mass surveillance
Recently Published Documents


TOTAL DOCUMENTS

216
(FIVE YEARS 94)

H-INDEX

9
(FIVE YEARS 4)

2021 ◽  
pp. 135406612110631
Author(s):  
Monika Heupel ◽  
Caiden Heaphy ◽  
Janina Heaphy

It is well known that in the wake of 9/11, the United States committed various extraterritorial human rights violations, that is, human rights violations against foreigners outside of its territory. What is less known is that the United States has gradually introduced safeguards that are, at least on paper, meant to prevent its counter-terrorism policies from causing harm to foreigners abroad or, at least, to mitigate such harm. Based on three case studies on the development of safeguards related to torture, targeted killing, and mass surveillance, we show that two mechanisms, coercion and strategic learning, deployed either on their own or in combination, can account for the development of such safeguards. By contrast, we found no evidence of a third mechanism, moral persuasion, having any direct effect. In other words, US policymakers opt to introduce such safeguards either when they face pressure from other states, courts, or civil society that makes immediate action necessary or when they anticipate that not introducing them will, at a later date, result in prohibitively high costs. We did not find evidence of US policymakers establishing safeguards because they deemed them morally appropriate. From this we conclude that, although the emerging norm that states have extraterritorial (and not just domestic) human rights obligations may not have been internalized by key US policymakers, it nevertheless has a regulative effect on them insofar as the fact that relevant others believe in the norm restricts their leeway and influences their cost–benefit calculations.


2021 ◽  
Author(s):  
Vindhya Devalla ◽  
Cris Thomas ◽  
Adthithiyan Neduncheran ◽  
Shiv Capoor ◽  
Amit Kumar Mondal

Abstract Surveillance and reconnaissance play a very important role in military and civil aspects. They are the key factors in military tactics and in the event of civilian calamities. In case of naval warfare, the submarines which are operating under deep water are required to carry out open land mass surveillance in an efficient manner without reaching to the water surface nor revealing their presence and position. This research paper proposes the conceptualized design to develop an autonomous unmanned octocopter system which is capable of being launched from an underwater platform such as submarines, with the help of a tethered launching mechanism known as octopod, to carry out surveillance, reconnaissance and payload delivery. In this paper, we present a novel method for development of UAV with special application on aerial survey from underwater platforms. A variety of design options which are investigated from various trade studies to evaluate the performance along with design configuration to satisfy the specific requirements are also presented in this paper.


2021 ◽  
pp. 1-12
Author(s):  
Swati Srivastava

Big technology companies like Facebook, Google, and Amazon amass global power through classification algorithms. These algorithms use unsupervised and semi-supervised machine learning on massive databases to detect objects, such as faces, and to process texts, such as speech, to model predictions for commercial and political purposes. Such governance by algorithms—or “algorithmic governance”—has received critical scrutiny from a vast interdisciplinary scholarship that points to algorithmic harms related to mass surveillance, information pollution, behavioral herding, bias, and discrimination. Big Tech’s algorithmic governance implicates core IR research in two ways: (1) it creates new private authorities as corporations control critical bottlenecks of knowledge, connection, and desire; and (2) it mediates the scope of state–corporate relations as states become dependent on Big Tech, Big Tech circumvents state overreach, and states curtail Big Tech. As such, IR scholars should become more involved in the global research on algorithmic governance.


Water ◽  
2021 ◽  
Vol 13 (20) ◽  
pp. 2897
Author(s):  
Sadhana Shrestha ◽  
Emi Yoshinaga ◽  
Saroj K. Chapagain ◽  
Geetha Mohan ◽  
Alexandros Gasparatos ◽  
...  

Wastewater-based epidemiology (WBE) is an approach that can be used to estimate COVID-19 prevalence in the population by detecting severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2) RNA in wastewater. As the WBE approach uses pooled samples from the study population, it is an inexpensive and non-invasive mass surveillance method compared to individual testing. Thus, it offers a good complement in low- and middle-income countries (LMICs) facing high costs of testing or social stigmatization, and it has a huge potential to monitor SARS-CoV-2 and its variants to curb the global COVID-19 pandemic. The aim of this review is to systematize the current evidence about the application of the WBE approach in mass surveillance of COVID-19 infection in LMICs, as well as its future potential. Among other parameters, population size contributing the fecal input to wastewater is an important parameter for COVID-19 prevalence estimation. It is easier to back-calculate COVID-19 prevalence in the community with centralized wastewater systems, because there can be more accurate estimates about the size of contributing population in the catchment. However, centralized wastewater management systems are often of low quality (or even non-existent) in LMICs, which raises a major concern about the ability to implement the WBE approach. However, it is possible to mobilize the WBE approach, if large areas are divided into sub-areas, corresponding to the existing wastewater management systems. In addition, a strong coordination between stakeholders is required for estimating population size respective to wastewater management systems. Nevertheless, further international efforts should be leveraged to strengthen the sanitation infrastructures in LMICs, using the lessons gathered from the current COVID-19 pandemic to be prepared for future pandemics.


2021 ◽  
pp. 173-187
Author(s):  
Charles Weiss

Information warfare is part of the technology-based challenge by China and Russia to the post–World War II liberal order. Russia uses traditional and social media in a long-range, systematic, worldwide disinformation campaign to undermine Western democracies and alliances and the idea of objective truth. China seeks to dominate the technology, management, and policy of the future Internet through its competitive 5G technology, so as to surpass the United States politically and technologically. It exports the techno-authoritarian system of mass surveillance and artificial intelligence that it developed to control its Uyghur minority. Like a nuclear attack, a large-scale cyberattack could spiral out of control into a cyber-apocalypse in the absence of agreed guidelines. But to authoritarian governments, the free flow of information is also a form of cyberattack, complicating negotiations. It is critically important to develop internationally agreed norms for cyberwarfare, building on the Tallinn Manual and similar efforts. This will take time.


2021 ◽  
Author(s):  
Dúnia Marchiori ◽  
Alexandre A. Giron ◽  
João Pedro A. do Nascimento ◽  
Ricardo Custódio

Snowden's revelations about mass surveillance brought to public attention devastating attacks on cryptographic algorithm implementations. One of the most prominent subsets of these attacks is called Algorithm Substitution Attacks (ASA), where a subverted implementation leaks sensitive information. Recently, it has been proposed to modify TLS implementations to use Post-Quantum Cryptography (PQC). In this paper, we propose and analyze ASA in two PQC schemes that can be used in TLS. We attacked the Kyber Key Encapsulation Mechanism (KEM) and Falcon Signature and successfully deployed them in a TLS implementation. Results show that timing analysis can distinguish our Falcon subversion, but it is not enough to detect our attacks deployed in TLS.


Pathogens ◽  
2021 ◽  
Vol 10 (10) ◽  
pp. 1259
Author(s):  
Ipsita Pal Bhowmick ◽  
Tulika Nirmolia ◽  
Apoorva Pandey ◽  
Sarala K. Subbarao ◽  
Aatreyee Nath ◽  
...  

With India aiming to achieve malaria elimination by 2030, several strategies have been put in place. With that aim, mass surveillance is now being conducted in some malaria-endemic pockets. As dry season mass surveillance has been shown to have its importance in targeting the reservoir, a study was undertaken to assess the parasite load by a sensitive molecular method during one of the mass surveys conducted in the dry winter period. It was executed in two malaria-endemic villages of Dhalai District, Tripura, in northeast India, also reported as P. falciparum predominated area. The present study found an enormous burden of Rapid Diagnostic Test negative malaria cases with P. vivax along with P. vivax and P. falciparum mixed infections during the mass surveillance from febrile and afebrile cases in dry winter months (February 2021–March 2021). Of the total 150 samples tested, 72 (48%) were positive and 78 (52%) negative for malaria by PCR. Out of the 72 positives, 6 (8.33%) were P. falciparum, 40 (55.55%) P. vivax, and 26 (36.11%) mixed infections. Out of 78 malaria negative samples, 6 (7.7%) were with symptoms, while among the total malaria positive, 72 cases 7 (9.8%) were with symptoms, and 65 (90.2%) were asymptomatic. Out of 114 samples tested by both microscopy and PCR, 42 samples turned out to be submicroscopic with 4 P. falciparum, 23 P. vivax, and 15 mixed infections. Although all P. vivax submicroscopic infections were asymptomatic, three P. falciparum cases were found to be febrile. Evidence of malaria transmission was also found in the vectors in the winter month. The study ascertained the use of molecular diagnostic techniques in detecting the actual burden of malaria, especially of P. vivax, in mass surveys. As Jhum cultivators in Tripura are at high risk, screening for the malarial reservoirs in pre-Jhum months can help with malaria control and elimination.


Politics ◽  
2021 ◽  
pp. 026339572110097
Author(s):  
Rafeef Ziadah

The United Arab Emirates (UAE) has made headlines for its use of mass surveillance technologies against UAE residents, as well as opponents externally. Under the guise of protecting national security, there has been a proliferation of state-led initiatives to monitor public spaces and online activity across the UAE, making the country an important laboratory for advanced surveillance tools. This article takes as a starting point that despite claims to being race-neutral and scientific, surveillance technologies have an embedded racial bias and operate according to context to (re)produce forms of state control and racial social relations. Reviewing the introduction of multiple surveillance technologies, this article traces the rationales used to racially order space and define deviance in the UAE context, emphasising questions of race, migration status and labour, to understand how the state defines, codifies, and regulates an ethno-racial hierarchy.


Sign in / Sign up

Export Citation Format

Share Document