{"id":49648,"date":"2021-09-13T06:41:00","date_gmt":"2021-09-13T11:41:00","guid":{"rendered":"http:\/\/fourthamendment.com\/?p=49648"},"modified":"2021-09-13T07:43:11","modified_gmt":"2021-09-13T12:43:11","slug":"ny-times-how-the-n-y-p-d-is-using-post-9-11-tools-on-everyday-new-yorkers-2","status":"publish","type":"post","link":"https:\/\/fourthamendment.com\/?p=49648","title":{"rendered":"NY Times: How the N.Y.P.D. Is Using Post-9\/11 Tools on Everyday New Yorkers"},"content":{"rendered":"\n<p>NY Times: <a href=\"https:\/\/www.nytimes.com\/2021\/09\/08\/nyregion\/nypd-9-11-police-surveillance.html?action=click&amp;module=RelatedLinks&amp;pgtype=Article\">How the N.Y.P.D. Is Using Post-9\/11 Tools on Everyday New Yorkers<\/a> by Ali Watkins (\u201cTwo decades after the attack on New York City, the Police Department is using counterterrorism tools and tactics to combat routine street crime.\u201d)<\/p>\n\n\n\n<!--more-->\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p>New Yorkers simply going about their daily lives routinely encounter post-9\/11 digital surveillance tools like facial recognition software, license plate readers or mobile X-ray vans that can see through car doors. Surveillance drones hover above mass demonstrations and protesters say they have been questioned by antiterrorism officers after marches. The department\u2019s Intelligence Division, redesigned in 2002 to confront Al Qaeda operatives, now uses antiterror tactics to fight gang violence and street crime.<\/p><\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>NY Times: How the N.Y.P.D. Is Using Post-9\/11 Tools on Everyday New Yorkers by Ali Watkins (\u201cTwo decades after the attack on New York City, the Police Department is using counterterrorism tools and tactics to combat routine street crime.\u201d)<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[76],"tags":[],"class_list":["post-49648","post","type-post","status-publish","format-standard","hentry","category-surveillance-technology"],"_links":{"self":[{"href":"https:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts\/49648","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=49648"}],"version-history":[{"count":1,"href":"https:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts\/49648\/revisions"}],"predecessor-version":[{"id":49649,"href":"https:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts\/49648\/revisions\/49649"}],"wp:attachment":[{"href":"https:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=49648"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=49648"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=49648"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}