Heidi Boghosian

Last updated
Heidi Boghosian
Born
Education Brown University
Boston University
Temple Law School
Occupation(s)Lawyer, activist

Heidi Boghosian, a lawyer, is the executive director of the A.J. Muste Memorial Institute. Previously she was the executive director of the National Lawyers Guild, a progressive bar association established in 1937, where she oversaw the legal defense of people targeted by government. She co-hosts the weekly civil liberties radio show Law and Disorder, that airs on Pacifica Radio's WBAI, New York, and is broadcast on more than 100 other stations. [1]

Contents

Government Surveillance

Boghosian's work often focuses on how technology affects our daily lives. In a 2010 Huffington Post article titled "Are You Chip-Ready", Boghosian discusses radio-frequency identification (RFID) technology that has been making its way into many people's lives, including students whose attendance can now be tracked by an RFID chip implanted in their student ID cards. She points out identity theft, stalking, government spying, and security breaches as just some of the negative outcomes of RFID technology. [2]

In 2012, Boghosian documented her own data trail to show how everyday transactions and ventures are captured and stored, most times without our knowledge. From the surveillance monitor outside of her apartment building, to a purchase at a local coffee shop, Boghosian illustrates how corporations play a larger role in people's daily lives. [3] The National Security Agency (NSA), for instance, collects metadata on every phone call Americans make, [4] as was revealed in June 2013 by Edward Snowden.

Bibliography

Related Research Articles

<span class="mw-page-title-main">Closed-circuit television</span> Use of video cameras to transmit a signal to a specific place on a limited set of monitors

Closed-circuit television (CCTV), also known as video surveillance, is the use of video cameras to transmit a signal to a specific place, on a limited set of monitors. It differs from broadcast television in that the signal is not openly transmitted, though it may employ point-to-point, point-to-multipoint (P2MP), or mesh wired or wireless links. Even though almost all video cameras fit this definition, the term is most often applied to those used for surveillance in areas that require additional security or ongoing monitoring.

<span class="mw-page-title-main">Surveillance</span> Monitoring something for the purposes of influencing, protecting, or suppressing it

Surveillance is the monitoring of behavior, many activities, or information for the purpose of information gathering, influencing, managing or directing. This can include observation from a distance by means of electronic equipment, such as closed-circuit television (CCTV), or interception of electronically transmitted information like Internet traffic. It can also include simple technical methods, such as human intelligence gathering and postal interception.

Computer and network surveillance is the monitoring of computer activity and data stored locally on a computer or data being transferred over computer networks such as the Internet. This monitoring is often carried out covertly and may be completed by governments, corporations, criminal organizations, or individuals. It may or may not be legal and may or may not require authorization from a court or other independent government agencies. Computer and network surveillance programs are widespread today and almost all Internet traffic can be monitored.

Radio-frequency identification (RFID) uses electromagnetic fields to automatically identify and track tags attached to objects. An RFID system consists of a tiny radio transponder called a tag, a radio receiver, and a transmitter. When triggered by an electromagnetic interrogation pulse from a nearby RFID reader device, the tag transmits digital data, usually an identifying inventory number, back to the reader. This number can be used to track inventory goods.

<span class="mw-page-title-main">Mass surveillance</span> Intricate surveillance of an entire or a substantial fraction of a population

Mass surveillance is the intricate surveillance of an entire or a substantial fraction of a population in order to monitor that group of citizens. The surveillance is often carried out by local and federal governments or governmental organizations, but it may also be carried out by corporations. Depending on each nation's laws and judicial systems, the legality of and the permission required to engage in mass surveillance varies. It is the single most indicative distinguishing trait of totalitarian regimes. It is often distinguished from targeted surveillance.

Center for Democracy & Technology (CDT) is a Washington, D.C.-based 501(c)(3) nonprofit organisation that advocates for digital rights and freedom of expression. CDT seeks to promote legislation that enables individuals to use the internet for purposes of well-intent, while at the same time reducing its potential for harm. It advocates for transparency, accountability, and limiting the collection of personal information.

Dr. Katherine Albrecht is a consumer privacy advocate, Vice President (VP) of Startpage.com and spokesperson against radio-frequency identification (RFID). Albrecht devised the term "spy chips" to describe RFID tags such as those embedded in passport cards and certain enhanced United States driver's licenses. Albrecht holds Doctorate in Human Development and Consumer Education from Harvard University.

Liz McIntyre is a consumer privacy expert and founder of CAMCAT - Citizens Against Marking, Chipping and Tracking, an organization that works to prevent forced human tracking technologies like implantable microchips. She and co-author Katherine Albrecht wrote the RFID privacy book Spychips: How Major Corporations and Government Plan to Track your Every Move. At one time, McIntyre was the Communications Director for CASPIAN, an organization that advocated free-market, consumer-based solutions to the problem of retail privacy invasion.

K. A. (Kim) Taipale is an American investor, legal scholar, and social theorist specializing in information, technology, and national security policy. He is a partner in Stilwell Holding, a private investment firm, and the former chairman of the executive committee of Kobra International Ltd. He is also the founder and executive director of the Stilwell Center for Advanced Studies in Science and Technology Policy, a private, nonpartisan research organization, and a director of the Stilwell Charitable Fund. He was previously an investment banker at Lazard Freres & Co. and a lawyer at Davis Polk & Wardwell.

<span class="mw-page-title-main">Carol D. Leonnig</span> U.S. investigative journalist

Carol Duhurst Leonnig is an American investigative journalist. She has been a staff writer at The Washington Post since 2000, and was part of a team of national security reporters that won the 2014 Pulitzer Prize for Public Service for reporting, which revealed the NSA's expanded spying on Americans. Leonnig also received Pulitzer Prizes for National Reporting in 2015 and 2018.

Countersurveillance refers to measures that are usually undertaken by the public to prevent surveillance, including covert surveillance. Countersurveillance may include electronic methods such as technical surveillance counter-measures, which is the process of detecting surveillance devices. It can also include covert listening devices, visual surveillance devices, and countersurveillance software to thwart unwanted cybercrime, such as accessing computing and mobile devices for various nefarious reasons. More often than not, countersurveillance will employ a set of actions (countermeasures) that, when followed, reduce the risk of surveillance. Countersurveillance is different from sousveillance, as the latter does not necessarily aim to prevent or reduce surveillance.

Wireless identity theft, also known as contactless identity theft or RFID identity theft, is a form of identity theft described as "the act of compromising an individual’s personal identifying information using wireless mechanics." Numerous articles have been written about wireless identity theft and broadcast television has produced several investigations of this phenomenon. According to Marc Rotenberg of the Electronic Privacy Information Center, wireless identity theft is a serious issue as the contactless (wireless) card design is inherently flawed, increasing the vulnerability to attacks.

A human microchip implant is any electronic device implanted subcutaneously (subdermally) usually via an injection. Examples include an identifying integrated circuit RFID device encased in silicate glass which is implanted in the body of a human being. This type of subdermal implant usually contains a unique ID number that can be linked to information contained in an external database, such as identity document, criminal record, medical history, medications, address book, and other potential uses.

<i>Spying on Democracy</i>

Spying on Democracy: Government Surveillance, Corporate Power, and Public Resistance is a book by Heidi Boghosian, executive director of the National Lawyers Guild, and co-host of Pacifica's WBAI weekly civil liberties radio program, "Law and Disorder." The book details the growing amount of surveillance of everyday citizens, and what this means for society. It is published by City Lights Publishers in the Open Media Series.

Various schools have been using radio-frequency identification technology to record and monitor students.

<span class="mw-page-title-main">The Day We Fight Back</span> Protest against mass surveillance by the NSA

The Day We Fight Back was a one-day global protest against mass surveillance by the US National Security Agency (NSA), the UK GCHQ, and the other Five Eyes partners involved in global surveillance. The "digital protest" took place on February 11, 2014 with more than 6,000 participating websites, which primarily took the form of webpage banner-advertisements that read, "Dear Internet, we're sick of complaining about the NSA. We want new laws that curtail online surveillance. Today we fight back." Organizers hoped lawmakers would be made aware "that there's going to be ongoing public pressure until these reforms are instituted."

<span class="mw-page-title-main">Mass surveillance in China</span>

Mass surveillance in the People's Republic of China (PRC) is the network of monitoring systems used by the Chinese central government to monitor Chinese citizens. It is primarily conducted through the government, although corporate surveillance in connection with the Chinese government has been reported to occur. China monitors its citizens through Internet surveillance, camera surveillance, and through other digital technologies. It has become increasingly widespread and grown in sophistication under General Secretary of the Chinese Communist Party (CCP) Xi Jinping's administration.

Unmanned aerial vehicles (UAVs) have been used for domestic police work in various countries around the world since the mid-2000s. Their appeal comes from their small size, lack of crew, and lower cost compared to police helicopters. UAVs may be used for search and rescue operations, aerial patrols, and other roles that are usually served by crewed police aircraft. UAVs can be powerful surveillance tools by carrying camera systems capable of license plate scanning and thermal imaging, as well as radio equipment and other sensors. While a vast majority of law enforcement UAVs are unarmed, documents obtained by digital rights group Electronic Frontier Foundation indicated the U.S. Customs and Border Protection would consider arming their UAVs with "non-lethal weapons designed to immobilize" targets.

Hardware backdoors are backdoors in hardware, such as code inside hardware or firmware of computer chips. The backdoors may be directly implemented as hardware Trojans in the integrated circuit.

References

  1. "Heidi Boghosian Blog" retrieved 5/26/15]
  2. Boghosian, Heidi, "Are You Chip-Ready?", The Huffington Post , 26 May 2010. Retrieved on 6 September 2012.
  3. Shane, Scott, "One Woman’s Data Trail Diary", The New York Times , 31 August 2012. Retrieved on 6 September 2012.
  4. "FBI’s Use of Drones for U.S. Surveillance Raises Fears over Privacy, Widening Corporate-Gov’t Ties", "Democracy Now!. 21 June 2013.