US Police Display Powerful New Surveillance Tools

As the Black Lives Matter demonstrations continue across the US, security forces are deploying a whole new range of weapons, previously unseen in a US domestic setting. 

US security forces have weaponised riot gear in a violent effort to quell protests against police brutality, in the wake of George Floyd's death at the hands of a white policeman. Protests began peacefully the day after the former was killed in Minneapolis police custody. 

While monitoring protests is nothing new, the US authorities’ ability to potentially identify those in attendance from a distance and without detection has increased. 

Among new technologies deployed by police forces in countries like China, Germany, the US and Britain, are real-time facial recognition cameras, phone tracking tools known as IMSI catchers and drones to get a handle on protests and riots that have rocked the country

Drones 
The US Customs and Border Patrol (CBP) agency recently flew a surveillance drone normally used for border patrols over Minneapolis, the city at the hub of protests. The unmanned, winged aircraft fitted with a turbine engine and camera circling the city was a Predator drone, operated by the US Customs and Border Protection agency to monitor the protesters.

The Predator first gained notoriety in Iraq and Afghanistan, where it was widely used by the US military. The CBP said the drone “was preparing to provide live video to aid in situational awareness at the request of our federal law enforcement partners” but was diverted back upon reaching the city as authorities realised it was no longer needed.

The use of the drone was an example of how easy it was for some governments to repurpose military-grade surveillance equipment to monitor and discourage the exercise of civilian rights.

Tracking Tools
From facial recognition cameras to phone tracking devices, monitoring tools can be abused to prosecute activists and dissenters and target vulnerable groups and minorities, according to Privacy International. 

Individuals who posted on Facebook or Twitter were identified. Baltimore is one of the most prevalent examples that we have seen where law enforcement used a tool called Geofeedia, which looked at public feeds for social media to try to identify people’s locations during the 2015 protests in Baltimore where many people were arrested on completely unrelated charges because they were in the vicinity of the protests. 

Civil rights activists say these tools can be used to track protests, in some cases to keep the peace, but they can also be used to find organisers and even arrest protesters after the fact. 

Reuters:        Telegraph:      TRT World:       Marketplace

You Might Also Read:

Hong Kong Protesters Disrupted By Cyber Attacks:

Police Location App Used By Hong Kong Protesters Deleted:

 

« Half Of Lockdown Remote Workers Ignore Cyber Security
What Can Hold Up Your International Project? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Wall Street Technology Association (WSTA)

Wall Street Technology Association (WSTA)

The Wall Street Technology Association (WSTA) provides financial industry technology professionals with forums to learn from and connect with each other.

Information Security Media Group (ISMG)

Information Security Media Group (ISMG)

Information Security Media Group is the world’s largest media organization devoted solely to information security and risk management.

Surrey Centre for Cyber Security (SCCS)

Surrey Centre for Cyber Security (SCCS)

The Centre focuses on three main research directions - Privacy and Data Protection, Secure Communications, and Human-Centred Security.

Global Forum on Cyber Expertise (GFCE)

Global Forum on Cyber Expertise (GFCE)

GFCE is a global platform for countries, international organizations and private companies to exchange best practices and expertise on cyber capacity building.

Jamcracker

Jamcracker

Jamcracker is a cloud services management and cloud governance solutions company, with more than a decade of experience providing industry leading software and services.

Iceberg

Iceberg

Iceberg has been established to provide companies with cyber security experts who will protect businesses from the unseen threat of cyber crime.

Redjack

Redjack

Redjack is a cutting-edge network analytics company focused on enterprise and ISP security and intelligence solutions.

TES

TES

TES is a provider of IT Lifecycle Services, offering bespoke solutions that help customers manage the commissioning, deployment and retirement of Information Technology assets.

Thrive

Thrive

Thrive delivers the experience, resources, and expertise needed to create a comprehensive cyber security plan that covers your vital data, SaaS applications, end users, and critical infrastructure.

Bionic

Bionic

Bionic is an agentless way to get control over your increasingly complex applications so you can manage, operate, and secure them faster and more efficiently.

Deft

Deft

Deft (formerly ServerCentral Turing Group) is a trusted provider of colocation, cloud, and disaster recovery services.

Pathway Communications

Pathway Communications

Established in 1995, Pathway Communications – is part of the Pathway Group of Companies, a Canadian IT Managed Services organization.

SecurityGen

SecurityGen

SecurityGen is a global cybersecurity start-up focused on telecom security, with a focus on 5G networks.

Positiwise Software Pvt Ltd

Positiwise Software Pvt Ltd

Positiwise Software offers end-to-end software development solutions to accelerate the digital growth of businesses.

Cyderes

Cyderes

Cyderes (Cyber Defense and Response) is a global, pure-play, full life-cycle cyber security services provider formed from the merger of Herjavec Group and Fishtech Group in 2022.

LMNTRIX

LMNTRIX

LMNTRIX eliminates the complexity and burden of cyber security for organizations struggling to prepare for, prevent and respond to cyberattacks.