networking

Axis Communications opens new Experience Centre as it celebrates 20 years at the top

Video surveillance During a launch event Axis partners met with the senior management team and were invited to explore how the new centre in Luton, just outside London, operates. The event also coincided with the company s 20th anniversary. Martin Gren, co-founder of Axis Communications, opened the centre, along with Bodil Sonesson, the company s vice president of global sales.

Atul Rajput, regional director, Northern Europe led the toast. Rajput, who was one of the company s first employees, thanked partners for their collaboration over the last two decades. The Experience Centre takes end-users on a two-hour tour where they can experience Axis systems in different environments that simulate real issues. The tour is designed for small groups of people to allow in-depth discussion of challenges end-users might be facing. In the tour the Axis Camera Application Platform (ACAP) allows partners to solve specific customer problems by downloading third-party applications to Axis IP cameras and encoders. Typical problems include queue management, people counting and intrusion detection. The systems are all interactive. On passing through a gateway, an audio alert notifies participants that they are trespassing for example. In the most immersive part of the experience a dark room simulates challenging lighting conditions so that on leaving the room, participants are shown how Axis WDR cameras capture detailed images despite these conditions.

Other highlights include the networking centre, demonstrating Axis hardware and third-party switches, as well as the video management software control room, which uses a new user interface and can be integrated with access control and intercoms. Throughout the tour the emphasis is on applications, not simply products. End users and installers are encouraged to discuss security-related challenges they face, and explore how Axis technology could help resolve these.

CEDIA advises on smart wiring

Due to today s ever growing reliance on digital and smart appliances, security professionals are facing greater pressure to install complex cabling infrastructures needed to support smart home technology. Simon Buddle, Education Director at CEDIA EMEA, highlights the importance of installing an efficient and secure residential cabling system. He explains how professionals can provide clients with the right cabling requirements for the modern home of today and tomorrow.

Wiring in the evolving smart home Technology is increasingly infiltrating the home. With virtually all household technologies part of the home network, a simple phone line and TV antenna is no longer adequate to support the technology that is now available to homeowners. As a result, many require comprehensive wiring infrastructures and data network systems that are suitable for the modern smart home. In order to prevent opportunists from doing it themselves , it s crucial for security professionals to offer a a service that benefits homeowners. A correctly wired infrastructure at the very first stage of building or renovating is fundamental to homeowners who want technology. A common phrase heard among the home technology industry is the most expensive cable you have to install is the one that did not get installed in the first place . The basis of a smart home is the infrastructure, the cables. Not all properties require technology at this stage. But it is crucial for the correct wiring to be in place so that it is ready for the future.

A wired infrastructure can set up the home for future applications, whilst still preserving the d cor of the home and adding value. The rise of smart wiring presents a great opportunity for security professionals. The home technology sector presents a lucrative opportunity for these professionals to expand their reach and create new business. By offering a more complete service for the home, including specialist services, such as fitting reliable cabling infrastructure, security professionals can guarantee their businesses will be more resilient. It could help them through tough times as they pick up more work from new and existing customers. CEDIA s smart wiring education To make sure security professionals are up-to-date with the latest skills and knowledge, CEDIA has best practice advice for wiring smart homes. CEDIA has a number of courses for those who want to extend their cabling knowledge. One of their most popular education programmes is its one day Smart Home Wiring course. Attendees learn how to plan and install a wireless infrastructure that can withstand and integrate a range of modern technological demands.

Based on the Smart Home Infrastructure Recommended Guidelines , it promises to leave attendees with a clear understanding of how a modern home should be cabled for new technologies, and future flexibility. CEDIA s the Smart Home Infrastructure Recommended Guidelines is perfect for security professionals looking to move into the home technology market or gain a wider understanding of the subject. The document aims to help security professionals understand the comprehensive cabling infrastructure required for the modern home. It sets out a plan for a far more integrated and modern approach to wiring homes. CEDIA at IFSEC CEDIA is hosting a number of training sessions at IFSEC International 2017. The 90 minute training sessions will take place in South Gallery Suite 8 at ExCeL on 20 th and 21 st of June: 20th June: Introduction To Smart Home Technology IP Networking for the Smarthome WiFi Tips & Tricks For The Modern Home Intro to Audio, Video & Home Entertainment 21st June: Introduction To Smart Home Technology Building A Business In The Smart Home Marketplace Panel Discussion Lighting Control For The Secure Home Wiring Infrastructure For The Modern Home For more information on what advice, courses and literature CEDIA can offer security professionals, please visit www.cedia.co.uk Be smart come to IFSEC International 2017 The Internet of Things (IoT) is becoming an ever important element of various technology solutions for the smart home. The ability to connect, communicate with, and remotely manage a vast number of networked, automated devices via the internet is now inescapable.

This June, the latest smart products are on hand to test and trial throughout the exhibition as well as a dedicated smart seminar theatre, and training sessions on the show floor.

To avoid missing out register here

The 12 frauds of Christmas

The 12 frauds of Christmas On the third day of Christmas my true love gave to me 3 skimmed credit cards, 2 stolen parcels and a bogus online shop. Ok, this might not be on everyone s Christmas list but the National Fraud Intelligence Bureau have been promoting a campaign to highlight some of the fraudulent activities that see a marked increase in the festive season. Technology-based fraud fills most of the list, underlining the risk to people s security from online activities such as online shopping and even receiving e-cards.

The NFIB are encouraging people to be extra-vigilant to prevent themselves becoming victims of fraud this Christmas and encouraging people to report the crime if it happens so that Police and the NFIB can prevent more people being duped. The twelve frauds of Christmas in full are: 1. Online shopping 2.

Postal fraud 3. Auction fraud 4. Holiday Fraud 5.

Electronic e-cards 6. Ticketing fraud 7. Phishing emails 8.

Social networking 9. Cash point fraud 10. Voucher fraud 11.

Card not present fraud 12.

Mobile payments The NFIB and City of London Police have released the twelve frauds of Christmas list along with advice on how to avoid being a victim yourself.

If you have been a victim of fraud and you re in the UK you can report this at www.actionfraud.police.uk or by calling 0300 123 2040

Big Brother Surveillance Only Used for Corporate Marketing, Says …

Susanne Posel

In the UK, more than 200 CCTV cameras have been installed 1 in bathrooms and changing rooms to monitor students. Nick Pickles, director of Big Brother Watch said that parents were not aware of this new development and that schools should explain what is being done with the footage recorded.

These cameras were installed in 207 schools in England, Scotland and Wales. While the reasoning for this development is explained as necessary to divert crime, there is no significant research proving that CCTV cameras lower crime rates.

Big Brother Surveillance Only Used for Corporate Marketing, Says ...

Public surveillance in the US has turned toward drones for domestic policing. 2 Local law enforcement is pushing for the authority to use drones under the guise of conducting search and rescue operations, mapping traffic accidents and otherwise general surveillance activities.

Government agencies3 and police departments are in line to receive licenses to use these aerial craft regardless of the infringement on American s privacy. The suspicion that this is an excuse to get predator drones into American skies is being explained away. The fact that this would be a military operation 4 and not a police endeavor is not being clarified.

Earlier this month, the Congressional Research Service released a report 5 stating the prospect of drone use inside the United States raises far-reaching issues concerning the extent of government surveillance authority, the value of privacy in the digital age, and the role of Congress in reconciling these issues.

Meanwhile, the comments made on social media sites by users are being used against them in a court of law, according to a ruling 6 back in August. District Judge William Pauley III decided that violent comments made on Facebook are not protected under privacy legislation because they were made in a known public forum.

The police are given back doors into social networking7 sites to spy on users for the sake of searching for terrorists or criminal activity8. All the information shared on the internet is not protected 9 under the Constitution, according to the US court system which allows governments to syphon this data from internet providers in an intuitive referred to as deep packet inspection technology.

Recently, Apple was granted a patent that enables corporations to wirelessly disable the camera function on specific iPhones in determining locations. The supposition is that this technology could be used to prevent protesters from recording events at political protests or public gatherings.

The US Patent No. 8254902 10 can give the apparatus and methods of enforcement of policies upon a wireless device can be turned off without customer participation. As a failsafe to keep this possibility from being taken advantage of, the mobile phone would have to be within a designated sensitive area ; however police departments do not have to divulge where those areas are.

According to Twitter s Transparency Report, 11 the US government has made requests that are infringing on American privacy rights. Twitter states that we ve received more government requests in the first half of 2012, as outlined in this initial dataset, than in the entirety of 2011.

Cloud computing is also under surveillance as every conversation is recorded and filed. While Microsoft denies this is true, the adherence to their rules and regulations explains that all your personal information 12 is stored within Skype. In section 2 of their user contract explains: Our primary purpose in collecting information is to provide you with a safe, smooth, efficient, and customized experience. Skype collects and uses, or has third party service providers acting on Skype s behalf collecting and using, personal data relating to you, as permitted or necessary to . . .

In New York, thanks to Mayor Michael Bloomberg and Microsoft, the Domain Awareness System is one of the best pre-crime surveillance 13 systems and it is being beta-tested on the citizens of New York.

The Federal Bureau of Investigations just spent $1 billion to develop the Next Generation Identification System 14 (NGIS) that uses biometric identification technology15 to create an intricate database accessible to federal and local law enforcement. NGIS is a nationwide collaboration of mugshots, iris scans, DNA records, voice samples, CCTV recordings, photo databases and other biometric data that combine to create intricate profiles on every American regardless of their criminal record.

The mainstream would have us believe that marketing strategies are the reason why they spy on their customers.

Sarah Downey, Abine privacy analyst explains 16 how Facebook users should pay more attention to pop-up trackers and block them. Downey said: In addition to invading your privacy, these tracking requests can consume large amounts of data. And transferring lots of data takes time. Generally, the more tracking requests on a website, the slower that website loads. That s why DNT+ gets you surfing at 125% of the normal speed and with 90% of the bandwidth, compared to a browser without DNT+ running.

The giant Big Brother control known as Trapwire, according 17 to a June press release, states that this software is designed to provide a simple yet powerful means of collecting and recording suspicious activity reports. A system of interconnected nodes spot information considered to be suspect and then inputs it into the system to be analyzed and compared with data entered from other areas within a network for the purpose of identifying patterns of behavior that are indicative of pre-attack planning.

YouTube Preview Image

References

  1. ^ installed (rt.com)
  2. ^ domestic policing. (www.theiacp.org)
  3. ^ Government agencies (www.pakalertpress.com)
  4. ^ military operation (www.usatoday.com)
  5. ^ report (www.fas.org)
  6. ^ ruling (news.yahoo.com)
  7. ^ social networking (www.pakalertpress.com)
  8. ^ criminal activity (www.pakalertpress.com)
  9. ^ not protected (blog.alexanderhiggins.com)
  10. ^ US Patent No. 8254902 (patft.uspto.gov)
  11. ^ Transparency Report, (support.twitter.com)
  12. ^ personal information (occupycorporatism.com)
  13. ^ pre-crime surveillance (occupycorporatism.com)
  14. ^ Next Generation Identification System (occupycorporatism.com)
  15. ^ biometric identification technology (www.pakalertpress.com)
  16. ^ explains (occupycorporatism.com)
  17. ^ according (occupycorporatism.com)

Activist Post: Big Brother Surveillance Only Used for Corporate …

Susanne Posel, ContributorActivist Post1

In the UK, more than 200 CCTV cameras have been installed2 in bathrooms and changing rooms to monitor students. Nick Pickles, director of Big Brother Watch said that parents were not aware of this new development and that schools should explain what is being done with the footage recorded.

These cameras were installed in 207 schools in England, Scotland and Wales. While the reasoning for this development is explained as necessary to divert crime, there is no significant research proving that CCTV cameras lower crime rates.

Public surveillance in the US has turned toward drones for domestic policing.3 Local law enforcement is pushing for the authority to use drones under the guise of conducting search and rescue operations, mapping traffic accidents and otherwise general surveillance activities.

Government agencies and police departments are in line to receive licenses to use these aerial craft regardless of the infringement on American s privacy. The suspicion that this is an excuse to get predator drones into American skies is being explained away. The fact that this would be a military operation4 and not a police endeavor is not being clarified.

Earlier this month, the Congressional Research Service released a report stating:5

The prospect of drone use inside the United States raises far-reaching issues concerning the extent of government surveillance authority, the value of privacy in the digital age, and the role of Congress in reconciling these issues. Meanwhile, the comments made on social media sites by users are being used against them in a court of law, according to a ruling6 back in August. District Judge William Pauley III decided that violent comments made on Facebook are not protected under privacy legislation because they were made in a known public forum.

The police are given back doors into social networking sites to spy on users for the sake of searching for terrorists or criminal activity. All the information shared on the Internet is not protected7 under the Constitution, according to the US court system which allows governments to siphon this data from Internet providers in an intuitive referred to as deep packet inspection technology.

Recently, Apple was granted a patent that enables corporations to wirelessly disable the camera function on specific iPhones in determining locations. The supposition is that this technology could be used to prevent protesters from recording events at political protests or public gatherings.

The US Patent No. 82549028 can give the apparatus and methods of enforcement of policies upon a wireless device can be turned off without customer participation. As a failsafe to keep this possibility from being taken advantage of, the mobile phone would have to be within a designated sensitive area ; however police departments do not have to divulge where those areas are.

According to Twitter s Transparency Report,9 the US government has made requests that are infringing on American privacy rights. Twitter states that we ve received more government requests in the first half of 2012, as outlined in this initial dataset, than in the entirety of 2011.

Cloud computing is also under surveillance as every conversation is recorded and filed. While Microsoft denies this is true, the adherence to their rules and regulations explains that all your personal information is stored within Skype. In section 2 of their user contract explains:10

Our primary purpose in collecting information is to provide you with a safe, smooth, efficient, and customized experience. Skype collects and uses, or has third party service providers acting on Skype s behalf collecting and using, personal data relating to you, as permitted or necessary to . . . In New York, thanks to Mayor Michael Bloomberg and Microsoft, the Domain Awareness System is one of the best pre-crime surveillance11 systems and it is being beta-tested on the citizens of New York.

The Federal Bureau of Investigations just spent $1 billion to develop the Next Generation Identification System12 (NGIS) that uses biometric identification technology to create an intricate database accessible to federal and local law enforcement. NGIS is a nationwide collaboration of mugshots, iris scans, DNA records, voice samples, CCTV recordings, photo databases and other biometric data that combine to create intricate profiles on every American regardless of their criminal record.

The mainstream would have us believe that marketing strategies are the reason why they spy on their customers.

Sarah Downey, Abine privacy analyst explains13 how Facebook users should pay more attention to pop-up trackers and block them. Downey said: In addition to invading your privacy, these tracking requests can consume large amounts of data. And transferring lots of data takes time. Generally, the more tracking requests on a website, the slower that website loads. That s why DNT+ gets you surfing at 125% of the normal speed and with 90% of the bandwidth, compared to a browser without DNT+ running. The giant Big Brother control known as Trapwire, according14 to a June press release, states that this software is designed to provide a simple yet powerful means of collecting and recording suspicious activity reports. A system of interconnected nodes spot information considered to be suspect and then inputs it into the system to be analyzed and compared with data entered from other areas within a network for the purpose of identifying patterns of behavior that are indicative of pre-attack planning.

Susanne Posel is the Chief Editor of Occupy Corporatism15. Our alternative news site is dedicated to reporting the news as it actually happens; not as it is spun by the corporately funded mainstream media. You can find us on our Facebook page16.

References

  1. ^ Activist Post (www.activistpost.com)
  2. ^ installed (rt.com)
  3. ^ domestic policing. (www.theiacp.org)
  4. ^ military operation (www.usatoday.com)
  5. ^ report (www.fas.org)
  6. ^ ruling (news.yahoo.com)
  7. ^ not protected (blog.alexanderhiggins.com)
  8. ^ US Patent No. 8254902 (patft.uspto.gov)
  9. ^ Transparency Report, (support.twitter.com)
  10. ^ personal information (occupycorporatism.com)
  11. ^ pre-crime surveillance (occupycorporatism.com)
  12. ^ Next Generation Identification System (occupycorporatism.com)
  13. ^ explains (occupycorporatism.com)
  14. ^ according (occupycorporatism.com)
  15. ^ Occupy Corporatism (occupycorporatism.com)
  16. ^ our Facebook page (www.facebook.com)

The Training Platform: Social networking sites – what’s all the fuss about?

The Training Platform: Social networking sites – what’s all the fuss about? Can you afford to ignore the lure of social networking? Ken Livingstone and Amy Burrell explain why sites like LinkedIn, Facebook and Twitter are now a vital element in today’s education and business landscapes.

Facebook, Twitter, LinkedIn, MySpace, Bebo… the list goes on. These, by the way, are the social media sites we ve heard of and know about.

Wikipedia, though, lists over 200 social networking websites stressing that these are only the major active websites (for example, its listings don t include dating websites). In truth, social networking websites are everywhere these days and we re all actively encouraged to participate. However, many of us find this a challenge due to a lack of familiarity with the sites and how we might use them to best effect.

Questions like: Where do I start? , Which site(s) do I use? and What do I say? are all common.

We all know that networking s vitally important in this day and age, and we strive to network in person, so why is there a reluctance to embrace Internet-based options? What is social networking, and why should we embrace it? Social networking is essentially the use of web-based services to construct a public or semi-public profile of personal or business information and activities.

This is used to attract and build communication networks with other users who share a common interest. Such networking is now seen as the norm, so much so that the question to be asked probably shouldn t be: Why should I embrace social networking? but instead Can I afford not to?

There are many benefits to social networking websites. Here are some of them: Social networking sites are structured around shared interests so involvement in the right groups can connect you to a wide range of like-minded people. These sites provide opportunities to proactively search for similar people whether it s for personal reasons (eg making friends) or on a professional basis (eg identifying potential business partners, or sourcing staff with particular skills).

Many people have integrated social networking into their everyday life. Thus, social networking provides the opportunity to become part of someone s daily routine. However, note that this will only work if you produce messages/start discussions, etc that capture their interest.

This is particularly pertinent on services such as Twitter where your messages can become part of someone s daily Twitter feed if they choose to follow you. Social networking not only helps to sell the expertise of your company but also sells you as an individual. They allow you to develop relationships with potential clients and partners over time.

Thus, with fairly little maintenance you can keep up-to-date with others and they can remain up-to-date with you. This makes it easier to spot potential business opportunities as they emerge. Furthermore, communicating with your customers in a more personal way will make them feel like they re talking to a friend rather than a company.

This helps build trust in you, which will then encourage potential customers to do business with you rather than your competitors. Social networking sites offer an excellent opportunity to gather customer feedback. Customer recommendations may be used in future marketing campaigns, whereas constructive criticism can serve to enhance products and services.

Social networking sites can then also be used to advertise any improvements to services made following customer feedback. Social networking allows you to pitch products and services in a non-invasive way. People hate being bombarded with adverts, but social networking allows you to build a community around your business area.

Informal discussions can promote a positive, non-threatening presence on social media sites and supports active engagement with customers. Social networking sites help you keep connected to the marketplace as you can follow what others in your industry are doing. This helps you to remain competitive.

Social networking can be a means of establishing a brand and/or raising brand awareness. Social networking sites provide a simple outlet to advertise promotions. The online community allows you to stay in touch with people who are geographically distant or otherwise dispersed.

Discussion forums may be used to answer customer questions. An open forum approach can act as a Frequently Asked Questions Section, saving you time as you ll only need to answer questions once as all customers can see the response. This saves both time and money.

Maximising your use of social media As this list demonstrates, there are many benefits of social networking sites. However, they ll only reach their potential if they re used properly. There s no point setting up LinkedIn profiles, Twitter accounts and Facebook pages if they re a poor representation of the company and/or are not regularly updated with interesting information.

This brings us neatly to the potential hazards of social networking. One major problem is doing it badly! Poorly constructed social networking sites will reflect negatively on the business and, in some instances, may do more harm than good.

For example, if you re trying to sell your services as up-to-the-minute information solutions, failing to maintain your Twitter feed will reflect poorly on the product as potential customers may think: Well if they can t even maintain a Twitter feed, why would I trust them to maintain my information security software? Similarly, you cannot sell web design services through a poorly designed social networking page. It s important to remember that social networking sites can be time consuming to maintain as there s an expectation from followers that you ll provide regular updates.

Therefore, it s important to draw up a plan of which sites you re going to develop profiles for, what you want to use these profiles for and then allocate tasking to named members of staff to ensure the sites are set up properly and maintained effectively. What are the main risks involved? There are risks to having social networking accounts.

The most obvious is the theft of information. You need to be aware of who you are sharing information with. It s easy to build relationships using social networking sites without meeting people which limits the opportunities to assess whether they re genuine.

Although this risk is mostly associated with dodgy dates and concerns over child safety, you should consider corporate risks as competitors (or social engineers ) could use your social networking profile to access sensitive information about your business. It s therefore important to consider what information is shared, even in private forums. You may also wish to advise staff not to discuss work in their personal social networking accounts as this again could pose a risk to the business.

For example, posting information about work details, absences or other information could lead to an opening for imposters and social engineering tactics. Remember to set privacy settings appropriately and also the fact that, once you ve uploaded messages. these are almost impossible to erase.

You only need think about how many politicians have found themselves in trouble for posting an ill-conceived message on Twitter to understand the potential risks involved. It s also important to consider privacy in terms of intellectual property and copyright. There are grey areas about who owns material (such as photos, videos and other resources) uploaded to sites like Facebook.

Social networking: the bottom line It s clear that the benefits of social networking are wide-ranging. Furthermore, it looks like social networking sites are here to stay… and you don t want to be on the wrong side of the digital divide.

So, although it can feel overwhelming, we should all embrace social networking as it provides an excellent opportunity to promote products and services and build relationships with potential customers. That said, as with most things in life there are opportunities and risks. Therefore, it s important to set up social networking accounts with the appropriate privacy settings and with suitable guidance for use.

Ken Livingstone (managing director) and Amy Burrell (training consultant) are with Perpetuity Training Further information about Perpetuity Training In 2010, Perpetuity Training won the Security Excellence Awards category for Security Training Initiative of the Year on the basis of it distance learning programme for The Security Institute. Over the years, the organisation has developed exciting, interactive online training platforms which allow tailor-made specialist training packages to be delivered anywhere in the world. Perpetuity Training also offers a range of face-to-face short courses, including Level 4 professional awards in Managing Security Surveys and Security Management.

All of the company s short courses can be adapted to meet the needs of individual businesses, and bespoke training services are offered.

For more information call 0116-222 5550 or e-mail: [email protected] Join Perpetuity Training in the social media world: http://www.facebook.com/pages/Perpetuity-Training-Ltd/172946266100593 http://uk.linkedin.com/in/perpetuity http://twitter.com/PerpetuityTrain

UK Security Guard Stolen, Now Making the Rounds on Facebook …

Oct 1, 2012

This might be the worst crime prevention idea ever. A UK supermarket decided to save money and cut down on crime, they d just a cardboard cutout named PC Bobb to scare off shoplifters. PC Bobb didn t last long guarding the store. He went missing but was spotted making the rounds at local house parties and on social networking sites. If anyone has seen PC Bobb please contact authorities. His son boxy and his wife papertowel tube are offering rewards for his safe return.

Read more at telegraph.co.uk1.

References

  1. ^ telegraph.co.uk (www.telegraph.co.uk)

Warrantless Surveillance Through Pen Registers, Trap Devices by …

ACLU graph showing escalation in surveillance

Newly released documents 1from the American Civil Liberties Union (ACLU) show warrantless surveillance of Americans electronic communications by federal law enforcement agencies through pen register and trap devices sharply increased2. Notably, because of how easy it is for government to intercept communications, government now regularly exercises the authority to intercept to and from addresses of email messages, collect instant message conversation records and gather what the ACLU refers to as non-content data associated with social networking identities.

From 2009 to 2011, the combined number of original orders for pen registers and trap and trace devices used to spy on phones from the Justice Department increased 60%. The number rose from 25,535 to 37,616. And, during this period, the ACLU found, More people were subjected to pen register and trap and trace surveillance in the past two years than in the entire previous decade. The number of people, who had their telephones subjected to this kind of surveillance tripled.

The ACLU examined the documents and found an increase in orders targeting email and network communications data. Though the use of this surveillance may be rare, it increased exponentially 361% between 2009 and 2011.

Pen register and trap and trace devices, the ACLU informs in a post on their website, are powerfully invasive surveillance tools3 that were, twenty years ago4, physical devices that attached to telephone lines in order to covertly record the incoming and outgoing numbers dialed. These devices are now typically used to monitor information about communications. Pen register devices help government collect outgoing data while trap and trace devices help government collect incoming data including phone numbers of incoming/outgoing calls and the time, data and length of calls.

To put the findings into further context, the ACLU notes, Earlier this year, the New York Times reported5 that cellphone carriers received 1.3 million demands for subscriber information in 2011 alone. And an ACLU public records project revealed6 that police departments around the country large and small engage in cell phone location tracking.

The findings further prove surveillance of US citizens is sharply escalating. It also shows that, as surveillance increases, so too does state secrecy because the national security state does not want the public to know the extent to which it is spying on their everyday communications is increasing.

The ACLU had to file a Freedom of Information Act lawsuit to force the release of documents showing the use of this surveillance had risen. There are pen register reporting requirements, which Congress passed, to ensure some modicum of transparency. Congress could release the reports on a routine basis. The reports could go up online. Instead, Congress, the ACLU suggests, have apparently filed them away in an office somewhere on Capitol Hill.

The Justice Department (specifically, the attorney general) is subject to a requirement by Congress to submit annual reports on the use of pen register and trap and trace devices. The reports are to include, as the ACLU details:

The period of interceptions authorized by each order and the number and duration of any extensions of each order

The specific offenses for which each order was granted

The total number of investigations that involved orders

The total number of facilities (like phones) affected

The district applying for and the person authorizing each order

But, between 2000 and 2008 the two terms that President George W. Bush was in the White House, no annual reports were submitted to Congress. Paul F. Schwartz, a professor of law at UC Berkeley, reported7 in 2008, The reports do not appear to have been made annually, but as one document dump with five years of reports in November 2004. The reports also fail to detail all of the information that the Pen Register Act requires to be shared with Congress.

Additionally, author of Surveillance or Security?: The Risks Posed by New Wiretapping Technologies, Susan Landau, detailed in her book how data released in pen register reports has often been:

Missing required information, such as crime involved and district in which the interception occurred. This makes it impossible to connect a surveillance to a particular crime and leaves no way to determine the effectiveness of pen registers and trap and traces that the DoJ has been increasingly performing

Meaning, it is hard to tell if all this snooping actually significantly aids law enforcement in solving or reducing crime. Also:

While historical data from the 1990s shows that the total of pen registers and trap-and-trace orders was somewhere between ten and fifty times the number of Title III warrants, the recent numbers released to Congress show a sharp break from that pattern with much lower numbers of pen registers and trap and traces than expected. In addition to pure pen register and trap and trace, law enforcement has also been using hybrid orders combining past and future user locations in a single request. In 2009, the four major wireless carriers have been receiving roughly twenty thousand orders annually for such hybrid data. Thus it is likely that underreporting has been occurring

All of which suggests the increase in surveillance may be sharper than what data in the released documents indicates.

What is in the documents is the bare minimum amount of details the federal government is required to release to the public. According to the ACLU:

Even though we now have the reports, much remains unknown about how the government is using these surveillance tools. Because the existing reporting requirements apply only to surveillance performed by the Department of Justice, we have no idea of how or to what extent these surveillance powers are being used by other law enforcement agencies, such as the Secret Service, Immigration and Customs Enforcement, or state and local police

The legal standard for conducting this surveillance is lower8 than it is for wiretaps and other content-collecting technology. All government has to do is submit certification to a court indicating it is seeking data that is relevant to an ongoing criminal investigation. This is because the government has convinced judges there is a difference between content/non-content data and spying on non-content data is not invasive like spying on content data. (This would be one way to justify surveillance of those alleged to be part of or connected to WikiLeaks or any other dissident organization challenging the US government.)

Thus, the government is able to exercise secret surveillance.

Kevin S. Bankston of the Electronic Frontier Foundation wrote9 in a University of San Francisco Law Review article in 2007 that the Justice Department regularly applies for and receives secret surveillance authority from magistrate judges. The authority is based on legal arguments that are dubious at best and deceptive at worst. It has achieved this erroneous authority through reliance on often-unspoken and legally unsound arguments that are deployed for years at a stretch without being subjected to meaningful judicial scrutiny.

He described case studies, which raised the following questions: How many thousands of illegal and unconstitutional surveillances have been authorized in this manner? What other types of unlawful surveillance are federal prosecutors asking for and obtaining the permission to conduct? And, as one newly vigilant and obviously frustrated magistrate asked, How long has this been going on?

Without courts willing to challenge the legality of operations by the pervasive and growing surveillance state, without a Congress willing to be the check on executive power that it is supposed to be, there is no reason to believe the increase in monitoring and spying will reverse. And, worse, how Americans are being monitored and spied upon will become increasingly difficult to figure out as the secrecy regime the federal government imposes on the public becomes more entrenched and people become more subservient to officials, who claim citizens should not be privy to how their government is watching their everyday activities.

References

  1. ^ documents (www.aclu.org)
  2. ^ increased (www.aclu.org)
  3. ^ surveillance tools (ssd.eff.org)
  4. ^ twenty years ago (openjurist.org)
  5. ^ reported (www.nytimes.com)
  6. ^ revealed (www.aclu.org)
  7. ^ reported (www.paulschwartz.net)
  8. ^ lower (en.wikipedia.org)
  9. ^ wrote (papers.ssrn.com)

Network Security Consultant – Reading, Berkshire – South East …


The role will include travel and meetings with customers both from the initial introduction as a Technical Representation with Sales through to on-site installations. We would expect the successful candidates to have excellent customer facing, hands-on networking, wireless and security appliance experience. You should be studying for a networking qualification, and have some experience of working in a networking environment.

We are currently looking for self-motivated, fast-learning network and security consultant with excellent communication skills to enhance our Technical Service’s Team. The role will involve the design, installation and support of LAN, WAN and WLAN infrastructures based around our core products: HP, Trapeze and Fortinet. Experience of Microsoft Server 2008 NPS, NAP and Client technologies would be a strong advantage.

Full training on the systems that we work with will be given and professional qualification advancement is fully supported.
Required qualifications/experience:
* Experience in managed wireless solutions.
* Designing and commissioning wireless networks from pre-produced plans.
* Excellent understanding of TCP/IP.
* Studying for a networking qualification.
* Switch, router and firewall configuration, administration, troubleshooting, fault finding and diagnostic skills.
* Basic knowledge of Windows Server 2003 IAS, Windows server 2008 NPS and NAP.
* Experience with ADSL and other WAN technologies
* Experience with HP/3com networking would be an advantage

Security Informed Altronix teams with up AMID Strategies and …

In today s news round-up, MOBOTIX Corp. and Pivot3 have recently announced 1that the Municipality of Anchorage in Alaska has deployed a comprehensive surveillance system at the Anchorage Downtown Bus Transit Center. In corporate news, Altronix has teamed up with AMID Strategies 2to further increase the company s presence with architects and engineers (A&Es), and security consultants.

In events news, a number of companies will be showcasing a variety of new products at next week s Security Essen 2012. Xtralis will exhibit solutions from its HeiTel Digital Video and ADPRO security portfolios, as well as smoke and gas detection with VESDA, ICAM, ECO, and OSID product lines. ONVIF will host an open panel discussion and networking event to examine the current state of standardisation initiatives on the security industry. Also at Essen, AirLive will showcase its newest Intelligent Video Surveillance (IVS) and Polycontrast Interference Photography (PIP) IP Cameras. Read more security news 34567

References

  1. ^ MOBOTIX Corp. and Pivot3 have recently announced (www.sourcesecurity.com)
  2. ^ Altronix has teamed up with AMID Strategies (www.sourcesecurity.com)
  3. ^ Security Essen 2012 (www.sourcesecurity.com)
  4. ^ Xtralis will exhibit solutions from its HeiTel Digital Video and ADPRO security portfolios (www.sourcesecurity.com)
  5. ^ ONVIF will host an open panel discussion and networking event (www.sourcesecurity.com)
  6. ^ AirLive will showcase its newest Intelligent Video Surveillance (IVS) (www.sourcesecurity.com)
  7. ^ Read more security news (www.sourcesecurity.com)