surveillance technologies: efficiency, human rights, ethics · 2018-03-26 · fundamental right to...

Post on 14-Feb-2020

0 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

SurveillanceTechnologies:efficiency,humanrights,ethicsProf.Dr.TomSorell,UniversityofWarwick,UK

Outline• Howdoesonejustifytheusebypoliceofsurveillancetechnologyin

aliberaldemocracy?• Legitimatepurposeandeffectiveness• SURVEILLEmethodologyforweighingrelevantconsiderations

• Effectivenessscores• Fundamentalhumanrightsscore• Ethicsindicators

• Illustrations• SURVEILLEmethodology(over-)emphasizesprivacyviolations:

• Bulkcollection

Surveillancetechnology• Cameras• Bugs• Telephonetaps• AutomaticNumberPlateRecognition• LocationTracking• Drag-nettinganddata-mining• Personalcommunicationsdatacollectionandanalytics?

• Evidence-basedtargetselectionand“hops”• profiling

Justifyingtheuseofsurveillancetechnologiesinaliberaldemocracy• State’sspecialresponsibilityforsecurity,

especiallythreatstolife• Risksofintrusion,error,andtotrust,canbe

justifiedininvestigationandpreventionofseriouscrimeifmorallyproportionate

• Discretionandsecrecyasrelaxingtheobservanceofproportionalityinpractice

Legitimatepurposes• Preventinganycrime

– Preventingseriouscrime• Terroristattack• Murder• Moneylaundering

– Preventingparkingoffences• Achievingfairaccesstopublicservices

– Localeducation– Localhealthservices

• Protectingpeopleexercisingrighttoexpressunpopularviews• Lawfulcommercialgain

Targetedvsgeneralandinclusivesurveillance• Targetingthingsandplacesvstargetingpeople• Targetingpeopleforminoroffences• Difficulties:

– Normalvsabnormalbehaviour– Discriminatoryprofiling

• Inclusivecamerasurveillance• Communicationsdatacollectionandanalytics

Methodology1• Whatisthepurpose?• Isitlegitimate?Ifyes,

• Whatisthetechnology?• Isitlegaltouse?• Isiteffective/usableonascaleof0-10

Componentsofusability• Effectiveness• Delivery– usefuloutcomeforselectedpurpose• Simplicity– easeofuse• Sensitivity– accuracyandclarity

• Moneycost• Privacy-by-design• Overalleffectiveness

Methodology2• Whatisitsfundamentalrightsimpact?

• Whatarethetypeofcircumstancesofthetechnologyapplication?• Doestheuseofthattechnologyinthosecircumstancescompromiseanimportant

right?Usingascaleof1(lowrightsintrusion)-16(highintrusion)• Isthejudgementofcompromisereliable?• Multiplyusabilityscorebyimpactscore

• EthicalconsiderationsenterwhereusabilityscoreXh-rimpactscoredoesnotruleoutatechnology-in-a-context

Usabletechnologywithlowh-rimpact• Hereiswhereethics comesin• Ethicsprovidesreasonsforandagainsttechnologyapplicationsforlegitimatepurposesbasedonmoraltheoriesusedinmoralphilosophy

ExamplesofEthicsOutcomeofassessment

OrganizedCrimeInvestigation

Terrorismpreventionscenario

Urbansecurityscenario

Acceptableformsofsurveillance

OvertuseofCCTV inpubicspaceAutomateddetectionofexplosivesordrugs

Checkingsuitcasesoftrans-border travelers.Humanobservationofsuspects

OvertuseofsmartCCTVinpublicspaceAutomatic numberplaterecognition

Questionableformsofsurveillance

Covertphotography inpublicspace

Socialnetworkanalysisbasedonsocialmedia

Video cameramountedondrone

Impermissibleformsofsurveillance

CovertlisteningdeviceinpublictransportCovertlisteningdeviceinasuspect’shome

Interceptionofalltrans-bordertelecommunications

SharingCCTVimagesbetweenprivate businesses

Seriouscrimescenario

Intelligenceondrug

importationbyXandY

XandYmeetinaremotelocationwitharmsdealerZ

Drugplusarms

importation

ImportationImminent?

Buggingpublic

transport?

Outcomeofassessment

TheSeriousCrimeMatrixMatrix

HUMANRIGHTSANDETHICALISSUES

Moralriskoferrorleadingtosignificantsanction

Fundamentalrighttoprotectionofpersonaldata

Fundamentalrighttoprivacyorprivateandfamilylife(notincludingdataprotection)

Fundamentalrighttofreedomofthought,conscienceandreligion

Freedomofmovementandresidence

Moralriskofdamagetotrustandchillingeffect

TECHNOLOGYANDUSE

USABILITY MoralriskofIntrusion

1.Visualspectrumdome–zoom,tilt,rotate(publicplace–usedovertly)

6 2 1

2.Visualspectrumdome–zoom,tilt,rotate(publicplace–usedcovertly)

7 8* 2

3.Covertphotographyinpublicplace

9 8* 2

4.Soundrecordingbugintarget’shomeaddress.

8 16* 16*

5.Soundrecordingbugintarget’svehicle.

8 8 6-12

6.Soundrecordingbugonpublictransportusedbytarget.

3 8* ¾*

7.Soundrecordingbuginpolicevehicletransportingtargetfollowingarrest.

4 8 2

8.Soundrecordingbugintarget’sprisoncell.

5 8 4-8

9.Videocameramountedonplatformmicrohelicopter

6 ¾ 4-8* 3

10.AISshiplocationdetectionandidentification

5 0 0

11.Explosivesdetectionnearharbor

4 0-¾

12.Gaschromatographydrugsdetector

8 0-¾

13.Wholebodyscannereqo

6 0 3

14.Luggagescreeningtechnology

7 0-¾

15.moneylaunderingtechnology

7 8 8 1½

16.Networkeddataanalysis

7 3 2

17.Datatransferanalysis(namerecognition)technology

6 8 8 1½

18.Locationtrackingofcellularphones

7 6 6 2

19.Mobilephonetap

8 3 8*

Meta-dataandTelephonechaining

EthicalIssues• Doesbulkcollectionviolateprivacy?

– Meta-datavscontent– Collectionvsinspection

• Humaninspectionvsmachineinspection• Networkanalysisproducespatterns• Contentwouldbeoverwhelming• Processingofpersonalinformationbutnotasintrusiveinthesenseofengagingwiththevalueofprivacy

• Doesbulkcollectioncountasmasssurveillance?– http://www.thenation.com/article/174746/modern-day-stasi-state

Genuineethicalissues• Secrecyofbulkcollection• Difficultyofdemocraticoversight• Difficultyofmonitoringdatastorage• Risksofdataloss

Contactt.sorell@warwick.ac.ukSURVEILLEmaterials:

• https://surveille.eui.eu/

top related