Recent orders

Use of Facial Recognition Technologies

Use of Facial Recognition Technologies

Student’s Name:

Affiliation:

Course:

Instructor:

Date:

Abstract

Advancement in technologies has helped humans realized various goals in life. The use of facial recognition technologies has enabled the enforcement agents to capture evidence for investigating criminal activities. This has been an efficient tool for promoting crime deterrence in society. Contrary, these technologies have raised issues over racial profiling, brutality, and wrongful arrest by law enforcement agencies. The move to see the ban on using these technologies gained momentum following the killing of George Floyd in Minnesota. Ever since large data companies and states are progressively formulating acts that would see them rolling out of the federal government provides. Different countries have developed various statutes such as in Illinois, which provide a chance of suing the perpetrator if they fail to follow necessary guidelines in obtaining information. Texas should focus on maintaining its security through FRT; these would give the enforcement authority the power to conduct an investigation that would help identify people living in the states illegally.

Facial Recognition Technologies

The use of face recognition has gain popularity in the past few years. Different states and law enforcement agents view face recognition as a tool for unmasking criminal activities. Notably, incorporating these recognition technologies to enhance locating and even underline various incidences of illegal activities. Ideally, the most crucial technologies that have raised heated debate are license plate readers and facial recognition technologies. Different advancement in facial recognition technology comes with significant advantages, particularly for civilians. Significantly, they improve people’s safety in the streets as investigation bodies can easily follow-up suspects of a given crime (Wright, 2018). Real-time FRT can provide the police departments with relevant information to help deter terrorism, help identify subjects, and recognize mentally ill people or some critical aspects requiring some urgency. Lack of efficient regulation has led to many states considering blocking facial recognition technologies in combating criminal activities.

Uncontrolled use of facial recognition technologies has prompted different states and organizations to question their efficiency in monitoring criminal activities in the community. In Seattle, private organizations have formed a joint effort to undermine the use of real-time FRT in their operations. An elegant example is Microsoft’s move; the corporation had decided to call off technologies sales to allow the federal government to control how various departments employ the technology. Facial recognition technologies have increased incidences of racial profiling and police brutality.

Big firms such as Amazon and IBM protested over the use of RT-FRT in opposition to the current incidence of brutality and exposure civilians to racial profiling. Although Microsoft has decided to avoid selling technology to the police department, some states, through backed legislation, further continue the use these technologies. Notably, Microsoft would continue with the Californian police department services if they agree to implement technology under strict follow up. The uproar following the killing of an unarmed George Floyd has led to the belief that there is a need to revive the police department to avoid the emergence of violent cases. Not only do they use face recognition technology to provide a platform for harassment of civilians, but they also offer an opportunity for wrongful arrest. The video-image that emerges with FRT could lead to capturing images that closely resemble a given person, and lack of enough evidence may see that person getting into custody.

Critical evidence shows that different states have enacted various statutes that limit the use of body cameras. For instance, there is a heated debate on ending the use of FRT in Oregon; the city council at Portland will be discussing using the technology. There are some expectations that the boards will discontinue its use among the police in the states. Other states, including Oakland, Somerville, California, and San Francisco, terminated RFT use by city agents. The other States which have recent record moves include Seattle’s police department, which ended their service last year.

States government can formulate and enact laws that provide for the provision of services in the society. Significantly, the approach matters depending on their urgency and the outcry of the community. The state of Hampshire, Oregon, and recently California become some of the States that have prohibited the formulation and enforcement of the law regarding facial recognition technologies. Illinois enacted a law that allows civilians to sue organizations and firms that require finger prints, retina scans, and facial recognition technologies. Texas and Washington have similar provisions like Illinois; their laws do not provide for private suits.

The move to criminalize facial recognition technology has raised concern over the past few years, with the killing of George Floyd being the latest case. The alarming rates of police brutality have seen many states focusing on withdrawing the use of these technologies to promote safe handling of suspects by a police officer. In line with different States, representatives’ house has received a reform bill concerning the ongoing protest on racial profiling. The house of representatives will shape how the police department will embrace the use of these technologies. Besides, this will act as an approach to enhancing people’s security while in respective states.

In Washington, DC, facial recognition came to a halt after an uproar from the civilians. Most people have cited excessive use of power and wrongful arrest by the police, which cost people their freedom and money in bonds. The senior legislative counsel based in Washington DC highlighted that facial recognition technologies lack proper algorithm to capture darker skin tones (Simonite, 2020). The counsel further indicated that the department would consider using the technologies if the central aspect of liberty is paramount. The proposed bill not only focuses on Washington but also on other states.

The tabled bill requires that police depart to advocate for better technologies such as body-worn cameras or cameras mounted on their vehicle to help them capture criminal activities. The provisions in the proposed bills coming from various states further require the department to secure a warrant to employ facial recognition bodycam footage (Simonite, 2020). Notably, the officers involved must present their ideas logically to convince the judge of technology’s importance in unmasking crime or enhancing the ongoing investigation.

The move to have facial recognition technology scrapped off from the police department raises concerns over their use as they evaluate data from other technologies (Simonite, 2020). The technology has been crucial in safeguarding the business. Most of the information regarding criminal activities come from private firms and institutions. With these technologies help, they get to understand the proprietors of illegal activities in their neighborhood. Most lawmakers seek to establish some coherent facial recognition technologies for use by the businesses and enforcement agents. The current facial recognition technologies applied in states lack standardization, with some states lacking issues to present against the technologies. In line with racial profiling, brutality, and wrongful arrest, facial recognition, particularly in protests and political rallies, interferes with the first amendments’ provision. People may use these technologies to spread hatred and instill fear into others over their rights to participate in demonstrations and activities involving airing their grievances.

A handful of cities in various states have put up a ban on the use of FRT since 2019. This year, most states’ legislative bodies have seen the importance of enacting these laws to regulate its use. Notably, ten States have tabled bills focusing on the regulation of facial recognition software. There is heightened demand in Washington, notably Seattle, due to the efforts made by Amazon and Microsoft in overseeing the scraping of the technologies (Johnson, 2020). Lawmakers in Washington have focused on jointly supporting the implementation of the Washington state privacy act, also known as SB6281. Enactment of the show would require a concise follow-up on data privacy and the imposition of meaningful human review to justify the use of RFT in the social and private sectors.

Maintain the privacy of individuals is crucial in promoting liberty in the united states. The use of facial recognition technologies brought in an aspect of promoting individual photos for criminal activities screening. In Illinois, problems have emerged where the biometric information privacy act (BIPA) had initially curtailed on all forms of gathering and promoted the FRT use without involving parties (Germain, 2020). The company had implemented software on various devices and had acquired clear images of more than half a million individuals without their knowledge. The company was scheming and obtained its data from special occasions such as a wedding, graduation. To control the outcry, the state government at Illinois provided information regarding the use of FRT and incidences, where people can sue enforcement agencies (Germain, 2020). First, the law’s provision requires that individuals should consent to participate in any interrogation requiring the use of facial recognition technologies. The legal requirement further highlights some technologies that people may employ rather than FRT to obtain data from participants or suspects (Germain, 2020). According to BIPA, violation of privacy is a matter of significant concern, and under these provisions, people can sue the organization. Therefore, organizations such as creative AI are liable to questioning the presentation of claims following dissatisfaction by society members.

According to Collin (2020), some states have passed the ESSB 6280 to control FRT use in urban settings. States have the obligation of implementing the various provisions of the enacted law. Conversely, states may decide to enforce their choice of regulations depending on how effective they can restoring social order. ESSB 6280 aims at promoting the independence of States in the use of facial recognition technologies by enabling them to discover the potential benefits and the disadvantages. Based on a utilitarianism approach, the government should consider if it is logical or illogical to implement such technologies. The Act predominantly focuses on the facial recognition services; the Act, however, does not contradict or violate the provisions of the public recording act (PRA). Therefore, redact the footage would a bleach on the provided laws and could attract a penalty.

Washington will require its enforcement agencies to comply with the statute’s provision to promote citizens’ privacy and defending them against profiling and police brutality. In an attempt to discontinue the use of FRT, cities embraced Community Control Over Police Surveillance Ordinance. The ordinance enables towns in different states to formulate laws that will allow them to roll out from these technologies. This approach has helped cities quit ban the use while other cities are working towards adopting statutes that do not favor FRT. Although states may have some form of sovereignty in addressing facial recognition technologies, there is some limitation as there is no revocation of federal government act authorizing the use of FRT.

The current border issue in Texas continues to interfere with local and federal government activities. Besides, illegal immigration poses a danger to state security as this would be an efficient route for terrorists and smugglers. Texas should concern implementing facial recognition technologies by enforcement agents; this would be a practical approach toward eliminating illegal immigration. The technology would help capture people’s detail from Mexico into the united states legally or illegally. Implementation of FRT protects our people from external forces: this should entail accessing details of immigrants living in Texas and those entering the country. Besides, there should be a comparison to identify any fake document from the state department of immigration.

References

Collins, F. (2020). MRSC – New Regulations for the Use of Facial Recognition Technology. Mrsc.org. Retrieved 29 September 2020, from http://mrsc.org/Home/Stay-Informed/MRSC-Insight/June-2020/New-Regulations-for-Use-of-Facial-Recognition-Tech.aspx.

Germain, T. (2020). Why Illinois Has Become a Battleground for Facial Recognition Protection. Consumer Reports. Retrieved 29 September 2020, from https://www.consumerreports.org/privacy/why-illinois-has-become-a-battleground-for-facial-recognition-protection/.

Johnson, K. (2020). From Washington State to Washington, D.C., lawmakers rush to regulate facial recognition. VentureBeat. Retrieved 29 September 2020, from https://venturebeat.com/2020/01/19/from-washington-state-to-washington-dc-lawmakers-rush-to-regulate-facial-recognition/.

Simonite, T. (2020). A Bill in Congress Would Limit Uses of Facial Recognition. Wired. Retrieved 29 September 2020, from https://www.wired.com/story/bill-congress-limit-uses-facial-recognition/.

Wright, E. (2018). The future of facial recognition is not fully known: Developing privacy and security regulatory mechanisms for facial recognition in the retail sector. Fordham Intell. Prop. Media & Ent. LJ, 29, 611.

Health Club Evaluation Questionnaire

Directions:

place an X over a “yes” or “no” answer.

Make notes Yes No Notes

1. Were claims for improvement in weight, figure/physique, or fitness realistic? X The club instructor was able to explain into details the benefits of having a manageable weight, the right figure and the physique.

2. Was a long-term contract (1 to 3 years) encouraged? X Long term contract was very much encouraged as keeping fit and healthy is something that should be done regularly. The instructor explained that different people go to the health clubs for different reasons. There are some who go to the clubs to cut down on weight, some go to the club to keep fit. For those people that go the clubs to cut down on weight, once they cut down on weight, should maintain the desired weight by continuing with the fitness programs.

3. Was the sales pitch high-pressure to make an immediate decision? X The instructor was very convincing, as he even demonstrated some of the routines in the fitness programs and it was very impressive.

4. Were you given a copy of the contract to read at home? X The copies given were detailed and contained other aspects that the instructor was not able to explain.

5. Did the fine print include objectionable clauses? 6. Did they ask you about medical readiness? X The instructor asked about the medical history, as it was very important in ascertaining the right routine depending on the health of each and every person.

7. Did they sell diet supplements as a sideline? X It was very impressive enough that the club did not sell diet supplements. The instructor stated that it was not wise to use diet supplements as some may have side effects on the body.

8. Did they have passive equipment? X The club has some passive equipments for various routines

9. Did they have cardiovascular training equipment or facilities (cycles, track, pool, aerobic, dance? X Being a five star facility, the club has the best cardiovascular equipments. The aerobic class is wonderful, the swimming pools are big, and thus there is no congestion in the pool. The cycles are the latest in the market.

10. Did they make unscientific claims for the equipment, exercise, baths, or diet supplement? X The instructors explained how the baths and regular exercise were able to help the body in keeping fit, but the instructors did not give claims that they were not able to prove scientifically.

11. Were the facilities clean? X The facilities were sparkling clean, there were workers stationed at the various areas of the facility to make sure that the tidiness of the facility was kept.

12. Were the facilities crowded? X The facilities were not crowded, and I asked the instructor the reason behind that. The instructor explained that they have timetables in place for different clients that ensured that no overcrowding took place.

13. Were there days and hours when the facilities were open but would not be available to you? X The facilities was open at days and hours that, I may not be available, I raised the issue with the instructor who told me that the y have to be open at all times as different people have their own preferred time of exercising.

14. Were there limits on the number of minutes you could use a piece of equipment? X All the equipments had a specific time that one was able to use it. The instructor explained the reason behind the allocation of the limited times. Different equipments have different use; some equipment are meant for the biceps others for the triceps and thus over using a certain equipment means a certain muscle will be overworked while others will not have received enough exercise.

15. Did the floor personnel closely supervise and assist clients? X Every routine had the floor experts monitoring the activities of the clients, and where necessary assisted the clients in performing the routines in the right manner.

16. Were the floor personnel qualified experts? X The way they were assisting the clients proved that they were experts as they knew the correct way of carrying out a routine without causing injury.

17. Were the managers/ owners qualified experts X The owners were not qualified experts, but they were able to direct the clients to the right instructors who were able to deal with their various needs.

18. Has the club been in business at this location for a year or more? X The club has been in operation for several years

Use of Computers In Todays; life

Use of Computers In Today’s; life

Computers are used to track reservations for the airline industry, process billions of dollars for banks, manufacture products for industry, and conduct major transactions for businesses because more and more people now have computers at home and at the office.

People commit computer crimes because of society’s declining ethical standards more than any economic need. According to experts, gender is the only bias. The profile of today’s non-professional thieves crosses all races, age groups and economic strata. Computer criminals tend to be relatively honest and in a position of trust: few would do anything to harm another human, and most do not consider their crime to be truly dishonest. Most are males: women have tended to be accomplices, though of late they are becoming more aggressive. Computer Criminals tend to usually be “between the ages of 14-30, they are usually bright, eager, highly motivated, adventuresome, and willing to accept technical challenges.”(Shannon, 16:2)

“It is tempting to liken computer criminals to other criminals, ascribing characteristics somehow different from ‘normal’ individuals, but that is not the case.”(Sharp, 18:3) It is believed that the computer criminal “often marches to the same drum as the potential victim but follows and unanticipated path.”(Blumenthal, 1:2) There is no actual profile of a computer criminal because they range from young teens to elders, from black to white, from short to tall.

Definitions of computer crime has changed over the years as the users and misusers of computers have expanded into new areas. “When computers were first introduced into businesses, computer crime was defined simply as a form of white-collar crime committed inside a computer system.”(2600: Summer 92,p.13)

Some new terms have been added to the computer criminal vocabulary.

“Trojan Horse is a hidden code put into a computer program. Logic bombs are implanted so that the perpetrator doesn’t have to physically present himself or herself.” (Phrack 12,p.43) Another form of a hidden code is “salamis.” It came from the big salami loaves sold in delis years ago. Often people would take small portions of bites that were taken out of them and then they were secretly returned to the shelves in the hopes that no one would notice them missing.(Phrack 12,p.44) Congress has been reacting to the outbreak of computer crimes. “The U.S. House of Judiciary Committee approved a bipartisan computer crime bill that was expanded to make it a federal crime to hack into credit and other data bases protected by federal privacy statutes.”(Markoff, B 13:1) This bill is generally creating several categories of federal misdemeanor felonies for unauthorized access to computers to obtain money, goods or services or classified information. This also applies to computers used by the federal government or used in interstate of foreign commerce which would cover any system accessed by interstate telecommunication systems.

“Computer crime often requires more sophistications than people realize it.”(Sullivan, 40:4) Many U.S. businesses have ended up in bankruptcy court unaware that they have been victimized by disgruntled employees. American businesses wishes that the computer security nightmare would vanish like a fairy tale. Information processing has grown into a gigantic industry. “It accounted for $33 billion in services in 1983, and in 1988 it was accounted to be $88 billion.” (Blumenthal, B 1:2)

All this information is vulnerable to greedy employees, nosy-teenagers and general carelessness, yet no one knows whether the sea of computer crimes is “only as big as the Gulf of Mexico or as huge as the North Atlantic.” (Blumenthal,B 1:2) Vulnerability is likely to increase in the future. And by the turn of the century, “nearly all of the software to run computers will be bought from vendors rather than developed in houses, standardized software will make theft easier.” (Carley, A 1:1)

A two-year secret service investigation code-named Operation Sun-Devil, targeted companies all over the United States and led to numerous seizures.

Critics of Operation Sun-Devil claim that the Secret Service and the FBI, which have almost a similar operation, have conducted unreasonable search and seizures, they disrupted the lives and livelihoods of many people, and generally conducted themselves in an unconstitutional manner. “My whole life changed because of that operation. They charged me and I had to take them to court. I have to thank 2600 and Emmanuel Goldstein for publishing my story. I owe a lot to the fellow hackers and fellow hackers and the Electronic Frontier Foundation for coming up with the blunt of the legal fees so we could fight for our rights.” (Interview with Steve Jackson, fellow hacker, who was charged in operation Sun Devil) The case of Steve Jackson Games vs. Secret Service has yet to come to a verdict yet but should very soon. The secret service seized all of Steve Jackson’s computer materials which he made a living on. They charged that he made games that published information on how to commit computer crimes. He was being charged with running a underground hack system. “I told them it was only a game and that I was angry and that was the way that I tell a story. I never thought Hacker [Steve Jackson’s game] would cause such a problem. My biggest problem was that they seized the BBS (Bulletin Board System) and because of that I had to make drastic cuts, so we laid of eight people out of 18. If the Secret Service had just come with a subpoena we could have showed or copied every file in the building for them.”(Steve Jackson Interview) Computer professionals are grappling not only with issues of free speech and civil liberties, but also with how to educate the public and the media to the difference between on-line computer experimenters. They also point out that, while the computer networks and the results are a new kind of crime, they are protected by the same laws and freedom of any real world domain.

“A 14-year old boy connects his home computer to a television line, and taps into the computer at his neighborhood bank and regularly transfers money into his personnel account.”(2600: Spring 93,p.19) On paper and on screens a popular new mythology is growing quickly in which computer criminals are the ‘Butch Cassidys’ of the electronic age. “These true tales of computer capers are far from being futuristic fantasies.”(2600: Spring 93:p.19) They are inspired by scores of real life cases. Computer crimes are not just crimes against the computer, but it is also against the theft of money, information, software, benefits and welfare and many more.

“With the average damage from a computer crime amounting to about $.5 million, sophisticated computer crimes can rock the industry.”(Phrack 25,p.6) Computer crimes can take on many forms. Swindling or stealing of money is one of the most common computer crime. An example of this kind of crime is the Well Fargo Bank that discovered an employee was using the banks computer to embezzle $21.3 million, it is the largest U.S. electronic bank fraud on record. (Phrack 23,p.46) Credit Card scams are also a type of computer crime. This is one that fears many people and for good reasons. A fellow computer hacker that goes by the handle of Raven is someone who uses his computer to access credit data bases. In a talk that I had with him he tried to explain what he did and how he did it. He is a very intelligent person because he gained illegal access to a credit data base and obtained the credit history of local residents. He then allegedly uses the resident’s names and credit information to apply for 24 MasterCard’s and Visa cards. He used the cards to issue himself at least 40,000 in cash from a number of automatic teller machines. He was caught once but was only withdrawing $200 and in was a minor larceny and they couldn’t prove that he was the one who did the other ones so he was put on probation. “I was 17 and I needed money and the people in the underground taught me many things. I would not go back and not do what I did but I would try not to get caught next time. I am the leader of HTH (High Tech Hoods) and we are currently devising other ways to make money. If it weren’t for my computer my life would be nothing like it is today.”(Interview w/Raven) “Finally, one of the thefts involving the computer is the theft of computer time. Most of us don’t realize this as a crime, but the congress consider this as a crime.”(Ball,V85) Everyday people are urged to use the computer but sometimes the use becomes excessive or improper or both. For example, at most college’s computer time is thought of as free-good students and faculty often computerizes mailing lists for their churches or fraternity organizations which might be written off as good public relations. But, use of the computers for private consulting projects without payment of the university is clearly improper. In business it is the similar. Management often looks the other way when employees play computer games or generate a Snoopy calendar. But, if this becomes excessive the employees is stealing work time. And computers can only process only so many tasks at once. Although considered less severe than other computer crimes such activities can represent a major business loss.

“While most attention is currently being given to the criminal aspects of computer abuses, it is likely that civil action will have an equally important effect on long term security problems.”(Alexander, V119) The issue of computer crimes draw attention to the civil or liability aspects in computing environments. In the future there may tend to be more individual and class action suits.

CONCLUSION

Computer crimes are fast and growing because the evolution of technology is fast, but the evolution of law is slow. While a variety of states have passed legislation relating to computer crime, the situation is a national problem that requires a national solution. Controls can be instituted within industries to prevent such crimes.Protection measures such as hardware identification, access controls software and disconnecting critical bank applications should be devised. However, computers don’t commit crimes; people do. The perpetrator’s best advantage is ignorance on the part of those protecting the system. Proper internal controls reduce the opportunity for fraud.

BIBLIOGRAPHY

Alexander, Charles, “Crackdown on Computer Capers,” Time, Feb. 8, 1982, V119.

Ball, Leslie D., “Computer Crime,” Technology Review, April 1982, V85.

Blumenthal,R. “Going Undercover in the Computer Underworld”. New York Times, Jan. 26, 1993, B, 1:2.

Carley, W. “As Computers Flip, People Lose Grip in Saga of Printing Firm”. Wall Street Journal, Aug. 27, 1992, A, 1:1.

Carley, W. “In-House Hackers: Rigging Computers for Fraud or Inside Job”. Wall Street Journal, Aug 27, 1992, A, 7:5.

Malice Is Often an

Times, Dec. 8,

Finn, Nancy and Peter, “Don’t Rely on the Law to Stop Computer Crime,” Computer World, Dec. 19, 1984, V18.

Phrack Magazine issues 1-46. Compiled by Knight Lightning Shannon, L R. “THe Happy Hacker”. New York Times, Mar. 21, Sharp, B. “The Hacker Crackdown”. New York Times, Dec. 20,

Sullivan, D. “U.S. Charges Young Hackers”. New York Times, 40:4.

2600: The Hacker Quarterly. Issues Summer 92-Spring 93. Emmanue oldstein.d Phiber Optik. 1993, 7, 16:2. 1992, 7, 18:3. Nov. 15, 1992, 1,