SlideShare a Scribd company logo
Current and future mass
surveillance threats
...and why surveillance doesn’t work
Arianit Dobroshi
This work is licensed under a Creative Commons
Attribution 4.0 International License.
Threats
- A western threat
- Internet
- Metadata retention
- Complete take
- Mobile
- IMEI and SIM registration
- Mobile com MITM attack
- Passenger name records
Necessary and proportionate
- International Principles on the Application of Human
Rights to Communications Surveillance
- Efficacy
- Cross-border transfer
- Necessity
- Proportionality
- US Court: "such an expansive concept of
'relevance' is unprecedented and unwarranted.''
Why mass surveillance is ineffective
- Math: False positives
- Case in point: since 9/11 10$ b/year, one tiny success
- There was mass surveillance before 9/11
- Implications: One thing for Amazon to suggest the wrong
product, another to be marked for surveillance
Kosovo timeline
- Dec. 2012: 1st
draft turned down
- Apr. 2014: CJEU Ruling
- Apr. 2014: 2nd
draft
- Dec. 2014: 2nd
draft resubmitted
- Jan. 2015: turn-down at the Committee and Parliament
- New drafting
- May: 15: Good draft
- Currently: slightly worse draft
- Committee vote today
Our objections 1
- Interception interfaces
- Legal basis
- Data retention
- Authorized institutions loophole
- Purpose
- Notification
Our objections 2
- Interception assistance
- Records of interception
- Penalties for violations of privacy
- Anonymity is also privacy and should not be violated
without a court order
- Software be open source to ensure it does as
mandated
How to fight back?
- Winning is possible
- Engage early, slow down the process
- Send comments during public consultation
- Make allies in the parliamentary committee
- Ombudsperson
- CSOs (too focused, project driven)
- Journalists
- Lawyers
- Int’l privacy advocates: EDRi, Privacy International, EFF
- MEPs: alternative voices in the EU
 Parliamentary questions
Technical solutions
- Encrypt all the web
- Self-hosting
- PGP-based encryption
- 1 full-time person
- Tor
- 4G > 3 G > 2g
- Snowden: "Encryption works. Properly implemented strong crypto systems
are one of the few things that you can rely on.”
Thank you!
CryptoParty tomorrow
Come prepared!
arianit@gmail.com
@arianitd

More Related Content

What's hot

Wikileaks freedom of speech on the internet
Wikileaks freedom of speech on the internetWikileaks freedom of speech on the internet
Wikileaks freedom of speech on the internet
Vincy
 
Music Piracy
Music PiracyMusic Piracy
Music Piracy
guest7e8645
 
File000165
File000165File000165
File000165
Desmond Devendran
 
File000159
File000159File000159
File000159
Desmond Devendran
 
Policy and Technical Solutions for Online Cross-Border Legal Problems in Asia
Policy and Technical Solutions for Online Cross-Border Legal Problems in AsiaPolicy and Technical Solutions for Online Cross-Border Legal Problems in Asia
Policy and Technical Solutions for Online Cross-Border Legal Problems in Asia
APNIC
 
[Privacy and IT Ethics Presentation] Chapter 3: The Forth Amendment and emer...
[Privacy and IT Ethics Presentation] Chapter 3: The Forth Amendment and emer...[Privacy and IT Ethics Presentation] Chapter 3: The Forth Amendment and emer...
[Privacy and IT Ethics Presentation] Chapter 3: The Forth Amendment and emer...
Duc Lai Trung Minh
 
Communications Privacy and the State
Communications Privacy and the StateCommunications Privacy and the State
Communications Privacy and the State
Graham Smith
 
Justice wide open - communities and courts
Justice wide open - communities and courtsJustice wide open - communities and courts
Justice wide open - communities and courts
william perrin
 
Net neutrality & it’s legal issues
Net neutrality & it’s legal issuesNet neutrality & it’s legal issues
Net neutrality & it’s legal issues
mruns_96
 
Explain in brief the enforcement of Data Protection. [#26]
Explain in brief the enforcement of Data Protection. [#26]Explain in brief the enforcement of Data Protection. [#26]
Explain in brief the enforcement of Data Protection. [#26]
Kamal Thakur
 
Legal and privacy implications of IoT
Legal and privacy implications of IoTLegal and privacy implications of IoT
Legal and privacy implications of IoT
Andres Guadamuz
 
Kerja kursus ting.4 (ict)
Kerja kursus ting.4 (ict)Kerja kursus ting.4 (ict)
Kerja kursus ting.4 (ict)
Nor Shamsiah
 
Graham Smith - Internet and eCommerce Law Review 2017
Graham Smith - Internet and eCommerce Law Review 2017Graham Smith - Internet and eCommerce Law Review 2017
Graham Smith - Internet and eCommerce Law Review 2017
Graham Smith
 
The free legal info landscape: treacherous quagmire or inspiring view?
The free legal info landscape: treacherous quagmire or inspiring view? The free legal info landscape: treacherous quagmire or inspiring view?
The free legal info landscape: treacherous quagmire or inspiring view?
Emily Allbon
 
Apresentação de Jeanette Hofmann
Apresentação de Jeanette HofmannApresentação de Jeanette Hofmann
Apresentação de Jeanette Hofmann
Fórum da Internet no Brasil
 
Internet Corporate Responsibility
Internet Corporate ResponsibilityInternet Corporate Responsibility
Internet Corporate Responsibility
Charles Mok
 
Anti-circumvention and ISP liability provisions in Free Trade Agreements.
Anti-circumvention and ISP liability provisions in Free Trade Agreements.Anti-circumvention and ISP liability provisions in Free Trade Agreements.
Anti-circumvention and ISP liability provisions in Free Trade Agreements.
blogzilla
 
Privacy, human rights and Location Based Services
Privacy, human rights and Location Based ServicesPrivacy, human rights and Location Based Services
Privacy, human rights and Location Based Services
blogzilla
 
State of the Internet
State of the InternetState of the Internet
State of the Internet
Charles Mok
 
Intellectual Property in Cyberspace
Intellectual Property in CyberspaceIntellectual Property in Cyberspace
Intellectual Property in Cyberspace
Mindaugas Kiskis
 

What's hot (20)

Wikileaks freedom of speech on the internet
Wikileaks freedom of speech on the internetWikileaks freedom of speech on the internet
Wikileaks freedom of speech on the internet
 
Music Piracy
Music PiracyMusic Piracy
Music Piracy
 
File000165
File000165File000165
File000165
 
File000159
File000159File000159
File000159
 
Policy and Technical Solutions for Online Cross-Border Legal Problems in Asia
Policy and Technical Solutions for Online Cross-Border Legal Problems in AsiaPolicy and Technical Solutions for Online Cross-Border Legal Problems in Asia
Policy and Technical Solutions for Online Cross-Border Legal Problems in Asia
 
[Privacy and IT Ethics Presentation] Chapter 3: The Forth Amendment and emer...
[Privacy and IT Ethics Presentation] Chapter 3: The Forth Amendment and emer...[Privacy and IT Ethics Presentation] Chapter 3: The Forth Amendment and emer...
[Privacy and IT Ethics Presentation] Chapter 3: The Forth Amendment and emer...
 
Communications Privacy and the State
Communications Privacy and the StateCommunications Privacy and the State
Communications Privacy and the State
 
Justice wide open - communities and courts
Justice wide open - communities and courtsJustice wide open - communities and courts
Justice wide open - communities and courts
 
Net neutrality & it’s legal issues
Net neutrality & it’s legal issuesNet neutrality & it’s legal issues
Net neutrality & it’s legal issues
 
Explain in brief the enforcement of Data Protection. [#26]
Explain in brief the enforcement of Data Protection. [#26]Explain in brief the enforcement of Data Protection. [#26]
Explain in brief the enforcement of Data Protection. [#26]
 
Legal and privacy implications of IoT
Legal and privacy implications of IoTLegal and privacy implications of IoT
Legal and privacy implications of IoT
 
Kerja kursus ting.4 (ict)
Kerja kursus ting.4 (ict)Kerja kursus ting.4 (ict)
Kerja kursus ting.4 (ict)
 
Graham Smith - Internet and eCommerce Law Review 2017
Graham Smith - Internet and eCommerce Law Review 2017Graham Smith - Internet and eCommerce Law Review 2017
Graham Smith - Internet and eCommerce Law Review 2017
 
The free legal info landscape: treacherous quagmire or inspiring view?
The free legal info landscape: treacherous quagmire or inspiring view? The free legal info landscape: treacherous quagmire or inspiring view?
The free legal info landscape: treacherous quagmire or inspiring view?
 
Apresentação de Jeanette Hofmann
Apresentação de Jeanette HofmannApresentação de Jeanette Hofmann
Apresentação de Jeanette Hofmann
 
Internet Corporate Responsibility
Internet Corporate ResponsibilityInternet Corporate Responsibility
Internet Corporate Responsibility
 
Anti-circumvention and ISP liability provisions in Free Trade Agreements.
Anti-circumvention and ISP liability provisions in Free Trade Agreements.Anti-circumvention and ISP liability provisions in Free Trade Agreements.
Anti-circumvention and ISP liability provisions in Free Trade Agreements.
 
Privacy, human rights and Location Based Services
Privacy, human rights and Location Based ServicesPrivacy, human rights and Location Based Services
Privacy, human rights and Location Based Services
 
State of the Internet
State of the InternetState of the Internet
State of the Internet
 
Intellectual Property in Cyberspace
Intellectual Property in CyberspaceIntellectual Property in Cyberspace
Intellectual Property in Cyberspace
 

Similar to Current and future mass surveillance threats

International laws and standards controlling information security. Latest dev...
International laws and standards controlling information security. Latest dev...International laws and standards controlling information security. Latest dev...
International laws and standards controlling information security. Latest dev...
USAID CEED II Project Moldova
 
Faraday Cages, Marbled Palaces and Humpty Dumpty: the Reality of Internet Gov...
Faraday Cages, Marbled Palaces and Humpty Dumpty: the Reality of Internet Gov...Faraday Cages, Marbled Palaces and Humpty Dumpty: the Reality of Internet Gov...
Faraday Cages, Marbled Palaces and Humpty Dumpty: the Reality of Internet Gov...
blogzilla
 
Digital Forensics
Digital ForensicsDigital Forensics
Digital Forensics
Mithileysh Sathiyanarayanan
 
Computer forensics 1
Computer forensics 1Computer forensics 1
Computer forensics 1
Jinalkakadiya
 
Lofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and EncryptionLofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and Encryption
Sean Whalen
 
NS Civil Liberties & Security Supplement Sept 2014
NS Civil Liberties & Security Supplement Sept 2014NS Civil Liberties & Security Supplement Sept 2014
NS Civil Liberties & Security Supplement Sept 2014
Dominic Rae LION (Open Networker)
 
Prosecuting Cybercrime and Regulating the Web
Prosecuting Cybercrime and Regulating the WebProsecuting Cybercrime and Regulating the Web
Prosecuting Cybercrime and Regulating the Web
Darius Whelan
 
Digital Crime & Forensics - Presentation
Digital Crime & Forensics - PresentationDigital Crime & Forensics - Presentation
Digital Crime & Forensics - Presentation
prashant3535
 
Whose content? whose revenue? who should be liable for a user's content? jo...
Whose content? whose revenue? who should be liable for a user's content?   jo...Whose content? whose revenue? who should be liable for a user's content?   jo...
Whose content? whose revenue? who should be liable for a user's content? jo...
IFCLA - International Federation of Computer Law Associations
 
Cyber crime legislation part 1
Cyber crime legislation part 1Cyber crime legislation part 1
Cyber crime legislation part 1
MohsinMughal28
 
Uganda lawsociety v2digitalforensics
Uganda lawsociety v2digitalforensicsUganda lawsociety v2digitalforensics
Uganda lawsociety v2digitalforensics
Mustapha Mugisa
 
[Privacy Webinar Slides] Global Enforcement Priorities
[Privacy Webinar Slides] Global Enforcement Priorities[Privacy Webinar Slides] Global Enforcement Priorities
[Privacy Webinar Slides] Global Enforcement Priorities
TrustArc
 
About EDRi & our main topics
About EDRi & our main topicsAbout EDRi & our main topics
About EDRi & our main topics
Kirsten Fiedler
 
Sovereignty in Cyberspace
Sovereignty in CyberspaceSovereignty in Cyberspace
Browser-based Crypto M, C. F Mondschein
Browser-based Crypto M, C. F MondscheinBrowser-based Crypto M, C. F Mondschein
Browser-based Crypto M, C. F Mondschein
Napier University
 
International Cybercrime (Part 1)
International Cybercrime (Part 1)International Cybercrime (Part 1)
International Cybercrime (Part 1)
GrittyCC
 
Addressing Cybersecurity and Cybercrime via a co-evolutionary approach to red...
Addressing Cybersecurity and Cybercrime via a co-evolutionary approach to red...Addressing Cybersecurity and Cybercrime via a co-evolutionary approach to red...
Addressing Cybersecurity and Cybercrime via a co-evolutionary approach to red...
Anna Gomez
 
Privacy and visibility in the sensor society
Privacy and visibility in the sensor societyPrivacy and visibility in the sensor society
Privacy and visibility in the sensor society
Considerati
 
2013.11.30.Brook-CSA_Congress_EU_Avoiding_US_Cloud_Providers
2013.11.30.Brook-CSA_Congress_EU_Avoiding_US_Cloud_Providers2013.11.30.Brook-CSA_Congress_EU_Avoiding_US_Cloud_Providers
2013.11.30.Brook-CSA_Congress_EU_Avoiding_US_Cloud_Providers
Jon-Michael C. Brook, CISSP
 
Ce hv6 module 57 computer forensics and incident handling
Ce hv6 module 57 computer forensics and incident handlingCe hv6 module 57 computer forensics and incident handling
Ce hv6 module 57 computer forensics and incident handling
Vi Tính Hoàng Nam
 

Similar to Current and future mass surveillance threats (20)

International laws and standards controlling information security. Latest dev...
International laws and standards controlling information security. Latest dev...International laws and standards controlling information security. Latest dev...
International laws and standards controlling information security. Latest dev...
 
Faraday Cages, Marbled Palaces and Humpty Dumpty: the Reality of Internet Gov...
Faraday Cages, Marbled Palaces and Humpty Dumpty: the Reality of Internet Gov...Faraday Cages, Marbled Palaces and Humpty Dumpty: the Reality of Internet Gov...
Faraday Cages, Marbled Palaces and Humpty Dumpty: the Reality of Internet Gov...
 
Digital Forensics
Digital ForensicsDigital Forensics
Digital Forensics
 
Computer forensics 1
Computer forensics 1Computer forensics 1
Computer forensics 1
 
Lofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and EncryptionLofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and Encryption
 
NS Civil Liberties & Security Supplement Sept 2014
NS Civil Liberties & Security Supplement Sept 2014NS Civil Liberties & Security Supplement Sept 2014
NS Civil Liberties & Security Supplement Sept 2014
 
Prosecuting Cybercrime and Regulating the Web
Prosecuting Cybercrime and Regulating the WebProsecuting Cybercrime and Regulating the Web
Prosecuting Cybercrime and Regulating the Web
 
Digital Crime & Forensics - Presentation
Digital Crime & Forensics - PresentationDigital Crime & Forensics - Presentation
Digital Crime & Forensics - Presentation
 
Whose content? whose revenue? who should be liable for a user's content? jo...
Whose content? whose revenue? who should be liable for a user's content?   jo...Whose content? whose revenue? who should be liable for a user's content?   jo...
Whose content? whose revenue? who should be liable for a user's content? jo...
 
Cyber crime legislation part 1
Cyber crime legislation part 1Cyber crime legislation part 1
Cyber crime legislation part 1
 
Uganda lawsociety v2digitalforensics
Uganda lawsociety v2digitalforensicsUganda lawsociety v2digitalforensics
Uganda lawsociety v2digitalforensics
 
[Privacy Webinar Slides] Global Enforcement Priorities
[Privacy Webinar Slides] Global Enforcement Priorities[Privacy Webinar Slides] Global Enforcement Priorities
[Privacy Webinar Slides] Global Enforcement Priorities
 
About EDRi & our main topics
About EDRi & our main topicsAbout EDRi & our main topics
About EDRi & our main topics
 
Sovereignty in Cyberspace
Sovereignty in CyberspaceSovereignty in Cyberspace
Sovereignty in Cyberspace
 
Browser-based Crypto M, C. F Mondschein
Browser-based Crypto M, C. F MondscheinBrowser-based Crypto M, C. F Mondschein
Browser-based Crypto M, C. F Mondschein
 
International Cybercrime (Part 1)
International Cybercrime (Part 1)International Cybercrime (Part 1)
International Cybercrime (Part 1)
 
Addressing Cybersecurity and Cybercrime via a co-evolutionary approach to red...
Addressing Cybersecurity and Cybercrime via a co-evolutionary approach to red...Addressing Cybersecurity and Cybercrime via a co-evolutionary approach to red...
Addressing Cybersecurity and Cybercrime via a co-evolutionary approach to red...
 
Privacy and visibility in the sensor society
Privacy and visibility in the sensor societyPrivacy and visibility in the sensor society
Privacy and visibility in the sensor society
 
2013.11.30.Brook-CSA_Congress_EU_Avoiding_US_Cloud_Providers
2013.11.30.Brook-CSA_Congress_EU_Avoiding_US_Cloud_Providers2013.11.30.Brook-CSA_Congress_EU_Avoiding_US_Cloud_Providers
2013.11.30.Brook-CSA_Congress_EU_Avoiding_US_Cloud_Providers
 
Ce hv6 module 57 computer forensics and incident handling
Ce hv6 module 57 computer forensics and incident handlingCe hv6 module 57 computer forensics and incident handling
Ce hv6 module 57 computer forensics and incident handling
 

More from Point_conference

Presentation TransparenCEE
Presentation TransparenCEEPresentation TransparenCEE
Presentation TransparenCEE
Point_conference
 
Open data_Open Ownership_Point_23.05.2017
Open data_Open Ownership_Point_23.05.2017Open data_Open Ownership_Point_23.05.2017
Open data_Open Ownership_Point_23.05.2017
Point_conference
 
Elections in Serbia and Macedonia
Elections in Serbia and Macedonia Elections in Serbia and Macedonia
Elections in Serbia and Macedonia
Point_conference
 
Oraclum Intelligence Systems
Oraclum Intelligence SystemsOraclum Intelligence Systems
Oraclum Intelligence Systems
Point_conference
 
Julius van de Laar
Julius van de LaarJulius van de Laar
Julius van de Laar
Point_conference
 
Neuropolitics research on Brexit
Neuropolitics research on BrexitNeuropolitics research on Brexit
Neuropolitics research on Brexit
Point_conference
 
Push OCCRP
Push OCCRPPush OCCRP
Push OCCRP
Point_conference
 
Decode Darfur
Decode DarfurDecode Darfur
Decode Darfur
Point_conference
 
Open Courts
Open CourtsOpen Courts
Open Courts
Point_conference
 
2017 Romanian protests - A legal and an open government perspective
2017 Romanian protests - A legal and an open government perspective2017 Romanian protests - A legal and an open government perspective
2017 Romanian protests - A legal and an open government perspective
Point_conference
 
2017 Romanian protests - Insight data
2017 Romanian protests - Insight data2017 Romanian protests - Insight data
2017 Romanian protests - Insight data
Point_conference
 
A revolution bouncing back
A revolution bouncing backA revolution bouncing back
A revolution bouncing back
Point_conference
 
Vouliwatch presentation
Vouliwatch presentationVouliwatch presentation
Vouliwatch presentation
Point_conference
 
Javnarasprava
JavnaraspravaJavnarasprava
Javnarasprava
Point_conference
 
Parlameter
Parlameter Parlameter
Parlameter
Point_conference
 
Moj Porez
Moj PorezMoj Porez
Moj Porez
Point_conference
 
Amr Shorby
Amr ShorbyAmr Shorby
Amr Shorby
Point_conference
 
OGP Background
OGP BackgroundOGP Background
OGP Background
Point_conference
 
Regional Index_Presentation of the Recommendations and results
Regional Index_Presentation of the Recommendations and resultsRegional Index_Presentation of the Recommendations and results
Regional Index_Presentation of the Recommendations and results
Point_conference
 
Prezentacija Javna rasprava
Prezentacija Javna raspravaPrezentacija Javna rasprava
Prezentacija Javna rasprava
Point_conference
 

More from Point_conference (20)

Presentation TransparenCEE
Presentation TransparenCEEPresentation TransparenCEE
Presentation TransparenCEE
 
Open data_Open Ownership_Point_23.05.2017
Open data_Open Ownership_Point_23.05.2017Open data_Open Ownership_Point_23.05.2017
Open data_Open Ownership_Point_23.05.2017
 
Elections in Serbia and Macedonia
Elections in Serbia and Macedonia Elections in Serbia and Macedonia
Elections in Serbia and Macedonia
 
Oraclum Intelligence Systems
Oraclum Intelligence SystemsOraclum Intelligence Systems
Oraclum Intelligence Systems
 
Julius van de Laar
Julius van de LaarJulius van de Laar
Julius van de Laar
 
Neuropolitics research on Brexit
Neuropolitics research on BrexitNeuropolitics research on Brexit
Neuropolitics research on Brexit
 
Push OCCRP
Push OCCRPPush OCCRP
Push OCCRP
 
Decode Darfur
Decode DarfurDecode Darfur
Decode Darfur
 
Open Courts
Open CourtsOpen Courts
Open Courts
 
2017 Romanian protests - A legal and an open government perspective
2017 Romanian protests - A legal and an open government perspective2017 Romanian protests - A legal and an open government perspective
2017 Romanian protests - A legal and an open government perspective
 
2017 Romanian protests - Insight data
2017 Romanian protests - Insight data2017 Romanian protests - Insight data
2017 Romanian protests - Insight data
 
A revolution bouncing back
A revolution bouncing backA revolution bouncing back
A revolution bouncing back
 
Vouliwatch presentation
Vouliwatch presentationVouliwatch presentation
Vouliwatch presentation
 
Javnarasprava
JavnaraspravaJavnarasprava
Javnarasprava
 
Parlameter
Parlameter Parlameter
Parlameter
 
Moj Porez
Moj PorezMoj Porez
Moj Porez
 
Amr Shorby
Amr ShorbyAmr Shorby
Amr Shorby
 
OGP Background
OGP BackgroundOGP Background
OGP Background
 
Regional Index_Presentation of the Recommendations and results
Regional Index_Presentation of the Recommendations and resultsRegional Index_Presentation of the Recommendations and results
Regional Index_Presentation of the Recommendations and results
 
Prezentacija Javna rasprava
Prezentacija Javna raspravaPrezentacija Javna rasprava
Prezentacija Javna rasprava
 

Recently uploaded

Team Building and TUCKMANS MODEL Explained
Team Building and TUCKMANS MODEL ExplainedTeam Building and TUCKMANS MODEL Explained
Team Building and TUCKMANS MODEL Explained
iampriyanshujaiswal
 
20240608 QFM019 Engineering Leadership Reading List May 2024
20240608 QFM019 Engineering Leadership Reading List May 202420240608 QFM019 Engineering Leadership Reading List May 2024
20240608 QFM019 Engineering Leadership Reading List May 2024
Matthew Sinclair
 
All the Small Things - XP2024 Bolzano/Bozen
All the Small Things - XP2024 Bolzano/BozenAll the Small Things - XP2024 Bolzano/Bozen
All the Small Things - XP2024 Bolzano/Bozen
Alberto Brandolini
 
Impact of Effective Performance Appraisal Systems on Employee Motivation and ...
Impact of Effective Performance Appraisal Systems on Employee Motivation and ...Impact of Effective Performance Appraisal Systems on Employee Motivation and ...
Impact of Effective Performance Appraisal Systems on Employee Motivation and ...
Dr. Nazrul Islam
 
Enriching engagement with ethical review processes
Enriching engagement with ethical review processesEnriching engagement with ethical review processes
Enriching engagement with ethical review processes
strikingabalance
 
The Management Guide: From Projects to Portfolio
The Management Guide: From Projects to PortfolioThe Management Guide: From Projects to Portfolio
The Management Guide: From Projects to Portfolio
Ahmed AbdelMoneim
 
Myrna Story of Leadership and Management
Myrna Story of Leadership and ManagementMyrna Story of Leadership and Management
Myrna Story of Leadership and Management
Waleed Kamal
 
Conflict resololution,role of hr in resolution
Conflict resololution,role of hr in resolutionConflict resololution,role of hr in resolution
Conflict resololution,role of hr in resolution
Dr. Christine Ngari ,Ph.D (HRM)
 
Stuart Wilson the teams I have led - 2024
Stuart Wilson the teams I have led - 2024Stuart Wilson the teams I have led - 2024
Stuart Wilson the teams I have led - 2024
stuwilson.co.uk
 
Ganpati Kumar Choudhary Indian Ethos PPT.pptx
Ganpati Kumar Choudhary Indian Ethos PPT.pptxGanpati Kumar Choudhary Indian Ethos PPT.pptx
Ganpati Kumar Choudhary Indian Ethos PPT.pptx
GanpatiKumarChoudhar
 
12 steps to transform your organization into the agile org you deserve
12 steps to transform your organization into the agile org you deserve12 steps to transform your organization into the agile org you deserve
12 steps to transform your organization into the agile org you deserve
Pierre E. NEIS
 
Comparing Stability and Sustainability in Agile Systems
Comparing Stability and Sustainability in Agile SystemsComparing Stability and Sustainability in Agile Systems
Comparing Stability and Sustainability in Agile Systems
Rob Healy
 
Designing and Sustaining Large-Scale Value-Centered Agile Ecosystems (powered...
Designing and Sustaining Large-Scale Value-Centered Agile Ecosystems (powered...Designing and Sustaining Large-Scale Value-Centered Agile Ecosystems (powered...
Designing and Sustaining Large-Scale Value-Centered Agile Ecosystems (powered...
Alexey Krivitsky
 
一比一原版(QU毕业证)皇后大学毕业证如何办理
一比一原版(QU毕业证)皇后大学毕业证如何办理一比一原版(QU毕业证)皇后大学毕业证如何办理
一比一原版(QU毕业证)皇后大学毕业证如何办理
8p28uk6g
 
Sethurathnam Ravi: A Legacy in Finance and Leadership
Sethurathnam Ravi: A Legacy in Finance and LeadershipSethurathnam Ravi: A Legacy in Finance and Leadership
Sethurathnam Ravi: A Legacy in Finance and Leadership
Anjana Josie
 
Colby Hobson: Residential Construction Leader Building a Solid Reputation Thr...
Colby Hobson: Residential Construction Leader Building a Solid Reputation Thr...Colby Hobson: Residential Construction Leader Building a Solid Reputation Thr...
Colby Hobson: Residential Construction Leader Building a Solid Reputation Thr...
dsnow9802
 
Addiction to Winning Across Diverse Populations.pdf
Addiction to Winning Across Diverse Populations.pdfAddiction to Winning Across Diverse Populations.pdf
Addiction to Winning Across Diverse Populations.pdf
Bill641377
 
Strategic Org Design with Org Topologies™
Strategic Org Design with Org Topologies™Strategic Org Design with Org Topologies™
Strategic Org Design with Org Topologies™
Alexey Krivitsky
 
Chart--Time Management.pdf How to time is spent
Chart--Time Management.pdf How to time is spentChart--Time Management.pdf How to time is spent
Chart--Time Management.pdf How to time is spent
spandane
 
innovation in nursing practice, education and management.pptx
innovation in nursing practice, education and management.pptxinnovation in nursing practice, education and management.pptx
innovation in nursing practice, education and management.pptx
TulsiDhidhi1
 

Recently uploaded (20)

Team Building and TUCKMANS MODEL Explained
Team Building and TUCKMANS MODEL ExplainedTeam Building and TUCKMANS MODEL Explained
Team Building and TUCKMANS MODEL Explained
 
20240608 QFM019 Engineering Leadership Reading List May 2024
20240608 QFM019 Engineering Leadership Reading List May 202420240608 QFM019 Engineering Leadership Reading List May 2024
20240608 QFM019 Engineering Leadership Reading List May 2024
 
All the Small Things - XP2024 Bolzano/Bozen
All the Small Things - XP2024 Bolzano/BozenAll the Small Things - XP2024 Bolzano/Bozen
All the Small Things - XP2024 Bolzano/Bozen
 
Impact of Effective Performance Appraisal Systems on Employee Motivation and ...
Impact of Effective Performance Appraisal Systems on Employee Motivation and ...Impact of Effective Performance Appraisal Systems on Employee Motivation and ...
Impact of Effective Performance Appraisal Systems on Employee Motivation and ...
 
Enriching engagement with ethical review processes
Enriching engagement with ethical review processesEnriching engagement with ethical review processes
Enriching engagement with ethical review processes
 
The Management Guide: From Projects to Portfolio
The Management Guide: From Projects to PortfolioThe Management Guide: From Projects to Portfolio
The Management Guide: From Projects to Portfolio
 
Myrna Story of Leadership and Management
Myrna Story of Leadership and ManagementMyrna Story of Leadership and Management
Myrna Story of Leadership and Management
 
Conflict resololution,role of hr in resolution
Conflict resololution,role of hr in resolutionConflict resololution,role of hr in resolution
Conflict resololution,role of hr in resolution
 
Stuart Wilson the teams I have led - 2024
Stuart Wilson the teams I have led - 2024Stuart Wilson the teams I have led - 2024
Stuart Wilson the teams I have led - 2024
 
Ganpati Kumar Choudhary Indian Ethos PPT.pptx
Ganpati Kumar Choudhary Indian Ethos PPT.pptxGanpati Kumar Choudhary Indian Ethos PPT.pptx
Ganpati Kumar Choudhary Indian Ethos PPT.pptx
 
12 steps to transform your organization into the agile org you deserve
12 steps to transform your organization into the agile org you deserve12 steps to transform your organization into the agile org you deserve
12 steps to transform your organization into the agile org you deserve
 
Comparing Stability and Sustainability in Agile Systems
Comparing Stability and Sustainability in Agile SystemsComparing Stability and Sustainability in Agile Systems
Comparing Stability and Sustainability in Agile Systems
 
Designing and Sustaining Large-Scale Value-Centered Agile Ecosystems (powered...
Designing and Sustaining Large-Scale Value-Centered Agile Ecosystems (powered...Designing and Sustaining Large-Scale Value-Centered Agile Ecosystems (powered...
Designing and Sustaining Large-Scale Value-Centered Agile Ecosystems (powered...
 
一比一原版(QU毕业证)皇后大学毕业证如何办理
一比一原版(QU毕业证)皇后大学毕业证如何办理一比一原版(QU毕业证)皇后大学毕业证如何办理
一比一原版(QU毕业证)皇后大学毕业证如何办理
 
Sethurathnam Ravi: A Legacy in Finance and Leadership
Sethurathnam Ravi: A Legacy in Finance and LeadershipSethurathnam Ravi: A Legacy in Finance and Leadership
Sethurathnam Ravi: A Legacy in Finance and Leadership
 
Colby Hobson: Residential Construction Leader Building a Solid Reputation Thr...
Colby Hobson: Residential Construction Leader Building a Solid Reputation Thr...Colby Hobson: Residential Construction Leader Building a Solid Reputation Thr...
Colby Hobson: Residential Construction Leader Building a Solid Reputation Thr...
 
Addiction to Winning Across Diverse Populations.pdf
Addiction to Winning Across Diverse Populations.pdfAddiction to Winning Across Diverse Populations.pdf
Addiction to Winning Across Diverse Populations.pdf
 
Strategic Org Design with Org Topologies™
Strategic Org Design with Org Topologies™Strategic Org Design with Org Topologies™
Strategic Org Design with Org Topologies™
 
Chart--Time Management.pdf How to time is spent
Chart--Time Management.pdf How to time is spentChart--Time Management.pdf How to time is spent
Chart--Time Management.pdf How to time is spent
 
innovation in nursing practice, education and management.pptx
innovation in nursing practice, education and management.pptxinnovation in nursing practice, education and management.pptx
innovation in nursing practice, education and management.pptx
 

Current and future mass surveillance threats

  • 1. Current and future mass surveillance threats ...and why surveillance doesn’t work Arianit Dobroshi This work is licensed under a Creative Commons Attribution 4.0 International License.
  • 2. Threats - A western threat - Internet - Metadata retention - Complete take - Mobile - IMEI and SIM registration - Mobile com MITM attack - Passenger name records
  • 3. Necessary and proportionate - International Principles on the Application of Human Rights to Communications Surveillance - Efficacy - Cross-border transfer - Necessity - Proportionality - US Court: "such an expansive concept of 'relevance' is unprecedented and unwarranted.''
  • 4. Why mass surveillance is ineffective - Math: False positives - Case in point: since 9/11 10$ b/year, one tiny success - There was mass surveillance before 9/11 - Implications: One thing for Amazon to suggest the wrong product, another to be marked for surveillance
  • 5. Kosovo timeline - Dec. 2012: 1st draft turned down - Apr. 2014: CJEU Ruling - Apr. 2014: 2nd draft - Dec. 2014: 2nd draft resubmitted - Jan. 2015: turn-down at the Committee and Parliament - New drafting - May: 15: Good draft - Currently: slightly worse draft - Committee vote today
  • 6. Our objections 1 - Interception interfaces - Legal basis - Data retention - Authorized institutions loophole - Purpose - Notification
  • 7. Our objections 2 - Interception assistance - Records of interception - Penalties for violations of privacy - Anonymity is also privacy and should not be violated without a court order - Software be open source to ensure it does as mandated
  • 8. How to fight back? - Winning is possible - Engage early, slow down the process - Send comments during public consultation - Make allies in the parliamentary committee - Ombudsperson - CSOs (too focused, project driven) - Journalists - Lawyers - Int’l privacy advocates: EDRi, Privacy International, EFF - MEPs: alternative voices in the EU  Parliamentary questions
  • 9.
  • 10. Technical solutions - Encrypt all the web - Self-hosting - PGP-based encryption - 1 full-time person - Tor - 4G > 3 G > 2g - Snowden: "Encryption works. Properly implemented strong crypto systems are one of the few things that you can rely on.”
  • 11. Thank you! CryptoParty tomorrow Come prepared! arianit@gmail.com @arianitd