Your SlideShare is downloading. ×
Leveraging the INDECT Project: An Activist Strategy to Implement Privacy Ethics in EU-Funded Research
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×

Introducing the official SlideShare app

Stunning, full-screen experience for iPhone and Android

Text the download link to your phone

Standard text messaging rates apply

Leveraging the INDECT Project: An Activist Strategy to Implement Privacy Ethics in EU-Funded Research

389
views

Published on

3rd European Privacy Open Space …

3rd European Privacy Open Space
EuropHaus Wien
October 26, 2009


0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
389
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
3
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Leveraging the INDECT Project: An Activist Strategy to Implement Privacy Ethics in EU-Funded Research Eddan Katz International Affairs Director Electronic Frontier Foundation 3rd European Privacy Open Space EuropHaus Wien October 26, 2009Wednesday, December 29, 2010 1
  • 2. Digital Rights and/vs. the Knowledge Economy • Human Rights & Civil Liberties • Knowledge Economy • Privacy • Innovation • Contextual Integrity • Peer Production • Equality • Network Neutrality • Freedom of Expression • Open Infrastructure • Association • Collaboration • Anonymity • Interoperability • Due Process • Socio-Technical ArchitectureWednesday, December 29, 2010 2
  • 3. The Global Flow of Information •Wednesday, December 29, 2010 3
  • 4. Totality and Infinity in the Information Society • Open vs. Closed • Access vs. Control • User Rights vs. Intellectual Property • Privacy vs. Security • Competition vs. Monopoly • Anonymity vs. Identification • Entrepreneur vs. Incumbent • Transparency vs. State secrets • Exceptions vs. Enforcement • Commons vs. Proprietary • Human vs. Automation • Disintermediation vs. Centralization • Data Protection vs. Data • Circumvention vs. Lock Retention • Trust vs. Surveillance • Community vs. Corporate • Non-commercial vs. Monetized • Neutrality vs. Discrimination • Communication vs. Censorship • Information vs. Manufacturing • Freedom vs. FearWednesday, December 29, 2010 4
  • 5. Restoring the Paradigm of Due Process • Presumption of Innocence • Particularized Suspicion • Burden of Proof • Proportionality • Probable Cause • Right to Appeal • No prior restraint • Impartial JudgeWednesday, December 29, 2010 5
  • 6. The Surveillance Society • Panopticon (Bentham) • Balancing Tests (Lyon) • Omni-present surveillance • Coordination - how social relations reshaped • Disciplinary Power of the Gaze (Foucault) • Risk - risk management decision-making • Digitally Networked Environment • Privacy - socio-technical • Borderless Communication architecture • Information Intermediaries • Power - information assymetries and social • No sidewalks in Cyberspace conditioningWednesday, December 29, 2010 6
  • 7. Echelon and Data Mining • UK-USA Security Agreement [WWII] • Report on the Existence of a Global (Australia, Canada, New Zealand, UK, System for the Interception of Private and US) and Commercial Communications (ECHELON interception system). 2001/2098(INI). (11 July 2001). • Hierarchical Military Access to Intelligence Information • Voted on September 5, 2001 • Menwith Hill: Transborder surveillance of domestic citizens • Violation of Data Protection Directive • Industrial Espionage for Domestic • Fundamental Right to Privacy (Art. 8 Protectionism ECHR) • Data Mining Framework Inversion • Cryptography as a Means of Self- of Due Process ProtectionWednesday, December 29, 2010 7
  • 8. The 9/11 Paradigm Shift • Amplified Threat of Terrorist Violence • Continental Europe Strategic • Distortion of Balancing Tests Constraints • War and Security vs. Freedoms and Rights • Diplomatic Intelligence Reciprocity • Technology and Responsibility • No Effective Search • Autonomous Technics as out- of-Control • Governance & Ethics • Network EffectsWednesday, December 29, 2010 8
  • 9. EU INDECT Project • Intelligent information system supporting observation, searching and detection for security of citizens in urban environment • to develop a platform for: the registration and exchange of operational data, acquisition of multimedia content, intelligent processing of all information and automatic detection of threats and recognition of abnormal behaviour or violence • to develop the prototype of an integrated, network-centric system supporting the operational activities of police officers, providing techniques and tools for observation of various mobile objects • to develop a new type of search engine combining direct search of images and video based on watermarked contents, and the storage of metadata in the form of digital watermarksWednesday, December 29, 2010 9
  • 10. INDECT Project Funding & Launch • Framework Programme 7 • Research area: SEC-2007-1.2-01 Intelligent urban environment observation system • Start Date: 2009-01-01 • Duration: 60 months • Project Cost: 14.86 million euro • http://www.indect-project.eu/ • Beta Launch -> UEFA 2012 Championship (Poland/Ukraine)Wednesday, December 29, 2010 10
  • 11. Activist Intervention Proposal #1: Going Viral on the YouTube Video • Raising awareness by forwarding INDECT Project YouTube video to interested friends and colleagues and encouraging thoughtful and educating comments. • http://www.youtube.com/watch? v=dl5g93m-SbAWednesday, December 29, 2010 11
  • 12. INDECT Partners • AGH University of • MSWIA - General • Poznan University of • Technical University of Science and Headquarters of Police Technology (Poland) Ostrava (Czech Technology (Poland) - (Poland) http:// http:// Republic) http:// Project Coordinator www.policja.pl/ www.put.poznan.pl www.vsb.cz http://www.agh.edu.pl/ en • Moviquity (Spain) http:// • Universidad Carlos III • Technical University of www.moviquity.com/ de Madrid (Spain) Kosice (Slovakia) http:// • Gdansk University of webingles/index.htm http://www.uc3m.es www.tuke.sk/tuke? Technology (Poland) set_language=en&cl=en http://www.pg.gda.pl • PSI Transcom GmbH • Technical University of (Germany) http:// Sofia (Bulgaria) http:// • X-Art Pro Division • InnoTec DATA G.m.b.H. www.psi.de/ www.tu-sofia.bg G.m.b.H. (Austria) & Co. KG (Germany) http://www.x-art.at http://www.innotec- data.de • Police Service of • University of Wuppertal Northern Ireland (United (Germany) http:// • Fachhochschule Kingdom) http:// www.uni-wuppertal.de Technikum Wien • Grenoble INP (France) www.psni.police.uk/ (Austria) http:// http://www.grenoble- www.technikum-wien.at inp.fr • University of York (Great Britain) http:// www.york.ac.ukWednesday, December 29, 2010 12
  • 13. Activist Intervention Proposal #2: Make INDECT Project Deliverables Public •University Research Center Contacts • Computer Science research throughout the European-wide community can make sure that the project outcomes can be commented upon and criticized by tech & policy analysts. •York University Social Media Project • XML Data Corpus: Report on methodology for collection, cleaning and unified representation of large textual data from various sources: news reports, weblogs, chat • Highlighted on Wikileaks - Oct. 4, 2009. Made available publicly subsequently at http://indect-project.eu/files/Wednesday, December 29, 2010 13
  • 14. EU Security-Industrial Complex • Ben Hayes, Statewatch. “NeoConOpticon” • http://www.tni.org/en/report/neoconopticon • EU Security Research Program (7 yrs.) =1.4 bln Euros. • Funding of Applied Technology, Not Scientific Research • Industry Capture & Policy Laundering • Information Security industry growth • Systematic Concentration of Entrenched LobbyWednesday, December 29, 2010 14
  • 15. INDECT & Framework Program 7 Ethics Review • University Research Centers & Project Partners each have an ethics review reporting to INDECT Ethics Review Representative: • Drew Harris, Assistant Chief Constable, Crime Operations Department, Police Department of Northern Ireland • DG Research: Dir. L (Science, Economy, & Society), Unit 3 (Governance & Ethics) • Exclusion from funding: cloning, genetic manipulation. • Ethical Issues: Research on Human Beings; Privacy and Data Collection; Use of Animals; Research Involving Developing Countries; Dual UseWednesday, December 29, 2010 15
  • 16. Activist Intervention Proposal #3: Introduce External Ethics Review and Opinion •DG Research - Governance & Ethics Unit Continuous Reporting Review •Provide Technology, Law, & Policy experts for outsourced review. SINAPSE •European Data Protection Supervisor •Article 46 (e) - exert prior notification & monitoring developmentsWednesday, December 29, 2010 16
  • 17. Re-identification & the Private/Commercial Transfer to Law Enforcement of Potentially Identifiable Information • Data can either be useful or perfectly anonymous but never both. (Paul Ohm) • Compelled Transfer of Personal Data for National Security and Law Enforcement Reasons • Behavioral Targeting Advertising supporting web growth • Data Mining Providing Commercially Valuable DataWednesday, December 29, 2010 17
  • 18. Activist Intervention Proposal #4: Institutionalize Privacy Ethics for Contextual Integrity • Framework Program Review 7 Mid-Term Review (2010) • Insufficient focus on privacy ethics beyond Data Protection Directive • Institutionalize privacy ethics guidelines for EU-funded security research • Internal Support from Governance & Ethics Unit • Data Protection Directive Consultation (Dec. 31, 2009) • Potentially Identifiable Information • Higher Standard of Privacy Ethics for Research • Preserving Contextual Integrity between Commercial & Law EnforcementWednesday, December 29, 2010 18
  • 19. • Please Support EFF: http://www.eff.org/support • eddan@eff.orgWednesday, December 29, 2010 19