Copyright 2007-12 1 Roger Clarke Xamax Consultancy, Canberra Visiting Professor in Cyberspace Law & Policy, UNSW and in Computer Science, ANU Chair, Australian.

Slides:



Advertisements
Similar presentations
You have been given a mission and a code. Use the code to complete the mission and you will save the world from obliteration…
Advertisements

Copyright Roger Clarke Xamax Consultancy, Canberra Visiting Professor – Cyberspace Law & Policy UNSW and at the ANU and the Uni. of.
Copyright, Invitation to Research RESEARCH CONCEPTS & TERMINOLOGY Roger Clarke, Xamax Consultancy, Canberra Visiting Professor, CSIS, Uni of.
Copyright Xamax Consultancy Pty Ltd, Canberra Visiting Professor, Uni. of Hong Kong, A.N.U. & U.N.S.W.
Copyright, The Malware Menagerie Roger Clarke, Xamax Consultancy, Canberra Visiting Professor in Cyberspace Law & Policy at U.N.S.W., eCommerce.
Copyright, Invitation to Research RESEARCH ETHICS Roger Clarke, Xamax Consultancy, Canberra Visiting Professor, CSIS, Uni of Hong Kong Visiting.
Copyright, Invitation to Research ENGINEERING RESEARCH TECHNIQUES Roger Clarke, Xamax Consultancy, Canberra Visiting Professor, CSIS, Uni of.
Copyright Digital Privacy Roger Clarke, Xamax Consultancy, Canberra Board Member, Australian Privacy Foundation Visiting Professor, Unis. of.
Copyright Roger Clarke Xamax Consultancy, Canberra Visiting Professor in Cyberspace Law & Policy, UNSW Visiting Professor in Computer Science, ANU.
Copyright, Invitation to Research RESEARCH TECHNIQUES – OVERVIEW Roger Clarke, Xamax Consultancy, Canberra Visiting Professor, CSIS, Uni of.
Copyright Roger Clarke, Xamax Consultancy, Canberra Visiting Professor in Computer Science, ANU and in Cyberspace Law & Policy, UNSW
Copyright, Invitation to Research THE SCIENTIFIC APPROACH Roger Clarke, Xamax Consultancy, Canberra Visiting Professor, CSIS, Uni of Hong Kong.
Copyright Paper Reviewing Roger Clarke Xamax Consultancy Pty Ltd, Canberra Visiting Professor, Uni. of Hong Kong, U.N.S.W., A.N.U.
Copyright, A Pilot Study of the Effectiveness of Privacy Policy Statements Roger Clarke Xamax Consultancy Pty Ltd, Canberra Visiting Professor,
Copyright Roger Clarke Xamax Consultancy, Canberra Visiting Professor in Cyberspace Law & Policy, UNSW and in Computer Science, ANU Chair, Australian.
Chapter 1 The Study of Body Function Image PowerPoint
Copyright © 2011, Elsevier Inc. All rights reserved. Chapter 5 Author: Julia Richards and R. Scott Hawley.
1 Copyright © 2010, Elsevier Inc. All rights Reserved Fig 2.1 Chapter 2.
By D. Fisher Geometric Transformations. Reflection, Rotation, or Translation 1.
1.04 -THE LAW- System of Rules
1 Compliance Responsibilities: National Service Criminal History Checks Corporation for National and Community Service Office of Grants Management, Washington,
Business Transaction Management Software for Application Coordination 1 Business Processes and Coordination.
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Title Subtitle.
0 - 0.
DIVIDING INTEGERS 1. IF THE SIGNS ARE THE SAME THE ANSWER IS POSITIVE 2. IF THE SIGNS ARE DIFFERENT THE ANSWER IS NEGATIVE.
MULT. INTEGERS 1. IF THE SIGNS ARE THE SAME THE ANSWER IS POSITIVE 2. IF THE SIGNS ARE DIFFERENT THE ANSWER IS NEGATIVE.
Addition Facts
Year 6 mental test 5 second questions
ZMQS ZMQS
Surface science: physical chemistry of surfaces Massimiliano Bestetti Lesson N° 1 – 6 October 2011.
Richmond House, Liverpool (1) 26 th January 2004.
1 Kids Helpline Australia Wendy Protheroe. 2 Established in 1991 National Service 24/7 Private and Confidential 5 – 25 years Counselling and support via.
BT Wholesale October Creating your own telephone network WHOLESALE CALLS LINE ASSOCIATED.
ABC Technology Project
MARKETING INFORMATION AND RESEARCH
Primary research figuresPrimary research figures These are some of the results from my primary research. percentages of people who like/dislike the show.
Net Price Calculator Presented by American Student Assistance.
EU Market Situation for Eggs and Poultry Management Committee 21 June 2012.
3 Logic The Study of What’s True or False or Somewhere in Between.
© S Haughton more than 3?
VOORBLAD.
“Start-to-End” Simulations Imaging of Single Molecules at the European XFEL Igor Zagorodnov S2E Meeting DESY 10. February 2014.
Squares and Square Root WALK. Solve each problem REVIEW:
© 2012 National Heart Foundation of Australia. Slide 2.
Understanding Generalist Practice, 5e, Kirst-Ashman/Hull
Chapter 5 Test Review Sections 5-1 through 5-4.
SIMOCODE-DP Software.
GG Consulting, LLC I-SUITE. Source: TEA SHARS Frequently asked questions 2.
1 First EMRAS II Technical Meeting IAEA Headquarters, Vienna, 19–23 January 2009.
Addition 1’s to 20.
25 seconds left…...
Januar MDMDFSSMDMDFSSS
Week 1.
We will resume in: 25 Minutes.
Intracellular Compartments and Transport
1 Unit 1 Kinematics Chapter 1 Day
TASK: Skill Development A proportional relationship is a set of equivalent ratios. Equivalent ratios have equal values using different numbers. Creating.
Immunobiology: The Immune System in Health & Disease Sixth Edition
Essential Cell Biology
How Cells Obtain Energy from Food
Immunobiology: The Immune System in Health & Disease Sixth Edition
Copyright Managing Drones' Privacy and Civil Liberties Impacts Roger Clarke Chair, Australian Privacy Foundation Xamax Consultancy Pty Ltd, Canberra.
Presentation transcript:

Copyright Roger Clarke Xamax Consultancy, Canberra Visiting Professor in Cyberspace Law & Policy, UNSW and in Computer Science, ANU Chair, Australian Privacy Foundation {.html,.ppt} Surveillance Conference – Uni Sydney – 20 February 2012 Surveillance by the Media – and Its Regulation

Copyright Surveillance by the Media – and Its Regulation AGENDA Media Surveillance Practices Empirical Analytical Regulation of Media Surveillance Contemporary Prospective

Copyright Kidman – January 2005

Copyright Kidman – January 2005 Stake-out, listening device, still-image photography, car pursuit, AVOs granted

Copyright Falzon & Williams – April 2007 Visual recording, non-public place, covert, unconsented, unofficial media

Copyright Elliott – May 2008 Visual recording, public place, vulnerable person, overt, persistent, consent denied

Copyright Elliott – At the Inquest

Copyright yo Girl – July 2009 Coercion, vulnerable person, live-to-air

Copyright Campbell – May 2010 Stake-out, covert, visual recording, unconsented, no public interest

Copyright Campbell – May 2010

Copyright Madaleine Pulver – Aug-Nov 2011 Stake-out, visual recording, persistent, overt, consent denied

Copyright Madaleine Pulver – Aug-Nov 2011 Persistent, pursuit

Copyright Madaleine Pulver – Aug-Nov 2011 Stake-out, visual recording, presistent, overt, consent denied, pursuit

Copyright yo Boy in Bali – October 2011 Stake-out, visual recording, consent denied, persistent, culturally risky

Copyright yo Boy in Bali – October 2011

Copyright Forms of Surveillance 1.Physical Surveillance 2.Communications Surveillance 3.Dataveillance 4.Location and Tracking Surveillance 5.Body Surveillance ['Überveillance' Type 1] 6.Omnipresent and/or Omniscient Surveillance ['Überveillance' Type 2]

Copyright Dimensions of Surveillance 1.Of What? 2.For Whom? 3.By Whom? 4.Why? 5.How? 6.Where? 7.When?

Copyright Forms of Media Surveillance 1.Physical Surveillance Unaided watching and listening with eyes and ears Aids, incl. telescopic lenses, directional microphones, recording devices, triggering devices 2.Comms Surveillance Unauthorised access to voic s /'mailbox hacking'), telephone, or chat/IM traffic 3.Dataveillance Acquired login/passwd pairs Hacking Social Eng'g – pretexting / blagging, masquerade 4.Loc, Track Surveillance Stake-out, pursuit,... More sophisticated tools 5.Body Surveillance 6.Omnipresent and/or Omniscient Surveillance

Copyright Contemporary Regulation of Media Surveillance Tort Interference with Real Estate (Trespass, Nuisance) Interference with the Person (Trespass, Obstruction, False Imprisonment, Assault, AVOs / PSIOs) Interference with Emotional State (Stalking, Negligence) Deceitful Behaviour (Misrepresentation, Deceit, Passing-Off) Surveillance Statutes Telecomms (postal, TIAA, computer offences) Aural/Visual Surv Devices (Clth, State, Territory) Pornography, Anti-Voyeurism Other Statutes (Copyright, Trademarks, Media Law, Human Rights, Privacy) Media Codes (APC, ACMA) Direct Action (protecting the public, and the media)

Copyright The Regulation of Surveillance – General Principles 1.Justification 2.Proportionality 3.Openness 4.Access Security 5.Controlled Use 6.Controlled Disclosure 7.Controlled Publication 8.Non-Retention and Rapid Destruction 9.Review 10.Withdrawal

Copyright Media Use of Surveillance – Specific Principle DO NOT, unless a clear justification exists: seek or gather personal data observe or record personal behaviour Base justification only on: consent by the person to whom the data relates express legal authority; or an over-riding public interest The nature of the activities, and their degree of intrusiveness: must reflect the nature and extent of any consent provided must reflect the nature and extent of any express legal authority; and must be proportionate to the nature and significance of the public interest arising in the particular circumstances

Copyright The Public Interest Relevance to: the performance of: a public office a significant corporate or civil society function the credibility of public statements ('hypocrisy') arguably illegal, immoral or seriously anti-social behaviour public health or safety a significant event

Copyright Media Use of Surveillance – Controlled Activities 1.activities that intrude into the person's private space 2.activities that intrude into the person's reasonable expectations, even though they are in a public space 3.deceit, such as: masquerade misrepresentation or subterfuge pretexting / blagging, masquerade unexpected observation or recording 4.exploitation of vulnerability, naiveté or ignorance, esp. children, limited mental capacity, etc. 5.intrusions into private space of people in sensitive situations 6.coercion, incl. implication of a legal or moral obligation, intimidation, excessive persistence 7.perceived trespass, nuisance, obstruction, pursuit, harassment or stalking

Copyright Roger Clarke Xamax Consultancy, Canberra Visiting Professor in Cyberspace Law & Policy, UNSW and in Computer Science, ANU Chair, Australian Privacy Foundation {.html,.ppt} Surveillance Conference – Uni Sydney – 20 February 2012 Surveillance by the Media – and Its Regulation