As advancements have been made in technologies new surveillance tools have been designed giving those charged with protecting citizen’s additional opportunities to prevent crimes or identify those who have violated laws or policies. While innovation has introduced a variety of new platforms there remains a concern of if the implementation of them is ethical. Additionally, there are concerns that surveillance has been and continues to be unequally applied.
Our guest for this segment is Dr. Kevin Harris, the Program Director for Information Systems Security and Information Technology Management at American Public University.
Visit https://www.securityweekly.com/psw for all the latest episodes!
To learn more about our sponsors visit: The Security Weekly Sponsor’s Page
The Ethics of Surveillance
The discussion in this segment will focus on: the tools and benefits of surveillance, including consumer alarms, doorbells, cameras, motion detection, audio/video surveillance, and smart devices. Governmental technology such as body cameras, gunshot detection, drones, smartphones, redlight cameras. Privatization of surveillance including corporate-owned devices to monitor employees and/or the public, ISP monitoring, spending habits, social media, and medical data. Questions arise when multiple organizations use data, including accessing corporate surveillance systems, centrally stored data accessed by multiple agencies (jurisdiction), tracking across devices or platforms, shared consumer data, and access to DNA profiles. Ethical Considerations include security vs. privacy and the dangers of targeting specific demographics including religious groups, activists, and ethnic groups and AI biases in surveillance (gender & racial).
- We have exciting news about the Security Weekly webcast program: We are now partnered with (ISC)2 as an official CPE provider! If you attend any of our webcasts, you will be receiving 1 CPE credit per webcast! Register for one of our upcoming webcast with Zane Lackey of Signal Sciences, Ian McShane from Endgame, or Stephen Smith and Jeff Braucher of LogRhythm (or all 3!) by going to securityweekly.com/webcasts If you have missed any of our previously recorded webcasts, you can find our on-demand library at securityweekly.com/ondemand