SlideShare a Scribd company logo
Leveraging the INDECT Project:
      An Activist Strategy to Implement
      Privacy Ethics in EU-Funded Research
               Eddan Katz
               International Affairs Director
               Electronic Frontier Foundation

               3rd European Privacy Open Space
               EuropHaus Wien
               October 26, 2009




Wednesday, December 29, 2010                     1
Digital Rights and/vs. the Knowledge Economy

      • Human Rights & Civil Liberties    • Knowledge Economy

            • Privacy                       • Innovation

                 • Contextual Integrity        • Peer Production

                 • Equality                    • Network Neutrality

            • Freedom of Expression         • Open Infrastructure

                 • Association                 • Collaboration

                 • Anonymity                   • Interoperability

            • Due Process                   • Socio-Technical Architecture




Wednesday, December 29, 2010                                                 2
The Global Flow of Information



                               •




Wednesday, December 29, 2010           3
Totality and Infinity in the Information Society
      • Open vs. Closed                 • Access vs. Control               • User Rights vs. Intellectual
                                                                             Property

      • Privacy vs. Security            • Competition vs. Monopoly
                                                                           • Anonymity vs. Identification

      • Entrepreneur vs. Incumbent      • Transparency vs. State secrets
                                                                           • Exceptions vs. Enforcement

      • Commons vs. Proprietary         • Human vs. Automation
                                                                           • Disintermediation vs.
                                                                             Centralization
      • Data Protection vs. Data        • Circumvention vs. Lock
        Retention
                                                                           • Trust vs. Surveillance
                                        • Community vs. Corporate
      • Non-commercial vs. Monetized
                                                                           • Neutrality vs. Discrimination
                                        • Communication vs. Censorship
      • Information vs. Manufacturing
                                                                           • Freedom vs. Fear




Wednesday, December 29, 2010                                                                                 4
Restoring the Paradigm of Due Process



      • Presumption of Innocence   • Particularized Suspicion


      • Burden of Proof            • Proportionality


      • Probable Cause             • Right to Appeal


      • No prior restraint         • Impartial Judge




Wednesday, December 29, 2010                                    5
The Surveillance Society

      • Panopticon (Bentham)                   • Balancing Tests (Lyon)

            • Omni-present surveillance          • Coordination - how social
                                                   relations reshaped
            • Disciplinary Power of the Gaze
              (Foucault)
                                                 • Risk - risk management
                                                   decision-making
      • Digitally Networked Environment
                                                 • Privacy - socio-technical
            • Borderless Communication             architecture

            • Information Intermediaries
                                                 • Power - information
                                                   assymetries and social
            • No sidewalks in Cyberspace           conditioning




Wednesday, December 29, 2010                                                   6
Echelon and Data Mining

      • UK-USA Security Agreement [WWII]          • Report on the Existence of a Global
        (Australia, Canada, New Zealand, UK,        System for the Interception of Private
        and US)                                     and Commercial Communications
                                                    (ECHELON interception system).
                                                    2001/2098(INI). (11 July 2001).
            • Hierarchical Military Access to
              Intelligence Information
                                                     • Voted on September 5, 2001
            • Menwith Hill: Transborder
              surveillance of domestic citizens   • Violation of Data Protection Directive

            • Industrial Espionage for Domestic   • Fundamental Right to Privacy (Art. 8
              Protectionism                         ECHR)

            • Data Mining Framework Inversion     • Cryptography as a Means of Self-
              of Due Process                        Protection




Wednesday, December 29, 2010                                                                 7
The 9/11 Paradigm Shift

      • Amplified Threat of Terrorist
        Violence

                                                 • Continental Europe Strategic
            • Distortion of Balancing Tests        Constraints

                 • War and Security vs.
                   Freedoms and Rights             • Diplomatic Intelligence
                                                     Reciprocity
            • Technology and Responsibility
                                                   • No Effective Search
                 • Autonomous Technics as out-
                   of-Control                      • Governance & Ethics

                 • Network Effects



Wednesday, December 29, 2010                                                      8
EU INDECT Project
               • Intelligent information system supporting
                 observation, searching and detection for security
                 of citizens in urban environment
                    • to develop a platform for: the registration and exchange of operational
                      data, acquisition of multimedia content, intelligent processing of all
                      information and automatic detection of threats and recognition of
                      abnormal behaviour or violence

                    • to develop the prototype of an integrated, network-centric system
                      supporting the operational activities of police officers, providing
                      techniques and tools for observation of various mobile objects

                    • to develop a new type of search engine combining direct search of
                      images and video based on watermarked contents, and the storage of
                      metadata in the form of digital watermarks




Wednesday, December 29, 2010                                                                    9
INDECT Project Funding & Launch

      • Framework Programme 7


      • Research area: SEC-2007-1.2-01 Intelligent urban environment observation system


            • Start Date: 2009-01-01

            • Duration: 60 months

            • Project Cost: 14.86 million euro

      •                                http://www.indect-project.eu/


      • Beta Launch -> UEFA 2012 Championship (Poland/Ukraine)




Wednesday, December 29, 2010                                                              10
Activist Intervention Proposal #1:
      Going Viral on the YouTube Video

      • Raising awareness by forwarding INDECT
            Project YouTube video to interested
         friends and colleagues and encouraging
           thoughtful and educating comments.

      •                  http://www.youtube.com/watch?
                                 v=dl5g93m-SbA



Wednesday, December 29, 2010                             11
INDECT Partners
               •   AGH University of        •   MSWIA - General             •   Poznan University of        •   Technical University of
                   Science and                  Headquarters of Police          Technology (Poland)             Ostrava (Czech
                   Technology (Poland) -        (Poland) http://                http://                         Republic) http://
                   Project Coordinator          www.policja.pl/                 www.put.poznan.pl               www.vsb.cz
                   http://www.agh.edu.pl/
                   en

                                            •   Moviquity (Spain) http://   •   Universidad Carlos III      •   Technical University of
                                                www.moviquity.com/              de Madrid (Spain)               Kosice (Slovakia) http://
               •   Gdansk University of         webingles/index.htm             http://www.uc3m.es              www.tuke.sk/tuke?
                   Technology (Poland)                                                                          set_language=en&cl=en
                   http://www.pg.gda.pl

                                            •   PSI Transcom GmbH           •   Technical University of
                                                (Germany) http://               Sofia (Bulgaria) http://     •   X-Art Pro Division
               •   InnoTec DATA G.m.b.H.        www.psi.de/                     www.tu-sofia.bg                  G.m.b.H. (Austria)
                   & Co. KG (Germany)                                                                           http://www.x-art.at
                   http://www.innotec-
                   data.de
                                            •   Police Service of           •   University of Wuppertal
                                                Northern Ireland (United        (Germany) http://           •   Fachhochschule
                                                Kingdom) http://                www.uni-wuppertal.de            Technikum Wien
               •   Grenoble INP (France)        www.psni.police.uk/                                             (Austria) http://
                   http://www.grenoble-                                                                         www.technikum-wien.at
                   inp.fr
                                                                            •   University of York (Great
                                                                                Britain) http://
                                                                                www.york.ac.uk




Wednesday, December 29, 2010                                                                                                                12
Activist Intervention Proposal #2:
      Make INDECT Project Deliverables Public

                    •University Research Center Contacts
                          • Computer Science research throughout the European-wide
                            community can make sure that the project outcomes can be
                            commented upon and criticized by tech & policy analysts.


                    •York University Social Media Project

                          • XML Data Corpus: Report on methodology for collection,
                            cleaning and unified representation of large textual data from
                            various sources: news reports, weblogs, chat

                          • Highlighted on Wikileaks - Oct. 4, 2009. Made available
                            publicly subsequently at http://indect-project.eu/files/



Wednesday, December 29, 2010                                                                13
EU Security-Industrial Complex

      • Ben Hayes, Statewatch. “NeoConOpticon”
            • http://www.tni.org/en/report/neoconopticon


      • EU Security Research Program (7 yrs.) =1.4 bln Euros.
            • Funding of Applied Technology, Not Scientific Research

            • Industry Capture & Policy Laundering

            • Information Security industry growth


      • Systematic Concentration of Entrenched Lobby



Wednesday, December 29, 2010                                          14
INDECT & Framework Program 7 Ethics Review

      • University Research Centers & Project Partners each have an ethics review reporting
        to INDECT Ethics Review Representative:


            • Drew Harris, Assistant Chief Constable, Crime Operations Department, Police
              Department of Northern Ireland


      • DG Research: Dir. L (Science, Economy, & Society), Unit 3 (Governance & Ethics)

            • Exclusion from funding: cloning, genetic manipulation.


            • Ethical Issues: Research on Human Beings; Privacy and Data Collection; Use of
              Animals; Research Involving Developing Countries; Dual Use




Wednesday, December 29, 2010                                                                  15
Activist Intervention Proposal #3:
      Introduce External Ethics Review and Opinion

      •DG Research - Governance & Ethics Unit Continuous
       Reporting Review

      •Provide Technology, Law, & Policy experts for
       outsourced review. SINAPSE

      •European Data Protection Supervisor

            •Article 46 (e) - exert prior notification & monitoring
             developments



Wednesday, December 29, 2010                                         16
Re-identification & the Private/Commercial Transfer to
      Law Enforcement of Potentially Identifiable Information

      • Data can either be useful or perfectly anonymous but
        never both. (Paul Ohm)

      • Compelled Transfer of Personal Data for National
        Security and Law Enforcement Reasons

      • Behavioral Targeting Advertising supporting web growth

      • Data Mining Providing Commercially Valuable Data




Wednesday, December 29, 2010                                     17
Activist Intervention Proposal #4:
      Institutionalize Privacy Ethics for Contextual Integrity

      • Framework Program Review 7 Mid-Term Review (2010)

            • Insufficient focus on privacy ethics beyond Data Protection Directive

            • Institutionalize privacy ethics guidelines for EU-funded security research

            • Internal Support from Governance & Ethics Unit

      • Data Protection Directive Consultation (Dec. 31, 2009)

            • Potentially Identifiable Information

            • Higher Standard of Privacy Ethics for Research

            • Preserving Contextual Integrity between Commercial & Law Enforcement



Wednesday, December 29, 2010                                                               18
• Please Support EFF: http://www.eff.org/support

            • eddan@eff.org




Wednesday, December 29, 2010                             19

More Related Content

PDF
Thainetizennetwork globalcybercrime 07272009
PDF
A2k rit
PDF
Session 69 Jana Sochor
PPTX
Culture of openness (glasgow)
PDF
Eddankatz democratic culture_freecultureforum_slides
PPT
Virtuous learning
PDF
P2 Lecture 4
PDF
P2 Lecture 2
Thainetizennetwork globalcybercrime 07272009
A2k rit
Session 69 Jana Sochor
Culture of openness (glasgow)
Eddankatz democratic culture_freecultureforum_slides
Virtuous learning
P2 Lecture 4
P2 Lecture 2

What's hot (9)

PPT
Civilization and its disconnects
PPTX
Embedded & Tangible Interaction Design
PPT
yonas bishaw information society-evolvement
PPTX
Multimedia Privacy
PPTX
Presentatie internet of things voor ngi en ieee op 5 juni 213 door ben van lier
PPTX
What is information?
PPTX
Chapter one
PDF
Digital technologies and traditional Cultural Expressions: A Positive Look at...
Civilization and its disconnects
Embedded & Tangible Interaction Design
yonas bishaw information society-evolvement
Multimedia Privacy
Presentatie internet of things voor ngi en ieee op 5 juni 213 door ben van lier
What is information?
Chapter one
Digital technologies and traditional Cultural Expressions: A Positive Look at...
Ad

Viewers also liked (8)

PDF
Freecultureforum barcelona2009 acta
PDF
Copyrightcontraband cepe2007
PDF
A2krussia
PDF
Thainetizennetwork slides day1
PDF
Mapping A2K Advocacy: Towards a Coalition Against ACTA
PDF
Tacdconference actaslides
PDF
Computer Crimes: An American Case Study
PDF
Copyrightcontraband
Freecultureforum barcelona2009 acta
Copyrightcontraband cepe2007
A2krussia
Thainetizennetwork slides day1
Mapping A2K Advocacy: Towards a Coalition Against ACTA
Tacdconference actaslides
Computer Crimes: An American Case Study
Copyrightcontraband
Ad

Similar to Leveraging the INDECT Project: An Activist Strategy to Implement Privacy Ethics in EU-Funded Research (20)

PDF
Socialmediapublicsavety
PDF
IxDA Taiwan 6th slide
PPTX
Ethical_and_Social_Issues_in_Information_Systems.pptx
PPT
Wild West or gulag: models for policing cyberspace
PPT
Polinter11
PPTX
Whitt citi conference presentation.final.10.17
PDF
Opportunities and Challenges in Crisis Informatics
PDF
Ch 4.pdf
PPTX
Preliminary Revision
PPT
Technological trends
PPTX
Cybersecurity Strategies - time for the next generation
PDF
Cubitt Internetfactory
PPTX
mangement information system prsentation
PPT
Library trends and_theory
PPT
May you live in interesting times
PPT
Digital Privacy Revisited
PPTX
Fia presentatie
ODP
Program For The Future: The Commons as a collective intelligence meta-innovation
PPT
digital identity 2.0: how technology is transforming behaviours and raising c...
PDF
Digital Responsibility: towards a new world order ?
Socialmediapublicsavety
IxDA Taiwan 6th slide
Ethical_and_Social_Issues_in_Information_Systems.pptx
Wild West or gulag: models for policing cyberspace
Polinter11
Whitt citi conference presentation.final.10.17
Opportunities and Challenges in Crisis Informatics
Ch 4.pdf
Preliminary Revision
Technological trends
Cybersecurity Strategies - time for the next generation
Cubitt Internetfactory
mangement information system prsentation
Library trends and_theory
May you live in interesting times
Digital Privacy Revisited
Fia presentatie
Program For The Future: The Commons as a collective intelligence meta-innovation
digital identity 2.0: how technology is transforming behaviours and raising c...
Digital Responsibility: towards a new world order ?

Leveraging the INDECT Project: An Activist Strategy to Implement Privacy Ethics in EU-Funded Research

  • 1. Leveraging the INDECT Project: An Activist Strategy to Implement Privacy Ethics in EU-Funded Research Eddan Katz International Affairs Director Electronic Frontier Foundation 3rd European Privacy Open Space EuropHaus Wien October 26, 2009 Wednesday, December 29, 2010 1
  • 2. Digital Rights and/vs. the Knowledge Economy • Human Rights & Civil Liberties • Knowledge Economy • Privacy • Innovation • Contextual Integrity • Peer Production • Equality • Network Neutrality • Freedom of Expression • Open Infrastructure • Association • Collaboration • Anonymity • Interoperability • Due Process • Socio-Technical Architecture Wednesday, December 29, 2010 2
  • 3. The Global Flow of Information • Wednesday, December 29, 2010 3
  • 4. Totality and Infinity in the Information Society • Open vs. Closed • Access vs. Control • User Rights vs. Intellectual Property • Privacy vs. Security • Competition vs. Monopoly • Anonymity vs. Identification • Entrepreneur vs. Incumbent • Transparency vs. State secrets • Exceptions vs. Enforcement • Commons vs. Proprietary • Human vs. Automation • Disintermediation vs. Centralization • Data Protection vs. Data • Circumvention vs. Lock Retention • Trust vs. Surveillance • Community vs. Corporate • Non-commercial vs. Monetized • Neutrality vs. Discrimination • Communication vs. Censorship • Information vs. Manufacturing • Freedom vs. Fear Wednesday, December 29, 2010 4
  • 5. Restoring the Paradigm of Due Process • Presumption of Innocence • Particularized Suspicion • Burden of Proof • Proportionality • Probable Cause • Right to Appeal • No prior restraint • Impartial Judge Wednesday, December 29, 2010 5
  • 6. The Surveillance Society • Panopticon (Bentham) • Balancing Tests (Lyon) • Omni-present surveillance • Coordination - how social relations reshaped • Disciplinary Power of the Gaze (Foucault) • Risk - risk management decision-making • Digitally Networked Environment • Privacy - socio-technical • Borderless Communication architecture • Information Intermediaries • Power - information assymetries and social • No sidewalks in Cyberspace conditioning Wednesday, December 29, 2010 6
  • 7. Echelon and Data Mining • UK-USA Security Agreement [WWII] • Report on the Existence of a Global (Australia, Canada, New Zealand, UK, System for the Interception of Private and US) and Commercial Communications (ECHELON interception system). 2001/2098(INI). (11 July 2001). • Hierarchical Military Access to Intelligence Information • Voted on September 5, 2001 • Menwith Hill: Transborder surveillance of domestic citizens • Violation of Data Protection Directive • Industrial Espionage for Domestic • Fundamental Right to Privacy (Art. 8 Protectionism ECHR) • Data Mining Framework Inversion • Cryptography as a Means of Self- of Due Process Protection Wednesday, December 29, 2010 7
  • 8. The 9/11 Paradigm Shift • Amplified Threat of Terrorist Violence • Continental Europe Strategic • Distortion of Balancing Tests Constraints • War and Security vs. Freedoms and Rights • Diplomatic Intelligence Reciprocity • Technology and Responsibility • No Effective Search • Autonomous Technics as out- of-Control • Governance & Ethics • Network Effects Wednesday, December 29, 2010 8
  • 9. EU INDECT Project • Intelligent information system supporting observation, searching and detection for security of citizens in urban environment • to develop a platform for: the registration and exchange of operational data, acquisition of multimedia content, intelligent processing of all information and automatic detection of threats and recognition of abnormal behaviour or violence • to develop the prototype of an integrated, network-centric system supporting the operational activities of police officers, providing techniques and tools for observation of various mobile objects • to develop a new type of search engine combining direct search of images and video based on watermarked contents, and the storage of metadata in the form of digital watermarks Wednesday, December 29, 2010 9
  • 10. INDECT Project Funding & Launch • Framework Programme 7 • Research area: SEC-2007-1.2-01 Intelligent urban environment observation system • Start Date: 2009-01-01 • Duration: 60 months • Project Cost: 14.86 million euro • http://www.indect-project.eu/ • Beta Launch -> UEFA 2012 Championship (Poland/Ukraine) Wednesday, December 29, 2010 10
  • 11. Activist Intervention Proposal #1: Going Viral on the YouTube Video • Raising awareness by forwarding INDECT Project YouTube video to interested friends and colleagues and encouraging thoughtful and educating comments. • http://www.youtube.com/watch? v=dl5g93m-SbA Wednesday, December 29, 2010 11
  • 12. INDECT Partners • AGH University of • MSWIA - General • Poznan University of • Technical University of Science and Headquarters of Police Technology (Poland) Ostrava (Czech Technology (Poland) - (Poland) http:// http:// Republic) http:// Project Coordinator www.policja.pl/ www.put.poznan.pl www.vsb.cz http://www.agh.edu.pl/ en • Moviquity (Spain) http:// • Universidad Carlos III • Technical University of www.moviquity.com/ de Madrid (Spain) Kosice (Slovakia) http:// • Gdansk University of webingles/index.htm http://www.uc3m.es www.tuke.sk/tuke? Technology (Poland) set_language=en&cl=en http://www.pg.gda.pl • PSI Transcom GmbH • Technical University of (Germany) http:// Sofia (Bulgaria) http:// • X-Art Pro Division • InnoTec DATA G.m.b.H. www.psi.de/ www.tu-sofia.bg G.m.b.H. (Austria) & Co. KG (Germany) http://www.x-art.at http://www.innotec- data.de • Police Service of • University of Wuppertal Northern Ireland (United (Germany) http:// • Fachhochschule Kingdom) http:// www.uni-wuppertal.de Technikum Wien • Grenoble INP (France) www.psni.police.uk/ (Austria) http:// http://www.grenoble- www.technikum-wien.at inp.fr • University of York (Great Britain) http:// www.york.ac.uk Wednesday, December 29, 2010 12
  • 13. Activist Intervention Proposal #2: Make INDECT Project Deliverables Public •University Research Center Contacts • Computer Science research throughout the European-wide community can make sure that the project outcomes can be commented upon and criticized by tech & policy analysts. •York University Social Media Project • XML Data Corpus: Report on methodology for collection, cleaning and unified representation of large textual data from various sources: news reports, weblogs, chat • Highlighted on Wikileaks - Oct. 4, 2009. Made available publicly subsequently at http://indect-project.eu/files/ Wednesday, December 29, 2010 13
  • 14. EU Security-Industrial Complex • Ben Hayes, Statewatch. “NeoConOpticon” • http://www.tni.org/en/report/neoconopticon • EU Security Research Program (7 yrs.) =1.4 bln Euros. • Funding of Applied Technology, Not Scientific Research • Industry Capture & Policy Laundering • Information Security industry growth • Systematic Concentration of Entrenched Lobby Wednesday, December 29, 2010 14
  • 15. INDECT & Framework Program 7 Ethics Review • University Research Centers & Project Partners each have an ethics review reporting to INDECT Ethics Review Representative: • Drew Harris, Assistant Chief Constable, Crime Operations Department, Police Department of Northern Ireland • DG Research: Dir. L (Science, Economy, & Society), Unit 3 (Governance & Ethics) • Exclusion from funding: cloning, genetic manipulation. • Ethical Issues: Research on Human Beings; Privacy and Data Collection; Use of Animals; Research Involving Developing Countries; Dual Use Wednesday, December 29, 2010 15
  • 16. Activist Intervention Proposal #3: Introduce External Ethics Review and Opinion •DG Research - Governance & Ethics Unit Continuous Reporting Review •Provide Technology, Law, & Policy experts for outsourced review. SINAPSE •European Data Protection Supervisor •Article 46 (e) - exert prior notification & monitoring developments Wednesday, December 29, 2010 16
  • 17. Re-identification & the Private/Commercial Transfer to Law Enforcement of Potentially Identifiable Information • Data can either be useful or perfectly anonymous but never both. (Paul Ohm) • Compelled Transfer of Personal Data for National Security and Law Enforcement Reasons • Behavioral Targeting Advertising supporting web growth • Data Mining Providing Commercially Valuable Data Wednesday, December 29, 2010 17
  • 18. Activist Intervention Proposal #4: Institutionalize Privacy Ethics for Contextual Integrity • Framework Program Review 7 Mid-Term Review (2010) • Insufficient focus on privacy ethics beyond Data Protection Directive • Institutionalize privacy ethics guidelines for EU-funded security research • Internal Support from Governance & Ethics Unit • Data Protection Directive Consultation (Dec. 31, 2009) • Potentially Identifiable Information • Higher Standard of Privacy Ethics for Research • Preserving Contextual Integrity between Commercial & Law Enforcement Wednesday, December 29, 2010 18
  • 19. • Please Support EFF: http://www.eff.org/support • eddan@eff.org Wednesday, December 29, 2010 19