Surveillance Technologies: efficiency, human rights, ethics Prof. Dr. Tom Sorell, University of Warwick, UK

Similar documents
SURVEILLE Surveillance: Ethical Issues, Legal Limitations, and Efficiency Collaborative Project

PRIVACY IMPACT ASSESSMENT

Challenges to human dignity from developments in AI

PRIVACY IMPACT ASSESSMENT CONDUCTING A PRIVACY IMPACT ASSESSMENT ON SURVEILLANCE CAMERA SYSTEMS (CCTV)

FUTURE TECHNOLOGIES FUTURE PRIVACY CHALLENGES

2018 HSS Development

Heaven and hell: visions for pervasive adaptation

Targeting a Safer World. Public Safety & Security

Societal and Ethical Challenges in the Era of Big Data: Exploring the emerging issues and opportunities of big data management and analytics

Privacy Impact Assessment on use of CCTV

CCTV Policy. Policy reviewed by Academy Transformation Trust on June This policy links to: Safeguarding Policy Data Protection Policy

Fraunhofer ISI Seite 1

Future Soldier Countering Emerging/Future Threats 3D RADAR MULTI-SENSOR by Weibel/CST proprietary 1

Privacy in Mini-drone Based Video Surveillance

Ethical Framework for Elderly Care-Robots. Prof. Tom Sorell

CCTV Policy. Policy reviewed by Academy Transformation Trust on June This policy links to: T:Drive. Safeguarding Policy Data Protection Policy

Robert Bond Partner, Commercial/IP/IT

Modern Information And Communication Technology And Their Application In Cyberparks

JOB PROFILE. Corporate Communications Team Leader (Change Programme) Stratford upon Avon

CILIP Privacy Briefing 2017

SURVEY QUESTIONS If you prefer an electronic copy of the survey please contact the Thomas Law Firm by at:

CDT Annual Dinner. Center for Democracy and Technology, Washington. 10 March 2015

Phantom Dome - Advanced Drone Detection and jamming system

Privacy and Security in Europe Technology development and increasing pressure on the private sphere

Human Rights in the era of Information and Communication Technology

Proposal # xxxxxxxxxxxx. Intercept Jammer. Date:

Presen ng the Early Warning Systems: MicroMesh + GlobalMesh

icsa Integrated Communications and Situational Awareness

Autonomous Robotic (Cyber) Weapons?

CBP Technology Challenges 2011 NDIA Joint Missions Conference

Specialist Services Section

Commonwealth Data Forum. Giovanni Buttarelli

Privacy and Protection of Personal Integrity in the Working Place

Total Situational Awareness (With No Blind Spots)

8 Executive summary. Intelligent Software Agent Technologies: Turning a Privacy Threat into a Privacy Protector

A Gift of Fire: Social, Legal, and Ethical Issues for Computing Technology (Fourth edition) by Sara Baase. Term Paper Sample Topics

This research is supported by the TechPlan program funded by the ITS Institute at the University of Minnesota

Our position. ICDPPC declaration on ethics and data protection in artificial intelligence

Digital images. Digital Image Processing Fundamentals. Digital images. Varieties of digital images. Dr. Edmund Lam. ELEC4245: Digital Image Processing

Our Corporate Strategy Digital

National Policing Improvement Agency. National Policing Improvement Agency Meeting the challenges of 21 st century crime and criminality

Safety and Security. Pieter van Gelder. KIVI Jaarccongres 30 November 2016

The Next Industrial Revolution Industry 4.0. M.Sanne, October 2017

Dr Nicholas J. Gervassis University of Plymouth THE EMERGING UK DATA PROTECTION FRAMEWORK AND BEYOND

* Intelli Robotic Wheel Chair for Specialty Operations & Physically Challenged

Biometrics, surveillance and privacy

RoboLaw The EU FP7 project on robotics and ELS

SLAVERY AND HUMAN TRAFFICKING

Night Vision Photography Capturing Critical Images in Low-Light

Improving Performance through Superior Innovative Antenna Technologies

Convention on Certain Conventional Weapons (CCW) Meeting of Experts on Lethal Autonomous Weapons Systems (LAWS) April 2016, Geneva

NCCT IEEE PROJECTS ADVANCED ROBOTICS SOLUTIONS. Latest Projects, in various Domains. Promise for the Best Projects

Targeting a Safer World

Should privacy impact assessments be mandatory? David Wright Trilateral Research & Consulting 17 Sept 2009

OECD WORK ON ARTIFICIAL INTELLIGENCE

General Secretariat (SG)

GALVESTON - BOLIVAR FERRY SYSTEM. ITS Implementations

Ethics, privacy and legal issues concerning GIS. This is lecture 12

What is a detective novel? A detective novel is a mystery in which a fictional character tries to solve the puzzle before the reader. The reader will

Design and Technology

Autonomous Underwater Vehicles

Human Safety Considerations in Emerging ICT Environment

Measuring Intangible Assets (IP & Data) for the Knowledge-based and Data-driven Economy

How do you teach AI the value of trust?

To explore the meaning and use of graffiti as a form of criminal damage and vandalism, particularly in relation to the public transport network.

Unmanned/Robotic Systems

CMRE La Spezia, Italy

Machines can learn, but what will we teach them? Geraldine Magarey

RETINAR SECURITY SYSTEMS Retinar PTR & Retinar OPUS Vehicle Mounted Applications

Artificial Intelligence: Implications for Autonomous Weapons. Stuart Russell University of California, Berkeley

IOT: BENEFITS, CHALLENGES AND APPLICATIONS

Criminal CV Overview. Clerks Details. Education. Beyond the Bar. Call 1994

Effective Data Protection Governance An Approach to Information Governance in an Information Age. OECD Expert Consultation Boston October 2016

TECHNOLOGY IMPACT ON ECONOMY AND SOCIETY

2018 Border Challenge Robotics Competition

Industry 4.0 The Future of Innovation

Creating a Public Safety Ecosystem

Accelerating innovations in science and technology (S&T) are having profound effects on global civilization These developments will have strategic

Evaluation in Democracy Public Hearing at the European Parliament

Formation and Cooperation for SWARMed Intelligent Robots

SECURITY. Titolo: BADCAR (Behavioural Analysis and Detection of Vehicles in Communal Areas)

Roadmap to Digital Transformation: Implications for Intelligence

28 TH INTERNATIONAL CONFERENCE OF DATA PROTECTION

Q1 Under the subject "Future of Work and the New Economy", which topics do you find important?

New Technologies that Resolve Common Challenges Facing IP Surveillance. By: David Heath Axis Communications

Artificial Intelligence: Implications for Autonomous Weapons. Stuart Russell University of California, Berkeley

GDPR Implications for ediscovery from a legal and technical point of view

CS 4001 Possible Term Paper Topics

Providing professional services to create a safer world. International Basic Search & Improvised Explosive Device Recognition Course.

The Programmable City Smarter Cities. Tuesday, 9 May 2017

«Digital transformation of Pharma and API Plants: a way to create value for long term sustainability» G. Burba

AVATAR Micro YOU NEED THIS ROBOT.

Regulating by Robot and Adjudicating by Algorithm:

Introduction Objective and Scope p. 1 Generic Requirements p. 2 Basic Requirements p. 3 Surveillance System p. 3 Content of the Book p.

Ethics in Artificial Intelligence

Looking forward to hearing from you! Team Citizengage

Impacts and Risks Caused by AI Networking, and Future Challenges

Towards Health Data Democracy

Human Rights Grievance Mechanisms and Remedies

project gnosis tech ed development centre Teaching Kids since 2013

Transcription:

Surveillance Technologies: efficiency, human rights, ethics Prof. Dr. Tom Sorell, University of Warwick, UK

Outline How does one justify the use by police of surveillance technology in a liberal democracy? Legitimate purpose and effectiveness SURVEILLE methodology for weighing relevant considerations Effectiveness scores Fundamental human rights score Ethics indicators Illustrations SURVEILLE methodology (over-) emphasizes privacy violations: Bulk collection

Surveillance technology Cameras Bugs Telephone taps Automatic Number Plate Recognition Location Tracking Drag-netting and data-mining Personal communications data collection and analytics? Evidence-based target selection and hops profiling

Justifying the use of surveillance technologies in a liberal democracy State s special responsibility for security, especially threats to life Risks of intrusion, error, and to trust, can be justified in investigation and prevention of serious crime if morally proportionate Discretion and secrecy as relaxing the observance of proportionality in practice

Legitimate purposes Preventing any crime Preventing serious crime Terrorist attack Murder Money laundering Preventing parking offences Achieving fair access to public services Local education Local health services Protecting people exercising right to express unpopular views Lawful commercial gain

Targeted vs general and inclusive surveillance Targeting things and places vs targeting people Targeting people for minor offences Difficulties: Normal vs abnormal behaviour Discriminatory profiling Inclusive camera surveillance Communications data collection and analytics

Methodology 1 What is the purpose? Is it legitimate? If yes, What is the technology? Is it legal to use? Is it effective/usable on a scale of 0-10

Components of usability Effectiveness Delivery useful outcome for selected purpose Simplicity ease of use Sensitivity accuracy and clarity Money cost Privacy-by-design Overall effectiveness

Methodology 2 What is its fundamental rights impact? What are the type of circumstances of the technology application? Does the use of that technology in those circumstances compromise an important right? Using a scale of 1(low rights intrusion)-16 (high intrusion) Is the judgement of compromise reliable? Multiply usability score by impact score Ethical considerations enter where usability score X h-r impact score does not rule out a technology-in-a-context

Usable technology with low h-r impact Here is where ethics comes in Ethics provides reasons for and against technology applications for legitimate purposes based on moral theories used in moral philosophy

Examples of Ethics Outcome of assessment Organized Crime Investigation Terrorism prevention scenario Urban security scenario Acceptable forms of surveillance Overt use of CCTV in pubic space Automated detection of explosives or drugs Checking suitcases of trans-border travelers. Human observation of suspects Overt use of smart CCTV in public space Automatic number plate recognition Questionable forms of surveillance Covert photography in public space Social network analysis based on social media Video camera mounted on drone Impermissible forms of surveillance Covert listening device in public transport Covert listening device in a suspect s home Interception of all transborder telecommunications Sharing CCTV images between private businesses

Serious crime scenario Intelligence on drug importation by X and Y X and Y meet in a remote location with arms dealer Z Drug plus arms importation Importation Imminent? Bugging public transport?

The Serious Crime Matrix Matrix H U M A N R I G H T S A N D E T H I C A L I S S U E S TECHNOLOGY AND USE 1. Visual spectrum dome zoom, tilt, rotate (public place used overtly) 2. Visual spectrum dome zoom, tilt, rotate (public place used covertly) USABILITY Moral risk of error leading to significant sanction Fundamental right to protection of personal data Fundamental right to privacy or private and family life (not including data protection) Outcome of assessment Moral risk of Intrusion 6 2 1 7 8* 2 Fundamental right to freedom of thought, conscience and religion Freedom of movement and residence Moral risk of damage to trust and chilling effect

3. Covert photography in public place 4. Sound recording bug in target s home address. 5. Sound recording bug in target s vehicle. 6. Sound recording bug on public transport used by target. 7. Sound recording bug in police vehicle transporting target following arrest. 9 8* 2 8 16* 16* 8 8 6-12 3 8* ¾* 4 8 2

8. Sound recording bug in target s prison cell. 9. Video camera mounted on platform micro helicopter 10. AIS ship location detection and identification 11. Explosives detection near harbor 12. Gas chromatograph y drugs detector 13. Whole body scanner eqo 14. Luggage screening technology 5 8 4-8 6 ¾ 4-8* 3 5 0 0 4 0-¾ 8 0-¾ 6 0 3 7 0-¾

15. money laundering technology 16. Networked data analysis 17. Data transfer analysis (name recognition) technology 18. Location tracking of cellular phones 19. Mobile phone tap 7 8 8 1 ½ 7 3 2 6 8 8 1 ½ 7 6 6 2 8 3 8*

Meta-data and Telephone chaining

Ethical Issues Does bulk collection violate privacy? Meta-data vs content Collection vs inspection Human inspection vs machine inspection Network analysis produces patterns Content would be overwhelming Processing of personal information but not as intrusive in the sense of engaging with the value of privacy Does bulk collection count as mass surveillance? http://www.thenation.com/article/174746/modern-day-stasi-state

Genuine ethical issues Secrecy of bulk collection Difficulty of democratic oversight Difficulty of monitoring data storage Risks of data loss

Contact t.sorell@warwick.ac.uk SURVEILLE materials: https://surveille.eui.eu/