Loading presentation...

Present Remotely

Send the link below via email or IM


Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.


I Know What You Did Last Summer: Disciplining Dissent Through Mega-event Surveillance

No description

Kate Milberry

on 16 June 2011

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of I Know What You Did Last Summer: Disciplining Dissent Through Mega-event Surveillance

Dis/Orientation: Surveillance &
Social Movements Surveillance & the G20 CCTV RFID Old techniques New technologies Cybersurveillance Cybersurveillance occurs at various entry points to the internet:
the backbone (national spying schemes)
Internet Service Providers (deep packet inspection)
open wireless networks (data capture)
websites (cookies)
individual machines (malware) Cybersurveillance entails:
monitoring publicly available content on the world wide web, (websites, blogs, chatrooms or discussion boards
intercepting private communications like email and SMS.
network traffic annalysis (who is talking to whom)
social graph analysis (understanding user behaviour/preferences) subversion
counterintelligence North America has a long history of using the law & lawenforcement to suppress individuals and organizations struggling for social justice. Covert, often illegal project designed to spy on Americans considered a threat to the sociopolitical status quo:
communist & socialist organizations
women's rights movement
black nationalist movement
non-violent civil rights movement
student movement
anti-war movement Gives FBI power to seize records and to eavesdrop on phone calls and e-mail in the course of counterterrorism investigations. Activists = "domestic terrorists" The recent history of “terrorist” accusations against pacifist organizations" goes back to the early 1980s targeting of anti-nuclear, anti-death penalty, and Latin American solidarity organizations (Starr et. al, 2008) Legal protest = hooliganism Justifies massive security budgets
Vancouver 2010 Olympics $900 million
Toronto G20 2010 : $1.24 billion
London 2012 Olympics: $1.1 billion Apply surveillance and information technology to track & monitor terrorists & other threats to national security, by achieving Total Information Awareness (TIA).
Create enormous computer databases to gather & store personal information of everyone in the United States, including personal e-mails, social network analysis, credit card records, phone calls, medical records & other sources without any requirement for a search warrant Social networking 77 cameras in security zone & beyond Orwellian doublespeak Disciplining Dissent through Mega-event Security Toronto the Watched: Kate Milberry
post-doctoral fellow
Faculty of Information, U of T
http://geeksandglobaljustice.com Open source
spying DPI Inspection of the content layers of the Internet protocol:
data mining
censorship British authorities have rebranded lawful protests as “domestic extremism”
treat any attempt to further a campaign, change legislation or domestic policy as probable cause for criminal surveillance Police are given “spotter cards” enabling them to identify key members of protest groups, despite the fact that these individuals have no criminal records. TPS refuse to confirm if it was used during the protests
One report stated that G20 prisoners were to have their images scanned though facial recognition software AND also that there would be vehicles "on the scene" equipped with cameras tied into a afacial recognition databases to identify any wanted, or other people who are “known to police”, whose images they would be able to capture in the crowds.
There are also anecdotal reports from people detained by police during "kettling" instances & at the detention centre that FRS was used Facial recognition software BUT the TPS has admitted to sending images to the Canadian Bankers Association (CBA), which will then use its facial recognition software to compare against images already in police databases to help identify suspects.
28,000 images came from private and police cameras, including the TPS CCTV cameras & 5,600 pictures came from undercover police officers. Implications? "If you're not doing anything wrong, it shouldn't matter who's watching." Police Infiltration:
the lower levels of a militant Quebec anarchist group
year-long investigation/ infiltration of SOAR by 2 undercover members of the Joint Intelligence Group Privacy is threatened:
The corrollary of democracy:
Protected by law
Underpins civil liberties
Keeps governments accountable What can I do? Blanket collection of personal information through kettling & mass detention as well as CCTV cameras allows police to keep track of who was at the protest and to create files on non-criminal citizens
What happens to this information? How long is it kept? How safely?
Are we really "innocent until proven guilty?"
Such information is already being used by law enforcement to harrass law abiding citizens in non-protest scenarios Practice Strong Privacy
tighten Facebook settings
don't give away personal information easily
know your rights - MFIPPA, FIPPA & PIPEDA
Surveillance Self-Defence Become political - get involved! G20 Surveillance on Flickr
Group documents the surveillance technologies & practices visible at the G20 http://www.flickr.com/groups/1460975@N23/ “The imposition of these cameras hasn't been done in a way that at least conforms to the privacy commissioner's guidelines which require public consultation. They've got to make a case for necessity for the cameras, and it's hard to believe all of them are actually necessary and will do a good job." ~ Dr. Andrew Clement, U of T Creates fear and hysteria among the public and prepares the ground for a Surveillance Society. In 2002 ACLU exposed the Denver Police dept as having monitored the peaceful protest activities of Denver area residents & keeping files on the lawful activities of advocacy organizations.
Computerized police files detailing physical characteristics, names, addresses, phone numbers vehicles and activities of activists and their spouses and associates.
Police labelled End the Politics of Cruelty & American Friends of Service Committee (a Quaker group) “Criminal Extremists” though no reference to criminal activity was given. Doublespeak:
& This Globalization Sh#t
13 September 2010 La Fin
(merci) Kate Milberry, PhD * http://www.geeksandglobaljustice.com Byron Sonne:
white hat hacker & security expert
expose the inadequacies of g20 security >> listen in on police scanners during the summit & disseminate information via Twitter
keeping track of government surveillance of activists online
arrested in a nightime raid of his home
charged with serious offenses - "Intimidation of a justice system participant by watch and beset" & "Intimidation of a justice system participant by threat."
denied bail - crowning jewel in $1.2 billion security tiara
Full transcript