Tuesday, October 12, 2021

PRE-CRIMING SCHOOL KIDS

There is a new report yesterday

US schools gave kids laptops during the pandemic. Then they spied on them

According to one survey, 81% of teachers in America said their schools monitor devices. Students are not always aware

 

JESSICA CRISPIN:"When the pandemic started last year, countless forms of inequality were exposed – including the millions of American families who don’t have access to laptops or broadband internet. After some delays, schools across the country jumped into action and distributed technology to allow students to learn remotely.
The catch? They ended up spying on students.
“For their own good”, of course.
According to recent research by the Center for Democracy and Technology (CDT), “86% of teachers reported that, during the pandemic, schools provided tablets, laptops, or Chromebooks to students at twice the rate (43%) prior to the pandemic, an illustration of schools’ attempts to close disparities in digital access.”

The problem is, a lot of those electronics were being used to monitor students, even combing through private chats, emails and documents all in the name of protecting them. More than 80% of surveyed teachers and 77% of surveyed high school students told the CDT that their schools use surveillance software on those devices, and the more reliant students are on those electronics, unable to afford supplementary phones or tablets, the more they are subjected to scrutiny.

> I can certainly understand why schools would jump on technology they think might prevent teen suicide, bullying, and the like. The pandemic has been hard on everyone, and increased isolation and uncertainty is particularly hard on kids and teenagers. Students are reporting an increase in self-harm incidents and aggressive impulses since the beginning of lockdowns, and shoving everyone back together for a new school year is going to require adjustments.

> The only problem is that we’ve tried this before, in a different form. Everyone’s proposed solution to the advent of school shootings was, “Well, let’s just watch these little deviants much more closely.” Metal detectors at the entrance to schools became the norm, police had a more visible presence, and security cameras went up in classrooms and hallways.

That was a big business; schools spent billions of dollars on security infrastructure that mostly proved to be ineffective. And the results were, well, you’ll never guess! Kids felt unsafe, Black students were followed and harassed most frequently, and punishments increased as educational outcomes worsened. And, while some schools have started questioning whether their contracts with the police create more harm than good, others are simply adding digital surveillance to their physical systems.

Students from disadvantaged backgrounds are less likely to have private electronics not subject to surveillance, and will have less privacy when it comes to doing the perverted embarrassing things all teenagers do. And if students’ references to drug use or pornography or violent thoughts might be forwarded to law enforcement, it will be, as usual, the kids already subjected to a greater number of interactions with police and social workers and other forms of monitoring and punishment who will suffer the increased attention.

Although schools and parents are quick to voice concerns over privacy, it remains unclear whether the result of all of this monitoring is safety – and if so, safety for whom? Safer for students? Surveys suggest students are mostly aware they are being monitored but are not fully cognizant of the extent. Many of these programs boast that teachers have direct access to the screens of their students, even after school hours are over. Teachers and administrators can hijack control of the computers remotely, closing problematic tabs and overriding their keyboards. Does that make kids feel safe?

Then there is the tricky question of the promise of “intervention”. The goal of the surveillance, according to the software companies, is to allow for a problem to be spotted and intervened with early on. . ."

READ MORE:

US schools gave kids laptops during the pandemic. Then they spied on them

_____________________________________________________________________________
This RELATED CONTENT ON THIS BLOG
1
A POST FROM NOV 24, 2020
 
GIGO: Garbage In Garbage Out
Predictive Policing ...Life-Long Surveillance Starts in Schools
 
  
4 years ago a post on this blog featured this topic and highlighted a contract award as well as cautions. Nevertheless that are pervasive lingering issues that continue to this day and are updated when abuses of the system - now applied to public education in schools - are investigated
"Pretty much anything can get a student labelled a problem child whose future criminal activity is a presumed destiny . . .According to the Sheriff's pre-crime program, kids who have witnessed or been the victim of domestic abuse will probably become criminals. So will those who are struggling academically, have missed classes, or have been sent to the office for discipline.

Florida Sheriff's Pre-Crime Software Says D-Students And Victims Of Domestic Violence Are Potential Criminals

from the nothing-a-good-handcuffing-can't-fix dept

Predictive policing is coming for your children. That's what's happening in Florida, where the Pasco County Sheriff's Office has taken an inappropriate interest in minors. It all begins with some questionable access to sensitive records and ends with the Sheriff deciding some students are destined for a life of crime. (h/t WarOnPrivacy)

This seems like the sort of thing better handled by school counselors, social workers, and others not inclined to view students as criminals. But it's in the hands of the Sheriff's office, along with sensitive information about students not normally considered to be under law enforcement's purview.

The Pasco County Sheriff claims this is all about helping kids -- not predetermining their destiny.

In a series of written statements, the Sheriff’s Office said the list is used only to help the deputies assigned to middle and high schools offer “mentorship” and “resources” to students.

Asked for specifics, it pointed to one program where school resource officers take children fishing and another where they give clothes to kids in need.

The documents obtained by TampaBay.com say something else.

Image result for huh emoji images

The Office's manual [PDF], which provides guidance for the Sheriff's [what fresh dystopian hell is] "juvenile intelligence analysts," places far more emphasis on determining who should be placed on lifelong surveillance due to their alleged criminal tendencies than finding help for at-risk students. . .

Some school administrators seem largely unaware their schools' data is being used to profile minors. The Sheriff's Office, however, claims it has been the recipient of student info/data for two decades. Its move to put minors on the same level as adults is perhaps to be expected, given the lack of oversight or awareness by anyone else involved. . .

And so it goes. The data schools are sharing with law enforcement is fed into a spreadsheet that prejudges kids, setting them up for more interactions with law enforcement… which sets them up for even more marks in the at risk column . . .

It would be nice to believe this garbage in/garbage out pre-criming ends when a student graduates high school. But there's no reason to believe the Sheriff's Office doesn't feed info on graduates into its other pre-crime system, ensuring deputies spend a considerable amount of time hassling people they suspect might commit a crime at some undetermined point in the future.

-------------------------------------------------------------------------------------------------------------------------------

Mesa City Council Meeting Tomorrow: Contract Authorizations for over $8 Million Dollars

Mesa City Council Meeting Final Agenda
Monday, August 22, 2016

10 November 2016

PredPol: Predictive Policing Software Purchased by City of Mesa

*5-h
3-Year Contract = $170,200
16-0861 Three-Year Term Contract for Predictive Policing Subscription for the Police Department (Sole Source) (Citywide)
Image result for huh emoji images

This contract will provide services, resources and tools to support a successful implementation of Predictive Policing (PredPol) services to support the City’s efforts to suppress, deter and reduce crime. 
PredPol software will provide easy to use predictions for where and when property crime, drug crime, gun violence, gang activity and traffic incidents are most likely to occur based on historical data, current crimes and mathematical modeling.
The Police Department and Purchasing recommend awarding the contract to the sole source vendor, PredPol; year 1 at $60,400; and years 2 and 3 at $54,900 annually, based on estimated requirements. 

The one-time setup fee of $5,500 and an annual subscription fee of $54,900 (for the first three years) are funded by the Asset Forfeiture (RICO) Funds.

____________________________________________________________________________

Over the next three years, Mesa will spend nearly $200,000 to implement a state-of-the-art crime-predicting software. Wochit-
Data-Driven Policing Still Problematic
Now Being Used By Government Agencies For Revenue Generation
Source >> TechDirt
Data, even lots of it, can be useful. But it also leads to erroneous conclusions and questionable correlations.
Ever been baffled by the content of a "targeted" ad? Just imagine the fun you'll have when "lol 'targeted' ad" is replaced with nearly-incessant "interactions" with law enforcement
Back on August 21st your MesaZona blogger uploaded three posts about this software purchase that was approved by the Mesa City Council ... those ignored issues are here now.
When even the companies gathering the data are concerned about the implications, there's a problem. (One issue being: why don't they stop?) Anything that can be obtained (preferably in bulk) without a warrant will be. And it gets funneled into predictive policing software that attempts to mold disparate info into a usable whole.
Lost in the shuffle are the individuals now represented by data points and algorithms. A data point located in the "wrong" neighborhood could result in surveillance backed by nothing resembling reasonable, articulable suspicion.
It's not all bad, though. There are uses for aggregate data that don't create privacy concerns or fears of ever more biased policing . . .
On the other hand, the desire to obtain any data available without a warrant is resulting in some very twisted uses of third-party records. . .
Maria Polletta posted this article in the Arizona Republic on October 21, 2016 - two months after the Mesa City Council approved contracts, addressing lingering issues that few people are aware of . . . Over the next three years, Mesa will spend nearly $200,000 to implement PredPol crime-predicting software with councilmembers little informed about it.
 Can new Mesa police tool prevent crime from happening?
In August, a Mesa staff report asserted PredPol's hot-spot-generation tool would "support the city’s efforts to suppress, deter and reduce crime."
The department still is working to determine when it will begin using the software; how many officers it will train to use it; and what, if any, any tools or strategies it will use to measure PredPol's effectiveness, police spokesman Nik Rasheta said.
...Mesa Vice Mayor Dennis Kavanaugh, a longtime advocate of innovation and experimentation in public safety, called predictive policing "one of the best practices recommended for departments to consider," despite its potential limitations. . .
---------------------------------------------------------------------------------------------------------------

The city council also approved in later meetings license plate reader software, cautions that were expressed not here in Mesa
Official Police Business: 
Does predictive policing actually work?    
 
Crime forecasting tools are taking off, but good data is hard to find
By Matt Stroud on   @MattStroud

Official Police Business is a weekly column and newsletter by reporter Matt Stroud about new developments in police technology, and the ways technology is changing law enforcement — think body cameras, cell-site simulators, surveillance systems, and electroshock weapons. Sign up to receive OPB in your email every Wednesday at officialpolicebusiness.com,
---------------------------------------------------------------------------------------------------------------------------
Hunchlab's predictive policing, explained 
Video >>  https://volume.vox-cdn.com/embed/ae6a05d46?placement=article&tracking=article%3Amiddle&player_type=null&start_time=null#ooid=VsM3FtMDE6nBxlgrY9L3T-H8BJkYGv4m

Predictive policing is everywhere . . . private company PredPol is supposedly helping police to identify where property crimes and robberies might occur. As those cities’ predictive programs have gotten more and more attention, police chiefs have done their best to get in on the action. . . 
But does predictive policing actually work? 
 
Reference:
https://mesazona.blogspot.com/2020/11/gigo-garbage-in-garbage-out-predictive.html 
 
___________________________________________________________________________
2

PRE-CRIMING SCHOOLKIDS

Schools Are Using Phone-Cracking Tech To Access The Contents Of Students' Devices

from the brave-new-hellscape dept

To the detriment of our nation's future, the future of our nation is increasingly being subjected to law enforcement's presents (and presence).

> On the plus side, it will help students grow up with a healthy distrust of their government.

PRE-CRIMING SCHOOLKIDS

Schools Are Using Phone-Cracking Tech To Access The Contents Of Students' Devices

from the brave-new-hellscape dept

To the detriment of our nation's future, the future of our nation is increasingly being subjected to law enforcement's presents (and presence). On the plus side, it will help students grow up with a healthy distrust of their government.

We've put cops in schools so kids can be subjected to the same brutality adults receive. Disciplinary problems long-handled by schools and parents are now handled with handcuffs and criminal charges. The same questionable science that leads cops to believe future criminal acts can be predicted by algorithms and checklists is being wielded against children, turning their bad grades and We're talking about minors here, not dangerous criminals. This case is not a great argument for the acquisition and use of phone-cracking tools by educators. There were many ways to approach this problem, but this one was the easiest. And it shows those selling phone-cracking tech don't really care who buys it or what they use it for.

Cracking a phone to scrape it for evidence gives investigators easy access to communications and other private info even a consenting minor wouldn't agree to share with others. But the tools can't make that distinction. And investigators assume consent for a search means looking at everything the tools give them access to spotty attendance records into criminal predicates. . .

This isn't some sort of anomaly. As Gizmodo reports, multiple school districts are buying phone-cracking tech to access the content of students' devices.

In March 2020, the North East Independent School District, a largely Hispanic district north of San Antonio, wrote a check to Cellebrite for $6,695 for “General Supplies.”

Now, there's this: the use of high-tech hacking tools to forensically scrape kids' phones for evidence of alleged criminal acts. . .

According to Gizmodo, only eight districts in the US acknowledge publicly (via their websites) that they own device-cracking tech. The actual number is definitely much higher. This total doesn't include law enforcement agencies that own or have access to the tech, and whose "school resource officers" might decide is necessary to investigate students or their accusations against school employees.

Deploying this tech to search students' phones isn't just irresponsible, it's dangerous

. . .Dig deep enough into someone's phone and you'll find something incriminating. And that's if the cops are simply looking for evidence. Some cops like to look at stuff just because they have the access and the power to demand compliance. Access to this tech guarantees abuse. But in these cases, the victim will be a minor -- people who are assumed to be more vulnerable and whose lives can be ruined before they can even be started.

Filed Under: education, encryption, law enforcement, phone cracking, schools, surveillance
Companies: cellebrite, susteen We've put cops in schools so kids can be subjected to the same brutality adults receive. Disciplinary problems long-handled by schools and parents are now handled with handcuffs and criminal charges. The same questionable science that leads cops to believe future criminal acts can be predicted by algorithms and checklists is being wielded against children, turning their bad grades and We're talking about minors here, not dangerous criminals. This case is not a great argument for the acquisition and use of phone-cracking tools by educators. There were many ways to approach this problem, but this one was the easiest. And it shows those selling phone-cracking tech don't really care who buys it or what they use it for.

Cracking a phone to scrape it for evidence gives investigators easy access to communications and other private info even a consenting minor wouldn't agree to share with others. But the tools can't make that distinction. And investigators assume consent for a search means looking at everything the tools give them access to spotty attendance records into criminal predicates. . .

This isn't some sort of anomaly. As Gizmodo reports, multiple school districts are buying phone-cracking tech to access the content of students' devices.

In March 2020, the North East Independent School District, a largely Hispanic district north of San Antonio, wrote a check to Cellebrite for $6,695 for “General Supplies.”

Now, there's this: the use of high-tech hacking tools to forensically scrape kids' phones for evidence of alleged criminal acts. . .

According to Gizmodo, only eight districts in the US acknowledge publicly (via their websites) that they own device-cracking tech. The actual number is definitely much higher. This total doesn't include law enforcement agencies that own or have access to the tech, and whose "school resource officers" might decide is necessary to investigate students or their accusations against school employees.

Deploying this tech to search students' phones isn't just irresponsible, it's dangerous

. . .Dig deep enough into someone's phone and you'll find something incriminating. And that's if the cops are simply looking for evidence. Some cops like to look at stuff just because they have the access and the power to demand compliance. Access to this tech guarantees abuse. But in these cases, the victim will be a minor -- people who are assumed to be more vulnerable and whose lives can be ruined before they can even be started.

Filed Under: education, encryption, law enforcement, phone cracking, schools, surveillance
Companies: cellebrite, susteen 

 

Monday, October 11, 2021

WHISTLEBLOWER: Sophie Zhang 2 Years Ago

Her own story + some advice
Whistleblowing is never straightforward - Sophie Zhang struggled to find guidance on the best way to go about it. If you’re in that position now, here’s her best advice on how to navigate the complicated path to becoming a whistleblower.

It’s your decision – trust yourself

"In the end, whistleblowing is an intensely personal decision that very few will ever consider. It’s easy to criticize from the outside, but many feel differently when they face those risks themselves. Every time I advise others, I remind them that I can provide advice but the ultimate decision is their own. I am glad that I chose to come forward, and that Frances did as well, but no one is obligated to torch their career in pursuit of justice."

How to blow the whistle on Facebook – from someone who already did

Untitled Artwork (5)
Sophie Zhang, right, the whistleblower who came forward two years ago. Last week Frances Haugen, left, testified before Congress. Composite: Rex/Shutterstock/Guardian

This April, Sophie Zhang told the world about her employer’s failure to combat deception and abuse. Her advice? No screenshots, lawyer up – and trust yourself

Sophie Zhang: " wo years ago, I did something I almost never do: I put on a dress. Then I dropped my phone and other electronics off at the home of friends who had agreed to tell anyone who asked that I was at their place the entire time, and headed to the Oakland offices of the Guardian for my first meeting with a reporter.

 

 

Leaving my electronics was a safeguard against possible tracking by my then employer, Facebook. The dress was an additional layer of alibi: I theorized that if anyone from work saw me and could contradict my first alibi, they might conclude that my unusual behavior was evidence of nothing more than an affair.

That first, anxious meeting was the beginning of a lengthy process that would culminate in my decision – 18 months later and after I had been fired by Facebook – to step forward and blow the whistle on Facebook’s failure to combat deception and abuse by powerful politicians around the world.

This month, another Facebook whistleblower, Frances Haugen, has come forward. After providing the Wall Street Journal and US government with thousands of internal documents showing Facebook’s internal research into its own harms, Haugen testified to Congress. Her testimony and revelations have captured the imaginations of the public, the press and Capital Hill and raised hopes that regulators might finally act to rein in Facebook’s immense power.

During her testimony, Haugen encouraged “more tech employees to come forward through legitimate channels … to make sure that the public has the information they need”.

Decide what you’re willing to risk

Whistleblowing is not for everyone; I knew Facebook employees on H1-B visas who considered speaking, but could not risk being fired and deported. Speaking out internally or anonymously to the press will risk your current job. Speaking out publicly will risk your future career. Providing documentation will risk lawsuits and legal action. These risks can be minimized, but not eliminated.

Decide whether you’re going to go public

The first question you have to ask yourself is whether your aim is to change the minds of employees and leadership, or to pressure them via public opinion? Employees will be more sympathetic to the company than the general public; an internal post denouncing the chief executive as intentionally undermining democracy might alienate your co-workers, but can move the window of discussion. Before I went public, I used Facebook’s internal message board, Workplace, to try to effect change. It was only when this failed that I decided to go to the press.

If you do make an internal post, remember that leaks are inevitable, and consider how your words can be misunderstood. When I wrote my departure memo, I naively thought it would not leak, and wrote for an audience of insiders. One of the consequences of this was that a stray comment about “actors” (referring to people who take certain actions) resulted in incorrect reports in the Indian press that Bollywood stars were interfering with elections.

Exhaust your internal options

Don’t let the company claim that they were ignorant of the situation and issues you’re speaking out about, or allege that you had failed to speak to the right people. Even if you expect complaints to be ignored, consider making them nevertheless – in writing – so you can point to them later.

Decide what you’re going to say

Speaking out about an area of personal expertise gives you credibility and insight, but narrows your scope to areas that may not arouse as much public interest. Speaking out about topics beyond your normal work will require you to conduct research and seek out internal documents you wouldn’t normally look at – creating a digital trail that could expose you – but could make your story more compelling. Be careful that what you say is correct and you aren’t making assumptions based on any personal bias or opinions; would-be “whistleblowers” have come forward with unconvincing revelations based on preconceptions.

Expect to face company criticism regardless of what you speak on – Facebook dismissed Haugen for speaking about issues beyond her scope, and attempted the same for myself even though I spoke only about topics I personally worked on.

Whatever you speak about, consider what your end goal is and whether your revelations will accomplish that. Risking your career to help a tech reporter live-tweet a company meeting may not be the risk/reward ratio you had in mind.

No screenshots, no work devices

Never contact outside parties (such as reporters or lawyers) via work devices; only do so via end-to-end encrypted systems like Signal on your personal devices. To securely copy work documents, use a personal device to take photos of the screen; do not take screenshots. If you’re accessing many documents, ensure that you have a plausible alibi. If leaking while employed, ensure that you’re only sharing documents that many employees have recently accessed. And if you intend to go public, insulate yourself beforehand by removing personal information online with a service like DeleteMe.

Save up for a year without pay

If you intend to go public with documentation, ensure that you’re able to survive off savings for at least a year. Most would-be-whistleblowers I’ve spoken to are concerned that they won’t be able to find another job. I worried about this too, but I’ve actually received many recruiting attempts – an experience also reported by others. Nevertheless, talking to the press, civil society and government officials is time consuming and will probably prevent you from working for some time. You will likely also incur additional expenses on lawyers and PR advice. Some whistleblowers choose to solicit donations, but this might undermine your credibility.

Lawyer up

If you intend to go public with documentation and details, speak with a lawyer first. Organizations such as Whistleblower Aid and the Signals Network can help connect you with someone. By speaking out, you face the risk of lawsuits for breach of contract, or even prosecution in the United States for theft of trade secrets. These risks are unlikely, but the possibility exists nevertheless.

Make contact with an outsider

Most tech reporters have a Signal address in their Twitter profile. I’ve heard many employees concerned that reporters will not protect anonymity – I personally have few concerns in that regard, although I would advise working with an established news outlet.

When you do speak with a reporter, you should be clear up front about whether you’re speaking on the record (you can be quoted by name), unattributed (you can be quoted but not by name), or off the record (none of this can be published). If you intend to speak with the government, your lawyer should be able to help.

It’s your decision – trust yourself

In the end, whistleblowing is an intensely personal decision that very few will ever consider. It’s easy to criticize from the outside, but many feel differently when they face those risks themselves. Every time I advise others, I remind them that I can provide advice but the ultimate decision is their own. I am glad that I chose to come forward, and that Frances did as well, but no one is obligated to torch their career in pursuit of justice.

 

LIVE: Nobel Prize Winner in Economics Announced