Premium Essay

Regulated Police Surveillance Research Paper

Submitted By
Words 524
Pages 3
Most people are aware of the events that went on in Ferguson, Missouri, in August, September, and now currently. The unjust murder of 18-year-old Michael Brown by Ferguson police officer Darren Wilson started more public discussion about racism and police brutality than since the 1992 Rodney King riots. With large groups of protesters in Ferguson living under de facto martial law, it was obvious that something needed to be done. Many suggest that with video monitoring of police, the rates of violence would drop. Widespread, regulated police surveillance creates more video evidence to aid police in conviction of guilty people, and subsequently leads to much less police violence and a higher conviction rate of guilty officers due to being watched and having all their actions recorded and reviewed.
It is a common known phenomenon within the psychiatric community that people often change their behavior when they know they are being watched. Instead of acting violent or aggressive, humans tend to …show more content…
Cameras would do a lot to impact the safety of not only civilians, but the police as well. With video evidence of all police interactions, court cases would no longer solely rely on witnesses. If Darren Wilson had been wearing a body camera when Michael Brown was killed, it is very likely that the whole Ferguson situation would be vastly different. Not only would the police officer have been identified sooner, he would most likely be in jail (and not still on paid leave) because of the obvious murder caught on video. Some police may be concerned about being filmed because it strips them of their privacy while doing their jobs. However, the majority of workers in America are monitored while on the job, due to the prevalence of security cameras in the workplace. If the police in general are following their procedures, then they have no reason to fear being

Similar Documents

Premium Essay

Politics of Marijuana Prohibition

...In recent years, there has been an increase in the number of states legalizing marijuana for medical or recreational purposes. The prohibition of marijuana has been the source of countless debates with people on opposite sides of the spectrum defending their beliefs. The history of marijuana prohibition, the consequences resulting from the prohibition, money spent on enforcing prohibition and potential profits, medical marijuana, dangerous manufactured substances, confusion between the state and federal governments, the ineffectiveness of current laws, and marijuana’s affect on state and local politics have all contributed to large debates across the states as legislatures decide the right way to regulate marijuana. The prohibition of alcohol and the restriction of cannabis use have certain similarities. Both were directed against the evils of using these substances, the negative rhetoric against both substances was the same, and both started at the state level with congressional action following later. During the prohibition of alcohol in the 1920s, the government spent millions of dollars trying to enforce an ineffective law it had in place.2 The same can be said about marijuana, but one a much larger, more devastating scale. The “evils” of alcohol were matters of public knowledge, with countless debates leading to the Eighteenth Amendment and later the Volstead Act. It was the direct opposite regarding marijuana. There were no public opinion polls before legislation...

Words: 3346 - Pages: 14

Premium Essay

Shui Fabrics

...Electronic surveillance in the workplace Electronic Surveillance in the Workplace: Concerns for Employees and Challenges for Privacy Advocates Anna Johnston and Myra Cheng Paper delivered 28 November 2002 International Conference on Personal Data Protection Hosted by Personal Information Dispute Mediation Committee, Korea Information Security Agency Seoul, Korea Ms Anna Johnston is the NSW Deputy Privacy Commissioner. Ms Myra Cheng is a Research & Policy Officer with Privacy NSW, the Office of the NSW Privacy Commissioner. The authors gratefully acknowledge the assistance of Dr Ben Searle, Macquarie University, in providing an overview of the relevant literature from the field of organisational psychology. Introduction This paper takes up the challenge of talking about privacy in the workplace - a site of potential conflict in which there may be co-existing radically different views on whether workers can or should have any expectations of privacy. As long as there has been employment, employees have been monitored. Nebeker D M & B C Tatum, "The effects of computer monitoring, standards and rewards on work performance, job satisfaction and stress" (1993) 23(7) Journal of Applied Social Psychology 508 at 508. However, in recent years, with an environment of affordable technology, the availability of less easily observable or detectable monitoring devices, and a lack of adequate regulation, there has been an explosion in the use of electronic monitoring...

Words: 6767 - Pages: 28

Premium Essay

Criminal Justice Procedure

...from being unlawfully convicted. The modern justice process begins with investigation. After a crime has been discovered, evidence is gathered at the scene when possible, and a follow up investigation attempts to reconstruct the sequence of activities. Although a few offenders are arrested at the scene of the crime, most are apprehended later. In such cases, an arrest warrant issued by a judge provides the legal basis for an apprehension by police. An arrest, in which a person is taken into custody, limits the offender's freedom. The Arrest is a serious step in the process of justice. Most arrests are made peacefully, but if a suspect tries to resist, a police officer may need to use force. During arrest and before questioning defendants are advised to the constitutional rights, also known as their Miranda rights. The criminal justice procedure begins with arrest, followed by the booking of suspects, arraignment, preliminary hearing, grand jury trial, pretrial hearings, the criminal trial, followed by sentencing. In this paper, I am also going to discuss constitutional protections for the defendant as well as those in place to protect society as a whole. Following arrest, suspects are booked. During booking, which is an administrative procedure, pictures are taken, fingerprints are made, and personal information such as address, date of birth, weight, and height are gathered. Details of the charges are recorded, and an administrative record of the arrest is created...

Words: 3668 - Pages: 15

Premium Essay

Policing

...Administration & Justice Dr. John Baiamonte, Jr. November 1, 2010 Assignment Write a 1500 to 2000 word paper that compares and contrasts the roles, responsibilities, and differences of public and private policing.  Cite at least two scholarly works (articles or books) or government documents. However, your textbook cannot be used as a source. Public policing has been known to have a monopoly on policing until the increased trend of private policing in the United States. Private policing, while emerging as a new industry, is not a new phenomenon and predates the existence of public police as witnessed today (Wilson 1994). Public and private policing have many similarities, as well as differences and the distinction between public and private police are often blurred. Private police look and behave like public police and describing their function often involves a comparison of the activities and responsibilities of the two. Despite the differences, public and private police tend to mirror each other to a certain extent (Nalla & Newman, 1990). The increase of private policing has been in response to many changes in society such as the increase of "mass private property" (Shearing and Stenning, 1983) in the form of large shopping complexes, cinemas, large retail stores and large compound style housing estates or gated communities. These require constant surveillance for the safety of shoppers and residents. In fact, adequate security has become one of those value-added extras...

Words: 8202 - Pages: 33

Premium Essay

Internet Privacy

...Internet Privacy Abstract As more and more people continue to use the Internet and disclose their personal information, privacy concerns are paramount. Marketing companies are fiercely competing for their share of the booming e-commerce industry estimated at 75 billion dollars in 2010. Government agencies after 9/11 are using personal communications such as e-mail and social networking sites to scrutinize and evaluate potential threats to the United States. Legislation including the Patriot Act has empowered a new generation of public officials with information gathering capabilities on demand. In some cases a court order is not needed to inspect all of a person’s electronic communications. Exploitation of highly sensitive personal information is a reality as companies routinely sell this information to third parties without an individual’s consent. Opting out is a disclaimer written into privacy statements on websites that are often buried in the fine print. Many Americans assume that privacy is included in the operating system they purchase. It is the collating of personal information from multiple data sources on the Internet that remains a key point of contention among those who view privacy as fundamental American right implicit in the Constitution. In this sense, privacy is deeply personal to the dignity and respect of our society. Yet, the relevance of security issues must seek a balance and address the notion of the possibility of abuse. One significant...

Words: 4923 - Pages: 20

Premium Essay

Legal Issues Surrounding Defense Drones

...capable of detecting certain chemicals, for example. Because of the variety of functions of drones, there is a great deal of interest in both public and private sectors in expanding drone usage. As drone use evolves in the United States, there are many legal ramifications to consider. This paper discusses current drone use, the future of drones, and the legal issues involved. Government Drone Use Drones or Unmanned Aerial Vehicles (UAV) have shifted the defense landscape not only in the US but also across various other nations. It is an additional layer of defense strategy that deviates from the traditional methods employed thus far. Although they may be used in strategically planned strikes, their primary purpose is in intelligence, surveillance and reconnaissance (ISR). The US amongst other countries has been spearheading the advancement and use of this growing technology for the last decade. The Department of Defense operates approximately 8000 of these vehicles in their fleet. The use of drones by the US department of Defense is only one arm of the several other that is operated by the government. Customs and Border Protection Agency, Homeland Security, State fire departments and police departments are other significant users of this controversial technology. Another important aspect to note is the interdepartmental use that is attracted much scrutiny in the recent times. There are very real legal and ethical concerns regarding drones and the Obama administration is working...

Words: 3474 - Pages: 14

Free Essay

Gang Activities in Chicago and It Suburbs

...decided to write my research paper about the gang activities during the deindustrialization because I think it is very important for political scientist to research how economical and political changes may impact the society and public policy. In my work I answer such questions as what challenges the urban administration experiences during the globalization and how to respond to them. This topic has its actuality today because gangs are becoming a new social “underclass”. (Taylor, 1990, p. 81) What does it mean? With the end of industrialization era a lot of job opportunities disappeared for a new generation of youth. Moreover, gang bands usually act as well-armed economic groups. As the result, many young males were involved in street gang activities such as drug dealing and other criminals. Once those young ones fall in criminal they stay involved in gang activities even when they become adult. (Hagedorn, 1991, p.529) It is remarkable to notice that Mass Media also had its role in growing new population of gangs. The Hollywood industry usually shows images of rich, famous gangsters in contrast of limited real life opportunities. This may encourage many young men from poor neighborhoods to follow those “norms” and sell drugs instead of getting education for good career. The interview of African-American young males in Chicago showed that their role model today is not Martin Luther King, but it is Al Capone. (Hagedorn, 1991, p.533) My research is addressing Chicago...

Words: 2979 - Pages: 12

Free Essay

Carwash Identity: an Ethnographic Exploration of Space and Identity in South Dallas

...Preface Anonymity On any given day a number of individuals travel to and through the South Dallas area where this initial research project took place. Many visitors to the area often stop at the few remaining mom-and-pop restaurants for a greasy cheeseburger, link, or fish basket where several of the public characters that took part in this research hustle for money to buy that day’s beverage, blunt, or bed. The participants in this research are constantly in the public’s eye. Their identities are not secret and often the ways in which they engage in informal economy are well known as well. A select few of these individuals have participated in city meetings that are televised. Other anthropologists, sociologists, and curious academics have examined the decline of this southern sector of Dallas for one reason or another. Newspaper reporters and other media groups have often completed editorial pieces on this community and its residents (housed and un-housed). Identities are often made public; however, anonymity in regards to person or place is very much a component to this research in accordance with the anthropological guidelines of human subject protection. A pseudonym has been provided for each individual and place of business that participated in this research. Introduction Society is not a mere sum of individuals. Rather, the system formed by their association represents a specific reality which has its own characteristics... The group thinks, feels, and...

Words: 7909 - Pages: 32

Free Essay

Ayurvedic Trend

...Medicinal Plants Medicinal Plants Medicinal Plants An Expanding Role in Development Jitendra Srivastava, John Lambert, and Noel Vietmeyer WORLD BANK TECHNICAL PAPER NUMBER 320 RECENT WORLD BANK TECHNICAL PAPERS No. 246 Plusquellec, Burt, and Wolter, Modern Water Control in Irrigation: Concepts, Issues, and Applications No. 247 Ameur, Agricultural Extension: A Step beyond the Next Step No. 248 Malhotra, Koenig, and Sinsukprasert, A Survey of Asia's Energy Prices No.249 Le Moigne, Easter, Ochs, and Giltner, Water Policy and Water Markets: Selected Papers and Proceedings from the World Bank's Annual Irrigation and Drainage Seminar, Annapolis, Maryland, December 8−10, 1992. No.250 Rangeley, Thiam, Andersen, and Lyle, International River Basin Organizations in Sub−Saharan Africa No.251 Sharma, Rietbergben, Heimo, and Patel, A Strategy for the Forest Sector in Sub−Saharan Africa No.252 The World Bank/FAO/UNIDO/Industry Fertilizer Working Group, World and Regional Supply and Demand Balances for Nitrogen, Phosphate, and Potash, 1992/93−1998/99 No.253 Jensen and Malter, Protected Agriculture: A Global Review No.254 Frischtak, Governance Capacity and Economic Reform in Developing Countries No.255 Mohan, editor, Bibliography of Publications: Technical Department, Africa Region, July 1987 to April 1994 No.256 Campbell, Design and Operation of Smallholder Irrigation in South Asia No.258 De Geyndt,...

Words: 10235 - Pages: 41

Premium Essay

Financial Crisis

...O C C A S I O N A L PA P E R S E R I E S N O 1 2 3 / F E B R UA RY 2 011 THE INTERNATIONAL MONETARY SYSTEM AFTER THE FINANCIAL CRISIS by Ettore Dorrucci and Julie McKay OCCASIONAL PAPER SERIES NO 123 / FEBRUARY 2011 THE INTERNATIONAL MONETARY SYSTEM AFTER THE FINANCIAL CRISIS by Ettore Dorrucci and Julie McKay1 NOTE: This Occasional Paper should not be reported as representing the views of the European Central Bank (ECB). The views expressed are those of the authors and do not necessarily reflect those of the ECB. In 2011 all ECB publications feature a motif taken from the €100 banknote. This paper can be downloaded without charge from http://www.ecb.europa.eu or from the Social Science Research Network electronic library at http://ssrn.com/abstract_id=1646277 1 European Central Bank, Ettore.Dorrucci@ecb.europa.eu, Julie.McKay@ecb.europa.eu. The views expressed in this paper do not necessarily reflect those of the European Central Bank. The authors would like to thank, outside their institution, A. Afota, C. Borio, M. Committeri, B. Eichengreen, A. Erce, A. Gastaud, P. L'Hotelleire-Fallois Armas, P. Moreno, P. Sedlacek, Z. Szalai, I. Visco and J-P. Yanitch, and, within their institution, R. Beck, T. Bracke, A. Chudik, A. Mehl, E. Mileva, F. Moss, G. Pineau, F. Ramon-Ballester, L. Stracca, R. Straub, and C. Thimann for their very helpful comments and/or inputs. © European Central Bank, 2011 Address Kaiserstrasse 29 60311 Frankfurt am Main, Germany...

Words: 33129 - Pages: 133

Premium Essay

Pepsi Privacy

...intentional about design for democracy. (Pottie, 2004) Information and communication technology, ICT, has led to the emergence of global web societies. The subject of this article is privacy and its protection in the process of urbanization and socialization of the global digital web society referred to as the e-polis. Privacy is a fundamental human right recognized in all major international agreements regarding human rights such as Article 12 of the Universal Declaration of Human Rights (United Nations, 1948), and it will be discussed in the chapter under the heading Different Views of Privacy. Today’s computer network technologies are sociologically founded on huntergatherer principles. As a result, common users may be possible subjects of surveillance and sophisticated Internet-based attacks. A user may be completely unaware of such privacy breaches taking place. At the same time, ICT offers the technical possibilities of embedded privacy protection obtained by making technology trustworthy and legitimate by design. This means incorporating options for socially acceptable behavior in technical systems, and making privacy protection rights and responsibilities transparent to the user. The ideals of...

Words: 3586 - Pages: 15

Premium Essay

Acta and the Enforcement of Copyright in Cyberspace the Impact on Privacy

... 19, No. 6, November 2013, pp. 759–778. © 2013 John Wiley & Sons Ltd., 9600 Garsington Road, Oxford, OX4 2DQ, UK and 350 Main Street, Malden, MA 02148, USA ACTA and the Enforcement of Copyright in Cyberspace: the Impact on Privacy Iryna Ievdokymova* Abstract: As the reach of the Internet expands, governments increasingly seek to introduce initiatives aimed at controlling individuals’ online activity. One such initiative, aimed, inter alia, at introducing enhanced online copyright enforcement standards, is the Anti-Counterfeiting Trade Agreement (ACTA). The paper analyses a possible effect of Art. 27(3) of the agreement on the data protection and privacy rights, as spelled out in the EU legal order. Firstly, the EU legal framework on Internet surveillance for copyright enforcement will be addressed. Next, the principles and safeguards applicable to data processing in the context of communications surveillance will be illustrated with reference to the jurisprudence of the European Court of Human Rights. It will be argued that ACTA, if interpreted broadly and implemented without safeguards, would provide an incentive for graduated response systems, which, as it will be shown on the example of the French graduated response, may trump privacy rights on a massive scale. I Introduction Could cyberspace be considered a zone of liberty, for the most part unrestrained by government regulation and intrusion into individual rights and freedoms? On the one hand, the Internet...

Words: 12648 - Pages: 51

Free Essay

International Journal of Education and Development Using Information and Communication Technology

...countries. The technological discourse attending this diffusion has presented the new media as a utopian, egalitarian and empowering tool with the potential of ushering in a new era of development, democracy, and positive cultural change. This paper examines the economic, cultural, and political effects of the Internet within the historical context of developing countries. The paper traces the politically-inspired evolution of the Internet, its transfer into developing countries, and the economic, cultural, and political consequences of this transfer. Existing data indicate that the implementation of the Internet in most developing countries has served as a drain to the local resources, thus exacerbating their economic dependency on foreign nations. On a cultural level, the Internet’s predominantly Western design, content, and language have facilitated the proliferation of alien cultural patterns at the expense of the social experiences of the local cultures. Lastly, the Internet’s build-in tracking capabilities and its current manipulation for political purposes on international and national levels serves to empower the existing ruling elites in developing countries and perpetuates the disempowerment of the rest of the society. The paper proposes alternative approaches to internet adoption, where Internet initiatives are embedded and placed in the service of the general development goals of developing countries. INTRODUCTION The last decade has witnessed...

Words: 9084 - Pages: 37

Free Essay

Day Laborers

...U.S. Department of Justice Office of Community Oriented Policing Services Problem-Oriented Guides for Police Problem-Specific Guides Series No. 44 Disorder at Day Laborer Sites by Rob T. Guerette www.cops.usdoj.gov Center for Problem-Oriented Policing Got a Problem? We’ve got answers! Log onto the Center for Problem-Oriented Policing website at www.popcenter.org for a wealth of information to help you deal more effectively with crime and disorder in your community, including: • Web-enhanced versions of all currently available Guides • Interactive training exercises • Online access to research and police practices • Online problem analysis module. Designed for police and those who work with them to address community problems, www.popcenter.org is a great resource in problem-oriented policing. Supported by the Office of Community Oriented Policing Services, U.S. Department of Justice. www.PopCenter.org Problem-Oriented Guides for Police Problem-Specific Guides Series Guide No. 44 Disorder at Day Laborer Sites Rob T. Guerette This project was supported by cooperative agreement #2004CKWXK002 by the Office of Community Oriented Policing Services, U.S. Department of Justice. The opinions contained herein are those of the author(s) and do not necessarily represent the official position of the U.S. Department of Justice. References to specific companies, products, or services do not constitute endorsements from the author(s) or the Justice Department. Rather...

Words: 10945 - Pages: 44

Premium Essay

Laws of Success

...approach is that a better understanding of the extent, form, production and disposal or use of the proceeds of crime helps to determine the appropriate interventions. Tentative steps towards establishing trends in money laundering and the financing of terrorism have been taken over the past few years. A team of World Bank experts visited Botswana at the end of 2006 to assess the implementation of the FATF anti-money laundering and counter-financing of terrorism (AML and CFT) standards. In early 2007 the Directorate on Corruption and Economic Crime (DCEC), in collaboration with the Institute for Security Studies (ISS) of South Africa, undertook research to establish trends in money laundering in Botswana. The findings are yet to be publicised. However, what is apparent is that these investigations were by no means exhaustive. This paper is a contribution to the discourse on money laundering and the financing of terrorism in Botswana. It provides an overview of Botswana’s AML/CFT regimes. This will follow...

Words: 15688 - Pages: 63