SlideShare a Scribd company logo
1 of 19
Download to read offline
Leveraging the INDECT Project:
      An Activist Strategy to Implement
      Privacy Ethics in EU-Funded Research
               Eddan Katz
               International Affairs Director
               Electronic Frontier Foundation

               3rd European Privacy Open Space
               EuropHaus Wien
               October 26, 2009




Wednesday, December 29, 2010                     1
Digital Rights and/vs. the Knowledge Economy

      • Human Rights & Civil Liberties    • Knowledge Economy

            • Privacy                       • Innovation

                 • Contextual Integrity        • Peer Production

                 • Equality                    • Network Neutrality

            • Freedom of Expression         • Open Infrastructure

                 • Association                 • Collaboration

                 • Anonymity                   • Interoperability

            • Due Process                   • Socio-Technical Architecture




Wednesday, December 29, 2010                                                 2
The Global Flow of Information



                               •




Wednesday, December 29, 2010           3
Totality and Infinity in the Information Society
      • Open vs. Closed                 • Access vs. Control               • User Rights vs. Intellectual
                                                                             Property

      • Privacy vs. Security            • Competition vs. Monopoly
                                                                           • Anonymity vs. Identification

      • Entrepreneur vs. Incumbent      • Transparency vs. State secrets
                                                                           • Exceptions vs. Enforcement

      • Commons vs. Proprietary         • Human vs. Automation
                                                                           • Disintermediation vs.
                                                                             Centralization
      • Data Protection vs. Data        • Circumvention vs. Lock
        Retention
                                                                           • Trust vs. Surveillance
                                        • Community vs. Corporate
      • Non-commercial vs. Monetized
                                                                           • Neutrality vs. Discrimination
                                        • Communication vs. Censorship
      • Information vs. Manufacturing
                                                                           • Freedom vs. Fear




Wednesday, December 29, 2010                                                                                 4
Restoring the Paradigm of Due Process



      • Presumption of Innocence   • Particularized Suspicion


      • Burden of Proof            • Proportionality


      • Probable Cause             • Right to Appeal


      • No prior restraint         • Impartial Judge




Wednesday, December 29, 2010                                    5
The Surveillance Society

      • Panopticon (Bentham)                   • Balancing Tests (Lyon)

            • Omni-present surveillance          • Coordination - how social
                                                   relations reshaped
            • Disciplinary Power of the Gaze
              (Foucault)
                                                 • Risk - risk management
                                                   decision-making
      • Digitally Networked Environment
                                                 • Privacy - socio-technical
            • Borderless Communication             architecture

            • Information Intermediaries
                                                 • Power - information
                                                   assymetries and social
            • No sidewalks in Cyberspace           conditioning




Wednesday, December 29, 2010                                                   6
Echelon and Data Mining

      • UK-USA Security Agreement [WWII]          • Report on the Existence of a Global
        (Australia, Canada, New Zealand, UK,        System for the Interception of Private
        and US)                                     and Commercial Communications
                                                    (ECHELON interception system).
                                                    2001/2098(INI). (11 July 2001).
            • Hierarchical Military Access to
              Intelligence Information
                                                     • Voted on September 5, 2001
            • Menwith Hill: Transborder
              surveillance of domestic citizens   • Violation of Data Protection Directive

            • Industrial Espionage for Domestic   • Fundamental Right to Privacy (Art. 8
              Protectionism                         ECHR)

            • Data Mining Framework Inversion     • Cryptography as a Means of Self-
              of Due Process                        Protection




Wednesday, December 29, 2010                                                                 7
The 9/11 Paradigm Shift

      • Amplified Threat of Terrorist
        Violence

                                                 • Continental Europe Strategic
            • Distortion of Balancing Tests        Constraints

                 • War and Security vs.
                   Freedoms and Rights             • Diplomatic Intelligence
                                                     Reciprocity
            • Technology and Responsibility
                                                   • No Effective Search
                 • Autonomous Technics as out-
                   of-Control                      • Governance & Ethics

                 • Network Effects



Wednesday, December 29, 2010                                                      8
EU INDECT Project
               • Intelligent information system supporting
                 observation, searching and detection for security
                 of citizens in urban environment
                    • to develop a platform for: the registration and exchange of operational
                      data, acquisition of multimedia content, intelligent processing of all
                      information and automatic detection of threats and recognition of
                      abnormal behaviour or violence

                    • to develop the prototype of an integrated, network-centric system
                      supporting the operational activities of police officers, providing
                      techniques and tools for observation of various mobile objects

                    • to develop a new type of search engine combining direct search of
                      images and video based on watermarked contents, and the storage of
                      metadata in the form of digital watermarks




Wednesday, December 29, 2010                                                                    9
INDECT Project Funding & Launch

      • Framework Programme 7


      • Research area: SEC-2007-1.2-01 Intelligent urban environment observation system


            • Start Date: 2009-01-01

            • Duration: 60 months

            • Project Cost: 14.86 million euro

      •                                http://www.indect-project.eu/


      • Beta Launch -> UEFA 2012 Championship (Poland/Ukraine)




Wednesday, December 29, 2010                                                              10
Activist Intervention Proposal #1:
      Going Viral on the YouTube Video

      • Raising awareness by forwarding INDECT
            Project YouTube video to interested
         friends and colleagues and encouraging
           thoughtful and educating comments.

      •                  http://www.youtube.com/watch?
                                 v=dl5g93m-SbA



Wednesday, December 29, 2010                             11
INDECT Partners
               •   AGH University of        •   MSWIA - General             •   Poznan University of        •   Technical University of
                   Science and                  Headquarters of Police          Technology (Poland)             Ostrava (Czech
                   Technology (Poland) -        (Poland) http://                http://                         Republic) http://
                   Project Coordinator          www.policja.pl/                 www.put.poznan.pl               www.vsb.cz
                   http://www.agh.edu.pl/
                   en

                                            •   Moviquity (Spain) http://   •   Universidad Carlos III      •   Technical University of
                                                www.moviquity.com/              de Madrid (Spain)               Kosice (Slovakia) http://
               •   Gdansk University of         webingles/index.htm             http://www.uc3m.es              www.tuke.sk/tuke?
                   Technology (Poland)                                                                          set_language=en&cl=en
                   http://www.pg.gda.pl

                                            •   PSI Transcom GmbH           •   Technical University of
                                                (Germany) http://               Sofia (Bulgaria) http://     •   X-Art Pro Division
               •   InnoTec DATA G.m.b.H.        www.psi.de/                     www.tu-sofia.bg                  G.m.b.H. (Austria)
                   & Co. KG (Germany)                                                                           http://www.x-art.at
                   http://www.innotec-
                   data.de
                                            •   Police Service of           •   University of Wuppertal
                                                Northern Ireland (United        (Germany) http://           •   Fachhochschule
                                                Kingdom) http://                www.uni-wuppertal.de            Technikum Wien
               •   Grenoble INP (France)        www.psni.police.uk/                                             (Austria) http://
                   http://www.grenoble-                                                                         www.technikum-wien.at
                   inp.fr
                                                                            •   University of York (Great
                                                                                Britain) http://
                                                                                www.york.ac.uk




Wednesday, December 29, 2010                                                                                                                12
Activist Intervention Proposal #2:
      Make INDECT Project Deliverables Public

                    •University Research Center Contacts
                          • Computer Science research throughout the European-wide
                            community can make sure that the project outcomes can be
                            commented upon and criticized by tech & policy analysts.


                    •York University Social Media Project

                          • XML Data Corpus: Report on methodology for collection,
                            cleaning and unified representation of large textual data from
                            various sources: news reports, weblogs, chat

                          • Highlighted on Wikileaks - Oct. 4, 2009. Made available
                            publicly subsequently at http://indect-project.eu/files/



Wednesday, December 29, 2010                                                                13
EU Security-Industrial Complex

      • Ben Hayes, Statewatch. “NeoConOpticon”
            • http://www.tni.org/en/report/neoconopticon


      • EU Security Research Program (7 yrs.) =1.4 bln Euros.
            • Funding of Applied Technology, Not Scientific Research

            • Industry Capture & Policy Laundering

            • Information Security industry growth


      • Systematic Concentration of Entrenched Lobby



Wednesday, December 29, 2010                                          14
INDECT & Framework Program 7 Ethics Review

      • University Research Centers & Project Partners each have an ethics review reporting
        to INDECT Ethics Review Representative:


            • Drew Harris, Assistant Chief Constable, Crime Operations Department, Police
              Department of Northern Ireland


      • DG Research: Dir. L (Science, Economy, & Society), Unit 3 (Governance & Ethics)

            • Exclusion from funding: cloning, genetic manipulation.


            • Ethical Issues: Research on Human Beings; Privacy and Data Collection; Use of
              Animals; Research Involving Developing Countries; Dual Use




Wednesday, December 29, 2010                                                                  15
Activist Intervention Proposal #3:
      Introduce External Ethics Review and Opinion

      •DG Research - Governance & Ethics Unit Continuous
       Reporting Review

      •Provide Technology, Law, & Policy experts for
       outsourced review. SINAPSE

      •European Data Protection Supervisor

            •Article 46 (e) - exert prior notification & monitoring
             developments



Wednesday, December 29, 2010                                         16
Re-identification & the Private/Commercial Transfer to
      Law Enforcement of Potentially Identifiable Information

      • Data can either be useful or perfectly anonymous but
        never both. (Paul Ohm)

      • Compelled Transfer of Personal Data for National
        Security and Law Enforcement Reasons

      • Behavioral Targeting Advertising supporting web growth

      • Data Mining Providing Commercially Valuable Data




Wednesday, December 29, 2010                                     17
Activist Intervention Proposal #4:
      Institutionalize Privacy Ethics for Contextual Integrity

      • Framework Program Review 7 Mid-Term Review (2010)

            • Insufficient focus on privacy ethics beyond Data Protection Directive

            • Institutionalize privacy ethics guidelines for EU-funded security research

            • Internal Support from Governance & Ethics Unit

      • Data Protection Directive Consultation (Dec. 31, 2009)

            • Potentially Identifiable Information

            • Higher Standard of Privacy Ethics for Research

            • Preserving Contextual Integrity between Commercial & Law Enforcement



Wednesday, December 29, 2010                                                               18
• Please Support EFF: http://www.eff.org/support

            • eddan@eff.org




Wednesday, December 29, 2010                             19

More Related Content

What's hot

Civilization and its disconnects
Civilization and its disconnectsCivilization and its disconnects
Civilization and its disconnectsDavid Patman
 
Embedded & Tangible Interaction Design
Embedded & Tangible Interaction DesignEmbedded & Tangible Interaction Design
Embedded & Tangible Interaction DesignDave Shaw
 
yonas bishaw information society-evolvement
yonas bishaw information society-evolvementyonas bishaw information society-evolvement
yonas bishaw information society-evolvementyonasbishaw
 
Presentatie internet of things voor ngi en ieee op 5 juni 213 door ben van lier
Presentatie internet of things voor ngi en ieee op 5 juni 213 door ben van lierPresentatie internet of things voor ngi en ieee op 5 juni 213 door ben van lier
Presentatie internet of things voor ngi en ieee op 5 juni 213 door ben van lierRichard Koppen
 
What is information?
What is information?What is information?
What is information?Johan Koren
 
Digital technologies and traditional Cultural Expressions: A Positive Look at...
Digital technologies and traditional Cultural Expressions: A Positive Look at...Digital technologies and traditional Cultural Expressions: A Positive Look at...
Digital technologies and traditional Cultural Expressions: A Positive Look at...Asliza Hamzah
 

What's hot (9)

Civilization and its disconnects
Civilization and its disconnectsCivilization and its disconnects
Civilization and its disconnects
 
Embedded & Tangible Interaction Design
Embedded & Tangible Interaction DesignEmbedded & Tangible Interaction Design
Embedded & Tangible Interaction Design
 
yonas bishaw information society-evolvement
yonas bishaw information society-evolvementyonas bishaw information society-evolvement
yonas bishaw information society-evolvement
 
Multimedia Privacy
Multimedia PrivacyMultimedia Privacy
Multimedia Privacy
 
Presentatie internet of things voor ngi en ieee op 5 juni 213 door ben van lier
Presentatie internet of things voor ngi en ieee op 5 juni 213 door ben van lierPresentatie internet of things voor ngi en ieee op 5 juni 213 door ben van lier
Presentatie internet of things voor ngi en ieee op 5 juni 213 door ben van lier
 
What is information?
What is information?What is information?
What is information?
 
Chapter one
Chapter oneChapter one
Chapter one
 
Copyright Technology 101
Copyright Technology 101Copyright Technology 101
Copyright Technology 101
 
Digital technologies and traditional Cultural Expressions: A Positive Look at...
Digital technologies and traditional Cultural Expressions: A Positive Look at...Digital technologies and traditional Cultural Expressions: A Positive Look at...
Digital technologies and traditional Cultural Expressions: A Positive Look at...
 

Viewers also liked

Freecultureforum barcelona2009 acta
Freecultureforum barcelona2009 actaFreecultureforum barcelona2009 acta
Freecultureforum barcelona2009 actaEddan Katz
 
Copyrightcontraband cepe2007
Copyrightcontraband cepe2007Copyrightcontraband cepe2007
Copyrightcontraband cepe2007Eddan Katz
 
Thainetizennetwork slides day1
Thainetizennetwork slides day1Thainetizennetwork slides day1
Thainetizennetwork slides day1Eddan Katz
 
Mapping A2K Advocacy: Towards a Coalition Against ACTA
Mapping A2K Advocacy:Towards a Coalition Against ACTAMapping A2K Advocacy:Towards a Coalition Against ACTA
Mapping A2K Advocacy: Towards a Coalition Against ACTAEddan Katz
 
Tacdconference actaslides
Tacdconference actaslidesTacdconference actaslides
Tacdconference actaslidesEddan Katz
 
Computer Crimes: An American Case Study
Computer Crimes: An American Case StudyComputer Crimes: An American Case Study
Computer Crimes: An American Case StudyEddan Katz
 
Copyrightcontraband
CopyrightcontrabandCopyrightcontraband
CopyrightcontrabandEddan Katz
 

Viewers also liked (8)

Freecultureforum barcelona2009 acta
Freecultureforum barcelona2009 actaFreecultureforum barcelona2009 acta
Freecultureforum barcelona2009 acta
 
Copyrightcontraband cepe2007
Copyrightcontraband cepe2007Copyrightcontraband cepe2007
Copyrightcontraband cepe2007
 
A2krussia
A2krussiaA2krussia
A2krussia
 
Thainetizennetwork slides day1
Thainetizennetwork slides day1Thainetizennetwork slides day1
Thainetizennetwork slides day1
 
Mapping A2K Advocacy: Towards a Coalition Against ACTA
Mapping A2K Advocacy:Towards a Coalition Against ACTAMapping A2K Advocacy:Towards a Coalition Against ACTA
Mapping A2K Advocacy: Towards a Coalition Against ACTA
 
Tacdconference actaslides
Tacdconference actaslidesTacdconference actaslides
Tacdconference actaslides
 
Computer Crimes: An American Case Study
Computer Crimes: An American Case StudyComputer Crimes: An American Case Study
Computer Crimes: An American Case Study
 
Copyrightcontraband
CopyrightcontrabandCopyrightcontraband
Copyrightcontraband
 

Similar to Leveraging the INDECT Project: An Activist Strategy to Implement Privacy Ethics in EU-Funded Research

idigf - hukum - ui - edmon makarim
idigf - hukum - ui - edmon makarimidigf - hukum - ui - edmon makarim
idigf - hukum - ui - edmon makarimIGF Indonesia
 
Issues: What the Web Can Tell us About Human Behavior
Issues: What the Web Can Tell us About Human BehaviorIssues: What the Web Can Tell us About Human Behavior
Issues: What the Web Can Tell us About Human Behaviorgloriakt
 
2021-02-10_CogSecCollab_UBerkeley
2021-02-10_CogSecCollab_UBerkeley2021-02-10_CogSecCollab_UBerkeley
2021-02-10_CogSecCollab_UBerkeleySara-Jayne Terp
 
Distributed defense against disinformation: disinformation risk management an...
Distributed defense against disinformation: disinformation risk management an...Distributed defense against disinformation: disinformation risk management an...
Distributed defense against disinformation: disinformation risk management an...Sara-Jayne Terp
 
Will technology set us free
Will technology set us freeWill technology set us free
Will technology set us freeMathias Klang
 
Privacy by design
Privacy by designPrivacy by design
Privacy by designblogzilla
 
Where next for encryption regulation?
Where next for encryption regulation?Where next for encryption regulation?
Where next for encryption regulation?blogzilla
 
Cybersecurity Strategies - time for the next generation
Cybersecurity Strategies - time for the next generationCybersecurity Strategies - time for the next generation
Cybersecurity Strategies - time for the next generationHinne Hettema
 
Internet Science
Internet ScienceInternet Science
Internet Sciencei_scienceEU
 
Singularity Summit 2009 Recap
Singularity Summit 2009 RecapSingularity Summit 2009 Recap
Singularity Summit 2009 RecapSandy Santra
 
The death of data protection
The death of data protection The death of data protection
The death of data protection Lilian Edwards
 
The death of data protection sans obama
The death of data protection sans obamaThe death of data protection sans obama
The death of data protection sans obamaLilian Edwards
 
Summer Social Webshop: Technology-Mediated Social Participation
Summer Social Webshop: Technology-Mediated Social ParticipationSummer Social Webshop: Technology-Mediated Social Participation
Summer Social Webshop: Technology-Mediated Social ParticipationUniversity of Maryland
 
Functional anonymisation - risk management in a data environment
Functional anonymisation - risk management in a data environmentFunctional anonymisation - risk management in a data environment
Functional anonymisation - risk management in a data environmentJisc
 
Privacy by Design (ECREA Preconference 12)
Privacy by Design (ECREA Preconference 12)Privacy by Design (ECREA Preconference 12)
Privacy by Design (ECREA Preconference 12)lbaruh
 

Similar to Leveraging the INDECT Project: An Activist Strategy to Implement Privacy Ethics in EU-Funded Research (20)

idigf - hukum - ui - edmon makarim
idigf - hukum - ui - edmon makarimidigf - hukum - ui - edmon makarim
idigf - hukum - ui - edmon makarim
 
Jacques Bus F I I R L Presentation J B
Jacques  Bus  F I  I R L  Presentation  J BJacques  Bus  F I  I R L  Presentation  J B
Jacques Bus F I I R L Presentation J B
 
Issues: What the Web Can Tell us About Human Behavior
Issues: What the Web Can Tell us About Human BehaviorIssues: What the Web Can Tell us About Human Behavior
Issues: What the Web Can Tell us About Human Behavior
 
Sovereignty in Cyberspace
Sovereignty in CyberspaceSovereignty in Cyberspace
Sovereignty in Cyberspace
 
2021-02-10_CogSecCollab_UBerkeley
2021-02-10_CogSecCollab_UBerkeley2021-02-10_CogSecCollab_UBerkeley
2021-02-10_CogSecCollab_UBerkeley
 
Distributed defense against disinformation: disinformation risk management an...
Distributed defense against disinformation: disinformation risk management an...Distributed defense against disinformation: disinformation risk management an...
Distributed defense against disinformation: disinformation risk management an...
 
Gérald Santucci
Gérald SantucciGérald Santucci
Gérald Santucci
 
Will technology set us free
Will technology set us freeWill technology set us free
Will technology set us free
 
Privacy by design
Privacy by designPrivacy by design
Privacy by design
 
Privacy and Surveillance
Privacy and SurveillancePrivacy and Surveillance
Privacy and Surveillance
 
Where next for encryption regulation?
Where next for encryption regulation?Where next for encryption regulation?
Where next for encryption regulation?
 
Cybersecurity Strategies - time for the next generation
Cybersecurity Strategies - time for the next generationCybersecurity Strategies - time for the next generation
Cybersecurity Strategies - time for the next generation
 
net neutrality
net neutralitynet neutrality
net neutrality
 
Internet Science
Internet ScienceInternet Science
Internet Science
 
Singularity Summit 2009 Recap
Singularity Summit 2009 RecapSingularity Summit 2009 Recap
Singularity Summit 2009 Recap
 
The death of data protection
The death of data protection The death of data protection
The death of data protection
 
The death of data protection sans obama
The death of data protection sans obamaThe death of data protection sans obama
The death of data protection sans obama
 
Summer Social Webshop: Technology-Mediated Social Participation
Summer Social Webshop: Technology-Mediated Social ParticipationSummer Social Webshop: Technology-Mediated Social Participation
Summer Social Webshop: Technology-Mediated Social Participation
 
Functional anonymisation - risk management in a data environment
Functional anonymisation - risk management in a data environmentFunctional anonymisation - risk management in a data environment
Functional anonymisation - risk management in a data environment
 
Privacy by Design (ECREA Preconference 12)
Privacy by Design (ECREA Preconference 12)Privacy by Design (ECREA Preconference 12)
Privacy by Design (ECREA Preconference 12)
 

Leveraging the INDECT Project: An Activist Strategy to Implement Privacy Ethics in EU-Funded Research

  • 1. Leveraging the INDECT Project: An Activist Strategy to Implement Privacy Ethics in EU-Funded Research Eddan Katz International Affairs Director Electronic Frontier Foundation 3rd European Privacy Open Space EuropHaus Wien October 26, 2009 Wednesday, December 29, 2010 1
  • 2. Digital Rights and/vs. the Knowledge Economy • Human Rights & Civil Liberties • Knowledge Economy • Privacy • Innovation • Contextual Integrity • Peer Production • Equality • Network Neutrality • Freedom of Expression • Open Infrastructure • Association • Collaboration • Anonymity • Interoperability • Due Process • Socio-Technical Architecture Wednesday, December 29, 2010 2
  • 3. The Global Flow of Information • Wednesday, December 29, 2010 3
  • 4. Totality and Infinity in the Information Society • Open vs. Closed • Access vs. Control • User Rights vs. Intellectual Property • Privacy vs. Security • Competition vs. Monopoly • Anonymity vs. Identification • Entrepreneur vs. Incumbent • Transparency vs. State secrets • Exceptions vs. Enforcement • Commons vs. Proprietary • Human vs. Automation • Disintermediation vs. Centralization • Data Protection vs. Data • Circumvention vs. Lock Retention • Trust vs. Surveillance • Community vs. Corporate • Non-commercial vs. Monetized • Neutrality vs. Discrimination • Communication vs. Censorship • Information vs. Manufacturing • Freedom vs. Fear Wednesday, December 29, 2010 4
  • 5. Restoring the Paradigm of Due Process • Presumption of Innocence • Particularized Suspicion • Burden of Proof • Proportionality • Probable Cause • Right to Appeal • No prior restraint • Impartial Judge Wednesday, December 29, 2010 5
  • 6. The Surveillance Society • Panopticon (Bentham) • Balancing Tests (Lyon) • Omni-present surveillance • Coordination - how social relations reshaped • Disciplinary Power of the Gaze (Foucault) • Risk - risk management decision-making • Digitally Networked Environment • Privacy - socio-technical • Borderless Communication architecture • Information Intermediaries • Power - information assymetries and social • No sidewalks in Cyberspace conditioning Wednesday, December 29, 2010 6
  • 7. Echelon and Data Mining • UK-USA Security Agreement [WWII] • Report on the Existence of a Global (Australia, Canada, New Zealand, UK, System for the Interception of Private and US) and Commercial Communications (ECHELON interception system). 2001/2098(INI). (11 July 2001). • Hierarchical Military Access to Intelligence Information • Voted on September 5, 2001 • Menwith Hill: Transborder surveillance of domestic citizens • Violation of Data Protection Directive • Industrial Espionage for Domestic • Fundamental Right to Privacy (Art. 8 Protectionism ECHR) • Data Mining Framework Inversion • Cryptography as a Means of Self- of Due Process Protection Wednesday, December 29, 2010 7
  • 8. The 9/11 Paradigm Shift • Amplified Threat of Terrorist Violence • Continental Europe Strategic • Distortion of Balancing Tests Constraints • War and Security vs. Freedoms and Rights • Diplomatic Intelligence Reciprocity • Technology and Responsibility • No Effective Search • Autonomous Technics as out- of-Control • Governance & Ethics • Network Effects Wednesday, December 29, 2010 8
  • 9. EU INDECT Project • Intelligent information system supporting observation, searching and detection for security of citizens in urban environment • to develop a platform for: the registration and exchange of operational data, acquisition of multimedia content, intelligent processing of all information and automatic detection of threats and recognition of abnormal behaviour or violence • to develop the prototype of an integrated, network-centric system supporting the operational activities of police officers, providing techniques and tools for observation of various mobile objects • to develop a new type of search engine combining direct search of images and video based on watermarked contents, and the storage of metadata in the form of digital watermarks Wednesday, December 29, 2010 9
  • 10. INDECT Project Funding & Launch • Framework Programme 7 • Research area: SEC-2007-1.2-01 Intelligent urban environment observation system • Start Date: 2009-01-01 • Duration: 60 months • Project Cost: 14.86 million euro • http://www.indect-project.eu/ • Beta Launch -> UEFA 2012 Championship (Poland/Ukraine) Wednesday, December 29, 2010 10
  • 11. Activist Intervention Proposal #1: Going Viral on the YouTube Video • Raising awareness by forwarding INDECT Project YouTube video to interested friends and colleagues and encouraging thoughtful and educating comments. • http://www.youtube.com/watch? v=dl5g93m-SbA Wednesday, December 29, 2010 11
  • 12. INDECT Partners • AGH University of • MSWIA - General • Poznan University of • Technical University of Science and Headquarters of Police Technology (Poland) Ostrava (Czech Technology (Poland) - (Poland) http:// http:// Republic) http:// Project Coordinator www.policja.pl/ www.put.poznan.pl www.vsb.cz http://www.agh.edu.pl/ en • Moviquity (Spain) http:// • Universidad Carlos III • Technical University of www.moviquity.com/ de Madrid (Spain) Kosice (Slovakia) http:// • Gdansk University of webingles/index.htm http://www.uc3m.es www.tuke.sk/tuke? Technology (Poland) set_language=en&cl=en http://www.pg.gda.pl • PSI Transcom GmbH • Technical University of (Germany) http:// Sofia (Bulgaria) http:// • X-Art Pro Division • InnoTec DATA G.m.b.H. www.psi.de/ www.tu-sofia.bg G.m.b.H. (Austria) & Co. KG (Germany) http://www.x-art.at http://www.innotec- data.de • Police Service of • University of Wuppertal Northern Ireland (United (Germany) http:// • Fachhochschule Kingdom) http:// www.uni-wuppertal.de Technikum Wien • Grenoble INP (France) www.psni.police.uk/ (Austria) http:// http://www.grenoble- www.technikum-wien.at inp.fr • University of York (Great Britain) http:// www.york.ac.uk Wednesday, December 29, 2010 12
  • 13. Activist Intervention Proposal #2: Make INDECT Project Deliverables Public •University Research Center Contacts • Computer Science research throughout the European-wide community can make sure that the project outcomes can be commented upon and criticized by tech & policy analysts. •York University Social Media Project • XML Data Corpus: Report on methodology for collection, cleaning and unified representation of large textual data from various sources: news reports, weblogs, chat • Highlighted on Wikileaks - Oct. 4, 2009. Made available publicly subsequently at http://indect-project.eu/files/ Wednesday, December 29, 2010 13
  • 14. EU Security-Industrial Complex • Ben Hayes, Statewatch. “NeoConOpticon” • http://www.tni.org/en/report/neoconopticon • EU Security Research Program (7 yrs.) =1.4 bln Euros. • Funding of Applied Technology, Not Scientific Research • Industry Capture & Policy Laundering • Information Security industry growth • Systematic Concentration of Entrenched Lobby Wednesday, December 29, 2010 14
  • 15. INDECT & Framework Program 7 Ethics Review • University Research Centers & Project Partners each have an ethics review reporting to INDECT Ethics Review Representative: • Drew Harris, Assistant Chief Constable, Crime Operations Department, Police Department of Northern Ireland • DG Research: Dir. L (Science, Economy, & Society), Unit 3 (Governance & Ethics) • Exclusion from funding: cloning, genetic manipulation. • Ethical Issues: Research on Human Beings; Privacy and Data Collection; Use of Animals; Research Involving Developing Countries; Dual Use Wednesday, December 29, 2010 15
  • 16. Activist Intervention Proposal #3: Introduce External Ethics Review and Opinion •DG Research - Governance & Ethics Unit Continuous Reporting Review •Provide Technology, Law, & Policy experts for outsourced review. SINAPSE •European Data Protection Supervisor •Article 46 (e) - exert prior notification & monitoring developments Wednesday, December 29, 2010 16
  • 17. Re-identification & the Private/Commercial Transfer to Law Enforcement of Potentially Identifiable Information • Data can either be useful or perfectly anonymous but never both. (Paul Ohm) • Compelled Transfer of Personal Data for National Security and Law Enforcement Reasons • Behavioral Targeting Advertising supporting web growth • Data Mining Providing Commercially Valuable Data Wednesday, December 29, 2010 17
  • 18. Activist Intervention Proposal #4: Institutionalize Privacy Ethics for Contextual Integrity • Framework Program Review 7 Mid-Term Review (2010) • Insufficient focus on privacy ethics beyond Data Protection Directive • Institutionalize privacy ethics guidelines for EU-funded security research • Internal Support from Governance & Ethics Unit • Data Protection Directive Consultation (Dec. 31, 2009) • Potentially Identifiable Information • Higher Standard of Privacy Ethics for Research • Preserving Contextual Integrity between Commercial & Law Enforcement Wednesday, December 29, 2010 18
  • 19. • Please Support EFF: http://www.eff.org/support • eddan@eff.org Wednesday, December 29, 2010 19