+ All Categories
Home > News & Politics > Communications Surveillance: Justification and Efficacy

Communications Surveillance: Justification and Efficacy

Date post: 28-Nov-2014
Category:
Upload: ian-brown
View: 1,898 times
Download: 3 times
Share this document with a friend
Description:
Presented at Media, Communications and Cultural Studies Assocation conference, London School of Economics, 7 Jan 2010
7
Communications surveillance: justification and efficacy Ian Brown
Transcript
Page 1: Communications Surveillance: Justification and Efficacy

Communications surveillance: justification

and efficacy

Ian Brown

Page 2: Communications Surveillance: Justification and Efficacy

UK surveillance regime• Communications data stored under Data

Retention Regulations 2009…• …accessed using Regulation of Investigatory

Powers Act 2000 (504,073 accesses in 2008)• Interception authorised under RIPA (1712 in

2008)• Intercept Modernisation Programme: “It is

deeply worrying that they now intend to monitor social networking sites which contain very sensitive data like sexual orientation, religious beliefs and political views” –Tom Brake MP

Page 3: Communications Surveillance: Justification and Efficacy

Human rights in 21st century• “This is as much an issue of modernity as

liberty. We are trying to fight 21st century crime by 19th century means. It hasn't worked. It won't work.”

• “I think these civil liberties arguments are a bit outdated.” –Tony Blair (2006; 2005)

• “advance passenger information, airline bookings and other travel data, passport and biometric data, immigration, identity and border records, criminal records, and other governmental and private sector data, including financial and telephone and other communication records… and in some cases the ability to apply data mining and pattern recognition software to databases, might well be the key to effective pre-emption in future terrorist cases.” –Sir David Omand (2009) p.9

Page 4: Communications Surveillance: Justification and Efficacy

Trust us!• “Finding out other people’s secrets is going

to involve breaking everyday moral rules. So public trust in the essential reasonableness of UK police, security and intelligence agency activity will continue to be essential.” –David Omand (2009) p.9

• “I have been impressed by the quality, dedication and enthusiasm of the personnel carrying out this work” –Report of the Interception of Communications Commissioner for 2007 p.2

Page 5: Communications Surveillance: Justification and Efficacy

Efficacy of data mining

•~5000 Americans surveilled over 4 years; led to <10 warrants per year

•“[T]here is not a consensus within the relevant scientific community nor on the committee regarding whether any behavioral surveillance … techniques are ready for use at all in the counterterrorist context" –US National Research Council (2008) p.4

Page 6: Communications Surveillance: Justification and Efficacy

Conclusions

•Fundamental rights are not invalidated by modernity

•“Automated identification of terrorists through data mining (or any other known methodology) is neither feasible as an objective nor desirable as a goal of technology development efforts.” –US National Research Council (2008) p.4

Page 7: Communications Surveillance: Justification and Efficacy

References• US National Research Council (2008)

Protecting Individual Privacy in the Struggle Against Terrorists: A Framework for Program Assessment, National Academies Press

• I. Brown & D. Korff (2009) Terrorism and the Proportionality of Internet Surveillance, European Journal of Criminology, 6(2) pp.119-134

• D. Omand (2009) The National Security Strategy: Implications for the UK intelligence community, Institute for Public Policy Research


Recommended