electronic surveillance and privacy 130916

16
Electronic surveillance and privacy in the light of the Snowden affair fil. kand, jur. kand, LL.M. jur. dr. Mark Klamberg senior lecturer public international law, Uppsala University 16 September 2013

Upload: klamberg

Post on 15-Jul-2015

2.411 views

Category:

Education


1 download

TRANSCRIPT

Page 1: Electronic surveillance and privacy 130916

Electronic surveillance and privacy

in the light of the Snowden affair

fil. kand, jur. kand, LL.M. jur. dr.

Mark Klamberg

senior lecturer public international law, Uppsala University

16 September 2013

Page 2: Electronic surveillance and privacy 130916

Outline

I. Programs and applications covered in

media as a result of the Snowden affair

II. What is the purpose of intelligence?

III. How does modern surveillance work?

IV. Is it legal?

V. Why are we having this discussion now?

VI. What is privacy?

Page 3: Electronic surveillance and privacy 130916

Programs and applications

covered by media 2013 (selection)

NSA (USA)

• PRISM - social media (downstream)

• Blarney, Fairview, Stormbrew, Oakstar - upstream collection

• PINWALE - metadata database

• Xkeyscore (NSA, BND) - search and analysis tool

• Marina - internet metadata database

• Mainway - telephone metadata database

• Bullrun - weaken encryption standards

GCHQ (UK)

• Tempora - upstream collection

• Edgehill - weaken encryption standards

NSA, GCHQ, CSE, DSD, GCSB (USA, UK, CAN, AUS, NZ)

• FiveEyes - cooperation agreement,

exchange of data

DGSE (France)

• “Big Brother français” (Le Monde 4 July 2013) - upstream collection, metadata

database

FRA (Sweden)

• “FRA-law” - upstream collection

• Titan - metadata database

• “The third pillar” - cooperation agreement,

exchange of data

Page 4: Electronic surveillance and privacy 130916

Str

ess o

n s

ocie

ty

Start of

reaction

Time

Normal state

of society

Start of crisis

Stress on society

Robustness

Early warning

Reaction

For each sector of society

there is a balance

Source: Civil Security, Saab AB

What is the purpose of surveillance?

Page 5: Electronic surveillance and privacy 130916

5

We humans leave electronic footprints after us, in the form of

credit card payments, visits to websites, records of phone calls

and e-mail (communication data). Imagine that somebody could

collect everything and process it through a powerful computer.

With the right tools one could find patterns that in detail describe

what groups and networks you belong to. Such techniques are

referred to as traffic analysis and social network analysis

Traffic analysis and social

network analysis

Page 6: Electronic surveillance and privacy 130916

6

With traffic analysis social networks may be identified

A communication pattern can depict relations between individuals,

Organisations, websites, etc with purpose of charting the social networks,

position of power, views and other personal data about an individual.

The actual message is less important than

the information about the sender, recipient,

the time of transaction, and means of

communication. Knowledge about the

communication pattern and thus

the social network of person is often enough

Individual

Page 7: Electronic surveillance and privacy 130916

How does it work?

Panopticon (Bentham)

Page 8: Electronic surveillance and privacy 130916

Liberals

Colleagues in the HagueCentre liberals and

conservatives

Jews

Running

Colleagues in Stockholm

Homosexual liberals

Colleagues Blekinge

Friends in Lund

Social network analysis with

Facebook

Application: ”Friend Wheel”

Page 9: Electronic surveillance and privacy 130916

9

USA

Organization: National Security Agency (NSA)

Legislation: FISA

Cases (multiple): Smith v. Maryland (1979), Hepting v. AT&T (2012),

Jewel v. NSA (2013)

United Kingdom

Organization: Government Communications Headquarters

(GCHQ)

Legislation: RIPA

Case: Liberty et al. v. The United Kingdom, Kennedy v.

United Kingdom

Is it legal?

Page 10: Electronic surveillance and privacy 130916

10

France

Organization: Direction Générale de la Sécurité Extérieure

(DGSE)

Germany

Organization: Bundesnachrichtendienst (BND)

Legislation: G 10-law (Gesetz zur Beschränkung des

Brief-, Post- und Fernmeldegeheimnisses)

Case: Weber and Saravia v. Germany

Denmark

Organization: Forsvarets Efterretningstjeneste (FE)

Legislation: 17 § forsvarsloven

Is it legal?

Page 11: Electronic surveillance and privacy 130916

11

Technological change

Until the end of the 1990s satellites were the main

medium for international communication. Now it is

fiber optics in cables controlled by private companies.

Shift in Threats Relevant for National Security

The perceived threat from the Soviet Union has been replaced with vague threats such

as terrorism, international criminality, migration, environmental threats and financial

imbalances

New Legal Demands

The European Convention on Human Rights requires that interferences in the private

life and family has a legal basis (article 8)

Privatization

Telecom operators were previously state-owned and controlled. Now they are private

companies whose priority is to safeguard the interests of their customers, not the

interests of the state

Why are we having discussion now?

Page 12: Electronic surveillance and privacy 130916

12

Considering the changes in the 1990s:

The technological change and privatization creates a need to adopt

legislation or other binding measures that obligates the private operators to

surrender communication to the State. This makes the existence of

previously top secret surveillance public knowledge

The shift in perceived threats creates a need to expand the mandate or

codify an already expanded mandate of signal intelligence organizations

The public knowledge about this surveillance and new legal demands

creates a need for legislation protecting privacy

Why legislation?

Page 13: Electronic surveillance and privacy 130916

Panopticon (Bentham)

Solove, A Taxonomy of Privacy, 2006

What is privacy?

Page 14: Electronic surveillance and privacy 130916

14

Bamford, James, The Shadow Factory: The Ultra-Secret NSA from 9/11 to the

Eavesdropping on America, Doubleday, New York, 2008

Klamberg, Mark, FRA and the European Convention on Human Rights - A Paradigm

Shift in Swedish Electronic Surveillance Law in “Overvåking i en Rettstat,Nordisk

årbok i rettsinformatikk” (Nordic Yearbook of Law and Information Technology),pp.

96-134, Fagforlaget, Bergen 2010

Aldrich, Richard J., GCHQ: The Uncensored Story of Britain's Most Secret

Intelligence Agency, Harper Press, London, 2010

Fura, Elisabet and Klamberg, Mark, The Chilling Effect of Counter-Terrorism

Measures: A Comparative Analysis of Electronic Surveillance Laws in Europe and

the USA in Josep Casadevall, Egbert Myjer, Michael O’Boyle (editors), “Freedom of

Expression – Essays in honour of Nicolas Bratza – President of the European Court

of Human Rights”, Wolf Legal Publishers, Oisterwijk, 2012, pp. 463-481

Read more

Page 15: Electronic surveillance and privacy 130916

Questions?

Page 16: Electronic surveillance and privacy 130916

16

Twitter: @klamberg

Blog: www.klamberg.se

E-mail: [email protected]

Thanks!