Simanaitis Says

On cars, old, new and future; science & technology; vintage airplanes, computer flight simulation of them; Sherlockiana; our English language; travel; and other stuff

SEEKING ANONYMITY IN A CROWD PART 2

JOHN SEABROOK’s MOST informative “Dressing for the Surveillance Age” in yesterday’s SimanaitisSays got us into the latest of deep-learning facial recognition. Today in Part 2, we learn about our cars’ snitching on us as well as sartorial choices to counter all this.

Auto License Plate Recognition. Seabrook observes, “A.L.P.R.s automatically record all license-plate numbers that come within their view, at a rate of thousands per minute. In newer systems, ‘hot lists’ of ‘plates of interest’ belonging to criminal suspects are widely shared by law-enforcement agencies, including U.S. Immigration and Customs Enforcement. There are few privacy restrictions on this data, and it is not secure. Private companies collect it and sell it.”

Image of police A.L.P.R. hardware from tenthamendmentcenter.com.

Seabrook notes, “A recent audit of the Los Angeles Police Department and three other California law-enforcement agencies found that, at the time they were logged, 99.9 percent of the three hundred and twenty million plate images in the department’s database had not been involved in criminal investigations.”

Counter Strategies. Seabrook talks about emerging strategies countering omnipresent surveillance. Each one exploits an inherent shortcoming of deep-learning machine recognition, or at least the technology’s current state.

Poison Fashions. Seabrook describes T-shirts and dresses printed with images of license plates. “The dummy plates,” Seabrook observes, “spelled out words from the Fourth Amendment [the one about unreasonable searches or seizures].”

Image from vice.com

The clothing is designed as a “poison attack,” triggering A.L.P.R.s and clogging their algorithms with spurious data. Backpacks covered with license-plate images serve the same purpose.

I’m reminded of the Chinese bus image misidentified by surveillance as a real person.

Adversarial Imaging. Seabrook describes another approach: a sweatshirt printed with blurry organic and vaguely human shapes, and with what appears to be a traffic light just below the neckline. “Considered more generously,” Seabrook writes, “the pattern loosely evoked Georges Seurat’s “A Sunday Afternoon on the Island of La Grand Jette,” as it might appear at the bottom of a swimming pool painted by David Hockney.”

“The pattern on the sweatshirt,” Seabrook explains, “was an ‘adversarial image’—a kind of deep-learning optical illusion that stopped the algorithm from seeing the person wearing it. Unlike poison attacks, which seek to subvert surveillance systems with bad data, adversarial attacks are images that have been engineered to take advantage of flaws in the way computers see.”

Seabrook donned such a sweatshirt and, “On stepping in front of the camera, I was undetected…. I felt strangely weightless.”

Another variation of surveillance-invisible clothing. Image from groundai.com.

How was the surveillance algorithm tricked? In its deep-learning training, it had never seen a face above a traffic light. Hence, this could not be a person’s image. At least with the current state of the art, and as long as the person stood perfectly still. ds

© Dennis Simanaitis, SimanaitisSays.com, 2020

2 comments on “SEEKING ANONYMITY IN A CROWD PART 2

  1. bill
    March 14, 2020

    At the on-ramp of major freeways in Europe they record your license plate. They record it again at the offramp. If you covered the distance between the two points too quickly you get your speeding ticket in the mail.

    • simanaitissays
      March 14, 2020

      I know for certain that Europe is canvassed with speed cameras. (I once got flashed for dicing off-the-light in a German city.) And, of course, toll road paperwork contains on/off time info, from which average speed could be computed. Our U.S. toll roads record the same data.
      This is the first I’ve heard, however, of what you describe. Any documentation in this regard?

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.

%d bloggers like this: