1 February 2001
This relates to law enforcement asymmetrical warfare at the Super Bowl (below) and the National Security Study Group (Hart-Rudman commission) recommendations for asymmetrical warfare against the US homeland and the world:
Date: Thu, 1 Feb 2001 10:35:00 -0500 From: Chris Savage <chris.savage@CRBLAW.COM> Subject: And on the subject of privacy... To: CYBERIA-L@LISTSERV.AOL.COM I encourage folks to take a gander at: http://help.juno.com/privacy/agreement.html and in particular at section 2.5 (reproduced below). Is this widespread, or is Juno breaking new ground? And, while I can speculate, anyone really know wtf the "computational software" is? Chris Savage Cole, Raywid & Braverman, LLP 202-659-9750 Juno language follows: 2.5. You expressly permit and authorize Juno to (i) download to your computer one or more pieces of software (the "Computational Software") designed to perform computations, which may be unrelated to the operation of the Service, on behalf of Juno (or on behalf of such third parties as may be authorized by Juno, subject to the Privacy Statement), (ii) run the Computational Software on your computer to perform and store the results of such computations, and (iii) upload such results to Juno's central computers during a subsequent connection, whether initiated by you in the course of using the Service or by the Computational Software as further described below. In connection with downloading and running the Computational Software, Juno may require you to leave your computer turned on at all times, and may replace the "screen saver" software that runs on your computer while the computer is turned on but you are not using it. The screen saver software installed by Juno, which may display advertisements or other images chosen by Juno, is an integral part of the Computational Software and you agree not to take any action to disable or interfere with the operation of either the screen saver software or any other component of the Computational Software. You agree that, as between you and Juno, you shall be responsible for any costs or expenses resulting from the continuous operation of your computer, including without limitation any associated charges for electricity, and that you shall have sole responsibility for any maintenance or technical issues that might result from such continuous operation. You agree that, as between you and Juno, Juno shall have sole rights to the results of any computations performed by the Computational Software, including without limitation any revenues or intellectual property generated directly or indirectly as a result of such computations, without further compensation to you. If your usage of the Service is infrequent, Juno's ability to obtain the results of completed computations may be impaired. Consequently, you expressly permit and authorize Juno to initiate a telephone connection from your computer to Juno's central computers using a dial-in telephone number you have previously selected for accessing the Service; Juno agrees that it shall exercise such right only to the extent necessary, as determined in Juno's sole discretion, to upload the results of completed computations to Juno in a timely fashion; and you agree that, as between you and Juno, you shall be responsible for any costs and expenses (including without limitation any applicable telephone charges) resulting from the foregoing. Juno agrees that any software, data, or other materials downloaded to your computer in connection with the activities described in this Section 2.5 will comply with Juno's privacy policies, as reflected in the Privacy Statement. You agree that you will not attempt to reverse engineer any such software, data, or other materials or transfer or disclose any such software, data, or other materials, or the results of any such computations, to any third party. You acknowledge that your compliance with the requirements of this Section 2.5 may be considered by Juno to be an inseparable part of the Service, and that any interference with the operation of the Computational Software (including, but not limited to, any failure to leave your computer turned on at all times) may result in termination or limitation of your use of the Service. You acknowledge that Section 6 of this Agreement shall expressly apply to the activities described in this Section 2.5. ********************************************************************** For Listserv Instructions, see http://www.lawlists.net/cyberia Off-Topic threads: http://www.lawlists.net/mailman/listinfo/cyberia-ot Need more help? Send mail to: Cyberia-L-Request@listserv.aol.com **********************************************************************
Date: Thu, 1 Feb 2001 04:42:42 -0600 (CST) From: William Knowles <wk@c4i.org> To: John Young <jya@cryptome.org> Subject: Cameras scanned fans for criminals http://www.sptimes.com/News/013101/TampaBay/Cameras_scanned_fans_.shtml January 31, 2001 By ROBERT TRIGAUX TAMPA -- Were you one of the 100,000 fans and workers to pass through the stadium turnstiles at Sunday's Super Bowl? Did you smile for the camera? Each and every face that entered Raymond James Stadium for the big game was captured by a video camera connected to a law enforcement control room inside the stadium. In milliseconds, each facial image was digitized and checked electronically against the computer files of known criminals, terrorists and con artists of the Tampa Police Department, the FBI and other state and local law enforcement agencies. Sunday's Super Bowl was the first major sporting event to adopt the face-matching surveillance system. But the designers of the system expect other security-sensitive sporting events, ranging from the upcoming 2002 Winter Olympics in Salt Lake City to the hooligan-plagued soccer leagues in parts of Europe, to express great interest. The point? To gain immediate identification of people who have past ties to illegal activities. Images of individuals captured by the database system are not stored permanently, but could be used on game day if there is criminal activity at the stadium or law enforcement officials see someone wanted for a serious crime. The problem? Most Super Bowl fans had no clue their faces were being checked for matches with criminals. "I find it disturbing," said privacy expert Christine L. Borgman, professor and presidential chair in information studies at the University of California in Los Angeles. "It smacks of Big Brother societies that keep watch over people." Security officials counter that the database system is no more and possibly less intrusive than videotape cameras already in use at convenience stores, shopping malls or schools. In cooperation with the Tampa Sports Authority, the Super Bowl surveillance system was also used this past week at the NFL Experience adjacent to the stadium. The system, which relies on "biometric" technology to recognize faces, continues to be used by the Tampa Police Department in Ybor City, where 22 cameras monitor the entertainment district. Police have used cameras to watch for fights and crime in Ybor for several years, but recently those cameras were linked directly to the police department's own database of mug shots. "Places where large crowds are present, such as sporting events, are tempting targets for all types mischief, criminal behavior and larger threats," said Tom Colatosti, president of Viisage Technology in Littleton, Mass., whose software runs the face-identification system known as "FaceTrac." "The security undertaking for a game like the Super Bowl is extraordinary," he said. "Law enforcement is concerned about potential problems ranging from scalping tickets and pickpockets to aerial anthrax attacks." At Sunday's Super Bowl, any individuals matched with photo files in the database could be questioned or detained by officers of the joint task force who were circulating throughout the stadium complex. Several technology executives said Tuesday that their surveillance system did match a few fan faces with database mugs during the Super Bowl event. However, Tampa Police Department spokesman Joe Durkin said the system did not match any known con artist or terrorist, and there were no resulting arrests. The Police Department's network of cameras operating in Ybor's entertainment district was upgraded and tied to the new face-recognition system "within the last couple of weeks," Durkin said. Is the new surveillance system the latest twist on Big Brother? Face-matching surveillance already is well established at more than 70 casinos. But the system's biggest opportunities lie in more benign functions: Identifying customers at ATMs or participants in welfare programs, and screening people who want to enter secure workplace areas. At Raymond James Stadium, surveillance system cameras were focused only on people entering at turnstiles. No cameras were used inside to pan the fans inside. But cameras did sweep the crowds at the NFL Experience, indicating the growing reach of database systems to try and match faces even in large groups. At UCLA, professor Borgman questioned the technical ability of a system to identify individual faces so quickly. "If these surveillance systems spread, there may be a considerable margin of error in determining the identity of people who get snagged," she said. "And that is a big price to pay for your civil rights." - Contact Robert Trigaux at trigaux@sptimes.com or (727) 893-8405. *==============================================================* "Communications without intelligence is noise; Intelligence without communications is irrelevant." Gen Alfred. M. Gray, USMC ================================================================ C4I.org - Computer Security, & Intelligence - http://www.c4i.org *==============================================================*