• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
Communications Surveillance: Justification and Efficacy
 

Communications Surveillance: Justification and Efficacy

on

  • 1,744 views

Presented at Media, Communications and Cultural Studies Assocation conference, London School of Economics, 7 Jan 2010

Presented at Media, Communications and Cultural Studies Assocation conference, London School of Economics, 7 Jan 2010

Statistics

Views

Total Views
1,744
Views on SlideShare
1,674
Embed Views
70

Actions

Likes
0
Downloads
5
Comments
0

4 Embeds 70

http://dooooooom.blogspot.com 65
http://a1.vox-data.com 2
http://www.slideshare.net 2
http://www.lmodules.com 1

Accessibility

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment
  • Surveillance Net Yields Few Suspects. NSA's Hunt for Terrorists Scrutinizes Thousands of Americans, but Most Are Later Cleared. By Barton Gellman, Dafna Linzer and Carol D. Leonnig Washington Post Staff Writers
Sunday, February 5, 2006; Page A01

Communications Surveillance: Justification and Efficacy Communications Surveillance: Justification and Efficacy Presentation Transcript

  • Communications surveillance: justification and efficacy Ian Brown
  • UK surveillance regime
    • Communications data stored under Data Retention Regulations 2009…
    • … accessed using Regulation of Investigatory Powers Act 2000 (504,073 accesses in 2008)
    • Interception authorised under RIPA (1712 in 2008)
    • Intercept Modernisation Programme: “It is deeply worrying that they now intend to monitor social networking sites which contain very sensitive data like sexual orientation, religious beliefs and political views” –Tom Brake MP
  • Human rights in 21 st century
    • “ This is as much an issue of modernity as liberty. We are trying to fight 21st century crime by 19th century means. It hasn't worked. It won't work.”
    • “ I think these civil liberties arguments are a bit outdated.” – Tony Blair (2006; 2005)
    • “ advance passenger information, airline bookings and other travel data, passport and biometric data, immigration, identity and border records, criminal records, and other governmental and private sector data, including financial and telephone and other communication records … and in some cases the ability to apply data mining and pattern recognition software to databases, might well be the key to effective pre-emption in future terrorist cases.” –Sir David Omand (2009) p.9
  • Trust us!
    • “ Finding out other people’s secrets is going to involve breaking everyday moral rules. So public trust in the essential reasonableness of UK police, security and intelligence agency activity will continue to be essential.” –David Omand (2009) p.9
    • “ I have been impressed by the quality, dedication and enthusiasm of the personnel carrying out this work” –Report of the Interception of Communications Commissioner for 2007 p.2
  • Efficacy of data mining
    • ~5000 Americans surveilled over 4 years; led to <10 warrants per year
    • “ [T]here is not a consensus within the relevant scientific community nor on the committee regarding whether any behavioral surveillance … techniques are ready for use at all in the counterterrorist context&quot; –US National Research Council (2008) p.4
  • Conclusions
    • Fundamental rights are not invalidated by modernity
    • “ Automated identification of terrorists through data mining (or any other known methodology) is neither feasible as an objective nor desirable as a goal of technology development efforts.” –US National Research Council (2008) p.4
  • References
    • US National Research Council (2008) Protecting Individual Privacy in the Struggle Against Terrorists: A Framework for Program Assessment , National Academies Press
    • I. Brown & D. Korff (2009) Terrorism and the Proportionality of Internet Surveillance , European Journal of Criminology, 6(2) pp.119-134
    • D. Omand (2009) The National Security Strategy: 
Implications for the UK intelligence community , Institute for Public Policy Research