<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Jonathan Hofer &#8211; The Beacon</title>
	<atom:link href="https://blog.independent.org/author/jonathan-hofer/feed/" rel="self" type="application/rss+xml" />
	<link>https://blog.independent.org</link>
	<description>The Blog of The Independent Institute</description>
	<lastBuildDate>Sat, 05 Sep 2020 02:05:36 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=5.6.1</generator>
	<item>
		<title>Police Reformers Should Demand Overhaul of CalGang Database </title>
		<link>https://blog.independent.org/2020/08/31/police-reformers-should-demand-overhaul-of-calgang-database/</link>
		
		<dc:creator><![CDATA[Jonathan Hofer]]></dc:creator>
		<pubDate>Mon, 31 Aug 2020 20:37:38 +0000</pubDate>
				<category><![CDATA[The Beacon]]></category>
		<category><![CDATA[Aaron Harvey]]></category>
		<category><![CDATA[CalGang]]></category>
		<category><![CDATA[Criminals]]></category>
		<category><![CDATA[Gangs]]></category>
		<category><![CDATA[government and politics]]></category>
		<category><![CDATA[Police]]></category>
		<category><![CDATA[San Diego]]></category>
		<guid isPermaLink="false">https://blog.independent.org/?p=49312</guid>

					<description><![CDATA[<p>[This post is co-authored by Dominick Van Cleve.] In 2014, Aaron Harvey, a 26-year-old studying for his real estate license, was met by U.S. Marshals outside his Las Vegas, Nevada, residence. Not until three weeks after his arrest did Harvey learn he would be charged with crimes in connection with nine murders in San...<br /><a href="https://blog.independent.org/2020/08/31/police-reformers-should-demand-overhaul-of-calgang-database/">Read More &#187;</a></p>
<p>The post <a rel="nofollow" href="https://blog.independent.org/2020/08/31/police-reformers-should-demand-overhaul-of-calgang-database/">Police Reformers Should Demand Overhaul of CalGang Database </a> appeared first on <a rel="nofollow" href="https://blog.independent.org">The Beacon</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>[<em>This post is co-authored by Dominick Van Cleve.</em>]</p>
<p>In 2014, Aaron Harvey, a 26-year-old studying for his real estate license, was met by U.S. Marshals outside his Las Vegas, Nevada, residence. Not until <a href="https://www.abajournal.com/files/WrongfulRapperArrest.pdf">three weeks after his arrest</a> did Harvey learn he would be charged with <a href="https://www.nbcsandiego.com/news/local/gang-conspiracy-law/1991616/">crimes in connection with nine murders</a> in San Diego, California, and if convicted could face up to 56 years in state prison.</p>
<p>But prosecutors already knew what Harvey had been insisting to the police&#8212;that he wasn’t involved in any killings.<span id="more-49312"></span></p>
<p>Instead of participating in the homicides, Harvey’s only “connection” to the crimes was that his name was in California’s obscure CalGang database. The reason was not that he belonged to a criminal enterprise, but because he appeared in a photo on Facebook wearing a shirt with green on it and lived in a neighborhood rife with gang activity. Under California law and thanks to the database, it did not matter that Harvey had no tangible connection with the crimes.</p>
<p>Nor did it matter that he had no knowledge of the commission of a crime. Under <a href="https://law.justia.com/codes/california/2011/pen/part-1/182-185/182.5/">California </a><a href="https://law.justia.com/codes/california/2011/pen/part-1/182-185/182.5/">Penal Code Section 182.5</a> anyone having knowledge of&#8212;or who would plausibly “benefit” from&#8212;criminal gang activity is considered having committed gang conspiracy. It is the ultimate guilt-by-association statute, though it runs against<a href="https://casetext.com/case/people-v-and"> the state’s traditional criminal conspiracy</a> statute requiring that an individual “promote, further, or assist in the commission of that particular substantive offense.”</p>
<p>Willing to invoke the “benefit” clause, prosecutors at Harvey’s criminal trial argued that he benefited from the San Diego murders because they would have boosted his social standing.</p>
<p>The CalGang database has played a key role in operationalizing the state’s broad interpretation of culpability for gang activity. Administered by the State of California Department of Justice, and with regionally operated databases under its umbrella, it is available to law enforcement across the state. Police officers can add anyone they suspect of gang membership. Neither an arrest nor an investigation is required for entering a person into the <a href="https://oag.ca.gov/calgang">shared database</a>. The entered data, which is stored for future retrieval, is rarely cleared.</p>
<p>Harvey never belonged to a gang, but the authorities’ qualifying threshold for a gang member is subjective enough to include nearly anyone. One of the standards is to use a ten-point system; meeting <a href="https://oag.ca.gov/sites/all/files/agweb/pdfs/Ab90-Literature-Review-FINAL.pdf">any two of the ten conditions</a> could be sufficient to enter someone as a gang member. Among them are “wearing gang dress” and “having been seen frequenting gang areas.”</p>
<p>The implication is startling enough to warrant repeating: Simply wearing a color associated with a gang (virtually all the colors on the wheel have been claimed by a gang somewhere) or living or working in an area with gang activity could land a person on California law enforcement’s list of gang members.</p>
<p>In preparation for his hearing, Harvey also learned he was <a href="https://www.youtube.com/watch?v=NqYBlp4IZ1w">not the only one</a> on the hook: 14 others were also arrested. With 543 individuals labeled by law enforcement as Lincoln Park Bloods, San Diego County’s district attorney belabored the point that 543 different people could be held criminally responsible for the nine murders.</p>
<p>One of Harvey’s co-defendants was childhood friend and San Diego hip-hop performer Brandon Duncan, a.k.a. “Tiny Doo.” The rapper was charged with conspiracy to commit murder <a href="https://www.smh.com.au/entertainment/music/no-safety-for-rapper-tiny-doo-who-faces-jail-after-releasing-album-20141118-11oyyf.html">based on lyrics from one of his albums</a>. Deputy District Attorney Anthony Campagna said, “We&#8217;re talking about a CD [cover depicting] a revolver with bullets.&#8221; The prosecution argued Tiny Doo was also a “beneficiary” of the shootings by virtue of <a href="https://www.courthousenews.com/san-diego-sued-over-botched-gang-conspiracy-case/">increased album sales and social standing</a> among gang members. The album in question was, in fact, a free digital download.</p>
<p>Harvey and Tiny Doo’s charges were <a href="https://www.nbcsandiego.com/news/local/judge-faulty-warrants-issued-in-gang-conspiracy-case/130123/">eventually dropped</a>, in 2019, but only after the two men had been jailed for seven months. Years after they were arrested, the CalGang database is still used with little public scrutiny, let alone any major overhaul in the name of criminal justice reform.</p>
<p>The problem is worrisome not only because many of the database entries are groundless, but also because news <a href="https://www.usatoday.com/story/news/politics/2020/02/10/californias-gang-database-under-investigation/4715847002/">reports</a> have raised the possibility that police have falsified CalGang records. Even infants and toddlers have been classified as gang members. A California State Auditor’s <a href="https://www.auditor.ca.gov/pdfs/reports/2015-130.pdf">report</a> in 2016 noted that upwards of seventy percent of minors included on the database were not notified that they were listed in the database. Not only does a failure to inform minors of their police designation deny them a possibility of contesting their inclusion in the database, but such a failure is in direct violation of state law.</p>
<p>In their review of the CalGang system, Camille Ochoa and Dave Maass of the Electronic Frontier Foundation <a href="https://www.eff.org/deeplinks/2016/08/demand-california-fix-calgang-its-deeply-flawed-gang-database">concurred</a> with the state audit, writing that, “CalGang violates people’s rights, operates with no oversight, is chock full of unsubstantiated information and data that should have been purged, and has diminished value in protecting public safety.”</p>
<p>In this time of dialogue on possible law enforcement reforms, changes to the CalGang database should be part of the discussion. At minimum, increased transparency and regular audits of CalGang should be required. Municipal police can opt out of the database as the Los Angeles Police Department <a href="https://abc7.com/lapd-falsified-records-scandal-moore/6257995/">did in June</a>. In addition, Penal Code Section 182.5 should be amended so that a prosecutor’s subjective sense of “benefiting” from criminal gang activity cannot be an element of criminal conspiracy. The injustice is too great to let stand.</p>
<p style="text-align: center;"> * * *</p>
<p><strong>Dominick Van Cleve</strong> is a paralegal from the San Diego area.</p>
<p>The post <a rel="nofollow" href="https://blog.independent.org/2020/08/31/police-reformers-should-demand-overhaul-of-calgang-database/">Police Reformers Should Demand Overhaul of CalGang Database </a> appeared first on <a rel="nofollow" href="https://blog.independent.org">The Beacon</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Court Hinges Privacy Rights on Smartphone Settings</title>
		<link>https://blog.independent.org/2020/02/06/court-hinges-privacy-rights-on-smartphone-settings/</link>
		
		<dc:creator><![CDATA[Jonathan Hofer]]></dc:creator>
		<pubDate>Thu, 06 Feb 2020 22:37:44 +0000</pubDate>
				<category><![CDATA[The Beacon]]></category>
		<category><![CDATA[Big Government]]></category>
		<category><![CDATA[California]]></category>
		<category><![CDATA[government and politics]]></category>
		<category><![CDATA[smartphones]]></category>
		<guid isPermaLink="false">https://blog.independent.org/?p=47106</guid>

					<description><![CDATA[<p>“Yes, compelling someone to reveal information on how to decrypt data is compelling testimony from that person. But obtaining information from a person’s mind is not what happens when agents pick a finger to apply to the sensor.” &#8212;Judge Edmond E. Chang, qtd. in In re A white Google Pixel 2019 began with digital...<br /><a href="https://blog.independent.org/2020/02/06/court-hinges-privacy-rights-on-smartphone-settings/">Read More &#187;</a></p>
<p>The post <a rel="nofollow" href="https://blog.independent.org/2020/02/06/court-hinges-privacy-rights-on-smartphone-settings/">Court Hinges Privacy Rights on Smartphone Settings</a> appeared first on <a rel="nofollow" href="https://blog.independent.org">The Beacon</a>.</p>
]]></description>
										<content:encoded><![CDATA[<blockquote><p>“Yes, compelling someone to reveal information on how to decrypt data is compelling testimony from that person. But obtaining information from a person’s mind is not what happens when agents pick a finger to apply to the sensor.”</p>
<p style="text-align: right;">&#8212;Judge Edmond E. Chang, qtd. in <em>In re A white Google Pixel</em></p>
</blockquote>
<p>2019 began with digital privacy activists rejoicing <a href="https://www.zdnet.com/article/police-cant-force-us-citizens-to-unlock-their-phone-by-face-or-finger/">an apparent victory</a> with a decision handed down by the United States District Court of Northern California. The <a href="https://casetext.com/case/in-re-of-2728">case</a> concerned whether or not law enforcement had the authority to compel a person to unlock a seized phone.<span id="more-47106"></span></p>
<p>Police had applied for a search and seizure warrant for an Oakland residence in connection with two suspects of an extortion scheme. The warrant application asked to seize various electronic devices including cell phones and computers. Police also requested the ability to compel any individual in the vicinity to use any biometric feature, like a finger or thumbprint, facial recognition, or iris detection to unlock any devices subject to the warrant found in the residence at the time of the search.</p>
<p>Denying the search warrant application, the judge found that even with a warrant, police cannot force suspects to unlock electronic devices. The court held that unlocking a phone with a fingerprint is “fundamentally different” than taking a suspect’s fingerprint, for instance. This is partially due to the risk of identifying who has access to the phone, thereby potentially implicating the owner.</p>
<p>More shocking, the court argued that since biometric access is effectively a substitute for a password, the compulsory production of a fingerprint constitutes a compelled testimony, a violation of the 5th Amendment protection against self-incrimination. By giving police access to the phone’s contents, the individual who is subject to the search effectively becomes a witness against themselves. This 5th Amendment violation thereby makes the search unreasonable in terms of the 4th Amendment.</p>
<p>The conclusion of the case was applauded by privacy activists not only for stopping police from forcing people to open their phones for the government but for also narrowing what police could seize to only devices that were reasonably believed to be owned by suspects. The decision was a promising development after a string of defeats. Up until the Northern California District Court’s ruling, the only cases of note, <a href="https://law.justia.com/cases/minnesota/supreme-court/2018/a15-2075.html"><em>State v. Diamond</em> <em>(2018)</em></a> and <a href="https://www.mintpressnews.com/wp-content/uploads/2017/10/Show-Temp.pdf">In <em>re the Search Warrant Application for [redacted] (2017)</em></a> allowed police compel a person to use a fingerprint to unlock a seized cell phone.</p>
<p>However, the sentiment of victory was short lived. In a <a href="https://www.documentcloud.org/documents/6224262-No-5th-I-Guess.html#document/p1">recent case</a> heard by David Nye of the United States District Court for Idaho, Judge Nye took direct issue with the aforementioned Northern District of California ruling. The Idaho case, though similarly about a warrant application and phone search incident to arrest, decidedly gave great leeway to law enforcement to compel the unlocking of a phone.</p>
<p>Police in the state of Idaho initially applied for a warrant as part of a child pornography investigation. The provisions of the warrant application included permission to seize “mobile phones” if the phones could be used as evidence of the commission of the crime. The warrant application was authorized and upon execution, police seized a Google Pixel 3 XL from the bathroom of the suspect’s residence.</p>
<p>It was soon discovered that the phone required a swipe pattern or a fingerprint to unlock the screen to display its digital contents. The government again applied for an additional warrant to “press any finger and/or thumb of any hand against the sensor of the fingerprint reader used to unlock the...phone.”</p>
<p>Denying the additional warrant, the magistrate judge echoed the Northern California District ruling and stated that approving the application would have been a 5th Amendment violation by virtue of compelling the individual to produce self-incriminating testimony. On review, the U.S District Court Judge vacated the magistrate’s order denying the warrant.</p>
<p>The rationale behind the decision is that body parts, or “physical characteristics” should not be counted as “testimony”. The Supreme Court in the past has drawn a similar distinction. The principle issue in <a href="https://supreme.justia.com/cases/federal/us/487/201/"><em>Doe v. United States (1988)</em></a> concerned what constituted “testimony”. In Doe, the court specified that a testimony was a disclosure of the contents of the suspect’s mind.</p>
<p>The U.S District Court of Idaho recalled this differentiation, saying:</p>
<blockquote><p>In [Doe v. United States, 487 U.S. 201 (1988)], the United States Supreme Court made a comparison between being compelled to surrender a key to a strongbox or safe containing incriminating documents (and how that would not be a testimonial act), and being compelled to reveal the combination to a safe (which would be a testimonial act)...The Court explained that whether an act was testimonial — and therefore unconstitutional — revolved around whether the act forced the defendant to ‘disclose the contents of his own mind.’</p></blockquote>
<p>A conclusion from the Idaho case is that police forcing a person to turn over their passcode would be impermissible. But because applying a finger to a sensor is not a disclosure of the contents of the mind, the court did not see a Constitutional violation.</p>
<p>Riana Pfefferkorn of the <a href="http://cyberlaw.stanford.edu/">Center for Internet and Society at Stanford Law School</a> eloquently made <a href="http://cyberlaw.stanford.edu/blog/2018/01/oh-so-everybody%E2%80%99s-legal-expert-now-minnesota-v-diamond-microsoft-ireland-and-user">the point</a> that the court decided to “hinge a core constitutional right of all smartphone users&#8212;<a href="https://www.pewresearch.org/fact-tank/2017/01/12/evolution-of-technology/">three-quarters of Americans</a>&#8212;on how they use their phone’s UI.”</p>
<p>In short, if a person uses a password to unlock their phone they may be protected by the law. However, if they use biometrics, which is functionally equivalent in terms of gaining access to the phone, this reasoning says that there is no legal protection with respect to the 5th Amendment.</p>
<p>This deals a blow to those that use biometrics as part of their 2-factor authentication login or encryption management. Moreover, it jeopardizes cell phone users as many smartphones today bypass passcode requirements if a valid fingerprint is supplied by the user. This grants police the ability to circumnavigate the spirit of privacy laws and effectively renders constitutional protections of passwords useless.</p>
<p>While other courts have yet to weigh in, the direction of the case law is discouraging. However, the discordance between the Northern California and Idaho ruling is worth continuing to watch in the future as both districts are in the 9th Circuit.</p>
<p style="text-align: center;">* * *</p>
<p style="text-align: left;">This piece was originally published under a different title in <a href="https://medium.com/swlh/district-court-hinges-constitutional-right-on-how-smartphone-users-setup-their-ui-1cc75b5aaf2a"><em>The Startup </em>(12/13/19</a>). For more on privacy rights, see <a href="https://www.independent.org/store/book.asp?id=122"><em>American Surveillance: Intelligence, Privacy, and the Fourth Amendment</em></a>, by Anthony Gregory.</p>
<p>The post <a rel="nofollow" href="https://blog.independent.org/2020/02/06/court-hinges-privacy-rights-on-smartphone-settings/">Court Hinges Privacy Rights on Smartphone Settings</a> appeared first on <a rel="nofollow" href="https://blog.independent.org">The Beacon</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Civil Libertarians Worry that Facial Recognition Tech Is Inaccurate, but Fears May Worsen After It’s Perfected</title>
		<link>https://blog.independent.org/2019/11/13/civil-libertarians-worry-that-facial-recognition-tech-is-inaccurate-but-fears-may-worsen-after-its-perfected/</link>
		
		<dc:creator><![CDATA[Jonathan Hofer]]></dc:creator>
		<pubDate>Thu, 14 Nov 2019 03:50:13 +0000</pubDate>
				<category><![CDATA[The Beacon]]></category>
		<category><![CDATA[Culture and Society]]></category>
		<category><![CDATA[facial recognition]]></category>
		<category><![CDATA[government surveillance]]></category>
		<category><![CDATA[Law and Liberty]]></category>
		<category><![CDATA[Surveillance]]></category>
		<category><![CDATA[Surveillance technology]]></category>
		<category><![CDATA[Technology]]></category>
		<guid isPermaLink="false">https://blog.independent.org/?p=46337</guid>

					<description><![CDATA[<p>California Governor Gavin Newsom in September signed the Body Camera Accountability Act, a law prohibiting the use of facial recognition and other biometric tracking software in police body cameras. Following similar measures in San Francisco and Oakland, the law is the first statewide ban of its kind in the country. Supporters of the bill...<br /><a href="https://blog.independent.org/2019/11/13/civil-libertarians-worry-that-facial-recognition-tech-is-inaccurate-but-fears-may-worsen-after-its-perfected/">Read More &#187;</a></p>
<p>The post <a rel="nofollow" href="https://blog.independent.org/2019/11/13/civil-libertarians-worry-that-facial-recognition-tech-is-inaccurate-but-fears-may-worsen-after-its-perfected/">Civil Libertarians Worry that Facial Recognition Tech Is Inaccurate, but Fears May Worsen After It’s Perfected</a> appeared first on <a rel="nofollow" href="https://blog.independent.org">The Beacon</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>California Governor Gavin Newsom in September signed the Body Camera Accountability Act, a law prohibiting the use of facial recognition and other biometric tracking software in police body cameras. Following similar measures in San Francisco and Oakland, the law is the first statewide ban of its kind in the country.</p>
<p><span id="more-46337"></span></p>
<p>Supporters of the bill viewed it as necessary to safeguard civil liberties because facial recognition technologies currently available to law enforcement produce high rates of false positives, meaning that innocent people are too often misidentified as criminal suspects. In addition, they say that facial recognition could result in racially biased policing.</p>
<p>So far, concerns about racial bias have been well justified. Studies have found that facial recognition technology is less accurate at identifying individuals with darker skin, <a href="http://news.mit.edu/2018/study-finds-gender-skin-type-bias-artificial-intelligence-systems-0212">especially women of color</a>. A July <a href="https://www.nist.gov/sites/default/files/documents/2019/07/03/frvt_report_2019_07_03.pdf">test</a> of a facial recognition algorithm used by Idemia&#8212;a France-based vendor to the U.S. Customs and Border Protection&#8212;found that black women were <a href="https://www.wired.com/story/best-algorithms-struggle-recognize-black-faces-equally/">falsely identified</a> 10 times more often than white women.</p>
<p>Another study tested how well Amazon’s “Rekognition” image analysis software could distinguish members of Congress from criminal suspects in a mugshot database and found it lacking. The American Civil Liberties Union concluded that the software <a href="https://www.aclu.org/blog/privacy-technology/surveillance-technologies/amazons-face-recognition-falsely-matched-28">misidentified 28 members of Congress</a>, including a disproportionate number of Congressional Black Caucus members.</p>
<p>This finding, however, has not deterred Amazon from <a href="https://www.documentcloud.org/documents/5014186-Amazon-ICE-emails-FOIA.html">pitching Rekognition to federal agencies</a>, nor has it slowed down government agencies contracting with facial recognition software vendors. Instead, Amazon <a href="https://aws.amazon.com/blogs/aws/thoughts-on-machine-learning-accuracy/">retorted</a> that the ACLU’s experiment was flawed because the software was set to the default 80 percent confidence level as compared to the 99 percent level that Amazon recommended for law enforcement. This response, however, was inadequate.</p>
<p>As the ACLU pointed out, Amazon <a href="https://www.aclu.org/press-releases/members-congress-demand-meeting-amazon-ceo-following-aclu-report-amazon-face">does not ask</a> users how they plan to use its facial recognition technology. If there are no guidelines regulating police use of the technology, there is nothing to prevent law enforcement from using a low threshold for success. Without safeguards for an imperfect technology, false positives are inevitable.</p>
<p>Skeptical of the trade-offs, municipalities across the country have been <a href="https://www.cnn.com/2019/07/17/tech/cities-ban-facial-recognition/index.html">cautious of facial recognition technology</a>, with some cities proposing outright bans. California lawmakers, however, consider the state’s new prohibition to be only a temporary measure until the technology becomes more reliable. The ban signed by Newsom is <a href="http://leginfo.legislature.ca.gov/faces/billTextClient.xhtml?bill_id=201920200AB1215">set to expire</a> in 2023.</p>
<p>Assembly member Phil Ting, cosponsor of the bill, has said that the ban’s sunset clause was designed to allow legislators to <a href="https://sacramento.cbslocal.com/2019/09/12/california-lawmakers-ban-facial-recognition-software-from-police-body-cams/">reconsider </a>the prohibition if the technology improves sufficiently – in other words, it becomes more accurate at identifying minorities. Despite the apparent failings of current facial recognition tech, the National Institute of Standards and Technology reported that the best systems <a href="https://www.nist.gov/news-events/news/2018/11/nist-evaluation-shows-advance-face-recognition-softwares-capabilities">improved by a factor of 25</a> between 2010 to 2018. At this rate, it seems that “nearly perfect” facial recognition software could be available in a year or two.</p>
<p>Technological improvements, however, would not ensure that the threat to personal liberty will be going away. To the contrary, the negative effects may become more problematic when the government becomes more effective in its surveillance capabilities. First, more accuracy means more data and more discriminate targeting.</p>
<p>When a government can flawlessly track individuals, the state becomes efficient at singling out its opponents. Given a track record of laws such as <a href="https://www.history.com/topics/black-history/black-codes">black codes</a>, the <a href="https://history.house.gov/Historical-Highlights/1700s/The-Sedition-Act-of-1798/#:~:targetText=In%20one%20of%20the%20first,government%20of%20the%20United%20States.">Sedition Act</a>, or the <a href="https://www.ourdocuments.gov/doc.php?flash=false&amp;doc=74">Japanese Internment Bill</a>, the imperfections of surveillance can mitigate the unjust consequences of bad laws. A perfect surveillance state, however, would ensure a dystopian future for marginalized people.</p>
<p>Second, if surveillance technology becomes widely adopted by government agencies, law-abiding people may change their behavior out of a sense of self-consciousness or caution. This can have a serious <a href="https://policyreview.info/articles/analysis/internet-surveillance-regulation-and-chilling-effects-online-comparative-case">chilling effect</a> on freedom of expression and is a key reason why facial recognition poses a unique challenge to civil liberties.</p>
<p>Minority communities and dissident groups may be the first to feel the pressure. In 2018, the city of Berkeley, ground zero for the free-speech movement of the 1960s, used facial recognition technology to <a href="https://www.dailycal.org/2019/10/21/before-ban-city-of-berkeley-acquired-facial-recognition-technology/">watch participants in an anti-Marxist protest</a>. Once a bastion of the counterculture, Berkeley followed the growing <a href="https://www.nbcnews.com/news/us-news/facial-recognition-gives-police-powerful-new-tracking-tool-it-s-n894936">trend</a> of police departments employing facial recognition.</p>
<p>The contemporary Chinese surveillance state may provide a bleak glimpse of the West’s future. An estimated <a href="https://www.telegraph.co.uk/news/worldnews/asia/china/7867536/China-installs-40000-CCTV-cameras-in-Xinjiang-ahead-of-anniversary-of-deadly-riots.html">40,000 facial recognition cameras</a> watch over the region of Xinjiang, a historic epicenter for political secessionist movements and home to the Uyghur ethnic minority. The Uyghurs, a predominately Muslim population, have been involved in a <a href="https://www.bbc.com/news/world-asia-china-26414014">prolonged civil conflict</a> with the majority Han Chinese. Armed with facial recognition tech, the Chinese state creates detailed records on specific individuals, even recording their purchases with the goal of <a href="https://www.nytimes.com/2019/05/22/world/asia/china-surveillance-xinjiang.html">instilling fear</a> and deterring critics of the Chinese Communist Party.</p>
<p>With the Chinese government reportedly detaining upwards of <a href="https://www.reuters.com/article/us-china-xinjiang-rights/15-million-muslims-could-be-detained-in-chinas-xinjiang-academic-idUSKCN1QU2MQ">over a million people</a> in Xinjiang in political <a href="https://www.hrw.org/report/2018/09/09/eradicating-ideological-viruses/chinas-campaign-repression-against-xinjiangs">“re-education camps”</a>, the main worry is not about wrongfully implicating an individual in a crime they did not commit because of misidentification. Rather, the larger problem is that the government is able to discriminately identify individuals because it considers a group a threat to state interests.</p>
<p>This is not to say that there is never a place for innovative commercial facial recognition technology. However, if there are stunted safeguards, including poor transparency requirements, deficient collection standards, and non-existent data retention limits, the public can have no assurance that their civil liberties are protected when the government gets their hands on these tools.</p>
<p>The post <a rel="nofollow" href="https://blog.independent.org/2019/11/13/civil-libertarians-worry-that-facial-recognition-tech-is-inaccurate-but-fears-may-worsen-after-its-perfected/">Civil Libertarians Worry that Facial Recognition Tech Is Inaccurate, but Fears May Worsen After It’s Perfected</a> appeared first on <a rel="nofollow" href="https://blog.independent.org">The Beacon</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
