Here Are the Secret Locations of ShotSpotter Gunfire Sensors

Just because officers don't find evidence of gunfire, they say, doesn't mean it didn't happen.
While SoundThinking says its alerts are reviewed by its Incident Review Center before being sent to the police, in Pasadena, officers who investigated ShotSpotter alerts reported that the suspected gunfire was sometimes something else entirely: a car backfiring, construction noise, or fireworks, Knock LA reported.
Chris Baumohl, an EPIC Law Fellow and coauthor of the petition to the DOJ, tells WIRED that our findings confirm what the nonprofit wrote in their petition in September: that ShotSpotter surveillance disproportionately occurs in communities of color.
He also alleges that the technology primes police to go into minority communities believing that shots are fired, whether accurate or not.
The result, Baumohl argues, is that community members are more likely to be picked up on bench warrants, misdemeanors, and for other reasons unrelated to guns.
In February, a leaked internal report from the State's Attorney's office in Illinois's Cook County, where Chicago is located, found that nearly a third of arrests stemming from a ShotSpotter alert had nothing to do with a gun, Baumohl points out.
On February 13, Chicago mayor Brandon Johnson, a vocal critic of ShotSpotter, said the city won't renew its contract with SoundThinking.
According to SoundThinking's Chittum, the idea that police show up to ShotSpotter alerts ready to make arrests is speculation based on a few high-profile incidents.
Instead, he argues that ShotSpotter provides law enforcement with accurate data to engage the community safely.
Ultimately, Chittum argues, ShotSpotter is simply a tool.
When used correctly it can help police-community relations.
WIRED reviewed body camera footage and police records of a 2022 ShotSpotter arrest in Cincinnati.
According to the records, at 8:21 PM on New Year's Eve, police officers were dispatched to an area where two loud sounds were picked up by SoundThinking sensors.
When the officers arrived, they quickly detained a tall man in a blue hoodie and black jacket who was standing near the corner where the technology had indicated gunfire.
According to police records, there were nine officers on the scene that night.
Body camera footage shows one of the officers rifling through the man's pockets as others milled around.
Others chatted, speculating about the potential whereabouts of bullet casings.
Police never found a bullet casing, gun, or bullet hole.
After running his name through their on-car computer, they discovered he had warrants out for his arrest.
Additional data analysis by Matt Casey, data science content lead at Snorkel AI, a firm that helps companies with AI projects and builds custom AI with its data development platform.


This Cyber News was published on www.wired.com. Publication date: Fri, 23 Feb 2024 01:43:05 +0000


Cyber News related to Here Are the Secret Locations of ShotSpotter Gunfire Sensors

Here Are the Secret Locations of ShotSpotter Gunfire Sensors - Just because officers don't find evidence of gunfire, they say, doesn't mean it didn't happen. While SoundThinking says its alerts are reviewed by its Incident Review Center before being sent to the police, in Pasadena, officers who investigated ...
4 months ago Wired.com
What to Do if You Expose a Secret: How to Stay Calm and Respond to an Incident - You probably are here because you leaked a secret somewhere and want to get straight to rotating the secret. If you are a solo developer or you know for sure you are the only user of the secret and understand what rotating the secret might disrupt, ...
7 months ago Feeds.dzone.com
Congressional leaders concerned by NYPD's use of Chinese-made drones - Members of Congress expressed concern Thursday about New York City's plan to use Chinese-made drones to assist police responding to gunfire in five high-crime precincts. The program, which is currently being tested, will pair drones with the ...
1 month ago Therecord.media
Retail Tech Deep-Dive: Meraki MT Sensors - Our Meraki MT sensors are designed to support healthy, safe spaces. Enhancing shopper comfort: The more comfortable a shopper is in-store, the more motivated they are to engage deeply with its products and ultimately purchase. Comfort can mean ...
2 months ago Feedpress.me
Apple's new Stolen Device Protection has a big vulnerability. Here's how to fix it - Last week, Apple released iOS 17.3 with much anticipated updates such as Collaborative Apple Music Playlists and AirPlay hotel support. One of the biggest highlights was a new Stolen Device Protection; however, it's not as secure as we initially ...
5 months ago Zdnet.com
Researchers Undermine 'Windows Hello' on Lenovo, Dell, Surface Pro PCs - Researchers have figured out how to compromise three of the most common fingerprint readers used by today's PCs. With support from Microsoft, analysts from Blackwing Intelligence attempted to subvert the biometric security offered by three sample ...
7 months ago Darkreading.com
WhatsApp Secret Code Feature Lets Users Set Unique Passwords - WhatsApp has announced the rollout of a new feature to safeguard sensitive conversations. The Secret Code feature provides additional protection to ensure users' private conversations remain secure and protected from unauthorized access. WhatsApp has ...
7 months ago Cybersecuritynews.com
new detectors, your favorite features, and what's coming next in GitGuardian - GitGuardian Secrets Detection More detectors = more secrets caught. Every detector has its comprehensive ID card in the public documentation, outlining the secret type, its intended usage and scope, and detailed steps for revocation. If you haven't ...
6 months ago Securityboulevard.com
CVE-2022-48687 - In the Linux kernel, the following vulnerability has been resolved: ...
1 month ago
Make your WhatsApp chats even more private with a secret code. Here's how - Some conversations are meant to stay between you and the sender, and WhatsApp just added a feature to help your private chats stay private. Typically, access to your phone means access to all your conversations, but with Secret Code, it doesn't have ...
7 months ago Zdnet.com
CVE-2018-18551 - ServersCheck Monitoring Software through 14.3.3 has Persistent and Reflected XSS via the sensors.html status parameter, sensors.html type parameter, sensors.html device parameter, report.html location parameter, group_delete.html group parameter, ...
5 years ago
23andMe Failed to Detect Account Intrusions for Months - The tactic came to light in a trove of hacked police records published by the transparency collective Distributed Denial of Secrets. Information about United States intelligence agencies purchasing Americans' phone location data and internet metadata ...
5 months ago Wired.com
Smart Thermostats: Savings and Comfort at Your Fingertips - Smart thermostats offer a modern approach to home temperature control that can provide significant energy savings and enhanced comfort. Smart thermostats offer cost effectiveness, improved indoor air quality, enhanced comfort and convenience, and ...
6 months ago Securityzap.com
Leveraging a digital twin with machine learning to revitalize bridges - In this blog, we will explore how Thomas Braml, Professor of Civil Engineering and the team at the University of the Bundeswehr Munich have used Cisco technology to implement a repeatable solution for bridges that reduces the cost of bridge ...
5 months ago Feedpress.me
New Technology for an Old Industry - A few weeks ago our mining experts sat down with Danny Vicente from Cisco's Coffee and Conversations to discuss what is taking place in the mining industry. In this episode Roland Plett and Bruce Frederick talk about how mining has evolved from the ...
5 months ago Feedpress.me
Biometric Authentication: Advancements and Challenges - Advancements in technology are driving the world of biometric authentication into a realm where one's very being serves as the key to accessing secure systems. The Evolution of Biometric Technology has significantly transformed the landscape of ...
3 months ago Securityzap.com
CVE-2009-2988 - Adobe Reader and Acrobat 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2 do not properly validate input, which allows attackers to cause a denial of service via unspecified vectors. Per: ...
5 years ago
CVE-2009-2998 - Adobe Reader and Acrobat 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2 do not properly validate input, which might allow attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2009-3458. Per: ...
5 years ago
CVE-2009-2986 - Multiple heap-based buffer overflows in Adobe Reader and Acrobat 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2 might allow attackers to execute arbitrary code via unspecified vectors. Per: ...
5 years ago
CVE-2009-3462 - Adobe Reader and Acrobat 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2 on Unix, when Debug mode is enabled, allow attackers to execute arbitrary code via unspecified vectors, related to a "format bug." Per: ...
5 years ago
CVE-2009-2981 - Adobe Reader and Acrobat 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2 do not properly validate input, which might allow attackers to bypass intended Trust Manager restrictions via unspecified vectors. Per: ...
5 years ago
CVE-2009-3458 - Adobe Reader and Acrobat 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2 do not properly validate input, which might allow attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2009-2998. Per: ...
5 years ago
CVE-2009-2990 - Array index error in Adobe Reader and Acrobat 9.x before 9.2, 8.x before 8.1.7, and possibly 7.x through 7.1.4 might allow attackers to execute arbitrary code via unspecified vectors. Per: ...
5 years ago
CVE-2009-2980 - Integer overflow in Adobe Reader and Acrobat 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2 allows attackers to cause a denial of service or possibly execute arbitrary code via unspecified vectors. Per: ...
5 years ago
CVE-2009-2997 - Heap-based buffer overflow in Adobe Reader and Acrobat 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2 might allow attackers to execute arbitrary code via unspecified vectors. Per: ...
5 years ago

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)