Transparent Surveillance of Suspects for Building Trust between Citizens and Their Governments
暂无分享,去创建一个
The most intrusive parts used in law enforcement surveillance operations are the pieces of surveillance equipment and the data they produce. At the moment, no authenticated permission token is needed. If a token is not required, this simply means that the usage cannot be monitored. There is not even proof of correct usage of the equipment. A similar kind of a problem exists with the data produced by the processes. With the current systems, it cannot be determined when, where and by whom the data were produced. Also, it cannot be said whether the collected data are the same kind of data that were authorized to be collected. When coercive methods are used, the authority should be asked if the equipment is able to work without a token, if there is someone who knows about the operation and can be identified, if the equipment can be used without authorization, if the amount of data can be identified, and if the equipment used has been under control the entire time.