SURVEILLE Prof. Tom Sorell (Dr Katerina Hadjimatheou)

Slides:



Advertisements
Similar presentations
TECHNO-TONOMY Privacy & Autonomy in a Networked World Learning Module 2: Legislating Privacy: Your Rights.
Advertisements

Data Protection & Human Rights. Data Protection: a Human Right Part of Right to Personal Privacy Personal Privacy : necessary in a Democratic Society.
Freedom of Speech (Part 3)
The legal protection of children and adolescents from crime and violence mediated by ICT A look into the penal framework in 10 countries of Latin America.
Crime trends between 2001/2002 and 2004/2005  Percentage increase/decrease of ratios between 2003/2004 and 2004/2005  Crime statistics report for 2004/2005.
If you’re not keeping score, it’s just practice!
Human Rights/Ethics and Security Research Tom Sorell University of Birmingham.
Chapter 10 Privacy and the Police State. Governmental Intrusion into Individual Privacy Affects written and oral communications Data-GPS coordinates Fourth.
Ethics To do the “right thing” you need to know what the “right thing” is.
The Ethicality of Altering Google Traffic in China Kayley Paris CSCE 390 April 17, 2011.
Theory n An explanation that systematically organizes the facts n Five criteria for a good theory u Consistent with the known facts u Logical, internally.
Ethics To do the “right thing” you need to know what the “right thing” is.
Marketing Research Marketing Research: Ethical Issues Dr. Zafer Erdogan.
Big Brother is watching.  1. Would you ever consider letting a TV crew come into your life to document everything? Why or why not?  Big Brother, Kardashians,
Specifics in the prevention of corruption and ascertainment of conflict of interest through a single body. The experience of Latvia. Jaroslavs Streļčenoks.
Data Protection & Human Rights. Data Protection: a Human Right Part of Right to Personal Privacy Personal Privacy : necessary in a Democratic Society.
PRESENTATION TO SELECT COMMITTEE FOR SAFETY AND CONSTITUTIONAL AFFAIRS RSA UNITED ARAB EMIRATES POLICE COOPERATION AGREEMENT 2O SEPTEMBER 2006.
Jobs of a Police Officer. Police Officer Responding to calls from the public.
“Transport Security” Adam Briggs TISPOL United Kingdom.
PRIVACY. In pairs Work out a definition of the word PRIVACY that you think makes sense You’ve got about 7 minutes...
Comparative Law Spring 2002 Professor Susanna Fischer CLASS 31 FRENCH CIVIL PROCEDURE April 3, 2002.
Police ANPR Systems Surveillance camera Code of Practice An overview Presented by:Bill Mandeville Date:23 rd October 2013.
Mathieu Zagrodzki Université de Versailles/St-Quentin.
VIDEO SURVEILLANCE AND DATA PROTECTION 8th Meeting of the Central and Eastern European Commissioners Euxinograde (Varna), May 2006 Neringa Kaktaviciute.
European Standards on Confidentiality and Privacy in Healthcare Dr Colin M Harper Division of Psychiatry & Neuroscience Queen’s University.
Olga E. SegouDr. Stelios C.A. Thomopoulos Integrated Systems.
The Fully Networked Car Geneva, 4-5 March Ubiquitous connectivity to improve urban mobility Hermann Meyer ERTICO.
Karen Sollins Principal Scientist, MIT CSAIL October 2, 2014 The New Normal in Privacy: discussion of a dilemma 10/2/14Karen Sollins: Privacy1.
POLICE OF THE CZECH REPUBLIC NATIONAL DRUG HEADQUARTERS CRIMINAL POLICE AND INVESTIGATION SERVICE Beograd,
Information Technology  © 2001 The Trustees of Boston College  5/8/2003  Slide 1 Why Standards? Campus Perspective Bernard W. Gleason XML Forum Alexandria,
ONGOING WORK ON DEVELOPING EU-WIDE COMPARABLE STATISTICS ON CRIME, CRIMINAL JUSTICE AND VICTIMISATION Dr Marleen De Smedt EUROSTAT UNECE-UNODC Conference,
Measuring Crime CJ 601 Research Methodology in Criminal Justice Dr. Louis Veneziano.
How does UNODC research programme support UN inter-governmental bodies and their Member States to address the Drug Problem? DPA/RAB June 2014.
The Federal system in chapter 12 handles a small amount of trials State Courts Most legal matters such as robberies, assaults, illegal drugs, broken contracts.
Services of the Chamber of Commerce and Industry of Serbia SUPPORT TO SMEs March 26th 2015, Belgrade.
Surveillance Jeff Saunders Dr. Garrison CSCI 101 Thurs. 12:30.
1 The Broader Picture Laws Governing Hacking and Other Computer Crimes Consumer Privacy Employee Workplace Monitoring Government Surveillance Cyberwar.
Implementation of the European Statistics Code of Practice Yalta September 2009 Pieter Everaers, Eurostat.
Plenipotentiary for Human Rights Commander of the Provincial (Regional) Police Headquarters in Wrocław: Assistant Commisioner Artur Falkiewicz Commander.
Monitoring and Supervision. June 15, Rotterdam 1 MONITORING ELECTRONIC COMMUNICATIONS: PRIVACY ISSUES Prof. Rimantas Petrauskas, Assoc.
Chapter 19 - Congressional Authority for National Security Surveillance Part I.
REGRESSIONS AT WORK: IDEOLOGY AND LAW, CORRELATES OF DEMOCRACY.
European Forum for Urban Safety. A Non-Governmental Organisation founded in 1987 by Mayors from various European countries Today, a growing network of.
7 th Grade Civics Miss Smith *pgs  Crime- any act that breaks the law and for which there is a punishment  Criminal- a person who commits.
Crime Any act that is labeled as such by those in authority, is prohibited by law, and is punishable by the gov’t.
14/02/20081 Urban mobility Griet De Ceuster. 14/02/20082 CONTENTS Mobility concepts in a city: technologies in a mobility perspective Challenges for implementation.
Universiteitstraat 4, B-9000 Ghent, Belgium T +32 (0) , F +32 (0) The Berabalt project - Ghent, 9 June Setting.
Chapter 1: Introduction to Police Administration.
Arletta Plunkett Crime statistics in Sweden The National Council for Crime Prevention Task force Statistics on Crime, Luxembourg, 31May-1 June 2005.
By : Syed Shabi Ul Hassan. What is Cyber Crime?  Crimes that have been made possible by computers.  Such as Identity Theft, Bullying, Hacking, Internet.
Types of Law Chapter 15. Types of Law Common Law- law based on court decisions and past examples rather than legal code Common Law- law based on court.
VI. CRIMINAL PROCESS FROM ARREST TO CONCLUSION PRESENTED BY: JUDGE MARK A. SPEISER.
TAIEX INTERNAL MARKET WEEK IN BUDAPEST November 2004 Co-operation of Customs Administrations Presentation by: Sandro Le Noci – Italian Customs.
Would it help if you had... a cost effective approach for deployment?
Crime and Punishment.
1. The concept and principles of administrative law. 2. The concept and types of administrative offense. 3. The notion of administrative responsibility.
Data Protection & Human Rights
Ethics and the Internet of Things
Proportionality and Tracking
Existing sources at international level Doc. ESDTAT/D6/CR/04
Unit 4: Law & the Legal Sys
Crime in the United States
Task Force on Crime Statistics
Statistics on crime and criminal justice, Future data collections
Proofing products against organised crime - a case study of diamonds
Viseum UK iVOS FaceRec Viseum UK iVOS FaceRec
SHaring Electronic Resources and Laws against Organized Crime
PRESENTATION TO PORTFOLIO COMMITTEE FOR SAFETY AND SECURITY
COSC-100 (Elements of Computer Science) Prof. Juola
Presentation transcript:

SURVEILLE Prof. Tom Sorell (Dr Katerina Hadjimatheou)

SURVEILLE SURVEILLANCE: ETHICAL ISSUES, LEGAL LIMITATIONS AND EFFICIENCY Surveillance in Counter-Terrorism and Transnational Organized Crime Efficiency of various surveillance technologies International and Regional (EU) legal requirements on deployment of technologies Ethics of deployment of technologies, preventive policing measures

SURVEILLE : LEGAL ANALYSIS CELINE COCQ, UNIVERSITE LIBRE DE BRUXELLES All research available on:

SURVEILLE SCENARIOS

Use of surveillance technology in real cases of  organized crime: drugs importation and firearms  counter-terrorism: NSA-type surveillance  urban security: regular crime, public order, smart city surveillance Scenarios extended in time (serious crime scenario extends over years) Scenarios devised in consultation with police, urban security experts All scenarios available on website

SERIOUS CRIME SURVEILLANCE

SERIOUS CRIME SURVEILLANCE- DRUG TRAFFICKING The more serious the crime, the more justified surveillance, including intrusive surveillance, might be. Some crimes serious not only because of their direct effects  Drug trafficking – not only serious because of harm of drug taking  Creates illicit violent markets and crime to feed debilitating addiction  burglary and robbery rate  importation of firearms, which starts to be life-threatening  gang crime

NSA TYPE SURVEILLANCE

Collection of US person telephone meta-data for counter-terrorism with permission of FISA court Collection of US - non US person content with permission of FISA court On some interpretations of Executive Order NSA can also collect US person content Selection of target on the basis of name and internet traffic content, possibly coded

NSA TYPE SURVEILLANCE- ETHICAL ISSUES Privacy violation less important than often supposed because of the collection/inspection distinction Rather, violates norms of democracy- control of government by people US legislators did not know about surveillance so it could not be subject to democratic control NSA surveillance was a form of unaccountable, un-transparent control of people by government

URBAN SECURITY

Ordinary urban security  Public order  Robbery  Car theft One-off events  Demonstrations  Large scale entertainment  Attacks

URBAN SECURITY TECHNOLOGIES CCTV in public places CCTV in transport ANPR Mobile phone location-tracking Crime reporting portals

URBAN SECURITY ISSUES Urban government close to citizens, which give them apparent legitimacy Urban government mandates might be clearer than national (Krakow) Urban authorities respond to mandates independently of commitments of state party commitments under treaties Sometimes for the sake of efficiency they collect data on a big scale- smart cities data collection becomes routine

THANK YOU