US Police Display Powerful New Surveillance Tools

As the Black Lives Matter demonstrations continue across the US, security forces are deploying a whole new range of weapons, previously unseen in a US domestic setting. 

US security forces have weaponised riot gear in a violent effort to quell protests against police brutality, in the wake of George Floyd's death at the hands of a white policeman. Protests began peacefully the day after the former was killed in Minneapolis police custody. 

While monitoring protests is nothing new, the US authorities’ ability to potentially identify those in attendance from a distance and without detection has increased. 

Among new technologies deployed by police forces in countries like China, Germany, the US and Britain, are real-time facial recognition cameras, phone tracking tools known as IMSI catchers and drones to get a handle on protests and riots that have rocked the country

Drones 
The US Customs and Border Patrol (CBP) agency recently flew a surveillance drone normally used for border patrols over Minneapolis, the city at the hub of protests. The unmanned, winged aircraft fitted with a turbine engine and camera circling the city was a Predator drone, operated by the US Customs and Border Protection agency to monitor the protesters.

The Predator first gained notoriety in Iraq and Afghanistan, where it was widely used by the US military. The CBP said the drone “was preparing to provide live video to aid in situational awareness at the request of our federal law enforcement partners” but was diverted back upon reaching the city as authorities realised it was no longer needed.

The use of the drone was an example of how easy it was for some governments to repurpose military-grade surveillance equipment to monitor and discourage the exercise of civilian rights.

Tracking Tools
From facial recognition cameras to phone tracking devices, monitoring tools can be abused to prosecute activists and dissenters and target vulnerable groups and minorities, according to Privacy International. 

Individuals who posted on Facebook or Twitter were identified. Baltimore is one of the most prevalent examples that we have seen where law enforcement used a tool called Geofeedia, which looked at public feeds for social media to try to identify people’s locations during the 2015 protests in Baltimore where many people were arrested on completely unrelated charges because they were in the vicinity of the protests. 

Civil rights activists say these tools can be used to track protests, in some cases to keep the peace, but they can also be used to find organisers and even arrest protesters after the fact. 

Reuters:        Telegraph:      TRT World:       Marketplace

You Might Also Read:

Hong Kong Protesters Disrupted By Cyber Attacks:

Police Location App Used By Hong Kong Protesters Deleted:

 

« Half Of Lockdown Remote Workers Ignore Cyber Security
What Can Hold Up Your International Project? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CERT.AZ

CERT.AZ

The national Cyber Security Center of the Republic of Azerbaijan.

Center for Internet Security (CIS)

Center for Internet Security (CIS)

CIS is a nonprofit entity that harnesses the power of a global IT community to safeguard private and public organizations against cyber threats.

K2 Integrity

K2 Integrity

K2 Integrity is a preeminent risk, compliance, investigations, and monitoring firm - built by industry leaders to safeguard our clients’ operations, reputations, and economic security.

Digittrade

Digittrade

Digittrade develop and produce external encrypted hard disks and secure communications apps.

Balbix

Balbix

Balbix BreachControl™ is the industry’s first system to leverage specialized AI to provide comprehensive and continuous predictive assessment of breach risk.

Research Institute in Verified Trustworthy Software Systems (VeTSS)

Research Institute in Verified Trustworthy Software Systems (VeTSS)

The main purpose of VeTSS is to support program analysis, testing and verification, to achieve guarantees of software correctness, safety, and security.

CyberNet Albania

CyberNet Albania

Cybernet Albania has been providing IT support and services to small businesses since 2016. We strive to eliminate your IT issues before they cause downtime and impact your operations.

UK Cyber Security Council (UKCSC)

UK Cyber Security Council (UKCSC)

The role of The UK Cyber Security Council is to champion the cybersecurity profession across the UK, provide representation for the industry, accelerate awareness and promote excellence.

Anterix

Anterix

Anterix is focused on empowering the modernization of critical infrastructure and enterprise businesses by enabling private broadband connectivity.

HLB Mann Judd (Fiji)

HLB Mann Judd (Fiji)

HLB Mann Judd (Fiji) (formerly known as HLB Crosbie & Associates) is a well-established firm of accountants and business advisers in Fiji.

Amazon Web Services (AWS)

Amazon Web Services (AWS)

Amazon Web Services is the world’s most comprehensive and broadly adopted cloud platform, offering fully featured services from data centers globally.

Eviden

Eviden

Eviden is an Atos business that brings together its digital, big data and security business lines. It will be a global leader in data-driven, trusted and sustainable digital transformation.

Salus Cyber

Salus Cyber

Salus is a provider of world-class cyber security services, enabling our clients to identify and manage their cyber risks proactively and effectively.

Two99

Two99

Two99 provide tailored excellence in the areas of E-Commerce, Marketing, Consulting, and Cyber Security.

Bridgenet Solutions

Bridgenet Solutions

Bridgenet specialises as a top-notch Information and Technology Solutions Provider for businesses.

CorePLUS Technologies

CorePLUS Technologies

CorePlus solutions are designed to empower organizations with the tools they need to ensure the utmost protection for their assets, people, and information.