Making the citizen heard in security research
-
Upload
ian-brown -
Category
Technology
-
view
1.225 -
download
0
description
Transcript of Making the citizen heard in security research
Making the citizen heard in security research
Dr Ian Brown
Outline
Tools for understanding citizens’ opinions Ensuring society has accurate data and
risk assessments to make decisions Strengthening input of citizens and their
representatives into key decisions
Surveillance of personal data
Source: Eurobarometer #225 Data Protection in the EU, Feb. 2008 p.48
In-depth consultation required High-quality opinion polls can give
snapshots of public opinion… Focus group problems Citizen juries, scenarios, participatory
design and careful qualitative and quantitative measurement of behaviour are better long-term guides
Privacy Impact Assessments
Security: reality vs theatre1. Supports all security measures against terrorist risks in aviation that are realistically designed
to minimise the risk and are not disproportionate;2. Points out that controls of liquids in hand luggage by X-ray equipment cannot detect
explosives in liquids, and calls upon the Commission and the Member States to intensify their efforts in supporting research studies to find effective tools for the detection of explosives in liquids;
3. Considers that the provisions of Commission Regulation (EC) No 1546/2006 have not been implemented uniformly and consistently at all airports within the European Union and asks that this implementation be carried out;
4. Notes the increased costs to airports and operators of implementing this regulation;5. Notes in addition, whilst appreciating the need for high-quality security, the costs to aviation
passengers resulting from the confiscation of private property as a result of the implementation of the regulation;
6. Recognises the substantial inconvenience and disruption caused to passengers, especially transit passengers, and operators by the regulation;
7. Is concerned that the costs engendered by the regulation may not be proportionate to the added value of the regulation in terms of additional security provisions obtained through its implementation;
8. Calls upon the Commission to review urgently and on an ongoing basis Regulation (EC) No 1546/2006 (introduction of liquids onto aircraft);
US National Research Council “[T]here is not a consensus within the
relevant scientific community nor on the committee regarding whether any behavioral surveillance … techniques are ready for use at all in the counterterrorist context”
“Automated identification of terrorists through data mining (or any other known methodology) is neither feasible as an objective nor desirable as a goal of technology development efforts.”
Protecting Individual Privacy in the Struggle Against Terrorists: A Framework for Program Assessment, National Academies Press, 2008 p.4
Strengthening the citizen’s voice Appropriate oversight by EDPS, LIBE, FRA etc. Cross-programme application of fundamental
rights (ESRIF Final Report, 2009) “Development of methods … to detect web sites
which should be blocked across the EU” p.58 “By monitoring and observing the behaviour of users
a search engine for detecting suspicious behaviour patterns should be developed.” p.58
“By analyzing the data coming from the communications and activity patterns among potential terrorists and their contacts it is possible to prevent attacks or crimes from occurring.” p.61
ESRIF members