SlideShare a Scribd company logo
1 of 12
Professor Lilian Edwards – University of 
Strathclyde 
Lachlan Urquhart – University of 
Nottingham
 Context 
 Intelligence Led Policing and SOCMINT 
 London Riots and after 
 NOT Snowden/PRISM/TEMPORA etc – domestic, rule of 
law 
 Legal Issues 
 Privacy in Public? ECHR and UK 
 Regulation of Investigatory Powers Act 2000 (RIPA) and 
SOCMINT 
 Is everything done in public, “public”? 
 Are structured dossiers still the enemy? 
 What next?
 The growth of “intelligence led” policing 
 Risk aversion, predictive profiles, big data 
 “Assemblages” of data via private intermediaries 
 OSINT 
 Publically available, open sources 
 SOCMINT (Bartlett and Miller 2013) used for 
 Network and sentiment analysis e.g. 
EMOTIVE 
 Crowdsourcing info from public 
 Event Detection and situational awareness 
 Predictive analytics eg IBM Memphis P.D. 
 Policy challenges (Omand 2012):– 
 Public trust 
 Legitimacy and necessity 
 (Demos 2013) also stress need for necessity, 
proportionality, transparency
 UK Summer Riots 2011 
 Flickr stream of suspect photos 
▪ 770 arrests & 167 charges 
 Facewatch mobile app 
 “Shop a Looter” (Pieri 2014) 
 Issues: 
▪ Sampling bias - “Reading the Riots” 
▪ Human error eg Boston Bombings
 Met Police “5 Days in 
August” (2012) 
 Police unequipped to deal with 
SOCMINT 
 HMIC “Rules of Engagement” 
(2011) 
 “searching the British Library for a 
page in a book, without an index to refer to” 
 -> Police want stronger capabilities 
 Real time analytics
 Do public social media posts raise any expectations of privacy? 
 “What Planet is this individual on? Her Tweets are Public domain.” 
 Gillespie (2009) (UK) – no. Cf Bartow (2011) (US) – “Facebook is a giant 
surveillance tool, no warrant required, which the government can use.. 
with almost no practical constraints from existing laws” 
 Data protection law –exemptions (UK) for detection & prevention 
of crime; no need for consent, no subject access rights 
 ECHR art 8? 
 Von Hannover ECtHR (2004) – influential in UK privacy law after HRA1998 
 cfWood v Metropolitan Police (2008) (UK) 
 Result – clearly some expectation of privacy in public; interference 
must be necessary, proportionate and according to law; but how 
much? & how balanced against other values eg security? 
 How much is this recognised in UK RIPA 2000 ?
 Eric King, PI: “SOCMINT simply did not exist when RIPA 2000 was 
conceived and it is hard to simply slot into the existing categories 
and typologies established by RIPA” 
 No officialACPO guidance or Code of Practice – Demos (Bartlett 
and Miller) 2013 report. 
 Envisaged “digital” scheme in RIPA : Pt 1 Ch 1 covers real time 
interception of emails, warrant from Sec of State needed ; Ch 2 
access to records of “communications” (=meta) data granted 
automatically in most cases. 
 “Analog world” scheme in Pt 2 RIPA 
 Directed covert surveillance – eg secretly following suspect 
 Covert human intelligence source (CHIS) -eg befriending someone under 
false ID to acquire info 
 Both require authorisation of senior officer but not warrant of S of S 
 How if at all does SOCMINT fit in?
 Demos 2013 assert SOCMINT collection needs no 
authorisation of any kind UNLESS: 
 Fake profile or deception (anonymous lurking?) used to obtain access - 
> CHIS or Directed Surveillance may apply 
 Where a “detailed profile” is made of “named individual”, even from 
open sources -> Directed Surveillance? (O’Floinn & Ormerod, 2011) 
▪ Cf Rotaru v Romania ECtHR (2000) – “public information can fall within the 
scope of private life where it is systematically collected and stored in files held 
by the authorities” 
▪ Cf Stasi surveillance in former GDR –Wood v Metropolitan (para 27-28) 
 “Back door” collection of protected SOCMINT data might fall 
within RIPA Pt1 Ch 1, “interception” – but fits very badly indeed 
 Public profiles? Argued no expectation of privacy so long as 
user knew from T&C that public data might be collected , esp 
via API
Q1. Can it be assumed everything done in public is “public”? 
 No : 
 Material about A is exposed by B; 
 Users often cannot protect traffic or meta data or friends list; 
 Consent to T and C does not remove any expectation of privacy 
▪ online standard term contracts are rarely read or understood, 
▪ market for competition on privacy has not evolved in network 
effects industries 
 Giving up soc media is impossible for many groups 
 boyd (2014) young adults/kids choose social media as “networked 
publics” (un F-locked) without giving up expectations of privacy 
 Cannot anticipate “invisible audiences, collapsed contexts and 
persistent content” (how true of all users?) 
Q2. Is SOCMINT valuable as evidence? 
 Acontextual (eg Twitter “rape” usage cf Nissenbaum) ; subject to 
disinhibition effect and “social steganography”?
ECtHR case law has seen structured 
dossiers maintained over time as key 
threat – Rotaru v Romania dictum 
“public information can fall within 
the scope of private life where it is 
systematically collected and stored in 
files held by the authorities” 
-> Qu 3: Does the Rotaru distinction 
between structured data in files held by 
police, and unstructured data hold up in 
the age of Google and data-mining? 
Google Spain (ECJ) 2014? -> 
“processing of personal 
data.. carried out by .. a 
search engine is liable to 
affect significantly the 
fundamental rights to 
privacy .. the list of results 
[is] a structured overview of 
the information relating to 
that individual that can be 
found on the internet — 
information which 
potentially concerns a vast 
number of aspects of his 
private life and which, 
without the search engine, 
could not have been inter-connected 
or could have 
been only with great 
difficulty — and thereby to 
establish a more or less 
detailed profile of him. ‘
 Are we writing a blank cheque for mass 
Panoptic surveillance by treating 
SOCMINT as “public” & free of 
restrictions 
 The “new Stasi”? Cheaper, better! 
 What rules should guarantee our 
expectations of privacy re “public” 
OSINT and SOCMINT? 
 “Code” solutions – Snapchat, 
WhatsApp? Deceptive, illusory? 
 Ethics for big data 
collectors/intermediaries – the future?
Thanks for Listening 
Questions? 
Contact Details: 
- lilian.edwards@strath.ac.uk -@lilianedwards 
- lachlan.urquhart@nottingham.ac.uk -@mooseabyte

More Related Content

What's hot

Electronic Surveillance of Communications 100225
Electronic Surveillance of Communications 100225Electronic Surveillance of Communications 100225
Electronic Surveillance of Communications 100225Klamberg
 
Electronic Surveillance Of Communications 100225
Electronic Surveillance Of Communications 100225Electronic Surveillance Of Communications 100225
Electronic Surveillance Of Communications 100225Klamberg
 
E. Bryan - E-Governance and Personal Privacy
E. Bryan -  E-Governance and Personal PrivacyE. Bryan -  E-Governance and Personal Privacy
E. Bryan - E-Governance and Personal PrivacyEmerson Bryan
 
Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy  Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy Carolina Rossini
 
Internet Surveillance
Internet SurveillanceInternet Surveillance
Internet Surveillancecfeutlinske
 
Artificial Intelligence On The Dark Web
Artificial Intelligence On The Dark WebArtificial Intelligence On The Dark Web
Artificial Intelligence On The Dark Webabraxasdarknetmarket
 
Digital Sovereigns or Consent of the Networked
Digital Sovereigns or Consent of the NetworkedDigital Sovereigns or Consent of the Networked
Digital Sovereigns or Consent of the NetworkedMsifry
 
Causes of the Growing Conflict Between Privacy and Security
Causes of the Growing Conflict Between Privacy and SecurityCauses of the Growing Conflict Between Privacy and Security
Causes of the Growing Conflict Between Privacy and SecurityDon Edwards
 
Leg 500 assignment 2 the value of digital privacy in an information technolog...
Leg 500 assignment 2 the value of digital privacy in an information technolog...Leg 500 assignment 2 the value of digital privacy in an information technolog...
Leg 500 assignment 2 the value of digital privacy in an information technolog...printwork4849
 
Marsden Disinformation Algorithms #IGF2019
Marsden Disinformation Algorithms #IGF2019 Marsden Disinformation Algorithms #IGF2019
Marsden Disinformation Algorithms #IGF2019 Chris Marsden
 
The effectiveness of policing cybercrime
The effectiveness of policing cybercrimeThe effectiveness of policing cybercrime
The effectiveness of policing cybercrimeRoel Palmaers
 
Cyber Surveillance - Honors English 1 Presentation
Cyber Surveillance - Honors English 1 PresentationCyber Surveillance - Honors English 1 Presentation
Cyber Surveillance - Honors English 1 Presentationaxnv
 
Is the Internet Fragmenting?
Is the Internet Fragmenting?Is the Internet Fragmenting?
Is the Internet Fragmenting?APNIC
 
Regional journalists' source protection and information security practice
Regional journalists' source protection and information security practiceRegional journalists' source protection and information security practice
Regional journalists' source protection and information security practicePaul Bradshaw
 
Pecha kucha on_surveillance (1)
Pecha kucha on_surveillance (1)Pecha kucha on_surveillance (1)
Pecha kucha on_surveillance (1)OliverGibbs505
 
Social Justice & Black Twitter
Social Justice & Black TwitterSocial Justice & Black Twitter
Social Justice & Black TwitterAyodele Odubela
 
Internetregulationjapan
InternetregulationjapanInternetregulationjapan
Internetregulationjapanrmackinnon
 

What's hot (20)

privtechsomeassemb
privtechsomeassembprivtechsomeassemb
privtechsomeassemb
 
Electronic Surveillance of Communications 100225
Electronic Surveillance of Communications 100225Electronic Surveillance of Communications 100225
Electronic Surveillance of Communications 100225
 
Electronic Surveillance Of Communications 100225
Electronic Surveillance Of Communications 100225Electronic Surveillance Of Communications 100225
Electronic Surveillance Of Communications 100225
 
E. Bryan - E-Governance and Personal Privacy
E. Bryan -  E-Governance and Personal PrivacyE. Bryan -  E-Governance and Personal Privacy
E. Bryan - E-Governance and Personal Privacy
 
Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy  Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy
 
Internet Surveillance
Internet SurveillanceInternet Surveillance
Internet Surveillance
 
Artificial Intelligence On The Dark Web
Artificial Intelligence On The Dark WebArtificial Intelligence On The Dark Web
Artificial Intelligence On The Dark Web
 
Digital Sovereigns or Consent of the Networked
Digital Sovereigns or Consent of the NetworkedDigital Sovereigns or Consent of the Networked
Digital Sovereigns or Consent of the Networked
 
Causes of the Growing Conflict Between Privacy and Security
Causes of the Growing Conflict Between Privacy and SecurityCauses of the Growing Conflict Between Privacy and Security
Causes of the Growing Conflict Between Privacy and Security
 
Leg 500 assignment 2 the value of digital privacy in an information technolog...
Leg 500 assignment 2 the value of digital privacy in an information technolog...Leg 500 assignment 2 the value of digital privacy in an information technolog...
Leg 500 assignment 2 the value of digital privacy in an information technolog...
 
Marsden Disinformation Algorithms #IGF2019
Marsden Disinformation Algorithms #IGF2019 Marsden Disinformation Algorithms #IGF2019
Marsden Disinformation Algorithms #IGF2019
 
Polinter11
Polinter11Polinter11
Polinter11
 
The effectiveness of policing cybercrime
The effectiveness of policing cybercrimeThe effectiveness of policing cybercrime
The effectiveness of policing cybercrime
 
Cyber Surveillance - Honors English 1 Presentation
Cyber Surveillance - Honors English 1 PresentationCyber Surveillance - Honors English 1 Presentation
Cyber Surveillance - Honors English 1 Presentation
 
Is the Internet Fragmenting?
Is the Internet Fragmenting?Is the Internet Fragmenting?
Is the Internet Fragmenting?
 
Regional journalists' source protection and information security practice
Regional journalists' source protection and information security practiceRegional journalists' source protection and information security practice
Regional journalists' source protection and information security practice
 
Pecha kucha on_surveillance (1)
Pecha kucha on_surveillance (1)Pecha kucha on_surveillance (1)
Pecha kucha on_surveillance (1)
 
Social Justice & Black Twitter
Social Justice & Black TwitterSocial Justice & Black Twitter
Social Justice & Black Twitter
 
Internetregulationjapan
InternetregulationjapanInternetregulationjapan
Internetregulationjapan
 
Polinter09
Polinter09Polinter09
Polinter09
 

Similar to Police surveillance of social media - do you have a reasonable expectation of privacy online?

Social media, surveillance and censorship
Social media, surveillance  and censorshipSocial media, surveillance  and censorship
Social media, surveillance and censorshiplilianedwards
 
The death of data protection sans obama
The death of data protection sans obamaThe death of data protection sans obama
The death of data protection sans obamaLilian Edwards
 
The death of data protection
The death of data protection The death of data protection
The death of data protection Lilian Edwards
 
Reply to post 1 & 2 with 250 words  each.Post 11.  What va
Reply to post 1 & 2 with 250 words  each.Post 11.  What vaReply to post 1 & 2 with 250 words  each.Post 11.  What va
Reply to post 1 & 2 with 250 words  each.Post 11.  What vafelipaser7p
 
Malcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
Malcolm Crompton, IIS Partners Irish Future Internet Forum - SocioeconomicsMalcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
Malcolm Crompton, IIS Partners Irish Future Internet Forum - SocioeconomicsIrish Future Internet Forum
 
Getting the social side of pervasive computing right
Getting the social side of pervasive computing rightGetting the social side of pervasive computing right
Getting the social side of pervasive computing rightblogzilla
 
Surveillance In 1984
Surveillance In 1984Surveillance In 1984
Surveillance In 1984Christy Davis
 
Invasion Of Privacy In Canadian Media
Invasion Of Privacy In Canadian MediaInvasion Of Privacy In Canadian Media
Invasion Of Privacy In Canadian MediaKelly Ratkovic
 
Chapter2
Chapter2Chapter2
Chapter2Pibi Lu
 
Electronic surveillance and privacy 130916
Electronic surveillance and privacy 130916Electronic surveillance and privacy 130916
Electronic surveillance and privacy 130916Klamberg
 
Personal Data Privacy and Information Security
Personal Data Privacy and Information SecurityPersonal Data Privacy and Information Security
Personal Data Privacy and Information SecurityCharles Mok
 
Outline D
Outline DOutline D
Outline Dbutest
 
digital identity 2.0: how technology is transforming behaviours and raising c...
digital identity 2.0: how technology is transforming behaviours and raising c...digital identity 2.0: how technology is transforming behaviours and raising c...
digital identity 2.0: how technology is transforming behaviours and raising c...Patrick McCormick
 
Privacy reconsidered
Privacy reconsideredPrivacy reconsidered
Privacy reconsideredBrian Rowe
 
The Self-Invasion Of Privacy
The Self-Invasion Of PrivacyThe Self-Invasion Of Privacy
The Self-Invasion Of PrivacyDiane Allen
 
Information Sharing, Dot Connecting and Intelligence Failures.docx
Information Sharing, Dot Connecting and Intelligence Failures.docxInformation Sharing, Dot Connecting and Intelligence Failures.docx
Information Sharing, Dot Connecting and Intelligence Failures.docxannettsparrow
 

Similar to Police surveillance of social media - do you have a reasonable expectation of privacy online? (18)

Social media, surveillance and censorship
Social media, surveillance  and censorshipSocial media, surveillance  and censorship
Social media, surveillance and censorship
 
The death of data protection sans obama
The death of data protection sans obamaThe death of data protection sans obama
The death of data protection sans obama
 
The death of data protection
The death of data protection The death of data protection
The death of data protection
 
Reply to post 1 & 2 with 250 words  each.Post 11.  What va
Reply to post 1 & 2 with 250 words  each.Post 11.  What vaReply to post 1 & 2 with 250 words  each.Post 11.  What va
Reply to post 1 & 2 with 250 words  each.Post 11.  What va
 
Malcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
Malcolm Crompton, IIS Partners Irish Future Internet Forum - SocioeconomicsMalcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
Malcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
 
Getting the social side of pervasive computing right
Getting the social side of pervasive computing rightGetting the social side of pervasive computing right
Getting the social side of pervasive computing right
 
Surveillance In 1984
Surveillance In 1984Surveillance In 1984
Surveillance In 1984
 
Invasion Of Privacy In Canadian Media
Invasion Of Privacy In Canadian MediaInvasion Of Privacy In Canadian Media
Invasion Of Privacy In Canadian Media
 
Chapter2
Chapter2Chapter2
Chapter2
 
Electronic surveillance and privacy 130916
Electronic surveillance and privacy 130916Electronic surveillance and privacy 130916
Electronic surveillance and privacy 130916
 
Personal Data Privacy and Information Security
Personal Data Privacy and Information SecurityPersonal Data Privacy and Information Security
Personal Data Privacy and Information Security
 
Outline D
Outline DOutline D
Outline D
 
digital identity 2.0: how technology is transforming behaviours and raising c...
digital identity 2.0: how technology is transforming behaviours and raising c...digital identity 2.0: how technology is transforming behaviours and raising c...
digital identity 2.0: how technology is transforming behaviours and raising c...
 
Internet Privacy Essay
Internet Privacy EssayInternet Privacy Essay
Internet Privacy Essay
 
Privacy reconsidered
Privacy reconsideredPrivacy reconsidered
Privacy reconsidered
 
The Self-Invasion Of Privacy
The Self-Invasion Of PrivacyThe Self-Invasion Of Privacy
The Self-Invasion Of Privacy
 
NS Civil Liberties & Security Supplement Sept 2014
NS Civil Liberties & Security Supplement Sept 2014NS Civil Liberties & Security Supplement Sept 2014
NS Civil Liberties & Security Supplement Sept 2014
 
Information Sharing, Dot Connecting and Intelligence Failures.docx
Information Sharing, Dot Connecting and Intelligence Failures.docxInformation Sharing, Dot Connecting and Intelligence Failures.docx
Information Sharing, Dot Connecting and Intelligence Failures.docx
 

More from Lilian Edwards

Global Governance of Generative AI: The Right Way Forward
Global Governance of Generative AI: The Right Way ForwardGlobal Governance of Generative AI: The Right Way Forward
Global Governance of Generative AI: The Right Way ForwardLilian Edwards
 
How to regulate foundation models: can we do better than the EU AI Act?
How to regulate foundation models: can we do better than the EU AI Act?How to regulate foundation models: can we do better than the EU AI Act?
How to regulate foundation models: can we do better than the EU AI Act?Lilian Edwards
 
Can ChatGPT be compatible with the GDPR? Discuss.
Can ChatGPT be compatible with the GDPR? Discuss.Can ChatGPT be compatible with the GDPR? Discuss.
Can ChatGPT be compatible with the GDPR? Discuss.Lilian Edwards
 
What Do You Do with a Problem Like AI?
What Do You Do with a Problem Like AI?What Do You Do with a Problem Like AI?
What Do You Do with a Problem Like AI?Lilian Edwards
 
The GDPR, Brexit, the UK and adequacy
The GDPR, Brexit, the UK and adequacyThe GDPR, Brexit, the UK and adequacy
The GDPR, Brexit, the UK and adequacyLilian Edwards
 
Slave to the Algorithm 2016
Slave to the Algorithm  2016 Slave to the Algorithm  2016
Slave to the Algorithm 2016 Lilian Edwards
 
Cloud computing : legal , privacy and contract issues
Cloud computing : legal , privacy and contract issuesCloud computing : legal , privacy and contract issues
Cloud computing : legal , privacy and contract issuesLilian Edwards
 
Privacy, the Internet of Things and Smart Cities
Privacy, the Internet of Things and Smart Cities Privacy, the Internet of Things and Smart Cities
Privacy, the Internet of Things and Smart Cities Lilian Edwards
 
From Privacy Impact Assessment to Social Impact Assessment: Preserving TRrus...
From Privacy Impact Assessment to Social Impact Assessment: Preserving TRrus...From Privacy Impact Assessment to Social Impact Assessment: Preserving TRrus...
From Privacy Impact Assessment to Social Impact Assessment: Preserving TRrus...Lilian Edwards
 
UK copyright, online intermediaries and enforcement
UK copyright, online intermediaries and enforcementUK copyright, online intermediaries and enforcement
UK copyright, online intermediaries and enforcementLilian Edwards
 
the Death of Privacy in Three Acts
the Death of Privacy in Three Actsthe Death of Privacy in Three Acts
the Death of Privacy in Three ActsLilian Edwards
 
Revenge porn: punish, remove, forget, forgive?
Revenge porn: punish, remove, forget, forgive? Revenge porn: punish, remove, forget, forgive?
Revenge porn: punish, remove, forget, forgive? Lilian Edwards
 
From piracy to “The Producers?
From piracy to “The Producers?From piracy to “The Producers?
From piracy to “The Producers?Lilian Edwards
 
The Death of Privacy in Three Acts
The Death of Privacy in Three ActsThe Death of Privacy in Three Acts
The Death of Privacy in Three ActsLilian Edwards
 
IT law : the middle kingdom between east and West
IT law : the middle kingdom between east and WestIT law : the middle kingdom between east and West
IT law : the middle kingdom between east and WestLilian Edwards
 
What do we do with aproblem like revenge porn ?
What do we do with  aproblem like  revenge porn ?What do we do with  aproblem like  revenge porn ?
What do we do with aproblem like revenge porn ?Lilian Edwards
 
Slave to the Algo-Rhythms?
Slave to the Algo-Rhythms?Slave to the Algo-Rhythms?
Slave to the Algo-Rhythms?Lilian Edwards
 
Cdas 2012, lilian edwards and edina harbinja
Cdas 2012, lilian edwards and edina harbinjaCdas 2012, lilian edwards and edina harbinja
Cdas 2012, lilian edwards and edina harbinjaLilian Edwards
 

More from Lilian Edwards (20)

Global Governance of Generative AI: The Right Way Forward
Global Governance of Generative AI: The Right Way ForwardGlobal Governance of Generative AI: The Right Way Forward
Global Governance of Generative AI: The Right Way Forward
 
How to regulate foundation models: can we do better than the EU AI Act?
How to regulate foundation models: can we do better than the EU AI Act?How to regulate foundation models: can we do better than the EU AI Act?
How to regulate foundation models: can we do better than the EU AI Act?
 
Can ChatGPT be compatible with the GDPR? Discuss.
Can ChatGPT be compatible with the GDPR? Discuss.Can ChatGPT be compatible with the GDPR? Discuss.
Can ChatGPT be compatible with the GDPR? Discuss.
 
What Do You Do with a Problem Like AI?
What Do You Do with a Problem Like AI?What Do You Do with a Problem Like AI?
What Do You Do with a Problem Like AI?
 
The GDPR, Brexit, the UK and adequacy
The GDPR, Brexit, the UK and adequacyThe GDPR, Brexit, the UK and adequacy
The GDPR, Brexit, the UK and adequacy
 
Slave to the Algorithm 2016
Slave to the Algorithm  2016 Slave to the Algorithm  2016
Slave to the Algorithm 2016
 
Cloud computing : legal , privacy and contract issues
Cloud computing : legal , privacy and contract issuesCloud computing : legal , privacy and contract issues
Cloud computing : legal , privacy and contract issues
 
Privacy, the Internet of Things and Smart Cities
Privacy, the Internet of Things and Smart Cities Privacy, the Internet of Things and Smart Cities
Privacy, the Internet of Things and Smart Cities
 
From Privacy Impact Assessment to Social Impact Assessment: Preserving TRrus...
From Privacy Impact Assessment to Social Impact Assessment: Preserving TRrus...From Privacy Impact Assessment to Social Impact Assessment: Preserving TRrus...
From Privacy Impact Assessment to Social Impact Assessment: Preserving TRrus...
 
UK copyright, online intermediaries and enforcement
UK copyright, online intermediaries and enforcementUK copyright, online intermediaries and enforcement
UK copyright, online intermediaries and enforcement
 
The GDPR for Techies
The GDPR for TechiesThe GDPR for Techies
The GDPR for Techies
 
the Death of Privacy in Three Acts
the Death of Privacy in Three Actsthe Death of Privacy in Three Acts
the Death of Privacy in Three Acts
 
Revenge porn: punish, remove, forget, forgive?
Revenge porn: punish, remove, forget, forgive? Revenge porn: punish, remove, forget, forgive?
Revenge porn: punish, remove, forget, forgive?
 
From piracy to “The Producers?
From piracy to “The Producers?From piracy to “The Producers?
From piracy to “The Producers?
 
The Death of Privacy in Three Acts
The Death of Privacy in Three ActsThe Death of Privacy in Three Acts
The Death of Privacy in Three Acts
 
IT law : the middle kingdom between east and West
IT law : the middle kingdom between east and WestIT law : the middle kingdom between east and West
IT law : the middle kingdom between east and West
 
What do we do with aproblem like revenge porn ?
What do we do with  aproblem like  revenge porn ?What do we do with  aproblem like  revenge porn ?
What do we do with aproblem like revenge porn ?
 
Slave to the Algo-Rhythms?
Slave to the Algo-Rhythms?Slave to the Algo-Rhythms?
Slave to the Algo-Rhythms?
 
9worlds robots
9worlds robots9worlds robots
9worlds robots
 
Cdas 2012, lilian edwards and edina harbinja
Cdas 2012, lilian edwards and edina harbinjaCdas 2012, lilian edwards and edina harbinja
Cdas 2012, lilian edwards and edina harbinja
 

Recently uploaded

如何办理(KPU毕业证书)加拿大昆特兰理工大学毕业证学位证书
 如何办理(KPU毕业证书)加拿大昆特兰理工大学毕业证学位证书 如何办理(KPU毕业证书)加拿大昆特兰理工大学毕业证学位证书
如何办理(KPU毕业证书)加拿大昆特兰理工大学毕业证学位证书Fir sss
 
Arbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in IndiaArbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in IndiaNafiaNazim
 
Cleades Robinson's Commitment to Service
Cleades Robinson's Commitment to ServiceCleades Robinson's Commitment to Service
Cleades Robinson's Commitment to ServiceCleades Robinson
 
POLICE ACT, 1861 the details about police system.pptx
POLICE ACT, 1861 the details about police system.pptxPOLICE ACT, 1861 the details about police system.pptx
POLICE ACT, 1861 the details about police system.pptxAbhishekchatterjee248859
 
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书SD DS
 
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书Fir L
 
如何办理美国波士顿大学(BU)毕业证学位证书
如何办理美国波士顿大学(BU)毕业证学位证书如何办理美国波士顿大学(BU)毕业证学位证书
如何办理美国波士顿大学(BU)毕业证学位证书Fir L
 
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptFINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptjudeplata
 
Essentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmmEssentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmm2020000445musaib
 
如何办理澳洲南澳大学(UniSA)毕业证学位证书
如何办理澳洲南澳大学(UniSA)毕业证学位证书如何办理澳洲南澳大学(UniSA)毕业证学位证书
如何办理澳洲南澳大学(UniSA)毕业证学位证书Fir L
 
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书Fs Las
 
A Short-ppt on new gst laws in india.pptx
A Short-ppt on new gst laws in india.pptxA Short-ppt on new gst laws in india.pptx
A Short-ppt on new gst laws in india.pptxPKrishna18
 
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一jr6r07mb
 
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptx
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptxConstitutional Values & Fundamental Principles of the ConstitutionPPT.pptx
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptxsrikarna235
 
Indemnity Guarantee Section 124 125 and 126
Indemnity Guarantee Section 124 125 and 126Indemnity Guarantee Section 124 125 and 126
Indemnity Guarantee Section 124 125 and 126Oishi8
 
一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书E LSS
 
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top BoutiqueAndrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top BoutiqueSkyLaw Professional Corporation
 

Recently uploaded (20)

如何办理(KPU毕业证书)加拿大昆特兰理工大学毕业证学位证书
 如何办理(KPU毕业证书)加拿大昆特兰理工大学毕业证学位证书 如何办理(KPU毕业证书)加拿大昆特兰理工大学毕业证学位证书
如何办理(KPU毕业证书)加拿大昆特兰理工大学毕业证学位证书
 
Arbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in IndiaArbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in India
 
Cleades Robinson's Commitment to Service
Cleades Robinson's Commitment to ServiceCleades Robinson's Commitment to Service
Cleades Robinson's Commitment to Service
 
POLICE ACT, 1861 the details about police system.pptx
POLICE ACT, 1861 the details about police system.pptxPOLICE ACT, 1861 the details about police system.pptx
POLICE ACT, 1861 the details about police system.pptx
 
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
 
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
 
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书
 
如何办理美国波士顿大学(BU)毕业证学位证书
如何办理美国波士顿大学(BU)毕业证学位证书如何办理美国波士顿大学(BU)毕业证学位证书
如何办理美国波士顿大学(BU)毕业证学位证书
 
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptFINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
 
Essentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmmEssentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmm
 
如何办理澳洲南澳大学(UniSA)毕业证学位证书
如何办理澳洲南澳大学(UniSA)毕业证学位证书如何办理澳洲南澳大学(UniSA)毕业证学位证书
如何办理澳洲南澳大学(UniSA)毕业证学位证书
 
Vip Call Girls Greater Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Greater Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Greater Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Greater Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
 
A Short-ppt on new gst laws in india.pptx
A Short-ppt on new gst laws in india.pptxA Short-ppt on new gst laws in india.pptx
A Short-ppt on new gst laws in india.pptx
 
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
 
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptx
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptxConstitutional Values & Fundamental Principles of the ConstitutionPPT.pptx
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptx
 
Indemnity Guarantee Section 124 125 and 126
Indemnity Guarantee Section 124 125 and 126Indemnity Guarantee Section 124 125 and 126
Indemnity Guarantee Section 124 125 and 126
 
一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书
 
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top BoutiqueAndrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
 
Old Income Tax Regime Vs New Income Tax Regime
Old  Income Tax Regime Vs  New Income Tax   RegimeOld  Income Tax Regime Vs  New Income Tax   Regime
Old Income Tax Regime Vs New Income Tax Regime
 

Police surveillance of social media - do you have a reasonable expectation of privacy online?

  • 1. Professor Lilian Edwards – University of Strathclyde Lachlan Urquhart – University of Nottingham
  • 2.  Context  Intelligence Led Policing and SOCMINT  London Riots and after  NOT Snowden/PRISM/TEMPORA etc – domestic, rule of law  Legal Issues  Privacy in Public? ECHR and UK  Regulation of Investigatory Powers Act 2000 (RIPA) and SOCMINT  Is everything done in public, “public”?  Are structured dossiers still the enemy?  What next?
  • 3.  The growth of “intelligence led” policing  Risk aversion, predictive profiles, big data  “Assemblages” of data via private intermediaries  OSINT  Publically available, open sources  SOCMINT (Bartlett and Miller 2013) used for  Network and sentiment analysis e.g. EMOTIVE  Crowdsourcing info from public  Event Detection and situational awareness  Predictive analytics eg IBM Memphis P.D.  Policy challenges (Omand 2012):–  Public trust  Legitimacy and necessity  (Demos 2013) also stress need for necessity, proportionality, transparency
  • 4.  UK Summer Riots 2011  Flickr stream of suspect photos ▪ 770 arrests & 167 charges  Facewatch mobile app  “Shop a Looter” (Pieri 2014)  Issues: ▪ Sampling bias - “Reading the Riots” ▪ Human error eg Boston Bombings
  • 5.  Met Police “5 Days in August” (2012)  Police unequipped to deal with SOCMINT  HMIC “Rules of Engagement” (2011)  “searching the British Library for a page in a book, without an index to refer to”  -> Police want stronger capabilities  Real time analytics
  • 6.  Do public social media posts raise any expectations of privacy?  “What Planet is this individual on? Her Tweets are Public domain.”  Gillespie (2009) (UK) – no. Cf Bartow (2011) (US) – “Facebook is a giant surveillance tool, no warrant required, which the government can use.. with almost no practical constraints from existing laws”  Data protection law –exemptions (UK) for detection & prevention of crime; no need for consent, no subject access rights  ECHR art 8?  Von Hannover ECtHR (2004) – influential in UK privacy law after HRA1998  cfWood v Metropolitan Police (2008) (UK)  Result – clearly some expectation of privacy in public; interference must be necessary, proportionate and according to law; but how much? & how balanced against other values eg security?  How much is this recognised in UK RIPA 2000 ?
  • 7.  Eric King, PI: “SOCMINT simply did not exist when RIPA 2000 was conceived and it is hard to simply slot into the existing categories and typologies established by RIPA”  No officialACPO guidance or Code of Practice – Demos (Bartlett and Miller) 2013 report.  Envisaged “digital” scheme in RIPA : Pt 1 Ch 1 covers real time interception of emails, warrant from Sec of State needed ; Ch 2 access to records of “communications” (=meta) data granted automatically in most cases.  “Analog world” scheme in Pt 2 RIPA  Directed covert surveillance – eg secretly following suspect  Covert human intelligence source (CHIS) -eg befriending someone under false ID to acquire info  Both require authorisation of senior officer but not warrant of S of S  How if at all does SOCMINT fit in?
  • 8.  Demos 2013 assert SOCMINT collection needs no authorisation of any kind UNLESS:  Fake profile or deception (anonymous lurking?) used to obtain access - > CHIS or Directed Surveillance may apply  Where a “detailed profile” is made of “named individual”, even from open sources -> Directed Surveillance? (O’Floinn & Ormerod, 2011) ▪ Cf Rotaru v Romania ECtHR (2000) – “public information can fall within the scope of private life where it is systematically collected and stored in files held by the authorities” ▪ Cf Stasi surveillance in former GDR –Wood v Metropolitan (para 27-28)  “Back door” collection of protected SOCMINT data might fall within RIPA Pt1 Ch 1, “interception” – but fits very badly indeed  Public profiles? Argued no expectation of privacy so long as user knew from T&C that public data might be collected , esp via API
  • 9. Q1. Can it be assumed everything done in public is “public”?  No :  Material about A is exposed by B;  Users often cannot protect traffic or meta data or friends list;  Consent to T and C does not remove any expectation of privacy ▪ online standard term contracts are rarely read or understood, ▪ market for competition on privacy has not evolved in network effects industries  Giving up soc media is impossible for many groups  boyd (2014) young adults/kids choose social media as “networked publics” (un F-locked) without giving up expectations of privacy  Cannot anticipate “invisible audiences, collapsed contexts and persistent content” (how true of all users?) Q2. Is SOCMINT valuable as evidence?  Acontextual (eg Twitter “rape” usage cf Nissenbaum) ; subject to disinhibition effect and “social steganography”?
  • 10. ECtHR case law has seen structured dossiers maintained over time as key threat – Rotaru v Romania dictum “public information can fall within the scope of private life where it is systematically collected and stored in files held by the authorities” -> Qu 3: Does the Rotaru distinction between structured data in files held by police, and unstructured data hold up in the age of Google and data-mining? Google Spain (ECJ) 2014? -> “processing of personal data.. carried out by .. a search engine is liable to affect significantly the fundamental rights to privacy .. the list of results [is] a structured overview of the information relating to that individual that can be found on the internet — information which potentially concerns a vast number of aspects of his private life and which, without the search engine, could not have been inter-connected or could have been only with great difficulty — and thereby to establish a more or less detailed profile of him. ‘
  • 11.  Are we writing a blank cheque for mass Panoptic surveillance by treating SOCMINT as “public” & free of restrictions  The “new Stasi”? Cheaper, better!  What rules should guarantee our expectations of privacy re “public” OSINT and SOCMINT?  “Code” solutions – Snapchat, WhatsApp? Deceptive, illusory?  Ethics for big data collectors/intermediaries – the future?
  • 12. Thanks for Listening Questions? Contact Details: - lilian.edwards@strath.ac.uk -@lilianedwards - lachlan.urquhart@nottingham.ac.uk -@mooseabyte