Policy Laundering and Privacy. A Special Warning To US Allies BE AFRAID! BE VERY AFRAID! Carnegie Mellon University March 23 2005 Barry Steinhardt.

Slides:



Advertisements
Similar presentations
AFCEA TechNet Europe Identity and Authentication Management Systems for Access Control Security IDENTITY MANAGEMENT Good Afternoon! Since Yesterday we.
Advertisements

The Evolution of the Trusted Traveler Concept September 2010.
29e CONFÉRENCE INTERNATIONALE DES COMMISSAIRES À LA PROTECTION DES DONNÉES ET DE LA VIE PRIVÉE 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY.
M. Guymon Pleasant Grove High School Spring 2003 Ethics & Computer Technology Day 18.
Computer Technology Day 18
Computer Security Biometric authentication Based on a talk by Dr J.J. Atick, Identix, “Biometrics in the Decade of Security”, CNSS 2003.
Passed by the Senate 98-1 Passed by the House October 26, 2001 – Signed into law by President Bush 130 pages in length Divided into 10 titles.
Patriot Act October 26, United (and) Strengthening America (by) Providing appropriate tools required (to) intercept (and) obstruct Terrorism Act.
Chapter 17 Law and Terrorism.
Works Citied. How Has the War on Terrorism Affected Civil Liberties? Opposing Viewpoints Civil Liberties Cole, David. The War on Terrorism.
USA PATRIOT ACT USA PATRIOT ACT
Respecting Privacy in Global Networks/ Guernsey, Wednesday 11 th April, Paula Ortiz López Spanish Data Protection Agency.
Chapter 12: Judicial Activism and American Democracy Author: Doris Marie Provine Presenter: Chris Giuliano.
1 1 New Zealand’s Experience in Implementing API in a ‘Visa Free’ Environment Advance Passenger Screening Presentation to : APEC Business Mobility Group.
Security Issues on Campus: Government Initiatives Rodney J. Petersen University of Maryland Educause/Internet2 Security Task Force Copyright Rodney J.
P O L I C E D E P A R T M E N T  Biometric passport – Passport Act – Issuing a biometric passport – Development project  Biometric Passport To Biometric.
I DENTITY M ANAGEMENT Joe Braceland Mount Airey Group, Inc.
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
Exposing the Myths, Exploring the Solutions Ann Cavoukian, Ph.D. Information & Privacy Commissioner/Ontario Privacy & Security: Seeking the.
“Privacy in a New Era” Conference Summary 13 September 2004 Wroclaw, Poland.
Ethics & Computer Technology. Ethics are…  A set of principles of right conduct.  A theory or a system of moral values.  The rules or standards.
CS 4001Mary Jean Harrold1 Class 8 ŸQuestions about term paper—list of possible topics available later today ŸCommunications discussion ŸCommunications.
CAPPS II: A Case Study of Homeland Security Computer Applications Marcia Hofmann Staff Counsel Electronic Privacy Information Center Computer Freedom &
1 Copyright © 2011 M. E. Kabay, J. Tower-Pierce & P. R. Stephenson. All rights reserved. The U.S.A.P.A.T.R.I.O.T. Act CJ341 – Cyberlaw & Cybercrime Lecture.
The Patriot Act Protecting the US or Violating People’s Freedoms.
The Biometric Applications Commissioner Balancing Security and Facilitating Procedures at Border Crossings Frontex, October 2013 Biometric Applications.
CSE/ISE 312 Privacy (Part 2). The Business and Social Sectors Marketing and personalization What we do ourselves Location tracking A right to be forgotten.
Biotechnology By Denise Ogden Using Biometrics in online learning systems.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
+ New Counterterrorism Technology & Laws Help or hindrance?
30/09/09Copyright - The Earl of Erroll1 Lord Erroll - Merlin Member of the HOUSE of LORDS - an Independent Peer PITCOMParliamentary Information Technology.
New Technologies and Travel Documents ICAO 12 th Meeting of the Facilitation Division Cairo March 23, 2004.
Challenges to a Canadian Identity Policy: Learning from International Experiences Krista Boa, Andrew Clement & Gus Hosein Identity Project - Canada 7th.
Mass Surveillance and the Private Sector Understanding Corporate Responses to Government Surveillance Regimes Professor Kirstie Ball.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
Surveillance, freedom of expression and international law Dr. Ian Brown.
SPT - the way travel should be!. Current Environment  Check-in, security and border clearance processes are resource intensive  High staff costs, cumbersome.
Exposing the Myths, Exploring the Solutions Ann Cavoukian, Ph.D. Information & Privacy Commissioner/Ontario Privacy & Security: Seeking the.
Changes Provoked by the 9/11 Attack  Various changes in the U.S. legislation  Exceptional number of adopted policies  Change of Americans’ perceptions.
Fusion Centres in Selected Countries Borders & Globalization Conference September 25-27, 2014 Elaine Koren, Research & Analysis Division Fusion Centres.
The Emerging Global Identity & Tracking System October 28, 2004 Barry Steinhardt Director, Technology & Liberty Project American Civil Liberties Union.
Biometric Information Databases To Use, Or Not To Use? With computers, cloud storage, and wireless communications we are pierced upon the horns of a three-pronged.
Customs and Border Protection (CBP) Uses of Criminal History Valerie Isbell Executive Director Passenger Systems Program Office Office of Information.
Homeland Security, First Edition © 2012 Pearson Education, Inc. All rights reserved. Introduction to Homeland Security CHAPTER 1.
1 GSC: Standardization Advancing Global Communications ISACC Opening Plenary Presentation GSC-11 SOURCE:ISACC TITLE:ISACC Opening Plenary Presentation.
Challenges of Modern Governance Political Science 342 Douglas Brown January 2010.
A Global Approach to Protecting the Global Critical Infrastructure Dr. Stephen D. Bryen.
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
Biotechnology By Denise Ogden Using Biometrics in online learning systems.
STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Mohammad Dastbaz, Eddie Halpin, Steve Wright Chapter 10 - Emerging Technologies and the Human Rights Challenge.
R. Stewart Fayetteville High School Ethics & Computer Technology Day 18.
Francis Lasalo Ngonga1 AVIATION SECURITY Last session’s recap  General definitions of safety & security  A few characteristics of security  AVSEC 
Johan HolmqvistProfessional Ethics Mälardalens högskola Västerås,
Perspectives on Privacy in the Internet Age Billy Hawkes Data Protection Commissioner Institute of International and European Affairs Dublin, 30 May 2008.
Unit 2: Chapter 17.  Attacks on September 11, 2001 shook America to its core  Largest on U.S. soil since World War II  Feeling of vulnerability  Congress.
Nikita Maria Department of Applied Informatics University of Macedonia - Greece.
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fingerprint Access Control System Market– Global Industry Analysis Report,
Surveillance around the world
Summary Physical Access & Time and Attendance PC/Network Access
New Technologies and Travel Documents
Biometrics.
War on Terror.
Global Biometric System Market : Trends, Forecast, and Opportunity Analysis 1.
A Real Problem % 5,000 #1 $2,100 12% 6% Identity Fraud
Biometrics.
Legal Framework for Civil Registration, Vital Statistics
A New Technology for Video Surveillance Cameron Serles
A Gift of Fire Third edition Sara Baase
5/6/2019 Information Warfare Trends, Dangers, and the Impact for European Research Policy Dipl. Pol. Ralf Bendrath, Berlin FoG:IS ReG:IS Forschungsgruppe.
Presentation transcript:

Policy Laundering and Privacy

A Special Warning To US Allies BE AFRAID! BE VERY AFRAID! Carnegie Mellon University March Barry Steinhardt

ACLU Now Facing New Challenges On A Global Scale Globalization of Security and Surveillance Globalization of Security and Surveillance “Policy Laundering” “Policy Laundering”

“Policy Laundering” Cycling policies through international bodies that can’t be enacted directly at home Cycling policies through international bodies that can’t be enacted directly at home

1st Signpost: The Creation of a Global Identification System National ID systems National ID systems The “globally interoperable biometric passport” The “globally interoperable biometric passport”

Biometric Passports Required by US Congress Required by US Congress US launders standards through ICAO US launders standards through ICAO

Biometric Passports Face-Recognition set as the standard Face-Recognition set as the standard RFID chips included too RFID chips included too Standards allow for optional use of other biometrics Standards allow for optional use of other biometrics

RFID Chips Can be read at a distance (20m in tests) Can be read at a distance (20m in tests) –see No encryption No encryption Could enable tracking Could enable tracking

Expansion is inevitable Be used for more and more purposes Be used for more and more purposes Contain ever-more information Contain ever-more information Incorporate more biometrics, such as fingerprints and iris scans Incorporate more biometrics, such as fingerprints and iris scans Once created, passports are likely to:

Passports won’t exist in a vacuum National Identity systems National Identity systems Immigration database systems Immigration database systems Passenger profiling systems Passenger profiling systems

National Driver’s License/National ID Card Part of 9/11 Intel Reform Part of 9/11 Intel Reform Standardizes Driver’s Licenses Standardizes Driver’s Licenses Distributed database functionally equivalent to National ID Distributed database functionally equivalent to National ID

NGO input could have improved the product No RFID No RFID Local storage Local storage 1-1 checks 1-1 checks biometric systems related to physical characteristics which do not leave traces (e.g. shape of the hand but not fingerprints) biometric systems related to physical characteristics which do not leave traces (e.g. shape of the hand but not fingerprints)

Policy Laundering Works: NGOs Ignored!

2 nd Signpost: Creation of an Infrastructure for the Global Surveillance of Movement Checkpoints and databases to track movements using their ID cards Checkpoints and databases to track movements using their ID cards Direct government access to airlines’ passenger name records (PNR). Direct government access to airlines’ passenger name records (PNR).

Passenger Screening February 2002: CAPPS II (version 1.0) Data mining, wide sharing, the works August 2003 CAPPS II (version 2.0) Commercial data, Red light/Green light August 2004 “Secure Flight” (CAPPS version 3.0): Watch lists, commercial data

Secure Flight Compared to CAPPS II Program Elements CAPPS II Secure Flight Provides no protection against terrorists with Fake IDs √√ Provides no meaningful way for individuals to challenge their security designation √√ Centers around reliance on secret, inaccurate government terrorist watch lists √ Checks personal information against private databases √√ Requires collection of personal information from travelers making reservations √√ Expands program beyond terrorists √* Uses computer algorithms to rate individuals’ “threat to aviation” √*

Passenger Screening Foisted On Our Allies Must be international to work Must be international to work EU-US agreement reached over parliamentary objection EU-US agreement reached over parliamentary objection International agreements reached while domestic program still embattled International agreements reached while domestic program still embattled

3rd Signpost: Infrastructure for Surveillance of Electronic Communications and Financial Transactions Expanded authorities for eavesdropping. Expanded authorities for eavesdropping. Expansion of ECHELON. Expansion of ECHELON. Expanded private-sector requirements. Expanded private-sector requirements. o CALEA o Data Retention Tracking and reporting of financial transactions Tracking and reporting of financial transactions

4th Signpost: The Convergence of Databases US-VISIT system (tied to 20 other government databases) US-VISIT system (tied to 20 other government databases) Giant corporate data-brokers Giant corporate data-brokers

Total Information Blackout

TIA --Gone – But Not Forgotten

5th Signpost: The Surveillance- Industrial Complex More tracking by private companies More tracking by private companies Government hooking into private efforts Government hooking into private efforts –Growing government powers to demand access –many businesses voluntarily surrendering databases –a surging industry of data companies is creating new information products to sell to the U.S. government.

The Surveillance- Industrial Complex:

6th Signpost: Rendition, Torture, Death Torture Torture Indefinite detention Indefinite detention A frightening context for rising surveillance A frightening context for rising surveillance A shocking loss of moral compass in the “war on terror” A shocking loss of moral compass in the “war on terror” A significant number of victims mistakenly arrested or otherwise innocent. A significant number of victims mistakenly arrested or otherwise innocent. Maher Arar case: US intercepts and renders Canadian to torture in Syria. Maher Arar case: US intercepts and renders Canadian to torture in Syria.

Globalizing security agencies outstripping restraints U.S. security agencies have obtained dramatic expansions in their domestic authority U.S. security agencies have obtained dramatic expansions in their domestic authority –Patriot Act, NSLs, etc. ACLU has been fighting hard against this ACLU has been fighting hard against this But there’s an entirely separate, global front in this battle – one that is in desperate need of a global response. But there’s an entirely separate, global front in this battle – one that is in desperate need of a global response.

The ACLU must fight in global arena “GOING GLOBAL”: Political activism Political activism Media Media Crime Crime Law Enforcement and security Law Enforcement and security

Law Enforcement going global, but oversight hasn’t kept pace Reporters Reporters Legislative oversight Legislative oversight NGOs NGOs

ACLU is already advancing aggressively toward these goals Organizing The International Campaign Against Mass Surveillance (ICAMS) – March 2005 Organizing The International Campaign Against Mass Surveillance (ICAMS) – March 2005 Policy Laundering Project --In Partnership Privacy International and Statewatch (April 2005) Policy Laundering Project --In Partnership Privacy International and Statewatch (April 2005)

ACLU concentrating on 4 primary goals: 1. Build international coalitions 1. Build international coalitions 2. Increase capacity to monitor IGOs 2. Increase capacity to monitor IGOs 3. Work closely with our colleagues on the ground 3. Work closely with our colleagues on the ground 4. Push to open up IGO policy-making 4. Push to open up IGO policy-making

1. Building international coalitions. Encouraging advocates in Europe, Asia, Africa, and Latin America to become involved in this critical issue. Encouraging advocates in Europe, Asia, Africa, and Latin America to become involved in this critical issue. Foreign publics often unaware of security agreements – and domestic ministers too! Foreign publics often unaware of security agreements – and domestic ministers too! Staff has already been hired in London Staff has already been hired in London

2. Increasing our capacity to monitor and influence international processes ICAO – we don’t want a repeat ICAO – we don’t want a repeat Create action information center Create action information center Launch FOIA-type requests around the world Launch FOIA-type requests around the world

3. Working closely with our colleagues on the ground NGOs NGOs Privacy Commissioners Privacy Commissioners

4. Pushing to open up multinational decision- making bodies Force international standards & policy groups to follow widely accepted principles of openness and public oversight Force international standards & policy groups to follow widely accepted principles of openness and public oversight Craft model proposals for open operations Craft model proposals for open operations Advocate for passage of these proposals Advocate for passage of these proposals

ACLU has successfully adapted and led time and again... Civil rights Civil rights Women’s rights Women’s rights Gay rights Gay rights Advent of television and mass media Advent of television and mass media Explosion of a new online world Explosion of a new online world

With Your Help—We Can Again!