1 Electronic Surveillance of Communications - Master Programme in Law and Information Technology - Course C 2010. Development and Management of Information.

Slides:



Advertisements
Similar presentations
TECHNO-TONOMY Privacy & Autonomy in a Networked World Learning Module 2: Legislating Privacy: Your Rights.
Advertisements

Overview of the Regulation of Investigatory Powers Act 2000 Andrew Charlesworth University of Warwick 10 June 2002.
Introduction to basic principles of Regulation (EC) 45/2001 Sophie Louveaux María Verónica Pérez Asinari.
1 Surveillance of cables for civil communication by the National Defence Radio Establishment (FRA) Mark Klamberg, doctoral candidate 5 October 2008.
International Telecommunication Union HIPSSA Project Support for Harmonization of the ICT Policies in Sub-Sahara Africa, Meeting with the Namibia ICT Ministry.
State of play and activities in 2014 March 2014
Passed by the Senate 98-1 Passed by the House October 26, 2001 – Signed into law by President Bush 130 pages in length Divided into 10 titles.
USA PATRIOT Act and Libraries Eric Johnson & Rodney Clare Jackman Sims Memorial Library.
1 PRIVACY ISSUES IN THE U.S. – CANADA CROSS BORDER BUSINESS CONTEXT Presented by: Anneli LeGault ACC Greater New York Chapter Compliance Seminar May 19,
AGENCY FOR PREVENTION OF CORRUPTION AND COORDINATION OF FIGHT AGAINST CORRUPTION mr.sci. Vladica Babić - Assisstent.
Eneken Tikk // EST. Importance of Legal Framework  Law takes the principle of territoriality as point of departure;  Cyber security tools and targets.
The Treaties, Institutions and Policies of the EU
Privacy and security: Is Europe going banana? Jean-Marc Van Gyseghem Head of Unit « Liberties in the information society » CRID – University.
IS Audit Function Knowledge
1 Raymond Doray Conflicts between the new Canadian Money Laundering Act and the rules of professional conduct and ethics September 13, 2002.
A Common Immigration Policy for Europe Principles, actions and tools June 2008.
1 Surveillance by the National Defence Radio Establishment (FRA) and Data Mining Mark Klamberg, doctoral candidate 1 November 2008.
PRIVACY. In pairs Work out a definition of the word PRIVACY that you think makes sense You’ve got about 7 minutes...
Other Laws (Primarily for E-Government) COEN 351.
CLOUD AND SECURITY: A LEGISLATOR'S PERSPECTIVE 6/7/2013.
Tackling IT crime in a global context: the Convention on Cybercrime 3 years after Julio Pérez Gil University of Burgos, Spain.
1 Photo PAMECA IV TEAM Design of PAMECA IV PAMECA IV started in July 2013 and is scheduled to run until October Its overall objective.
Main Building Blocks of National Legislation: Graham Zebedee, Head, Export Control Policy Section, Foreign & Commonwealth Office, United Kingdom.
Programming of International Development Assistance Donor Sectoral Meeting Ministry of Interior September 17, 2007.
Professional Values and Basic Business Legislation.
Judgment of the Court of the European Union (Grand chamber) Retention of Telecommunications Data Holly Raiche Director, Internet Society of Australia.
Recognition: the national centre and the ENIC Network Seminar on the recognition of qualifications Baku, 22 April 2005 Gunnar Vaht Head of the Estonian.
UKRAINIAN INTERNET GOVERNANCE FORUM Kyiv 1 October 2014 State of play of the answers to Ed. Snowden revelations: TIME OF REPORTS USA National, EU, CoE.
Making South Africa a Global Leader in Harnessing ICTs for Socio-economic Development SECRET 1 PRESENTATION TO THE PORTFOLIO COMMITTEE ON COMMUNICATIONS:
Confidence Building Measures Anatoly A.Streltsov D.Tech., D.J., prof. deputy director of the IPII MSU named by M.V.Lomonosov.
1 BORDER SECURITY AND MANAGEMENT Intra-service co-operation Inter-agency co-operation Presented by: Visiting expert Goran Krsteski Geneva.
POLICE OF THE CZECH REPUBLIC NATIONAL DRUG HEADQUARTERS CRIMINAL POLICE AND INVESTIGATION SERVICE Beograd,
ONGOING WORK ON DEVELOPING EU-WIDE COMPARABLE STATISTICS ON CRIME, CRIMINAL JUSTICE AND VICTIMISATION Dr Marleen De Smedt EUROSTAT UNECE-UNODC Conference,
Salary Possibilities Newly assigned Special Agents start at a yearly salary of $43,441, or also recognized as a GS-10, plus multiple other pay increases.
2011 East African Internet Governance Forum (EA – IGF) Rwanda Cyber briefing: Positive steps and challenges Didier Nkurikiyimfura IT Security Division.
The Data Protection Act What Data is Held on Individuals? By institutions: –Criminal information, –Educational information; –Medical Information;
COMPARABLE EU STATISTICS ON CRIME, VICTIMISATION AND CRIMINAL JUSTICE Political Background Elements of an Action Plan European Commission Directorate-General.
Fight against terrorism. EU institutional/legal framework A bit of history 1957: European Communities are born.
Jurisprudence Prepared by: Aphrodite Smagadi Mariah Kennedy.
1 The Broader Picture Laws Governing Hacking and Other Computer Crimes Consumer Privacy Employee Workplace Monitoring Government Surveillance Cyberwar.
Data protection and European citizens’ initiatives
Data protection and compliance in context 19 November 2007 Stewart Room Partner.
Information Security Legislation Moving ahead Information Security 2001 Professional Information Security Association Sin Chung Kai Legislative Councillor.
Protecting Privacy and Freedom of Communication in the Fight against Cybercrime Southeast Europe Cybersecurity Conference Sofia, Bulgaria 8-9 September.
Human Rights Act, Privacy in the context of auditing Phil Huggins Chief Technologist, IRM PLC
Threat Prevention and Detection (within Critical Infrastructures) under EU Data Protection Legislation– Purpose Specification and Limitation. Laurens Naudts.
Implementation Outline New Firearm Control Act Presentation to the Parliamentary Portfolio Committee on Safety and Security.
SEARCH, The National Consortium for Justice Information and Statistics Melissa Nee Government Affairs Specialist SEARCH Overview Briefing.
CIVILIAN SECRETARIAT FOR POLICE1 DRAFT POLICY GUIDELINES CIVILIAN SECRETARIAT FOR POLICE BY MINISTER OF POLICE TO BE APPROVED BY PARLIAMENT FOR THE DIRECTORATE.
The EU and Access to Environmental Information Unit D4 European Commission, Directorate General for the Environment 1.
Salli Anne Swartz Artus Wise Partners Paris, France.
M O N T E N E G R O Negotiating Team for the Accession of Montenegro to the European Union Working Group for Chapter 10 – Information society and media.
M O N T E N E G R O Negotiating Team for the Accession of Montenegro to the European Union Working Group for Chapter 31 – Common Foreign, Security and.
EUROPEAN SECURITY POLICY A SNAPSHOT ON SURVEILLANCE AND PRIVACY DESSI WORKSHOP, CPH 24 JUNE 2014 Birgitte Kofod Olsen, Chair Danish Council for Digital.
Oregon DMV Fraud Prevention Program Tom McClellan, DMV Administrator.
Harmonised use of accreditation for assessing the competence of various Conformity Assessment Bodies Dr Andreas Steinhorst, EA ERA workshop 13 April 2016,
Business Challenges in the evolution of HOME AUTOMATION (IoT)
M O N T E N E G R O Negotiating Team for the Accession of Montenegro to the European Union Working Group for Chapter 31 – Common Foreign and Security Policy.
ILP model- Montenegro OSCE Annual Police Experts Meeting
Bellwork Think about this…. Historical Event
Surveillance around the world
THE NEW GENERAL DATA PROTECTION REGULATION: A EUROPEAN OR A GLOBAL STANDARD? Bart van der Sloot Senior Researcher Tilburg Institute for Law, Technology,
Data Protection: EU & International
PRESENTATION OF MONTENEGRO
General Data Protection Regulation
The activity of Art. 29. Working Party György Halmos
The European Anti-Corruption Report
Tools & Approaches for Ongoing Privacy Compliance
Marleen De Smedt Geoffrey Thomas Cynthia Tavares
PRESENTATION OF MONTENEGRO
Presentation transcript:

1 Electronic Surveillance of Communications - Master Programme in Law and Information Technology - Course C Development and Management of Information Systems in a Legal Perspective - Course C, block 5. Identification and Control technologies Mark Klamberg, doctoral candidate

Outline Background 1.Changes in Our Society 2.Why legislation 3.How does it work? –Traffic analysis and social network analysis –Data mining –Impact on society: From Panopticon to Panspectron? Discussion 5.Academic discourse (Solove v. Kerr) 6.Constitutional Protection and the ECHR 7.How does it work at home? 8.The involvement of Courts Legislation 9. Defining content and traffic data 10. Four fields of legislation 11.EU Data Retention Directive 12.Signal Intelligence

New types of legislation concerning electronic surveillance of communications 1. Data retention of traffic data 2. Signal intelligence (strategic monitoring)

4 Changes in Our Society Technological change Until the end of the 1990s satellites were the main medium for international communication. Now it is fiber optics in cables controlled by private companies. Shift in Threats Relevant for National Security The perceived threat from the Soviet Union has been replaced with vague threats such as terrorism, international criminality, migration, environmental threats and financial imbalances New Legal Demands The European Convention on Human Rights requires that interferences in the private life and family has a legal basis (article 8) Privatization Telecom operators were previously state-owned and controlled. Now they are private companies whose priority is to safeguard the interests of their customers, not the interests of the state

5 Signal Intelligence - why legislation? Considering the changes in the 1990s: The technological change and privatization creates a need to adopt legislation or other binding measures that obligates the private operators to surrender communication to the State. This makes the existence of previously top secret surveillance public knowledge The shift in perceived threats creates a need to expand the mandate or codify an already expanded mandate of signal intelligence organizations The public knowledge about this surveillance and new legal demands creates a need for legislation protecting privacy

6 Data retention - why legislation? Communication providers have stored traffic data (who is phoning who and when) about the phone calls of their customers for billing purposes. Law enforcement agencies have used such data in order to detect, prevent and investigate crime Nowadays, consumers are turning to flat-rate subscriptions and voice over IP-services (for example Skype). Thus, there is no need to retain traffic data for billing purposes. Law enforcement agencies still want/need traffic data.

7 We humans leave electronic footprints after us, in the form of credit card payments, visits to websites, records of phone calls and (communication data). Imagine that somebody could collect everything and process it through a powerful computer. With the right tools one could find patterns that in detail describe what groups and networks you belong to. Such techniques are referred to as traffic analysis and social network analysis Traffic analysis and social network analysis

8 With traffic analysis social networks may be identified A communication pattern can depict relations between individuals, Organisations, websites, etc with purpose of charting the social networks, position of power, views and other personal data about an individual. The actual message is less important than the information about the sender, recipient, the time of transaction, and means of communication. Knowledge about the communication pattern and thus the social network of person is often enough Individual

U.S. National Research Council, report October 2008 “Protecting Individual Privacy in the Struggle Against Terrorists: A Framework for Program Assessment”

Two general types of data mining techniques 1. Subject-based data mining 2. Pattern-based data mining U.S. National Research Council “Protecting Individual Privacy in the Struggle Against Terrorists: A Framework for Program Assessment”

Subject-based data mining Subject-based data mining uses an initiating individual or other datum that is considered, based on other information, to be of high interest, and the goal is to determine what other persons or financial transactions or movements, etc., are related to that initiating datum. U.S. National Research Council

Pattern-based data mining Pattern-based data mining looks for patterns (including anomalous data patterns) that might be associated with terrorist activity—these patterns might be regarded as small signals in a large ocean of noise. U.S. National Research Council

When to use the two different techniques In the case of the decentralized group, subject-based data mining is likely to augment and enhance traditional police investigations by making it possible to access larger volumes of data more quickly. Furthermore, communications networks can more easily be identified and mapped if one or a few individuals in the network are known with high confidence. By contrast, pattern-based data mining may be more useful in finding the larger information footprint that characterizes centrally organized terrorist groups. U.S. National Research Council

Utility of pattern-based data mining The utility of pattern-based data mining is found primarily if not exclusively in its role in helping humans make better decisions about how to deploy scarce investigative resources, and action (such as arrest, search, denial of rights) should never be taken solely on the basis of a data mining result. Automated terrorist identification through data mining (or any other known methodology) is neither feasible as an objective nor desirable as a goal of technology development efforts. U.S. National Research Council

Panspectron (Delanda) “There are many differences between the Panopticon and the Panspectron being assembled at the NSA. Instead of positioning some human bodies around a central sensor, a multiplicity of sensors is deployed around all bodies: its antenna farms, spy satellites and cable-traffic intercepts feed into its computers all the information that can be gathered. This is then processed through a series of “filters” or key-word watch lists. The Panspectron does not merely select certain bodies and certain (visual) data about them. Rather, it compiles information about all at the same time, using computers to select the segments of data relevant to its surveillance tasks.” Panopticon (Bentham)

16 Discussion Based on the material distributed, discuss for 15 minutes: 1. When does the interference with privacy occur in relation to systems of mass surveillance of electronic communication? 2. How does the American system differ from the legal regime under ECHR in its approach to the content/non-content distinction? 3. In the country you come from, do you have any regulations concern signal intelligence/strategic monitoring/surveillance for intelligence purposes? If not, does your country still have a state agency similar to the NSA, GCHQ, BND and FRA? 4. Is it appropriate to involve courts in issues concerning the implementation of policies on national security?

17 Defining content and traffic data As opposed to the content of a message, traffic data is the information used by the communication network to deliver the message to or from the user. In a telephone network, traffic data will reveal the number dialed (“to”), the originating number (“from”), the time of the call, and its duration. In the internet context, traffic data will similarly reveal the “to” and “from” address, the instant message to and from account names, and the other administrative information the computers generate in the course of delivery Compare with Orin Kerr: content and envelope information

18 Four fields of legislation International communication Domestic communication Preliminary Investigation Intelligence N/A 1. Chapter 27 of the Code of Judicial Procedure 2. Chapter 6 section 22(3) of the Electronic Communications Act (2003:389) 3. Act on measures concerning certain serious crimes (2008:854) 1. Act on measures to prevent certain serious crimes (2007:979) 2. Chapter 6 section 22(3) of the Electronic Communications Act (2003:389) Signal Intelligence Act (2008:717)

19 EU Data Retention Directive 1. Data is retained for periods of not less than six months and not more than two years from the date of the communication 2. The data retained purports to the questions who was communicating with who, when the communication occurred, where was the communicating parties and what type of communication used. 3. No content data may be retained for the purpose of the directive. 4. The access for national authorities to the data is to be regulated through domestic law

20 Summary of the legislation adopted 18 June 2008: IT- and telecom operators are obligated to transfer all communication in cables crossing Swedish borders to nodes controlled by the State The Defence Radio Establishment will intercept communication and collect data at the nodes (signal intelligence)

21 Similar organizations, laws and programs USA Organization: National Security Agency (NSA) Legislation: FISA United Kingdom Organization: Government Communications Headquarters (GCHQ) Legislation: RIPA Case: Liberty et al. v. The United Kingdom

22 Similar organizations, laws and programs France Organization: Direction Générale de la Sécurité Extérieure (DGSE) Germany Organization: Bundesnachrichtendienst (BND) Legislation: G 10-law (Gesetz zur Beschränkung des Brief-, Post- und Fernmeldegeheimnisses) Case: Weber and Saravia v. Germany Denmark Organization: Forsvarets Efterretningstjeneste (FE) Legislation: 17 § forsvarsloven

23 Key Features of the Swedish law and the operations of the Defence Radio Establishment 1. Mandate for Surveillance by the Defence Radio Establishment 2. Clients 3. Review Mechanisms 4. Method – what is signal intelligence? Traffic analysis and social network analysis 5. Scope of Surveillance

24 1. Mandate of the Defence Radio Establishment Mandate to monitor 1. external military threats, 2. factors relevant for peacekeeping operations, 3. international terrorism and international organized crime 4. the development and proliferation of weapons of mass destruction and arms control, 5. external threats against infrastructure (for example against information and communication technology) 6. conflicts outside of Sweden that effect international peace and security and 7. counter-intelligence 8. international phenomena relevant for Swedish foreign-, security-, and defence policy (Government and diplomatic correspondence?)

25 2. Clients (known) 1. The Government 2. The Government office 3. The Defence Forces 4. The Police, including the Security Service (SÄPO) 5. National Inspectorate of Strategic Products 6. Swedish Customs Service 7. Defence Materiel Administration Agency 8. Defence Research Agency 9. Civil Contingencies Agency International Partners exist but unknown which those are. Could include NSA, GCHQ, BND, DGSE and FE Excluded in Autumn 2009

26 3. Review Mechanisms 1.Defence Intelligence Court Reviews applications for surveillance missions in advance Professional judge and politically appointed lay-members representing the majority and the opposition in Parliament 2.Defence Intelligence Committee Reviews, inter alia, the integrity and use of the databases held by the Defence Radio Establishment Composed of a legal professional and politically appointed lay-members representing the majority and the opposition in Parliament Reports to the Government 3.Internal oversight board inside the Defence Radio Establishment 4.Ombudsman who report cases of misuse to the Parliamentary Ombudsman (JO) or the Chancellor of Justice (JK), (proposal) 5.Extraordinary review to be presented 2011 by the Data Protection Authority and a parliamentary committee

27 4. Method – what is signal intelligence? Information life cycle 1. Interception of messages and traffic data (meta data) 2. Processing i) Traffic analysis of traffic data (who is communicating with who) ii) Cryptanalysis iii) Analysis of the content of messages 3. Analysis with the use of other sources, for example Open Source Intelligence (OSINT) 4. Report to client

28 5. Scope of Surveillance 1. Fairly small amounts of messages are intercepted and processed Example from Germany, judgement of the First Senate of 14 July 1999, para. 89 : The capacity of the Federal Intelligence Service (BND) permits the screening of approximately 15,000 acts of telecommunication per day out of a total of approximately 8 million telecommunications contacts between Germany and foreign countries. The material and personal resources of the Federal Intelligence Service, however, are not sufficient to evaluate all contacts. Approximately 700 fall under the area of application of the G 10 Act. Only these acts are selected with the help of the search concepts. About 70 of them are examined more closely by employees of the Federal Intelligence Service. 2. Traffic data (meta data) relating to all or large amounts of commun- ication is stored by the Defence Radio Establishment in a database (Titan) Example from the USA: The NSA Call database contains 1,9 trillion records which include the records of tens of millions of Americans

29 To consider… Is this kind of data collection and surveillance… Consistent with the right to privacy? This is both a human right and a constitutional right. Efficient? Proportional? Confident and reliable in the sense that it provide accurate intelligence and not false alarms?

30 Questions?

31 Thanks! Blog: Phone: