TIP: Click on subject to list as thread! ANSI
echo: consprcy
to: All
from: Steve Asher
date: 2003-01-01 03:57:32
subject: (1) Yes, You Are Being Watched

###
Yes, You Are Being Watched

Stephen Lawson, IDG News Service

If you're feeling fenced in some day, you may decide to take a trip 
to your favorite gambling mecca, where anything goes.  

Before you leave, you may want to tell your friends, and while you're 
at it, let them know what you've been doing lately. Depending on where 
you are, and whether what you do sounds suspicious, the government 
may read that e-mail.  

If you go to the town square to wave down a taxi to the airport, you 
may also be waving to a camera housed in what looks like a street lamp. 
If you look like a wanted criminal, you may draw the attention of a 
security guard watching a monitor, or the guard across the street.  

You can bypass all that by driving to the airport. But if you keep 
your mobile phone on, the carrier will always know where you are by 
triangulation using the phone's signal.  

At the airport, you may have your face scanned again. This may actually 
speed your rush to freedom, because if you're a frequent flyer who's 
volunteered to be prescreened, you'll probably face less scrutiny 
before you get on the plane.  

Finally, you'll reach the gambling mecca. The management there likes 
people-watching, too. If you've been there before and they suspected 
you were cheating, your face may set off an alarm. Or if you're just a 
high-roller who volunteered to be identified automatically, they'll 
welcome you by name. Then you'll be free.  

If it feels like Big Brother is watching you, it may really be your boss, 
or a big bank... or your own big brother.  

Under Surveillance  

On one hand, you're onto something: Use of surveillance tools is growing, 
and new technology is making them more powerful all the time. On the 
other, there's a big difference between surveillance in George Orwell's 
novel 1984 and in the real world of the 21st century. In Orwell's 
book, the government planted listening devices and two-way televisions 
called "telescreens" in homes, offices, and public places. These days, 
the government doesn't have a monopoly on ways to watch, listen to, or 
find you.  

Some such technologies remain in the hands of a few powerful entities 
and are shrouded in mystery. However, today the spy kits of private 
companies may contain tools that a potential target might not even 
know exist. By the same token, some supposed surveillance 
capabilities are less science than fiction.  

Privacy laws vary widely around the world, but the technology trends 
creating new ways to invade privacy are pretty much universal. Devices 
are getting smaller and cheaper, networks to access the collected data 
are getting faster, the Internet is getting bigger, and software for 
data analysis is getting smarter.  

Although different surveillance technologies may be used together, 
they fit into a few broad categories: tools for watching or listening 
in the physical world, monitoring activity in cyberspace, locating 
people or things, and interpreting the information that's collected.  

Miniature Machines

Cameras and audio recording devices are getting smaller and their 
wireless communication capabilities are growing, warns Richard Hunter, 
a Gartner analyst and author of World Without Secrets: Business, 
Crime, and Privacy in the Age of Ubiquitous Computing. Combined with 
powerful back-end systems on the other end of those wireless links, 
they are becoming virtual eyes and ears for just about anyone.  

"The miniaturized aware machines... will not only see and hear what's 
going on around them, but they will be able to understand it in ways 
similar to the ways humans understand it," Hunter said.  

Wireless digital cameras with microphones and radios, now about the 
size of a golf ball, within two or three technology generations could 
be the size of a shirt button and cost $25, Hunter said.  

"When you walked down the street, anyone might have multiple such 
devices on their person," Hunter said. Likewise, "If you have a 
surveillance device the size of a button, you could have hundreds 
of them in a room without anyone being aware," he said.  

Meanwhile, wireless network connections at speeds of 5 to 20 gigabits 
per second eventually will allow those devices to constantly send large 
amounts of data, he added.  

Digital video cameras already have slashed the cost of surveillance 
in public spaces and private buildings in the past few years, putting 
unsuspecting people in the gaze of a lot more cameras. Digital cameras 
can be made much smaller than analog ones, said Mihir Kshirsagar, a 
policy analyst at the Electronic Privacy Information Center, a watchdog 
group in Washington, D.C. They also produce clearer images, which 
can be transmitted over long distances in the same ways as any data.  

Your Face Looks Familiar  

Increasingly, digital surveillance cameras are being used with face- 
recognition software that links what a camera sees with a database of 
pictures and facial measurements, which in turn are linked to criminal 
records or other information.  

When a face appears that matches a suspicious person's to a set 
degree of sensitivity, an alarm goes off in a control center and 
a human operator looks at other factors--height, sex, hair color, 
and so on--to see if they match, according to Joseph Atick, president 
and chief executive officer of Indentix, in Minnetonka, Minnesota, 
a maker of face-recognition systems.  

Set to high sensitivity, a system can identify 90 out of 100 people 
sought, with 2 percent to 3 percent false positives, Atick said. 
A lower setting cuts the number of false positives, but also the 
detection rate. Meanwhile, the systems are getting better: They can 
now identify 40 characteristics of a face in real time, up from 20 
a few years ago, he said.  

The technology poses little danger to most people who walk through 
a public place, Atick said. False positives can be cleared up easily 
by a human operator monitoring the video stream or visiting the site 
in person, he said.  

Public Safety  

Face recognition has been deployed with surveillance cameras in public 
areas of several cities in the U.S. and the U.K., as well as in casinos, 
where files are sometimes kept on suspected cheaters, according to 
Gartner's Hunter. It's also beginning to be used at checkpoints, such 
as for airport security.  

Atick and some other experts say face recognition can be used only to 
detect certain people and not to identify everyone. That may be all it 
can ever be used for, because lighting conditions change and pedestrians 
don't always face the camera.  

"Over the next ten years or so, you're not going to be able to build 
a system that would be able to identify every person who walks by a 
camera in a natural outdoor environment," said Larry Davis, a professor 
of computer science at the University of Maryland in College Park.  

At the Office  

Researchers at the University of California at San Diego are developing 
"intelligent rooms" where hidden cameras and microphones are linked 
to software for analyzing someone's face, voice, and walk. The system 
is intended to compare the combination of those characteristics against 
a database of personal characteristics to identify people, said Mohan 
Trivedi, professor of electrical and computer engineering. It could even 
identify a person's mood from facial expressions.  

Trivedi sees the technology as making it easier to hold a 
videoconference. Cameras could focus in on the person talking at any 
given time, and the session could be recorded and later searched by 
subject, speaker, and other factors. His group is now experimenting 
with a new, smaller generation of gear. The team has outfitted a 
laboratory with 50 cameras built into the walls and furniture.  

"We would like to make all the sensors invisible and absolutely 
unobtrusive," he said.  

Watching Over You  

A critical hurdle for such systems is the capability to analyze 
images and spoken conversations, Hunter said. Winston Smith, 
Orwell's protagonist in 1984, never knew whether government 
agents were watching him through the telescreen. He thought 
there weren't enough of them to watch all the time.  

But this kind of data analysis could let software, not humans, filter 
the incoming data. That could mean a lot more monitoring, according 
to Gartner's Hunter. By 2010, large-scale analysis of images and spoken 
words will be possible, but probably only in specialized domains with 
their own key words, such as health care or finance, Hunter predicted.  

Trivedi's team has seen progress in this area.  

"We are further along than what I used to think," he said. In UCSD's 
intelligent room, a computer now can identify two people shaking hands 
in real time.  

/CONT/

--- 
* Origin: < Adelaide, South Oz. (08) 8351-7637 (3:800/432)
SEEN-BY: 633/267 270
@PATH: 800/7 1 640/954 774/605 123/500 106/1 379/1 633/267

SOURCE: echomail via fidonet.ozzmosis.com

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.