Copyright Roger Clarke Xamax Consultancy, Canberra Visiting Professor in Cyberspace Law & Policy, UNSW and in Computer Science, ANU Chair, Australian Privacy Foundation {.html,.ppt} Surveillance Conference – Uni Sydney – 20 February 2012 Surveillance by the Media – and Its Regulation
Copyright Surveillance by the Media – and Its Regulation AGENDA Media Surveillance Practices Empirical Analytical Regulation of Media Surveillance Contemporary Prospective
Copyright Kidman – January 2005
Copyright Kidman – January 2005 Stake-out, listening device, still-image photography, car pursuit, AVOs granted
Copyright Falzon & Williams – April 2007 Visual recording, non-public place, covert, unconsented, unofficial media
Copyright Elliott – May 2008 Visual recording, public place, vulnerable person, overt, persistent, consent denied
Copyright Elliott – At the Inquest
Copyright yo Girl – July 2009 Coercion, vulnerable person, live-to-air
Copyright Campbell – May 2010 Stake-out, covert, visual recording, unconsented, no public interest
Copyright Campbell – May 2010
Copyright Madaleine Pulver – Aug-Nov 2011 Stake-out, visual recording, persistent, overt, consent denied
Copyright Madaleine Pulver – Aug-Nov 2011 Persistent, pursuit
Copyright Madaleine Pulver – Aug-Nov 2011 Stake-out, visual recording, presistent, overt, consent denied, pursuit
Copyright yo Boy in Bali – October 2011 Stake-out, visual recording, consent denied, persistent, culturally risky
Copyright yo Boy in Bali – October 2011
Copyright Forms of Surveillance 1.Physical Surveillance 2.Communications Surveillance 3.Dataveillance 4.Location and Tracking Surveillance 5.Body Surveillance ['Überveillance' Type 1] 6.Omnipresent and/or Omniscient Surveillance ['Überveillance' Type 2]
Copyright Dimensions of Surveillance 1.Of What? 2.For Whom? 3.By Whom? 4.Why? 5.How? 6.Where? 7.When?
Copyright Forms of Media Surveillance 1.Physical Surveillance Unaided watching and listening with eyes and ears Aids, incl. telescopic lenses, directional microphones, recording devices, triggering devices 2.Comms Surveillance Unauthorised access to voic s /'mailbox hacking'), telephone, or chat/IM traffic 3.Dataveillance Acquired login/passwd pairs Hacking Social Eng'g – pretexting / blagging, masquerade 4.Loc, Track Surveillance Stake-out, pursuit,... More sophisticated tools 5.Body Surveillance 6.Omnipresent and/or Omniscient Surveillance
Copyright Contemporary Regulation of Media Surveillance Tort Interference with Real Estate (Trespass, Nuisance) Interference with the Person (Trespass, Obstruction, False Imprisonment, Assault, AVOs / PSIOs) Interference with Emotional State (Stalking, Negligence) Deceitful Behaviour (Misrepresentation, Deceit, Passing-Off) Surveillance Statutes Telecomms (postal, TIAA, computer offences) Aural/Visual Surv Devices (Clth, State, Territory) Pornography, Anti-Voyeurism Other Statutes (Copyright, Trademarks, Media Law, Human Rights, Privacy) Media Codes (APC, ACMA) Direct Action (protecting the public, and the media)
Copyright The Regulation of Surveillance – General Principles 1.Justification 2.Proportionality 3.Openness 4.Access Security 5.Controlled Use 6.Controlled Disclosure 7.Controlled Publication 8.Non-Retention and Rapid Destruction 9.Review 10.Withdrawal
Copyright Media Use of Surveillance – Specific Principle DO NOT, unless a clear justification exists: seek or gather personal data observe or record personal behaviour Base justification only on: consent by the person to whom the data relates express legal authority; or an over-riding public interest The nature of the activities, and their degree of intrusiveness: must reflect the nature and extent of any consent provided must reflect the nature and extent of any express legal authority; and must be proportionate to the nature and significance of the public interest arising in the particular circumstances
Copyright The Public Interest Relevance to: the performance of: a public office a significant corporate or civil society function the credibility of public statements ('hypocrisy') arguably illegal, immoral or seriously anti-social behaviour public health or safety a significant event
Copyright Media Use of Surveillance – Controlled Activities 1.activities that intrude into the person's private space 2.activities that intrude into the person's reasonable expectations, even though they are in a public space 3.deceit, such as: masquerade misrepresentation or subterfuge pretexting / blagging, masquerade unexpected observation or recording 4.exploitation of vulnerability, naiveté or ignorance, esp. children, limited mental capacity, etc. 5.intrusions into private space of people in sensitive situations 6.coercion, incl. implication of a legal or moral obligation, intimidation, excessive persistence 7.perceived trespass, nuisance, obstruction, pursuit, harassment or stalking
Copyright Roger Clarke Xamax Consultancy, Canberra Visiting Professor in Cyberspace Law & Policy, UNSW and in Computer Science, ANU Chair, Australian Privacy Foundation {.html,.ppt} Surveillance Conference – Uni Sydney – 20 February 2012 Surveillance by the Media – and Its Regulation