Privacy vs. security a given trade-off?



Similar documents
Cyber Diplomacy A New Component of Foreign Policy 6

Privacy versussecurity: Moral disagreements in the context of surveillance

D 2.3 Major security challenges, responses and their impact on privacy selected security-oriented surveillance technologies

Second Cyber Security Summit, November 11, 2013 in Bonn Final communique

2. The project INDECT been criticized from many sides. It appears mainly from the fear of total surveillance of the EU population.

Policy Instruments & (Side)-Effects

Mr President, Ladies and Gentlemen Members of the Court, Mr Advocate. Thank you for inviting the European Data Protection Supervisor today.

FCT i H2020 Säkra samhällen 2016 Fight against Crime and Terrorism. soren.jagerhok@foi.se

EU-U.S. DECLARATION ON COMBATING TERRORISM DROMOLAND CASTLE, 26 JUNE 2004

Honourable members of the National Parliaments of the EU member states and candidate countries,

Towards defining priorities for cybersecurity research in Horizon 2020's work programme Contributions from the Working Group on Secure ICT

CCBE RECOMMENDATIONS FOR THE IMPLEMENTATION OF THE DATA RETENTION DIRECTIVE

On the European experience in critical infrastructure protection

Opinion of the International Juvenile Justice Observatory

Draft Resolution. Submitted for revision by the delegations to the Model United Nation, College of Charleston, Spring 2011

Charter of Consumer Rights in the Digital World

29 October 2015 Conference of the Independent Data Protection Authorities of the Federation and the Federal States

INFORMAL HIGH-LEVEL ADVISORY GROUP ON THE FUTURE OF EU HOME AFFAIRS POLICY (THE FUTURE GROUP)

Principles of Oversight and Accountability For Security Services in a Constitutional Democracy. Introductory Note

1 FOCUS Foresight Security Scenarios

Business Financial Crime: Theories of Motivation

Smart Borders and Law Enforcement Access: Legitimacy, Effectiveness, and Proportionality

Minister Shatter presents Presidency priorities in the JHA area to European Parliament

working group on foreign policy and grand strategy

AN INSIGHT TO CYBER WORLD WITH PROF. MICHAEL E.SMITH

Public Opinion on Selected National Security Issues:

Horizon 2020 Secure Societies

How To Understand And Understand The European Priorities In Information Security

wwwww The Code of Ethics for Social Work Statement of Principles

The European psychologist in forensic work and as expert witness

The European Response to the rising Cyber Threat

Vocabulary Builder Activity. netw rks. A. Content Vocabulary. The Bill of Rights

Presidency conclusions on establishing a strategy to combat the manipulation of sport results

The Committee of Ministers, under the terms of Article 15.b of the Statute of the Council of Europe,

DECLARATION ON STRENGTHENING GOOD GOVERNANCE AND COMBATING CORRUPTION, MONEY-LAUNDERING AND THE FINANCING OF TERRORISM

Civil Rights, Security and Consumer Protection in the EU

Elaboration of the Declaration on Universal Norms on Bioethics : Third Outline of a Text

CEAS ANALYSIS. of the Law on Amendments of the Law on the Security Intelligence Agency

Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28),

7 August I. Introduction

European Commission Per

This letter is to provide you with our views on the minimum criteria for the impact assessment and subsequent legislative proposal.

The Need to Share: The U.S. Intelligence Community and Law Enforcement

Adewale Banjo, PhD. Adewale Banjo 2013 UNISA Schoolof Business Leadership 1

Preparatory Action on the enhancement of the European industrial potential in the field of Security research

PUBLIC TRUST IN THE CRIMINAL JUSTICE SYSTEM AN INSTRUMENT FOR PENAL POLICY ASSESSMENT

Template for Automatic Number Plate Recognition (ANPR) Infrastructure Development Privacy Impact Assessment

UN Emergency Summit on Cyber Security Topic Abstract

THE WHITE HOUSE Office of the Press Secretary

Declaration of Internet Rights Preamble

Effective Technical Assistance in Crime Prevention & Criminal Justice What are the key c components?

AFRICAN DECLARATION on Internet Rights and Freedoms

Civil Liberties and Security: 10 Years After 9/11

- Safety of journalists -

Below you will find the abbreviations and full names of national parties, in the country language and in English.

Identity Theft. The Identity Theft Conundrum

Workshop Discussion Notes: Data Supply Chains

Intelligent Agents The New perspective Enhancing Network Security

Statement National Strategy for Trusted Identities in Cybersecurity Creating Options for Enhanced Online Security and Privacy

The global challenge

COMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT, THE COUNCIL, THE EUROPEAN ECONOMIC AND SOCIAL COMMITTEE AND THE COMMITTEE OF THE REGIONS

Preservation of longstanding, roles and missions of civilian and intelligence agencies

EDRi s. January European Digital Rights Rue Belliard 20, 1040 Brussels tel. +32 (0)

EUROPEAN COMMISSION ENTERPRISE AND INDUSTRY DIRECTORATE-GENERAL. Space, Security and GMES Security Research and Development

The European Security Strategy Austrian Perspective

ONTARIO TRIAL LAWYERS ASSOCIATION. OTLA s Response to the Anti-Fraud Task Force Status Update

A EUROPE THAT WORKS EUROPEAN LIBERALS ARE THE FIRST TO ADOPT ELECTION MANIFESTO

Text of a speech by Mr Stefan Löfven, Party Leader

The main object of my research is :

Setting the Record Straight: U.S. Department of Homeland Security Policies on Protecting Privacy. Lauren Saadat and Shannon Ballard 1

AN ROINN OIDEACHAIS AGUS EOLAÍOCHTA THE JUNIOR CERTIFICATE CIVIC, SOCIAL AND POLITICAL EDUCATION SYLLABUS

Safeguarding internal security in compliance with fundamental rights law

FACEBOOK STATEMENT RICHARD ALLAN NOVEMBER 11, My name is Richard Allan, and I am the Director of Public Policy

Fundamental Principles of Compliance Auditing

Graz Declaration on Principles of Human Rights Education and Human Security

Financial Services and Technology Forum 10 July TOPIC: Cyber Security

Privacy, data retention and terrorism

Policy Paper on Non-Formal Education: A framework for indicating and assuring quality

Online Surveillance Awareness as Impact on Data Validity for Open-Source Intelligence?

Advisory Committee on Equal Opportunities for Women and Men

OMNI TECHNICAL SOLUTIONS. Business Ethics, Compliance, Anti-Corruption and Anti-Money Laundering Policy

UNEDITED RAPPORTEUR NOTES DO NOT CITE

The Council is invited to approve the draft Conclusions on Counter-Terrorism, as set out in the annex.

Business Plan 2012/13

Cyber crime: Police Roles and Responsibilities Within a Collaborative Framework

Draft WGIG Issues Paper on E-Commerce

EASTNOR PAROCHIAL PRIMARY SCHOOL STAFF SOCIAL NETWORKING POLICY. Inspire and Achieve

HMG Security Policy Framework

Cyber Crime. E-commerce, e-learning but e-terrorism?

COUNCIL OF EUROPE COMMITTEE OF MINISTERS

Technical Questions on Data Retention

Towards new mission-oriented RTI policy and new rationales for programming and priority-setting

Accountability, Risk Assessment and Binding Corporate Codes.

PI VOCATIONAL SCHOOL POLICE ACADEMY

Case Study 3. Project Title: Security in Cyberspace. ShEEt

Myths and Facts about the Cyber Intelligence Sharing and Protection Act (CISPA)

2. SECURITY OF COMMUNICATION AND INFORMATION SYSTEMS IN THE GLOBALIZATION PROCESS

Statewatch Analysis. Commission: Action Plan on the Stockholm Programme. A bit more freedom and justice and a lot more security

Active Engagement, Modern Defence

Transcription:

Privacy vs. security a given trade-off? Joint conference on SurPRISE, PRISMS and PACT: Citizens Perspectives on Surveillance, Security and Privacy: Controversies, Alternatives and Solutions. Vienna, 3-4 November 24 Surveillance, Privacy and Security: A large scale participatory assessment of criteria and factors determining acceptability and acceptance of security technologies in Europe Stefan Strauß This project has received funding from the European Union s Seventh Framework Programme for research, technological development and demonstration under grant agreement no 285492.

Privacy and security a trade-off? In the fundamental rights liberty is the defining value: democracy, the rule of law and fundamental rights are designed to protect the liberty of the individual within the society. Thus, security is neither analogous nor opposed to liberty. (cf. Guild et al 28) Privacy=state free from interference, a form of liberty Intrusion is the exception not the norm EU Fundamental Rights Charter: Art. 6 Right to liberty and security Art. 7 Respect for private and family life Art. 8 Protection of personal data Trade-Off reflects a constructed neither-nor situation without considering complementarity (cf. Solvove 26, 2) Trade-off not inherent, results from surveillance as security practice reinforced by technology Security gain?

How the tradeoff occurs Technological disclosure by default (Strauß/Nentwich 23) diminishing boundaries between personal and non-personal information Economic security as business model (security economy) Political securitization and increasing pre-emption/vention Societal decreasing privacy awareness and increasing self-exposure via social media etc.

Securitization Security as continuing process Securitization: the very political act of defining what counts as a threat through the label security problems are turned into existential threats that require exceptional, emergency measures, which may include breaking otherwise binding rules or governing by decrees rather than by democratic decisions. (Trombetta 29) sustained strategic practice aimed at convincing a target audience to accept the claim that a specific development is threatening enough to deserve an immediate policy to alleviate it (Balzacq 25) conceputalizes security not as an objective condition but rather as a process marked by the intersubjective establishment of an existential threat with sufficient saliency to have political effects (Watson 2) Security becomes a quasi-central virtue and vehicle for political priorities and actions

Transformation from traditional to human-centered security Owen (24)

EU-Security policy Overview Broad range of threats Terrorism, cybercrime, poverty, hunger, disease, international conflicts, climate change, lack of resources, state failure, etc. But measures mainly focus on fighting crime and terrorism, border control, cyber-security Security as economic factor Security is a precondition of development. Conflict not only destroys infrastructure, (including social infrastructure); it also encourages criminality, deters investment and makes normal economic activity impossible. (ESS 23)

Paradigm shifts in security policy Extended security framing and calls for holistic approach Security as economic driver Security economy (OECD 24) Changing relation between security and liberty in the EU The Hague Programme, continued with Stockholm Programme (2-4) Overlap between internal and external security (civilian, police and military activities) Blurring boundaries between normal /rule-based and exceptional states Inherent logic of prevention and pre-emptive security measures Gaps between security threats and measures Individual partially becomes suspicious and turns from protected object into the threat Increasing surveillance tendencies in law enforcement + information exchange and connectivity (DR, PNR, Eurodac, Eurosur, Schengen IS, etc.), predictive policing,..

Citizens perceptions General attitudes and concerns % % 2 43 8 7 The use of SOSTs improves public security 8 8 2 3 2 2 SOSTs are only used to show something is being done to fight crime 4 2 4 23 27 If you have done nothing wrong you do not have to worry about SOSTs 35 35 2 Once SOSTs are in the place, they are likely to be abused 4 3 4 4 I am concerned that my personal information may be used against me 36 33 7 3 I am concerned that too much information is collected about me 66 5 3 I am concerned that my personal information may be shared without my permission N=772

Citizens perceptions tradeoff Contradictions in opinions of nothing to hide agreers: Nothing to hide but concerned that too much information is collected about me 8,5% 6% concerned that my personal information might be used against me 2% 7% concerned that my personal information may be shared without my permission Concerned 8,5% 29% 85% 23% 23% 8% 8% 9% 83% 96% Not concerned 52% 54% Neither nor agreers (N=549) opposers (N=84) agreers (N=54) opposers (N=87) agreers (N=549) opposers (N=83) NA

Effectiveness vs. intrusiveness % 2% 4% 6% 8% % 2 5 23 2 9 In my opinion, is an effective national security tool 8 8 5 34 22 38 4 3 2 28 27 64 36 The idea of makes me feel uncomfortable I feel more secure when is in operation 29 4 2 32 I feel that Is forced upon me without my permission 27 22 24 28 24 8 8 24 23 4 22 34 2 4 7 7 4 8 8 6 9 2 9 3 2 5 2

Major concerns about SOST usage % 2% 4% 6% 8% % 28 32 37 4 33 44 38 38 37 55 how usage may develop in future 28 5 24 32 it can reveal sensitive information about me 42 46 it can lead to misinterpretations of my behaviour 24 it can reveal strangers where I am (or was) 34 22 5 it can violate my fundamental human rights 33 5 it can violate everyone's fundamental human rights 34 28 26 3 3 34 5 29 3 3 28 7 32 3 29 8 2 3 2 4 5 2 9 3 3 2 2 4 9 8 2 7 5 2 6 7 3 6 6 7 3 5 4 4 7 9 5 4 5 5 5 3 8 4

Intrusiveness and acceptability the level of intrusiveness is acceptable given the public security benefits it offers 35 48 48 SOST is privacy intrusive 5 5 7 SOST improves public security 48 59 59 Laws and regulations ensure that SOST is not misused 24 9 24

Trust in security authorities % 2% 4% 6% 8% % 8 28 32 3 3 7 29 26 9 5 3 2 34 32 9 3 security authorities which use are trustworthy 7 26 35 7 5 4 23 35 9 7 9 3 35 8 6 are competent in what they do 29 3 7 2 2 6 28 29 9 5 4 8 36 33 3 7 4 are concerned about the welfare of citizens as well as national security 5 7 29 23 23 4 3 28 27 6 5 24 33 2 4 4 do not abuse their power

Summary and conclusions Securitization vs. Privatization of privacy and loss of its public value Extended security concept partially plausible due to complex global challenges Vague effectiveness with gaps between measures and threats Pre-emption and mass surveillance create new insecurities and reinforce the (alleged) security/privacy tradeoff and vice versa How far can/should pre-emption and prevention go? Increasing dynamic of security while privacy remained relatively static Overcoming the tradeoff fallacy by asking the right questions: not whether but how privacy should be protected (cf. Solove 2) Reconsidering privacy as a form of autonomy and liberty with multiple dimensions towards more systematic privacy impact assessments and effective privacy by design Enhancing transparency, accountability and oversight of SOSTs+practices to revitalize the public value of privacy

Thank you for your interest! Stefan Strauß Institute of Technology Assessment (ITA) Austrian Academy of Sciences A-3 Vienna, Strohgasse 45/5 Tel: +43 () 558 6599 Fax: +43 () 79883 Email: sstrauss@oeaw.ac.at Web: http://www.oeaw.ac.at/ita/en/