1 Surveillance of cables for civil communication by the National Defence Radio Establishment (FRA) Mark Klamberg, doctoral candidate 5 October 2008.

Slides:



Advertisements
Similar presentations
Key New Surveillance Provisions Professor Peter P. Swire Ohio State University Privacy 2001 Conference October 4, 2001.
Advertisements

ASYCUDA Overview … a summary of the objectives of ASYCUDA implementation projects and features of the software for the Customs computer system.
1 The right to vote of persons with intellectual disabilities and persons with mental health problems in the European Union.
EU-MIDIS European Union Minorities & Discrimination Survey Collecting reliable and comparable data on the Roma across the EU Eva Sobotka.
© 1998 CSC. All rights reserved. 1 CSC Danmark International Operations Computer Sciences Corporation IOPNTS IOPNTS Overview of Telematic Systems October.
Nairobi, Kenya, 26 – 27July 2010 Maintaining Equipment Standards to ensure good QoS Mwende Njiraini Engineer I/NT/LCS Communications Commission of Kenya.
Overview of the Basel Convention and Basel Protocol: History and Goals Ms. Donata Rugarabamu Senior Legal Officer Secretariat of the Basel Convention Regional.
European CommissionDirectorate-General Justice, Freedom and Security Data Protection 1 Conference on Cross Border Data Flows & Privacy October 15-16, 2007.
1 Targeted Case Management (TCM) Changes Iowa Medicaid Enterprise October 14, 2008.
To Halton Youth Service 
1 Essentials of Migration Management for Policy Makers and Practitioners Section 1.6 International Migration Law.
1. The ITU Radiocommunication Sector (ITU-R) will remain the unique and universal convergence and regulatory centre for worldwide radiocommunication matters.
Harassment, Intimidation and Bullying NJ State Board of Education February
CcTLD Meetings Rome 2004 WHOIS & Data Privacy Jean-Christophe Vignes Registry Liaison Manager.
U.N. Human Rights Council Report of the Special Rapporteur on the promotion and protection of the right to freedom of opinion and expression.
The Data Protection (Jersey) Law 2005.
Data Protection.
Breaking Trust On The Internet
1 PRIVACY ISSUES IN THE U.S. – CANADA CROSS BORDER BUSINESS CONTEXT Presented by: Anneli LeGault ACC Greater New York Chapter Compliance Seminar May 19,
Text Privacy and Data Protection in Sweden Christine Kirchberger.
What if my organization conducts business across borders ? Your footnote Privacy and “Personal Information” have different meanings in different countries;
INTERNET and CODE OF CONDUCT
Network security policy: best practices
Data Protection: The Law. EU & Irish Legislation Data Protection Directive 95/46/EC Electronic Privacy Directive 2002/58/EC EUROPOL etc Data Protection.
Audiences NI Data Protection Workshop
Attorney at the Bars of Paris and Brussels Database exploitation & Data protection Thibault Verbiest Amsterdam 1 April 2005
CENTRAL SCOTLAND POLICE Data Protection & Information Security Stuart Macfarlane Information Governance Unit Police Service of Scotland.
Lawyer at the Brussels Bar Lecturer at the University of Strasbourg Assistant at the University of Brussels Data Protection & Electronic Communications.
NBTC/ITU Workshop on Cross-Border Frequency Coordination June , 2015 Bangkok, Thailand.
By: Andrew Dahlinger, Ben Wenker, and Travis Weisenborn.
1 Electronic Surveillance of Communications - Master Programme in Law and Information Technology - Course C Development and Management of Information.
1 Surveillance by the National Defence Radio Establishment (FRA) and Data Mining Mark Klamberg, doctoral candidate 1 November 2008.
Intellectual Property, Nondisclosure agreements, Electronically Monitored Workplaces, And high level thinking questions.
COMP 6005 An Introduction To Computing Session Four: Internetworking and the World Wide Web.
Ioannis Iglezakis Directive on privacy and electronic communications.
Ministry of Health, Labour and Social welfare Montenegro HEALTH SYSTEM MONTENEGRO.
National Treasury Presentation of Appropriations Spending Report Standing Committee on Appropriations September 15, 2009.
IT Introduction to Information Technology. The Internet & World Wide Web Began in 1969 with the ARPANET (Advanced Research Project Agency Network)
OCR Nationals Level 3 Unit 3.  To understand how the Data Protection Act 1998 relates to the data you will be collecting, storing and processing  To.
Data Protection: An enabler? David Freeland, Senior Policy Officer 23 October 2014.
Data Protection Corporate training Data Protection Act 1998 Replaces DPA 1994 EC directive 94/46/EC The Information Commissioner The courts.
The Data Protection Act What Data is Held on Individuals? By institutions: –Criminal information, –Educational information; –Medical Information;
Splash Screen Contents Chapter Focus Section 1Section 1National and State Powers Section 2Section 2Relations Among the States Section 3Section 3Developing.
Engagement and Cooperation on IAEA Safeguards – Additional Protocol: VERTIC Initiative and Methods 23 October 2014 IAEA Symposium on International Safeguards.
IT Applications Theory Slideshows By Mark Kelly Vceit.com Privacy Laws.
TEMPEST AND ECHELON BY – Y.SRUTHI.  TEMPEST and ECHELON are the method of spying in a sophisticated manner.  Both technologies are a part of secret.
Audit of predetermined objectives PFMA Reputation promise/mission The Auditor-General of South Africa has a constitutional mandate and, as the.
DATA PROTECTION ACT INTRODUCTION The Data Protection Act 1998 came into force on the 1 st March It is more far reaching than its predecessor,
GCSE ICT Data and you: The Data Protection Act. Loyalty cards Many companies use loyalty cards to encourage consumers to use their shops and services.
Data protection—training materials [Name and details of speaker]
M O N T E N E G R O Negotiating Team for the Accession of Montenegro to the European Union Working Group for Chapter 10 – Information society and media.
EUROPEAN SECURITY POLICY A SNAPSHOT ON SURVEILLANCE AND PRIVACY DESSI WORKSHOP, CPH 24 JUNE 2014 Birgitte Kofod Olsen, Chair Danish Council for Digital.
Presented by Ms. Teki Akuetteh LLM (IT and Telecom Law) 16/07/2013Data Protection Act, 2012: A call for Action1.
M O N T E N E G R O Negotiating Team for the Accession of Montenegro to the European Union Working Group for Chapter 31 – Common Foreign and Security Policy.
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
1 Transnational Partner Search Toolkit Transnationality Contact Points Meeting 30 September Warsaw.
M O N T E N E G R O Negotiating Team for the Accession of Montenegro to the European Union Working Group for Chapter 14 – Transport Policy Brussels
Students’ Unions 2011 Data Protection and Students’ Unions Mairead O’Reilly 19 July 2011.
Monique Jefferson & Nadine Mather
Cyber and Internet Safety (Parents’ Night)
Surveillance around the world
Data Protection: The Law
HTTP and Abstraction on the Internet
Issues of personal data protection in scientific research
IT Applications Theory Slideshows
U.S. Department of Justice
Data Protection principles
Report on data protection legislation Case of Romania
Data Protection What’s new about The General Data Protection Regulation (GDPR) May 2018? Call Kerry on Or .
EUROPEAN UNION CITIZENSHIP
Presentation transcript:

1 Surveillance of cables for civil communication by the National Defence Radio Establishment (FRA) Mark Klamberg, doctoral candidate 5 October 2008

2 Us humans leave electronic footprints after us, in the form of credit card payments, visits to websites, phone calls and . Imagine that somebody could collect everything and process it through a powerful computer. With the right tools one could find patterns that in detail describe what kind of person you are. This is called social network analysis, a term included by the wider concept data mining.

3 Key feature of the “FRA-law” IT- and telecom operators are obligated to transfer all traffic in cables crossing Swedish borders to the State

4 Definitions Distinguish between Transfer to the state (stage 1) – collection and processing (stage 2) Content data (text of the message) and traffic data (who is contacting who, when and how)

5 Collection and processing of data (stage 2) The FRA has a mandate to monitor and collect content data for certain purposes including external military threats, terrorism and IT-attacks. The Agreement of September 25th specifies these certain purposes. The FRA may under certain conditions collect and process content data when an individual is targeted. FRA can also provide assistance to the Police within the parameters set by the specific purposes of the “FRA-law”. The question about assistance to the Police has not been finally settled.

6 Intelligence court According to the agreement September 25th the collection of data would be placed under the control of an “intelligence court” which operates behind closed doors. The court will, among others things, limit FRA’s collection and processing of content data.

7 Traffic Data No restrictions on collection of traffic data, the basis of the FRA operations (analysis of traffic patterns) Traffic data on Swedes (and others) have been collected for more than 10 years without legal basis. The FRA has in an internal document stated that they intend to continue to collect traffic data to the same extent. According to the adopted law the FRA has the mandate to collect, process and store all available traffic data. This is necessary for analysis and targeting. Targeting relates to the what content data should be collected and processed.

8 Targeting Targeting can be done using phone numbers and technical parameters (for example internet protocol address) In addition, according to the law a person’s race, ethnicity, political views, religious and philosophical beliefs, membership of a labour union, health or sexuality may under certain conditions be used for targeting. Targeting is, inter alia, done by the use of traffic data

9 Transfer of personal data According to the law personal data collected by the FRA may be transferred to other countries.

10 A critical remark Is this kind of data collection and surveillance… Consistent with the right to privacy? This is both a human right and a constitutional right. Efficient? Proportional? Confident and reliable in the sense that it gives accurate results and not false alarms?

11 Questions?

12 Thanks! Contact: