US Police Display Powerful New Surveillance Tools

As the Black Lives Matter demonstrations continue across the US, security forces are deploying a whole new range of weapons, previously unseen in a US domestic setting. 

US security forces have weaponised riot gear in a violent effort to quell protests against police brutality, in the wake of George Floyd's death at the hands of a white policeman. Protests began peacefully the day after the former was killed in Minneapolis police custody. 

While monitoring protests is nothing new, the US authorities’ ability to potentially identify those in attendance from a distance and without detection has increased. 

Among new technologies deployed by police forces in countries like China, Germany, the US and Britain, are real-time facial recognition cameras, phone tracking tools known as IMSI catchers and drones to get a handle on protests and riots that have rocked the country

Drones 
The US Customs and Border Patrol (CBP) agency recently flew a surveillance drone normally used for border patrols over Minneapolis, the city at the hub of protests. The unmanned, winged aircraft fitted with a turbine engine and camera circling the city was a Predator drone, operated by the US Customs and Border Protection agency to monitor the protesters.

The Predator first gained notoriety in Iraq and Afghanistan, where it was widely used by the US military. The CBP said the drone “was preparing to provide live video to aid in situational awareness at the request of our federal law enforcement partners” but was diverted back upon reaching the city as authorities realised it was no longer needed.

The use of the drone was an example of how easy it was for some governments to repurpose military-grade surveillance equipment to monitor and discourage the exercise of civilian rights.

Tracking Tools
From facial recognition cameras to phone tracking devices, monitoring tools can be abused to prosecute activists and dissenters and target vulnerable groups and minorities, according to Privacy International. 

Individuals who posted on Facebook or Twitter were identified. Baltimore is one of the most prevalent examples that we have seen where law enforcement used a tool called Geofeedia, which looked at public feeds for social media to try to identify people’s locations during the 2015 protests in Baltimore where many people were arrested on completely unrelated charges because they were in the vicinity of the protests. 

Civil rights activists say these tools can be used to track protests, in some cases to keep the peace, but they can also be used to find organisers and even arrest protesters after the fact. 

Reuters:        Telegraph:      TRT World:       Marketplace

You Might Also Read:

Hong Kong Protesters Disrupted By Cyber Attacks:

Police Location App Used By Hong Kong Protesters Deleted:

 

« Half Of Lockdown Remote Workers Ignore Cyber Security
What Can Hold Up Your International Project? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

Lima Networks

Lima Networks

LIMA design and deliver IT Infrastructure solutions and services including managed Security Monitoring services.

eSentire

eSentire

eSentire is the authority in Managed Detection and Response Services, protecting the critical data and applications of organizations from known and unknown cyber threats.

KFSensor

KFSensor

KFSensor is an advanced 'honeypot' intrusion and insider threat detection system for Windows networks.

SafeCharge

SafeCharge

SafeCharge is a global provider of technology-based multi-channel payments services and risk management solutions for demanding businesses.

Kount

Kount

Kount's “decision engine” platform is ideal for managing fraud in online/telephone channels that process payments and onboard new customers.

Advantech

Advantech

Advantech is a leader in providing trusted innovative embedded and automation products and solutions. Activities include IoT security.

qSkills

qSkills

QSkills is an independent training provider specialized high-quality IT and IT management training courses including IT security.

ThreatMark

ThreatMark

ThreatMark provides fraud detection solutions for digital banking and payments.

Enosys Solutions

Enosys Solutions

Enosys Solutions is an IT security specialist with a skilled professional services team and 24x7 security operations centre servicing corporate and public sector organisations across Australia.

ERMProtect

ERMProtect

ERMProtect is a leading Information Security & Training Company that helps businesses improve their cybersecurity posture and comply with regulations.

Buglab

Buglab

The Buglab contest and Vigilante Protocol help companies all over the world to discover and fix vulnerabilities on their digital solutions or assets.

Police Digital Security Centre (PDSC)

Police Digital Security Centre (PDSC)

PDSC is a not-for-profit organisation, owned by the police, that works across the UK in partnership with industry, government, academia and law enforcement.

Cyberport

Cyberport

Cyberport is focused on facilitating the growth of major technology trends such as FinTech and cybersecurity as well as the emerging technologies of AI, big data and blockchain.

BugDazz

BugDazz

BugDazz pentest as a service (PTaaS) platform helps bringing in real-time results, detail coverage, & easy remediation workflows with compliance-ready reports.

IONIX

IONIX

IONIX (formerly Cyberpion) is the attack surface management solution that uses Connective Intelligence to shine a spotlight on exploitable risks across your supply chain.

Complete Cyber

Complete Cyber

Complete Cyber provide professional cybersecurity services and products to help secure your infrastructure, systems and data.