Making the citizen heard in security research Dr Ian Brown
Outline <ul><li>Tools for understanding citizens’ opinions </li></ul><ul><li>Ensuring society has accurate data and risk a...
Surveillance of personal data Source: Eurobarometer #225 Data Protection in the EU, Feb. 2008 p.48
In-depth consultation required <ul><li>High-quality opinion polls can give snapshots of public  opinion … </li></ul><ul><l...
Security: reality vs theatre <ul><li>Supports all security measures against terrorist risks in aviation that are realistic...
US National Research Council <ul><li>“ [T]here is not a consensus within the relevant scientific community nor on the comm...
Strengthening the citizen’s voice <ul><li>Appropriate oversight by EDPS, LIBE, FRA etc. </li></ul><ul><li>Cross-programme ...
ESRIF members
Upcoming SlideShare
Loading in …5
×

Making the citizen heard in security research

1,272 views
1,168 views

Published on

Presentation at European Commission conference on societal security, Brussels, 1 July 2010

Published in: Technology, Business
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
1,272
On SlideShare
0
From Embeds
0
Number of Embeds
51
Actions
Shares
0
Downloads
9
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide
  • Limits of opinion polling
  • EuroParl resolution 29 June 2007 http://www.europarl.europa.eu/sides/getDoc.do?type=MOTION&amp;reference=B6-2007-0267&amp;language=EN
  • Making the citizen heard in security research

    1. 1. Making the citizen heard in security research Dr Ian Brown
    2. 2. Outline <ul><li>Tools for understanding citizens’ opinions </li></ul><ul><li>Ensuring society has accurate data and risk assessments to make decisions </li></ul><ul><li>Strengthening input of citizens and their representatives into key decisions </li></ul>
    3. 3. Surveillance of personal data Source: Eurobarometer #225 Data Protection in the EU, Feb. 2008 p.48
    4. 4. In-depth consultation required <ul><li>High-quality opinion polls can give snapshots of public opinion … </li></ul><ul><li>Focus group problems </li></ul><ul><li>Citizen juries, scenarios, participatory design and careful qualitative and quantitative measurement of behaviour are better long-term guides </li></ul><ul><li>Privacy Impact Assessments </li></ul>
    5. 5. Security: reality vs theatre <ul><li>Supports all security measures against terrorist risks in aviation that are realistically designed to minimise the risk and are not disproportionate; </li></ul><ul><li>Points out that controls of liquids in hand luggage by X-ray equipment cannot detect explosives in liquids, and calls upon the Commission and the Member States to intensify their efforts in supporting research studies to find effective tools for the detection of explosives in liquids; </li></ul><ul><li>Considers that the provisions of Commission Regulation (EC) No 1546/2006 have not been implemented uniformly and consistently at all airports within the European Union and asks that this implementation be carried out; </li></ul><ul><li>Notes the increased costs to airports and operators of implementing this regulation; </li></ul><ul><li>Notes in addition, whilst appreciating the need for high-quality security, the costs to aviation passengers resulting from the confiscation of private property as a result of the implementation of the regulation; </li></ul><ul><li>Recognises the substantial inconvenience and disruption caused to passengers, especially transit passengers, and operators by the regulation; </li></ul><ul><li>Is concerned that the costs engendered by the regulation may not be proportionate to the added value of the regulation in terms of additional security provisions obtained through its implementation; </li></ul><ul><li>Calls upon the Commission to review urgently and on an ongoing basis Regulation (EC) No 1546/2006 (introduction of liquids onto aircraft); </li></ul>
    6. 6. US National Research Council <ul><li>“ [T]here is not a consensus within the relevant scientific community nor on the committee regarding whether any behavioral surveillance … techniques are ready for use at all in the counterterrorist context ” </li></ul><ul><li>“ Automated identification of terrorists through data mining (or any other known methodology) is neither feasible as an objective nor desirable as a goal of technology development efforts. ” </li></ul>Protecting Individual Privacy in the Struggle Against Terrorists: A Framework for Program Assessment , National Academies Press, 2008 p.4
    7. 7. Strengthening the citizen’s voice <ul><li>Appropriate oversight by EDPS, LIBE, FRA etc. </li></ul><ul><li>Cross-programme application of fundamental rights (ESRIF Final Report, 2009) </li></ul><ul><ul><li>“ Development of methods … to detect web sites which should be blocked across the EU” p.58 </li></ul></ul><ul><ul><li>“ By monitoring and observing the behaviour of users a search engine for detecting suspicious behaviour patterns should be developed.” p.58 </li></ul></ul><ul><ul><li>“ By analyzing the data coming from the communications and activity patterns among potential terrorists and their contacts it is possible to prevent attacks or crimes from occurring.” p.61 </li></ul></ul>
    8. 8. ESRIF members

    ×