technology:facial recognition

  • Democrats and Republicans Passing Soft Regulations - The Atlantic
    https://www.theatlantic.com/technology/archive/2019/06/democrats-and-republicans-passing-soft-regulations/592558

    Your face is no longer just your face—it’s been augmented. At a football game, your face is currency, used to buy food at the stadium. At the mall, it is a ledger, used to alert salespeople to your past purchases, both online and offline, and shopping preferences. At a protest, it is your arrest history. At the morgue, it is how authorities will identify your body.

    Facial-recognition technology stands to transform social life, tracking our every move for companies, law enforcement, and anyone else with the right tools. Lawmakers are weighing the risks versus rewards, with a recent wave of proposed regulation in Washington State, Massachusetts, Oakland, and the U.S. legislature. In May, Republicans and Democrats in the House Committee on Oversight and Reform heard hours of testimony about how unregulated facial recognition already tracks protesters, impacts the criminal-justice system, and exacerbates racial biases. Surprisingly, they agreed to work together to regulate it.

    The Microsoft president Brad Smith called for governments “to start adopting laws to regulate this technology” last year, while the Amazon Web Services CEO Andy Jassy echoed those comments in June, likening the technology to a knife. It’s a less dramatic image than the plutonium and nuclear-waste metaphors critics employ, but his message—coming from an executive at one of the world’s most powerful facial-recognition technology outfits—is clear: This stuff is dangerous.

    But crucially, Jassy and Smith seem to argue, it’s also inevitable. In calling for regulation, Microsoft and Amazon have pulled a neat trick: Instead of making the debate about whether facial recognition should be widely adopted, they’ve made it about how such adoption would work.

    Without regulation, the potential for misuse of facial-recognition technology is high, particularly for people of color. In 2016 the MIT researcher Joy Buolamwini published research showing that tech performs better on lighter-skinned men than on darker-skinned men, and performs worst on darker-skinned women. When the ACLU matched Congress members against a criminal database, Amazon’s Rekognition software misidentified black Congress members more often than white ones, despite there being far fewer black members.

    This includes House Chairman Elijah Cummings, a Baltimore native whose face was also scanned when he attended a 2015 rally in memory of Freddie Gray, the unarmed black teenager who died of a spinal-cord injury while in police custody. The Baltimore Police Department used facial recognition to identify protesters and target any with outstanding warrants. Most of the protesters were black, meaning the software used on them might have been less accurate, increasing the likelihood of misidentification. Expert witnesses at the committee hearing in May warned of a chilling effect: Protesters, wary of being identified via facial recognition and matched against criminal databases, could choose to stay home rather than exercise their freedom of assembly.

    Microsoft and Amazon both claim to have lessened the racial disparity in accuracy since the original MIT study and the ACLU’s report. But fine-tuning the technology to better recognize black faces is only part of the process: Perfectly accurate technology could still be used to support harmful policing, which affects people of color. The racial-accuracy problem is a distraction; how the technology is used matters, and that’s where policy could prevent abuse. And the solution Microsoft and Amazon propose would require auditing face recognition for racial and gender biases after they’re already in use—which might be too late.

    In early May, The Washington Post reported that police were feeding forensic sketches to their facial-recognition software. A witness described a suspect to a sketch artist, then police uploaded the sketch to Amazon’s Rekognition, looking for hits, and eventually arrested someone. Experts at the congressional hearing in May were shocked that a sketch submitted to a database could credibly qualify as enough reasonable suspicion to arrest someone.

    Read: Half of American adults are in police facial-recognition databases

    But Jassy, the Amazon Web Services CEO, claimed that Amazon has never received a report of police misuse. In May, Amazon shareholders voted down a proposal that would ban the sale of Rekognition to police, and halt sales to law enforcement and ICE. Jassy said that police should only rely on Rekognition results when the system is 99 percent confident in the accuracy of a match. This is a potentially critical safeguard against misidentification, but it’s just a suggestion: Amazon doesn’t require police to adhere to this threshold, or even ask. In January, Gizmodo quoted an Oregon sheriff’s official saying his department ignores thresholds completely. (“There has never been a single reported complaint from the public and no issues with the local constituency around their use of Rekognition,” a representative from Amazon said, in part, in a statement to Gizmodo.)

    #Reconnaissance_faciale #Libertés #Espace_public #Etat_policier

  • Surveillance-savvy Hong Kong protesters go digitally dark
    https://news.yahoo.com/surveillance-savvy-hong-kong-protesters-digitally-dark-003014805.html

    Hong Kong’s tech-savvy protesters are going digitally dark as they try to avoid surveillance and potential future prosecutions, disabling location tracking on their phones, buying train tickets with cash and purging their social media conversations.

    Police used rubber bullets and tear gas to break up crowds opposed to a China extradition law on Wednesday, in the worst unrest the city has witnessed in decades.

    Many of those on the streets are predominantly young and have grown up in a digital world, but they are all too aware of the dangers of surveillance and leaving online footprints.

    Ben, a masked office worker at the protests, said he feared the extradition law would have a devastating impact on freedoms.

    “Even if we’re not doing anything drastic — as simple as saying something online about China — because of such surveillance they might catch us,” the 25-year-old said.

    This week groups of demonstrators donned masks, goggles, helmets and caps — both to protect themselves against tear gas, pepper spray and rubber bullets, and also to make it harder for them to be identified.

    Many said they turned off their location tracking on their phones and beefed up their digital privacy settings before joining protests, or deleted conversations and photos on social media and messaging apps after they left the demonstrations.

    There were unusually long lines at ticket machines in the city underground metro stations as protesters used cash to buy tickets rather than tap-in with the city’s ubiquitous Octopus cards — whose movements can be more easily tracked.

    In a city where WhatsApp is usually king, protesters have embraced the encrypted messaging app Telegram in recent days, believing it offers better cyber protection and also because it allows larger groups to co-ordinate.

    On Thursday Telegram announced it had been the target of a major cyber attack, with most junk requests coming from China. The company’s CEO linked the attack to the city’s ongoing political unrest.

    Anxieties have been symbolised in a profile picture that was being used by many opponents of the bill: a wilting depiction of Hong Kong’s black-and-white bauhinia flower.

    But protesters have become increasingly nervous that using the picture online could attract attention from authorities, and have taken it down.

    “This reflects the terror Hong Kong citizens feel towards this government,” said a woman surnamed Yau, 29, who works in education.

    A protester surnamed Heung told AFP that many people immediately deleted “evidence showing you were present”.

    The demonstrators who spoke with AFP only provided their first or last names due to the subject’s sensitivity, and all wore at least masks.

    Heung, 27, had returned to the area where the protests had taken place to join the clean-up, and she put a post on Facebook calling for helpers. But she was afraid even a call for volunteers would link her to the protests.

    “Maybe I’ll delete the post tonight,” she said. “I don’t want to become one of their suspects.”

    – ’It would become like Xinjiang’ -

    While Hong Kongers have free speech and do not encounter the surveillance saturation on the mainland, sliding freedoms and a resurgent Beijing is fuelling anxieties and fears.

    Recent prosecutions of protest leaders have also used video and digital data to help win convictions.

    Bruce Lui, a senior journalism lecturer at Hong Kong Baptist University, said awareness around security has increased, particularly with China’s “all-pervasive” surveillance technology and wide use of facial recognition and other tracking methods.

    “In recent years national security has become an urgent issue for Hong Kong relating to China. Hong Kong laws may have limitations, but China only needs to use national security to surpass (them),” he said.

    The city was rattled in recent years by the disappearance of several booksellers who resurfaced in China facing charges — and the alleged rendition of billionaire businessman Xiao Jianhua in 2017.

    Critics say the extradition law, if passed, would allow these cases to be carried out openly and legally.

    “One month ago, things were still calm in Hong Kong,” said Ben, the office worker.

    “But in an instant, it has become this. Who knows if it would become like Xinjiang the day after tomorrow, because things can change so quickly,” he added, referring to an autonomous region tightly ruled by Beijing.

    In precarious times, many are holding onto core values.

    “We’re trying to do better with our privacy settings. But we still consider ourselves Hong Kong people, not Chinese, so we still think we have a right to speak out,” said Yau.

    #Chine #Hongkong

  • The Strange Politics of Facial Recognition
    https://www.theatlantic.com/technology/archive/2019/06/democrats-and-republicans-passing-soft-regulations/592558

    Everyone seems to have found common ground on the emerging technology. That’s exactly what its makers want. Your face is no longer just your face—it’s been augmented. At a football game, your face is currency, used to buy food at the stadium. At the mall, it is a ledger, used to alert salespeople to your past purchases, both online and offline, and shopping preferences. At a protest, it is your arrest history. At the morgue, it is how authorities will identify your body. Facial-recognition (...)

    #Axon #Microsoft #Amazon #AWS #algorithme #CCTV #Rekognition #biométrie #facial #vidéo-surveillance #discrimination #surveillance #ACLU (...)

    ##FaceAPI

    • In calling for regulation, Microsoft and Amazon have pulled a neat trick: Instead of making the debate about whether facial recognition should be widely adopted, they’ve made it about how such adoption would work.

      And as the discussions around the specifics of implementation swirl, critics argue that they are a diversion from larger, worthier discussions.

      So far, technology companies have succeeded in setting the terms of the debate over facial recognition. But these might be the last days of privately owning our own faces. Common ground itself is not a victory. Narrowing the discussion isn’t compromise; it’s a rhetorical trick. It turns public governance into a terms-of-service agreement: One party sets the terms while the other, uninterested and resigned to the inevitable, simply says, “I agree.”

  • Facial recognition tech is arsenic in the water of democracy, says Liberty
    https://www.theguardian.com/technology/2019/jun/07/facial-recognition-technology-liberty-says-england-wales-police-use-sho

    Human rights group calls on England and Wales to ban police use of AFR in public spaces Automated facial recognition poses one of the greatest threats to individual freedom and should be banned from use in public spaces, according to the director of the campaign group Liberty. Martha Spurrier, a human rights lawyer, said the technology had such fundamental problems that, despite police enthusiasm for the equipment, its use on the streets should not be permitted. She said : “I don’t think (...)

    #CCTV #biométrie #facial #vidéo-surveillance #surveillance #Islam

    https://i.guim.co.uk/img/media/8e6e98b9bdc1c7e71fbcc4fc0b52022b9c2b43d4/0_312_5138_3082/master/5138.jpg

  • New York school district’s facial recognition system sparks privacy fears
    https://www.theguardian.com/technology/2019/may/31/facial-recognition-school-new-york-privacy-fears

    Plan for cameras to track students in Lockport’s schools called ‘unprecedented invasion of privacy’ and ‘colossal waste of money’ A school district in western New York is launching a first-of-its-kind facial recognition system, generating new privacy concerns about the powerful but controversial technology. The Lockport city school district is beginning implementation of the Aegis facial recognition system this week, officials said, with the technology expected to be fully up and running in (...)

    #algorithme #Aegis #CCTV #facial #vidéo-surveillance #surveillance #étudiants

    https://i.guim.co.uk/img/media/2b6be683c7c05d7a7eedc60733c5a126eeb761d5/0_94_5232_3140/master/5232.jpg

  • Chinese Surveillance Complex Advancing in Latin America

    In February, 2019, in a story that went almost unnoticed in Washington, the small South American nation of #Uruguay began installing the first of 2,100 surveillance cameras, donated by the People’s Republic of China to improve control of its borders with neighboring Argentina and Brazil.

    The move highlights the significant deepening of the Uruguay-PRC relationship over the last decade, including their establishment of a “Strategic Partnership” in October 2016, and the signing of a memorandum of understanding in August 2018 for Uruguay to join China’s Belt and Road initiative (despite being about as far from the PRC as is geographically possible).

    Beyond Uruguay, the development also highlights a little-discussed but important dimension of China’s advance: its expanding global sales of surveillance and control technologies. Although the press and U.S. political leadership have given significant attention to the risks of employing Chinese telecommunications companies such as Huawei the equally serious but newer issue of expanding sales of Chinese surveillance systems has been less discussed.

    The installation of Chinese surveillance systems, acquired through PRC government donations or commercial contracts, is a growing phenomenon in Latin America and elsewhere.

    Such systems began to appear in the region more than a decade ago, including in 2007, when then mayor of Mexico City (now Mexican Foreign Minister) Miguel Ebrard returned from a trip to the PRC with a deal to install thousands of Chinese cameras to combat crime in the Mexican capital. More recent examples include ECU-911 in Ecuador, a China-built national system of surveillance and communication initially agreed to by the administration of anti-U.S. populist president Rafael Correa. The system, which has expanded to currently include 4,300 cameras and a command center manned by thousands of Ecuadorans, has been built almost completely from Chinese equipment, designed for a range of otherwise noble purposes from emergency response and combatting crime, to monitoring volcanoes. Bolivia boasts a similar Chinese built system, albeit more limited in scope, BOL-110, in addition to hundreds of surveillance cameras donated by the PRC to at least four of Bolivia’s principal cities.

    In Panama, which abandoned Taiwan to establish relations with the PRC in 2017, the government of Juan Carlos Varela has agreed to allow Huawei to install a system of cameras in the crime-ridden city of Colon and the associated free trade zone. Not by coincidence, in July 2019, Hikivision, China’s largest producer of surveillance cameras, announced plans to set up a major distribution center in Colon to support sales of its products throughout the Americas.

    In northern Argentina, near where the Chinese are developing a lithium mining operation and constructing the hemisphere’s largest array of photovoltaic cells for electricity generation, the Chinese company ZTE is installing another “911” style emergency response system with 1,200 cameras.

    In Venezuela, although not a surveillance system per se, the Chinese company ZTE has helped the regime of Nicholas Maduro implement a “fatherland identity card” linking different kinds of data on individuals through an identity card which allows the state to confer privileges (such as rationing food) as a tool for social control.

    As with sectors such as computers and telecommunications, the PRC arguably wishes to support the global export of such systems by its companies to advance technologies it recognizes as strategic for the Chinese nation, per its own official policy documents such as Made In China 2025.

    The risks arising from spreading use of Chinese surveillance equipment and architectures are multiple and significant, involving: (1) the sensitivity of the data collected on specific persons and activities, particularly when processed through technologies such as facial recognition, integrated with other data, and analyzed through artificial intelligence (AI) and other sophisticated algorithms, (2) the potential ability to surreptitiously obtain access to that data, not only through the collection devices, but at any number of points as it is communicated, stored, and analyzed, and (3) the long-term potential for such systems to contribute to the sustainment of authoritarian regimes (such as those in Venezuela, Bolivia, Cuba, and formerly Ecuador) whose corrupt elites provide strategic access and commercial benefits to the Chinese state.

    The risk posed by such Chinese architectures is underestimated by simply focusing on the cameras and sensors themselves.

    Facial and other recognition technologies, and the ability to integrate data from different sensors and other sources such as smartphones enables those with access to the technology to follow the movement of individual human beings and events, with frightening implications. It includes the ability to potentially track key political and business elites, dissidents, or other persons of interest, flagging possible meetings between two or more, and the associated implications involving political or business meetings and the events that they may produce. Flows of goods or other activities around government buildings, factories, or other sites of interest may provide other types of information for political or commercial advantage, from winning bids to blackmailing compromised persons.

    While some may take assurance that the cameras and other components are safely guarded by benevolent governments or companies, the dispersed nature of the architectures, passing information, instructions, and analysis across great distances, means that the greatest risk is not physical access to the cameras, but the diversion of information throughout the process, particularly by those who built the components, databases and communication systems, and by those who wrote the algorithms (increasingly Chinese across the board).

    With respect to the political impact of such systems, while democratic governments may install them for noble purposes such as crimefighting and emergency response, and with limitations that respect individual privacy, authoritarian regimes who contract the Chinese for such technologies are not so limited, and have every incentive to use the technology to combat dissent and sustain themselves in power.

    The PRC, which continues to perfect it against its own population in places like Xinjiang (against the Uighur Muslims there), not only benefits commercially from selling the technology, but also benefits when allied dictatorships provide a testing ground for product development, and by using it to combat the opposition, keeping friends like Maduro in power, continuing to deliver the goods and access to Beijing.

    As with the debate over Huawei, whether or not Chinese companies are currently exploiting the surveillance and control systems they are deploying across Latin America to benefit the Chinese state, Chinese law (under which they operate) requires them to do so, if the PRC government so demands.

    The PRC record of systematic espionage, forced technology transfer, and other bad behavior should leave no one in Latin America comfortable that the PRC will not, at some point in the future, exploit such an enormous opportunity.

    https://www.newsmax.com/evanellis/china-surveillance-latin-america-cameras/2019/04/12/id/911484

    #Amérique_latine #Chine #surveillance #frontières #contrôles_frontaliers #Argentine #Brésil
    ping @reka

  • Office worker launches UK’s first police facial recognition legal action
    https://www.theguardian.com/technology/2019/may/21/office-worker-launches-uks-first-police-facial-recognition-legal-action

    Ed Bridges, from Cardiff, says ‘intrusive’ technology is used on thousands of people An office worker who believes his image was captured by facial recognition cameras when he popped out for a sandwich in his lunch break has launched a groundbreaking legal battle against the use of the technology. Supported by the campaign group Liberty, Ed Bridges, from Cardiff, raised money through crowdfunding to pursue the action, claiming the suspected use of the technology on him by South Wales police (...)

    #CCTV #biométrie #procès #facial #vidéo-surveillance #surveillance #Liberty

    https://i.guim.co.uk/img/media/c1a40be9bb16ddac7902147d384d6e3236964721/0_0_3500_2100/master/3500.jpg

  • Amazon shareholders vote down proposals on facial recognition and climate change
    https://www.theverge.com/2019/5/22/18635632/amazon-shareholders-vote-facial-recognition-climate-change-investors-emplo

    Amazon shareholders have voted down proposals meant to curb sales of the company’s controversial facial recognition tool and to limit its carbon output. The proposals, which were driven by shareholding activists and employees, were nonbinding, but represented a moment of defiance against Amazon. The company’s Rekognition tool, which is sold to law enforcement, has been criticized on civil liberties grounds, and employees have said the company could be doing more to fight climate change. Two (...)

    #Amazon #Rekognition #algorithme #écologie #biométrie #facial #vidéo-surveillance #surveillance #militarisation (...)

    ##ACLU

  • Garbage In, Garbage Out
    https://www.flawedfacedata.com

    Face Recognition on Flawed Data On April 28, 2017, a suspect was caught on camera reportedly stealing beer from a CVS in New York City. The store surveillance camera that recorded the incident captured the suspect’s face, but it was partially obscured and highly pixelated. When the investigating detectives submitted the photo to the New York Police Department’s (NYPD) facial recognition system, it returned no useful matches.1 Rather than concluding that the suspect could not be identified (...)

    #NYPD #algorithme #biométrie #manipulation #facial #surveillance

  • Police are using flawed data in facial recognition searches, study finds
    https://www.cnet.com/news/police-are-using-flawed-data-in-facial-recognition-searches-study-finds

    When the faces aren’t quite there, police have resorted to using celebrity doppelgangers, artist sketches and computer-generated images. Police across the country are making facial recognition searches even when there’s barely anything to match it with. A study from the Georgetown Law Center on Privacy and Technology released Thursday looked at how police are using flawed data to run facial recognition searches, despite years of studies showing these matches aren’t reliable. That includes (...)

    #NYPD #algorithme #biométrie #manipulation #facial #surveillance

  • A photo storage app used customers’ private snaps to train facial recognition AI - The Verge
    https://www.theverge.com/2019/5/10/18564043/photo-storage-app-ever-facial-recognition-secretly-trained-ai


    Vous êtes le produit…

    A photo storage app that offers users “free, unlimited private backup of all your life’s memories” has been secretly using customers’ private snaps to train and sell facial recognition software.

    As detailed in a report from NBC News, the startup Ever launched as a simple cloud storage business in 2013, but pivoted to become a facial recognition technology vendor in 2017 after realizing that a photo app “wasn’t going to be a venture-scale business.”

    Customers, though, were not informed of this change — or how their photographs and videos are now being used.

  • China working on data privacy law but enforcement is a stumbling block | South China Morning Post
    https://www.scmp.com/news/china/politics/article/3008844/china-working-data-privacy-law-enforcement-stumbling-block

    En Chine des scientifiques s’inquiètent de la collection de données sans limites et des abus possibles par le gouvernment et des acteurs privés. Au niveau politique on essaye d’introduire des lois protégeant les données et la vie privée. D’après l’article les véritables problèmes se poseront lors de l’implémentation d’une nouvelle législation en la matière.

    Echo Xie 5 May, 2019 - Biometric data in particular needs to be protected from abuse from the state and businesses, analysts say
    Country is expected to have 626 million surveillance cameras fitted with facial recognition software by 2020

    In what is seen as a major step to protect citizens’ personal information, especially their biometric data, from abuse, China’s legislators are drafting a new law to safeguard data privacy, according to industry observers – but enforcement remains a major concern.

    “China’s private data protection law will be released and implemented soon, because of the fast development of technology, and the huge demand in society,” Zeng Liaoyuan, associate professor at the University of Electronic Science and Technology of China, said in an interview .

    Technology is rapidly changing life in China but relevant regulations had yet to catch up, Zeng said.

    Artificial intelligence and its many applications constitute a major component of China’s national plan. In 2017, the “Next Generation Artificial Intelligence Development Plan” called for the country to become the world leader in AI innovation by 2030.

    Biometrics authentication is used in computer science as an identification or access control. It includes fingerprinting, face recognition, DNA, iris recognition, palm prints and other methods.

    In particular, the use of biometric data has grown exponentially in key areas: scanning users’ fingerprints or face to pay bills, to apply for social security qualification and even to repay loans. But the lack of an overarching law lets companies gain access to vast quantities of an individual’s personal data, a practice that has raised privacy concerns.

    During the “two sessions” last month, National People’s Congress spokesman Zhang Yesui said the authorities had hastened the drafting of a law to protect personal data, but did not say when it would be completed or enacted.

    One important focus, analysts say, is ensuring that the state does not abuse its power when collecting and using private data, considering the mass surveillance systems installed in China.

    “This is a big problem in China,” said Liu Deliang, a law professor at Beijing Normal University. “Because it’s about regulating the government’s abuse of power, so it’s not only a law issue but a constitutional issue.”

    The Chinese government is a major collector and user of privacy data. According to IHS Markit, a London-based market research firm, China had 176 million surveillance cameras in operation in 2016 and the number was set to reach 626 million by 2020.

    In any proposed law, the misuse of data should be clearly defined and even the government should bear legal responsibility for its misuse, Liu said.

    “We can have legislation to prevent the government from misusing private data but the hard thing is how to enforce it.”

    Especially crucial, legal experts say, is privacy protection for biometric data.

    “Compared with other private data, biometrics has its uniqueness. It could post long-term risk and seriousness of consequence,” said Wu Shenkuo, an associate law professor at Beijing Normal University.

    “Therefore, we need to pay more attention to the scope and limitations of collecting and using biometrics.”

    Yi Tong, a lawmaker from Beijing, filed a proposal concerning biometrics legislation at the National People’s Congress session last month.

    “Once private biometric data is leaked, it’s a lifetime leak and it will put the users’ private data security into greater uncertainty, which might lead to a series of risks,” the proposal said.

    Yi suggested clarifying the boundary between state power and private rights, and strengthening the management of companies.

    In terms of governance, Wu said China should specify the qualifications entities must have before they can collect, use and process private biometric data. He also said the law should identify which regulatory agencies would certify companies’ information.

    There was a need to restrict government behaviour when collecting private data, he said, and suggested some form of compensation for those whose data was misused.

    “Private data collection at the government level might involve the need for the public interest,” he said. “In this case, in addition to ensuring the legal procedure, the damage to personal interests should be compensated.”

    Still, data leaks, or overcollecting, is common in China.

    A survey released by the China Consumers Association in August showed that more than 85 per cent of respondents had suffered some sort of data leak, such as their cellphone numbers being sold to spammers or their bank accounts being stolen.

    Another report by the association in November found that of the 100 apps it investigated, 91 had problems with overcollecting private data.

    One of them, MeituPic, an image editing software program, was criticised for collecting too much biometric data.

    The report also cited Ant Financial Services, the operator of the Alipay online payments service, for the way it collects private data, which it said was incompatible with the national standard. Ant Financial is an affiliate of Alibaba Group, which owns the South China Morning Post.

    In January last year, Ant Financial had to apologise publicly for automatically signing up users for a social credit programme without obtaining their consent.

    “When a company asks for a user’s private data, it’s unscrupulous, because we don’t have a law to limit their behaviour,” Zeng said.

    “Also it’s about business competition. Every company wants to hold its customers, and one way is to collect their information as much as possible.”

    Tencent and Alibaba, China’s two largest internet companies, did not respond to requests for comment about the pending legislation.

    #Chine #droit #vie_privée #surveillance #politique

  • The Terrifying Potential of the 5G Network | The New Yorker
    https://www.newyorker.com/news/annals-of-communications/the-terrifying-potential-of-the-5g-network

    Two words explain the difference between our current wireless networks and 5G: speed and latency. 5G—if you believe the hype—is expected to be up to a hundred times faster. (A two-hour movie could be downloaded in less than four seconds.) That speed will reduce, and possibly eliminate, the delay—the latency—between instructing a computer to perform a command and its execution. This, again, if you believe the hype, will lead to a whole new Internet of Things, where everything from toasters to dog collars to dialysis pumps to running shoes will be connected. Remote robotic surgery will be routine, the military will develop hypersonic weapons, and autonomous vehicles will cruise safely along smart highways. The claims are extravagant, and the stakes are high. One estimate projects that 5G will pump twelve trillion dollars into the global economy by 2035, and add twenty-two million new jobs in the United States alone. This 5G world, we are told, will usher in a fourth industrial revolution.

    A totally connected world will also be especially susceptible to cyberattacks. Even before the introduction of 5G networks, hackers have breached the control center of a municipal dam system, stopped an Internet-connected car as it travelled down an interstate, and sabotaged home appliances. Ransomware, malware, crypto-jacking, identity theft, and data breaches have become so common that more Americans are afraid of cybercrime than they are of becoming a victim of violent crime. Adding more devices to the online universe is destined to create more opportunities for disruption. “5G is not just for refrigerators,” Spalding said. “It’s farm implements, it’s airplanes, it’s all kinds of different things that can actually kill people or that allow someone to reach into the network and direct those things to do what they want them to do. It’s a completely different threat that we’ve never experienced before.”

    Spalding’s solution, he told me, was to build the 5G network from scratch, incorporating cyber defenses into its design.

    There are very good reasons to keep a company that appears to be beholden to a government with a documented history of industrial cyber espionage, international data theft, and domestic spying out of global digital networks. But banning Huawei hardware will not secure those networks. Even in the absence of Huawei equipment, systems still may rely on software developed in China, and software can be reprogrammed remotely by malicious actors. And every device connected to the fifth-generation Internet will likely remain susceptible to hacking. According to James Baker, the former F.B.I. general counsel who runs the national-security program at the R Street Institute, “There’s a concern that those devices that are connected to the 5G network are not going to be very secure from a cyber perspective. That presents a huge vulnerability for the system, because those devices can be turned into bots, for example, and you can have a massive botnet that can be used to attack different parts of the network.”

    This past January, Tom Wheeler, who was the F.C.C. chairman during the Obama Administration, published an Op-Ed in the New York Times titled “If 5G Is So Important, Why Isn’t It Secure?” The Trump Administration had walked away from security efforts begun during Wheeler’s tenure at the F.C.C.; most notably, in recent negotiations over international standards, the U.S. eliminated a requirement that the technical specifications of 5G include cyber defense. “For the first time in history,” Wheeler wrote, “cybersecurity was being required as a forethought in the design of a new network standard—until the Trump F.C.C. repealed it.” The agency also rejected the notion that companies building and running American digital networks were responsible for overseeing their security. This might have been expected, but the current F.C.C. does not consider cybersecurity to be a part of its domain, either. “I certainly did when we were in office,” Wheeler told me. “But the Republicans who were on the commission at that point in time, and are still there, one being the chairman, opposed those activities as being overly regulatory.”

    Opening up new spectrum is crucial to achieving the super-fast speeds promised by 5G. Most American carriers are planning to migrate their services to a higher part of the spectrum, where the bands are big and broad and allow for colossal rivers of data to flow through them. (Some carriers are also working with lower-spectrum frequencies, where the speeds will not be as fast but likely more reliable.) Until recently, these high-frequency bands, which are called millimetre waves, were not available for Internet transmission, but advances in antenna technology have made it possible, at least in theory. In practice, millimetre waves are finicky: they can only travel short distances—about a thousand feet—and are impeded by walls, foliage, human bodies, and, apparently, rain.

    Deploying millions of wireless relays so close to one another and, therefore, to our bodies has elicited its own concerns. Two years ago, a hundred and eighty scientists and doctors from thirty-six countries appealed to the European Union for a moratorium on 5G adoption until the effects of the expected increase in low-level radiation were studied. In February, Senator Richard Blumenthal, a Democrat from Connecticut, took both the F.C.C. and F.D.A. to task for pushing ahead with 5G without assessing its health risks. “We’re kind of flying blind here,” he concluded. A system built on millions of cell relays, antennas, and sensors also offers previously unthinkable surveillance potential. Telecom companies already sell location data to marketers, and law enforcement has used similar data to track protesters. 5G will catalogue exactly where someone has come from, where they are going, and what they are doing. “To give one made-up example,” Steve Bellovin, a computer-science professor at Columbia University, told the Wall Street Journal, “might a pollution sensor detect cigarette smoke or vaping, while a Bluetooth receiver picks up the identities of nearby phones? Insurance companies might be interested.” Paired with facial recognition and artificial intelligence, the data streams and location capabilities of 5G will make anonymity a historical artifact.

    To accommodate these limitations, 5G cellular relays will have to be installed inside buildings and on every city block, at least. Cell relays mounted on thirteen million utility poles, for example, will deliver 5G speeds to just over half of the American population, and cost around four hundred billion dollars to install. Rural communities will be out of luck—too many trees, too few people—despite the F.C.C.’s recently announced Rural Digital Opportunity Fund.

    Deploying millions of wireless relays so close to one another and, therefore, to our bodies has elicited its own concerns. Two years ago, a hundred and eighty scientists and doctors from thirty-six countries appealed to the European Union for a moratorium on 5G adoption until the effects of the expected increase in low-level radiation were studied. In February, Senator Richard Blumenthal, a Democrat from Connecticut, took both the F.C.C. and F.D.A. to task for pushing ahead with 5G without assessing its health risks. “We’re kind of flying blind here,” he concluded. A system built on millions of cell relays, antennas, and sensors also offers previously unthinkable surveillance potential. Telecom companies already sell location data to marketers, and law enforcement has used similar data to track protesters. 5G will catalogue exactly where someone has come from, where they are going, and what they are doing. “To give one made-up example,” Steve Bellovin, a computer-science professor at Columbia University, told the Wall Street Journal, “might a pollution sensor detect cigarette smoke or vaping, while a Bluetooth receiver picks up the identities of nearby phones? Insurance companies might be interested.” Paired with facial recognition and artificial intelligence, the data streams and location capabilities of 5G will make anonymity a historical artifact.

    #Surveillance #Santé #5G #Cybersécurité

  • One Month, 500,000 Face Scans : How China Is Using A.I. to Profile a Minority
    https://www.nytimes.com/2019/04/14/technology/china-surveillance-artificial-intelligence-racial-profiling.html

    In a major ethical leap for the tech world, Chinese start-ups have built algorithms that the government uses to track members of a largely Muslim minority group. The Chinese government has drawn wide international condemnation for its harsh crackdown on ethnic Muslims in its western region, including holding as many as a million of them in detention camps. Now, documents and interviews show that the authorities are also using a vast, secret system of advanced facial recognition technology (...)

    #algorithme #CCTV #biométrie #vidéo-surveillance #discrimination #surveillance #profiling #Islam (...)

    ##facial

  • #CBP terminates controversial $297 million #Accenture contract amid continued staffing struggles

    #Customs_and_Border_Protection on Thursday ended its controversial $297 million hiring contract with Accenture, according to two senior DHS officials and an Accenture representative.
    As of December, when CBP terminated part of its contract, the company had only completed processing 58 applicants and only 22 had made it onto the payroll about a year after the company was hired.
    At the time, the 3,500 applicants that remained in the Accenture hiring pipeline were transferred to CBP’s own hiring center to complete the process.

    CBP cut ties with Accenture on processing applicants a few months ago, it retained some services, including marketing, advertising and applicant support.
    This week, the entire contract was terminated for “convenience,” government speak for agreeing to part ways without placing blame on Accenture.
    While government hiring is “slow and onerous, it’s also part of being in the government” and that’s “something we have to accept and deal with as we go forward,” said one of the officials.
    For its efforts, CBP paid Accenture around $19 million in start-up costs, and around $2 million for 58 people who got job offers, according to the officials.
    Over the last couple of months, CBP explored how to modify the contract, but ultimately decided to completely stop work and return any remaining funds to taxpayers.
    But it’s unclear how much money, if any, that will be.

    In addition, to the funds already paid to Accenture, CBP has around $39 million left to “settle and close the books” with the company, an amount which has yet to be determined.
    In November 2017, CBP awarded Accenture the contract to help meet the hiring demands of an executive order on border security that President Donald Trump signed during his first week in office. The administration directed CBP to hire an additional 7,500 agents and officers on top of its current hiring goals.
    “We were in a situation where we needed to try something new” and “break the cycle of going backwards,” said a DHS official about why the agency started the contract.

    Meanwhile, hiring remains difficult for the agency amid a surge of migrants at the southern border that is stretching CBP resources thin.
    It “continues to be a very challenging environment,” said one official about hiring efforts this year.

    In fact, one of the reasons that CBP didn’t need Accenture to process applicants, is because the agency didn’t receive as many applications as it initially planned for.
    The agency has been focused on beating attrition and has been able to recently “beat it by a modest amount,” said the official. “Ultimately we would like to beat it by a heck of a lot, but we’re not there yet.”

    https://edition.cnn.com/2019/04/05/politics/cbp-terminate-hiring-contract-accenture/index.html
    #frontières #contrôles_frontaliers #USA #Ests-Unis #complexe_militaro-industriel #business

    • Border Profiteers

      On a recent sunny spring afternoon in Texas, a couple hundred Border Patrol agents, Homeland Security officials, and salespeople from a wide array of defense and security contractors gathered at the Bandera Gun Club about an hour northwest of San Antonio to eat barbecue and shoot each other’s guns. The techies wore flip-flops; the veterans wore combat boots. Everyone had a good time. They were letting loose, having spent the last forty-eight hours cooped up in suits and ties back at San Antonio’s Henry B. Gonzalez convention center, mingling and schmoozing, hawking their wares, and listening to immigration officials rail about how those serving in enforcement agencies are not, under any circumstances, Nazis.

      These profiteers and bureaucrats of the immigration-industrial complex were fresh from the 2019 #Border_Security_Expo —essentially a trade show for state violence, where law enforcement officers and weapons manufacturers gather, per the Expo’s marketing materials, to “identify and address new and emerging border challenges and opportunities through technology, partnership, and innovation.” The previous two days of panels, speeches, and presentations had been informative, a major in the Argentine Special Forces told me at the gun range, but boring. He was glad to be outside, where handguns popped and automatic rifles spat around us. I emptied a pistol into a target while a man in a Three Percenter militia baseball hat told me that I was a “natural-born killer.” A drone buzzed overhead until, in a demonstration of a company’s new anti-drone technology, a device that looked like a rocket launcher and fired a sort of exploding net took it down. “This is music to me,” the Argentine major said.

      Perhaps it’s not surprising the Border Security Expo attendees were so eager to blow off steam. This year’s event found many of them in a defensive posture, given the waves of bad press they’d endured since President Trump’s inauguration, and especially since the disastrous implementation of his family separation policy, officially announced by former Attorney General Jeff Sessions in April of 2018, before being rescinded by Trump two-and-a-half months later. Throughout the Expo, in public events and in background roundtable conversations with reporters, officials from the various component parts of the Department of Homeland Security rolled out a series of carefully rehearsed talking points: Immigrations and Customs Enforcement (ICE) and Customs and Border Patrol (CBP) need more money, personnel, and technology; taking migrants to hospitals distracts CBP officers from their real mission; and the 1997 Flores court settlement, which prohibits immigration enforcement agencies from detaining migrant families with children for more than twenty days, is undermining the very sovereignty of the United States. “We want a secure border, we want an immigration system that has integrity,” Ronald Vitiello, then–acting head of ICE, said in a keynote address to the hundreds of people gathered in San Antonio. “We have a generous immigration system in this country, but it has to have integrity in order for us to continue to be so generous.”

      More of a technocrat than his thuggish predecessor Thomas Homan, Vitiello also spoke at length about using the “dark web” to take down smugglers and the importance of having the most up-to-date data-management technology. But he spoke most adamantly about needing “a fix” for the Flores settlement. “If you prosecute crimes and you give people consequences, you get less of it,” he said. “With Flores, there’s no consequence, and everybody knows that,” a senior ICE official echoed to reporters during a background conversation immediately following Vitiello’s keynote remarks. “That’s why you’re seeing so many family units. We cannot apply a consequence to a family unit, because we have to release them.”

      Meanwhile, around 550 miles to the west, in El Paso, hundreds of migrants, including children and families, were being held by CBP under a bridge, reportedly forced to sleep on the ground, with inadequate medical attention. “They treated us like we are animals,” one Honduran man told Texas Monthly. “I felt what they were trying to do was to hurt us psychologically, so we would understand that this is a lesson we were being taught, that we shouldn’t have crossed.” Less than a week after the holding pen beneath the bridge closed, Vitiello’s nomination to run ICE would be pulled amid a spate of firings across DHS; President Trump wanted to go “in a tougher direction.”

      Family Values

      On the second day of the Border Security Expo, in a speech over catered lunch, Scott Luck, deputy chief of Customs and Border Protection and a career Border Patrol agent, lamented that the influx of children and families at the border meant that resources were being diverted from traditional enforcement practices. “Every day, about 150 agents spend their shifts at hospitals and medical facilities with illegal aliens receiving treatment,” he said. “The annual salary cost for agents on hospital watch is more than $11.5 million. Budget analysts estimate that 13 percent of our operational budget—the budget that we use to buy equipment, to buy vehicles for our men and women—is now used for transportation, medical expenses, diapers, food, and other necessities to care for illegal aliens in Border Patrol custody.”

      As far as Luck was concerned, every dollar spent on food and diapers is one not spent on drones and weapons, and every hour an agent spends guarding a migrant in a hospital is an hour they don’t spend on the border. “It’s not what they signed up for. The mission they signed up for is to protect the United States border, to protect the communities in which they live and serve,” he told reporters after his speech. “The influx, the volume, the clutter that this creates is frustrating.” Vitiello applied an Orwellian inversion: “We’re not helping them as fast as we want to,” he said of migrant families apprehended at the border.

      Even when discussing the intimate needs of detained migrant families, the language border officials used to describe their remit throughout the Expo was explicitly militaristic: achieving “operational control,” Luck said, requires “impedance and denial” and “situational awareness.” He referred to technology as a “vital force multiplier.” He at least stopped short of endorsing the president’s framing that what is happening on the border constitutes an invasion, instead describing it as a “deluge.”

      According to the Migration Policy Institute, a non-partisan think tank, the U.S. immigrant population has continued to grow—although at a slower rate than it did before the 2007 recession, and undocumented people appear to make up a smaller proportion of the overall population. Regardless, in fiscal year 2018, both ICE and CBP stepped up their enforcement activities, arresting, apprehending, and deporting people at significantly higher rates than the previous year. More than three times as many family members were apprehended at the border last year than in 2017, the Pew Research Center reports, and in the first six months of FY 2019 alone there were 189,584 apprehensions of “family units”: more than half of all apprehensions at the border during that time, and more than the full-year total of apprehended families for any other year on record. While the overall numbers have not yet begun to approach those of the 1980s and 1990s, when apprehensions regularly exceeded one million per year, the demographics of who is arriving at the United States southern border are changing: fewer single men from Mexico and more children and families from Guatemala, Honduras, and El Salvador—in other words, an ever-wider range of desperate victims of drug gangs and American policies that have long supported corrupt regimes.

      This change has presented people like Luck with problems they insist are merely logistical: aging Border Patrol stations, he told us at the Expo, “are not luxurious in any way, and they were never intended to handle families and children.” The solution, according to Vitiello, is “continued capital investment” in those facilities, as well as the cars and trucks necessary to patrol the border region and transport those apprehended from CBP custody to ICE detention centers, the IT necessary to sift through vast amounts of data accumulated through untold surveillance methods, and all of “the systems by which we do our work.”

      Neither Vitiello nor Luck would consider whether those systems—wherein thousands of children, ostensibly under the federal government’s care, have been sexually abused and five, from December through May of this year, have died—ought to be questioned. Both laughed off calls from migrant justice organizers, activists, and politicians to abolish ICE. “The concept of the Department of Homeland Security—and ICE as an agency within it—was designed for us to learn the lessons from 9/11,” Vitiello said. “Those needs still exist in this society. We’re gonna do our part.” DHS officials have even considered holding migrant children at Guantánamo Bay, Cuba, according to the New York Times, where a new $23 million “contingency mass migration complex” is being built. The complex, which is to be completed by the end of the year, will have a capacity of thirteen thousand.

      Violence is the Point

      The existence of ICE may be a consequence of 9/11, but the first sections of fencing along the U.S.-Mexico border—originally to contain livestock—went up in 1909 through 1911. In 1945, in response to a shift in border crossings from Texas to California, the U.S. Border Patrol and the Immigration and Naturalization Service recycled fencing wire and posts from internment camps in Crystal City, Texas, where more than a hundred thousand Japanese Americans had been imprisoned during World War II. “Although the INS could not erect a continuous line of fence along the border, they hoped that strategic placement of the fence would ‘compel persons seeking to enter the United States illegally to attempt to go around the ends of the fence,’” historian Kelly Lytle Hernández, quoting from government documents, writes in Migra! A History of the U.S. Border Patrol. “What lay at the end of the fences and canals were desert lands and mountains extremely dangerous to cross without guidance or sufficient water. The fences, therefore, discouraged illegal immigration by exposing undocumented border crossers to the dangers of daytime dehydration and nighttime hypothermia.”

      Apprehension and deportation tactics continued to escalate in the years following World War II—including Operation Wetback, the infamous (and heavily propagandized) mass-deportation campaign of 1954—but the modern, militarized border era was greatly boosted by Bill Clinton. It was during Clinton’s first administration that Border Patrol released its “Strategic Plan: 1994 and Beyond,” which introduced the idea of “prevention through deterrence,” a theory of border policing that built on the logic of the original wall and hinges upon increasing the “cost” of migration “to the point that many will consider it futile to continue to attempt illegal entry.” With the Strategic Plan, the agency was requesting more money, officers, and equipment in order to “enhance national security and safeguard our immigration heritage.”

      The plan also noted that “a strong interior enforcement posture works well for border control,” and in 1996, amid a flurry of legislation targeting people of color and the poor, Congress passed the Illegal Immigration Reform and Immigrant Responsibility Act, which empowered the federal government to deport more people more quickly and made it nearly impossible for undocumented immigrants to obtain legal status. “Before 1996, internal enforcement activities had not played a very significant role in immigration enforcement,” the sociologists Douglas Massey and Karen A. Pren wrote in 2012. “Afterward these activities rose to levels not seen since the deportation campaigns of the Great Depression.” With the passage of the Patriot Act in 2001 and the creation of the Department of Homeland Security and Immigration and Customs Enforcement in 2002, immigration was further securitized and criminalized, paving the way for an explosion in border policing technology that has further aligned the state with the defense and security industry. And at least one of Border Patrol’s “key assumptions,” explicitly stated in the 1994 strategy document, has borne out: “Violence will increase as effects of strategy are felt.”

      What this phrasing obscures, however, is that violence is the border strategy. In practice, what “prevention through deterrence” has meant is forcing migrants to cross the U.S.-Mexico border in the desert, putting already vulnerable people at even greater risk. Closing urban points of entry, for example, or making asylum-seekers wait indefinitely in Mexico while their claims are processed, pushes migrants into remote areas where there is a higher likelihood they will suffer injury and death, as in the case of seven-year-old Jakil Caal Maquin, who died of dehydration and shock after being taken into CBP custody in December. (A spokesperson for CBP, in an email response, deflected questions about whether the agency considers children dying in its custody a deterrent.) Maquin is one of many thousands who have died attempting to cross into the United States: the most conservative estimate comes from CBP itself, which has recovered the remains of 7,505 people from its southwest border sectors between 1998 and 2018. This figure accounts for neither those who die on the Mexican side of the border, nor those whose bodies remain lost to the desert.

      Draconian immigration policing causes migrants to resort to smugglers and traffickers, creating the conditions for their exploitation by cartels and other violent actors and increasing the likelihood that they will be kidnapped, coerced, or extorted. As a result, some migrants have sought the safety of collective action in the form of the “caravan” or “exodus,” which has then led the U.S. media and immigration enforcement agencies to justify further militarization of the border. Indeed, in his keynote address at the Expo, Luck described “the emerging prevalence of large groups of one hundred people or more” as “troubling and especially dangerous.” Later, a sales representative for the gun manufacturer Glock very confidently explained to me that this was because agents of al-Shabaab, the al-Qaeda affiliate in Somalia, were embedded with the caravans.

      Branding the Border

      Unsurprisingly, caravans came up frequently at the Border Security Expo. (An ICE spokesperson would later decline to explain what specific threat they pose to national security, instead citing general statistics about the terrorist watchlist, “special interest aliens,” and “suspicious travel patterns.”) During his own keynote speech, Vitiello described how ICE, and specifically its subcomponent Homeland Security Investigations, had deployed surveillance and intelligence-gathering techniques to monitor the progress of caravans toward the border. “When these caravans have come, we’ve had trained, vetted individuals on the ground in those countries reporting in real time what they were seeing: who the organizers were, how they were being funded,” he said, before going on an astonishing tangent:

      That’s the kind of capability that also does amazing things to protecting brands, property rights, economic security. Think about it. If you start a company, introduce a product that’s innovative, there are people in the world who can take that, deconstruct it, and create their own version of it and sell it as yours. All the sweat that went into whatever that product was, to build your brand, they’ll take it away and slap it on some substandard product. It’s not good for consumers, it’s not good for public safety, and it’s certainly an economic drain on the country. That’s part of the mission.

      That the then–acting director of ICE, the germ-cell of fascism in the bourgeois American state, would admit that an important part of his agency’s mission is the protection of private property is a testament to the Trump administration’s commitment to saying the quiet part out loud.

      In fact, brands and private industry had pride of place at the Border Security Expo. A memorial ceremony for men and women of Border Patrol who have been killed in the line of duty was sponsored by Sava Solutions, an IT firm that has been awarded at least $482 million in federal contracts since 2008. Sava, whose president spent twenty-four years with the DEA and whose director of business development spent twenty with the FBI, was just one of the scores of firms in attendance at the Expo, each hoping to persuade the bureaucrats in charge of acquiring new gear for border security agencies that their drones, their facial recognition technology, their “smart” fences were the best of the bunch. Corporate sponsors included familiar names like Verizon and Motorola, and other less well-known ones, like Elbit Systems of America, a subsidiary of Israel’s largest private defense contractor, as well as a handful of IT firms with aggressive slogans like “Ever Vigilant” (CACI), “Securing the Future” (ManTech), and “Securing Your Tomorrow” (Unisys).

      The presence of these firms—and indeed the very existence of the Expo—underscores an important truth that anyone attempting to understand immigration politics must reckon with: border security is big business. The “homeland security and emergency management market,” driven by “increasing terrorist threats and biohazard attacks and occurrence of unpredictable natural disasters,” is projected to grow to more than $742 billion by 2023 from $557 billion in 2018, one financial analysis has found. In the coming decades, as more people are displaced by climate catastrophe and economic crises—estimates vary between 150 million and 1 billion by 2050—the industry dedicated to policing the vulnerable stands to profit enormously. By 2013, the United States was already spending more on federal immigration enforcement than all other federal law enforcement agencies combined, including the FBI and DEA; ICE’s budget has doubled since its inception in 2003, while CBP’s has nearly tripled. Between 1993 and 2018, the number of Border Patrol agents grew from 4,139 to 19,555. And year after year, Democrats and Republicans alike have been happy to fuel an ever more high-tech deportation machine. “Congress has given us a lot of money in technology,” Luck told reporters after his keynote speech. “They’ve given us over what we’ve asked for in technology!”

      “As all of this rhetoric around security has increased, so has the impetus to give them more weapons and more tools and more gadgets,” Jacinta Gonzalez, a senior campaign organizer with Mijente, a national network of migrant justice activists, told me. “That’s also where the profiteering comes in.” She continued: “Industries understand what’s good for business and adapt themselves to what they see is happening. If they see an administration coming into power that is pro-militarization, anti-immigrant, pro-police, anti-communities of color, then that’s going to shape where they put their money.”

      By way of example, Gonzalez pointed to Silicon Valley billionaire Peter Thiel, who spent $1.25 million supporting Trump’s 2016 election campaign and followed that up last year by donating $1 million to the Club for Growth—a far-right libertarian organization founded by Heritage Foundation fellow and one-time Federal Reserve Board prospect Stephen Moore—as well as about $350,000 to the Republican National Committee and other GOP groups. ICE has awarded Palantir, the $20 billion surveillance firm founded by Thiel, several contracts worth tens of millions of dollars to manage its data streams—a partnership the agency considers “mission critical,” according to documents reviewed by The Intercept. Palantir, in turn, runs on Amazon Web Services, the cloud computing service provided by the world’s most valuable public company, which is itself a key contractor in managing the Department of Homeland Security’s $6.8 billion IT portfolio.

      Meanwhile, former DHS secretary John Kelly, who was Trump’s chief of staff when the administration enacted its “zero-tolerance” border policy, has joined the board of Caliburn International—parent organization of the only for-profit company operating shelters for migrant children. “Border enforcement and immigration policy,” Caliburn reported in an SEC filing last year, “is driving significant growth.” As Harsha Walia writes in Undoing Border Imperialism, “the state and capitalism are again in mutual alliance.”

      Triumph of the Techno-Nativists

      At one point during the Expo, between speeches, I stopped by a booth for Network Integrity Systems, a security firm that had set up a demonstration of its Sentinel™ Perimeter Intrusion Detection System. A sales representative stuck out his hand and introduced himself, eager to explain how his employer’s fiber optic motion sensors could be used at the border, or—he paused to correct himself—“any kind of perimeter.” He invited me to step inside the space that his coworkers had built, starting to say “cage” but then correcting himself, again, to say “small enclosure.” (It was literally a cage.) If I could get out, climbing over the fencing, without triggering the alarm, I would win a $500 Amazon gift card. I did not succeed.

      Overwhelmingly, the vendors in attendance at the Expo were there to promote this kind of technology: not concrete and steel, but motion sensors, high-powered cameras, and drones. Customs and Border Patrol’s chief operating officer John Sanders—whose biography on the CBP website describes him as a “seasoned entrepreneur and innovator” who has “served on the Board of Directors for several leading providers of contraband detection, geospatial intelligence, and data analytics solutions”—concluded his address by bestowing on CBP the highest compliment he could muster: declaring the agency comparable “to any start-up.” Rhetoric like Sanders’s, ubiquitous at the Expo, renders the border both bureaucratic and boring: a problem to be solved with some algorithmic mixture of brutality and Big Data. The future of border security, as shaped by the material interests that benefit from border securitization, is not a wall of the sort imagined by President Trump, but a “smart” wall.

      High-ranking Democrats—leaders in the second party of capital—and Republicans from the border region have championed this compromise. During the 2018-2019 government shutdown, House Homeland Security Committee Chairman Bennie Thompson told reporters that Democrats would appropriate $5.7 billion for “border security,” so long as that did not include a wall of Trump’s description. “Walls are primitive. What we need to do is have border security,” House Majority Whip Jim Clyburn said in January. He later expanded to CNN: “I’ve said that we ought to have a smart wall. I defined that as a wall using drones to make it too high to get over, using x-ray equipment to make it too wide to get around, and using scanners to go deep enough not to be able to tunnel under it. To me, that would be a smart thing to do.”

      Even the social democratic vision of Senator Bernie Sanders stops short at the border. “If you open the borders, my God, there’s a lot of poverty in this world, and you’re going to have people from all over the world,” he told Iowa voters in early April, “and I don’t think that’s something that we can do at this point.” Over a week later, during a Fox News town hall with Pennsylvania voters, he recommitted: “We need border security. Of course we do. Who argues with that? That goes without saying.”

      To the extent that Trump’s rhetoric, his administration’s immigration policies, and the enforcement agencies’ practices have made the “border crisis” more visible than ever before, they’ve done so on terms that most Democrats and liberals fundamentally agree with: immigration must be controlled and policed; the border must be enforced. One need look no further than the high priest of sensible centrism, Thomas Friedman, whose major complaint about Trump’s immigration politics is that he is “wasting” the crisis—an allusion to Rahm Emanuel’s now-clichéd remark that “you never want a serious crisis to go to waste.” (Frequently stripped of context, it is worth remembering that Emanuel made this comment in the throes of the 2008 financial meltdown, at the Wall Street Journal’s CEO Council, shortly following President Obama’s election.) “Regarding the border, the right place for Democrats to be is for a high wall with a big gate,” Friedman wrote in November of 2018. A few months later, a tour led by Border Patrol agents of the San Ysidro port of entry in San Diego left Friedman “more certain than ever that we have a real immigration crisis and that the solution is a high wall with a big gate—but a smart gate.”

      As reasonable as this might sound to anxious New York Times readers looking for what passes as humanitarian thinking in James Bennet’s opinion pages, the horror of Friedman’s logic eventually reveals itself when he considers who might pass through the big, smart gate in the high, high wall: “those who deserve asylum” and “a steady flow of legal, high-energy, and high-I.Q. immigrants.” Friedman’s tortured hypothetical shows us who he considers to be acceptable subjects of deportation and deprivation: the poor, the lazy, and the stupid. This is corporate-sponsored, state-sanctioned eugenics: the nativism of technocrats.

      The vision of a hermetically sealed border being sold, in different ways, by Trump and his allies, by Democrats, and by the Border Security Expo is in reality a selectively permeable one that strictly regulates the movement of migrant labor while allowing for the unimpeded flow of capital. Immigrants in the United States, regardless of their legal status, are caught between two factions of the capitalist class, each of which seek their immiseration: the citrus farmers, construction firms, and meat packing plants that benefit from an underclass of unorganized and impoverished workers, and the defense and security firms that keep them in a state of constant criminality and deportability.

      You could even argue that nobody in a position of power really wants a literal wall. Even before taking office, Trump himself knew he could only go so far. “We’re going to do a wall,” he said on the campaign trail in 2015. However: “We’re going to have a big, fat beautiful door on the wall.” In January 2019, speaking to the American Farm Bureau Association, Trump acknowledged the necessity of a mechanism allowing seasonal farmworkers from Mexico to cross the border, actually promising to loosen regulations on employers who rely on temporary migrant labor. “It’s going to be easier for them to get in than what they have to go through now,” he said, “I know a lot about the farming world.”

      At bottom, there is little material difference between this and what Friedman imagines to be the smarter, more humane approach. While establishment liberals would no doubt prefer that immigration enforcement be undertaken quietly, quickly, and efficiently, they have no categorical objection to the idea that noncitizens should enjoy fewer rights than citizens or be subject to different standards of due process (standards that are already applied in deeply inequitable fashion).

      As the smorgasbord of technologies and services so garishly on display at the Border Security Expo attests, maintaining the contradiction between citizens and noncitizens (or between the imperial core and the colonized periphery) requires an ever-expanding security apparatus, which itself becomes a source of ever-expanding profit. The border, shaped by centuries of bourgeois interests and the genocidal machinations of the settler-colonial nation-state, constantly generates fresh crises on which the immigration-industrial complex feeds. In other words, there is not a crisis at the border; the border is the crisis.

      CBP has recently allowed Anduril, a start-up founded by one of Peter Thiel’s mentees, Palmer Luckey, to begin testing its artificial intelligence-powered surveillance towers and drones in Texas and California. Sam Ecker, an Anduril engineer, expounded on the benefits of such technology at the Expo. “A tower doesn’t get tired. It doesn’t care about being in the middle of the desert or a river around the clock,” he told me. “We just let the computers do what they do best.”

      https://thebaffler.com/outbursts/border-profiteers-oconnor

  • The #saas 10-Year Challenge
    https://hackernoon.com/the-saas-10-year-challenge-ca21265f9061?source=rss----3a8144eabfe3---4

    If you are on the internet, you’ve probably heard of this latest fad, The 10-Year Challenge, or the 2009 vs. 2019 Challenge. It’s simple, you post an old photo from 2009 next to a recent photo taken in 2019 and give it a nice caption. Somewhat like this ?Same old Salesforce, just 10x bigger and better ?While people are going nuts posting their 10-year challenges, data scientists are happy that they found a golden data set to train their facial recognition algorithms. Jokes apart, on a serious note I started wondering what if SaaS took the 10-Year-Challenge.. Presenting to you “The SaaS 10-Year Challenge”Let’s look at some interesting trends and understand how far we came across as an industry!From “selling software” to “serving customers”Back in the day if you were a SaaS company, you were (...)

    #venture-capital #saas-ten-year-challenge #b2b #martech

  • Our Government Should Not Be Conducting Facial Surveillance
    https://onezero.medium.com/our-government-should-not-be-conducting-facial-surveillance-54cc13f1

    New proposals for regulating the use of face recognition technology are major victories for the legislative imagination, even if they don’t become law The debate over facial recognition technology has advanced to the point where one thing is clear : It must be regulated. Not only have civil rights groups like the ACLU made this case, but even companies like Microsoft and Amazon acknowledge that change is necessary. The question, then, is what’s the best way to respond to the dangers that (...)

    #Apple #Microsoft #Amazon #FaceID #CCTV #biométrie #surveillance #vidéo-surveillance #facial (...)

    ##ACLU
    https://cdn-images-1.medium.com/focal/1200/632/48/47/0*mrafMjbFiGSdWsFT

  • 55% of Americans approve the use of facial recognition for public safety, but the technology raises privacy concerns
    https://bonus.usbeketrica.com/article/facial-recognition-regulatory-framework-science-china

    Facial recognition could make us safer and prove useful in fields such as science and history. However, to avoid a dystopian scenario, there is a growing demand for a regulatory framework. There are a few technologies that instantly bring up fears, echoing the gloomy, nightmarish and dystopian worlds invented by science fiction authors such as Philip K. Dick, Arthur C. Clarke or Kurt Vonnegut. Facial recognition, with its potential for mass surveillance and invasion of private life, is (...)

    #Google #Microsoft #Amazon #CCTV #biométrie #facial #surveillance #vidéo-surveillance

  • Facial recognition’s ’dirty little secret’ : Millions of online photos scraped without consent
    https://www.nbcnews.com/tech/internet/facial-recognition-s-dirty-little-secret-millions-online-photos-scraped-n98

    People’s faces are being used without their permission, in order to power technology that could eventually be used to surveil them, legal experts say. Facial recognition can log you into your iPhone, track criminals through crowds and identify loyal customers in stores. The technology — which is imperfect but improving rapidly — is based on algorithms that learn how to recognize human faces and the hundreds of ways in which each one is unique. To do this well, the algorithms must be fed (...)

    #Google #IBM #Facebook #Flickr #Google_Images #Wikipedia #YouTube #algorithme #IBM_Watson #biométrie #facial (...)

    ##discrimination

  • Prison visitors get face recognition scans in drug crackdown
    https://www.bbc.com/news/uk-47461035

    Facial recognition and eye scanning have been deployed at prisons to prevent drug smuggling. The Ministry of Justice said the biometric scans for visitors were designed to help staff identify people bringing in contraband. At one prison, there were more “no shows” from visitors than usual after they learned the scans were being used. But prison campaigners said if families were deterred from visiting, then it would be “counter-productive”. In the trials, facial recognition technology (...)

    #CCTV #biométrie #iris #facial #surveillance #prison

  • Don’t look now : why you should be worried about machines reading your emotions
    https://www.theguardian.com/technology/2019/mar/06/facial-recognition-software-emotional-science

    Machines can now allegedly identify anger, fear, disgust and sadness. ‘Emotion detection’ has grown from a research project to a $20bn industry Could a program detect potential terrorists by reading their facial expressions and behavior ? This was the hypothesis put to the test by the US Transportation Security Administration (TSA) in 2003, as it began testing a new surveillance program called the Screening of Passengers by Observation Techniques program, or Spot for short. While developing (...)

    #algorithme #CCTV #biométrie #émotions #facial #vidéo-surveillance #surveillance

    https://i.guim.co.uk/img/media/c4065215d89a80ef2bcddf3851045421b26a200d/0_193_6144_3686/master/6144.jpg

  • Whoever Predicts the Future Will Win the AI Arms Race – Foreign Policy
    https://foreignpolicy.com/2019/03/05/whoever-predicts-the-future-correctly-will-win-the-ai-arms-race-russi


    A screen shows visitors being filmed by AI security cameras with facial recognition technology at the 14th China International Exhibition on Public Safety and Security at the China International Exhibition Center in Beijing on Oct. 24, 2018.
    NICOLAS ASFOURI/AFP/GETTY IMAGES)

    The race for advanced artificial intelligence has already started. A few weeks ago, U.S. President Donald Trump signed an executive order creating the “#American_AI_Initiative,” with which the United States joined other major countries pursuing national strategies for developing AI. China released its “New Generation Plan” in 2017, outlining its strategy to lead the world in AI by 2030. Months after that announcement, Russian President Vladimir Putin declared, “Whoever becomes the leader in this sphere will become the ruler of the world.”Russian President Vladimir Putin declared,

    But it’s less clear how much AI will advance, exactly. It may only be able to perform fairly menial tasks like classifying photographs, driving, or bookkeeping. There’s also a distinct possibility that AI will become as smart as humans or more so, able to make complex decisions independently. A race toward a technology with such a range of possible final states, stretching from banal to terrifying, is inherently unstable. A research program directed toward one understanding of AI may prove to have been misdirected after years of work. Alternatively, a plan to focus on small and achievable advances could be leapfrogged by a more ambitious effort.

    China, the United States, and Russia are each negotiating this fraught landscape differently, in ways responsive to their unique economic and military situations. Governments are motivated to pursue leadership in AI by the promise of gaining a strategic advantage. At this early stage, it’s tough to tell what sort of advantage is at stake, because we don’t know what sort of thing AI will turn out to be. Since AI is a technology, it’s natural to think of it as a mere resource that can assist in attaining one’s goals, perhaps by allowing drones to fly without supervision or increasing the efficiency of supply chains.

    But computers could surpass humans in finding optimal ways of organizing and using resources. If so, they might become capable of making high-level strategic decisions. After all, there aren’t material limitations restricting the intelligence of algorithms, like those that restrict the speed of planes or range of rockets. Machines more intelligent than the smartest of humans, with more strategic savvy, are a conceptual possibility that must be reckoned with. China, Russia, and the United States are approaching this possibility in different ways. The statements and research priorities released by major powers reveal how their policymakers think AI’s developmental trajectory will unfold.

    China is pursuing the most aggressive strategy, focusing on developing advanced AI that could contribute to strategic decision-making. The U.S. approach is more conservative, with the goal of producing computers that can assist human decision-making but not contribute on their own. Finally, Russia’s projects are directed at creating military hardware that relies on AI but leaves decisions about deployment entirely in the hands of generals. In all three situations, the forms of AI these governments are investing their resources in reveal their expectations of the technological future. The country that gets it right could reap huge benefits in terms of military might and global influence.

  • 18 Surprising Uses of Facial Recognition You Didn’t Know Existed
    https://hackernoon.com/18-surprising-uses-of-facial-recognition-you-didnt-know-existed-af18244a

    New advancements in #technology led to the widespread use of facial recognition technology. More and more business and organizations are using technology because it is fast and requires minimal interaction from the user. It is primarily used for security purposes. Many businesses and homeowners who use this technology do so in an attempt to ensure that only authorized persons can enter specific areas or access certain devices.But you’d be surprised to know about some of this technology’s many other uses. Here are some you most probably didn’t know existed.Finding Missing PersonsFacial recognition systems use a database to add photos of missing persons. The system alerts law enforcers when there is a possible matchEarly Threat DetectionUS Customs officials use facial recognition technology to (...)

    #face-recognition #facial-recognition #privacy #innovation

  • Preserving #privacy in the Age of Facial Recognition
    https://hackernoon.com/preserving-privacy-in-the-age-of-facial-recognition-78ef22647383?source=

    Public anonymity is dead. While that phrase, “public anonymity” may sound like an oxymoron, let me explain: You can no longer walk along a street, visit a store, or attend an event without the possibility that someone — a government entity, a storeowner, or a tech giant — knows that you are there and can track everywhere else you’ve been, simply by your physical appearance.In 2018, facial recognition #technology spent a lot of time in the news. Between Amazon licensing their Rekognition product to law enforcement, the presence of gender and racial bias in some of the current technology, and China’s use of facial recognition to publicly shame jaywalkers, it’s clear that society is facing moral and philosophical questions about who owns and should have access to your physical identity and (...)

    #identity-management #futurism #security

  • New report exposes global reach of powerful governments who equip, finance and train other countries to spy on their populations

    Privacy International has today released a report that looks at how powerful governments are financing, training and equipping countries — including authoritarian regimes — with surveillance capabilities. The report warns that rather than increasing security, this is entrenching authoritarianism.

    Countries with powerful security agencies are spending literally billions to equip, finance, and train security and surveillance agencies around the world — including authoritarian regimes. This is resulting in entrenched authoritarianism, further facilitation of abuse against people, and diversion of resources from long-term development programmes.

    The report, titled ‘Teach ’em to Phish: State Sponsors of Surveillance’ is available to download here.

    Examples from the report include:

    In 2001, the US spent $5.7 billion in security aid. In 2017 it spent over $20 billion [1]. In 2015, military and non-military security assistance in the US amounted to an estimated 35% of its entire foreign aid expenditure [2]. The report provides examples of how US Departments of State, Defense, and Justice all facilitate foreign countries’ surveillance capabilities, as well as an overview of how large arms companies have embedded themselves into such programmes, including at surveillance training bases in the US. Examples provided include how these agencies have provided communications intercept and other surveillance technology, how they fund wiretapping programmes, and how they train foreign spy agencies in surveillance techniques around the world.

    The EU and individual European countries are sponsoring surveillance globally. The EU is already spending billions developing border control and surveillance capabilities in foreign countries to deter migration to Europe. For example, the EU is supporting Sudan’s leader with tens of millions of Euros aimed at capacity building for border management. The EU is now looking to massively increase its expenditure aimed at building border control and surveillance capabilities globally under the forthcoming Multiannual Financial Framework, which will determine its budget for 2021–2027. Other EU projects include developing the surveillance capabilities of security agencies in Tunisia, Burkina Faso, Somalia, Iraq and elsewhere. European countries such as France, Germany, and the UK are sponsoring surveillance worldwide, for example, providing training and equipment to “Cyber Police Officers” in Ukraine, as well as to agencies in Saudi Arabia, and across Africa.

    Surveillance capabilities are also being supported by China’s government under the ‘Belt and Road Initiative’ and other efforts to expand into international markets. Chinese companies have reportedly supplied surveillance capabilities to Bolivia, Venezuela, and Ecuador [3]. In Ecuador, China Electronics Corporation supplied a network of cameras — including some fitted with facial recognition capabilities — to the country’s 24 provinces, as well as a system to locate and identify mobile phones.

    Edin Omanovic, Privacy International’s Surveillance Programme Lead, said

    “The global rush to make sure that surveillance is as universal and pervasive as possible is as astonishing as it is disturbing. The breadth of institutions, countries, agencies, and arms companies that are involved shows how there is no real long-term policy or strategic thinking driving any of this. It’s a free-for-all, where capabilities developed by some of the world’s most powerful spy agencies are being thrown at anyone willing to serve their interests, including dictators and killers whose only goal is to cling to power.

    “If these ‘benefactor’ countries truly want to assist other countries to be secure and stable, they should build schools, hospitals, and other infrastructure, and promote democracy and human rights. This is what communities need for safety, security, and prosperity. What we don’t need is powerful and wealthy countries giving money to arms companies to build border control and surveillance infrastructure. This only serves the interests of those powerful, wealthy countries. As our report shows, instead of putting resources into long-term development solutions, such programmes further entrench authoritarianism and spur abuses around the world — the very things which cause insecurity in the first place.”

    https://privacyinternational.org/press-release/2161/press-release-new-report-exposes-global-reach-powerful-governm

    #surveillance #surveillance_de_masse #rapport

    Pour télécharger le rapport “Teach ’em to Phish: State Sponsors of Surveillance”:
    https://privacyinternational.org/sites/default/files/2018-07/Teach-em-to-Phish-report.pdf

    ping @fil

    • China Uses DNA to Track Its People, With the Help of American Expertise

      The Chinese authorities turned to a Massachusetts company and a prominent Yale researcher as they built an enormous system of surveillance and control.

      The authorities called it a free health check. Tahir Imin had his doubts.

      They drew blood from the 38-year-old Muslim, scanned his face, recorded his voice and took his fingerprints. They didn’t bother to check his heart or kidneys, and they rebuffed his request to see the results.

      “They said, ‘You don’t have the right to ask about this,’” Mr. Imin said. “‘If you want to ask more,’ they said, ‘you can go to the police.’”

      Mr. Imin was one of millions of people caught up in a vast Chinese campaign of surveillance and oppression. To give it teeth, the Chinese authorities are collecting DNA — and they got unlikely corporate and academic help from the United States to do it.

      China wants to make the country’s Uighurs, a predominantly Muslim ethnic group, more subservient to the Communist Party. It has detained up to a million people in what China calls “re-education” camps, drawing condemnation from human rights groups and a threat of sanctions from the Trump administration.

      Collecting genetic material is a key part of China’s campaign, according to human rights groups and Uighur activists. They say a comprehensive DNA database could be used to chase down any Uighurs who resist conforming to the campaign.

      Police forces in the United States and elsewhere use genetic material from family members to find suspects and solve crimes. Chinese officials, who are building a broad nationwide database of DNA samples, have cited the crime-fighting benefits of China’s own genetic studies.

      To bolster their DNA capabilities, scientists affiliated with China’s police used equipment made by Thermo Fisher, a Massachusetts company. For comparison with Uighur DNA, they also relied on genetic material from people around the world that was provided by #Kenneth_Kidd, a prominent #Yale_University geneticist.

      On Wednesday, #Thermo_Fisher said it would no longer sell its equipment in Xinjiang, the part of China where the campaign to track Uighurs is mostly taking place. The company said separately in an earlier statement to The New York Times that it was working with American officials to figure out how its technology was being used.

      Dr. Kidd said he had been unaware of how his material and know-how were being used. He said he believed Chinese scientists were acting within scientific norms that require informed consent by DNA donors.

      China’s campaign poses a direct challenge to the scientific community and the way it makes cutting-edge knowledge publicly available. The campaign relies in part on public DNA databases and commercial technology, much of it made or managed in the United States. In turn, Chinese scientists have contributed Uighur DNA samples to a global database, potentially violating scientific norms of consent.

      Cooperation from the global scientific community “legitimizes this type of genetic surveillance,” said Mark Munsterhjelm, an assistant professor at the University of Windsor in Ontario who has closely tracked the use of American technology in Xinjiang.

      Swabbing Millions

      In Xinjiang, in northwestern China, the program was known as “#Physicals_for_All.”

      From 2016 to 2017, nearly 36 million people took part in it, according to Xinhua, China’s official news agency. The authorities collected DNA samples, images of irises and other personal data, according to Uighurs and human rights groups. It is unclear whether some residents participated more than once — Xinjiang has a population of about 24.5 million.

      In a statement, the Xinjiang government denied that it collects DNA samples as part of the free medical checkups. It said the DNA machines that were bought by the Xinjiang authorities were for “internal use.”

      China has for decades maintained an iron grip in Xinjiang. In recent years, it has blamed Uighurs for a series of terrorist attacks in Xinjiang and elsewhere in China, including a 2013 incident in which a driver struck two people in Tiananmen Square in Beijing.

      In late 2016, the Communist Party embarked on a campaign to turn the Uighurs and other largely Muslim minority groups into loyal supporters. The government locked up hundreds of thousands of them in what it called job training camps, touted as a way to escape poverty, backwardness and radical Islam. It also began to take DNA samples.

      In at least some of the cases, people didn’t give up their genetic material voluntarily. To mobilize Uighurs for the free medical checkups, police and local cadres called or sent them text messages, telling them the checkups were required, according to Uighurs interviewed by The Times.

      “There was a pretty strong coercive element to it,” said Darren Byler, an anthropologist at the University of Washington who studies the plight of the Uighurs. “They had no choice.”

      Calling Dr. Kidd

      Kenneth Kidd first visited China in 1981 and remained curious about the country. So when he received an invitation in 2010 for an expenses-paid trip to visit Beijing, he said yes.

      Dr. Kidd is a major figure in the genetics field. The 77-year-old Yale professor has helped to make DNA evidence more acceptable in American courts.

      His Chinese hosts had their own background in law enforcement. They were scientists from the Ministry of Public Security — essentially, China’s police.

      During that trip, Dr. Kidd met Li Caixia, the chief forensic physician of the ministry’s Institute of Forensic Science. The relationship deepened. In December 2014, Dr. Li arrived at Dr. Kidd’s lab for an 11-month stint. She took some DNA samples back to China.

      “I had thought we were sharing samples for collaborative research,” said Dr. Kidd.

      Dr. Kidd is not the only prominent foreign geneticist to have worked with the Chinese authorities. Bruce Budowle, a professor at the University of North Texas, says in his online biography that he “has served or is serving” as a member of an academic committee at the ministry’s Institute of Forensic Science.

      Jeff Carlton, a university spokesman, said in a statement that Professor Budowle’s role with the ministry was “only symbolic in nature” and that he had “done no work on its behalf.”

      “Dr. Budowle and his team abhor the use of DNA technology to persecute ethnic or religious groups,” Mr. Carlton said in the statement. “Their work focuses on criminal investigations and combating human trafficking to serve humanity.”

      Dr. Kidd’s data became part of China’s DNA drive.

      In 2014, ministry researchers published a paper describing a way for scientists to tell one ethnic group from another. It cited, as an example, the ability to distinguish Uighurs from Indians. The authors said they used 40 DNA samples taken from Uighurs in China and samples from other ethnic groups from Dr. Kidd’s Yale lab.

      In patent applications filed in China in 2013 and 2017, ministry researchers described ways to sort people by ethnicity by screening their genetic makeup. They took genetic material from Uighurs and compared it with DNA from other ethnic groups. In the 2017 filing, researchers explained that their system would help in “inferring the geographical origin from the DNA of suspects at crime scenes.”

      For outside comparisons, they used DNA samples provided by Dr. Kidd’s lab, the 2017 filing said. They also used samples from the 1000 Genomes Project, a public catalog of genes from around the world.

      Paul Flicek, member of the steering committee of the 1000 Genomes Project, said that its data was unrestricted and that “there is no obvious problem” if it was being used as a way to determine where a DNA sample came from.

      The data flow also went the other way.

      Chinese government researchers contributed the data of 2,143 Uighurs to the Allele Frequency Database, an online search platform run by Dr. Kidd that was partly funded by the United States Department of Justice until last year. The database, known as Alfred, contains DNA data from more than 700 populations around the world.

      This sharing of data could violate scientific norms of informed consent because it is not clear whether the Uighurs volunteered their DNA samples to the Chinese authorities, said Arthur Caplan, the founding head of the division of medical ethics at New York University’s School of Medicine. He said that “no one should be in a database without express consent.”

      “Honestly, there’s been a kind of naïveté on the part of American scientists presuming that other people will follow the same rules and standards wherever they come from,” Dr. Caplan said.

      Dr. Kidd said he was “not particularly happy” that the ministry had cited him in its patents, saying his data shouldn’t be used in ways that could allow people or institutions to potentially profit from it. If the Chinese authorities used data they got from their earlier collaborations with him, he added, there is little he can do to stop them.

      He said he was unaware of the filings until he was contacted by The Times.

      Dr. Kidd also said he considered his collaboration with the ministry to be no different from his work with police and forensics labs elsewhere. He said governments should have access to data about minorities, not just the dominant ethnic group, in order to have an accurate picture of the whole population.

      As for the consent issue, he said the burden of meeting that standard lay with the Chinese researchers, though he said reports about what Uighurs are subjected to in China raised some difficult questions.

      “I would assume they had appropriate informed consent on the samples,” he said, “though I must say what I’ve been hearing in the news recently about the treatment of the Uighurs raises concerns.”
      Machine Learning

      In 2015, Dr. Kidd and Dr. Budowle spoke at a genomics conference in the Chinese city of Xi’an. It was underwritten in part by Thermo Fisher, a company that has come under intense criticism for its equipment sales in China, and Illumina, a San Diego company that makes gene sequencing instruments. Illumina did not respond to requests for comment.

      China is ramping up spending on health care and research. The Chinese market for gene-sequencing equipment and other technologies was worth $1 billion in 2017 and could more than double in five years, according to CCID Consulting, a research firm. But the Chinese market is loosely regulated, and it isn’t always clear where the equipment goes or to what uses it is put.

      Thermo Fisher sells everything from lab instruments to forensic DNA testing kits to DNA mapping machines, which help scientists decipher a person’s ethnicity and identify diseases to which he or she is particularly vulnerable. China accounted for 10 percent of Thermo Fisher’s $20.9 billion in revenue, according to the company’s 2017 annual report, and it employs nearly 5,000 people there.

      “Our greatest success story in emerging markets continues to be China,” it said in the report.

      China used Thermo Fisher’s equipment to map the genes of its people, according to five Ministry of Public Security patent filings.

      The company has also sold equipment directly to the authorities in Xinjiang, where the campaign to control the Uighurs has been most intense. At least some of the equipment was intended for use by the police, according to procurement documents. The authorities there said in the documents that the machines were important for DNA inspections in criminal cases and had “no substitutes in China.”

      In February 2013, six ministry researchers credited Thermo Fisher’s Applied Biosystems brand, as well as other companies, with helping to analyze the DNA samples of Han, Uighur and Tibetan people in China, according to a patent filing. The researchers said understanding how to differentiate between such DNA samples was necessary for fighting terrorism “because these cases were becoming more difficult to crack.”

      The researchers said they had obtained 95 Uighur DNA samples, some of which were given to them by the police. Other samples were provided by Uighurs voluntarily, they said.

      Thermo Fisher was criticized by Senator Marco Rubio, Republican of Florida, and others who asked the Commerce Department to prohibit American companies from selling technology to China that could be used for purposes of surveillance and tracking.

      On Wednesday, Thermo Fisher said it would stop selling its equipment in Xinjiang, a decision it said was “consistent with Thermo Fisher’s values, ethics code and policies.”

      “As the world leader in serving science, we recognize the importance of considering how our products and services are used — or may be used — by our customers,” it said.

      Human rights groups praised Thermo Fisher’s move. Still, they said, equipment and information flows into China should be better monitored, to make sure the authorities elsewhere don’t send them to Xinjiang.

      “It’s an important step, and one hopes that they apply the language in their own statement to commercial activity across China, and that other companies are assessing their sales and operations, especially in Xinjiang,” said Sophie Richardson, the China director of Human Rights Watch.

      American lawmakers and officials are taking a hard look at the situation in Xinjiang. The Trump administration is considering sanctions against Chinese officials and companies over China’s treatment of the Uighurs.

      China’s tracking campaign unnerved people like Tahir Hamut. In May 2017, the police in the city of Urumqi in Xinjiang drew the 49-year-old Uighur’s blood, took his fingerprints, recorded his voice and took a scan of his face. He was called back a month later for what he was told was a free health check at a local clinic.

      Mr. Hamut, a filmmaker who is now living in Virginia, said he saw between 20 to 40 Uighurs in line. He said it was absurd to think that such frightened people had consented to submit their DNA.

      “No one in this situation, not under this much pressure and facing such personal danger, would agree to give their blood samples for research,” Mr. Hamut said. “It’s just inconceivable.”

      https://www.nytimes.com/2019/02/21/business/china-xinjiang-uighur-dna-thermo-fisher.html?action=click&module=MoreInSect
      #USA #Etats-Unis #ADN #DNA #Ouïghours #université #science #génétique #base_de_données