surveillance technologies: efficiency, human rights, ethics · 2018-03-26 · fundamental right to...
Post on 14-Feb-2020
0 Views
Preview:
TRANSCRIPT
SurveillanceTechnologies:efficiency,humanrights,ethicsProf.Dr.TomSorell,UniversityofWarwick,UK
Outline• Howdoesonejustifytheusebypoliceofsurveillancetechnologyin
aliberaldemocracy?• Legitimatepurposeandeffectiveness• SURVEILLEmethodologyforweighingrelevantconsiderations
• Effectivenessscores• Fundamentalhumanrightsscore• Ethicsindicators
• Illustrations• SURVEILLEmethodology(over-)emphasizesprivacyviolations:
• Bulkcollection
Surveillancetechnology• Cameras• Bugs• Telephonetaps• AutomaticNumberPlateRecognition• LocationTracking• Drag-nettinganddata-mining• Personalcommunicationsdatacollectionandanalytics?
• Evidence-basedtargetselectionand“hops”• profiling
Justifyingtheuseofsurveillancetechnologiesinaliberaldemocracy• State’sspecialresponsibilityforsecurity,
especiallythreatstolife• Risksofintrusion,error,andtotrust,canbe
justifiedininvestigationandpreventionofseriouscrimeifmorallyproportionate
• Discretionandsecrecyasrelaxingtheobservanceofproportionalityinpractice
Legitimatepurposes• Preventinganycrime
– Preventingseriouscrime• Terroristattack• Murder• Moneylaundering
– Preventingparkingoffences• Achievingfairaccesstopublicservices
– Localeducation– Localhealthservices
• Protectingpeopleexercisingrighttoexpressunpopularviews• Lawfulcommercialgain
Targetedvsgeneralandinclusivesurveillance• Targetingthingsandplacesvstargetingpeople• Targetingpeopleforminoroffences• Difficulties:
– Normalvsabnormalbehaviour– Discriminatoryprofiling
• Inclusivecamerasurveillance• Communicationsdatacollectionandanalytics
Methodology1• Whatisthepurpose?• Isitlegitimate?Ifyes,
• Whatisthetechnology?• Isitlegaltouse?• Isiteffective/usableonascaleof0-10
Componentsofusability• Effectiveness• Delivery– usefuloutcomeforselectedpurpose• Simplicity– easeofuse• Sensitivity– accuracyandclarity
• Moneycost• Privacy-by-design• Overalleffectiveness
Methodology2• Whatisitsfundamentalrightsimpact?
• Whatarethetypeofcircumstancesofthetechnologyapplication?• Doestheuseofthattechnologyinthosecircumstancescompromiseanimportant
right?Usingascaleof1(lowrightsintrusion)-16(highintrusion)• Isthejudgementofcompromisereliable?• Multiplyusabilityscorebyimpactscore
• EthicalconsiderationsenterwhereusabilityscoreXh-rimpactscoredoesnotruleoutatechnology-in-a-context
Usabletechnologywithlowh-rimpact• Hereiswhereethics comesin• Ethicsprovidesreasonsforandagainsttechnologyapplicationsforlegitimatepurposesbasedonmoraltheoriesusedinmoralphilosophy
ExamplesofEthicsOutcomeofassessment
OrganizedCrimeInvestigation
Terrorismpreventionscenario
Urbansecurityscenario
Acceptableformsofsurveillance
OvertuseofCCTV inpubicspaceAutomateddetectionofexplosivesordrugs
Checkingsuitcasesoftrans-border travelers.Humanobservationofsuspects
OvertuseofsmartCCTVinpublicspaceAutomatic numberplaterecognition
Questionableformsofsurveillance
Covertphotography inpublicspace
Socialnetworkanalysisbasedonsocialmedia
Video cameramountedondrone
Impermissibleformsofsurveillance
CovertlisteningdeviceinpublictransportCovertlisteningdeviceinasuspect’shome
Interceptionofalltrans-bordertelecommunications
SharingCCTVimagesbetweenprivate businesses
Seriouscrimescenario
Intelligenceondrug
importationbyXandY
XandYmeetinaremotelocationwitharmsdealerZ
Drugplusarms
importation
ImportationImminent?
Buggingpublic
transport?
Outcomeofassessment
TheSeriousCrimeMatrixMatrix
HUMANRIGHTSANDETHICALISSUES
Moralriskoferrorleadingtosignificantsanction
Fundamentalrighttoprotectionofpersonaldata
Fundamentalrighttoprivacyorprivateandfamilylife(notincludingdataprotection)
Fundamentalrighttofreedomofthought,conscienceandreligion
Freedomofmovementandresidence
Moralriskofdamagetotrustandchillingeffect
TECHNOLOGYANDUSE
USABILITY MoralriskofIntrusion
1.Visualspectrumdome–zoom,tilt,rotate(publicplace–usedovertly)
6 2 1
2.Visualspectrumdome–zoom,tilt,rotate(publicplace–usedcovertly)
7 8* 2
3.Covertphotographyinpublicplace
9 8* 2
4.Soundrecordingbugintarget’shomeaddress.
8 16* 16*
5.Soundrecordingbugintarget’svehicle.
8 8 6-12
6.Soundrecordingbugonpublictransportusedbytarget.
3 8* ¾*
7.Soundrecordingbuginpolicevehicletransportingtargetfollowingarrest.
4 8 2
8.Soundrecordingbugintarget’sprisoncell.
5 8 4-8
9.Videocameramountedonplatformmicrohelicopter
6 ¾ 4-8* 3
10.AISshiplocationdetectionandidentification
5 0 0
11.Explosivesdetectionnearharbor
4 0-¾
12.Gaschromatographydrugsdetector
8 0-¾
13.Wholebodyscannereqo
6 0 3
14.Luggagescreeningtechnology
7 0-¾
15.moneylaunderingtechnology
7 8 8 1½
16.Networkeddataanalysis
7 3 2
17.Datatransferanalysis(namerecognition)technology
6 8 8 1½
18.Locationtrackingofcellularphones
7 6 6 2
19.Mobilephonetap
8 3 8*
Meta-dataandTelephonechaining
EthicalIssues• Doesbulkcollectionviolateprivacy?
– Meta-datavscontent– Collectionvsinspection
• Humaninspectionvsmachineinspection• Networkanalysisproducespatterns• Contentwouldbeoverwhelming• Processingofpersonalinformationbutnotasintrusiveinthesenseofengagingwiththevalueofprivacy
• Doesbulkcollectioncountasmasssurveillance?– http://www.thenation.com/article/174746/modern-day-stasi-state
Genuineethicalissues• Secrecyofbulkcollection• Difficultyofdemocraticoversight• Difficultyofmonitoringdatastorage• Risksofdataloss
Contactt.sorell@warwick.ac.ukSURVEILLEmaterials:
• https://surveille.eui.eu/
top related