E
Picture
Picture
Picture
Fostering new vertical and horizontal IoT applications with intelligence everywhere
https://journals.sagepub.com/doi/10.1177/26339137231208966


CONTENTS:
INTRO, - WHAT IS A SMART CITY, - THE ELECTROMAGNETIC SPECTRUM, - GEOSPATIAL TECHNOLOGY, - GEOLOCATION AND GEOFENCING, - THE CYBER PHYSICAL SYSTEMS/BACKBONE, - EDGE,FOG, AND CLOUD COMPUTING, - THE WIRELESS SENSOR NETWORKS, - SENSORS, - STANDARDS, - WIRELESS AD-HOC NETWORKS, - SMART CITY SURVEILLANCE: PUBLIC SAFETY VS PRIVACY RIGHTS, PREDICTIVE POLICING: DOUBLE-EDGED SWORD IN MODERN LAW ENFORCEMENT, -ARTIFICIAL INTELLIGENCE (A.I ) INTEGRATION WITH SMART SURVEILLANCE, - CELL-SITE SIMULATORS (CSS), - AUTOMATED LICENSE PLATE READERS (ALPRs), - BIOMETRIC TECHNOLOGY, - OPEN SOURCE INTELLIGENCE (OSINT), - DATA AGGREGATORS, - THE U.S. GOVERNMENT ACCOUNTABILITY OFFICE (GAO), - DIGITAL I.D-BLOCKCHAIN-CBDC's CENTRAL BANK DIGITAL CURRENCIES, - THE WESTERN SOCIAL CREDIT PARADIGM: A FRAGMENTED, COVERT, AND ALREADY-OPERATIONAL SYSTEM,- THE INTERNET OF VEHICLES, THE SMART HOME, - VOICE-ACTIVATED ASSISTANTS, - THE BODY AREA NETWORKS AND THE WIRELESS BODY AREA NETWORKS (WBAN), - THE INTERNET OF BODIES (IOB) - THE INTERNET OF BEHAVIOURS (IOB) - THE FINE LINE BETWEEN SMART CITIES AND SURVEILLANCE STATES.
 



                                               Intro

The Smart City and Internet of Things (IoT) framework is a "Dual System," of advanced technology to reshape urban living with both groundbreaking advantages and critical risks.
On one side, it revolutionizes quality of life through seamless integrations like renewable energy grids, AI-driven traffic optimization, real time environmental monitoring, and IoT-enabled infrastructure, driving sustainability, efficiency, and urban resilience. These advancements empower cities to reduce carbon footprints, streamline transportation, and enhance public services with data-driven precision.
On the other hand, the same interconnected ecosystem poses serious threats that are one way or another detrimental to humans, including invasive surveillance eroding personal privacy, heightened cybersecurity risks from interconnected devices, and potential data exploitation, which could undermine individual autonomy, and societal trust.


Internet of Things Applications, Security Challenges, Attacks, Intrusion Detection,and Future Visions: A Systematic Review
https://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=9405669
How to Build a Safer Internet of Things
https://spectrum.ieee.org/how-to-build-a-safer-internet-of-things
A Review on the Security of IoT Networks: From Network Layer’s Perspective
https://ieeexplore.ieee.org/document/10047861
Botnet Attacks Detecting Offline Models for Resource-Constrained IoT Devices: Edge2Guard
https://www.researchgate.net/publication/351579306_Botnet_Attacks_Detecting_Offline_Models_for_Resource-Constrained_IoT_Devices_Edge2Guard



                              An Overview of IoT, architecture, functionalities, enabling technologies, and applications.
                              https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=9256294

Picture
Potential Security challenges for the IoT ecosystem.
https://www.researchgate.net/publication/327613636_An_Ontology-Based_Cybersecurity_Framework_for_the_Internet_of_Things

Picture



       
      What is a Smart city and the Internet of things ( IoT )?

A smart city leverages technology to enhance urban living by integrating various systems like transportation, utilities, and public services into a cohesive network. Central to this concept is the Internet of Things (IoT), which consists of interconnected devices and sensors that collect and share data in real-time. This connectivity allows for more efficient resource management, improved public safety, and enhanced quality of life through innovations like smart grids, intelligent traffic management, and responsive public services. Essentially, IoT forms the backbone of a smart city by enabling the seamless interaction and automation of city functions.
Picture
 IoT and Big Data Applications in Smart Cities: Recent Advances, Challenges, and Critical Issues

Introduction to IEEE Internet of Things (IOT) and Smart Cities
https://standards.ieee.org/wp-content/uploads/import/documents/other/geps_07-iot_smart_cities.pdf

The United Nations Smart city overview in line with the sustainable development goals.

1. U.N Smarter and Inclusive cities. Big overview
https://www.undp.org/sites/g/files/zskgke326/files/2024-06/smarterandinclusivecitiescourse_2.pdf


U.N Smart cities Supporting an Inclusive, Sustainable, and Resilient Society. short overview
https://unosd.un.org/sites/unosd.un.org/files/session_10-3_mr._kazushige_endo.pdf


The World Economic Forum (WEF) Smart City overview

1. 4 ways smart cities will make our lives better https://www.weforum.org/stories/2016/02/4-ways-smart-cities-will-make-our-lives-better/

 Anatomy of a smart city https://www.weforum.org/stories/2019/01/the-anatomy-of-a-smart-city/

The International Telecommunication Union (ITU) Smart City overview


1. Implementing ITU-T International Standards to Shape Smart Sustainable Cities https://www.uncclearn.org/wp-content/uploads/library/the_case_of_moscow-e_18-00503_itu.pdf

SMART CULTURAL HERITAGE IN DIGITAL CITIES UN and ITU https://sdct-journal.com/images/Issues/2018_1b/25-32.pdf

The Institute of Electrical and Electronics Engineers (IEEE) smart city overview and smart standards


1. IEEE SMART CITIES https://smartcities.ieee.org/

 IEEE Standards Activities for Smart Cities https://standards.ieee.org/wp-content/uploads/import/documents/other/smartcities.pdf


What are Smart Cities? Videos


What is a smart city?
https://www.youtube.com/watch?v=Br5aJa6MkBc

“These modern cities, capable of implementing infrastructures (of water, electricity, gases, transport, etc.) communicating and sustainable to improve citizens’ comfort while developing in the environmental protection.



What are Smart Cities? | Larissa Suzuki | TEDxUCLWomen
https://www.youtube.com/watch?v=Kqkoghq0G4A

"Larissa Suzuki, PhD researcher in Software Systems Engineering with a special interest in ‘Smart Cities', explains how such a concept is built around an emphasis on ‘connections’"



Smart Cities Explained In 101 Seconds
https://www.youtube.com/watch?v=gXuPXqNdCLw
What is a Smart City?
https://www.youtube.com/watch?v=vCzmxg9y7gA
The World Economic Forum (WEF) The Smart City Revolution
https://www.weforum.org/videos/the-smart-city-revolution/
High-level Opening- World Cities Day 2025
https://webtv.un.org/en/asset/k1y/k1ylbl7kf4
State of European Smart Cities: Case Study Videos Showcasing Replicable Innovations for Sustainable Urban Transformations
https://smart-cities-marketplace.ec.europa.eu/news-and-events/news/2025/state-european-smart-cities-case-study-videos-showcasing-replicable

                                            

                                         
                                   
The Electromagnetic Spectrum

Picture
                               NASA Introduction to the ElectroMagneticSpectrum https://science.nasa.gov/ems/01_intro/

The Electromagnetic Spectrum, encompassing all frequencies of electromagnetic radiation from long wavelength radio waves to microwaves, infrared, visible light, ultraviolet, X-rays, and high energy gamma rays forms the foundation for wireless communication technologies critical to modern connectivity. Humans perceive only a minute fraction of this spectrum, limited to visible light. Mobile networks like 3G, 4G, and 5G not only operate within the electromagnetic spectrum but are directly correlated with the development of the smart city and IoT frameworks, each using different frequency bands to transmit data wirelessly. With each generational leap, there's a notable enhancement in capabilities:
3G had basic IoT applications, introduced mobile data services allowing basic internet access, video calls, and the onset of mobile broadband.
4G laid the groundwork for more complex IoT deployments, due to its improved speed and reliability,
5G has the ability to handle the connectivity needs of countless sensors and devices involved in traffic management, environmental monitoring, public safety, and more.
Looking towards 6G, the promise is even more transformative, with potential for global coverage, even lower latency, and emerging technologies.

Electromagnetic Spectrum: Applications, Regions, and Impact on Technology and Health
https://openmedscience.com/electromagnetic-spectrum-applications-regions-and-impact-on-technology-and-health/

Generations of Mobile Networks: Evolution from 1G to 5G
https://tridenstechnology.com/generations-of-mobile-networks/
5G Technology: Unleashing the Power of Ultra-Fast Wireless Connectivity
https://fpgainsights.com/wireless-networking/5g-technology-the-power-of-ultra-fast-wireless-connectivity/
ITU Emf Guide / Mobile Networks
https://www.itu.int/net4/mob/ituemf/en/emfguide_m.html



The evolution of mobile generation from 1G to 6G. : 6G Wireless Communications Networks: A Comprehensive Survey
https://ieeexplore.ieee.org/document/9598915

Picture

                                 Geospatial Technology

Geospatial Technology refers to the suite of tools and techniques used to gather, analyze, and display geographical data, including Geographic Information Systems (GIS), Remote sensing, Global Positioning Systems (GPS) and Global Navigation Satellite Systems (GNSS). In the context of smart cities, geospatial technology plays a crucial role by providing a framework for integrating spatial data into urban planning and governance.
Here's how:

Smart City Framework: This technology is vital within smart cities, integrating spatial data into urban planning and management processes.
Urban Management: It enables real-time mapping and monitoring of various urban elements such as population, infrastructure, environmental conditions, and traffic flow.
Resource Optimization: Enhances the efficiency of public services, transportation systems, and utility management like water and energy.
Emergency Response: Provides precise location data for quicker and more effective responses to emergencies.
Sustainability and Resilience: Supports sustainable urban development, improving the quality of life and making urban environments more resilient to future challenges.


Privacy Concerns with Geospatial Data
https://biomedware.com/privacy-concerns-geospatial-data/
Geospatial technology for smart cities: Understanding Geospatial Technologies for Future City Management
https://biblus.accasoftware.com/en/geospatial-technology-for-smart-cities/
Achieving Sustainable Smart Cities through Geospatial Data-Driven Approaches
https://www.mdpi.com/2071-1050/16/2/640
Geo Spacial World
https://geospatialworld.net/blogs/role-of-gis-in-the-journey-of-smart-cities/

Geospatial Technology
https://www.researchgate.net/publication/306194350_Geospatial_Technology
Geospatial Information Technology for Information Management and Dissemination
https://link.springer.com/chapter/10.1007/978-3-030-73569-2_13
Harnessing Geospatial Technology for Sustainable Development: A Multifaceted Analysis of Current Practices and Future Prospects
https://link.springer.com/chapter/10.1007/978-3-031-65683-5_8
Collective Sensing: Integrating Geospatial Technologies to Understand Urban Systems—An Overview
https://www.mdpi.com/2072-4292/3/8/1743



Picture
                                   What is Geospatial Industry?
                                   https://geospatialworld.net/blogs/what-is-geospatial-industry/


               
                     
                Geolocation and Geofencing Technologies

Geolocation pinpoints a device’s location using IP addresses, GPS, Wi-Fi, or cell tower data. It supports smart city functions like traffic navigation, emergency response, and urban planning. Yet, it’s vulnerable to abuse, with advertisers or hackers potentially profiling users’ habits, political views, or health based on location data. Centralized geolocation databases also risk data breaches, exposing movement histories.
Geofencing creates virtual boundaries using GPS, Wi-Fi, or cellular data to trigger actions like notifications or services when a device enters or exits a zone. In smart cities, it enables targeted marketing (e.g., ads in shopping areas), enhances security (e.g., monitoring restricted zones), and optimizes services like waste collection. However, it can be exploited for unwarranted tracking, allowing governments or corporations to monitor individuals’ movements, such as tracking protest attendees or visits to sensitive locations like clinics, raising surveillance concerns.
Geolocation vs Geofencing: Understand the Difference
https://timecentral.co/blog/geolocation-vs-geofencing-understand-the-difference/

Geopositioning
https://en.wikipedia.org/wiki/Geopositioning
What is Geolocation: How It Works and Its Many Uses
https://www.geoapify.com/what-is-geolocation/#:~:text=Fleet%20Management:%20Geolocation%20technology%20is%20essential%20for,need%20of%20assistance%20and%20provide%20timely%20help.

How Geofencing Technology Is Helping In Smart City Developments
https://www.conurets.com/how-geofencing-technology-is-helping-in-smart-city-developments/

Geofencing in location-based behavioral research: Methodology, challenges, and implementation
https://link.springer.com/article/10.3758/s13428-023-02213-2
A Scalable and Energy-Efficient LoRaWAN-Based Geofencing System for Remote Monitoring of Vulnerable Communities
https://ieeexplore.ieee.org/document/10486905
EQUIPMENT, SECURITY PERSONNEL TRACKING AND LOCALISATION USING GEO-LOCATION TECHNIQUE
https://www.researchgate.net/publication/311981946_EQUIPMENT_SECURITY_PERSONNEL_TRACKING_AND_LOCALISATION_USING_GEO-LOCATION_TECHNIQUE
A Survey for Recent Techniques and Algorithms of Geolocation and Target Tracking in Wireless and Satellite Systems
https://www.mdpi.com/2076-3417/11/13/6079



                                                       Geolocation
Picture
                                                                                                       
Picture
What Is Geolocation Marketing? https://www.leanplum.com/blog/geolocation/
What is Geofencing and How Does it Works? https://www.youtube.com/watch?v=AlnYmT22_Mg

                  The Cyber Physical Systems/Backbone

Cyber-physical systems (CPS) integrate computational algorithms, digital networks, and physical components, using sensors, actuators, and real-time computing to monitor and control physical environments. They’re critical for advancements in healthcare, transportation, manufacturing, and smart cities, driving efficiency, safety, and sustainability through innovations like autonomous vehicles, smart grids, and real-time medical monitoring. As the Backbone of the 4th Industrial Revolution the Cyber-Physical systems are poised to surpass the IT revolution’s impact by enabling intelligent automation and resilient infrastructure, though cybersecurity remains a challenge. Recent advances in edge computing, 5G, IOT networks and AI have boosted CPS scalability and responsiveness, enhancing autonomous systems and smart infrastructure. CPS will shape a future where digital and physical worlds converge for societal and economic progress.

Cyber-physical system
https://en.wikipedia.org/wiki/Cyber-physical_system
Cyber-Physical Systems as Sources of Dynamic Complexity in Cyber-Physical-Systems of Systems
https://ieeexplore.ieee.org/document/9312015
Cyber-physical systems
https://www.iso.org/foresight/cyber-physical-systems.html
Industrial Cyberphysical Systems: A Backbone of the Fourth Industrial Revolution
https://www.researchgate.net/publication/315508301_Industrial_Cyberphysical_Systems_A_Backbone_of_the_Fourth_Industrial_Revolution
Cyber-Physical Systems in the Context of Industry 4.0: A Review, Categorization and Outlook
https://link.springer.com/article/10.1007/s10796-022-10252-x
A Comprehensive Review of Key Cyber-Physical Systems, and Assessment of Their Education Challenges
https://ieeexplore.ieee.org/document/10835058


Diagrams Below are from the IEEE White Paper "Empowering Healthcare With Cyber-Physical System—A Systematic Literature Review" https://ieeexplore.ieee.org/document/10542115.
click on pics to enlarge
1. Components Of Cyber Physical Systems
2. Cyber Physical Systems in HealthCare : Building Blocks.


                3. A Comprehensive Reference Architectural Model for CPSs Implementation in Healthcare Applications.
Picture

                           
                         Edge, Fog, and Cloud Computing

Edge, Fog, and Cloud computing are pivotal paradigms shaping the smart and IoT (Internet of Things) domains, each playing distinct yet interconnected roles in processing data for intelligent systems. Cloud computing centralizes data storage and processing in remote, scalable data centers, offering vast computational power and storage for IoT applications, but it can face latency and bandwidth challenges for real-time needs. Edge computing pushes processing to the device level like smart sensors or cameras, enabling ultra-low latency and localized decision making, critical for time sensitive IoT tasks, like autonomous vehicles reacting to obstacles. Fog computing acts as a bridge, distributing computation across intermediary nodes (e.g., gateways or local servers) to balance latency, bandwidth, and scalability, ideal for scenarios like smart factories where regional coordination is key.
In the smart and IoT domains, these paradigms enable seamless data flow, from on-device analytics to cloud-based AI training, optimizing everything from energy grids to healthcare wearables. Looking to the future, their integration will deepen with advancements in 6G, AI-driven edge processing, and hybrid architectures, ensuring IoT systems are faster, more resilient, and capable of handling the exponential data growth from billions of connected devices, all while prioritizing energy efficiency and security.


Enabling Industrial Internet of Things by Leveraging Distributed Edge-to-CloudComputing: Challenges and Opportunities
https://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=10666680
A Survey on Edge Computing (EC) Security Challenges: Classification, Threats, and Mitigation Strategies
https://www.mdpi.com/1999-5903/17/4/175
Towards Secure Fog Computing: A Survey on Trust Management, Privacy, Authentication, Threats and Access Control
https://www.researchgate.net/publication/351594006_Towards_Secure_Fog_Computing_A_Survey_on_Trust_Management_Privacy_Authentication_Threats_and_Access_Control
IoT Applications in Fog and Edge Computing: Where Are We and Where Are We Going?
https://ieeexplore.ieee.org/document/8487455
Edge Computing and Cloud Computing for Internet of Things: A Review
https://www.mdpi.com/2227-9709/11/4/71
A Systematic Survey on Fog and IoT Driven Healthcare: Open Challenges and Research Issues
https://www.mdpi.com/2079-9292/11/17/2668
Edge–Fog–Cloud Computing Hierarchy for Improving Performance and Security of NB-IoT-Based Health Monitoring Systems
https://www.mdpi.com/1424-8220/22/22/8646
An Edge Computing Based Smart Healthcare Framework for Resource Management
https://www.mdpi.com/1424-8220/18/12/4307
Differential privacy in edge computing-based smart city Applications:Security issues, solutions and future directions
https://www.sciencedirect.com/science/article/pii/S2590005623000188



Edge,Fog, and Cloud computing in the Smart and IoT domains
Picture
A Survey from Real-Time to Near Real-Time
Applications in Fog Computing Environments

https://www.mdpi.com/2673-4001/2/4/28


 Edge,Fog,and cloud computing in Remote Healthcare
Picture
Melding Fog Computing and IoT for Deploying Secure,Response-Capable Healthcare Services in 5G and Beyond
https://www.researchgate.net/publication/360766463_Melding_Fog_Computing_and_IoT_for_Deploying_Secure_Response-Capable_Healthcare_Services_in_5G_and_Beyond






                        The Wireless Sensor Networks

The Wireless Sensor Networks (WSNs) are integral for collecting real-time data on a multitude of urban metrics like air quality, traffic flow, and energy use in the Smart and Iot framework. These networks are composed of many small, low-power sensors that autonomously gather information and transmit it wirelessly to central systems for processing. Within the IoT framework, this data is used to drive automation, predictive maintenance, and adaptive urban management. By integrating WSNs, cities can dynamically adjust services such as public transportation, waste collection, and street lighting to current conditions, thereby improving efficiency and sustainability. However, WSNs also have significant drawbacks :
Privacy concerns are paramount,
as these networks continuously collect data that could potentially be used to monitor individual behaviors or movements.  
WSNs are vulnerable to cyber, attacks which could compromise data integrity or lead to service disruptions. 
The reliability of data can be affected by interference, range limitations, or sensor failures, potentially leading to inaccurate information or system inefficiencies.

Wireless sensor network
https://en.wikipedia.org/wiki/Wireless_sensor_network
Wireless Sensor Networks for Smart Cities: Network Design, Implementation and Performance Evaluation
https://www.mdpi.com/2079-9292/10/2/218
Wireless Sensor Networks Challenges and Solutions
https://www.intechopen.com/chapters/86241
IEEE Wireless Sensor networks Projects, attacks and solutions
https://phdtopic.com/ieee-wireless-sensor-networks-projects/
Ian F. Akyildiz, IEEE A Survey on Sensor Networks
https://scispace.com/pdf/a-survey-on-sensor-networks-5beav0ez6k.pdf
Global Wireless Sensor Networks for smart technologies
https://www.researchgate.net/figure/Global-Wireless-Sensor-Networks-for-smart-technologies_fig5_320662287
Wireless Sensor Network (WSN) protocols are designed to manage communication between sensor nodes, focusing on energy efficiency, data routing, and reliability within constraints like limited power and bandwidth. These protocols balance the need for timely data transmission with the necessity for low energy consumption, often using methods like data aggregation and adaptive routing.Here are some standard network communications often employed in WSNs:
Zigbee: Based on IEEE 802.15.4, it's ideal for home automation and industrial applications with its low-power mesh networking.
Bluetooth Low Energy (BLE): Perfect for short-range, low-power applications, especially in personal health monitoring and wearables, with support for mesh networking.
LoRaWAN: Provides long-range communication with very low power consumption, suitable for wide-area applications like environmental monitoring.
Sigfox: Another LPWAN technology, known for ultra-low power consumption and long-range connectivity, often used for IoT applications like asset tracking.
LTE (NB-IoT and LTE-M): Cellular-based solutions offering connectivity with different trade-offs between range, power, and data rate for various IoT needs.
Wi-Fi: Typically used for higher data rate applications within shorter ranges, can be power-intensive but useful for certain WSN scenarios.


1. IoT-Enabled Smart Sustainable Cities: Challenges and Approaches https://www.mdpi.com/2624-6511/3/3/52
2. Different wireless sensor network topologies.

https://www.researchgate.net/figure/Different-wireless-sensor-network-topologies_fig1_326512013
Click on pics to enlarge


Wireless Sensor Networks Videos


【TOSHIBA】Wireless sensor network
https://www.youtube.com/watch?v=W1aMmCZ25fw

"Toshiba’s technology enables sensor networks to watch over people and society.:「Wireless sensor network」"





Introduction to Wireless Sensor Networks. Quick Start! | Libelium
https://www.youtube.com/watch?v=urWv-_EqS9M

"Learn how to set up and start monitoring your own wireless sensor network. Step-by-step elements guide. Connect sensor nodes to the Cloud by ZigBee, 802.15.4, 6LoWPAN, WiFI, 3G, and GPRS."

Wireless Sensor Networks - WSN Explained: Architecture, Basics, Characteristics, and Examples

https://www.youtube.com/watch?v=BBvG7uzmOV0
Wireless Sensor Networks integrated in Internet of Things
https://www.youtube.com/watch?v=aj4MJil6pow
Explaining Wireless Sensor Nodes: Zigbee vs. WiFI
https://www.youtube.com/watch?v=buV11ZPJ7MQ



                                             
                                               Sensors

Sensors are embedded ubiquitously to monitor everything from traffic flow to environmental conditions. These include traffic sensors, light and motion detectors in street lamps, air quality detectors, smart meters for utilities, and nanosensors for detailed environmental or health monitoring. Communication among these sensors typically occurs via the Wireless Sensor networks. This pervasive sensor network not only helps in making informed decisions but also supports predictive maintenance and planning, ensuring that the city evolves in a sustainable and human-centric manner. However, the omnipresence of these sensors introduces significant privacy and security challenges opening avenues for misuse. Real-time monitoring means that data about individuals' movements, behaviors, and even health can be collected constantly, potentially without explicit consent, turning the smart environment  into an inadvertent surveillance hub if not properly secured.
Sensors on Internet of Things Systems for the Sustainable Development of Smart Cities: A Systematic Literature Review
https://pmc.ncbi.nlm.nih.gov/articles/PMC11014400/  
The Role of Advanced Sensing in Smart Cities
https://pmc.ncbi.nlm.nih.gov/articles/PMC3574682/   
Designer’s guide for deploying sensors in smart cities
https://www.electronicproducts.com/designers-guide-for-deploying-sensors-in-smart-cities/

Click on pics to enlarge
1.Enabling Communication Technologies for Smart Cities https://www.researchgate.net/publication/309210290_Enabling_Communication_Technologies_for_Smart_Cities
2.Networking Architectures and Protocols for IoT Applications in Smart Cities: Recent Developments and Perspectives https://www.mdpi.com/2079-9292/12/11/2490

                                          STANDARDS

In today's globally interconnected world, standardization plays a vital role in ensuring compatibility, safety, efficiency, and innovation across various industries.
Numerous international organizations are dedicated to creating, maintaining, and promoting standards that transcend national boundaries. These bodies work collaboratively to address the complex needs of technology, health safety, and environmental concerns. Here's an overview of some of the most influential global standardization organizations that work collaboratively to ensure standards meet global needs. Each has unique contributions to the standardization landscape:
ISO (International Organization for Standardization): ISO is a recognized body for international standards, developing and publishing standards in nearly every industry from technology to food safety.
https://www.iso.org/home.html
IEC (International Electrotechnical Commission): specializes in electrotechnology and electrical engineering standards, often in collaboration with ISO (forming ISO/IEC for joint standards).
https://iec.ch/homepage
ITU (International Telecommunication Union): A United Nations specialized agency for information and communication technologies, covering aspects like radio spectrum management, satellite orbits, and telecom standards.
https://www.itu.int/en/Pages/default.aspx
IEEE (Institute of Electrical and Electronics Engineers): Focuses on electrical engineering, electronics, and related disciplines, with standards that often lead to widespread industry adoption.
https://standards.ieee.org/
IETF (Internet Engineering Task Force): An open standards organization that develops technical standards for the Internet, particularly focusing on protocols and architecture.
https://www.ietf.org/
3GPP (3rd Generation Partnership Project): Develops standards for mobile telecommunications, including GSM, UMTS, LTE, and now 5G
https://www.3gpp.org/

10 Standards Organizations That Affect You (Whether You Know It Or Not)
https://www.electronicdesign.com/technologies/communications/article/21796419/10-standards-organizations-that-affect-you-whether-you-know-it-or-not
Standards Organizations
https://www.informit.com/articles/article.aspx?p=24687&seqNum=7



Introduction to IEEE Internet of Things (IOT) and Smart Cities
https://standards.ieee.org/wp-content/uploads/import/documents/other/geps_07-iot_smart_cities.pd
Picture
              IoT SDOs and alliances landscape
             https://grouper.ieee.org/groups/802/secmail/pdfrY4vt7PbSK.pdf
Picture




                                       Wireless Ad-hoc networks

Wireless ad-hoc networks play a significant role in the smart and IoT frameworks by enabling devices to communicate autonomously without relying on a fixed infrastructure. This autonomy is crucial for environments where devices need to dynamically connect and share data, enhancing functionality and efficiency like in smart homes, cities, or industries. Different types of ad-hoc networks serve specific needs:
Mobile Ad-Hoc Networks (MANETs) are used where device mobility is high, such as in military or emergency response scenarios, allowing devices like smart phones to form networks on the fly.
Wireless Sensor Networks (WSNs) deploy numerous sensors to monitor physical conditions, agriculture, environmental monitoring, or industrial control where sensor nodes can communicate directly or through a network.
Flying Ad-Hoc Networks (FANET) is an ad hoc network with aircraft as nodes that can be used for communication between unmanned aerial vehicles (UAVs) and a ground control station (GCS).
Vehicle Ad-Hoc Networks (VANETs) are designed for communication between vehicles (V2V) and between vehicles and infrastructure (V2I), improving traffic management and safety.
Visible Light Ad hoc Networks (VLANET) Visible Light Communication is a subset of telecommunications technology that transmits data using the visible electromagnetic spectrum


Though ad-hoc networks prove beneficial, hacking attacks pose significant threats due to their decentralized and dynamic nature:
1. Eavesdropping: data can be easily intercepted by attackers who are within range. This passive attack violates confidentiality, particularly if the data transmitted is not encrypted.
2. Man-in-the-Middle (MITM) Attack: An attacker can position themselves between two communicating nodes, intercepting, altering, or inserting false messages. This can be particularly deceptive, leading to corrupted data or unauthorized access.
3. Denial-of-Service (DoS) Attack: By flooding the network with unnecessary traffic or by targeting specific nodes with resource exhaustion attacks, an attacker can prevent legitimate use of the network, making services unavailable to its intended users.
4. Black hole/Sinkhole Attack: Malicious nodes advertise themselves as having the shortest path to the destination node, attracting all traffic. Once the traffic is routed through the malicious node, it can drop or alter the packets.
5. Impersonation: By spoofing the identity of a legitimate node, attackers can deceive other nodes into sending data or routing through them, compromising the network's integrity.
Wireless ad hoc network 
https://en.wikipedia.org/wiki/Wireless_ad_hoc_network
Moving Ad Hoc Networks—A Comparative Study
https://www.mdpi.com/2071-1050/13/11/6187
Different types of attacks in Mobile ADHOC Network: Prevention and mitigation techniques
https://arxiv.org/pdf/1111.4090


1. Wireless sensor network https://www.researchgate.net/figure/A-typical-sensor-network-architecture_fig1_286733183
2. Mobile adhoc network 3. Vanet Vehicular adhoc 4. Fanet Flying Adhoc 5. Vlanet Visable light Adhoc
A Comparative Study of Ad Hoc
Networks 
https://www.researchgate.net/publication/377414030_A_Comparative_Study_of_Ad_Hoc_Networks


   Smart City Surveillance: Public Safety vs Privacy Rights

Picture

Smart city surveillance systems, comprising CCTV cameras, unmanned aerial vehicles (UAVs), and IoT sensors, enable law enforcement monitoring and profiling in urban environments. Emerging technologies, including facial recognition, automated license plate readers (ALPRs), AI-driven analytics, gait analysis, social media scraping, and voice recognition, generate real-time data to create detailed profiles for tracking individuals, analyzing behavior, and predicting criminal activity. These tools enhance situational awareness, streamline investigations, and optimize resource allocation for public safety. However, concerns persist regarding privacy breaches, unauthorized data collection, profiling inaccuracies, and potential biases in AI algorithms. This section evaluates the benefits of these systems for law enforcement and the associated challenges.
Benefits for Law Enforcement:
Enhanced Situational Awareness: CCTV, UAVs, and IoT sensors create a real-time data web. Facial recognition and ALPRs can ID suspects on the fly, while AI analytics crunch patterns to flag suspicious behavior. For example, if a robbery’s reported, cops can track a suspect’s car via ALPRs or spot them in a crowd with facial recog—way faster than old-school methods.
Streamlined Investigations: Gait analysis and voice recognition add layers to identify perps when faces or plates aren’t enough. Social media scraping pulls digital footprints, like a suspect posting about their plans. This cuts legwork, letting cops zero in on leads.
Predictive Policing: AI can forecast crime hotspots by analyzing historical data, helping deploy patrols smarter. Studies (like one from the Urban Institute, 2019) show predictive tools can reduce certain crimes by 7-20% in targeted areas.
Resource Optimization: Drones and sensors cover more ground than human patrols, saving time and budget. For instance, a single UAV can monitor a protest while officers focus on high-risk zones.

Challenges and Concerns:
Privacy Breaches: Constant surveillance—cameras, drones, social media scraping—can feel like Big Brother on steroids. Without strict oversight, data gets stored indefinitely or shared with third parties. The 2020 Georgetown Law report on facial recognition flagged how 1 in 2 Americans is in a law enforcement face database, often without consent.
Unauthorized Data Collection: IoT devices and social media scraping can grab info from innocent folks, not just suspects. X posts I’ve seen rant about smart city tech scooping up everyone’s data without clear opt-outs.
Profiling Inaccuracies: Facial recognition and gait analysis aren’t foolproof. NIST’s 2019 study showed facial recog misidentifies Black and Asian faces up to 100x more than white ones. False positives can lead to wrongful arrests or harassment.
AI Bias: Algorithms learn from historical data, which can bake in existing biases. If past policing targeted certain communities, AI might amplify that, unfairly profiling minorities or low-income areas. ProPublica’s 2016 dive into COMPAS showed how biased algorithms skewed risk assessments.
Public Trust Erosion: Heavy surveillance can make people feel watched, not protected. X discussions often highlight distrust in smart city tech, with users citing cases like China’s social credit system as a dystopian red flag.

Surveillance issues in smart cities
https://en.wikipedia.org/wiki/Surveillance_issues_in_smart_cities
Smart Cities and Surveillance Technology: Balancing Innovation, Security, and Privacy in Urban Environments
https://www.intechopen.com/online-first/1226431
A thorough examination of smart city applications: Exploring challenges and solutions throughout the life cycle with emphasis on safeguarding citizen privacy
https://www.sciencedirect.com/science/article/abs/pii/S2210670723003827
Smart cities and video surveillance: a guide for municipal agencies
https://www.security101.com/blog/smart-cities-and-video-surveillance-a-guide-for-municipal-agencies
American Dragnet: Data-Driven Deportation in the 21st Century
https://www.law.georgetown.edu/privacy-technology-center/publications/american-dragnet-data-driven-deportation-in-the-21st-century/
Surveillance and Predictive Policing Through AI
https://www.deloitte.com/global/en/Industries/government-public/perspectives/urban-future-with-a-purpose/surveillance-and-predictive-policing-through-ai.html
Involvement of Surveillance Drones in Smart Cities: A Systematic Review
https://ieeexplore.ieee.org/document/9781426
Airborne Drones describe "Drones and the Smart City"
https://nextech.online/smart-city/?utm_source=direct&utm_medium=direct

A Survey of Video Surveillance Systems in Smart City
https://www.mdpi.com/2079-9292/12/17/3567

Picture
Review of the application of drones for smart cities
https://www.researchgate.net/publication/385320360_Review_of_the_application_of_drones_for_smart_cities

Picture
Policing Tech: The High-Tech Tools Police Can Use to Surveil Protesters
https://www.themarshallproject.org/2024/11/12/protest-surveillance-technologies

Picture

Predictive Policing: Double-Edged Sword in Modern Law Enforcement

Predictive policing represents a data-driven evolution in law enforcement, leveraging artificial intelligence (AI) and big data analytics to forecast where and when crimes are likely to occur. At its core, this approach uses algorithms to analyze historical crime data—such as arrest records, incident reports, and location patterns—to generate "hotspot" maps or risk scores for individuals and areas. These predictions guide resource allocation, enabling police to deploy officers proactively rather than reactively. Emerging in the early 2010s, predictive policing promised a shift from intuition-based patrolling to evidence-based strategies, often touted for enhancing efficiency and public safety.
The process typically unfolds in three stages: data collection, analysis, and deployment. First, agencies aggregate vast datasets from sources like automated license plate readers (ALPR), surveillance cameras, social media, and even non-criminal records (e.g.,utility bills or traffic stops). Machine learning models, trained on this "historical crime data," identify patterns such as time-of-day correlations or geographic clusters.
Benefits for Law Enforcement:
Enhanced Situational Awareness: Predictive algorithms create dynamic heatmaps from vast datasets, allowing officers to monitor high-risk areas in real-time. Integrating data from body cameras and license plate readers helps flag emerging threats. 
Streamlined Investigations: Tools like risk-scoring models analyze patterns in arrests and social media to prioritize leads, cutting through manual sifting. This frees investigators for high value tasks.
Crime Prevention and Forecasting: AI crunches historical and environmental data to predict incidents, enabling preemptive interventions. 
Resource Optimization: With officer shortages plaguing agencies, predictive tools balance deployments and budgets. Real-time crime centers in cities use them for cost-effective staffing, projecting long-term savings via analytics.

Challenges and Concerns:
Privacy Breaches: Algorithms pull from expansive sources like social media and IoT feeds, often without warrants, creating perpetual digital profiles. The EU AI Act (effective Feb 2025) bans predictive tools for individual crime probability due to these risks, citing indefinite data retention. X users highlight fears of "Big Brother" overreach in everyday monitoring.
Unauthorized Data Collection: Innocent bystanders' data gets swept up, fueling mass surveillance.
Profiling Inaccuracies: Models falter on incomplete data, leading to false positives. 
AI Bias: Trained on skewed historical data, algorithms amplify racial disparities.
Public Trust Erosion: Heavy reliance breeds distrust, especially in minority communities. Cases like the UK's Palantir ties fuel dystopian fears akin to China's social credit.


Predictive policing: Navigating the challenges
https://legal.thomsonreuters.com/blog/predictive-policing-navigating-the-challenges/
The Promises and Perils of Predictive Policing
https://www.cigionline.org/articles/the-promises-and-perils-of-predictive-policing/
Predictive policing algorithms are racist. They need to be dismantled.
https://www.technologyreview.com/2020/07/17/1005396/predictive-policing-algorithms-racist-dismantled-machine-learning-bias-criminal-justice/
Predictive policing
https://en.wikipedia.org/wiki/Predictive_policing
Examining public support for AI in policing: the role of perceived procedural justice
https://www.tandfonline.com/doi/full/10.1080/15614263.2025.2516535#abstract
Surveillance and Predictive Policing Through AI
https://www.deloitte.com/global/en/Industries/government-public/perspectives/urban-future-with-a-purpose/surveillance-and-predictive-policing-through-ai.html
Artificial Intelligence in Predictive Policing Issue Brief
https://naacp.org/resources/artificial-intelligence-predictive-policing-issue-brief



Artificial Intelligence (A.I) Integration with Smart Surveillance

Picture
 Integration of IoT-Enabled Technologies and Artificial Intelligence (AI) for Smart City Scenario: Recent Advancements and Future Trends https://www.mdpi.com/1424-8220/23/11/5206

Artificial Intelligence (A.I.) refers to computer systems engineered to replicate human intelligence, executing tasks such as learning from vast datasets, recognizing complex patterns, interpreting natural language, and making autonomous decisions. In smart city surveillance, A.I. acts as the central nervous system, processing data from CCTV cameras, unmanned aerial vehicles (UAVs), IoT sensors, and social media feeds to deliver actionable insights for law enforcement. Companies like Palantir Technologies are at the forefront, with platforms like Gotham and Foundry integrating disparate data sources—crime reports, sensor data, and digital footprints—into real-time profiles for tracking individuals and predicting criminal activity. This technology empowers police to respond faster and smarter, but it also sparks concerns about algorithmic bias, data privacy, and ethical use, necessitating robust regulations to maintain public confidence.
Positive Traits of A.I. in Smart Surveillance
Predictive Policing: A.I. analyzes crime data, IoT sensor inputs, and social media to forecast hotspots, enabling proactive interventions. Palantir’s Gotham platform, used by the NYPD, reduced targeted crimes by up to 20% in urban trials (Urban Institute, 2019).
Advanced Pattern Recognition: A.I. identifies faces or license plates in video feeds, speeding up investigations. Palantir’s tools link these to datasets like travel or financial records for rapid suspect profiling.
Resource Optimization: A.I. directs drones and patrols based on real-time risk assessments, cutting costs by up to 15% while improving coverage, as seen in the LA Sheriff’s Department using Palantir’s platforms.
Social Media Threat Detection: A.I.’s natural language processing scrapes social media (e.g., X posts) to detect threats like protests or gang activity, with Palantir supporting federal agencies during high-profile events.

Negative Traits of A.I. in Smart Surveillance
Algorithmic Bias: A.I. can misprofile minorities due to skewed training data, as shown in ProPublica’s 2016 COMPAS analysis, leading to unfair targeting or false positives.
Data Privacy Concerns: Extensive data collection, including from social media and IoT devices, risks unauthorized surveillance of innocent individuals, eroding personal privacy.
Opaque Data Practices: Palantir’s lack of transparency, criticized in reports like Amnesty International’s 2020 review, fuels public distrust in how A.I. handles sensitive data.
Erosion of Public Trust: Heavy reliance on A.I. surveillance can alienate communities, with X discussions highlighting fears of dystopian overreach, necessitating transparent policies and audits.
Smart Cities and AI-Powered Image Processing: Enhancing Public Safety and Efficiency
https://medium.com/@API4AI/smart-cities-and-ai-powered-image-processing-enhancing-public-safety-and-efficiency-7692e994e498
IEEE Smart Cities
https://smartcities.ieee.org/component/search/?searchword=ARTIFICIAL%20INTELLIGENCE%20SMART%20CITY&ordering=popular&searchphrase=any
These five cities are making innovative use of generative AI
https://www.weforum.org/stories/2024/07/generative-ai-smart-cities/
How AI and Machine Learning help build a Smart City? 
https://www.esds.co.in/blog/how-ai-and-machine-learning-help-build-a-smart-city/
Artificial intelligence across industries - IEC Whitepaper
https://www.researchgate.net/publication/329191549_Artificial_intelligence_across_industries_-_IEC_Whitepaper
How AI Surveillance is Shaping Public Safety in Smart Cities
https://www.thefuturelist.com/how-ai-surveillance-is-shaping-public-safety-in-smart-cities/
The role of artificial intelligence in smart city systems usage: drivers, barriers, and behavioural outcomes
https://www.sciencedirect.com/science/article/pii/S0160791X25000570



Cell-Site Simulators (CSS) in Smart Surveillance

Cell-Site Simulators (CSS), also known as Blackboxes, IMSI catchers, or Stingrays, are surveillance devices that mimic legitimate cell phone towers, tricking nearby mobile devices into connecting to them. In smart city ecosystems, CSS integrate with broader surveillance networks to enable law enforcement to track phone locations, intercept metadata (e.g., call logs, app traffic), and, in some cases, capture content like texts or calls. Deployed by law enforcement agencies in discreet setups, such as mobile units or vehicle-integrated systems, CSS provide precise, real-time tracking without relying on telecom providers. This enhances law enforcement’s ability to monitor suspects and respond to threats in dense urban environments. However, their indiscriminate data collection, potential to disrupt emergency calls, and secretive use raise significant privacy and constitutional concerns, demanding robust oversight to balance security and civil liberties.
Positive Traits of CSS in Smart Surveillance

Precise Location Tracking: CSS pinpoint phone locations with high accuracy, enabling law enforcement agencies to quickly apprehend suspects in urban settings or during investigations.
Enhanced Investigations: By capturing metadata like call logs or app activity, CSS help build evidence without physical device access, streamlining cases like trafficking or fugitive hunts.
Integration with Smart Systems: CSS feed real-time location data into surveillance networks, boosting situational awareness in crowded public spaces or high-risk events.
Operational Discretion: Discreet setups, such as vehicle-integrated CSS, enable covert operations, minimizing suspect evasion in dense urban environments.
Negative Traits of CSS in Smart Surveillance
Indiscriminate Data Collection: CSS capture data from all nearby phones, including those of uninvolved civilians, raising privacy concerns about unauthorized surveillance.
Potential for Abuse: Secretive deployments often target specific communities or protests, fueling concerns about disproportionate surveillance and civil rights violations.
Constitutional Violations: CSS use without warrants, often justified by vague legal orders, may breach Fourth Amendment protections, as noted in legal challenges.
Interference with Services: CSS can disrupt phone calls, including 911 access, posing risks for accessibility-dependent users and emergency situations.

Cell-site simulators/ imsi
https://sls.eff.org/technologies/cell-site-simulators-imsi-catchers
SeaGlass: Enabling City-Wide IMSI-Catcher Detection
https://techpolicylab.uw.edu/wp-content/uploads/2018/07/SeaGlass-Enabling-City-Wide-IMSI-Catcher-Detection.pdf
Stingray phone tracker
https://en.wikipedia.org/wiki/Stingray_phone_tracker
IMSI Hacking: Understanding Mobile Network Vulnerabilities
https://www.startupdefense.io/cyberattacks/imsi-hacking
Stingray: A New Frontier in Police Surveillance
https://www.cato.org/policy-analysis/stingray-new-frontier-police-surveillance#
'Stingray' Spy Devices Are Eavesdropping in Washington, D.C.: Here's How
https://www.livescience.com/62215-what-are-cell-site-simulators.html

                                      Top 7 IMSI Catcher Detection Solutions for 2020 LINK
Picture
                      As Santa Clara County procures ‘Stingray’ cell tracker, increased scrutiny surrounds potentially invasive device LINK
Picture

Automated License Plate Readers in Smart City Surveillance

Automated License Plate Readers (ALPRs), utilizing high-resolution cameras and AI-driven optical character recognition, capture and analyze vehicle license plates to support law enforcement in smart cities. Integrated into urban infrastructure like streetlights, traffic systems, and vehicles. ALPRs cross-reference plate data with crime databases in real time, aiding police in tracking stolen vehicles, locating suspects, and enhancing public safety. Private Tech Companies deploy these systems, enabling rapid alerts and cloud-based data storage for investigative efficiency. However, widespread ALPR use raises significant privacy concerns, as continuous monitoring and data sharing with third parties can erode civil liberties without transparent oversight or clear consent protocols.
Positive Traits

Rapid Suspect Identification: ALPRs instantly match license plates against databases of wanted vehicles, enabling police to locate suspects or stolen cars.
Enhanced Crime Response: Real-time alerts from vehicle-mounted and fixed ALPRs allow law enforcement to respond swiftly to incidents, such as hit-and-runs or kidnappings, improving urban safety outcomes.
Traffic Management Synergy: Integrated with smart city systems, ALPRs optimize traffic flow and reduce congestion by monitoring vehicle patterns, supporting broader urban efficiency goals.
Public-Private Efficiency: Private firms provide cost-effective ALPR networks, allowing cities to leverage advanced tech without building their own infrastructure.
Negative Traits
Privacy Erosion: Vehicle-mounted and fixed ALPRs collect and store vehicle data indiscriminately, often without public knowledge or consent, raising concerns about mass surveillance.
Data Sharing Risks: Cloud-based ALPR data shared with third parties or other agencies can lead to misuse or unauthorized access, lacking robust transparency measures.
Potential for Overreach: Without strict regulation, ALPRs risk enabling unchecked surveillance, disproportionately impacting communities and chilling free movement.
Accuracy and Bias Concerns: Errors in plate recognition or biased database inputs can lead to false positives, wrongly flagging innocent drivers and amplifying policing inequities.

Law Enforcement and Technology: Use of Automated License Plate Readers
https://www.congress.gov/crs-product/R48160
YOLO-SLD: An Attention Mechanism-Improved YOLO for License Plate Detection
https://ieeexplore.ieee.org/document/10571945
Automatic number-plate recognition
https://en.wikipedia.org/wiki/Automatic_number-plate_recognition
Smart Streetlight, License Plate Reader Technology Helping Solve Crimes and Keep San Diegans Safe
https://www.sandiego.gov/mayor/smart-streetlight-license-plate-reader-helping-solve-crimes
Automatic number plate recognition (ANPR) in smart cities: A systematic review on technological advancements and application cases
https://www.sciencedirect.com/science/article/abs/pii/S0264275122002724
Number plate recognition smart parking management system using IoT
https://www.sciencedirect.com/science/article/pii/S2665917424003854
Automatic License Plate Recognition
https://www.researchgate.net/publication/3427867_Automatic_License_Plate_Recognition

 The Role of License Plate Recognition in Smart Cities Link
Picture
Pdf: Technologies and Policy Options to Enhance Services and Transparency Link
Picture

Biometrics in Smart Surveillance

Biometric technology identifies individuals based on unique physical or behavioral traits, such as facial features, gait patterns, voice, or fingerprints, leveraging A.I. algorithms for efficient, real-time analysis. In smart city ecosystems, biometrics integrate with broader surveillance networks to enable law enforcement to authenticate identities, track suspects, and enhance public safety. Deployed by law enforcement agencies through systems like cameras, audio sensors, or mobile scanners, biometrics provide rapid, non-invasive identification in urban environments. This strengthens the ability to monitor high-risk areas, prevent crime, and streamline investigations. However, concerns about accuracy, privacy invasions, and potential biases in biometric systems raise significant ethical and legal challenges, requiring robust oversight to ensure responsible use.
Positive Traits of Biometrics in Smart Surveillance

Accurate Suspect Identification: A.I.-powered biometrics like facial or voice recognition match individuals against databases instantly, enabling law enforcement agencies to identify suspects in crowded public spaces or during investigations.
Enhanced Tracking Capabilities: By integrating with smart city systems, A.I.-driven biometric tools like gait analysis track individuals across urban areas, improving response times for incidents like theft or public unrest.
Crime Prevention: Visible biometric systems deter criminal activity, as potential offenders know their unique traits can be captured and traced in high-traffic zones.
Operational Efficiency: A.I.-automated biometric identification reduces manual effort, allowing law enforcement to allocate resources efficiently to high-priority tasks like patrolling or case resolution.

Negative Traits of Biometrics in Smart Surveillance
Accuracy Issues: A.I.-driven biometric systems can produce false positives, particularly for facial recognition, with error rates up to 100 times higher for Black and Asian individuals compared to white individuals (NIST, 2019).
Privacy Invasions: Indiscriminate scanning of faces, voices, or other traits in public spaces captures data on innocent civilians, raising concerns about unauthorized surveillance.
Algorithmic Bias: Skewed A.I. training data can lead to disproportionate targeting of minorities, amplifying existing policing biases and risking unfair profiling.
Public Distrust: Lack of transparency in biometric use fuels fears of overreach, with community feedback on platforms like X highlighting concerns about pervasive surveillance eroding civil liberties.


Digital Ethics for Biometric Applications in a Smart City
https://dl.acm.org/doi/10.1145/3630261
Comprehensive Guide for Biometrics Enabled Smart Cities
https://gaotek.com/comprehensive-guide-for-biometrics-smart-cities/
AN OVERVIEW OF THE USE OF BIOMETRIC TECHNIQUES IN SMART CITIES
https://scispace.com/pdf/an-overview-of-the-use-of-biometric-techniques-in-smart-1k7ciaebxp.pdf
Smart city energy efficient data privacy preservation protocol based on biometrics and fuzzy commitment scheme
https://www.nature.com/articles/s41598-024-67064-z
Toward Secure and Transparent Global Authentication: A Blockchain-Based System Integrating Biometrics and Subscriber Identification Module
https://ieeexplore.ieee.org/document/10921714
Anonymous Authentication Scheme Based on Physically Unclonable Function and Biometrics for Smart Cities
https://onlinelibrary.wiley.com/doi/am-pdf/10.1002/eng2.13079



                              Biometric Facial Comparison: Unlocking New Opportunities in Community Corrections Link
Picture


Open Source Intelligence (OSINT) in Smart Surveillance

Open Source Intelligence (OSINT) involves collecting and analyzing publicly available data from sources like social media, news, public records, and online platforms to generate actionable insights. In smart city ecosystems, OSINT integrates with broader surveillance networks, leveraging A.I.-driven tools to process vast datasets in real time, enabling law enforcement to monitor threats, track suspects, and predict criminal activity. Deployed by law enforcement agencies through automated scraping tools or public data analysis, OSINT provides critical information without direct intrusion into private systems. This enhances the ability to maintain public safety and respond to urban threats efficiently. However, concerns about data misuse, privacy overreach, and potential profiling errors raise significant ethical challenges, necessitating strict oversight to ensure responsible use.
Positive Traits

Real-Time Threat Detection: A.I.-powered OSINT tools scrape social media and public platforms to identify emerging threats, like planned protests or criminal activity, allowing law enforcement agencies to act swiftly.
Enhanced Investigations: OSINT gathers public data, such as social media posts or online profiles, to build evidence, streamlining cases like fraud or trafficking without invasive methods.
Predictive Capabilities: By integrating with smart city systems, OSINT analyzes trends in public data to forecast crime hotspots, enabling proactive resource deployment by law enforcement.
Non-Intrusive Data Collection: OSINT relies on publicly available information, reducing the need for direct surveillance, making it a less invasive tool for urban safety monitoring.
Negative Traits of OSINT in Smart Surveillance
Privacy Overreach: A.I.-driven OSINT can collect data on innocent individuals through broad social media scraping, raising concerns about surveillance without consent.
Profiling Errors: Skewed A.I. analysis of public data can misinterpret behaviors, leading to false positives or unfair targeting of specific communities, as seen in some predictive policing tools.
Data Misuse Risks: Lack of clear regulations allows OSINT data to be shared or stored improperly, with community feedback on platforms like X highlighting fears of unauthorized use.
Public Distrust: Extensive OSINT use without transparency fuels perceptions of overreach, eroding trust in law enforcement’s commitment to protecting civil liberties.

Exploring OSINT for Modern Day Reconnaissance
https://ieeexplore.ieee.org/document/10420426
Towards Better Cyber Security Consciousness: The Ease and Danger of OSINT Tools in Exposing Critical Infrastructure Vulnerabilities
https://ieeexplore.ieee.org/abstract/document/10286573
The effect of ISO/IEC 27001 standard over open-source intelligence
https://pmc.ncbi.nlm.nih.gov/articles/PMC8771761/
Open-source intelligence
https://en.wikipedia.org/wiki/Open-source_intelligence
A quantitative study of the law enforcement in using open source intelligence techniques through undergraduate practical training
https://www.sciencedirect.com/science/article/pii/S2666281723001348

Data Aggregators and Private Sector Information in Smart Surveillance

Picture
Police surveillance and facial recognition: Why data privacy is imperative for communities of color Link

Data aggregators and private sector information systems, such as Palantir’s Gotham and Foundry platforms, collect and analyze data from sources like commercial databases, social media, and consumer records, using A.I.-driven tools to create detailed profiles. In smart city ecosystems, these systems integrate with broader surveillance networks to provide law enforcement with insights into individuals’ behaviors, locations, and connections. Deployed by law enforcement agencies through partnerships with firms like Palantir, these tools enable rapid access to aggregated data without direct collection, enhancing suspect tracking and crime prevention in urban environments. However, reliance on private data raises concerns about transparency, consent, and potential misuse, necessitating stringent oversight to protect civil liberties.
Positive Traits
Comprehensive
Suspect Profiling
: A.I.-powered data aggregators compile detailed profiles from public and private sources, enabling law enforcement agencies to identify suspects and their networks quickly.

Enhanced Investigative Efficiency: Access to commercial databases and social media records streamlines investigations, uncovering links in cases like fraud or organized crime without invasive surveillance.
Crime Prediction: By integrating with smart city systems, aggregated data helps predict criminal activity, allowing law enforcement to deploy resources proactively in high-risk urban areas.
Public-Private Synergy: Partnerships with private firms provide law enforcement with vast datasets, enhancing situational awareness without requiring agencies to build their own data infrastructure.
Negative Traits 
Lack of Transparency: Private sector data collection often occurs without clear disclosure, raising concerns about how personal information is shared with law enforcement.
Consent Violations: Individuals may be unaware their data is aggregated and used for surveillance, undermining privacy rights, as highlighted by community concerns on platforms like X.
Potential for Misuse: Unregulated data sharing risks misuse, with A.I.-driven profiling potentially targeting innocent individuals based on inaccurate or incomplete records.
Bias Amplification: Skewed datasets from private sources can perpetuate biases, leading to disproportionate scrutiny of certain communities, amplifying existing policing inequities.

GAO, The U.S. Government Accountability Office Link

The U.S. Government Accountability Office (GAO), often referred to as the "congressional watchdog," is an independent, nonpartisan agency within the legislative branch that serves Congress by providing objective, fact-based audits, evaluations, and investigations of federal programs and spending. Established as the General Accounting Office in response to post-World War, it was renamed the Government Accountability Office in 2004 under the GAO Human Capital Reform Act to better reflect its expanded mission beyond traditional accounting to broader accountability and performance oversight. Headquartered in Washington, D.C., the GAO is led by the Comptroller General of the United States, appointed by the President for a 15-year term with Senate confirmation, and operates through 15 mission teams covering areas like defense, health care, and financial management. The agency conducts financial and performance audits, investigates waste, fraud, and abuse, issues legal decisions on bid protests and appropriations, and sets auditing standards, delivering hundreds of reports and testimonies annually to help Congress enhance government efficiency, save taxpayer dollars and ensure accountability to the American people.

GAO Report: LAW ENFORCEMENT DHS Could Better Address Bias Risk and Enhance Privacy Protections for Technologies Used in Public. 2024 Link

The U.S. Government Accountability Office’s report GAO, titled "Law Enforcement: DHS Could Better Address Bias Risk and Privacy Concerns in Its Use of Technologies," evaluates the Department of Homeland Security’s (DHS) deployment of over 20 detection, observation, and monitoring technologies, including automated license plate readers (ALPRs), drones, and facial recognition, to enhance public safety across federal law enforcement activities. Drawing from agency data, stakeholder interviews, and case studies like Customs and Border Protection’s use of ALPRs for border security, the report highlights how these technologies improve operational efficiency, such as expediting vehicle tracking and threat detection, with DHS spending $2.3 billion on such tools in 2023.
However, it exposes critical shortcomings, including insufficient policies to mitigate racial and ethnic bias in technology use, limited transparency in data collection practices, and privacy risks from widespread surveillance without clear consent mechanisms, potentially exacerbating inequities in communities. By recommending enhanced bias assessments, privacy safeguards, and stakeholder engagement, GAO underscores the need for DHS to strengthen oversight to align technological benefits with civil liberties protections, fulfilling its congressional mandate to ensure accountability
All Diagrams below are from the GAO Report 2024. They describe over 20 technologies used in detection, observation, and monitoring of civilians, including ALPRs, Facial recognition, Various drones and Cell site simulators. Link
Picture
Picture
Picture
Picture
Picture

GAO Report on Smart Cities: Assessing Benefits and Exposing Challenges April 2025
Link

The U.S. Government Accountability Office’s report GAO, titled "Smart Cities Technologies and Policy Options to Enhance Services and Transparency," provides a balanced assessment of smart city technologies used for transportation and law enforcement. It details technologies such as automated license plate readers (ALPRs), acoustic gunshot detection systems, Bluetooth readers, Digital twins, and vehicle-to-everything (V2X) connectivity, which enhance public safety by enabling rapid crime response and traffic management.
However, the report subtly exposes significant challenges, including limited evidence linking technologies to outcomes, high costs, and privacy risks from widespread data collection without adequate consent or transparency. By highlighting governance gaps, false positives in detection systems, and cybersecurity vulnerabilities, and proposing policy options like data minimization and transparent procurement, GAO underscores the need for stronger oversight to balance technological benefits with civil liberties protections, aligning with its congressional mandate to ensure accountability.
Diagrams below are from the GAO report 2025. Digital Twins? Link
Picture
Figure 4, depicts the smart transportation data ecosystem, showing vehicle sensors (e.g., GPS, engine speed, throttle, fuel, hard braking, check engine codes) collecting data, transmitted to manufacturers. This data, plus inputs from cell phones, Bluetooth readers, LiDAR, and traffic cameras, flows to traffic management centers for real-time monitoring, with manufacturers and data brokers selling it to transportation planners, law enforcement, and others. While aiding traffic management (e.g., hazard detection via braking), it exposes privacy risks from undisclosed sharing without consent, potentially leading to misuse.
Picture

Smart City Surveillance Videos


Smart City: How do you live in a Smart City? | Future Smart City Projects | Surveillance or Utopia?
https://www.youtube.com/watch?v=VRRPy-yEKRM

Smart City: The idea of a smart city sounds very fascinating at first: Underground automatic gardens, remote controlled smart city street lights, better air quality. But how is a smart citiy to be implemented? What happens to the data collected in the smart city? These and other questions about smart city projects will be answered in the new episode of SHIFT about smart cities.


Maria Zeee, Aman Jabbi - The Final Lockdown - LED Street Lights, Smart Cities, CBDC, Digital ID - #ZeeeMedia
https://www.youtube.com/watch?v=FOaZZL4j8XI

Maria Zeee interviewed me in October 2022. Comprehensive presentation on Digital ID, Smart Cities, Facial Recognitions etc. included.


Police Unlock AI's Potential to Monitor, Surveil and Solve Crimes | WSJ
https://www.youtube.com/watch?v=H_fyQCeBaeM
GAO. Facial Recognition Technology and Law
https://www.youtube.com/shorts/5bN6TgmmfRQ
GAO. How Can Federal Law Enforcement
https://www.youtube.com/shorts/ppKcEC7nGwM
Tech Tool Enables Mass Surveillance Capabilities For Police
https://www.youtube.com/watch?v=zerEwlRsPBI
How Police Cameras Recognize and Track You | WIRED
https://www.youtube.com/watch?v=9Xg-7FfLIVw
How Cops Are Using Algorithms to Predict Crimes | WIRED
https://www.youtube.com/watch?v=7lpCWxlRFAw
US police forces using controversial facial recognition technology - BBC News
https://www.youtube.com/watch?v=uGeRTmDdqUI
The police's terrifying new cameras
https://www.youtube.com/watch?v=vWj26RIlN_I
Exposing The Dark Side of America's AI Data Center Explosion
https://www.youtube.com/watch?v=t-8TDOFqkQA

                           
Digital I.D, (Identification or Identity), BlockChain, & CBDC's
Central Bank Digital Currency

Picture

The "Symbiotic" relationship between Digital I.Ds, Blockchain and CBDCs Central Bank Digital Currencies, and its concerns.

A pervasive and growing concern in contemporary financial and political discourse is that the convergence of three powerful technological and policy initiatives, Digital Identity (Digital ID), blockchain technology, and Central Bank Digital Currencies (CBDCs), is not a coincidence but rather a coordinated effort to fundamentally reshape the relationship between the citizen and the state. Critics warn that while each technology is promoted individually for its potential benefits, their combined implementation could create a comprehensive system of unprecedented surveillance and control. In this view, the "incestral relationship" lies in how a CBDC provides a programmable currency, a mandatory Digital ID links every payment to a verified individual, and a permissioned blockchain provides an immutable and traceable ledger—together forming the infrastructure for a potential social credit system where financial freedom could be dynamically adjusted based on behavioral or political compliance. This has ignited a fierce debate over a future where cash is obsolete, financial privacy is an artifact of the past, and every economic decision is trackable and potentially controllable by central authorities.


                                           Digital I.Ds

Digital IDs are electronic credentials that store and verify personally identifiable information (PII), name, photo, biometrics, address, in secure mobile wallets or cloud systems. Using cryptography, NFC, QR codes, and selective disclosure, they replace physical documents for everything from boarding flights to opening bank accounts. Rolled out as “convenient upgrades” to paper IDs, they promise seamless access while governments and corporations pitch them as the backbone of a trusted digital economy. By 2025, over 50 countries have active programs, with adoption accelerating via standards like ISO 18013-5 for mobile driver’s licenses (mDLs). The system works in three core phases: issuance, storage, and verification. Governments or trusted issuers enroll users with biometric scans (face/finger/iris) and link data to a unique identifier. The ID lives in an encrypted app or blockchain wallet. When needed, users share only required attributes e.g., “over 21” without full DOB  via zero-knowledge proofs or public-key infrastructure.
Benefits for Individuals & Society 

-Tap to go: Emphasizes the convenience and speed of digital systems. Instead of fumbling for physical cards, users can quickly authenticate and access services with a tap or scan.
-Lost phone? No panic: Physical IDs are lost forever, but a digital ID is stored securely in the cloud and can be remotely wiped and restored on a new device, protecting personal data.
-Tamper-proof: Refers to the integrity and security of the data. Digital IDs use encryption and other advanced security measures to make the data virtually impossible to forge or alter, a significant improvement over easily forged physical documents.
-Selective sharing: A key advantage for privacy. Unlike a physical ID which reveals all information, a digital ID allows users to share only the specific piece of data needed (e.g., "Yes/No, they are over 18" without revealing their birth date), giving users more control over their personal information.
-Biometric lock: Focuses on user authentication. Biometrics (fingerprints, facial recognition) ensure that only the legitimate owner can access the digital ID, preventing unauthorized use even if the device is stolen.
-Saves billions: points to the economic efficiency for governments and businesses. It saves money by reducing the costs associated with printing physical cards, manual verification processes, and managing physical records. 
-Instant business checks: Highlights efficiency and speed in commerce. Businesses can instantly verify customer identities online or in person, speeding up processes like opening bank accounts, signing contracts, or age verification.
-Reaches remote areas: Focuses on financial inclusion and service delivery. A digital ID can be provisioned and verified in remote areas with internet access, allowing people in underserved regions to access essential services like healthcare, voting, and banking. 
-Refugees get proof: Digital IDs can provide a formal identity to stateless people and refugees, giving them "proof of life" and access to humanitarian aid, healthcare, and education where a physical ID might be impossible to obtain. 
-One ID, everywhere: Emphasizes interoperability. A single, government-recognized digital ID could replace numerous other cards (driver's license, health card, bank card, etc.), simplifying life and reducing bureaucracy.

Challenges and Concerns, Cybersecurity Fragility.
Cybersecurity Fragility - One hack can leak millions of fingerprints or face scans forever.
- You cannot change your face like a password.
- Hackers upgrade fast (deepfakes, phone hijacks, future quantum computers); defenses are slow.

From choice to control, bait and switch - Starts optional, then required for banking, travel, and healthcare.
-“Safety upgrades” become the reason for more rules.
- Real-time tracking, behavior scores, and instant ID shutdown.
- Once built, the system is too expensive to remove – you’re stuck.

Privacy Annihilation - One ID connects health, money, location, and social media.
- Every scan is recorded; nothing is ever deleted. 

Exclusion & Digital Divide - No phone or internet? You’re shut out of everyday life.
- Elderly, rural, and low-income people suffer most.

Bias & Error - Bad lighting or accents can block valid users.
- A few big companies control it – one failure breaks everything.

Public Trust Collapse - “Security” excuses stricter laws after every breach.
- Fear of social-credit systems (China style) or total kill-switch control.


Digital identity
https://en.wikipedia.org/wiki/Digital_identity
Worldwide Digital ID Overview: The Current State by Country [+Free List]
https://regulaforensics.com/blog/worldwide-digital-id-overview/
Reimagining Digital ID
https://www3.weforum.org/docs/WEF_Reimagining_Digital_ID_2023.pdf
Digital Identity Roadmap Guide
https://www.itu.int/hub/publication/d-str-digital-01-2018/
How universal wallets can help businesses unleash the full potential of digital identity
https://www.weforum.org/stories/2024/02/how-businesses-could-use-universal-wallets-to-unleash-potential-of-digital-identity/
New digital ID scheme to be rolled out across UK
https://www.gov.uk/government/news/new-digital-id-scheme-to-be-rolled-out-across-uk
Why is the UK introducing digital IDs – and why are they so controversial?
https://www.aljazeera.com/news/2025/9/29/why-is-the-uk-introducing-digital-ids-and-why-are-they-so-controversial
WEF pdf, A Blueprint for Digital Identity
https://www3.weforum.org/docs/WEF_A_Blueprint_for_Digital_Identity.pdf
UN Digital ID program targets system-wide expansion
https://www.biometricupdate.com/202505/un-digital-id-program-targets-system-wide-expansion
2025 Trends in Digital ID Verification Technology
https://www.zyphe.com/resources/blog/2025-trends-in-digital-id-verification-tech
Which countries in Europe already have a digital ID cards?
https://www.euronews.com/next/2025/09/30/which-countries-in-europe-already-have-a-digital-id-cards
Picture
                                  How digital identity can improve lives in a post-COVID-19 world LINK


Australia's Digital ID System
https://www.youtube.com/watch?v=qkMkn4fXUf4

"An overview of Australia's Digital ID System - a secure, voluntary, convenient and inclusive way for Australians to verify their ID to access online services. The Australian Government will work to expand the program to be a national, whole of economy program – meaning individuals and business can easily and safely access government services and eventually private sector services to verify who they are without handing over unnecessary personal information."




ID, Wallet, Keys All In Your Hand: Sweden Moves Into The Future With Microchipping | Nightly News
https://www.youtube.com/watch?v=Ksw-arKvMPk

"Imagine carrying just about everything you need beneath the surface of your hand - your wallet, keys and ID, all in a microchip. That’s reality in Sweden, as some early-adopters implant the tiny devices beneath their skin."


Why You Should Be Worried About Digital ID - Silkie Carlo
https://www.youtube.com/watch?v=xhymUHtl4p8

"Silkie Carlo is Director of Big Brother Watch, a UK civil liberties group, and a leading campaigner on privacy, surveillance, and digital rights"
https://bigbrotherwatch.org.uk/



                                   
                                   The BlockChain

The Blockchain is a promoted decentralized, encrypted database functioning as a distributed digital ledger (DLT), using shared ledger technology to record and synchronize data across a peer-to-peer (P2P) network of nodes. It operates via consensus to prevent fraud, linking immutable blocks through cryptographic hashes, ensuring permanent, transparent records.
In smart city environments, blockchain enables seamless, trustless interactions in everyday activities such as shopping and purchasing; for instance, consumers can use cryptocurrency wallets to make instant, low-fee payments at retail points, while supply-chain tracking ensures product authenticity from manufacturer to shelf, and smart contracts automate loyalty programs or refunds without human intervention. Blockchain will become foundational in 6G networks, delivering scalable trust across edge devices, and nano-sensors, enabling secure, autonomous systems through the 2030s and beyond. 

Standard advantages encompass: (1) elimination of intermediaries for cost savings (2) verifiable transparency in transactions (3) tamper-proof records via cryptographic hashing (4) robust security against unauthorized alterations (5) streamlined cross-border or peer-to-peer payments (6) empowerment of underserved communities (7) support for programmable contracts and novel governance models (8) end-to-end provenance tracking (9) distributed architecture that withstands localized failures.
Standard disadvantages include: (1) scalability limitations with low transaction throughput (2) high energy consumption in proof-of-work systems (3) price volatility of associated cryptocurrencies (4) irreversible transactions leading to permanent losses (5) regulatory uncertainty and compliance burdens (6) user complexity and vulnerability to scams (7) environmental concerns from electronic waste (8) interoperability challenges between networks (9) risks of majority attacks on smaller chains (10) limited mainstream adoption beyond speculation.


Though Blockchain promotes decentralization, in practice, blockchain depends on:
- Concentrated Cloud Infrastructure that creates single points of failure vulnerable to outages or regulatory shutdowns.
- Dominant Validators who command majority consensus power and can censor transactions, collude, or execute double-spends.
- Centralized Governance Mechanisms, including foundations, directed upgrades, emergency intervention tools.
- Core developer influence, that enable swift rule changes and reintroduce hierarchical control. 

These structural realities expose networks to coercion by governments, manipulation by insiders via MEV extraction (reordering of transactions by block builders to capture hidden profits) or whale voting (large token holders dominating governance decisions), or exploitation by malicious actors through bridge compromises (hacking cross-chain connectors to steal locked funds) and phishing (tricking users into revealing private keys or signing malicious transactions), making true decentralization a dream rather than a fact. 
The very governments that once marketed cryptocurrency as “financial freedom” are now drafting and enforcing KYC/AML regulations across every blockchain, exchange, and increasingly even self-custody wallets.
By late 2025, the FATF Travel Rule is fully in force in most countries: any transfer above approximately NZ$1,700 now requires exchanges and most DeFi platforms to collect and share the sender’s and receiver’s full legal name and address. The moment a public key is permanently tied to a real-world identity, decentralization effectively ends.

When these permanent on-chain records are fused with mandatory government digital IDs and programmable CBDCs, the immutable ledger becomes the ideal infrastructure for a Western social-credit system.
Spend on the “wrong” things, donate to the “wrong” causes, or buy too much meat, ammunition, or fuel, and automated penalties can follow: reduced wallet limits, higher insurance rates, or quietly frozen funds all executed instantly, all perfectly legal, and all justified as “consumer protection” or “climate goals”. In the end, the ledger never forgets, but citizens will still need government permission to access or spend what is recorded on it.


Unlocking a Promising Future: Integrating Blockchain Technology and FL-IoT in the Journey to 6G
https://ieeexplore.ieee.org/document/10614448
IBM What is blockchain?
https://www.ibm.com/think/topics/blockchain
Blockchain and 6G-Enabled IoT
https://www.mdpi.com/2411-5134/7/4/109
From blockchain to Web3
https://onestore.nokia.com/asset/213367
Blockchain-enabled wireless communications: a new paradigm towards 6G
https://academic.oup.com/nsr/article/8/9/nwab069/6253219

TARGETED UPDATE ON IMPLEMENTATION OF THE FATF STANDARDS ON VIRTUAL ASSETS AND VIRTUAL ASSET SERVICE PROVIDERS
https://www.fatf-gafi.org/content/dam/fatf-gafi/recommendations/2024-Targeted-Update-VA-VASP.pdf.coredownload.inline.pdf
Central Bank Digital Currencies and Social Credit Systems
https://1984updated.com/2025/02/24/central-bank-digital-currencies-and-social-credit-systems/
Travel Rule Supervision
https://www.fatf-gafi.org/content/dam/fatf-gafi/recommendations/Best-Practices-Travel-Rule-Supervision.pdf
Can Retail Central Bank Digital Currencies Improve the Delivery of Social Safety Nets?
https://www.imf.org/en/publications/wp/issues/2025/10/24/can-central-bank-digital-currencies-improve-the-delivery-of-social-safety-nets-568447
EU Advances Digital Identity Framework with ISO Standards Integration for 2025 Launch
https://mobileidworld.com/eu-advances-digital-identity-framework-with-iso-standards-integration-for-2025-launch/
Blockchain and Distributed Digital Ledger Technologies (RP2025)
https://interoperable-europe.ec.europa.eu/collection/rolling-plan-ict-standardisation/blockchain-and-distributed-digital-ledger-technologies-rp2025
FATF’s 2025 Targeted Update: Where Crypto Rules Stand and What’s New
https://notabene.id/post/2025-fatf-targeted-update

The hidden danger of re-centralization in blockchain platforms
https://www.brookings.edu/articles/the-hidden-danger-of-re-centralization-in-blockchain-platform
Blockchain Technology and Related Security Risks: Towards a Seven-Layer Perspective and Taxonomy
https://www.mdpi.com/2071-1050/15/18/13401

A Blockchain Footprint for Authentication of IoT-Enabled Smart Devices in Smart Cities: State-of-the-Art Advancements, Challenges and Future Research Directions
https://ieeexplore.ieee.org/document/9827661


Blockchain-based Edge-IoT system in smart grid application. LINK
Picture
Blockchain-based Edge-IoT system in smart healthcare application. LINK
Picture
Decentralized Authentication of Distributed-Healthcare Hospital Patients via Blockchain LINK
Picture
How does a blockchain work - Simply Explained
https://www.youtube.com/watch?v=SSo_EIwHSd4

                 CBDC Central Bank Digital Currencies

Central Bank Digital Currencies (CBDCs) are presented as a secure, efficient, and inclusive evolution of fiat currency:
a sovereign digital token issued and backed directly by a central bank, held in digital wallets, and designed for instantaneous, low-cost retail payments. Central banks and governments promote CBDCs as essential tools for combating illicit finance, enhancing financial inclusion, enabling precise monetary policy, and reducing the environmental impact of physical cash. As of November 2025, 134 countries are actively researching CBDCs, 49 have launched pilots or live systems, with China’s digital yuan processing trillions in transaction volume and the European Central Bank targeting a digital euro decision by late 2025 for potential rollout in 2027–2028.

Cited advantages include:
- Instantaneous settlement with near-zero fees : 
By removing intermediaries, a CBDC could facilitate faster and cheaper payments than the current system.
- Programmable features for targeted fiscal transfers : During a crisis, a CBDC could allow governments to quickly distribute aid to citizens, potentially with spending conditions to boost the economy.
- Complete transaction traceability for AML/CFT compliance : While proponents see this as a way to combat crime, critics argue it enables mass government surveillance and removes financial privacy.
- Direct implementation of negative interest rates : Central banks could potentially use this to stimulate the economy by disincentivizing saving. Critics fear this could become a tool for economic control and could spark a "flight to safety" from commercial bank deposits.
- Reduced environmental footprint compared to cash production : A CBDC could reduce the environmental impact of printing and transporting cash.
- Extension of formal financial services to unbanked populations : CBDCs could offer digital financial services to those without bank accounts, promoting financial inclusion.
- Improved cross-border payment efficiency : A CBDC could streamline international payments by reducing intermediaries, costs, and delays.
- Real-time macroeconomic data for policy makers : Proponents argue this data would enable more precise monetary policy. However, critics raise concerns about data privacy and the potential for surveillance if aggregate transaction data were to become more granular
- Rapid crisis-response distributions : A CBDC could enable governments to quickly inject money into the economy during an emergency. 

Once a retail CBDC is deployed on a permissioned distributed ledger and integrated with mandatory national digital identity systems, however, it transforms from currency into a fully controllable monetary instrument:
- Tokens can be programmed with expiry dates or spending conditions : This would allow the government to enforce an expiration date on money, potentially to stimulate economic spending during a downturn (forcing people to spend or lose it). This removes individual autonomy over one's savings.
- Geographic or merchant-specific restrictions can be applied : This feature could be used to enforce policies such as "healthy eating" by blocking transactions at fast-food restaurants or could be used during a lockdown to restrict travel or physical movement by limiting spending to certain areas.
- Transaction categories can be blocked by policy directive : The state could simply block purchases of certain goods or services deemed undesirable, such as alcohol, tobacco, or even specific political donations.
- Individual spending limits can be adjusted in real time based on behavioural or environmental criteria : This points to a "social credit system" model, where a person's spending power could be dynamically adjusted based on their adherence to government policies or their personal behavior (e.g., carbon footprint).
- Accounts can be frozen or seized without judicial oversight : This is a major concern regarding due process and civil liberties. It suggests that the state could arbitrarily cut off an individual's access to their own money without a court order.
- Every payment is permanently attributable to a verified natural person : This is the core privacy concern. It means the end of financial anonymity and the creation of a complete, permanent financial surveillance state.
- Interest rates (including negative rates) can be applied selectively : A central bank could impose negative interest rates on specific accounts or groups to penalize saving, effectively taxing people for holding money and forcing them to spend.
- Emergency distributions can be restricted to approved vendors : During a crisis, stimulus money could be designed to only work at government-approved businesses, further limiting consumer choice and potentially skewing the free market.
- Cross-border functionality can be disabled for non-compliant individuals : This feature would provide a powerful mechanism for enforcing international sanctions or punishing political dissidents who attempt to move assets out of the country.

A retail CBDC, therefore, does not replicate the anonymity and finality of physical cash. It constitutes a centrally administered, fully traceable, and programmatically restrictive payment system that grants issuing authorities unprecedented, real-time control over citizens’ economic activity.

What are central bank digital currencies and what could they mean for the average person?
https://www.weforum.org/stories/2023/10/what-are-central-bank-digital-currencies-advantages-risks/
How Should Central Banks Explore Central Bank Digital Currency?
https://www.imf.org/en/-/media/files/publications/ftn063/2023/english/ftnea2023008.pdf
CBDC Governance: Programmability,Privacy and Policies
https://www.cigionline.org/static/documents/DPH-paper-Freiman.pdf
The Risks of CBDCs
https://www.cato.org/visual-feature/risks-of-cbdcs
Driving Financial Inclusion Through Central Bank Digital Currencies
https://www.undp.org/sites/g/files/zskgke326/files/2025-06/undp-driving-financial-inclusion-through-cbdcs.pdf
Programmable Currency and Economic Control: How CBDCs Could Reshape Freedom, Privacy, and Power
https://www.researchgate.net/ publication/390746587_Programmable_Currency_and_Economic_Control_How_CBDCs_Could_Reshape_Freedom_Privacy_and_Power
Central bank digital currencies: A critical review
https://www.sciencedirect.com/science/article/pii/S1057521923005471
Central Bank Digital Currency Global Interoperability Principles
https://www3.weforum.org/docs/WEF_Central_Bank_Digital_Currency_Global_Interoperability_Principles_2023.pdf
What the U.S. ban on central bank digital currencies means for Europe
https://www.gisreportsonline.com/r/cbdc-ban/
CBDC Tracker
https://www.atlanticcouncil.org/cbdctracker/


What is CBDC? (Central Bank Digital Currency)
https://www.youtube.com/watch?v=4EYvXcCJVDI

"Central Bank Digital Currency also known as CBDC, is a form of FIAT currency issued by a central bank. In this video we're going to show you the main goals of CBDC, compare the concept to crypto, and take a look at the issues surrounding this form of centralized currency!"



The Danger of Digital Currencies
https://www.youtube.com/watch?v=ApkEgP7uzSY

"Central Bank Digital Currencies (CBDCs) are being piloted by many governments throughout the world. In this video, Catherine Austin Fitts, President of Solari, Inc., explains the dangers of digitizing currency and what we can do to preserve our freedom."

The Western Social Credit Paradigm: A Fragmented, Covert, and Already-Operational System

When most people think of a "social credit system," they picture the highly visible, centrally controlled government frameworks used in places like China. The Western equivalent is entirely different: it operates secretly, without an official name, a single government leader, or one master database. Instead, the Western system is a dispersed collection of thousands of private companies and government agencies working together. It doesn't give you a single "good citizen" score. Rather, it uses complex algorithms to constantly assess your behavior, associations, and compliance with various rules. The result is the same: depending on your profile, you might find yourself quietly restricted from accessing loans, certain jobs, housing, insurance, or even basic digital services.

This paradigm operates on four foundational characteristics that distinguish it from its more conspicuous counterparts:
Fragmentation and Deniability
No central authority maintains a master “social credit database.” Instead, scoring and exclusion happen across thousands of independent but interoperable systems run by commercial entities like banks, insurers, payment processors, and tech platforms, as well as government-adjacent bodies. Each participant can plausibly deny operating a blacklist or being part of a unified "social credit" system, while collectively achieving the same result through shared data and standard protocols.
Data Fusion Without Formal Consolidation
Through long-standing partnerships between public and private sectors—including U.S. fusion centers, FinCEN financial information-sharing rules, and European mechanisms like the Schengen Information System—disparate data streams are continuously cross-referenced. Travel records, financial transactions, communications metadata, biometric encounters, and online intelligence are all compiled. The resulting detailed profiles are then shared with or mandated to the companies that act as gatekeepers to essential services.
Soft Exclusion Rather Than Hard Prohibition
Sanctions rarely take the form of explicit, state-imposed bans. More commonly, individuals encounter incremental friction: elevated interest rates, delayed approvals, mandatory human review, selective service denials, or perpetual “additional screening.” These issues are presented publicly as routine commercial decisions or necessary regulatory checks (like anti-money laundering (AML) rules), making them hard to challenge under existing consumer protection laws.
Normative Alignment Masked as Risk Management
Behavioral criteria extend far beyond just crime or financial risk to include things like adherence to modern environmental, social, and governance (ESG) standards, perceived exposure to "misinformation," and political donation patterns. Such criteria are embedded in "reputational risk" or "responsible banking" policies that have strong support from major financial institutions. These systems categorize people not just by their likelihood to repay a debt, but by their perceived alignment with prevailing institutional values.
The forthcoming integration of mandatory Digital Identity frameworks, retail Central Bank Digital Currencies (CBDCs) with programmable features, and blockchain ledgers won't create this system from scratch. Instead, these technologies will provide the final seamless layer that transforms the present patchwork of quiet exclusions into a real-time enforcement grid—one that remains politically defensible precisely because it is never officially named or centrally declared.
In summary, the Western social credit paradigm is not a future possibility. It is an existing, continuously evolving apparatus that already structures life opportunities according to opaque, algorithmically derived profiles. Its defining strength lies in its invisibility: a system of control that achieves near-total behavioral alignment while preserving the appearance of liberal openness and free market choice.


Social Credit System
https://en.wikipedia.org/wiki/Social_Credit_System
How the West Got China's Social Credit System Wrong
https://www.wired.com/story/china-social-credit-score-system/
The AI myth Western lawmakers get wrong
https://www.technologyreview.com/2022/11/29/1063777/the-ai-myth-western-lawmakers-get-wrong/
FinCEN Director Emphasizes Importance of Information Sharing Among Financial Institutions
https://www.fincen.gov/news/news-releases/fincen-director-emphasizes-importance-information-sharing-among-financial
314(b) Information Sharing Practices Should Adapt the Four COCs of a Fusion Center
https://verafin.com/2016/05/314b-information-sharing-practices-should-adapt-the-four-cocs-of-a-fusion-center/
Fusion Centers and Intelligence Sharing
https://bja.ojp.gov/program/it/national-initiatives/fusion-centers
DHS Focus on "Soft Targets" Risks Out-of-Control Surveillance
https://www.aclu.org/news/privacy-technology/dhs-focus-on-soft-targets-risks-out-of-control-surveillance
Mandatory Digital Identification and the Integrity of Democracy: Surveillance, Exclusion and the Risk of Authoritarian Revival
https://www.researchgate.net/publication/395382999_Mandatory_Digital_Identification_and_the_Integrity_of_Democracy_Surveillance_Exclusion_and_the_Risk_of_Authoritarian_Revival
Surveillance systems evaluation: a systematic review of the existing approaches
https://link.springer.com/article/10.1186/s12889-015-1791-5
Western democracy’s new maxim: surveillance and soft despotism
https://theconversation.com/western-democracys-new-maxim-surveillance-and-soft-despotism-48879
ESG rating disagreement: Implications and aggregation approaches
https://www.sciencedirect.com/science/article/pii/S1059056024005240
Why ESG ratings vary so widely (and what you can do about it)
https://mitsloan.mit.edu/ideas-made-to-matter/why-esg-ratings-vary-so-widely-and-what-you-can-do-about-it


                       

                         The Internet of Vehicles (IoV)

The Internet of Vehicles (IoV) refers to the network of connected vehicles and infrastructure that communicate to enhance transportation efficiency, safety, and convenience. Vehicles to everything (V2X), Vehicles exchange data with each other (V2V), with road infrastructure (V2I), with the cloud (V2C) and with people (V2P) for real-time-traffic management, accident prevention, and improved navigation. However IoV can be exploited in various ways:
Data Privacy: Vehicles can collect vast amounts of data about driving habits, locations visited, and even personal conversations. If this data is not securely managed, it can lead to privacy breaches. Communication between vehicles or with infrastructure could be intercepted or tampered with.
Cyber security Threats: Connected cars can be targets for hacking, with risks ranging from data theft to taking control of vehicle functions like brakes or steering. Malicious actors could exploit vulnerabilities in vehicle software or connected systems.  
Surveillance: With vehicles acting as mobile sensors, they could be used for tracking individuals or gathering data for unauthorized purposes.
Malware: Vehicles could be infected with malware through connected devices or updates.
Denial-of-Service (DoS): Overloading communication networks to disrupt vehicle operations.

Internet of Vehicles wikipedia https://en.wikipedia.org/wiki/Internet_of_vehicles
V2X Vehicle to everything https://www.litepoint.com/wp-content/uploads/2019/05/V2X-051619.pdf

A Survey of VANET/V2X Routing From the Perspective of Non-Learning- and Learning-Based Approaches
https://ieeexplore.ieee.org/document/9716935
Picture
A Comprehensive Survey of V2X Cybersecurity Mechanisms and Future Research Paths
https://www.researchgate.net/publication/367455783_A_Comprehensive_Survey_of_V2X_Cybersecurity_Mechanisms_and_Future_Research_Paths


1. Internet of Vehicles (IOV) | Smart City ,IOT IOB VANETs, Artificial Intelligence
 https://www.youtube.com/watch?v=WhdBgnCKG4o


                                     The Smart Home

The Smart home can transform into a tool for illegal surveillance, where malicious actors could access cameras, microphones, or manipulate devices like fridges or door locks. If one device is hacked, it can act as a gateway for attackers to compromise other connected devices. This happens because they often share the same network, and vulnerabilities leading to widespread security breaches across the entire smart home network:
Smart Appliances: Hackers might gain access through default or weak passwords, outdated software, or insecure network connections. Once inside, they could spy through connected cameras, listen via microphones, or even manipulate appliances to cause physical harm, like overheating a stove or unlocking doors.
Malware: Infecting devices via malicious software updates or links.

Risk to Human Occupants:
Privacy Invasion: Unauthorized surveillance of home activities, conversations, or routines could lead to personal data breaches or blackmail.
Physical Safety: Manipulation of home systems could result in dangerous situations, such as turning off security systems, altering thermostat settings to extreme temperatures, or controlling access to the home.

How IoT devices, even washing machines, can be used for hacking
https://www.nemko.com/blog/how-iot-devices-even-washing-machines-can-be-used-for-hacking
The digital harms of smart home devices A systematic literature review
https://www.sciencedirect.com/science/article/pii/S0747563223001218
Smart Homes, cities and energy
https://www.uc.edu/content/dam/refresh/cont-ed-62/olli/22-winter/future%20smart%20cities%20homes%20energy.pdf



Picture
A Reliable TTP-Based Infrastructure with Low
Sensor Resource Consumption for the Smart
Home Multi-Platform

https://www.mdpi.com/1424-8220/16/7/1036


Picture
Remote patient monitoring using artificial intelligence
https://www.sciencedirect.com/science/article/abs/pii/B9780128184387000095

Picture
Attack Graph Modeling for Implantable Pacemaker
https://www.mdpi.com/2079-6374/10/2/14

                         Voice-activated assistants

Voice-activated assistants, such as Amazon Alexa, Google Assistant, Apple’s Siri, and Samsung’s Bixby, act as the core of smart home networks, allowing hands free control of devices like lights, thermostats, cameras, and appliances through voice commands and cloud-based AI. These assistants handle tasks like setting reminders, playing music, answering questions, or managing routines (e.g., “Goodnight” to lock doors and dim lights), while connecting to smart city platforms for real-time traffic or weather updates. As of September 2025, these technologies dominate consumer markets, with Alexa and Google Assistant in over 70% of U.S. households (per recent Statista data), and newer models using advanced AI for more natural conversations.
However, challenges remain: privacy risks arise from constant audio monitoring and data storage (often without clear user consent), cybersecurity vulnerabilities expose devices to hacking (e.g., 2024 reports of exploited smart speakers), and issues due to fragmented network communications with competing brands (e.g., Siri not vibing with a Samsung smart fridge).


Best Smart Home Devices of 2025
https://www.cnet.com/home/smart-home/best-smart-home-devices/
The Best Voice Assistants for Your Smart Home
https://techbullion.com/the-best-voice-assistants-for-your-smart-home/
Security and privacy problems in voice assistant applications: A survey
https://www.sciencedirect.com/science/article/pii/S0167404823003589
Data autonomy and privacy in the smart home: the case for a privacy smart home meta-assistant
https://link.springer.com/article/10.1007/s00146-025-02182-4
Smart Home Personal Assistants
https://www.semanticscholar.org/paper/Smart-Home-Personal-Assistants-Edu-Such/c66406b0e9775502219f8806570f3fb87639af4a
Smart Home Voice Assistants: A Literature Survey of User Privacy and Security Vulnerabilities
https://www.researchgate.net/publication/346725885_Smart_Home_Voice_Assistants_A_Literature_Survey_of_User_Privacy_and_Security_Vulnerabilities
         Smart Home Voice Assistants: A Literature Survey of User Privacy and Security Vulnerabilities. Link
Picture


                     The Body Area Networks (BANs)

The Body Area Networks (BANs) are pivotal in advancing ehealth, offering significant benefits for remote healthcare. Telehealth BANs, facilitate the continuous monitoring of vital signs and health metrics, enabling doctors to make informed decisions remotely. This technology supports telemedicine by providing real-time, accurate health data, which is crucial for managing chronic conditions, post-surgical care, or elderly care without the need for frequent hospital visits. The beneficial applications of ehealth are numerous however this advancement also comes with high risks such as hacking into devices like smart pacemakers or insulin pumps that could lead to life-threatening situations by altering medication delivery, heart rhythm control, or any other invasive sinister attacks.
Data Breach: could lead to unauthorized access of personal health information or other sensitive data transmitted between devices like sensors, wearables, and medical implants. This can lead to privacy violations or health risks if the data is misused or altered.
Resource Allocation in Wireless Body Area Networks: A Smart City Perspective
https://www.intechopen.com/chapters/80045
WIRELESS BODY AREA NETWORKS: A NEW PARADIGM OF PERSONAL SMART HEALTH.
https://smartcities.ieee.org/images/files/pdf/SCWhitePaper-WirelessBodyAreaNetworks.pdf


Computer Network types by scale starting from the Nano, followed by the Body area networks ( BAN ) and so on.
1. Body area network wikipedia https://en.wikipedia.org/wiki/Body_area_network
2.
Wearable Wireless Body Area Networks for Medical Applications
https://www.researchgate.net/publication/351097985_Wearable_Wireless_Body_Area_Networks_for_Medical_Applications

Picture
Picture
                               Wireless Body Area Networks and Their Applications—A Review
                               https://ieeexplore.ieee.org/document/10024829

Picture
 Fighting COVID-19 and Future Pandemics With the Internet of Things: Security and Privacy Perspectives Link
Picture
Genachowski Remarks on Unleashing Spectrum for Medical Body Area Networks
https://www.youtube.com/watch?v=nHi40rJApDs
"Chairman Genachowski delivered this speech at George Washington University Hospital on May 17, 2012. Chairman Genachowski delivered this speech at George Washington University Hospital on May 17, 2012. Chairman Genachowski was joined by representatives from GE Healthcare and Philips Healthcare to discuss increasing spectrum capacity for Medical Body Area Networks (MBANs). MBANs are wireless patient monitoring systems that use low-cost wearable sensors and allow clinicians to remotely monitor vital signs of patients."
Body Area Networks
https://www.youtube.com/watch?v=12Rwzcw4bS0

                           The Internet of Bodies (IOB)

The Internet of Bodies (IoB) is a network of internet-connected devices on, in, or around the human body, extending the Internet of Things (IoT) to directly monitor, augment, or alter human functions, from smartwatches tracking vitals to implantable brain-computer interfaces like Neuralink, generating vast biometric data but raising serious privacy, security, and ethical concerns about autonomy and discrimination. It's categorized by integration level (external, internal/ingestible, fully integrated) and promises better health but demands new governance for sensitive bodily data.
How it Works & Examples

First Generation (External): Devices worn on the body, like smartwatches, fitness trackers, smart glasses, tracking steps, heart rate, or activity.
Second Generation (Internal/Ingestible): Devices inside the body, such as smart pills for medication adherence, digital pacemakers, or smart prosthetics that send data to apps or doctors.
Third Generation (Integrated): Devices deeply integrated with the nervous system or brain, like Neuralink's brain-computer interface (BCI) allowing control of machines with thought
Benefits & Potential
Enhanced Healthcare: Real-time monitoring, early diagnosis, improved treatment adherence, and personalized medicine.
Cognitive & Functional Augmentation: Improving body function, cognition, and enabling new abilities.
Cost Savings: Potential to reduce hospital visits and improve efficiency.
Risks & Challenges
Data Privacy & Security: Massive amounts of sensitive personal data are vulnerable to breaches, misuse, or sale.
Autonomy & Control: Concerns about loss of control over one's own body and data.
Discrimination & Bias: Risk of biased data leading to discrimination in employment, insurance, or finance.
Security Flaws: IoB devices share IoT security flaws but with direct bodily harm potential, notes


What Is The Internet Of Bodies? And How Is It Changing Our World?
https://www.forbes.com/sites/bernardmarr/2019/12/06/what-is-the-internet-of-bodies-and-how-is-it-changing-our-world/
What Is the Internet of Bodies?
https://www.rand.org/multimedia/video/2020/10/29/what-is-the-internet-of-bodies.html
Shaping the Future of the Internet of Bodies: New challenges of technology governance
https://www3.weforum.org/docs/WEF_IoB_briefing_paper_2020.pdf
Center for Internet of Bodies: Where Connectivity, Security, and Intelligence Meets Human Body to Transform Lives
https://engineering.purdue.edu/C-IoB
The Internet of Bodies—alive, connected and collective: the virtual physical future of our bodies and our senses
https://pmc.ncbi.nlm.nih.gov/articles/PMC7868903/
They call it the Internet of Bodies, and we’re already logged in
https://carlossimpson.medium.com/they-call-it-the-internet-of-bodies-and-were-already-logged-in-92ad5eaa6e1a



Picture
IEEE The Internet of Bodies: A Systematic Survey on Propagation Characterization and Channel Modeling
https://ieeexplore.ieee.org/document/9490369

"Pontential use cases for IOB devices" The Internet of Bodies: The Human Body as an Efficient and Secure Wireless Channel LINK
Picture
What Is the Internet of Bodies?
https://www.youtube.com/watch?v=-0bXUxRqy8g
"Internet-connected "smart" devices are increasingly available in the marketplace, promising consumers and businesses improved convenience and efficiency. Within this broader Internet of Things (IoT) lies a growing industry of devices that monitor the human body and transmit the data collected via the internet. This development, which some have called the Internet of Bodies (IoB), includes an expanding array of devices that combine software, hardware, and communication capabilities to track personal health data, provide vital medical treatment, or enhance bodily comfort, function, health, or well-being. However, these devices also complicate a field already fraught with legal, regulatory, and ethical risks."

Securing the Internet of Body
https://www.youtube.com/watch?v=NHqfT1vIe6E
"Your body is your Internet, and it should to be protected from remote hacks, just like your computer. While this hasn't happened in real life yet, researchers have been demonstrating for at least a decade that it's possible. Before the first crime happens, Purdue University engineers have tightened security on the "Internet of Body." Now, the network you didn't know you had is only accessible by you and your devices, thanks to technology that keeps the communication signals within the body itself."


Internet of Bodies: Blurring the lines between humans and tech
https://www.youtube.com/watch?v=me7ZvYNKmzk&t=128s

" The next generation of the “Internet of Bodies,” or IOB, could bring technological devices and the human body closer together than ever before. Academic and author Andrea M. Matwyshyn, who coined the term in 2016, describes it as “a network of human bodies whose integrity and functionality rely at least in part on the internet and related technologies, such as artificial intelligence.”

Internet of Bodies. Compilation
https://www.youtube.com/watch?v=Qk7uCdPt5pY

                        The Internet Of Behaviours (IOB)

The Internet of Behaviours (IoB) is an extension of the Internet of Things (IoT) that combines technology, data analytics, and behavioural science to understand, monitor, and influence human behaviour. It involves gathering data from a wide range of connected devices and digital activities to create detailed profiles that can be used to predict and guide human actions.
Key Components:

Technology (IoT): The foundation of IoB lies in the vast network of Internet of Things devices (wearables, smart home appliances, connected cars, cameras, sensors, etc.) that continuously collect data about our interactions and environment.
Data Analytics: The massive amounts of data collected are processed and analysed using AI and machine learning algorithms to identify patterns, correlations, and trends in human actions and preferences.
Behavioural Science/Psychology: Insights from behavioural psychology are applied to interpret the data, understand the motivations behind actions, and determine how to encourage or discourage specific behaviours to achieve a desired outcome.

Applications and Examples:
Marketing and Retail: Companies use IoB to create highly personalized experiences and targeted advertising based on a customer's browsing history, purchase patterns, and location data. Walmart, for instance, uses in-store sensors to optimize product placement based on customer movement patterns.
Healthcare and Wellness: Wearable devices and health apps collect biometric data (heart rate, sleep patterns, activity levels) to offer personalized health advice, monitor chronic conditions, and promote healthier lifestyles.
Smart Cities and Urban Planning: Data from traffic sensors, public transport systems, and social media can be used to optimize traffic flow, manage energy consumption, and enhance public safety and services.
Workplace Productivity: Employers may use digital tools to monitor employee activity, communication patterns, and engagement levels to optimize workflows and provide performance feedback, which raises significant privacy concerns.
Insurance: Insurance providers can analyze driving habits via connected car programs to determine risk assessments and offer personalized premium discounts.

Ethical and Privacy Concerns:
Privacy Infringement: The extensive collection and cross-linking of personal data from multiple sources can lead to a loss of privacy and create detailed individual profiles, often without explicit or fully informed consent.
Manipulation: There are concerns that IoB technologies could be used to subtly "nudge" or manipulate people's decisions (e.g., in politics or consumption) for commercial or political gain, rather than for the individual's well-being.
Bias and Discrimination: Algorithms that underpin IoB can perpetuate existing societal biases if the training data is flawed or one-sided, potentially leading to discriminatory outcomes in areas like employment, finance, or social services.
IoB represents a significant advancement over IoT by focusing on human data to build more intelligent and adaptable systems. This technology is likely to continue evolving, potentially incorporating more sophisticated forms of monitoring. The interconnected nature of smart and IoT infrastructure, architected for seamless interoperability, makes the acquisition and integration of IoB components into systems like Central Bank Digital Currencies (CBDCs), digital IDs, and even blockchain-based platforms a potential inevitability.

EU Internet of behaviours
https://www.edps.europa.eu/data-protection/technology-monitoring/techsonar/internet-behaviours_en
What is the Internet of Behaviour?
https://www.iberdrola.com/about-us/our-innovation-model/what-is-internet-of-behaviour
The Internet Of Behavior Is The Next Trend To Watch
https://www.forbes.com/councils/forbestechcouncil/2023/03/13/the-internet-of-behavior-is-the-next-trend-to-watch/
Internet of behaviors: conceptual model, practical and theoretical implications for supply chain and operations management
https://www.tandfonline.com/doi/epdf/10.1080/00207543.2024.2372008?needAccess=true
Internet of Behaviours (IoB) and its role in customer services
https://www.sciencedirect.com/science/article/pii/S2666351121000437
Internet of Behaviors: A Survey
https://arxiv.org/pdf/2211.15588
What exactly is the Internet of Behaviour (IoB) and why is it the technology of the future?
https://www.youtube.com/watch?v=zPJyocEKZZQ
"IoB is a subset of IoT. Where IoT operates with data, informations, and how various devices communicate with one another, IoB attempts to understand the data collected from users’ online activity from a behavioural psychology perspective then leverage the understanding to create new products and services."
The Power of Internet of Behaviors (IoB) in Management
https://www.youtube.com/watch?v=zbCPn-nSwBwUnlocking

"Discover the fascinating world of the Internet of Behaviors (IoB) in our latest video! We'll unravel the connection between IoB and the Internet of Things (IoT) and dive into how IoB influences human behavior through the data trail we leave behind. Learn how IoB gathers data from smartphones, wearables, and smart devices to revolutionize online shopping, workplace productivity, and safety. See how IoB technology anticipates needs, tracks employee behavior, and enhances training programs. Join us as we explore the immense potential of IoB and the importance of its ethical implementation."
Gartner’s Internet of Behaviours | IOT IOB
https://www.youtube.com/watch?v=DyraTA6iKxQ

"The Internet of Behavior combines existing technologies that focus on the individual directly, that is, facial recognition, location tracking and big data for example, and connects the resulting data to associated behavioral events, such as cash purchases or device usage. As the IOT links people with their actions, we’ve verged into the Internet of Behavior. Consider the Internet of Behavior a combination of three fields, that is, Technology, Data analytics, and Behavioral science. We can break behavioral science into four areas we consider when we use technology: emotions, decisions, augmentations, and companionship"

   The fine line between Smart Cities and Surveillance States

Picture
           Differential privacy in edge computing-based smart city Applications:Security issues, solutions and future directions Link

The deployment of 5G and 6G technologies in smart cities, if exploited, risks transforming urban environments into a complete surveillance structure, where intricate networks of interconnected technologies monitors every dimension of human activity, from urban centers to the private confines of smart homes, from pervasive biometric monitoring in policing to invasive bio-nano technologies enabling remote health telemetry to measure vital signs and biomarkers, triggering profound privacy violations and security vulnerabilities.
Every Internet of Things (IoT) node in the smart environment, from household appliances, vehicles, and humans, represents potential vulnerabilities for hackers, bad actors, and governments to exploit, revealing that potential technological innovations are overshadowed by serious risks of surveillance and control.

Government Overreach: There's a risk that state entities might use these technologies for mass surveillance, monitoring citizens' activities without due cause, potentially infringing on civil liberties.
Corporate Surveillance: Companies might leverage smart city data for profit, tracking consumer behavior in ways that might not be transparent or consensual.
Manipulation: In the wrong hands, surveillance data could be used to manipulate outcomes, suppress dissent, or target specific groups within society. This underlines the need for strong legal frameworks, transparent policies, and public oversight to ensure that the benefits of smart city technologies, including AI integration, do not come at the cost of privacy and freedom.


‘Smart’ Cities Are Surveilled Cities
https://foreignpolicy.com/2021/04/17/smart-cities-surveillance-privacy-digital-threats-internet-of-things-5g/
Security, Privacy and Risks Within Smart Cities: Literature Review and Development of a Smart City Interaction Framework
https://link.springer.com/article/10.1007/s10796-020-10044-1

Privacy concerns in smart cities
https://www.sciencedirect.com/science/article/pii/S0740624X16300818

Security and privacy issues in e-health cloud-based system: A comprehensive content analysis
https://www.sciencedirect.com/science/article/pii/S1110866517302797

Security and Privacy in Smart City Applications: Challenges and Solutions
https://www.semanticscholar.org/paper/Security-and-Privacy-in-Smart-City-Applications%3A-Zhang-Ni/c2d9225ca2f6db43acc9a1b7540262befa80b0dc
Amalgamation of Advanced Technologies for Sustainable Development of Smart City Environment: A Review
https://ieeexplore.ieee.org/document/9600866
Smart Cities: A Survey on Security Concerns
https://www.researchgate.net/publication/297592060_Smart_Cities_A_Survey_on_Security_Concerns
A New Privacy-Aware Approach to Smart City Data Mining
https://innovate.ieee.org/innovation-spotlight/a-new-privacy-aware-approach-to-smart-city-data-mining/