SlideShare a Scribd company logo
1 of 31
Electronic Surveillance of Communications - Master Programme in Law and Information Technology - Course C 2010. Development and Management of Information  Systems in a Legal Perspective - Course C, block 5. Identification and Control technologies Mark Klamberg, doctoral candidate
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
New types of legislation concerning  electronic surveillance of communications ,[object Object],[object Object]
Changes in Our Society Technological change Until the end of the 1990s satellites were the main  medium for international communication. Now it is  fiber optics in cables controlled by private companies. Shift in Threats Relevant for National Security The perceived threat from the Soviet Union has been replaced with vague threats such as terrorism, international criminality, migration, environmental threats and financial imbalances New Legal Demands The European Convention on Human Rights requires that interferences in the private life and family has a legal basis (article 8) Privatization Telecom operators were previously state-owned and controlled. Now they are private companies whose priority is to safeguard the interests of their customers, not the interests of the state
Signal Intelligence - why legislation? Considering the changes in the 1990s: The technological change and privatization creates a need to adopt legislation or other binding measures that obligates the private operators to surrender communication to the State. This makes the existence of previously top secret surveillance public knowledge The shift in perceived threats creates a need to expand the mandate or codify an already expanded mandate of signal intelligence organizations  The public knowledge about this surveillance and new legal demands creates a need for legislation protecting privacy
Data retention  - why legislation? Communication providers have stored traffic data (who is phoning who and when) about the phone calls of their customers for billing purposes. Law enforcement agencies have used such data in order to detect, prevent and investigate crime Nowadays, consumers are turning to flat-rate subscriptions and  voice over IP-services (for example Skype). Thus, there is no need to retain traffic data for billing purposes. Law enforcement agencies still want/need traffic data.
We humans leave electronic footprints after us, in the form of  credit card payments, visits to websites, records of phone calls  and e-mail (communication data). Imagine that somebody could  collect everything and process it through a powerful computer.  With the right tools one could find patterns that in detail describe  what groups and networks you belong to. Such techniques are  referred to as traffic analysis and social network analysis Traffic analysis and social  network analysis
With traffic analysis  social networks may be identified  A communication pattern can depict relations between individuals,  Organisations, websites, etc with purpose of charting the social networks,  position of power, views and other personal data about an individual. The actual message is less important than  the information about the sender, recipient,  the time of transaction, and means of  communication. Knowledge about the  communication pattern and thus  the social network of person is often enough Individual
U.S. National Research Council, report October 2008 “ Protecting Individual Privacy in the Struggle Against Terrorists: A Framework for Program Assessment”
Two general types of data mining techniques 1. Subject-based data mining  2. Pattern-based data mining U.S. National Research Council “Protecting Individual Privacy in the Struggle Against Terrorists: A Framework for Program Assessment”
Subject-based data mining   Subject-based data mining uses an initiating individual or other datum that is considered, based on other information, to be of high interest, and the goal is to determine what other persons or financial transactions or movements, etc., are related to that initiating datum. U.S. National Research Council
Pattern-based data mining   Pattern-based data mining looks for patterns (including anomalous data patterns) that might be associated with terrorist activity—these patterns might be regarded as small signals in a large ocean of noise. U.S. National Research Council
When to use the two different techniques   In the case of the decentralized group,  subject-based data mining  is likely to augment and enhance traditional police investigations by making it possible to access larger volumes of data more quickly. Furthermore, communications networks can more easily be identified and mapped if one or a few individuals in the network are known with high confidence.  By contrast,  pattern-based data mining  may be more useful in finding the larger information footprint that characterizes centrally organized terrorist groups. U.S. National Research Council
Utility of pattern-based data mining  The utility of pattern-based data mining is found primarily if not exclusively in its role in helping humans make better decisions about how to deploy scarce investigative resources, and action (such as arrest, search, denial of rights) should never be taken solely on the basis of a data mining result. Automated terrorist identification through data mining (or any other known methodology) is neither feasible as an objective nor desirable as a goal of technology development efforts. U.S. National Research Council
Panspectron (Delanda) “ There are many differences between the Panopticon and the Panspectron being assembled at the NSA. Instead of positioning some human bodies around a central sensor, a multiplicity of sensors is deployed around all bodies: its antenna farms, spy satellites and cable-traffic intercepts feed into its computers all the information that can be gathered. This is then processed through a series of “filters” or key-word watch lists. The Panspectron does not merely select certain bodies and certain (visual) data about them. Rather, it compiles information about all at the same time, using computers to select the segments of data relevant to its surveillance tasks.” Panopticon (Bentham)
Discussion Based on the material distributed, discuss for 15 minutes: 1. When does the interference with privacy occur in relation to systems of mass surveillance of electronic communication?  2. How does the American system differ from the legal regime under ECHR in its approach to the content/non-content distinction?  3. In the country you come from, do you have any regulations concern signal intelligence/strategic monitoring/surveillance for intelligence purposes? If not, does your country still have a state agency similar to the NSA, GCHQ, BND and FRA?  4. Is it appropriate to involve courts in issues concerning the implementation of policies on national security?
Defining content and  traffic data As opposed to the content of a message, traffic data is the information used by the communication network to deliver the message to or from the user.  In a telephone network, traffic data will reveal the number dialed (“to”), the originating number (“from”), the time of the call, and its duration.  In the internet context, traffic data will similarly reveal the “to” and “from” e-mail address, the instant message to and from account names, and the other administrative information the computers generate in the course of delivery Compare with Orin Kerr: content and envelope information
Four fields of legislation International communication Domestic communication Preliminary Investigation Intelligence N/A 1. Chapter 27 of the Code  of Judicial Procedure 2. Chapter 6 section 22(3) of  the Electronic Communications  Act (2003:389) 3. Act on measures concerning  certain serious crimes (2008:854) 1. Act on measures to prevent  certain serious crimes (2007:979) 2. Chapter 6 section 22(3) of the  Electronic Communications Act  (2003:389) Signal Intelligence  Act (2008:717)
EU Data Retention Directive 1. Data is retained for periods of not less than six months and not more than two years from the date of the communication 2. The data retained purports to the questions who was communicating with who, when the communication occurred, where was the communicating parties and what type of communication used.  3. No content data may be retained for the purpose of the directive. 4. The access for national authorities to the data is to be regulated through domestic law
Summary of the legislation adopted 18 June 2008: IT- and telecom operators are obligated to transfer all communication in cables crossing Swedish borders to nodes controlled by the State The Defence Radio Establishment will intercept communication and collect data at the nodes (signal intelligence)
Similar organizations, laws  and programs  USA Organization:   National Security Agency (NSA) Legislation:   FISA    United Kingdom  Organization:   Government Communications Headquarters  (GCHQ) Legislation:   RIPA Case:   Liberty et al. v. The United Kingdom
Similar organizations,  laws and programs   France Organization:   Direction Générale de la Sécurité Extérieure  (DGSE) Germany Organization:   Bundesnachrichtendienst (BND) Legislation:   G 10-law (Gesetz zur Beschränkung des  Brief-, Post- und Fernmeldegeheimnisses)   Case:   Weber and Saravia v. Germany Denmark Organization:  Forsvarets Efterretningstjeneste (FE) Legislation:  17 § forsvarsloven
Key Features of the Swedish law  and the operations of the  Defence Radio Establishment ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
1.   Mandate of the Defence Radio Establishment ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
2. Clients (known) 1. The Government 2. The Government office 3. The Defence Forces 4. The Police, including the Security Service (SÄPO) 5. National Inspectorate of Strategic Products 6. Swedish Customs Service 7. Defence Materiel Administration Agency 8. Defence Research Agency 9. Civil Contingencies Agency International Partners exist but unknown which those are. Could include NSA, GCHQ, BND, DGSE and FE Excluded in  Autumn 2009
3. Review Mechanisms ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
4. Method – what is  signal intelligence? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
5. Scope of Surveillance ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Questions?
Thanks! Blog:  www.klamberg.se E-mail:  [email_address] Phone:  +46 8 16 11 90

More Related Content

What's hot

Privacy Report: Romania – from the DP Act to the Constitutional Court decisio...
Privacy Report: Romania – from the DP Act to the Constitutional Court decisio...Privacy Report: Romania – from the DP Act to the Constitutional Court decisio...
Privacy Report: Romania – from the DP Act to the Constitutional Court decisio...bmanolea
 
cyber law and forensics,biometrics systems
cyber law and forensics,biometrics systemscyber law and forensics,biometrics systems
cyber law and forensics,biometrics systemsMayank Diwakar
 
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...REVULN
 
Botnet detection using ensemble classifiers of network flow
Botnet detection using ensemble classifiers of network flow  Botnet detection using ensemble classifiers of network flow
Botnet detection using ensemble classifiers of network flow IJECEIAES
 
Computer Forensics: The Emerging Significance to Law Enforcement
Computer Forensics: The Emerging Significance to Law Enforcement Computer Forensics: The Emerging Significance to Law Enforcement
Computer Forensics: The Emerging Significance to Law Enforcement Lillian Ekwosi-Egbulem
 
Transatlantic data flows following the Schrems II judgment
Transatlantic data flows following the Schrems II judgmentTransatlantic data flows following the Schrems II judgment
Transatlantic data flows following the Schrems II judgmentblogzilla
 
Communications data retention in an evolving Internet
Communications data retention in an evolving InternetCommunications data retention in an evolving Internet
Communications data retention in an evolving Internetblogzilla
 
Police surveillance of social media - do you have a reasonable expectation of...
Police surveillance of social media - do you have a reasonable expectation of...Police surveillance of social media - do you have a reasonable expectation of...
Police surveillance of social media - do you have a reasonable expectation of...Lilian Edwards
 
Intro to Freedom of Information (FOI)
Intro to Freedom of Information (FOI)Intro to Freedom of Information (FOI)
Intro to Freedom of Information (FOI)alaninbelfast
 
The effectiveness of policing cybercrime
The effectiveness of policing cybercrimeThe effectiveness of policing cybercrime
The effectiveness of policing cybercrimeRoel Palmaers
 
A study of index poisoning in peer topeer
A study of index poisoning in peer topeerA study of index poisoning in peer topeer
A study of index poisoning in peer topeerIJCI JOURNAL
 
Key principles for data protection & lawful protection in GDPR
Key principles for data protection & lawful protection in GDPRKey principles for data protection & lawful protection in GDPR
Key principles for data protection & lawful protection in GDPRDr. Marinos Papadopoulos
 
Zimbabwe's cybercrime & cybersecurity bill 2017
Zimbabwe's cybercrime & cybersecurity bill 2017Zimbabwe's cybercrime & cybersecurity bill 2017
Zimbabwe's cybercrime & cybersecurity bill 2017Povo News
 
Access to justice through virtual doors - Daniela Piana
Access to justice through virtual doors - Daniela PianaAccess to justice through virtual doors - Daniela Piana
Access to justice through virtual doors - Daniela PianaOECD Governance
 
Privacidad: La Tensión entre las Capacidades Tecnológicas y las Expectativas ...
Privacidad: La Tensión entre las Capacidades Tecnológicas y las Expectativas ...Privacidad: La Tensión entre las Capacidades Tecnológicas y las Expectativas ...
Privacidad: La Tensión entre las Capacidades Tecnológicas y las Expectativas ...Facultad de Informática UCM
 
National Information Exchange Model
National Information Exchange ModelNational Information Exchange Model
National Information Exchange ModelDavid Fletcher
 
Constructing inter domain packet filters to control ip (synopsis)
Constructing inter domain packet filters to control ip (synopsis)Constructing inter domain packet filters to control ip (synopsis)
Constructing inter domain packet filters to control ip (synopsis)Mumbai Academisc
 
e-SIDES presentation at NordSteva Conference, 11/12/2018
e-SIDES presentation at NordSteva Conference, 11/12/2018e-SIDES presentation at NordSteva Conference, 11/12/2018
e-SIDES presentation at NordSteva Conference, 11/12/2018e-SIDES.eu
 

What's hot (20)

Privacy Report: Romania – from the DP Act to the Constitutional Court decisio...
Privacy Report: Romania – from the DP Act to the Constitutional Court decisio...Privacy Report: Romania – from the DP Act to the Constitutional Court decisio...
Privacy Report: Romania – from the DP Act to the Constitutional Court decisio...
 
cyber law and forensics,biometrics systems
cyber law and forensics,biometrics systemscyber law and forensics,biometrics systems
cyber law and forensics,biometrics systems
 
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
 
Botnet detection using ensemble classifiers of network flow
Botnet detection using ensemble classifiers of network flow  Botnet detection using ensemble classifiers of network flow
Botnet detection using ensemble classifiers of network flow
 
Computer Forensics: The Emerging Significance to Law Enforcement
Computer Forensics: The Emerging Significance to Law Enforcement Computer Forensics: The Emerging Significance to Law Enforcement
Computer Forensics: The Emerging Significance to Law Enforcement
 
Transatlantic data flows following the Schrems II judgment
Transatlantic data flows following the Schrems II judgmentTransatlantic data flows following the Schrems II judgment
Transatlantic data flows following the Schrems II judgment
 
Communications data retention in an evolving Internet
Communications data retention in an evolving InternetCommunications data retention in an evolving Internet
Communications data retention in an evolving Internet
 
Police surveillance of social media - do you have a reasonable expectation of...
Police surveillance of social media - do you have a reasonable expectation of...Police surveillance of social media - do you have a reasonable expectation of...
Police surveillance of social media - do you have a reasonable expectation of...
 
Intro to Freedom of Information (FOI)
Intro to Freedom of Information (FOI)Intro to Freedom of Information (FOI)
Intro to Freedom of Information (FOI)
 
The effectiveness of policing cybercrime
The effectiveness of policing cybercrimeThe effectiveness of policing cybercrime
The effectiveness of policing cybercrime
 
A study of index poisoning in peer topeer
A study of index poisoning in peer topeerA study of index poisoning in peer topeer
A study of index poisoning in peer topeer
 
Key principles for data protection & lawful protection in GDPR
Key principles for data protection & lawful protection in GDPRKey principles for data protection & lawful protection in GDPR
Key principles for data protection & lawful protection in GDPR
 
Zimbabwe's cybercrime & cybersecurity bill 2017
Zimbabwe's cybercrime & cybersecurity bill 2017Zimbabwe's cybercrime & cybersecurity bill 2017
Zimbabwe's cybercrime & cybersecurity bill 2017
 
Access to justice through virtual doors - Daniela Piana
Access to justice through virtual doors - Daniela PianaAccess to justice through virtual doors - Daniela Piana
Access to justice through virtual doors - Daniela Piana
 
Privacidad: La Tensión entre las Capacidades Tecnológicas y las Expectativas ...
Privacidad: La Tensión entre las Capacidades Tecnológicas y las Expectativas ...Privacidad: La Tensión entre las Capacidades Tecnológicas y las Expectativas ...
Privacidad: La Tensión entre las Capacidades Tecnológicas y las Expectativas ...
 
National Information Exchange Model
National Information Exchange ModelNational Information Exchange Model
National Information Exchange Model
 
Constructing inter domain packet filters to control ip (synopsis)
Constructing inter domain packet filters to control ip (synopsis)Constructing inter domain packet filters to control ip (synopsis)
Constructing inter domain packet filters to control ip (synopsis)
 
e-SIDES presentation at NordSteva Conference, 11/12/2018
e-SIDES presentation at NordSteva Conference, 11/12/2018e-SIDES presentation at NordSteva Conference, 11/12/2018
e-SIDES presentation at NordSteva Conference, 11/12/2018
 
Polinter09
Polinter09Polinter09
Polinter09
 
Strengthening news media in the digital era: the EU approach
Strengthening news media in the digital era: the EU approachStrengthening news media in the digital era: the EU approach
Strengthening news media in the digital era: the EU approach
 

Viewers also liked

Introduction to Legal Technology, lecture 2 (2015)
Introduction to Legal Technology, lecture 2 (2015)Introduction to Legal Technology, lecture 2 (2015)
Introduction to Legal Technology, lecture 2 (2015)Anna Ronkainen
 
Introduction to Legal Technology, lecture 5 (2015)
Introduction to Legal Technology, lecture 5 (2015)Introduction to Legal Technology, lecture 5 (2015)
Introduction to Legal Technology, lecture 5 (2015)Anna Ronkainen
 
Introduction to Legal Technology, lecture 4 (2015)
Introduction to Legal Technology, lecture 4 (2015)Introduction to Legal Technology, lecture 4 (2015)
Introduction to Legal Technology, lecture 4 (2015)Anna Ronkainen
 
Creating products that lawyers love (sic!) – design in legal technology
Creating products that lawyers love (sic!) – design in legal technologyCreating products that lawyers love (sic!) – design in legal technology
Creating products that lawyers love (sic!) – design in legal technologyAnna Ronkainen
 
Social Media in Defence & Military 2012
Social Media in Defence & Military 2012Social Media in Defence & Military 2012
Social Media in Defence & Military 2012Dale Butler
 
Information technology and law and trai
Information technology and law and traiInformation technology and law and trai
Information technology and law and traiHimanshu Jawa
 
Introduction to Legal Technology, lecture 6 (2015)
Introduction to Legal Technology, lecture 6 (2015)Introduction to Legal Technology, lecture 6 (2015)
Introduction to Legal Technology, lecture 6 (2015)Anna Ronkainen
 
Bommarito Presentation for University of Houston Computational Law Conference
Bommarito Presentation for University of Houston Computational Law ConferenceBommarito Presentation for University of Houston Computational Law Conference
Bommarito Presentation for University of Houston Computational Law Conferencemjbommar
 
Prism break: Minimize surveillance and protect your privacy
Prism break: Minimize surveillance and protect your privacyPrism break: Minimize surveillance and protect your privacy
Prism break: Minimize surveillance and protect your privacydjtennant
 
Cell police - The Basics
Cell police - The BasicsCell police - The Basics
Cell police - The BasicsCell Police
 
Geolocation: Improving our BI solutions with SharePoint
Geolocation: Improving our BI solutions with SharePointGeolocation: Improving our BI solutions with SharePoint
Geolocation: Improving our BI solutions with SharePointRuben Pertusa Lopez
 
WEA-Final-Report-Geo-Targeting-Cell-Radio-RF-Field-Validation-042016
WEA-Final-Report-Geo-Targeting-Cell-Radio-RF-Field-Validation-042016WEA-Final-Report-Geo-Targeting-Cell-Radio-RF-Field-Validation-042016
WEA-Final-Report-Geo-Targeting-Cell-Radio-RF-Field-Validation-042016bhatiak997
 
Electronic surveillance and privacy 130916
Electronic surveillance and privacy 130916Electronic surveillance and privacy 130916
Electronic surveillance and privacy 130916Klamberg
 
Geo Location Mobile Social Networking
Geo Location Mobile Social NetworkingGeo Location Mobile Social Networking
Geo Location Mobile Social NetworkingJodi Gersh
 
Social media and lawyers
Social media and lawyersSocial media and lawyers
Social media and lawyersKlamberg
 
Browsing Large Collections of Geo-Tagged Pictures
Browsing Large Collections of Geo-Tagged PicturesBrowsing Large Collections of Geo-Tagged Pictures
Browsing Large Collections of Geo-Tagged PicturesDavide Carboni
 
12 faces bi business intelligence ~Abdoulaye Mouke Yansane
12 faces bi business intelligence ~Abdoulaye Mouke Yansane12 faces bi business intelligence ~Abdoulaye Mouke Yansane
12 faces bi business intelligence ~Abdoulaye Mouke YansaneAbdoulaye M Yansane
 
Location based targeting technologies for mobile advertisement ppt
Location based targeting technologies for mobile advertisement pptLocation based targeting technologies for mobile advertisement ppt
Location based targeting technologies for mobile advertisement pptYiwei Chen
 
Mobile Advertising 2014 - Targeting Your Audience
Mobile Advertising 2014 - Targeting Your AudienceMobile Advertising 2014 - Targeting Your Audience
Mobile Advertising 2014 - Targeting Your AudiencePurplegator
 

Viewers also liked (20)

Electronic surveillance and privacy issues in shariah
Electronic surveillance and privacy issues in shariahElectronic surveillance and privacy issues in shariah
Electronic surveillance and privacy issues in shariah
 
Introduction to Legal Technology, lecture 2 (2015)
Introduction to Legal Technology, lecture 2 (2015)Introduction to Legal Technology, lecture 2 (2015)
Introduction to Legal Technology, lecture 2 (2015)
 
Introduction to Legal Technology, lecture 5 (2015)
Introduction to Legal Technology, lecture 5 (2015)Introduction to Legal Technology, lecture 5 (2015)
Introduction to Legal Technology, lecture 5 (2015)
 
Introduction to Legal Technology, lecture 4 (2015)
Introduction to Legal Technology, lecture 4 (2015)Introduction to Legal Technology, lecture 4 (2015)
Introduction to Legal Technology, lecture 4 (2015)
 
Creating products that lawyers love (sic!) – design in legal technology
Creating products that lawyers love (sic!) – design in legal technologyCreating products that lawyers love (sic!) – design in legal technology
Creating products that lawyers love (sic!) – design in legal technology
 
Social Media in Defence & Military 2012
Social Media in Defence & Military 2012Social Media in Defence & Military 2012
Social Media in Defence & Military 2012
 
Information technology and law and trai
Information technology and law and traiInformation technology and law and trai
Information technology and law and trai
 
Introduction to Legal Technology, lecture 6 (2015)
Introduction to Legal Technology, lecture 6 (2015)Introduction to Legal Technology, lecture 6 (2015)
Introduction to Legal Technology, lecture 6 (2015)
 
Bommarito Presentation for University of Houston Computational Law Conference
Bommarito Presentation for University of Houston Computational Law ConferenceBommarito Presentation for University of Houston Computational Law Conference
Bommarito Presentation for University of Houston Computational Law Conference
 
Prism break: Minimize surveillance and protect your privacy
Prism break: Minimize surveillance and protect your privacyPrism break: Minimize surveillance and protect your privacy
Prism break: Minimize surveillance and protect your privacy
 
Cell police - The Basics
Cell police - The BasicsCell police - The Basics
Cell police - The Basics
 
Geolocation: Improving our BI solutions with SharePoint
Geolocation: Improving our BI solutions with SharePointGeolocation: Improving our BI solutions with SharePoint
Geolocation: Improving our BI solutions with SharePoint
 
WEA-Final-Report-Geo-Targeting-Cell-Radio-RF-Field-Validation-042016
WEA-Final-Report-Geo-Targeting-Cell-Radio-RF-Field-Validation-042016WEA-Final-Report-Geo-Targeting-Cell-Radio-RF-Field-Validation-042016
WEA-Final-Report-Geo-Targeting-Cell-Radio-RF-Field-Validation-042016
 
Electronic surveillance and privacy 130916
Electronic surveillance and privacy 130916Electronic surveillance and privacy 130916
Electronic surveillance and privacy 130916
 
Geo Location Mobile Social Networking
Geo Location Mobile Social NetworkingGeo Location Mobile Social Networking
Geo Location Mobile Social Networking
 
Social media and lawyers
Social media and lawyersSocial media and lawyers
Social media and lawyers
 
Browsing Large Collections of Geo-Tagged Pictures
Browsing Large Collections of Geo-Tagged PicturesBrowsing Large Collections of Geo-Tagged Pictures
Browsing Large Collections of Geo-Tagged Pictures
 
12 faces bi business intelligence ~Abdoulaye Mouke Yansane
12 faces bi business intelligence ~Abdoulaye Mouke Yansane12 faces bi business intelligence ~Abdoulaye Mouke Yansane
12 faces bi business intelligence ~Abdoulaye Mouke Yansane
 
Location based targeting technologies for mobile advertisement ppt
Location based targeting technologies for mobile advertisement pptLocation based targeting technologies for mobile advertisement ppt
Location based targeting technologies for mobile advertisement ppt
 
Mobile Advertising 2014 - Targeting Your Audience
Mobile Advertising 2014 - Targeting Your AudienceMobile Advertising 2014 - Targeting Your Audience
Mobile Advertising 2014 - Targeting Your Audience
 

Similar to Electronic Surveillance Laws and Mass Data Collection

Surveillance of communication by the National Defence Radio Establishment (FRA)
Surveillance of communication by the National Defence Radio Establishment (FRA)Surveillance of communication by the National Defence Radio Establishment (FRA)
Surveillance of communication by the National Defence Radio Establishment (FRA)Klamberg
 
Surveillance of communication by the National Defence Radio Establishment (FRA)
Surveillance of communication by the National Defence Radio Establishment (FRA)Surveillance of communication by the National Defence Radio Establishment (FRA)
Surveillance of communication by the National Defence Radio Establishment (FRA)Klamberg
 
Chapter2
Chapter2Chapter2
Chapter2Pibi Lu
 
CitizenReporting_for_Crime_Analysis
CitizenReporting_for_Crime_AnalysisCitizenReporting_for_Crime_Analysis
CitizenReporting_for_Crime_AnalysisPatrick Floto
 
Data privacy and security
Data privacy and securityData privacy and security
Data privacy and securitytoomz32
 
Digital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptx
Digital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptxDigital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptx
Digital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptxwebb00704
 
Net Neutrality Capacity Building Seminar
Net Neutrality Capacity Building SeminarNet Neutrality Capacity Building Seminar
Net Neutrality Capacity Building SeminarExcel Asama
 
Getting the social side of pervasive computing right
Getting the social side of pervasive computing rightGetting the social side of pervasive computing right
Getting the social side of pervasive computing rightblogzilla
 
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAINCOMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAINamiable_indian
 
Computer and Cyber forensics, a case study of Ghana
Computer and Cyber forensics, a case study of GhanaComputer and Cyber forensics, a case study of Ghana
Computer and Cyber forensics, a case study of GhanaMohammed Mahfouz Alhassan
 
Investigating and Prosecuting Cyber Crime - Forensic Dependencies and Barrier...
Investigating and Prosecuting Cyber Crime - Forensic Dependencies and Barrier...Investigating and Prosecuting Cyber Crime - Forensic Dependencies and Barrier...
Investigating and Prosecuting Cyber Crime - Forensic Dependencies and Barrier...Cameron Brown
 
Net Neutrality Capacity Building Seminar
Net Neutrality Capacity Building SeminarNet Neutrality Capacity Building Seminar
Net Neutrality Capacity Building SeminarExcel Asama
 
Lofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and EncryptionLofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and EncryptionSean Whalen
 
Information Laws in Mekong Countries
Information Laws in Mekong CountriesInformation Laws in Mekong Countries
Information Laws in Mekong CountriesArthit Suriyawongkul
 
Policies and Law in IT
Policies and Law in ITPolicies and Law in IT
Policies and Law in ITAnushka Perera
 
Application of principles of international law to computer networks operation...
Application of principles of international law to computer networks operation...Application of principles of international law to computer networks operation...
Application of principles of international law to computer networks operation...Adriana Dvorsak
 

Similar to Electronic Surveillance Laws and Mass Data Collection (20)

Surveillance of communication by the National Defence Radio Establishment (FRA)
Surveillance of communication by the National Defence Radio Establishment (FRA)Surveillance of communication by the National Defence Radio Establishment (FRA)
Surveillance of communication by the National Defence Radio Establishment (FRA)
 
Surveillance of communication by the National Defence Radio Establishment (FRA)
Surveillance of communication by the National Defence Radio Establishment (FRA)Surveillance of communication by the National Defence Radio Establishment (FRA)
Surveillance of communication by the National Defence Radio Establishment (FRA)
 
Chapter2
Chapter2Chapter2
Chapter2
 
CitizenReporting_for_Crime_Analysis
CitizenReporting_for_Crime_AnalysisCitizenReporting_for_Crime_Analysis
CitizenReporting_for_Crime_Analysis
 
Data privacy and security
Data privacy and securityData privacy and security
Data privacy and security
 
Digital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptx
Digital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptxDigital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptx
Digital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptx
 
Net Neutrality Capacity Building Seminar
Net Neutrality Capacity Building SeminarNet Neutrality Capacity Building Seminar
Net Neutrality Capacity Building Seminar
 
Getting the social side of pervasive computing right
Getting the social side of pervasive computing rightGetting the social side of pervasive computing right
Getting the social side of pervasive computing right
 
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAINCOMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
 
Computer and Cyber forensics, a case study of Ghana
Computer and Cyber forensics, a case study of GhanaComputer and Cyber forensics, a case study of Ghana
Computer and Cyber forensics, a case study of Ghana
 
2627 8105-1-pb
2627 8105-1-pb2627 8105-1-pb
2627 8105-1-pb
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Investigating and Prosecuting Cyber Crime - Forensic Dependencies and Barrier...
Investigating and Prosecuting Cyber Crime - Forensic Dependencies and Barrier...Investigating and Prosecuting Cyber Crime - Forensic Dependencies and Barrier...
Investigating and Prosecuting Cyber Crime - Forensic Dependencies and Barrier...
 
Net Neutrality Capacity Building Seminar
Net Neutrality Capacity Building SeminarNet Neutrality Capacity Building Seminar
Net Neutrality Capacity Building Seminar
 
privtechsomeassemb
privtechsomeassembprivtechsomeassemb
privtechsomeassemb
 
Lofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and EncryptionLofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and Encryption
 
Information Laws in Mekong Countries
Information Laws in Mekong CountriesInformation Laws in Mekong Countries
Information Laws in Mekong Countries
 
Policies and Law in IT
Policies and Law in ITPolicies and Law in IT
Policies and Law in IT
 
4482LawEthics.ppt
4482LawEthics.ppt4482LawEthics.ppt
4482LawEthics.ppt
 
Application of principles of international law to computer networks operation...
Application of principles of international law to computer networks operation...Application of principles of international law to computer networks operation...
Application of principles of international law to computer networks operation...
 

Recently uploaded

Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........LeaCamillePacle
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationAadityaSharma884161
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 

Recently uploaded (20)

Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint Presentation
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 

Electronic Surveillance Laws and Mass Data Collection

  • 1. Electronic Surveillance of Communications - Master Programme in Law and Information Technology - Course C 2010. Development and Management of Information Systems in a Legal Perspective - Course C, block 5. Identification and Control technologies Mark Klamberg, doctoral candidate
  • 2.
  • 3.
  • 4. Changes in Our Society Technological change Until the end of the 1990s satellites were the main medium for international communication. Now it is fiber optics in cables controlled by private companies. Shift in Threats Relevant for National Security The perceived threat from the Soviet Union has been replaced with vague threats such as terrorism, international criminality, migration, environmental threats and financial imbalances New Legal Demands The European Convention on Human Rights requires that interferences in the private life and family has a legal basis (article 8) Privatization Telecom operators were previously state-owned and controlled. Now they are private companies whose priority is to safeguard the interests of their customers, not the interests of the state
  • 5. Signal Intelligence - why legislation? Considering the changes in the 1990s: The technological change and privatization creates a need to adopt legislation or other binding measures that obligates the private operators to surrender communication to the State. This makes the existence of previously top secret surveillance public knowledge The shift in perceived threats creates a need to expand the mandate or codify an already expanded mandate of signal intelligence organizations The public knowledge about this surveillance and new legal demands creates a need for legislation protecting privacy
  • 6. Data retention - why legislation? Communication providers have stored traffic data (who is phoning who and when) about the phone calls of their customers for billing purposes. Law enforcement agencies have used such data in order to detect, prevent and investigate crime Nowadays, consumers are turning to flat-rate subscriptions and voice over IP-services (for example Skype). Thus, there is no need to retain traffic data for billing purposes. Law enforcement agencies still want/need traffic data.
  • 7. We humans leave electronic footprints after us, in the form of credit card payments, visits to websites, records of phone calls and e-mail (communication data). Imagine that somebody could collect everything and process it through a powerful computer. With the right tools one could find patterns that in detail describe what groups and networks you belong to. Such techniques are referred to as traffic analysis and social network analysis Traffic analysis and social network analysis
  • 8. With traffic analysis social networks may be identified A communication pattern can depict relations between individuals, Organisations, websites, etc with purpose of charting the social networks, position of power, views and other personal data about an individual. The actual message is less important than the information about the sender, recipient, the time of transaction, and means of communication. Knowledge about the communication pattern and thus the social network of person is often enough Individual
  • 9. U.S. National Research Council, report October 2008 “ Protecting Individual Privacy in the Struggle Against Terrorists: A Framework for Program Assessment”
  • 10. Two general types of data mining techniques 1. Subject-based data mining 2. Pattern-based data mining U.S. National Research Council “Protecting Individual Privacy in the Struggle Against Terrorists: A Framework for Program Assessment”
  • 11. Subject-based data mining Subject-based data mining uses an initiating individual or other datum that is considered, based on other information, to be of high interest, and the goal is to determine what other persons or financial transactions or movements, etc., are related to that initiating datum. U.S. National Research Council
  • 12. Pattern-based data mining Pattern-based data mining looks for patterns (including anomalous data patterns) that might be associated with terrorist activity—these patterns might be regarded as small signals in a large ocean of noise. U.S. National Research Council
  • 13. When to use the two different techniques In the case of the decentralized group, subject-based data mining is likely to augment and enhance traditional police investigations by making it possible to access larger volumes of data more quickly. Furthermore, communications networks can more easily be identified and mapped if one or a few individuals in the network are known with high confidence. By contrast, pattern-based data mining may be more useful in finding the larger information footprint that characterizes centrally organized terrorist groups. U.S. National Research Council
  • 14. Utility of pattern-based data mining The utility of pattern-based data mining is found primarily if not exclusively in its role in helping humans make better decisions about how to deploy scarce investigative resources, and action (such as arrest, search, denial of rights) should never be taken solely on the basis of a data mining result. Automated terrorist identification through data mining (or any other known methodology) is neither feasible as an objective nor desirable as a goal of technology development efforts. U.S. National Research Council
  • 15. Panspectron (Delanda) “ There are many differences between the Panopticon and the Panspectron being assembled at the NSA. Instead of positioning some human bodies around a central sensor, a multiplicity of sensors is deployed around all bodies: its antenna farms, spy satellites and cable-traffic intercepts feed into its computers all the information that can be gathered. This is then processed through a series of “filters” or key-word watch lists. The Panspectron does not merely select certain bodies and certain (visual) data about them. Rather, it compiles information about all at the same time, using computers to select the segments of data relevant to its surveillance tasks.” Panopticon (Bentham)
  • 16. Discussion Based on the material distributed, discuss for 15 minutes: 1. When does the interference with privacy occur in relation to systems of mass surveillance of electronic communication? 2. How does the American system differ from the legal regime under ECHR in its approach to the content/non-content distinction? 3. In the country you come from, do you have any regulations concern signal intelligence/strategic monitoring/surveillance for intelligence purposes? If not, does your country still have a state agency similar to the NSA, GCHQ, BND and FRA? 4. Is it appropriate to involve courts in issues concerning the implementation of policies on national security?
  • 17. Defining content and traffic data As opposed to the content of a message, traffic data is the information used by the communication network to deliver the message to or from the user. In a telephone network, traffic data will reveal the number dialed (“to”), the originating number (“from”), the time of the call, and its duration. In the internet context, traffic data will similarly reveal the “to” and “from” e-mail address, the instant message to and from account names, and the other administrative information the computers generate in the course of delivery Compare with Orin Kerr: content and envelope information
  • 18. Four fields of legislation International communication Domestic communication Preliminary Investigation Intelligence N/A 1. Chapter 27 of the Code of Judicial Procedure 2. Chapter 6 section 22(3) of the Electronic Communications Act (2003:389) 3. Act on measures concerning certain serious crimes (2008:854) 1. Act on measures to prevent certain serious crimes (2007:979) 2. Chapter 6 section 22(3) of the Electronic Communications Act (2003:389) Signal Intelligence Act (2008:717)
  • 19. EU Data Retention Directive 1. Data is retained for periods of not less than six months and not more than two years from the date of the communication 2. The data retained purports to the questions who was communicating with who, when the communication occurred, where was the communicating parties and what type of communication used. 3. No content data may be retained for the purpose of the directive. 4. The access for national authorities to the data is to be regulated through domestic law
  • 20. Summary of the legislation adopted 18 June 2008: IT- and telecom operators are obligated to transfer all communication in cables crossing Swedish borders to nodes controlled by the State The Defence Radio Establishment will intercept communication and collect data at the nodes (signal intelligence)
  • 21. Similar organizations, laws and programs USA Organization: National Security Agency (NSA) Legislation: FISA United Kingdom Organization: Government Communications Headquarters (GCHQ) Legislation: RIPA Case: Liberty et al. v. The United Kingdom
  • 22. Similar organizations, laws and programs France Organization: Direction Générale de la Sécurité Extérieure (DGSE) Germany Organization: Bundesnachrichtendienst (BND) Legislation: G 10-law (Gesetz zur Beschränkung des Brief-, Post- und Fernmeldegeheimnisses) Case: Weber and Saravia v. Germany Denmark Organization: Forsvarets Efterretningstjeneste (FE) Legislation: 17 § forsvarsloven
  • 23.
  • 24.
  • 25. 2. Clients (known) 1. The Government 2. The Government office 3. The Defence Forces 4. The Police, including the Security Service (SÄPO) 5. National Inspectorate of Strategic Products 6. Swedish Customs Service 7. Defence Materiel Administration Agency 8. Defence Research Agency 9. Civil Contingencies Agency International Partners exist but unknown which those are. Could include NSA, GCHQ, BND, DGSE and FE Excluded in Autumn 2009
  • 26.
  • 27.
  • 28.
  • 29.
  • 31. Thanks! Blog: www.klamberg.se E-mail: [email_address] Phone: +46 8 16 11 90

Editor's Notes

  1. Common law model is said to be ‘ adversarial’ or ‘accusatorial’ and the Civil law model ‘inquisitorial’. No domestic system represents a pure model I will use the terms ‘adversarial’ and ‘inquisitorial’ to describe in a general sense differences attributed to the two traditions, but also, on occasion, resort to the common law and civil law labels.