Back to home
Technology

Inside Chicago’s surveillance panopticon

Source

MIT Technology Review

Published

TL;DR

AI Generated

The article discusses the extensive surveillance network in Chicago, including tens of thousands of cameras and technologies like ShotSpotter. While some believe this surveillance enhances public safety, others argue it creates a surveillance panopticon that infringes on privacy and free speech. Activists like Lucy Parsons Labs have pushed back against surveillance technologies, such as license plate readers, by filing FOIA requests and analyzing data to reveal disparities and inefficiencies. The article also highlights the work of individuals like Brian Strockis, who pioneered the use of drones in law enforcement, and Mark Wallace, who advocates against red-light and speed cameras in Chicago. Additionally, it mentions the legal challenges faced by individuals like Derick Scruggs, who was detained due to a ShotSpotter alert, leading to a settlement prohibiting such actions in the future.

Read Full Article

Similar Articles

Oklahoma farmer arrested and jailed for trespassing during AI data center town hall — removed by officers after going a few seconds over allotted speaking time, trying to hand paperwork to counselors

Oklahoma farmer arrested and jailed for trespassing during AI data center town hall — removed by officers after going a few seconds over allotted speaking time, trying to hand paperwork to counselors

During a town hall meeting in Claremont, Oklahoma, farmer Darren Blanchard was arrested for trespassing after going slightly over his allotted speaking time and attempting to hand paperwork to counselors. The incident occurred during a discussion about the proposed Claremore Data Center Project, Project Mustang. Blanchard was removed by officers and taken to jail for not complying with requests to stop speaking and leave the premises. The project has faced opposition from residents concerned about its impact on public services and the lack of transparency surrounding its development. City officials defended the use of non-disclosure agreements for industrial projects, citing the need to protect proprietary information and ensure public safety.

Tom's Hardware
GitHub user creates open-source Nvidia GeForce Now client alternative — removes tracking, telemetry, and AFK limitations

GitHub user creates open-source Nvidia GeForce Now client alternative — removes tracking, telemetry, and AFK limitations

A GitHub user has developed an open-source alternative to Nvidia GeForce Now called OpenNOW, which removes tracking, telemetry, and AFK limitations. This client allows gamers to connect to Nvidia's cloud gaming service with added features not available on the original client. OpenNOW supports Linux natively and can stream games up to 4K@240 FPS, offering smoother gameplay. While it lacks some features like flight controls and Discord integration, it provides more privacy and customization options for users who prefer more control over their data.

Tom's Hardware
LinkedIn is spying on you, according to a new 'BrowserGate' security report — scripts stealthily scan visitors' browsers for over 6,000 Chrome extensions and harvest hardware data

LinkedIn is spying on you, according to a new 'BrowserGate' security report — scripts stealthily scan visitors' browsers for over 6,000 Chrome extensions and harvest hardware data

LinkedIn has been accused of spying on users through a JavaScript script that scans visitors' browsers for over 6,000 Chrome extensions and collects hardware data like CPU core count and screen resolution. The script also gathers device telemetry such as time zone and battery status. Many of the targeted extensions are LinkedIn-related tools, including those from competitors like Apollo and ZoomInfo. LinkedIn claims the scanning is to detect extensions that violate its terms of service, but the data collected could potentially be used to identify individuals. This aggressive client-side fingerprinting technique is not unique to LinkedIn, as other platforms like eBay have been found to engage in similar practices.

Tom's Hardware
Hong Kong border agents and police can demand device passwords, including from US citizens, under penalty of imprisonment — border controls become more invasive worldwide

Hong Kong border agents and police can demand device passwords, including from US citizens, under penalty of imprisonment — border controls become more invasive worldwide

Hong Kong border agents and police can now demand device passwords from travelers, including US citizens, under threat of imprisonment and fines. The law applies to all nationalities and allows for searches even for those transiting through Hong Kong. Failure to comply with decryption requests can lead to severe penalties, and the law extends to anyone authorized to access the device. This invasive trend in border controls is not unique to Hong Kong, as similar practices are seen in the US, Australia, and the UK, where refusal to unlock devices can result in detention and seizure.

Tom's Hardware

We use cookies

We use cookies to ensure you get the best experience on our website. For more information on how we use cookies, please see our cookie policy.