Copyright 1988-2006 1 National Identity Cards? Bust the Myth of Security über Alles Roger Clarke, Xamax Consultancy, Canberra Visiting Professor, Unis.

Slides:



Advertisements
Similar presentations
You have been given a mission and a code. Use the code to complete the mission and you will save the world from obliteration…
Advertisements

Copyright Roger Clarke Xamax Consultancy, Canberra Visiting Professor – Cyberspace Law & Policy UNSW and at the ANU and the Uni. of.
Copyright Roger Clarke, Xamax Consultancy, Canberra Visiting Professor, Unis. of Hong Kong, U.N.S.W., ANU
General form of a rights-based claim:
Copyright © 2008 Pearson Addison-Wesley. All rights reserved. Chapter 16 Unemployment: Search and Efficiency Wages.
Chapter 16 Unemployment: Search and Efficiency Wages.
Copyright Roger Clarke, Xamax Consultancy, Canberra Visiting Professor, Unis. of Hong Kong, U.N.S.W., ANU
Copyright, Invitation to Research RESEARCH CONCEPTS & TERMINOLOGY Roger Clarke, Xamax Consultancy, Canberra Visiting Professor, CSIS, Uni of.
Copyright Roger Clarke Xamax Consultancy, Canberra Visiting Professor in Cyberspace Law & Policy, UNSW and in Computer Science, ANU Chair, Australian.
Copyright Xamax Consultancy Pty Ltd, Canberra Visiting Professor, Uni. of Hong Kong, A.N.U. & U.N.S.W.
Copyright, Invitation to Research RESEARCH ETHICS Roger Clarke, Xamax Consultancy, Canberra Visiting Professor, CSIS, Uni of Hong Kong Visiting.
Copyright, INVITATION TO RESEARCH INTRODUCTION Roger Clarke, Xamax Consultancy, Canberra Visiting Professor, Uni of Hong Kong Visiting Fellow,
Copyright, Invitation to Research SYSTEMS THINKING Roger Clarke, Xamax Consultancy, Canberra Visiting Professor, CSIS, Uni of Hong Kong Visiting.
Copyright Digital Privacy Roger Clarke, Xamax Consultancy, Canberra Board Member, Australian Privacy Foundation Visiting Professor, Unis. of.
Copyright, Issues from Internet Technologies 2 – Apps for Collaboration & Subversion Roger Clarke, Xamax Consultancy, Canberra Visiting Prof/Fellow,
Copyright, Issues from Internet Technologies 4 – Counter-Attacks by the Powerful Roger Clarke, Xamax Consultancy, Canberra Visiting Prof/Fellow,
Copyright Roger Clarke, Xamax Consultancy, Canberra Visiting Professor in Computer Science, ANU and in Cyberspace Law & Policy, UNSW
Copyright, Invitation to Research THE SCIENTIFIC APPROACH Roger Clarke, Xamax Consultancy, Canberra Visiting Professor, CSIS, Uni of Hong Kong.
Copyright Roger Clarke, Xamax Consultancy, Canberra Visiting Professor, Unis. of Hong Kong, U.N.S.W., ANU
Ethics and Social Responsibility
Copyright © 2003 Pearson Education, Inc. Slide 1 Computer Systems Organization & Architecture Chapters 8-12 John D. Carpinelli.
1 Copyright © 2010, Elsevier Inc. All rights Reserved Fig 2.1 Chapter 2.
Properties Use, share, or modify this drill on mathematic properties. There is too much material for a single class, so you’ll have to select for your.
4th Global Congress on Combating Counterfeiting and Piracy Dubai, February 2 - 5, 2008 Raising Awareness on the Full Economic and Social Costs of Counterfeiting.
© fedict All rights reserved Legal aspects Belgian electronic identity card Samoera Jacobs – November 2008.
A © 2001 Arthur Andersen. All rights reserved. The Accountants Role in the New Economy Robert A. Johnson February 5, 2001.
Business Transaction Management Software for Application Coordination 1 Business Processes and Coordination.
1 RA I Sub-Regional Training Seminar on CLIMAT&CLIMAT TEMP Reporting Casablanca, Morocco, 20 – 22 December 2005 Status of observing programmes in RA I.
1 Welcome to this Seminar for Board Members. 2 Board Members and Staff – Sharing of Responsibilities Voluntary Organisations and Volunteers Responsibilities.
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Title Subtitle.
Properties of Real Numbers CommutativeAssociativeDistributive Identity + × Inverse + ×
Civics: Government and Economics in Action
Addition Facts
Year 6 mental test 5 second questions
The Only Specification
Briefing to the Select Committee on Security and Constitutional Development 11 February
Regulatory Reform (Fire Safety) Order 2005 Fire Safety Order What is the Fire Safety Order? The order was made, under the Regulatory Reform Act 2001.
BT Wholesale October Creating your own telephone network WHOLESALE CALLS LINE ASSOCIATED.
Georgia has Led the Nation for 3 Consecutive Years.
Reinsurance Regulation in Australia an overview
ABC Technology Project
EU Market Situation for Eggs and Poultry Management Committee 21 June 2012.
1 Capacity - where we are and where we are going Sarah Lennon Inclusion Ireland AGM April 24 th 2010.
VOORBLAD.
EC220 - Introduction to econometrics (review chapter)
1 RA III - Regional Training Seminar on CLIMAT&CLIMAT TEMP Reporting Buenos Aires, Argentina, 25 – 27 October 2006 Status of observing programmes in RA.
Chapter 3 Ethical Behavior and Social Responsibility
© 2012 National Heart Foundation of Australia. Slide 2.
GG Consulting, LLC I-SUITE. Source: TEA SHARS Frequently asked questions 2.
Addition 1’s to 20.
25 seconds left…...
11 Professor Rosalind F Croucher Commissioner. 22.
Week 1.
Analyzing Genes and Genomes
We will resume in: 25 Minutes.
©Brooks/Cole, 2001 Chapter 12 Derived Types-- Enumerated, Structure and Union.
Marketing Strategy and the Marketing Plan
PSSA Preparation.
Essential Cell Biology
1 PART 1 ILLUSTRATION OF DOCUMENTS  Brief introduction to the documents contained in the envelope  Detailed clarification of the documents content.
Organization Theory and Health Services Management
NORMAPME ISO User Guide for European SMEs The essence of.
PRIVACY AND SECURITY MORAL IMPERATIVE OF PROFESSIONAL ETHICS.
Challenges to a Canadian Identity Policy: Learning from International Experiences Krista Boa, Andrew Clement & Gus Hosein Identity Project - Canada 7th.
1 Chair Roger Clarke, Xamax Consultancy, Australia Panellists Milena Head, McMaster Uni, Canada Khaled Hassanein, McMaster Uni, Canada Roger Bons, (Ing),
Smart Cards and Biometrics
Presentation transcript:

Copyright National Identity Cards? Bust the Myth of Security über Alles Roger Clarke, Xamax Consultancy, Canberra Visiting Professor, Unis. of Hong Kong, U.N.S.W., ANU {.html,.ppt} 7th Annual Privacy & Security Conference Victoria BC – 9 February 2006

Copyright Were Living in an Era of Myths They Threaten Civilisation Far More Than Do Islamic and Christian Fundamentalism and Terrorism The Many Myths Must Be Debunked Myth No. 1 This is about just a Card

Copyright Elements of a National ID Scheme A Database centralised or hub (i.e. virtually centralised) merged or new A Unique Signifier for Every Individual A 'Unique Identifier' A Biometric Entifier An (Id)entification Token (such as an ID Card) Mechanisms for: (Id)entity Authentication (Id)entification Obligations Imposed on: Every Individual Many Organisations Widepread: Use of the (Id)entifier Use of the Database Data Flows including the (Id)entifier

Copyright Myth No. 2 This is about just another Card

Copyright Myth No. 2 – This is about just another Card Characteristics of a National ID Scheme Destruction of protective data silos Destruction of protective identity silos Consolidation of individuals many identities into a single general-purpose identity ==>The Infrastructure of Dataveillance Consolidation of power in organisations that exercise social control functions Availability of that power to many organisations

Copyright Identity Management of the Most Chilling Kind The Public-Private Partnership for Social Control With the Capacity to Perform Cross-System Enforcement Services Denial Identity Denial Masquerade Identity Theft

Copyright Myth No. 3 Privacys dead. Get over it

Copyright Privacy is a Fundamental Requirement for Humanity and Civilisation psychologically, people need private space, closed doors, drawn curtains. People need to be able to glance around, judge whether the people in the vicinity are a threat, and then perform potentially embarrassing actions (break wind, jump for joy) sociologically, people need to be free to behave, and to associate with others, without the continual, even continuous, threat of being observed. The alternative is the context that we deplored about life behaind the Iron and Bamboo Curtains economically, people need to feel free to innovate. Sustaining standard-of-living depends on continual reinvention politically, people need freedom to think, to argue, and to act. The chilling of behaviour and speech destroys democracy

Copyright Privacy is a Fundamental Human Right, not an Optional Extra UDHR 1948, Article 12 ICCPR 1966, Article 17 national Constitutions and Bills of Rights Privacy is not a Mere Economic Right

Copyright Dangers of Dataveillance (1 of 2) Dangers of Personal Dataveillance -wrong identification -low quality data -acontextual use of data -low quality decisions -lack of subject knowledge of data flows -lack of subject consent to data flows -blacklisting -denial of redemption Dangers of Mass Dataveillance To the Individual - arbitrariness - acontextual data merger - data complexity, incomprehensibility - witch hunts - ex-ante discrimination, guilt prediction - selective advertising - inversion of the onus of proof - covert operations - unknown accusations and accusers - denial of due process

Copyright Dangers of Mass Dataveillance To Society as a Whole -prevailing climate of suspicion - adversarial relationships - focus of law enforcement on easily detectable and provable offences - inequitable application of law -decreased respect for the law and law enforcers - reduced meaningfulness of individual actions - reduced self-reliance and self-determination - stultification of originality -increased tendency to opt out of the official level of society -weakening of society's moral fibre and cohesion -destabilisation of the strategic balance of power -repressive potential for a totalitarian government Dangers of Dataveillance (2 of 2)

Copyright Myth No. 4 You cant have privacy if you want security

Copyright Myth No. 4 You cant have privacy if you want security Yes, if course privacy protections are used by people for anti-social and criminal ends But the privacy advocacy argument is not extremist like the national security agenda Privacy protections are about: Justification, not Blithe Assumptions Balance, not simplistic notions like Zero-Tolerance and we need to do anything that might help us wage the war on terrorism

Copyright Myth No. 5 Strong Form: A national ID scheme is essential to national security Weaker Form: A national ID scheme will contribute significantly to national security

Copyright Terrorists, Organised Crime, Illegal Immigrants Benefits Are Illusory Mere assertions of benefits: its obvious, its intuitive, of course it will work Lack of detail on systems design Continual drift in features Analyses undermine the assertions Proponents avoid discussing the analyses

Copyright Biometrics and Single-Mission Terrorists Terrorism is defined by an act, not an identity: Biometrics... cant reduce the threat of the suicide bomber or suicide hijacker on his virgin mission. The contemporary hazard is a terrorist who travels under his own name, his own passport... until the moment he ignites his shoe-bomb or pulls out his box-cutter (Jonas G., National Post, 19 Jan 2004) It is difficult to avoid the conclusion that the chief motivation for deploying biometrics is not so much to provide security, but to provide the appearance of security (The Economist, 4 Dec 2003)

Copyright Miscreants (Benefits Recipients, Fine-Avoiders,...) Benefits May Arise, But Are Seriously Exaggerated Lack of detail on systems design Continual drift in features Double-counting of benefits from the ID Scheme and the many existing programs Analyses undermine the assertions Proponents avoid discussing the analyses

Copyright Myth No. 6 Strong Form: The Scheme will include privacy protections Weak Form: The Scheme complies with the [Privacy] Act

Copyright The Vacuousness of Data Protection Laws FIPs (Fair Information Practices) were designed for administrative convenience OECD Guidelines were designed to protect businesses from inconsistent national laws Exceptions, Exemptions, Loop-Holes Over-Rides

Copyright Myth No. 7 A National ID Scheme can be devised so as to preclude abuse by: Unelected Governments, e.g. Invaders Military Putsch Elected Governments, e.g. that arrange the law as they wish that act outside the law

Copyright Myth No. 8 The public accepts that the world changed on 11? (12!) September 2001 Privacy valuations are highly situational The gloss has gone People are becoming inured / bored / realistic about the threat of terrorism People know that a national ID scheme wont prevent terrorism Zogby Poll 2 Feb Luggage Search Car Search Vehicle Search Mail Search Tel Monitoring

Copyright The Privacy Advocacy Core LSEs Identity Project – Privacy International – APF International Resources – US, e.g. EPIC – UK, esp. SayNo2ID – Australia, esp. APF –

Copyright Conclusion There can be no reconciliation or balance between privacy and security that involves a national ID scheme Attempts by intellectuals and regulators to accommodate a national ID scheme must be seen by everyone, and treated by everyone, for what they are: a sell-out of liberty, and a derogation of their duties as human beings

Copyright National Identity Cards? Bust the Myth of Security über Alles Roger Clarke, Xamax Consultancy, Canberra Visiting Professor, Unis. of Hong Kong, U.N.S.W., ANU {.html,.ppt} 7th Annual Privacy & Security Conference Victoria BC – 9 February 2006