, they won't buypork. They buy
it from the wholesale dealers, and
they export it. But with the coca, everybody buyscoca--
dealers, guerrillas, paramilitaries,everybody.
Between 1996 and 2003, an average of 3,000people were kidnap
ped in Colombia each year,including journalists, politicians, an
d foreigners.FARC is responsible for most of the kidnappings.In
the year 2000, the US launched Plan Colombiato eradicate coca
ine production, includingmassive aerial spraying of coca fields
and a hugeshift in funding to the military. Alvaro Uribe waselec
ted president in 2002 with pledges to end therebel insurgencies.
If violent groups do not have a governmentcapable to stop them,
they want to negotiate.
2008 saw an unprecedented wave of FARCdesertions. But these
government successescaused FARC to launch Plan Rebirth, pro
mising tostep up their campaign of terror.
The tragedy of the Columbian war is that thegovernment cannot
defeat the guerrillas throughmilitary force, nor can the guerrilla
s overthrow thegovernment by the use of arms. This
is anunwinnable war. And we are condemned, sooneror later, to
sit at the negotiating table.
Terrorism is a political strategy based on violenceand unpredict
ability. Governments may eliminatespecific terrorist groups, but
are powerless tostop new groups forming.
The war on terror will be ongoing until the day thatwe win. The
duration of that, we'll have to see. Wehope it ends tomorrow.
Watch out! Watch out! Let me get a shot.
Today's global terrorist threat requires globalcooperation. The
UN's International Criminal Courtstands ready to prosecute terr
orists. But the UShas refused to ratify its creation on the basis t
hat
it would make American soldiers vulnerable toprosecution for w
ar crimes.
Meanwhile, the war on terror appears to haveradicalized many a
gainst the US. As this al-
Qaedapropaganda video shows, the ranks of thosewilling to und
ertake suicide attacks against the USare not thinning.
[SPEAKING FOREIGN LANGUAGE]
Advantages and Disadvantages
THE UNITED STATES OF AMERICA, HOME TO THREE
HUNDRED MILLION PEOPLE, EACH OF US ASSUMING
THAT IF WE OBEY THE LAWAND MIND OUR OWN
BUSINESS, THERE'S NO REASON FOR ANYONE TO PAY
MUCH ATTENTION TO US. THAT'S WHAT WE MIGHT
THINK, BUT WE WOULD BE WRONG.RECORDS ARE
BEING CREATED OF ACTIVITIES THAT USED TO BE
TOTALLY PRIVATE. THERE ARE A LOT OF
COMPANIESTHAT YOU'VE NEVER HEARD ABOUT, BUT
THEY'VE HEARD SOMETHING ABOUT YOU.DETAILED,
PERSONAL INFORMATION IS BEING COLLECTED EVERY
DAY, AND USED IN WAYS WE COULD NEVER
IMAGINE. MOST AMERICANS ARE IN YOUR DATABASE
SOMEWHERE, RIGHT? ALSO BILLIONS OF
TRANSACTIONS. INTERNET SEARCHES ARE BEING
RECORDED... THEY KEEP EVERYTHING - YOUR
POLITICAL LEANINGS,YOUR RELIGIOUS LEANINGS,
YOUR MEDICAL CONCERNS, YOUR SEXUAL
CONCERNS.DRIVING HABITS ARE BEING
MONITORED...VEHICLE SPEED, ENGINE
SPEED, WHETHER THE BRAKES WERE ON OR
OFF...EMPLOYEES ARE SURVEILLED... HE'S HEADING
BACK TO THE SHOP RIGHT NOW.SHOPPERS ARE
OBSERVED, RECORDED AND ANALYZED... THAT'S AN
ALERT RIGHT THERE. AND PERSONAL PHONE CALLS? I
WAS UNDER THE IMPRESSION THATNOBODY COULD
STEAL MY CELL PHONE RECORDS. AS IT TURNS OUT, I
WAS VERY, VERY WRONG. WE ARE LIVING THROUGH A
REVOLUTION. A SURVEILLANCE REVOLUTION
EMPOWERED BY TECHNOLOGY. LITERALLY WITHIN
FIVE TO SEVEN MINUTES WE'VE IDENTIFIED THE
INDIVIDUAL. IT'S TECHNOLOGY THAT CAN BE PUT TO
GOOD USE
- TO STOP TERRORISTS AND SOLVE CRIMES - BUT IF
INFORMATION FALLS INTO THE WRONG HANDS OR IT'S
JUST PLAIN WRONG, IT CAN RUIN LIVES. I WENT
WITHOUT A JOB FOUR MONTHS. TOUGH FOUR
MONTHS?VERY, VERY DIFFICULT FOR ME. FROM
IMPLANTABLE CHIPS... THEY MAKE A SMALL INCISION
IN YOUR ARM. ...TO DATA MINING COMPANIES... WELL,
HOW SECURE IS THAT DATABASE? ...WE TAKE AN
UNPRECEDENTED LOOK AT THE POWERFUL BUSINESS
OF PERSONAL INFORMATION. WE'RE NOT MINING
THROUGH THE PERSONAL LIVES OF INNOCENT
AMERICANS. THE GOVERNMENT IS NOW WORKING
WITH BIG BUSINESS TO TAKE SURVEILLANCE AND
INFORMATION GATHERING TO LEVELS THAT WERE
ONCE THE STUFF OF SCIENCE FICTION. BIG BROTHER,
IF ALLOWED TO HAPPEN, WILL HAPPEN, AND OUR JOB,
AS A RESPONSIBLE SOCIETY IS TO MAKE SURE THAT
DOES NOT OCCUR. * * IT WAS A HORRIFIC AUTOMOBILE
COLLISION. IT WAS THE BIGGEST TRAGEDY IN THE
STATE OF MICHIGAN
- ENTIRE FAMILIES WIPED OUT. IN MAY 2005, A DRUNK
DRIVER, SPEEDING AND OUT OF CONTROL ON THIS
ROAD IN FARMINGTON HILLS, MICHIGAN, SLAMMED
HIS YUKON, DENALI SUV INTO A CAR CARRYING
JUDITH WEINSTEIN, HER TWELVE YEAR OLD SON,
ALEX, AND NINE YEAR OLD SON, SAM. ALL THREE
WERE KILLED. IT IS MY UNDERSTANDING THIS MATTER
IS GOING TO BE A PLEA. IS THAT CORRECT? FORTY-
NINE YEAR OLD TOM WELLINGER, THE DRIVER OF THE
YUKON, WAS CHARGED WITH THREE COUNTS OF
SECOND DEGREE MURDER. CRUCIAL EVIDENCE USED
AGAINST HIM WAS OBTAINED FROM A DEVICE IN HIS
OWN CAR. A DEVICE THAT WAS TRACKING HIS
DRIVING WITHOUT HIS KNOWLEDGE. IF YOU'VE
BOUGHT A CAR IN THE LAST FEW YEARS, CHANCES
ARE YOU HAVE ONE TOO. IT IS KNOWN AS AN EVENT
DATA RECORDER OR EDR, ALSO REFERRED TO AS A
BLACK BOX. IT CAPTURES WHAT HAPPENS IN AN
AUTOMOBILE IN THESECONDS BEFORE AND AFTER ITS
AIRBAG IS RELEASED. OAKLAND COUNTY PROSECUTOR
KEN FRAZEE SAYS THE DATA RECOVERED FROM THE
BLACK BOX HAS PLAYED A CRUCIAL ROLE IN A
NUMBER OF HIS CASES, INCLUDING THIS ONE. THE
DATA THAT WAS TESTIFIED TO IN COURT
INDICATES THAT THE DEFENDANT WAS TRAVELING
CONSISTENTLY AT APPROXIMATELY 70 MILES AN
HOUR. NOW THIS WAS IN EXCESS OF THE SPEED
LIMIT.THE ENGINE THROTTLE SPEED ALSO SHOWS
THAT THE THROTTLE WAS HEAVILY ENGAGED AND
FOR THE FIVE SECONDS PRIOR TO IMPACT THE BLACK
BOX DEMONSTRATED, IN THIS CASE, THAT THERE WAS
NO ATTEMPT TO BRAKING. IT'S VERY POWERFUL
INFORMATION BECAUSEOF THE FACT THAT IT IS A
SOLID TECHNOLOGY. SANTA BARBARA, CALIFORNIA
BASED VETRONIX SELLS THE TECHNOLOGY THAT
ALLOWS LAW ENFORCEMENT TO DOWNLOAD DATA
FROM A CAR'S BLACK BOX. ANDREW BUNCH IS A
PRODUCT DEVELOPER. A FEW DIFFERENT DATA
PARAMETERS ARE RECORDED. WE HAVE VEHICLE
SPEED, ENGINE SPEED,PERCENT THROTTLE AND BRAKE
SWITCH/DATA SWITCH. IT'S CALLED A BLACK BOX BUT
IT'S NOT BLACK. THIS IS ACTUALLY AN AIR BAG
CONTROL MODULE. ANY VEHICLE THAT HAS AN AIR
BAG SYSTEM IS GOING TO HAVE AN AIR BAG CONTROL
MODULE SYSTEM INSTALLED IN IT.WHETHER OR NOT
IT RECORDS DATA IS, YOU KNOW, YOU CAN STICK A
CHIP IN ANYTHING THESE DAYS TO RECORD THIS
INFORMATION. EXACTLY, SO THAT AFTER
DEPLOYMENT OF THE AIR BAGS, IT WILL ACTUALLY
RECORD SOME OF THE DATA THAT WE SEE HERE. THE
CONDITIONS FOR THESE PLEAS THAT WERE ENTERED
TODAY IS THAT YOU WILL NEVER DRIVE A MOTOR
VEHICLE FOR THE REST OF YOUR LIFE. IS THAT YOUR
UNDERSTANDING? PARTLY BECAUSE OF THE
UNDISPUTED EVIDENCEPROVIDED BY THE BLACK
BOX, WELLINGER PLED NO CONTEST DURING PRE-
TRIAL MOTIONS. HE WILL SERVE A MINIMUM OF 19
YEARS IN JAIL. THERE ARE SOME PEOPLE WHO ARGUE
THAT THIS COULD BE A DEATH SENTENCE FOR YOU IN
VIEW OF YOUR AGE.ARE YOU AWARE OF THAT? IN THE
CASE OF THOMAS WELLINGER, AN ADVANCE IN
TECHNOLOGY WORKED TO PUT A MENACE TO SOCIETY
BEHIND BARS. THAT IS ONE OF THE BENEFITS OF THE
WORLD WE LIVE INWHERE TECHNOLOGY OF ALL TYPES
IS ABLE TO CAPTURE EVIDENCE OF OUR BEHAVIOR -
EVIDENCE THAT CAN BE USED TO FIND AND PUNISH
THOSE GUILTY OF COMMITTING CRIMES. BUT PRIVACY
ADVOCATES WARN THAT WHILE DEVICES SUCH AS THE
BLACK BOX OFFER ADVANTAGES, THEY CAN ALSO
CARRY RISKS. A MINOR TECHNOLOGICAL ADVANCE,
FOR EXAMPLE, COULD ENABLE A BLACK BOX TO
MONITOR YOUR DRIVING ALL THE TIME, ALLOWING
THE POLICE TO ISSUE SPEEDING TICKETS WITHOUT
OFFICERS ACTUALLY BEING PRESENT OR INSURANCE
COMPANIES TO JUDGE YOUR DRIVING HABITS BEFORE
DETERMINING YOUR RATES. GEORGE WASHINGTON
UNIVERSITY LAW PROFESSOR, DANIEL SOLOVE, IS AN
EXPERT ON PRIVACY LAW. I THINK THAT A LOT OF THE
PURPOSES FOR GATHERING INFORMATION ARE QUITE
BENIGN. WHAT'S BAD IS THE FACT THAT THE
PERSON WHOSE INFORMATION IS BEING COLLECTED IS
SO OUT OF THE LOOP IN THIS PROCESS, HAS NO RIGHTS
BECAUSE RIGHT NOW IT'S THE CASE WHERE THEY'LL
GATHER THE INFORMATION FOR ONE PURPOSE, IT'S
GREAT, BUT SECRETLY THEY COULD BE USING IT FOR
ANOTHER PURPOSE. ONE EXAMPLE, THE GLOBAL
POSITIONING SYSTEM. GPS AS IT'S KNOWN IS NOW
USED COMMERCIALLY TO HELP PEOPLE NAVIGATE
THEIR AUTOMOBILES. BUT IT'S NOT HARD TO GO FROM
USE TO ABUSE. CONSIDER THE CASE OF ERIC ODERO. I
DIDN'T KNOW ABOUT IT. THESE GUYS WERE TRACKING
ME. THEY KNEW EVERY STREET I'D BEEN IN LAS
VEGAS. WHERE I'D STAYED, STOPPED, SLEPT. IN
DECEMBER OF 2003, ODERO BOOKED A RENTAL CAR TO
DRIVE ROUND TRIP FROM HIS HOME IN LOS
ANGELES TO LAS VEGAS. WHEN HE RETURNED THE
CAR IN LOS ANGELES, HE RECEIVED A BILL FOR OVER
$1,400; ABOUT $1,200 MORE THAN THE FEE HE'D BEEN
QUOTED. I ASKED WHY AND HE TOLD ME "YOU USED
IT TO GO OUT OF THE STATE OF
CALIFORNIA".UNBEKNOWNST TO ODERO, THE RENTAL
CAR COMPANY IMPOSED AN ADDITIONAL CHARGE FOR
DRIVING OUT OF STATE. AND SOMEHOW THE AGENT
KNEW HE HAD GONE TO LAS VEGAS. I SAID, "HOW DID
YOU KNOW I WENT TO LAS VEGAS?" THEY SAID "WE
KNOW YOU WENT TO LAS VEGAS". THEN I SAID,
"PROVE THAT I WENT TO LAS VEGAS".THE RENTAL CAR
AGENT HANDED ODERO THIS MAP THAT SHOWED HE'D
CROSSED THE CALIFORNIA STATE LINE ON DECEMBER
29TH AT 12:29 PM. THIS GUY FINALLY TOLD ME THERE
WAS A GPS SYSTEM PRE-INSTALLED IN THE
VEHICLE. NO ONE HAD TOLD ME ABOUT THAT. THE GPS
CHIP IN ODERO'S CAR ALLOWED THE RENTAL CAR
COMPANY TO TRACK HIS EVERY MOVE. AS SOON AS
THE CAR TOUCHED NEVADA SOILHE WAS CHARGED A
DOLLAR FOR EVERY MILE DRIVEN FOR THE ENTIRE
TRIP. SO THERE IT WAS, MY PRIVACY WAS ALL
GONE.IN OCTOBER OF 2004, ODERO AND 139
OTHERS TOOK PART IN A CLASS ACTION SUIT
AGAINST ACCELERON CORPORATION, THE OWNER OF
TWO PAYLESS RENTAL CAR FRANCHISES IN SAN
FRANCISCO. THE SUIT ALLEGED THAT CUSTOMERS
WERE UNAWARE THE COMPANY WAS USING GPS
TECHNOLOGY TO TRACK THEIR DRIVING AND WERE
SURPRISED BY THE PENALTIES TO DRIVE OUT OF
STATE. THE LAWSUIT WAS SETTLED. ODERO AND THE
OTHERS WERE REFUNDED THE ADDITIONAL FEES
CHARGED FOR DRIVING OUTSIDE CALIFORNIA. IT'S NOT
JUST DEVICES IN CARS THAT ARE TRACKING PEOPLES'
BEHAVIOR. A LOT OF DEVICES THAT PEOPLE ARE
USING - EVERYDAY DEVICES LIKE PRINTERS AND
COMPUTERS AND CELL PHONES - ARE INCLUDING SOME
KIND OFTRACKING INFORMATION. LIKE THAT COLOR
LASER PRINTER YOU HAVE AT HOME OR THE
OFFICE; EVERY PAGE PRINTED BY MOST COLOR LASER
PRINTERS IS EMBEDDED WITH A CODE UNIQUE TO
THAT PRINTER.YEP, YOUR COLOR LASER
PRINTER COULD BE SPYING ON YOU. SETH SCHOEN IS A
PRIVACY ADVOCATE WITH THE ELECTRONIC FRONTIER
FOUNDATION. HIS WORK HAS LED TO THE CRACKING
OF THOSE CODES.MY UNDERSTANDING IS THAT THIS
WAS MOTIVATED BY A REQUEST FROM THE UNITED
STATES SECRET SERVICE WHICH INVESTIGATES
COUNTERFEIT AND THATTHEY ASKED THE
MANUFACTURERS OFCOLOR LASER PRINTERS TO DO
THIS, TO ADD THIS TRACKING CAPABILITY AND, BY
AND LARGE, THE MANUFACTURERS COMPLIED. MOST
OF THEM DIDN'T TELL THEIR CUSTOMERS THAT THEY
WERE DOING SO. THE CODE, A SERIES OF YELLOW
DOTS DISTRIBUTED ACROSS THE BACK OF THE
PRINTED PAGE IS NOT VISIBLE TO THE NAKED
EYE. WHEN YOU SHINE A BLUE LIGHT AND LOOK
UNDER A MICROSCOPE, I THINK IT'S QUITE DISTINCT. IT
IS. SO FAR WE'VE BEEN ABLE TO CRACK THE CODE
THAT'S USED BY XEROX AND A FEW OTHER
MANUFACTURERS LIKE DELL. SO WE CAN TELL YOU
WHAT THOSE MEAN. THERE ARE OTHERS LIKE HP AND
CANON THAT ARE STILL A MYSTERY TO US. IN THE
CASE OF DELL AND XEROX, WHAT IS IT THAT THESE
DOTS ARE COMMUNICATING? WELL, THEY'RE
COMMUNICATING THE SERIALNUMBER OF THE PRINTER
THAT MADE THE PRINT. AND THEY'RE ALSO
COMMUNICATING, IN THE CASE OF THE XEROX
PRINTERS WHICH HAVE THIS INFORMATION, THE DATE
AND TIME THAT THE PRINT WAS MADE. FROM THERE
IT'S NOT HARD TO FIND OUT WHO PRINTED THE
DOCUMENT. AND IT'S NOT JUST YOUR PRINTER. THAT
DIGITAL CAMERA YOU'RE SO FOND OF...? THIS IS A
PHOTOGRAPH OF METHAT WAS TAKEN AS A STAFF
PHOTO. IF WE LOOK AT IT WITH THE RIGHT
SOFTWARE,ALL OF A SUDDEN WE SEE A LOT MORE
INFORMATION. SO HERE'S THE INTERESTING
THING. RIGHT THERE IS THE UNIQUE SERIAL
NUMBER OF MY FRIEND'S CAMERA. IF HE'S REGISTERED
FOR A WARRANTY THEN THEY KNOW WHO HE IS, AND
IT'S EASY TO FIND BECAUSE HE PUBLISHES HIS PHOTOS
ON A PHOTOSHARING WEBSITE UNDER HIS OWN NAME
SO YOU COULD IMMEDIATELY FIND OUT THAT THAT'S
HIS CAMERA. BURN ANY CD'S LATELY? ANOTHER ONE
THE PUBLIC IS NOT REALLY AWARE OF, WHEN YOU
BURN A CD IN A CD BURNER, THE CD BURNER'S SERIAL
NUMBER IS ACTUALLY LEFT ON THE CD. SO IF YOU
MAKE A MIXED CD FOR SOMEONE OR YOU BURN ANY
KIND OF INFORMATIONONTO A CD AND GIVE IT OUT TO
SOMEONE,IT'S POTENTIALLY TRACEABLE BACK TO
YOUR COMPUTER. ALL OF THIS MAY SEEM
INNOCUOUS, BUT IN TIME IT MAY NOT BE. I THINK
PEOPLE ARE PERFECTLY HAPPY TO ADOPT A
COMMUNICATIONS DEVICE THAT IS IN SOME
WAY TRACEABLE OR TRACKABLE BECAUSE THEY
THINK, WELL, I DON'T HAVE ANYTHING TO HIDE AND I
DON'T USE IT IN A WAY THAT SOMEONE COULD
TRACK, AND THEN LO AND BEHOLD, TECHNOLOGY
ADVANCES. THEY SIGN UP FOR ALL KINDS OF
SERVICES AND THEY'RE USING THAT TECHNOLOGY IN
A WAY IN WHICH THINGS ARE EXPOSED AND THINGS
ARE TRACKABLETHAT THEY HADN'T
ANTICIPATED. JUAN IS OUT ON THE ROAD RIGHT NOW,
SO I CAN SEE HERE, AS OF 3:40 PM, HE'S IN FRONT OF
893 LAFAYETTE. HOWARD BOYLE, THE PRESIDENT OF
THIS RATHER LOW-TECH LOOKING FIRE SPRINKLER
INSTALLATIONCOMPANY IN QUEENS, NEW YORK,
KNOWS EXACTLY WHERE HIS EMPLOYEES ARE DURING
THE WORK DAY. THEIR CELL PHONES, LIKE MANY
WIRELESS DEVICES,CONTAIN A GPS CHIP WHICH
ALLOWS BOYLE TO USE A SOFTWARE PROGRAM
CALLED ULOCATE, THAT DOES JUST WHAT ITS NAME
IMPLIES. HE'S DOING ELEVEN MILES AN HOUR. I COULD
GO AND SEE WHERE HE IS IN TRANSIT. HE'S HEADING
DOWN THAT ROAD BACK TO THE SHOP. THIS IS
EXACTLY WHERE HE IS RIGHT NOW. WHERE HAS HE
BEEN? HE WAS AT A JOB SITE THAT I TOLD HIM TO GO
TO WHICH WAS 866 EASTLAND PARKWAY. HE WAS ON
THAT JOB SITE FROM 2:44 PM TO 3:30. OKAY, YOU'RE
GOING TO CHECK THE FIRE PUMP, RIGHT? BOYLE SAYS
HE'S NEVER TOLD HIS EMPLOYEES THEY'RE BEING
TRACKED BUT HE SUSPECTS THEY KNOW SINCE BOYLE
HAS AN UNCANNY ABILITY TO KNOW EXACTLY WHERE
THEY ARE OR WHERE THEY'VE BEEN. BOYLE'S
SOFTWARE CAN TELL HIM THE MINUTE BY
MINUTE WHEREABOUTS OF ANY EMPLOYEE FOR
MONTHS BACK. DID YOU THINK ABOUT TELLING THE
GUYS? IF I THOUGHT IT WAS A PRIVACY ISSUE I MIGHT
HAVE. IT'S NOT A PRIVACY ISSUE. THEY'RE ON THE
CLOCK, THEY'RE BEING PAID TO BE IN PLACES THEY'RE
SUPPOSED TO BE. THEY HAVE A ROUTE. THIS WAS JUST
A SIMPLER WAY OF BEING ABLE TO KNOW THAT THEY
ARE BASICALLY DOING WHAT THEY'RESUPPOSED TO
DO, AND HAVE THE CONFIDENCE THAT WE'RE NOT
CHEATING OUR CUSTOMERS. MANY OTHER BUSINESSES
THAT EMPLOY MOBILE WORK FORCES
- BE THEY ROTO-ROOTER OR TV STATIONS LIKE
WABC IN NEW YORK - USE TECHNOLOGY TO TRACK
THEIR EMPLOYEES. JIM JOYCE IS THE VICE-PRESIDENT
OF THE NATIONAL ASSOCIATION OF BROADCAST
EMPLOYEES AND TECHNICIANS. HE SAYS WHEN WABC
INSTALLED GPS DEVICES IN NEWS TRUCKS, UNION
MEMBERS WERE RATTLED. WE WERE CONCERNED
ABOUT PRIVACY ISSUES AND HOW THIS INFORMATION
MIGHT BE USED TO MONITOR THE EMPLOYEES IN A BIG
BROTHER SITUATION; THAT THEY WOULDUSE THE
DEVICE TO MONITOR AND CRITICIZE THE ROUTES THAT
OUR ENG DRIVERS TOOK TO GET TO STORIES, HOW
LONG IT TOOK TO GET BETWEEN ASSIGNMENTS, THE
FREQUENCY AND DURATION OF PERSONAL BREAKS. IT
ISN'T JUST AT WORK. IF YOUR PERSONAL CELL PHONE
IS ON, EVEN IF IT DOESN'T HAVE A GPS CHIP, YOU CAN
BE TRACKED. KEVIN BANKSTON IS AN ATTORNEY FOR
THEELECTRONIC FRONTIER FOUNDATION, A NON-
PROFIT THAT DEFENDS CIVIL LIBERTIES FROM THE
ENCROACHMENT OF TECHNOLOGY. MANY PEOPLE
DON'T REALIZE THAT WHENEVER YOUR CELL PHONE IS
ON, THE CELL PHONE COMPANY IS RECEIVING
INFORMATION ABOUT YOUR LOCATION. IN MANY
CASES QUITE DETAILED INFORMATION. NOT ONLY CAN
THEY TRACK YOU IN REAL TIME USING THIS
INFORMATION, THEY ARE ALSO STORING ALL
THAT INFORMATION ABOUT WHERE YOU HAVE BEEN
WHEN YOUR CELL PHONE IS TURNED ON -
INFORMATION THAT THEGOVERNMENT OR EVEN
PRIVATE LITIGANTS COULD GET AT. YOU CAN, OF
COURSE, TURN YOUR CELL PHONE OFF OR EVEN
CHOOSE NOT TO HAVE ONE. BUT IT IS GETTING
HARDER AND HARDER TO VENTURE OUT IN PUBLIC
WITHOUT BEING WATCHED. PRACTICALLY
EVERYTHING YOU DO IN PUBLIC IS BEING RECORDED
SOMEWHERE OR IN SOME FASHION. AND THE COURTS
HAVE LONG HELD THAT WHEN YOU'RE IN PUBLIC YOU
DON'T HAVE ANY EXPECTATION OF PRIVACY. THIS IS
OUR BACK DINING ROOM, WE HAVE TWO CAMERAS AT
OPPOSITE CORNERS. AND I CAN PRETTY MUCH SEE
THAT MOST OF THE GUESTS THERE LOOK
CONTENT. STEPHEN LOFFREDO IS THE OWNER OF
JOVIA, A HIGH END RESTAURANT ON MANHATTAN'S
UPPER EAST SIDE. THE ELEVEN CAMERAS PLACED
STRATEGICALLY THROUGHOUT JOVIA LET HIM
CONSTANTLY MONITOR HIS STAFF AND CUSTOMERS
EVEN WHEN HE'S NOT THERE. I HAVE THIS SAME
SOFTWARE LOADED ON MY PERSONAL NOTEBOOK
COMPUTER SO I CAN PRETTY MUCH WATCH WHAT'S
GOING ON HERE FROM ANYWHERE. IF I'M ON
VACATION, IF I'M AWAY ON BUSINESS, I CAN REALLY
SEE WHAT'S HAPPENING. WHERE ARE YOUR EYES
DRAWN TO? I COULD SEE IF A GUEST HAD TO FLAG
DOWN A WAITER OR IF THEY LOOKED ANXIOUS. I CAN
ALSO LOOK IN THE LOUNGE AREA AND I CAN TELLHOW
BUSY OUR MAITRE D'S DESK IS GETTING BY HOW
PEOPLE ARE COMING INTO THE RESTAURANT. THE
EMPLOYEES ARE AWARE THEY'RE BEING
SURVEILLED.SOMEBODY'S GOT TO PREP THE TABLE
BEFOREHAND. THE DELIVERY OF THIS DISH ON 13 WAS
LIKE A DISASTER. I'LL NEVER GO TO AN EMPLOYEE
AND SAY I SAW YOU DO THIS ON CAMERA; IT WASN'T
THE RIGHT THING TO DO. WHAT WE'LL DO IS WE'LL
TALK IN A GENERAL TERM WITH OUR STAFF AND
DISCUSS WITH THEM WAYS THAT THEY CAN IMPROVE
THE JOVIA EXPERIENCE. STEVE, WHAT ABOUT
CUSTOMERS, DO THEY KNOW THEY'RE ON
CAMERA? IT'S BECOME MORE COMMON THAT THERE
ARE CAMERAS IN RESTAURANTS. I THINK WHEN THEY
SEE THE LITTLE BLACK BALL ON THE CEILING THEY
EXPECT THAT THERE ARE CAMERAS. IN THE MODERN
RESTAURANT BUSINESS IT ISN'T JUST CAMERAS THAT
ARE KEEPING TRACK OF CUSTOMERS. ANYBODY WHO
CALLS TO MAKE A RESERVATION, WE'LL START OFF
WITH THEIR FIRST AND LAST NAME AND THEIR PHONE
NUMBER. IF I DOUBLE CLICK ON THAT I CAN SEE
INFORMATION
What is biometrics?
OUR IDENTITIES ARE CHANGING. THEY ARE BEING
TRANSFORMED BY IDENTIFICATION SYSTEMS THAT
RECOGNIZE PHYSICAL FEATURES. DATE AND PLACE OF
BIRTH AND PARENTS' NAMES ARE OUT. INCREASINGLY
WE ARE IDENTIFIED BY BIOMETRICS -- BY HAND
SHAPE, FINGERPRINTS, THE IRIS OF YOUR EYE. AS
LONG AS AGO AS THE 19TH CENTURY THE
FRENCH DETECTIVE ALPHONSE BERTILLON
PIONEEREDIDENTIFICATION BY DISTINGUISHING
FEATURES. HIS SYSTEM MEASURED LIMBS AND SKULLS
AND RECORDED PERSONAL MARKS SUCH AS SCARS
AND TATTOOS.BERTILLON COMPILED A MASSIVE
DATABASE OF ALL KNOWN CRIMINALS AND OF
ILLEGAL IMMIGRANTS LISTED FOR DEPORTATION.THE
DATABASE ALSO MADE IT EASY TO
IDENTIFY REOFFENDERS. PREVIOUSLY LIMITED TO
IDENTIFYING CRIMINALS,BIOMETRICS CAN NOW BE
USED ON ALL CROSS BORDER TRAVELERS. HERE FOR
INSTANCE. THE UNITED ARAB EMIRATES HAS THE
WORLD'S BIGGEST IRIS RECOGNITION SYSTEM. SINCE
2003 ANYONE WANTING TO ENTER THE UNITED
ARAB EMIRATES HAS HAD TO PRESENT ONE EYE
TO THE CAMERA.MANY OF THOSE WHO DO ARE
GUESTWORKERS. PLEASE LOOK INTO THE
MIRROR. THANK YOU FOR YOUR
COOPERATION. PLEASE LOOK INTO THE
MIRROR. THANK YOU FOR YOUR
COOPERATION. PLEASE LOOK INTO THE
MIRROR. PLEASE LOOK INTO THE MIRROR.I'M THE
INVENTOR OF THE TECHNOLOGY. I CREATED THE
ALGORITHMS WHICH ARE THE
MATHEMATICAL INSTRUCTIONS USED BY COMPUTERS
TO PERFORM IRIS RECOGNITION. IT IS A BIT
MYSTERIOUS WHY EACH IRIS IS SO UNIQUE AND
DIFFERENT.THERE'S RANDOM STRUCTURE IN THE
IRIS.RANDOM TEXTURE, WHICH IS VERY
COMPLICATED, VERY COMPLEX COMPARED TO ANY
OTHER PART OF THE BODY. AND IT'S THIS UNIQUE
RANDOM TEXTURE OF HIGH COMPLEXITY THAT MAKES
IT SUCH A RELIABLE AND ACCURATE SIGNATURE OR
FINGERPRINT. IT'S NOT NECESSARILY THE EASIEST
BIOMETRIC TO ACQUIRE, BECAUSE IT'S A SMALL
TARGET. IT MOVES AROUND. IT LIVES BEHIND A SHINY
SURFACE, THE CORNEA. SO IT MAY NOT BE THE
EASIEST ONE TO ACQUIRE, BUT IF YOU CAN ACQUIRE
THE IRIS IMAGE THE RELIABILITY AND THE ACCURACY
OF IRIS RECOGNITION HAS NOCOMPETITOR, NO
RIVAL. PROF. JOHN DAUGMAN: CURRENT PROGRESS
THAT ISUNDER DEVELOPMENT HAS TO DO WITH
IMPROVING THE IMAGE CAPTURE PROCESS, THE IMAGE
ACQUISITION. TO MAKE IT FASTER, TO MAKE IT WORK
AT A GREATERDISTANCE, AND TO MAKE IT
SMOOTHER.CURRENTLY IRIS CAMERAS REQUIRE WHAT
WE CALL STOP AND STARE. YOU MUST STOP AND
STARE AT THE CAMERA. THAT'S NOT SO FLUID. THAT'S
NOT SO SMOOTH AS IT MIGHT BE. SO MANY CAMERA
DEVELOPERS TODAY ARE DOING RESEARCH ON
INCREASING THE DISTANCE AND THE SPEED OF
THE IRIS RECOGNITION. THERE'S EVEN ONE PROJECT
CALLED "IRIS ON THE MOVE" IN WHICH A PERSON
WALKS PAST A CAMERA, EVEN FROM A DISTANCE OF 3
METERS AND WALKS AT A SPEED OF 1 METER PER
SECOND. THIS IS A NEW CAMERA TECHNOLOGY
DEVELOPED BY SARNOFF LABORATORIES IN NEW
JERSEY IN AMERICA.IRIS ON THE MOVE. THEN IRIS
REALLY IS A FLUID NATURAL INTUITIVE. IT'S JUST
LIKE MINORITY REPORT . I THINK THAT IN THE FUTURE
IDENTITY AND BIOMETRICS WILL BE VERY CLOSE
TOGETHER, CLOSELY LINKEDIN ORDINARY EVERYDAY
TRANSACTIONS.AND I THINK WE WILL HAVE A TIME IN
THE FUTURE WHEN WE DON'T RELY ON SECRETS OR ON
OBJECTS FOR IDENTIFICATION, AS WE DO TODAY. PIN
NUMBERS. PASSWORDS. PASSPORTS. CARDS.
KEYS. THOSE ARE SECRETS OR OBJECTS. INSTEAD
WE'LL USE PARTS OF OUR BODY FOR OUR
AUTOMATICIDENTIFICATION. I'M SURE THIS IS PART OF
THE FUTURE. THE SEPTEMBER 11TH TERRORIST
ATTACKS, FOLLOWED BY THE BOMBINGS IN MADRID
AND LONDON HAVEPUSHED GOVERNMENTS TO
DEVELOP BIOMETRIC CONTROLS. THE MARKET FOR
THEM IS NOW GLOBAL. BIOMETRICS COMPANIES ARE
WELL AWARE THAT ONE OF THE BIGGEST SELLING
POINTS IS THE FEAR OF TERRORISM. THE FRENCH
COMPANY SAGEM, BETTER KNOWN FOR ITS GUIDED
MISSILE SYSTEMS, FIGHTER AIRCRAFT ANDATTACK
HELICOPTERS, HAS BECOME A WORLD LEADER
IN FINGERPRINT RECOGNITION. THANKS TO DOZENS OF
KITS SUCH AS THIS ONE, THE MAURITANIAN
GOVERNMENT WAS ABLE TO ISSUE A
NATIONAL IDENTITY CARD IN 1999. ONE OF THE
GOVERNMENT'S AIMS WAS TO REGISTER THE DESERT
NOMADS AND GIVE THEM THE RIGHTS OF
CITIZENS. BUT IT WAS ALSO A WAY OF GAINING
CONTROL OVER THEM. ONE SPECIALIST IN BIOMETRIC
FACIAL RECOGNITION IS XID TECHNOLOGIES. ITS
FOUNDER ROBERTO MARIANI BEGAN
IN COMPUTERIZED MAPPING. BUT HE FOUND A NEW
NICHE IN SINGAPORE. THIS DORMITORY IN THE
SINGAPORE SUBURB HOUSES OVER 6,000 MIGRANT
WORKERS. ACCESS GRANTED.ACCESS GRANTED. WHY
ARE COMPANIES INTERESTED IN
BIOMETRICIDENTIFICATION? FOR THEM IT'S NOT SO
MUCH TO CONTROL ACCESS AS TO CHECK ON
PUNCTUALITY AND HOURS WORKED. IN THIS MEDIUM
SIZED COMPANY FACIAL RECOGNITION IS USED AS A
TIMECLOCK.CULTURE INFLUENCES WHICH BIOMETRIC
TECHNIQUES ARE ADOPTED IN DIFFERENT PARTS OF
THE WORLD. IN ASIA PEOPLE DON'T LIKE TOUCHING A
FINGERPRINTSENSOR THAT SOMEBODY ELSE HAS
ALREADY TOUCHED. IDENTIFICATION MUST NOT
INVOLVE CONTACT. THE ANSWER LIES BENEATH THE
SKIN. BEYOND PERMANENT PHYSICAL
CHARACTERISTICS SUCH AS VEINS, FINGERPRINTS OR
IRISES,BIOMETRICS ALSO USES BODILY
MOVEMENT. THE IDEA BEING THAT OUR MOVEMENTS
REVEAL OUR IDENTITY. THE SIGNATURES ARE
DIFFERENT. YOU ARE NO LONGER
RECOGNIZED. BIOMETRICS IS NOW TRYING TO ENCODE
EVERY MOVEMENT OF A HUMAN BODY TO USE FOR
REMOTEIDENTIFICATION. NO MORE SIGNALING TO A
SYSTEM, OUR IDENTITIES CAN BE CHECKED WITHOUT
OUR EVEN KNOWING IT. THIS IS A BIOMETRICS
RESEARCH LABORATORY. AND IN THE LABORATORY,
IT'S DESIGNED SO WE CAN RECOGNIZE YOU BY YOUR
PERSONALCHARACTERISTICS. THE CHARACTERISTICS
WE'RE CONCERNED WITH RECOGNIZING IS
RECOGNIZING YOU BY THE WAY YOU WALK.SO YOU
WALK THROUGH THIS TUNNEL AND WE
RECOGNIZE YOU FROM THE PATTERN OF YOUR
WALKING MOVEMENT. BUT IT'S ALSO TO RECOGNIZE
ME BY MY FACE AND TO RECOGNIZE ME BY MY
EAR. NOW WE DO THIS BY COMPUTER VISION, WHICH
MEANS WE HAVE A LOT OF CAMERAS. THERE IS A FACE
RECOGNITION CAMERA WHICH IS BEHIND ME
HERE. AND THERE ARE FOUR CAMERAS IN THE FOUR
CORNERS. AND THEY'RE THEN RECONSTRUCTING ME
AS IWALK THROUGH THE TUNNEL TO RECOGNIZE ME
FROM THE WAY I WALK. AND YOU MIGHT SAY "WELL
WHAT IS THIS FOR?"WELL IT'S LIKE A GATE. IT'S A
BIOMETRICS GATE WHICH CAN PREVENT OR CONTROL
ACCESS TO A BUILDING. SO WE DO A PROCESS. WE
SEPARATE THE SILHOUETTE.WE DO HERE. WE
SEPARATE THE MOVING SILHOUETTE FROM
THE BACKGROUND INFORMATION. AND THEN WE END
UP WITH THE WALKING HUMAN SILHOUETTE. HUMAN
MOTION IS PERIODIC AND AT THE SYMMETRY;
YOU HAVE AN AXIS OF SYMMETRY DOWN YOUR BODY
AND YOUHAVE AN AXIS OF SYMMETRY DOWN YOUR
LEGS. BUT WHEN YOU'RE WALKING, YOU ALSO HAVE
AN AXIS OF SYMMETRY BETWEEN THE LEGS AS
WELL. AND WE THEN APPLY SOME MORE MASS TO THE
SYMMETRY MEASURES WE OBTAIN AND EXTRA
MATHEMATICS COMES OUT WITH A SET OF
NUMBERS. AND WE CAN SHOW THAT THAT SET OF
NUMBERS IS THE SAME FOR ONE PERSON AND
DIFFERENT FORDIFFERENT PEOPLE. IN THAT SENSE WE
CAN THEN RECOGNIZE YOU BY THE WAY YOU
WALK. GERARD DUBEY IS AN ANTHROPOLOGIST. HE
LED A STUDY ON THE USE OF BIOMETRICS IN
SCHOOLCANTEENS, AIRPORTS AND VISA OFFICES. IS
BIOMETRICS AS RELIABLE AS ITSSUPPORTERS
CLAIM? THE HACKERS OF BERLIN'S CHAOS COMPUTER
CLUB SAY IT IS EASY TO MANIPULATE BIOMETRIC
DATA.YOU CAN CHANGE YOUR KEY OR YOUR PIN
NUMBER, BUT IF YOUR BIOMETRIC DATA ARE STOLEN,
YOU CAN'T GET A NEW EYE OR A NEW HAND. YET THE
INDUSTRY CLAIMS ITS HACKER PROOF AND
IT'S LAUNCHING MORE AND MORE SYSTEMS. CNIL IS
THE FRENCH DATA PROTECTION AUTHORITY. ONE OF A
FEW ORGANIZATIONS IN THE WORLD TO
MONITOR POTENTIAL ABUSE OF
BIOMETRICS. BERTILLON SIMPLY WANTED TO RECORD
THE DETAILS OF CRIMINALS.TODAY BIOMETRICS IS
USED IN FRENCH PRISONS AS WELL. ST.ETIENNE
PRISON STORES NO LESS THAN 80
HANDMEASUREMENTS ON A CARD. WHEN A PRISONER
IS RELEASED HIS BIOMETRICDATA ARE DELETED. FOR
THE BIOMETRICS INDUSTRY THE BEST IS YET TO
COME. FOR THE REST OF US, OUR VERY BODIES ARE
BEING TRANSFORMED INTO DIGITAL INFORMATION. WE
ARE NO LONGER IDENTIFIED SOCIALLY THROUGH OUR
FAMILY BACKGROUND OR BELONGING TO A
GROUP. ALL THAT IS GONE IN FAVOR OF A NEW
DIGITAL IDENTITY, ONE THAT IS MEASURABLE AT ANY
MOMENT.

More Related Content

More from mattinsonjanel

The chart is a guide rather than an absolute – feel free to modify.docx
The chart is a guide rather than an absolute – feel free to modify.docxThe chart is a guide rather than an absolute – feel free to modify.docx
The chart is a guide rather than an absolute – feel free to modify.docxmattinsonjanel
 
The Challenge of Choosing FoodFor this forum, please read http.docx
The Challenge of Choosing FoodFor this forum, please read http.docxThe Challenge of Choosing FoodFor this forum, please read http.docx
The Challenge of Choosing FoodFor this forum, please read http.docxmattinsonjanel
 
The Civil Rights Movem.docx
The Civil Rights Movem.docxThe Civil Rights Movem.docx
The Civil Rights Movem.docxmattinsonjanel
 
The Churchill CentreReturn to Full GraphicsThe Churchi.docx
The Churchill CentreReturn to Full GraphicsThe Churchi.docxThe Churchill CentreReturn to Full GraphicsThe Churchi.docx
The Churchill CentreReturn to Full GraphicsThe Churchi.docxmattinsonjanel
 
The Categorical Imperative (selections taken from The Foundati.docx
The Categorical Imperative (selections taken from The Foundati.docxThe Categorical Imperative (selections taken from The Foundati.docx
The Categorical Imperative (selections taken from The Foundati.docxmattinsonjanel
 
The cave represents how we are trained to think, fell or act accor.docx
The cave represents how we are trained to think, fell or act accor.docxThe cave represents how we are trained to think, fell or act accor.docx
The cave represents how we are trained to think, fell or act accor.docxmattinsonjanel
 
The Case Superior Foods Corporation Faces a ChallengeOn his way.docx
The Case Superior Foods Corporation Faces a ChallengeOn his way.docxThe Case Superior Foods Corporation Faces a ChallengeOn his way.docx
The Case Superior Foods Corporation Faces a ChallengeOn his way.docxmattinsonjanel
 
The Case You can choose to discuss relativism in view of one .docx
The Case You can choose to discuss relativism in view of one .docxThe Case You can choose to discuss relativism in view of one .docx
The Case You can choose to discuss relativism in view of one .docxmattinsonjanel
 
The Case Study of Jim, Week Six The body or text (i.e., not rest.docx
The Case Study of Jim, Week Six The body or text (i.e., not rest.docxThe Case Study of Jim, Week Six The body or text (i.e., not rest.docx
The Case Study of Jim, Week Six The body or text (i.e., not rest.docxmattinsonjanel
 
The Case of Missing Boots Made in ItalyYou can lead a shipper to.docx
The Case of Missing Boots Made in ItalyYou can lead a shipper to.docxThe Case of Missing Boots Made in ItalyYou can lead a shipper to.docx
The Case of Missing Boots Made in ItalyYou can lead a shipper to.docxmattinsonjanel
 
The Cardiovascular SystemNSCI281 Version 51University of .docx
The Cardiovascular SystemNSCI281 Version 51University of .docxThe Cardiovascular SystemNSCI281 Version 51University of .docx
The Cardiovascular SystemNSCI281 Version 51University of .docxmattinsonjanel
 
The Cardiovascular SystemNSCI281 Version 55University of .docx
The Cardiovascular SystemNSCI281 Version 55University of .docxThe Cardiovascular SystemNSCI281 Version 55University of .docx
The Cardiovascular SystemNSCI281 Version 55University of .docxmattinsonjanel
 
The Case of Jeff Pedophile in InstitutionJeff is a 35-year-old .docx
The Case of Jeff Pedophile in InstitutionJeff is a 35-year-old .docxThe Case of Jeff Pedophile in InstitutionJeff is a 35-year-old .docx
The Case of Jeff Pedophile in InstitutionJeff is a 35-year-old .docxmattinsonjanel
 
The British Airways Swipe Card Debacle case study;On Friday, Jul.docx
The British Airways Swipe Card Debacle case study;On Friday, Jul.docxThe British Airways Swipe Card Debacle case study;On Friday, Jul.docx
The British Airways Swipe Card Debacle case study;On Friday, Jul.docxmattinsonjanel
 
The Case Abstract Accuracy International (AI) is a s.docx
The Case  Abstract  Accuracy International (AI) is a s.docxThe Case  Abstract  Accuracy International (AI) is a s.docx
The Case Abstract Accuracy International (AI) is a s.docxmattinsonjanel
 
The Case for TortureIt is generally assumed that torture is im.docx
The Case for TortureIt is generally assumed that torture is im.docxThe Case for TortureIt is generally assumed that torture is im.docx
The Case for TortureIt is generally assumed that torture is im.docxmattinsonjanel
 
The case against banning the word retard”By Christopher M. Fa.docx
The case against banning the word retard”By Christopher M. Fa.docxThe case against banning the word retard”By Christopher M. Fa.docx
The case against banning the word retard”By Christopher M. Fa.docxmattinsonjanel
 
The Campaign for College OpportunityHigher education is facing.docx
The Campaign for College OpportunityHigher education is facing.docxThe Campaign for College OpportunityHigher education is facing.docx
The Campaign for College OpportunityHigher education is facing.docxmattinsonjanel
 
The Catholic University of America School of Engineering .docx
The Catholic University of America School of Engineering .docxThe Catholic University of America School of Engineering .docx
The Catholic University of America School of Engineering .docxmattinsonjanel
 
The Business Case for Asserting the Business Casefor Busines.docx
The Business Case for Asserting the Business Casefor Busines.docxThe Business Case for Asserting the Business Casefor Busines.docx
The Business Case for Asserting the Business Casefor Busines.docxmattinsonjanel
 

More from mattinsonjanel (20)

The chart is a guide rather than an absolute – feel free to modify.docx
The chart is a guide rather than an absolute – feel free to modify.docxThe chart is a guide rather than an absolute – feel free to modify.docx
The chart is a guide rather than an absolute – feel free to modify.docx
 
The Challenge of Choosing FoodFor this forum, please read http.docx
The Challenge of Choosing FoodFor this forum, please read http.docxThe Challenge of Choosing FoodFor this forum, please read http.docx
The Challenge of Choosing FoodFor this forum, please read http.docx
 
The Civil Rights Movem.docx
The Civil Rights Movem.docxThe Civil Rights Movem.docx
The Civil Rights Movem.docx
 
The Churchill CentreReturn to Full GraphicsThe Churchi.docx
The Churchill CentreReturn to Full GraphicsThe Churchi.docxThe Churchill CentreReturn to Full GraphicsThe Churchi.docx
The Churchill CentreReturn to Full GraphicsThe Churchi.docx
 
The Categorical Imperative (selections taken from The Foundati.docx
The Categorical Imperative (selections taken from The Foundati.docxThe Categorical Imperative (selections taken from The Foundati.docx
The Categorical Imperative (selections taken from The Foundati.docx
 
The cave represents how we are trained to think, fell or act accor.docx
The cave represents how we are trained to think, fell or act accor.docxThe cave represents how we are trained to think, fell or act accor.docx
The cave represents how we are trained to think, fell or act accor.docx
 
The Case Superior Foods Corporation Faces a ChallengeOn his way.docx
The Case Superior Foods Corporation Faces a ChallengeOn his way.docxThe Case Superior Foods Corporation Faces a ChallengeOn his way.docx
The Case Superior Foods Corporation Faces a ChallengeOn his way.docx
 
The Case You can choose to discuss relativism in view of one .docx
The Case You can choose to discuss relativism in view of one .docxThe Case You can choose to discuss relativism in view of one .docx
The Case You can choose to discuss relativism in view of one .docx
 
The Case Study of Jim, Week Six The body or text (i.e., not rest.docx
The Case Study of Jim, Week Six The body or text (i.e., not rest.docxThe Case Study of Jim, Week Six The body or text (i.e., not rest.docx
The Case Study of Jim, Week Six The body or text (i.e., not rest.docx
 
The Case of Missing Boots Made in ItalyYou can lead a shipper to.docx
The Case of Missing Boots Made in ItalyYou can lead a shipper to.docxThe Case of Missing Boots Made in ItalyYou can lead a shipper to.docx
The Case of Missing Boots Made in ItalyYou can lead a shipper to.docx
 
The Cardiovascular SystemNSCI281 Version 51University of .docx
The Cardiovascular SystemNSCI281 Version 51University of .docxThe Cardiovascular SystemNSCI281 Version 51University of .docx
The Cardiovascular SystemNSCI281 Version 51University of .docx
 
The Cardiovascular SystemNSCI281 Version 55University of .docx
The Cardiovascular SystemNSCI281 Version 55University of .docxThe Cardiovascular SystemNSCI281 Version 55University of .docx
The Cardiovascular SystemNSCI281 Version 55University of .docx
 
The Case of Jeff Pedophile in InstitutionJeff is a 35-year-old .docx
The Case of Jeff Pedophile in InstitutionJeff is a 35-year-old .docxThe Case of Jeff Pedophile in InstitutionJeff is a 35-year-old .docx
The Case of Jeff Pedophile in InstitutionJeff is a 35-year-old .docx
 
The British Airways Swipe Card Debacle case study;On Friday, Jul.docx
The British Airways Swipe Card Debacle case study;On Friday, Jul.docxThe British Airways Swipe Card Debacle case study;On Friday, Jul.docx
The British Airways Swipe Card Debacle case study;On Friday, Jul.docx
 
The Case Abstract Accuracy International (AI) is a s.docx
The Case  Abstract  Accuracy International (AI) is a s.docxThe Case  Abstract  Accuracy International (AI) is a s.docx
The Case Abstract Accuracy International (AI) is a s.docx
 
The Case for TortureIt is generally assumed that torture is im.docx
The Case for TortureIt is generally assumed that torture is im.docxThe Case for TortureIt is generally assumed that torture is im.docx
The Case for TortureIt is generally assumed that torture is im.docx
 
The case against banning the word retard”By Christopher M. Fa.docx
The case against banning the word retard”By Christopher M. Fa.docxThe case against banning the word retard”By Christopher M. Fa.docx
The case against banning the word retard”By Christopher M. Fa.docx
 
The Campaign for College OpportunityHigher education is facing.docx
The Campaign for College OpportunityHigher education is facing.docxThe Campaign for College OpportunityHigher education is facing.docx
The Campaign for College OpportunityHigher education is facing.docx
 
The Catholic University of America School of Engineering .docx
The Catholic University of America School of Engineering .docxThe Catholic University of America School of Engineering .docx
The Catholic University of America School of Engineering .docx
 
The Business Case for Asserting the Business Casefor Busines.docx
The Business Case for Asserting the Business Casefor Busines.docxThe Business Case for Asserting the Business Casefor Busines.docx
The Business Case for Asserting the Business Casefor Busines.docx
 

Recently uploaded

NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...Amil baba
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxDr. Ravikiran H M Gowda
 
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lessonQUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lessonhttgc7rh9c
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Pooja Bhuva
 
Introduction to TechSoup’s Digital Marketing Services and Use Cases
Introduction to TechSoup’s Digital Marketing  Services and Use CasesIntroduction to TechSoup’s Digital Marketing  Services and Use Cases
Introduction to TechSoup’s Digital Marketing Services and Use CasesTechSoup
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxCeline George
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...Nguyen Thanh Tu Collection
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxPooja Bhuva
 
Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17Celine George
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxPooja Bhuva
 
dusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningdusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningMarc Dusseiller Dusjagr
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsNbelano25
 
Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111GangaMaiya1
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxPooja Bhuva
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxmarlenawright1
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 

Recently uploaded (20)

NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lessonQUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
Introduction to TechSoup’s Digital Marketing Services and Use Cases
Introduction to TechSoup’s Digital Marketing  Services and Use CasesIntroduction to TechSoup’s Digital Marketing  Services and Use Cases
Introduction to TechSoup’s Digital Marketing Services and Use Cases
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
dusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningdusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learning
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf arts
 
VAMOS CUIDAR DO NOSSO PLANETA! .
VAMOS CUIDAR DO NOSSO PLANETA!                    .VAMOS CUIDAR DO NOSSO PLANETA!                    .
VAMOS CUIDAR DO NOSSO PLANETA! .
 
Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 

Terrorism A Study in Public Safety – Public Safety vs. Individual.docx

  • 1. Terrorism: A Study in Public Safety – Public Safety vs. Individual Freedom Transcript Note. Transcript is for supplementary audio provided by clicking on the speaker icon on the Introduction page. Public Safety vs. Individual Freedom Fundamental to terrorist is the ability to operate in secrecy as invisible as the wind and as deadly as the tools at their disposal. Terrorist succeed only when their plans can be carried out without discovery or detection. Accordingly proactive government intelligence gathering and intervention has proven to be the best approach to preventing future terrorist attacks. To discover secrets however certain impositions must be made government intrusions and incursions that go along with fighting terrorism bring to light the balance between public safety and individual freedom. Copyright © 2011 Pearson Education, Inc. All Rights Reserved. Criminology Interviews: Chief of Victimization Statistics, U.S. Bureau of Justice Statistics Transcript Michael Rand Introduction I’m Michael Rand. I’m Chief of Victimization Statistics at the U.S. Bureau of Justice Statistics and BJS is the statistical arm of the department of justice. How would you describe the field of criminology? Well, criminology to me, and I’m not a criminologist I’m a political scientist, criminology is the study of crime and its attributes and it’s ideology and everything surrounding it and it’s such a diverse field that it encompasses an incredible wide range of subjects related to crime and victims and offenders and the criminal justice system. What are some current trends in criminology?
  • 2. Victimization surveys have taught us an awful lot about crime and um, the extent in nature of crimes people experience. But there’s still so much more to learn and we, we’re gonna be moving probably into a lot of new directions. I know that we’re moving into some areas that we had not intended or thought we would be in such as looking at identity theft, looking at internet predating, things like that, new subjects. But also we face challenges related to technology and how we conduct surveys and how we can best reach the public and um, get the best answers from them. So there are huge challenges to be faced, um, both for the survey that I work on and for survey methodology in general. As a political scientist, what does your research indicate? One of the things that – one of the key parts of my job is to look at trends in crime and our country has experienced in the past decade uh, and a half a very broad and long-standing decline in violent property crime. That seems possibly to be ending in the last couple of years. As a matter of fact, our survey has shown this year that there really was no change between 2004 and 2005 in the level of crime whereas police reported crime has actually increased by about 1% so there’s a huge discussion in the field as to whether we’ve seen the end of the decline and we’re entering a new period of increase in crime rates or whether this is possibly just an interruption in the decline. So we won’t know that for a few years. We’ll have to wait and see where that question takes us. Is your research more concerned with practice or theory? As the statistical arm of the department of justice, we collect information about crime and about the criminal justice system, not so much to apply any theory or to validate any theories, but to inform about crime and the criminal justice system. So we’re not really related – specifically associated with either practice per se or theory. As a statistician, what does your day tend to look like? I am in charge of the largest victimization survey conducted, um, in the country, and I have a staff that works with me and
  • 3. for me to analyze data and collect the data. The data are collected for us by the census bureau. So I work with them. So my day involves a lot of meetings, a lot of meetings with staff, a lot of meetings with other agencies to maintain and continue developing the survey, to analyze the data, and in my spare moments I get a chance to actually hands on work with the data myself. Since you study statistics, does this allow you to predict trends? We avoid projecting because it’s a quagmire. Um, we don’t know enough about why crime rates decline to be able to predict why they may increase in the future. I mean we can look and see what’s going on today, some of the theories that are being discussed related to this possible increase have to do with changes in drug markets, changes – increased youth involvement as offenders, um, changes possibly in police levels, levels of policing, and um, some of those – those are some of the questions that are being looked at to see how they, um, influence changes in crime rates. Copyright © 2011 Pearson Education, Inc. All Rights Reserved. Transcripts: Targeting Terrorism 3 September, 2004. Beslan's number one schoolis overrun by Ch echen separatists. More than1,000 children and adults are held c aptive.Russian special forces storm the building. And the siege leaves 331 dead, 186 of them children. Thisis the archetyp al terrorist act, calculated violenceaimed at innocents for politic al ends. [SPEAKING FOREIGN LANGUAGE] We've not only had to deal with murderers, butwith people who use weapons againstdefenseless children. But many terrorists describe themselves asfreedom fighters. [SPEAKING FOREIGN LANGUAGE]
  • 4. The aim of our operation in Beslan was to stop thewar, stop the genocide of the Chechen people,and force the withdrawal of the Russianoccupyi ng troops. The demands became known right away-- endthe war in Chechnya, withdraw the troops fromChechnya. B ut apparently, the federal authoritiesdidn't like that. They made it sound as if thehostage taking had happened for no reason. After centuries of religiously motivated terrorism,many 19th an d 20th century movements acted inthe name of self- determination. The 9/11 terrorattacks epitomized a swing in the 1990s backtowards religious terrorism, even deadlier actssuppos edly sanctioned by God. Muslims all over the world, I strongly advise youto sacrifice thi s life for the hereafter. Saveyourselves from the fire and torment. Come backto your religion, and bring back your honor. Many analysts feared terrorists would useweapons of mass destr uction, such as nuclear orbiological weapons. Iran and North Ko rea, bothstates believed to sponsor terrorism, have soughtto acq uire nuclear technology. Any country that aims to acquire a nuclearweapon is the grave t hreat to international peaceand security, particularly in a region like the MiddleEast, which is full of hostility, full of lack, full o fdistrust. Governments rarely give into terrorists, yet evenmore rarely do they work to alleviate the causesof terrorism, such as poverty an d [INAUDIBLE]discrimination. The more the Americans are supporting Israel,the more popular Bin Laden and his like becomes. In this film, we look at the current terrorist threat in a range of countries, as well as how historyshapes the governme nt's response. [GUNSHOTS] Gun! [GUNSHOTS]
  • 5. These tunnels are tiny. Literally, you've got toreally squeeze to get through. They criss- crossall of Bajaur. That's where the militants used tocome in and hide and move around and store theirarms. From homegrown terrorists with nationalist andcommunist goals in the 1960s and '70s, Americanterrorist movements turned agai nst the federalgovernment in the 1980s, culminating with theOkl ahoma City bombing in 1995. At the sametime, US citizens beca me more vulnerable toterrorist attacks abroad. In 1993, foreign t erroristsmade their first major strike on US soil, a truckbomb de tonated beneath the World Trade Center,killing six and woundin g 1,000. Eight years later, al- Qaeda again attacked on USsoil, hijacking four planes and reduc ing the WorldTrade Center to rubble, killing 2,700 innocentpeop le. Saudi Osama bin Laden founded al- Qaeda in1988 with the goal of establishing a global Islamicstate . 10 years later, he declared it, quote, "theduty of all Muslims to kill US citizens, civilians, andmilitary and their allies everywh ere." Hisobjections to the US are Washington's support ofIsrael, the US military presence in the Middle East,and the non- Islamic values the US is spreading. This time, when the shouting and screaming ofMuslims has become loud through out the world,Palestine and Iraq, Afghanistan and Chechnya,this time we say to the old world and declare it as a thunderous scream-- the resolve of Muslims willnot weaken. We wish to offer our lives in the way of God, to please Him, to take revenge on our enemies, the Jews and the Crusaders. Prior to 2001, Bin Laden had made threesuccessful attacks again st the US-- the twoseparate suicide truck bombings of the USembassies in Tanzania and Kenya in 1998 andthe suicide bombing of the USS Cole, moored offYemen in the year 2000. Following 9/11, President George W.
  • 6. Bushlaunched a massive military campaign to huntdown Bin La den in a war on terror, starting withthe invasion of Afghanistan to try to oust hardlineIslamists, the Taliban. Bush defined an axi s of evilas consisting of Iraq, Iran, and North Korea. Hewas crit icized for expanding the war to includeIraq without a concrete li nk between Baghdad andBin Laden. Bush also gave law enforcement authorities wide- sweeping powers under the 2001 Patriot Act.Greater powers of s urveillance, wiretapping, theuse of secret evidence, and closed c ourt hearingsbecame part of the war on terror. The Patriot Act now legalizes many things that, inmy opinion an d the opinion of many legal scholars,are in direct contradiction of our Constitution. The US Constitution guarantees suspectedcriminals protection fr om detention without charge,the right to a speedy public trial, a nd protectionfrom cruel and unusual punishment. In war, thegov ernment may curb these rights. Terrorsuspects captured in Afgh anistan were classifiedas enemy combatants and transferred toG uantanamo Bay, a US naval facility in Cuba. We shouldn't forget that the reason they're here inGuantanamo i s because they are terrorists. The detainees there were largely left in limbo,without formal ch allenges. But the pursuit ofinternational terrorists under military rather thancivilian rules alienated many US allies. You don't just hold people by casting them into ablack hole and say that no one can oversee whatthey do because we are the US military. That'snot the rule of law. That's military rule. In 2006, US policy at Guantanamo came underfire, especially th e use of simulated drowning orwaterboarding, sleep deprivation, and forcefeeding. Humanitarian agencies said all prisonersthere were entitled to a trial or release under theGeneva Convention. These were not mastermind hardened terrorists.Most of them probably did not even though theABC of warfare or guerrilla warfare. And th eywere caught up in a whirlpool of hysteria andJihad fervor, eg ged on by their local mullahs in thevillages.
  • 7. --in the past year. Criticism also mounted over the policy ofextraordinary renditio n, in which the US sentsuspects to countries that practiced tortu re, suchas Egypt, Syria, or Morocco, for interrogation. What this is is state- sponsored abduction. Andthat's a violation of international law. When President Barack Obama took office in2009, he signaled a different direction in the waron terror, recognizing that military might alonecannot protect the US. He banned waterboardingand announced he would close Guantanamowithin a year. He also a nnounced a timetable forUS combat troops to leave Iraq. Bush's anti- terrortactics had been widely discredited, not leastbecause Osa ma bin Laden had never beencaught, and the Taliban had regrou ped inPakistan. After the war in Afghanistan in 2001, it should beremembered t he Taliban were never defeated.They were simply routed by the Americans. Manythousands escaped into Pakistan, includingalm ost the entire Taliban leadership. The Pakistani Taliban vows to destroy thePakistan government a nd army for joining theAmerican fight against it. In 2008, the T aliban andits associated groups crippled Pakistan with 60suicide bombings, 140 kidnappings, theassassination of former Prime Minister BenazirBhutto, and the shutting down of NATO's main supply route into Afghanistan. Many are callingPakistan the ne w front line in the war on terror,with the Taliban now seeing the mselves as part ofa global Jihad. [SPEAKING FOREIGN LANGUAGE] Prophet Muhammad said the Jihad will continueuntil the day of judgment. Our future atta cks willbe fast and severe, God willing. Today's prayer meeting followed the troubles lastnight, when su pporters of the imam tried to breakinto the building. Extra police had been drafted tothe troubled mosque after a judge ordered-- In Britain, decades of dealing with the IrishRepublican Army--
  • 8. IRA-- have left the securityservices relatively well- equipped. But the UK wascaught off guard by homegrown Islam ic terroristswho struck in 2005. Fighting for a united Ireland,the IRA began a series of bombings againstBritish targets in the 19 60s. Living with thisperpetual threat led the British government tocreate a response based on decentralization andpublic awarene ss, including evacuations after IRAtip-offs. By the early 1990s, having achieved little throughviolence, IRA lea ders began to focus on a politicalsolution. In 1998, the British a nd Irishgovernments agreed the Good Friday Accord. Itincluded the establishment of a Northern Irelandassembly and the releas e of IRA prisoners. GerryAdams, head of the IRA's political bra nch, SinnFein, called upon IRA militants to demobilize. What Republicans have to be is very strategic inour attitude-- think beyond the difficulties nextyear, think beyond the proble ms that have beenunheard from the last number of years, think o fwhere we want to be in 10 years' time, and thenfed ourselves in to a process which helps to bringthat about. Meanwhile, throughout the 1990s, the UK'sgenerous asylum law s and relaxed politicalclimate had made it a popular destination forMuslim extremists exiled from other countries. Remember, 6 million Muslims in the UK. We needan army of 6 million. On July 7, 2005, four young men blew themselvesup on London' s transport system, killing 52passengers. Al- Qaeda claimed responsibility. AllEnglish- born, three of the bombers had attendedradical Islamic schools i n Pakistan. Most of these lads are respectable lads. They hadgood backgrounds. The families were wellrespectable people in the area. That's not thereason. But that is something that the Britishcommunity need to look at, learn what makes aperson do such a thing. They were general lads, just like ourselves,working, educated, financi
  • 9. ally secure. They werefrom financially secure families. What pu t the picture in their mind is the media. They're seeingtheir own brethren get killed day in, day out. And itdoes affect you. During the 1990s, firebrand imams had taken oversome mosques to preach hate. The imam from the pulpit can influence thecommunity in many respects, which nee d to besupervised, needs to be controlled. One of these imams was Sheikh Omar BakriMohammed. He rais ed money and inspiredrecruits to the fundamentalist calls throug h hisgroup, Al- Muhajiroun. Hundreds of his youngfollowers have gone oversea s to train and fight inMuslim conflicts. In 2004, Bakri disbande d Al- Muhajiroun under increasing pressure from theUK authorities a nd was refused reentry into theUK after travelling to Lebanon in 20 05. Another Muslim cleric with clear links to terrorismis Abu Hamz a al- Mazri. He preached at London'sFinsbury Park Mosque, which ha s beenconnected to terrorist attacks in the Yemen, theBrixton sh oe bomber, and British Taliban fighterslater held in Guantanam o Bay. If they want to retaliate for the dead because youdon't listen, the n I can no way say to them, we arenot allowed to do these things, because they alsoha ve civilians whom you've killed with your bombsand your polici es and your sanctions. Abu Hamza had a close alliance with anotherIslamic extremist, Abu Qatada, whosefundamentalist teachings inspired at least fo uryoung men to join al- Qaeda. One was ZacariasMoussaoui, the so- called 20th hijacker of theWorld Trade Center. Jihadi activists i n Britainwere swimming in a sea of like-minded individuals.
  • 10. London. It's London. It's the safe haven. Thereare many people, as well as Abu Hamza or Abu Qatada, who, if they were in France, for example,a long time ag o they'd be in prison. The UK's 1974 Prevention of Terrorism Act hadbanned the IRA. But new counter- terror legislationwas introduced following the London bombings ,including the right to hold suspects withoutcharges for 28 days, and a new charge ofglorifying terrorism. Both aspects werecont roversial, with critics claiming the glorificationoffense would d amage legitimate freedom ofspeech. Britain had been revealed as a key launchpad foral- Qaeda, a base for recruitment, and thechannelling of terrorist m oney. But by shifting itsemphasis to terror groups based in the UK sincethe London bombings, Britain foiled a suspectedplot to blow up as many as 10 passenger jetsleaving the UK for the US in 2006. It not onlyaverted what could have been another 9/11, butunderscored the UK's determination to counterthe threat of Is lamic terror. Responses to terrorism are often constrained, asin Germany and Japan, by a nation's military past.Both these countries have constitutions which limittheir responses and mean terrorism isapproached as a legal, rather than military,problem. Both countries faced left- wing groups inthe 1970s, but found their laws insufficient to de alwith religious terrorism from the 1990s onwards. The Japanese doomsday cult, Aum Shinrikyo,attracted scientists capable of developingbiological and chemical weapons. Led by ShokoAsahara, the group demanded loyalty throughacts of viole nce and suffering. And those startingto doubt the movement wer e killed. Aum attracted10,000 members across Japan, and by 19 94, hadbranches worldwide. The 1951 ReligiousCorporation La w precluded the government fromintruding on their activities. In 1993, the Aum began experiments withchemical weapons. So me of the work was goingon right in the middle of downtown To kyo. In 1995,members of Aum released sarin, a highly toxicnerv
  • 11. e gas, into the Tokyo subway system. 12people died, and 5,002 were injured. Aum's sarinfactory was the brainchild of chemist MasamiTsuchiya. [SPEAKING JAPANESE] I sensed a crisis in contemporary society. I wasinterested in brin ging a spiritual dimension tomodern science and harmonizing th e two. I wasalways looking to join a group which shared thiside a. The Aum subway attack caught the Japanesegovernment unprep ared. In the wake of theattack, an emergency secretariat was cre ated tocoordinate emergency response. Japan's primarycounter- terrorism strategy is internationalcooperation. Since 1960, its se curity has beenguaranteed by a treaty with the US, as the 1947Japanese constitution renounce s the right to an army. But the 9/11 attacks transformed Japanese anti- terrorist strategy. Tokyo gave logistical support tothe US in bot h Afghanistan and the Middle East.The terrorist threat is now be ing used to persuadeJapanese citizens of the merits of a remilitarizedJapan. In our case, North Korea is kidnapping our people.People know that. And they shoot missilestowards our territory. So now peop le are gettingmore and more concerned about nationalsecurity. Germany's approach to terrorism has been basedon diplomacy ra ther than military action. AlthoughGermany contributed troops t o help oust theTaliban from Afghanistan, it refused to back the US-led war on Iraq, a rift which has led toproblems with intelligence sharing between the USand Germa ny. Unlike Britain, Germany has notfaced widespread terrorist a ttacks. Yet al- Qaedamembers prepared for the 9/11 attacks inGermany. At leas t three of the hijackers lived inHamburg, but had not raised any suspicions,including the ringleader, Mohamed At ta. He saw all of the licentiousness of the West. Andvery commonl y, this experience causes youngMuslim men to become much mo
  • 12. re traditional,much more fundamentalist. Germany's legal system is a reaction to its Nazipast. Reacting to the central police force createdby the Nazis, Germany's police f orce is highlydecentralized, with no centralized force forterroris t prevention. Specific laws were drafted forfighting 1970s left- wing terror group, Baader- Meinhof. But prior to 9/11, Germany had no lawsbanning foreig n terrorist organizations. Since 2001, German law forbids joining or helpingforeign terror ist organizations and allowed for thebanning of religious groups thought to promoteterrorism. One of those groups banned was Hizbut- Tahrir, a group which, as of 2009, was stillactive in Britain. [SPEAKING SPANISH] Columbia suffers from narcoterrorism, wheregroups are complic it in drug trafficking in order tofund politically motivated viole nce. Colombia hasno clear laws on terrorism. The main thread t oguerrillas, paramilitaries, and drug cartels alike areextradition laws with the US. Pablo Escobar, infamous leader of the Medellindrug cartel, surr endered to Colombian authoritiesin 1991 only after a ban on ext radition. Columbiahas had two left- wing insurgencies since the1960s and a right- wing paramilitary group, allthree of which have been drawn into the cocainetrade. The guerrilla and narcotics networks havebec ome intertwined, as the drug cartels seekprotection from the ins urgencies and theinsurgencies seek funding from the cartels.Fou nded in 1964 to be the military branch of theColombian Commu nist Party, the RevolutionaryArmed Forces of Colombia, FARC, has nowdiversified into bombing, kidnapping, and drugrunning. [SPEAKING SPANISH] In Colombia, there are just some terrorist groups.This image of guerrillas that's projectedinternationally, it's long out of date. [SPEAKING SPANISH] The FARC collect tax from the cattle farmers, thecoffee farmers , those who grow banana,soybeans, and we also tax the buyers o
  • 13. f thecoca. The National Liberation Army, ELN, is the smallerof Columbia' s two left- wing insurgents, alsofounded in 1964. It also kidnaps foreign na tionalsand finances its activities through drugs. A right- wing militia was formed in 1997 from groupsfrequently targeted by the guerrillas, economicleaders, drug traffickers, and rural c ommunities. Italso gets 70% of its income from cocaine. [SPEAKING SPANISH] If you have a banana plantation, they won't buythe bananas. If y ou're a pigsty, they won't buypork. They buy it from the wholesale dealers, and they export it. But with the coca, everybody buyscoca-- dealers, guerrillas, paramilitaries,everybody. Between 1996 and 2003, an average of 3,000people were kidnap ped in Colombia each year,including journalists, politicians, an d foreigners.FARC is responsible for most of the kidnappings.In the year 2000, the US launched Plan Colombiato eradicate coca ine production, includingmassive aerial spraying of coca fields and a hugeshift in funding to the military. Alvaro Uribe waselec ted president in 2002 with pledges to end therebel insurgencies. If violent groups do not have a governmentcapable to stop them, they want to negotiate. 2008 saw an unprecedented wave of FARCdesertions. But these government successescaused FARC to launch Plan Rebirth, pro mising tostep up their campaign of terror. The tragedy of the Columbian war is that thegovernment cannot defeat the guerrillas throughmilitary force, nor can the guerrilla s overthrow thegovernment by the use of arms. This is anunwinnable war. And we are condemned, sooneror later, to sit at the negotiating table. Terrorism is a political strategy based on violenceand unpredict ability. Governments may eliminatespecific terrorist groups, but are powerless tostop new groups forming. The war on terror will be ongoing until the day thatwe win. The duration of that, we'll have to see. Wehope it ends tomorrow.
  • 14. Watch out! Watch out! Let me get a shot. Today's global terrorist threat requires globalcooperation. The UN's International Criminal Courtstands ready to prosecute terr orists. But the UShas refused to ratify its creation on the basis t hat it would make American soldiers vulnerable toprosecution for w ar crimes. Meanwhile, the war on terror appears to haveradicalized many a gainst the US. As this al- Qaedapropaganda video shows, the ranks of thosewilling to und ertake suicide attacks against the USare not thinning. [SPEAKING FOREIGN LANGUAGE] Advantages and Disadvantages THE UNITED STATES OF AMERICA, HOME TO THREE HUNDRED MILLION PEOPLE, EACH OF US ASSUMING THAT IF WE OBEY THE LAWAND MIND OUR OWN BUSINESS, THERE'S NO REASON FOR ANYONE TO PAY MUCH ATTENTION TO US. THAT'S WHAT WE MIGHT THINK, BUT WE WOULD BE WRONG.RECORDS ARE BEING CREATED OF ACTIVITIES THAT USED TO BE TOTALLY PRIVATE. THERE ARE A LOT OF COMPANIESTHAT YOU'VE NEVER HEARD ABOUT, BUT THEY'VE HEARD SOMETHING ABOUT YOU.DETAILED, PERSONAL INFORMATION IS BEING COLLECTED EVERY DAY, AND USED IN WAYS WE COULD NEVER IMAGINE. MOST AMERICANS ARE IN YOUR DATABASE SOMEWHERE, RIGHT? ALSO BILLIONS OF TRANSACTIONS. INTERNET SEARCHES ARE BEING RECORDED... THEY KEEP EVERYTHING - YOUR POLITICAL LEANINGS,YOUR RELIGIOUS LEANINGS, YOUR MEDICAL CONCERNS, YOUR SEXUAL CONCERNS.DRIVING HABITS ARE BEING MONITORED...VEHICLE SPEED, ENGINE
  • 15. SPEED, WHETHER THE BRAKES WERE ON OR OFF...EMPLOYEES ARE SURVEILLED... HE'S HEADING BACK TO THE SHOP RIGHT NOW.SHOPPERS ARE OBSERVED, RECORDED AND ANALYZED... THAT'S AN ALERT RIGHT THERE. AND PERSONAL PHONE CALLS? I WAS UNDER THE IMPRESSION THATNOBODY COULD STEAL MY CELL PHONE RECORDS. AS IT TURNS OUT, I WAS VERY, VERY WRONG. WE ARE LIVING THROUGH A REVOLUTION. A SURVEILLANCE REVOLUTION EMPOWERED BY TECHNOLOGY. LITERALLY WITHIN FIVE TO SEVEN MINUTES WE'VE IDENTIFIED THE INDIVIDUAL. IT'S TECHNOLOGY THAT CAN BE PUT TO GOOD USE - TO STOP TERRORISTS AND SOLVE CRIMES - BUT IF INFORMATION FALLS INTO THE WRONG HANDS OR IT'S JUST PLAIN WRONG, IT CAN RUIN LIVES. I WENT WITHOUT A JOB FOUR MONTHS. TOUGH FOUR MONTHS?VERY, VERY DIFFICULT FOR ME. FROM IMPLANTABLE CHIPS... THEY MAKE A SMALL INCISION IN YOUR ARM. ...TO DATA MINING COMPANIES... WELL, HOW SECURE IS THAT DATABASE? ...WE TAKE AN UNPRECEDENTED LOOK AT THE POWERFUL BUSINESS OF PERSONAL INFORMATION. WE'RE NOT MINING THROUGH THE PERSONAL LIVES OF INNOCENT AMERICANS. THE GOVERNMENT IS NOW WORKING WITH BIG BUSINESS TO TAKE SURVEILLANCE AND INFORMATION GATHERING TO LEVELS THAT WERE ONCE THE STUFF OF SCIENCE FICTION. BIG BROTHER, IF ALLOWED TO HAPPEN, WILL HAPPEN, AND OUR JOB, AS A RESPONSIBLE SOCIETY IS TO MAKE SURE THAT DOES NOT OCCUR. * * IT WAS A HORRIFIC AUTOMOBILE COLLISION. IT WAS THE BIGGEST TRAGEDY IN THE STATE OF MICHIGAN - ENTIRE FAMILIES WIPED OUT. IN MAY 2005, A DRUNK DRIVER, SPEEDING AND OUT OF CONTROL ON THIS ROAD IN FARMINGTON HILLS, MICHIGAN, SLAMMED
  • 16. HIS YUKON, DENALI SUV INTO A CAR CARRYING JUDITH WEINSTEIN, HER TWELVE YEAR OLD SON, ALEX, AND NINE YEAR OLD SON, SAM. ALL THREE WERE KILLED. IT IS MY UNDERSTANDING THIS MATTER IS GOING TO BE A PLEA. IS THAT CORRECT? FORTY- NINE YEAR OLD TOM WELLINGER, THE DRIVER OF THE YUKON, WAS CHARGED WITH THREE COUNTS OF SECOND DEGREE MURDER. CRUCIAL EVIDENCE USED AGAINST HIM WAS OBTAINED FROM A DEVICE IN HIS OWN CAR. A DEVICE THAT WAS TRACKING HIS DRIVING WITHOUT HIS KNOWLEDGE. IF YOU'VE BOUGHT A CAR IN THE LAST FEW YEARS, CHANCES ARE YOU HAVE ONE TOO. IT IS KNOWN AS AN EVENT DATA RECORDER OR EDR, ALSO REFERRED TO AS A BLACK BOX. IT CAPTURES WHAT HAPPENS IN AN AUTOMOBILE IN THESECONDS BEFORE AND AFTER ITS AIRBAG IS RELEASED. OAKLAND COUNTY PROSECUTOR KEN FRAZEE SAYS THE DATA RECOVERED FROM THE BLACK BOX HAS PLAYED A CRUCIAL ROLE IN A NUMBER OF HIS CASES, INCLUDING THIS ONE. THE DATA THAT WAS TESTIFIED TO IN COURT INDICATES THAT THE DEFENDANT WAS TRAVELING CONSISTENTLY AT APPROXIMATELY 70 MILES AN HOUR. NOW THIS WAS IN EXCESS OF THE SPEED LIMIT.THE ENGINE THROTTLE SPEED ALSO SHOWS THAT THE THROTTLE WAS HEAVILY ENGAGED AND FOR THE FIVE SECONDS PRIOR TO IMPACT THE BLACK BOX DEMONSTRATED, IN THIS CASE, THAT THERE WAS NO ATTEMPT TO BRAKING. IT'S VERY POWERFUL INFORMATION BECAUSEOF THE FACT THAT IT IS A SOLID TECHNOLOGY. SANTA BARBARA, CALIFORNIA BASED VETRONIX SELLS THE TECHNOLOGY THAT ALLOWS LAW ENFORCEMENT TO DOWNLOAD DATA FROM A CAR'S BLACK BOX. ANDREW BUNCH IS A PRODUCT DEVELOPER. A FEW DIFFERENT DATA PARAMETERS ARE RECORDED. WE HAVE VEHICLE
  • 17. SPEED, ENGINE SPEED,PERCENT THROTTLE AND BRAKE SWITCH/DATA SWITCH. IT'S CALLED A BLACK BOX BUT IT'S NOT BLACK. THIS IS ACTUALLY AN AIR BAG CONTROL MODULE. ANY VEHICLE THAT HAS AN AIR BAG SYSTEM IS GOING TO HAVE AN AIR BAG CONTROL MODULE SYSTEM INSTALLED IN IT.WHETHER OR NOT IT RECORDS DATA IS, YOU KNOW, YOU CAN STICK A CHIP IN ANYTHING THESE DAYS TO RECORD THIS INFORMATION. EXACTLY, SO THAT AFTER DEPLOYMENT OF THE AIR BAGS, IT WILL ACTUALLY RECORD SOME OF THE DATA THAT WE SEE HERE. THE CONDITIONS FOR THESE PLEAS THAT WERE ENTERED TODAY IS THAT YOU WILL NEVER DRIVE A MOTOR VEHICLE FOR THE REST OF YOUR LIFE. IS THAT YOUR UNDERSTANDING? PARTLY BECAUSE OF THE UNDISPUTED EVIDENCEPROVIDED BY THE BLACK BOX, WELLINGER PLED NO CONTEST DURING PRE- TRIAL MOTIONS. HE WILL SERVE A MINIMUM OF 19 YEARS IN JAIL. THERE ARE SOME PEOPLE WHO ARGUE THAT THIS COULD BE A DEATH SENTENCE FOR YOU IN VIEW OF YOUR AGE.ARE YOU AWARE OF THAT? IN THE CASE OF THOMAS WELLINGER, AN ADVANCE IN TECHNOLOGY WORKED TO PUT A MENACE TO SOCIETY BEHIND BARS. THAT IS ONE OF THE BENEFITS OF THE WORLD WE LIVE INWHERE TECHNOLOGY OF ALL TYPES IS ABLE TO CAPTURE EVIDENCE OF OUR BEHAVIOR - EVIDENCE THAT CAN BE USED TO FIND AND PUNISH THOSE GUILTY OF COMMITTING CRIMES. BUT PRIVACY ADVOCATES WARN THAT WHILE DEVICES SUCH AS THE BLACK BOX OFFER ADVANTAGES, THEY CAN ALSO CARRY RISKS. A MINOR TECHNOLOGICAL ADVANCE, FOR EXAMPLE, COULD ENABLE A BLACK BOX TO MONITOR YOUR DRIVING ALL THE TIME, ALLOWING THE POLICE TO ISSUE SPEEDING TICKETS WITHOUT OFFICERS ACTUALLY BEING PRESENT OR INSURANCE COMPANIES TO JUDGE YOUR DRIVING HABITS BEFORE
  • 18. DETERMINING YOUR RATES. GEORGE WASHINGTON UNIVERSITY LAW PROFESSOR, DANIEL SOLOVE, IS AN EXPERT ON PRIVACY LAW. I THINK THAT A LOT OF THE PURPOSES FOR GATHERING INFORMATION ARE QUITE BENIGN. WHAT'S BAD IS THE FACT THAT THE PERSON WHOSE INFORMATION IS BEING COLLECTED IS SO OUT OF THE LOOP IN THIS PROCESS, HAS NO RIGHTS BECAUSE RIGHT NOW IT'S THE CASE WHERE THEY'LL GATHER THE INFORMATION FOR ONE PURPOSE, IT'S GREAT, BUT SECRETLY THEY COULD BE USING IT FOR ANOTHER PURPOSE. ONE EXAMPLE, THE GLOBAL POSITIONING SYSTEM. GPS AS IT'S KNOWN IS NOW USED COMMERCIALLY TO HELP PEOPLE NAVIGATE THEIR AUTOMOBILES. BUT IT'S NOT HARD TO GO FROM USE TO ABUSE. CONSIDER THE CASE OF ERIC ODERO. I DIDN'T KNOW ABOUT IT. THESE GUYS WERE TRACKING ME. THEY KNEW EVERY STREET I'D BEEN IN LAS VEGAS. WHERE I'D STAYED, STOPPED, SLEPT. IN DECEMBER OF 2003, ODERO BOOKED A RENTAL CAR TO DRIVE ROUND TRIP FROM HIS HOME IN LOS ANGELES TO LAS VEGAS. WHEN HE RETURNED THE CAR IN LOS ANGELES, HE RECEIVED A BILL FOR OVER $1,400; ABOUT $1,200 MORE THAN THE FEE HE'D BEEN QUOTED. I ASKED WHY AND HE TOLD ME "YOU USED IT TO GO OUT OF THE STATE OF CALIFORNIA".UNBEKNOWNST TO ODERO, THE RENTAL CAR COMPANY IMPOSED AN ADDITIONAL CHARGE FOR DRIVING OUT OF STATE. AND SOMEHOW THE AGENT KNEW HE HAD GONE TO LAS VEGAS. I SAID, "HOW DID YOU KNOW I WENT TO LAS VEGAS?" THEY SAID "WE KNOW YOU WENT TO LAS VEGAS". THEN I SAID, "PROVE THAT I WENT TO LAS VEGAS".THE RENTAL CAR AGENT HANDED ODERO THIS MAP THAT SHOWED HE'D CROSSED THE CALIFORNIA STATE LINE ON DECEMBER 29TH AT 12:29 PM. THIS GUY FINALLY TOLD ME THERE WAS A GPS SYSTEM PRE-INSTALLED IN THE
  • 19. VEHICLE. NO ONE HAD TOLD ME ABOUT THAT. THE GPS CHIP IN ODERO'S CAR ALLOWED THE RENTAL CAR COMPANY TO TRACK HIS EVERY MOVE. AS SOON AS THE CAR TOUCHED NEVADA SOILHE WAS CHARGED A DOLLAR FOR EVERY MILE DRIVEN FOR THE ENTIRE TRIP. SO THERE IT WAS, MY PRIVACY WAS ALL GONE.IN OCTOBER OF 2004, ODERO AND 139 OTHERS TOOK PART IN A CLASS ACTION SUIT AGAINST ACCELERON CORPORATION, THE OWNER OF TWO PAYLESS RENTAL CAR FRANCHISES IN SAN FRANCISCO. THE SUIT ALLEGED THAT CUSTOMERS WERE UNAWARE THE COMPANY WAS USING GPS TECHNOLOGY TO TRACK THEIR DRIVING AND WERE SURPRISED BY THE PENALTIES TO DRIVE OUT OF STATE. THE LAWSUIT WAS SETTLED. ODERO AND THE OTHERS WERE REFUNDED THE ADDITIONAL FEES CHARGED FOR DRIVING OUTSIDE CALIFORNIA. IT'S NOT JUST DEVICES IN CARS THAT ARE TRACKING PEOPLES' BEHAVIOR. A LOT OF DEVICES THAT PEOPLE ARE USING - EVERYDAY DEVICES LIKE PRINTERS AND COMPUTERS AND CELL PHONES - ARE INCLUDING SOME KIND OFTRACKING INFORMATION. LIKE THAT COLOR LASER PRINTER YOU HAVE AT HOME OR THE OFFICE; EVERY PAGE PRINTED BY MOST COLOR LASER PRINTERS IS EMBEDDED WITH A CODE UNIQUE TO THAT PRINTER.YEP, YOUR COLOR LASER PRINTER COULD BE SPYING ON YOU. SETH SCHOEN IS A PRIVACY ADVOCATE WITH THE ELECTRONIC FRONTIER FOUNDATION. HIS WORK HAS LED TO THE CRACKING OF THOSE CODES.MY UNDERSTANDING IS THAT THIS WAS MOTIVATED BY A REQUEST FROM THE UNITED STATES SECRET SERVICE WHICH INVESTIGATES COUNTERFEIT AND THATTHEY ASKED THE MANUFACTURERS OFCOLOR LASER PRINTERS TO DO THIS, TO ADD THIS TRACKING CAPABILITY AND, BY AND LARGE, THE MANUFACTURERS COMPLIED. MOST
  • 20. OF THEM DIDN'T TELL THEIR CUSTOMERS THAT THEY WERE DOING SO. THE CODE, A SERIES OF YELLOW DOTS DISTRIBUTED ACROSS THE BACK OF THE PRINTED PAGE IS NOT VISIBLE TO THE NAKED EYE. WHEN YOU SHINE A BLUE LIGHT AND LOOK UNDER A MICROSCOPE, I THINK IT'S QUITE DISTINCT. IT IS. SO FAR WE'VE BEEN ABLE TO CRACK THE CODE THAT'S USED BY XEROX AND A FEW OTHER MANUFACTURERS LIKE DELL. SO WE CAN TELL YOU WHAT THOSE MEAN. THERE ARE OTHERS LIKE HP AND CANON THAT ARE STILL A MYSTERY TO US. IN THE CASE OF DELL AND XEROX, WHAT IS IT THAT THESE DOTS ARE COMMUNICATING? WELL, THEY'RE COMMUNICATING THE SERIALNUMBER OF THE PRINTER THAT MADE THE PRINT. AND THEY'RE ALSO COMMUNICATING, IN THE CASE OF THE XEROX PRINTERS WHICH HAVE THIS INFORMATION, THE DATE AND TIME THAT THE PRINT WAS MADE. FROM THERE IT'S NOT HARD TO FIND OUT WHO PRINTED THE DOCUMENT. AND IT'S NOT JUST YOUR PRINTER. THAT DIGITAL CAMERA YOU'RE SO FOND OF...? THIS IS A PHOTOGRAPH OF METHAT WAS TAKEN AS A STAFF PHOTO. IF WE LOOK AT IT WITH THE RIGHT SOFTWARE,ALL OF A SUDDEN WE SEE A LOT MORE INFORMATION. SO HERE'S THE INTERESTING THING. RIGHT THERE IS THE UNIQUE SERIAL NUMBER OF MY FRIEND'S CAMERA. IF HE'S REGISTERED FOR A WARRANTY THEN THEY KNOW WHO HE IS, AND IT'S EASY TO FIND BECAUSE HE PUBLISHES HIS PHOTOS ON A PHOTOSHARING WEBSITE UNDER HIS OWN NAME SO YOU COULD IMMEDIATELY FIND OUT THAT THAT'S HIS CAMERA. BURN ANY CD'S LATELY? ANOTHER ONE THE PUBLIC IS NOT REALLY AWARE OF, WHEN YOU BURN A CD IN A CD BURNER, THE CD BURNER'S SERIAL NUMBER IS ACTUALLY LEFT ON THE CD. SO IF YOU MAKE A MIXED CD FOR SOMEONE OR YOU BURN ANY
  • 21. KIND OF INFORMATIONONTO A CD AND GIVE IT OUT TO SOMEONE,IT'S POTENTIALLY TRACEABLE BACK TO YOUR COMPUTER. ALL OF THIS MAY SEEM INNOCUOUS, BUT IN TIME IT MAY NOT BE. I THINK PEOPLE ARE PERFECTLY HAPPY TO ADOPT A COMMUNICATIONS DEVICE THAT IS IN SOME WAY TRACEABLE OR TRACKABLE BECAUSE THEY THINK, WELL, I DON'T HAVE ANYTHING TO HIDE AND I DON'T USE IT IN A WAY THAT SOMEONE COULD TRACK, AND THEN LO AND BEHOLD, TECHNOLOGY ADVANCES. THEY SIGN UP FOR ALL KINDS OF SERVICES AND THEY'RE USING THAT TECHNOLOGY IN A WAY IN WHICH THINGS ARE EXPOSED AND THINGS ARE TRACKABLETHAT THEY HADN'T ANTICIPATED. JUAN IS OUT ON THE ROAD RIGHT NOW, SO I CAN SEE HERE, AS OF 3:40 PM, HE'S IN FRONT OF 893 LAFAYETTE. HOWARD BOYLE, THE PRESIDENT OF THIS RATHER LOW-TECH LOOKING FIRE SPRINKLER INSTALLATIONCOMPANY IN QUEENS, NEW YORK, KNOWS EXACTLY WHERE HIS EMPLOYEES ARE DURING THE WORK DAY. THEIR CELL PHONES, LIKE MANY WIRELESS DEVICES,CONTAIN A GPS CHIP WHICH ALLOWS BOYLE TO USE A SOFTWARE PROGRAM CALLED ULOCATE, THAT DOES JUST WHAT ITS NAME IMPLIES. HE'S DOING ELEVEN MILES AN HOUR. I COULD GO AND SEE WHERE HE IS IN TRANSIT. HE'S HEADING DOWN THAT ROAD BACK TO THE SHOP. THIS IS EXACTLY WHERE HE IS RIGHT NOW. WHERE HAS HE BEEN? HE WAS AT A JOB SITE THAT I TOLD HIM TO GO TO WHICH WAS 866 EASTLAND PARKWAY. HE WAS ON THAT JOB SITE FROM 2:44 PM TO 3:30. OKAY, YOU'RE GOING TO CHECK THE FIRE PUMP, RIGHT? BOYLE SAYS HE'S NEVER TOLD HIS EMPLOYEES THEY'RE BEING TRACKED BUT HE SUSPECTS THEY KNOW SINCE BOYLE HAS AN UNCANNY ABILITY TO KNOW EXACTLY WHERE THEY ARE OR WHERE THEY'VE BEEN. BOYLE'S
  • 22. SOFTWARE CAN TELL HIM THE MINUTE BY MINUTE WHEREABOUTS OF ANY EMPLOYEE FOR MONTHS BACK. DID YOU THINK ABOUT TELLING THE GUYS? IF I THOUGHT IT WAS A PRIVACY ISSUE I MIGHT HAVE. IT'S NOT A PRIVACY ISSUE. THEY'RE ON THE CLOCK, THEY'RE BEING PAID TO BE IN PLACES THEY'RE SUPPOSED TO BE. THEY HAVE A ROUTE. THIS WAS JUST A SIMPLER WAY OF BEING ABLE TO KNOW THAT THEY ARE BASICALLY DOING WHAT THEY'RESUPPOSED TO DO, AND HAVE THE CONFIDENCE THAT WE'RE NOT CHEATING OUR CUSTOMERS. MANY OTHER BUSINESSES THAT EMPLOY MOBILE WORK FORCES - BE THEY ROTO-ROOTER OR TV STATIONS LIKE WABC IN NEW YORK - USE TECHNOLOGY TO TRACK THEIR EMPLOYEES. JIM JOYCE IS THE VICE-PRESIDENT OF THE NATIONAL ASSOCIATION OF BROADCAST EMPLOYEES AND TECHNICIANS. HE SAYS WHEN WABC INSTALLED GPS DEVICES IN NEWS TRUCKS, UNION MEMBERS WERE RATTLED. WE WERE CONCERNED ABOUT PRIVACY ISSUES AND HOW THIS INFORMATION MIGHT BE USED TO MONITOR THE EMPLOYEES IN A BIG BROTHER SITUATION; THAT THEY WOULDUSE THE DEVICE TO MONITOR AND CRITICIZE THE ROUTES THAT OUR ENG DRIVERS TOOK TO GET TO STORIES, HOW LONG IT TOOK TO GET BETWEEN ASSIGNMENTS, THE FREQUENCY AND DURATION OF PERSONAL BREAKS. IT ISN'T JUST AT WORK. IF YOUR PERSONAL CELL PHONE IS ON, EVEN IF IT DOESN'T HAVE A GPS CHIP, YOU CAN BE TRACKED. KEVIN BANKSTON IS AN ATTORNEY FOR THEELECTRONIC FRONTIER FOUNDATION, A NON- PROFIT THAT DEFENDS CIVIL LIBERTIES FROM THE ENCROACHMENT OF TECHNOLOGY. MANY PEOPLE DON'T REALIZE THAT WHENEVER YOUR CELL PHONE IS ON, THE CELL PHONE COMPANY IS RECEIVING INFORMATION ABOUT YOUR LOCATION. IN MANY CASES QUITE DETAILED INFORMATION. NOT ONLY CAN
  • 23. THEY TRACK YOU IN REAL TIME USING THIS INFORMATION, THEY ARE ALSO STORING ALL THAT INFORMATION ABOUT WHERE YOU HAVE BEEN WHEN YOUR CELL PHONE IS TURNED ON - INFORMATION THAT THEGOVERNMENT OR EVEN PRIVATE LITIGANTS COULD GET AT. YOU CAN, OF COURSE, TURN YOUR CELL PHONE OFF OR EVEN CHOOSE NOT TO HAVE ONE. BUT IT IS GETTING HARDER AND HARDER TO VENTURE OUT IN PUBLIC WITHOUT BEING WATCHED. PRACTICALLY EVERYTHING YOU DO IN PUBLIC IS BEING RECORDED SOMEWHERE OR IN SOME FASHION. AND THE COURTS HAVE LONG HELD THAT WHEN YOU'RE IN PUBLIC YOU DON'T HAVE ANY EXPECTATION OF PRIVACY. THIS IS OUR BACK DINING ROOM, WE HAVE TWO CAMERAS AT OPPOSITE CORNERS. AND I CAN PRETTY MUCH SEE THAT MOST OF THE GUESTS THERE LOOK CONTENT. STEPHEN LOFFREDO IS THE OWNER OF JOVIA, A HIGH END RESTAURANT ON MANHATTAN'S UPPER EAST SIDE. THE ELEVEN CAMERAS PLACED STRATEGICALLY THROUGHOUT JOVIA LET HIM CONSTANTLY MONITOR HIS STAFF AND CUSTOMERS EVEN WHEN HE'S NOT THERE. I HAVE THIS SAME SOFTWARE LOADED ON MY PERSONAL NOTEBOOK COMPUTER SO I CAN PRETTY MUCH WATCH WHAT'S GOING ON HERE FROM ANYWHERE. IF I'M ON VACATION, IF I'M AWAY ON BUSINESS, I CAN REALLY SEE WHAT'S HAPPENING. WHERE ARE YOUR EYES DRAWN TO? I COULD SEE IF A GUEST HAD TO FLAG DOWN A WAITER OR IF THEY LOOKED ANXIOUS. I CAN ALSO LOOK IN THE LOUNGE AREA AND I CAN TELLHOW BUSY OUR MAITRE D'S DESK IS GETTING BY HOW PEOPLE ARE COMING INTO THE RESTAURANT. THE EMPLOYEES ARE AWARE THEY'RE BEING SURVEILLED.SOMEBODY'S GOT TO PREP THE TABLE BEFOREHAND. THE DELIVERY OF THIS DISH ON 13 WAS
  • 24. LIKE A DISASTER. I'LL NEVER GO TO AN EMPLOYEE AND SAY I SAW YOU DO THIS ON CAMERA; IT WASN'T THE RIGHT THING TO DO. WHAT WE'LL DO IS WE'LL TALK IN A GENERAL TERM WITH OUR STAFF AND DISCUSS WITH THEM WAYS THAT THEY CAN IMPROVE THE JOVIA EXPERIENCE. STEVE, WHAT ABOUT CUSTOMERS, DO THEY KNOW THEY'RE ON CAMERA? IT'S BECOME MORE COMMON THAT THERE ARE CAMERAS IN RESTAURANTS. I THINK WHEN THEY SEE THE LITTLE BLACK BALL ON THE CEILING THEY EXPECT THAT THERE ARE CAMERAS. IN THE MODERN RESTAURANT BUSINESS IT ISN'T JUST CAMERAS THAT ARE KEEPING TRACK OF CUSTOMERS. ANYBODY WHO CALLS TO MAKE A RESERVATION, WE'LL START OFF WITH THEIR FIRST AND LAST NAME AND THEIR PHONE NUMBER. IF I DOUBLE CLICK ON THAT I CAN SEE INFORMATION What is biometrics? OUR IDENTITIES ARE CHANGING. THEY ARE BEING TRANSFORMED BY IDENTIFICATION SYSTEMS THAT RECOGNIZE PHYSICAL FEATURES. DATE AND PLACE OF BIRTH AND PARENTS' NAMES ARE OUT. INCREASINGLY WE ARE IDENTIFIED BY BIOMETRICS -- BY HAND SHAPE, FINGERPRINTS, THE IRIS OF YOUR EYE. AS LONG AS AGO AS THE 19TH CENTURY THE FRENCH DETECTIVE ALPHONSE BERTILLON PIONEEREDIDENTIFICATION BY DISTINGUISHING FEATURES. HIS SYSTEM MEASURED LIMBS AND SKULLS AND RECORDED PERSONAL MARKS SUCH AS SCARS AND TATTOOS.BERTILLON COMPILED A MASSIVE DATABASE OF ALL KNOWN CRIMINALS AND OF ILLEGAL IMMIGRANTS LISTED FOR DEPORTATION.THE DATABASE ALSO MADE IT EASY TO IDENTIFY REOFFENDERS. PREVIOUSLY LIMITED TO
  • 25. IDENTIFYING CRIMINALS,BIOMETRICS CAN NOW BE USED ON ALL CROSS BORDER TRAVELERS. HERE FOR INSTANCE. THE UNITED ARAB EMIRATES HAS THE WORLD'S BIGGEST IRIS RECOGNITION SYSTEM. SINCE 2003 ANYONE WANTING TO ENTER THE UNITED ARAB EMIRATES HAS HAD TO PRESENT ONE EYE TO THE CAMERA.MANY OF THOSE WHO DO ARE GUESTWORKERS. PLEASE LOOK INTO THE MIRROR. THANK YOU FOR YOUR COOPERATION. PLEASE LOOK INTO THE MIRROR. THANK YOU FOR YOUR COOPERATION. PLEASE LOOK INTO THE MIRROR. PLEASE LOOK INTO THE MIRROR.I'M THE INVENTOR OF THE TECHNOLOGY. I CREATED THE ALGORITHMS WHICH ARE THE MATHEMATICAL INSTRUCTIONS USED BY COMPUTERS TO PERFORM IRIS RECOGNITION. IT IS A BIT MYSTERIOUS WHY EACH IRIS IS SO UNIQUE AND DIFFERENT.THERE'S RANDOM STRUCTURE IN THE IRIS.RANDOM TEXTURE, WHICH IS VERY COMPLICATED, VERY COMPLEX COMPARED TO ANY OTHER PART OF THE BODY. AND IT'S THIS UNIQUE RANDOM TEXTURE OF HIGH COMPLEXITY THAT MAKES IT SUCH A RELIABLE AND ACCURATE SIGNATURE OR FINGERPRINT. IT'S NOT NECESSARILY THE EASIEST BIOMETRIC TO ACQUIRE, BECAUSE IT'S A SMALL TARGET. IT MOVES AROUND. IT LIVES BEHIND A SHINY SURFACE, THE CORNEA. SO IT MAY NOT BE THE EASIEST ONE TO ACQUIRE, BUT IF YOU CAN ACQUIRE THE IRIS IMAGE THE RELIABILITY AND THE ACCURACY OF IRIS RECOGNITION HAS NOCOMPETITOR, NO RIVAL. PROF. JOHN DAUGMAN: CURRENT PROGRESS THAT ISUNDER DEVELOPMENT HAS TO DO WITH IMPROVING THE IMAGE CAPTURE PROCESS, THE IMAGE ACQUISITION. TO MAKE IT FASTER, TO MAKE IT WORK AT A GREATERDISTANCE, AND TO MAKE IT
  • 26. SMOOTHER.CURRENTLY IRIS CAMERAS REQUIRE WHAT WE CALL STOP AND STARE. YOU MUST STOP AND STARE AT THE CAMERA. THAT'S NOT SO FLUID. THAT'S NOT SO SMOOTH AS IT MIGHT BE. SO MANY CAMERA DEVELOPERS TODAY ARE DOING RESEARCH ON INCREASING THE DISTANCE AND THE SPEED OF THE IRIS RECOGNITION. THERE'S EVEN ONE PROJECT CALLED "IRIS ON THE MOVE" IN WHICH A PERSON WALKS PAST A CAMERA, EVEN FROM A DISTANCE OF 3 METERS AND WALKS AT A SPEED OF 1 METER PER SECOND. THIS IS A NEW CAMERA TECHNOLOGY DEVELOPED BY SARNOFF LABORATORIES IN NEW JERSEY IN AMERICA.IRIS ON THE MOVE. THEN IRIS REALLY IS A FLUID NATURAL INTUITIVE. IT'S JUST LIKE MINORITY REPORT . I THINK THAT IN THE FUTURE IDENTITY AND BIOMETRICS WILL BE VERY CLOSE TOGETHER, CLOSELY LINKEDIN ORDINARY EVERYDAY TRANSACTIONS.AND I THINK WE WILL HAVE A TIME IN THE FUTURE WHEN WE DON'T RELY ON SECRETS OR ON OBJECTS FOR IDENTIFICATION, AS WE DO TODAY. PIN NUMBERS. PASSWORDS. PASSPORTS. CARDS. KEYS. THOSE ARE SECRETS OR OBJECTS. INSTEAD WE'LL USE PARTS OF OUR BODY FOR OUR AUTOMATICIDENTIFICATION. I'M SURE THIS IS PART OF THE FUTURE. THE SEPTEMBER 11TH TERRORIST ATTACKS, FOLLOWED BY THE BOMBINGS IN MADRID AND LONDON HAVEPUSHED GOVERNMENTS TO DEVELOP BIOMETRIC CONTROLS. THE MARKET FOR THEM IS NOW GLOBAL. BIOMETRICS COMPANIES ARE WELL AWARE THAT ONE OF THE BIGGEST SELLING POINTS IS THE FEAR OF TERRORISM. THE FRENCH COMPANY SAGEM, BETTER KNOWN FOR ITS GUIDED MISSILE SYSTEMS, FIGHTER AIRCRAFT ANDATTACK HELICOPTERS, HAS BECOME A WORLD LEADER IN FINGERPRINT RECOGNITION. THANKS TO DOZENS OF KITS SUCH AS THIS ONE, THE MAURITANIAN
  • 27. GOVERNMENT WAS ABLE TO ISSUE A NATIONAL IDENTITY CARD IN 1999. ONE OF THE GOVERNMENT'S AIMS WAS TO REGISTER THE DESERT NOMADS AND GIVE THEM THE RIGHTS OF CITIZENS. BUT IT WAS ALSO A WAY OF GAINING CONTROL OVER THEM. ONE SPECIALIST IN BIOMETRIC FACIAL RECOGNITION IS XID TECHNOLOGIES. ITS FOUNDER ROBERTO MARIANI BEGAN IN COMPUTERIZED MAPPING. BUT HE FOUND A NEW NICHE IN SINGAPORE. THIS DORMITORY IN THE SINGAPORE SUBURB HOUSES OVER 6,000 MIGRANT WORKERS. ACCESS GRANTED.ACCESS GRANTED. WHY ARE COMPANIES INTERESTED IN BIOMETRICIDENTIFICATION? FOR THEM IT'S NOT SO MUCH TO CONTROL ACCESS AS TO CHECK ON PUNCTUALITY AND HOURS WORKED. IN THIS MEDIUM SIZED COMPANY FACIAL RECOGNITION IS USED AS A TIMECLOCK.CULTURE INFLUENCES WHICH BIOMETRIC TECHNIQUES ARE ADOPTED IN DIFFERENT PARTS OF THE WORLD. IN ASIA PEOPLE DON'T LIKE TOUCHING A FINGERPRINTSENSOR THAT SOMEBODY ELSE HAS ALREADY TOUCHED. IDENTIFICATION MUST NOT INVOLVE CONTACT. THE ANSWER LIES BENEATH THE SKIN. BEYOND PERMANENT PHYSICAL CHARACTERISTICS SUCH AS VEINS, FINGERPRINTS OR IRISES,BIOMETRICS ALSO USES BODILY MOVEMENT. THE IDEA BEING THAT OUR MOVEMENTS REVEAL OUR IDENTITY. THE SIGNATURES ARE DIFFERENT. YOU ARE NO LONGER RECOGNIZED. BIOMETRICS IS NOW TRYING TO ENCODE EVERY MOVEMENT OF A HUMAN BODY TO USE FOR REMOTEIDENTIFICATION. NO MORE SIGNALING TO A SYSTEM, OUR IDENTITIES CAN BE CHECKED WITHOUT OUR EVEN KNOWING IT. THIS IS A BIOMETRICS RESEARCH LABORATORY. AND IN THE LABORATORY, IT'S DESIGNED SO WE CAN RECOGNIZE YOU BY YOUR
  • 28. PERSONALCHARACTERISTICS. THE CHARACTERISTICS WE'RE CONCERNED WITH RECOGNIZING IS RECOGNIZING YOU BY THE WAY YOU WALK.SO YOU WALK THROUGH THIS TUNNEL AND WE RECOGNIZE YOU FROM THE PATTERN OF YOUR WALKING MOVEMENT. BUT IT'S ALSO TO RECOGNIZE ME BY MY FACE AND TO RECOGNIZE ME BY MY EAR. NOW WE DO THIS BY COMPUTER VISION, WHICH MEANS WE HAVE A LOT OF CAMERAS. THERE IS A FACE RECOGNITION CAMERA WHICH IS BEHIND ME HERE. AND THERE ARE FOUR CAMERAS IN THE FOUR CORNERS. AND THEY'RE THEN RECONSTRUCTING ME AS IWALK THROUGH THE TUNNEL TO RECOGNIZE ME FROM THE WAY I WALK. AND YOU MIGHT SAY "WELL WHAT IS THIS FOR?"WELL IT'S LIKE A GATE. IT'S A BIOMETRICS GATE WHICH CAN PREVENT OR CONTROL ACCESS TO A BUILDING. SO WE DO A PROCESS. WE SEPARATE THE SILHOUETTE.WE DO HERE. WE SEPARATE THE MOVING SILHOUETTE FROM THE BACKGROUND INFORMATION. AND THEN WE END UP WITH THE WALKING HUMAN SILHOUETTE. HUMAN MOTION IS PERIODIC AND AT THE SYMMETRY; YOU HAVE AN AXIS OF SYMMETRY DOWN YOUR BODY AND YOUHAVE AN AXIS OF SYMMETRY DOWN YOUR LEGS. BUT WHEN YOU'RE WALKING, YOU ALSO HAVE AN AXIS OF SYMMETRY BETWEEN THE LEGS AS WELL. AND WE THEN APPLY SOME MORE MASS TO THE SYMMETRY MEASURES WE OBTAIN AND EXTRA MATHEMATICS COMES OUT WITH A SET OF NUMBERS. AND WE CAN SHOW THAT THAT SET OF NUMBERS IS THE SAME FOR ONE PERSON AND DIFFERENT FORDIFFERENT PEOPLE. IN THAT SENSE WE CAN THEN RECOGNIZE YOU BY THE WAY YOU WALK. GERARD DUBEY IS AN ANTHROPOLOGIST. HE LED A STUDY ON THE USE OF BIOMETRICS IN SCHOOLCANTEENS, AIRPORTS AND VISA OFFICES. IS
  • 29. BIOMETRICS AS RELIABLE AS ITSSUPPORTERS CLAIM? THE HACKERS OF BERLIN'S CHAOS COMPUTER CLUB SAY IT IS EASY TO MANIPULATE BIOMETRIC DATA.YOU CAN CHANGE YOUR KEY OR YOUR PIN NUMBER, BUT IF YOUR BIOMETRIC DATA ARE STOLEN, YOU CAN'T GET A NEW EYE OR A NEW HAND. YET THE INDUSTRY CLAIMS ITS HACKER PROOF AND IT'S LAUNCHING MORE AND MORE SYSTEMS. CNIL IS THE FRENCH DATA PROTECTION AUTHORITY. ONE OF A FEW ORGANIZATIONS IN THE WORLD TO MONITOR POTENTIAL ABUSE OF BIOMETRICS. BERTILLON SIMPLY WANTED TO RECORD THE DETAILS OF CRIMINALS.TODAY BIOMETRICS IS USED IN FRENCH PRISONS AS WELL. ST.ETIENNE PRISON STORES NO LESS THAN 80 HANDMEASUREMENTS ON A CARD. WHEN A PRISONER IS RELEASED HIS BIOMETRICDATA ARE DELETED. FOR THE BIOMETRICS INDUSTRY THE BEST IS YET TO COME. FOR THE REST OF US, OUR VERY BODIES ARE BEING TRANSFORMED INTO DIGITAL INFORMATION. WE ARE NO LONGER IDENTIFIED SOCIALLY THROUGH OUR FAMILY BACKGROUND OR BELONGING TO A GROUP. ALL THAT IS GONE IN FAVOR OF A NEW DIGITAL IDENTITY, ONE THAT IS MEASURABLE AT ANY MOMENT.