The Second Workshop on the Social
Implications of National Security
From Dataveillance to Überveillance and the Realpolitik of the
Transparent Society
29 October 2007
Wollongong, Australia
Editors: Katina Michael and M.G. Michael
The Second Workshop on the Social Implications of National Security
Research Network for a Secure Australia
This event is organised by the Research Network for a Secure Australia (RNSA). RNSA is a multidisciplinary collaboration established to strengthen Australia’s research capacity for protecting
critical infrastructure (CIP) from natural or human caused disasters including terrorist acts. The
RNSA facilitates a knowledge-sharing network for research organisations, government and the private
sector to develop research tools and methods to mitigate emerging safety and security issues relating
to critical infrastructure. World-leaders with extensive national and international linkages in relevant
scientific, engineering and technological research will lead this collaboration. The RNSA also organises
various activities to foster research collaboration and nurture young investigators.
Participants are encouraged to join the RNSA. Membership of the RNSA is open to Australian and
international researchers, industry, government and others professionally involved in CIP Research.
Information on joining is at www.secureaustralia.org.
RNSA
Convenor:
Administrator:
Node Leader:
Node Leader:
Outreach Manager:
A/Prof Priyan Mendis, Head of the Advanced Protective Technology for
Engineering Structures Group at the University of Melbourne
Mr. Anant Gupta, University of Melbourne
Prof Joseph Lai, UNSW@ADFA
Prof Ed Dawson, Queensland University of Technology
Athol Yates
Editors: Michael, K. and Michael, M.G.
Publication Title: From Dataveillance to Überveillance and the Realpolitik of the Transparent Society
(Workshop on the Social Implications of National Security, 2007)
Series: Research Network for a Secure Australia (RNSA)
Publisher: University of Wollongong, IP Location-Based Services Research Program (Faculty of
Informatics) jointly with the Centre for Transnational Crime Prevention (Faculty of Law)
Contact Details: Tel 02 4221 3937, Fax 02 4221 4045, University of Wollongong NSW 2522
Conference Websites: http://www.secureaustralia.org/ & http://www.uow.edu.au/~katina/rnsa07.htm
Publication Year: 2007
Format: Book (hardcopy $50 AUD; softcopy $30 AUD http://www.homelandsecurity.org.au/publications.html)
Cover and text layout: Anthony Petre
ISBN: 978-1-74128-141-5 (print)
ISBN: 978-1-74128-142-2 (pdf)
All rights reserved. Other than abstracts, no part of this publication may be produced in any form
without the written consent of the publisher. The publisher makes no representation or warranty
regarding the accuracy, timeliness, suitability or any other aspect of the information contained in
this book and cannot accept any legal responsibility or liability for any errors or omissions that may
be made.
Page 2
The Second Workshop on the Social Implications of National Security
Foreword
The 2007 Workshop on the Social Implications of National Security: from Dataveillance to
Überveillance and the Realpolitik of the Transparent Society was organised by the Research
Network for a Secure Australia (RNSA) funded by the Australian Research Council. The
Workshop will become a biennial event bringing together both researchers and practitioners
in the fields relating to the national research priority entitled Safeguarding Australia. In
2007, the workshop was held on the 29th October, at the Function Centre at the University
of Wollongong between 8.30 am and 5.00 pm.
The Workshop was organised by RNSA members from the IP Location-Based Services
Research Program (Faculty of Informatics) from the University of Wollongong, jointly with
the University of Melbourne.
It provided a forum for the exchange of ideas and research findings between core groups
or individuals interested in the social implications of national security measures, focused
on the big picture question of Surveillance vs Security.
Workshop participants will learn about the current and potential status of information
security measures. The notion of Dataveillance and that of Überveillance are contrasted in
the context of national security. What is the price of security that citizens are prepared to
pay? Will surveillance technology force us to choose between our right to privacy and national
security? This workshop delves deeper into some of the pressing issues facing technology
innovation and adoption, government policy, and the legal and regulatory framework.
The cross-disciplinary workshop was seeking perspectives which covered a diverse array of
interest areas such as security, information technology, law, philosophy, sociology, religion,
politics, history, culture, science and technology studies, and business.
The workshop included papers by Associate Professor of Counter-Terrorism Nicholas O’Brien,
Professor of Social Sciences Brian Martin, Professeur des Universites Invité Université
d’Orleans George Mickhail, Associate Professor of Law Gregory Rose and Professor of
Transport Systems Marcus Wigan. Other professionals presenting include Professor Roger
Clarke Principal of Xamax Consultancy (keynote), Mr Rob Nicholls and Ms Michelle
Rowland lawyers who work with Gilbert + Tobin, Dr Lucy Resnyansky a research scientist
with the Defence Science and Technology Office, and the Information Security Institute’s
Dr Lauren May.
The Workshop Proceedings contains only peer reviewed papers. The acceptance rate was 63%.
Each paper was subjected to a rigorous review process conducted by at least two experts in
the appropriate field. The authors were requested to revise the papers according to reviewer’s
comments. In addition, the editors provided extensive comments for each paper.
The editors would like to thank all of the reviewers for their assistance in maintaining the
high quality of papers, which are indicative of cutting-edge research in the field. A special
thank you also to the authors of these proceedings, who dedicated so much of their time
to support the workshop, especially for the time dedicated to researching and writing up
the results of their individual projects.
Page 3
The Second Workshop on the Social Implications of National Security
Program Committee
With respect to the organisation of the 2nd Social Implications of National Security Workshop,
the Chair received feedback from the following RNSA members.
Associate Professor Priyan Mendis
Mr Athol Yates
Mr Anant Gupta
We would also like to acknowledge the support of the Dean of the Faculty of Informatics
Professor Joe Chicharo, the Director of the Centre for Transnational Crime Prevention
Associate Professor Doug MacKinnon, and the Head of the School of Information Systems
and Technology Associate Professor Peter Hyland of the University of Wollongong.
Workshop Committee
Chair and Editor: Dr Katina Michael
Co-Chair: Holly Tootell
Co-Editor: Dr MG Michael
Reviewers
The editors would like to thank the following reviewers for their assistance in maintaining
the high quality of papers.
Associate Professor Carole Alcock
Professor Lyn Batten
Dr David Brin
Associate Professor L Jean Camp
Dr Karin Garretty
Dr Nadirsyah Hosen
Professor Michael Humphrey
Associate Professor Peter Hyland
Adjunct Professor Don Lamberton
Professor Stéphane Leman-Langlois
Mr Julian Ligertwood
Mr Murray Long
Professor David Lyon
Mr Glen Mattocks
Dr M.G. Michael
Dr Katina Michael
Assistant Professor Christine Perakslis
Dr Vidyasagar Potdar
Professor Jennifer Seberry
Associate Professor Jill Slay
Page 4
Computer & Information Science, University of South Australia
Director of Information Security Group, Deakin University
Scientist and Author, Holocene Limited
Centre for Applied Cybersecurity Research, Indiana University
Senior Lecturer, Faculty of Commerce, University of Wollongong
Lecturer, Faculty of Law, University of Wollongong
Department of Sociology & Social Policy, University of Sydney
Head of SISAT, University of Wollongong
Creative Industries, Queensland University of Technology
School of Criminology, University of Montreal
Research Fellow, Faculty of Law, RMIT University
President, Murray Long & Associates Inc., Ottawa, Ontario, Canada
Killam Research Fellow, Queens Research Chair, Queens University
Private Consultant, Visor Consulting, Canberra, Australia
Honorary Fellow, Faculty of Informatics, University of Wollongong
Senior Lecturer, Faculty of Informatics, University of Wollongong
The Hospitality College, Johnson & Wales University
Digital Ecosystems and Business Intelligence, Curtin Business School
Centre for Computer Security Research, University of Wollongong
Director Forensic Computing Lab, University of South Australia
The Second Workshop on the Social Implications of National Security
Table of Contents
1
Opening remarks ........................................................................................... 7
Doug MacKinnon
Centre for Transnational Crime Prevention, University of Wollongong
2
A note on überveillance .................................................................................. 9
M.G. Michael and K. Michael
School of Information Systems and Technology, University of Wollongong
3
Keynote address: What ‘überveillance’ is and what to do about it ..................... 27
Roger Clarke
Xamax Consultancy Pty Ltd
4
Keynote appendix: Surveillance vignettes ....................................................... 47
Roger Clarke
Xamax Consultancy Pty Ltd
5
Owning identity- one or many- do we have a choice? ....................................... 61
Marcus Wigan
Oxford Systematics
6
Opposing surveillance .................................................................................. 71
Brian Martin
School of Social Sciences, Media and Communication, University of Wollongong
7
Message in a bottle:
Stored communications interception as practised in Australia .......................... 83
Rob Nicholls and Michelle Rowland
Gilbert + Tobin
8
Australia and the ‘war against terrorism’:
Terrorism, national security and human rights ................................................. 97
Mark Rix
Graduate School of Business, University of Wollongong
9
Panel session:
The case for detention without charge in suspected terrorism cases in Australia .. 113
Nicholas O’Brien
Australian Graduate School of Policing, Charles Sturt University
10 The benefits and concerns of public data availability in Australia:
a survey of security experts ......................................................................... 117
Roba Abbas
School of Information Systems and Technology, University of Wollongong
Page 5
The Second Workshop on the Social Implications of National Security
11 Re-using public sector information (PSI) for profit: Who’s data is it anyway? .... 129
Mark Burdon
Faculty of Law, Queensland University of Technology
12 The Internet as a communication medium and a social space:
a social constructivist approach to the use of open data ................................ 147
Lucy Resnyansky
Defence Science and Technology Organisation
13 The Agora-Pnyx paradox ............................................................................. 169
George Mickhail
School of Accounting and Finance, University of Wollongong
14 Something smart going on: the apocalyptic aesthetics of surveillance ............. 181
Marcus O’Donnell
School of Journalism and Creative Writing, University of Wollongong
15 Auto-ID and location-based services in national security: Social implications ... 201
Holly Tootell
School of Information Systems and Technology, University of Wollongong
16 Privacy implications of automated GPS tracking and profiling ........................ 225
Muhammad Usman Iqbal and Samsung Lim
School of Surveying and Spatial Information Systems, University of New South Wales
17 Human tracking technology in mutual legal assistance and
police inter-state cooperation in international crimes ..................................... 241
Katina Michael and Gregory Rose
School of Information Systems and Technology and Centre for Transnational Crime
Prevention, University of Wollongong
18 ePassport security under the microscope ...................................................... 257
Matthew Sirotich
School of Information Systems and Technology, University of Wollongong
19 Improving information security management:
an Australian universities case study ........................................................... 281
Tim Lane and Lauren May
Faculty of Information Technology, Queensland University of Technology
Author Biographies ........................................................................................... 300
Page 6
The Second Workshop on the Social Implications of National Security
1
Opening remarks
Doug MacKinnon
Director, Centre for Transnational Crime Prevention, Faculty of Law,
University of Wollongong
Good morning all.
My name is Doug MacKinnon, I am the director of the Centre for Transnational
Crime Prevention at the University of Wollongong. It is a great pleasure to welcome
you to this one day workshop entitled: “From Dataveillance to Überveillance and
the Realpolitik of the Transparent Society”. This is the second workshop on the
Social Implications of National Security sponsored by the Research Network for a
Secure Australia (RNSA). This workshop will focus on the challenging question
of Surveillance vs Security.
In an age, when for all intents and purposes, an apparently normal individual with
family and social connections will rise in the morning, say goodbye to his spouse
and child and several hours later detonate a suicide bomb in a public place causing
death and destruction, many challenges now confront society and those charged
with maintaining security, stability and community safety.
Indeed the use of common technology such as mobile phones, by persons of ill
intent to coordinate- and on occasions to trigger- catastrophic events now strikes
hard at the balance between privacy and the common good.
The issue of balance between privacy and the common good is not a new one to
the legal profession and indeed to policymakers, however, historical argument about
concepts of public interest versus private needs are challenged by unprecedented
threats to civilians and non-combatants by those pursuing political agendas by
violent means.
This has recently been demonstrated in Australia through an investigation in
Queensland linked to the recent London and Glasgow terrorist strikes. Not only was
the Australian legal framework tested but so were new laws and legal processes. In
Page 7
The Second Workshop on the Social Implications of National Security
an era where those charged with the protection of society are indeed often judged
by their ability to prevent crime from taking place, law enforcement personnel often
find themselves caught in the middle of opposing forces. Ultimately, many would
say that the Queensland incident was a true test of the Australian legal system of
justice, others might say otherwise, and only time will tell.
For those engaged in social policy and the benefits and disadvantages of technology
to society, the examination of the Realpolitik of dataveillance and überveillance need
to be considered in the context of national security. Will real or imagined threats
lead to a significant increase in surveillance technology and impact on our way of
life? Will the balance between privacy and national security change dramatically?
The importance of this workshop as it delves deeper into critical factors associated
with technology innovation and adoption, government policy, and the legal and
regulatory framework, cannot be understated.
The presenters of this workshop come from diverse backgrounds including:
legal firms, government agencies, academic institutions across Australia, and some
individuals from the business sector. There are papers on stored communications
interception and the law, terrorism and human rights, public data versus data
protection, location based services and privacy, and ePassports and security.
To the delegates, we hope you enjoy this year’s workshop and thank you for
coming from all over Australia to be present with us today. It promises to be a day
full of challenging issues, learning, and constructive dialogue.
Thank you.
Page 8
The Second Workshop on the Social Implications of National Security
2
A Note on ‘Überveillance’
M.G. Michael1 and Katina Michael2
Honorary Fellow, 2Senior Lecturer, School of Information Systems and Technology,
University of Wollongong
1
Abstract
The following note from the editors presents a summary of the term überveillance, as it
was originally presented by the primary author in May 2006. Überveillance is an above
and beyond, an exaggerated, an almost omnipresent 24/7 electronic surveillance. It is a
surveillance that is not only “always on” but “always with you” (it is ubiquitous) because
the technology that facilitates it, in its ultimate implementation, is embedded within the
human body. The problem with this kind of bodily invasive surveillance is that omnipresence
in the ‘material’ world will not always equate with omniscience, hence the real concern
for misinformation, misinterpretation, and information manipulation.
Keywords: surveillance, dataveillance, überveillance, radio-frequency identification (RFID),
microchip implants, social implications
Page 9
The Second Workshop on the Social Implications of National Security
1 Überveillance- an emerging concept
Überveillance is an emerging concept, in the full sense of both its application
and power it is not yet arrived (M.G. Michael 2007). For some time Roger Clarke’s
(1988, p. 498) dataveillance has been prevalent: the “systematic use of personal data
systems in the investigation or monitoring of the actions of one or more persons”.
Almost twenty years on, technology has developed so much and the national
security context has altered so greatly (Snow 2005), that there was a pressing need
to formulate a new term to convey both this present reality, and the Realpolitik
(policy primarily based on power) of our times. It should be said, however, that if
it had not been for dataveillance, überveillance could not be. And for that matter, it
must be emphasized that dataveillance will always be- it will provide the scorecard
for the engine being used to fulfill überveillance.
Überveillance takes that which was “static” or “discrete” in the dataveillance
world, and makes it “constant” and “embedded”. Consider it not only “automatic”
and to do with “identification” BUT also about “location”- that is, the ability to
automatically locate AND identify- in essence the ability to perform automatic
location identification (ALI). It has to do with the fundamental “who” (ID), “where”
(location), “when” (time) questions in an attempt to derive “why” (motivation),
“what” (result), and even “how” (method/plan/thought). Überveillance can be a
predictive mechanism for one’s expected behaviour, traits, characteristics, likes or
dislikes; or it can be based on historical fact, or something in between.The inherent
problem with überveillance is that facts do not always add up to truth (ie as in the
case of an exclusive disjunction T+T=F), and predictions based on intelligence are
not always correct.
Überveillance is more than closed circuit television (CCTV) feeds, or crossagency databases linked to national identity cards, or biometrics and ePassports
used for international travel. Überveillance is the sum total of all these types of
surveillance and the deliberate integration of an individual’s personal data for the
continuous tracking and monitoring of identity and location in real time. In its
ultimate form, überveillance has to do with more than automatic identification
technologies that we carry with us. It has to do with “under the skin” technology
that is embedded in the body like microchip implants; it is that which cuts into the
flesh- a charagma (“mark”). Think of it as Big Brother, on the inside looking out.
This charagma is virtually meaningless without the hybrid network architecture
which supports its functionality: to make the person a walking online node, beyond
luggable mobile phones, PDAs and smart cards.We are referring here, to the lowest
common denominator, the smallest unit of tracking- presently a tiny chip in the
body of a human being.
Implants cannot be left behind, cannot be lost, ‘cannot’ be tampered with,
they are always on, can link to objects, make the person seemingly otherworldly.
This act of chipification is best illustrated by the ever-increasing uses of implant
devices for medical prosthesis and for diagnostics (Swedberg 2007). Humancentric
Page 10
The Second Workshop on the Social Implications of National Security
implants are giving rise to the Electrophorus (Michael & Michael 2007, p. 313), the
bearer of electric technology; an individual entity very different to the sci-fi notion
of Cyborg as portrayed in such popular television series as the Six Million Dollar
Man (1974-1978). In its current state the Electrophorus relies on a device being
triggered wirelessly when it enters an electromagnetic field; these properties now
mean that “systems” can interact with people within a spatial dimension, and for
the greater part unobtrusively.And it is surely not simple coincidence that alongside
überveillance we are witnessing the philosophical reawakening (throughout most of
the fundamental streams running through our culture) of Nietzsche’s Übermensch–
the overcoming of the “all-too-human” (Honderich 1995b).
That we might establish that chip implants are not mere science-fiction we
need to identify a number of sources which add confirmation to the current reality.
It is important to do so because the widespread misconception by information and
communication technology (ICT) and engineering researchers at international
conferences attended by both authors, is that chip implants are not commercially
available for a variety of applications, and that the technology is not relevant to
national security per se. Some researchers even believe that RFID implants have
naught to do with “tracking” and can only be used for “identification”.The following
accounts and background sources should place things into perspective, at least at an
overview level (see also, K. Michael 2007).
In March of 2005 the European Group on Ethics (EGE) in Science and New
Technologies, established by the European Commission (EC), submitted an Opinion
on ICT implants in the human body (Rodotà & Capurro 2005). The thirty-four
page document outlines a number of legal and ethical issues to do with ICT
implants and is premised around the European Union Treaty (Article 6) which has
to do with the “fundamental rights” of the individual. Fundamental rights have to
do with human dignity, the right to the integrity of the person, and the protection
of personal data. From the legal perspective the following was ascertained (Rodotà
& Capurro 2005, pp. 18-19):
a) the existence of a recognised serious but uncertain risk, currently
applying to the simplest types of ICT implant in the human body,
requires application of the precautionary principle. In particular, one
should distinguish between active and passive implants, reversible and
irreversible implants, and between offline and online implants;
b) the purpose specification principle mandates at least a distinction
between medical and non-medical applications. However, medical
applications should also be evaluated stringently and selectively, partly
to prevent them from being invoked as a means to legitimise other
types of application;
c) the data minimisation principle rules out the lawfulness of ICT implants
that are only aimed at identifying patients, if they can be replaced by
Page 11
The Second Workshop on the Social Implications of National Security
less invasive and equally secure tools;
d) the proportionality principle rules out the lawfulness of implants such
as those that are used, for instance, exclusively to facilitate entrance to
public premises;
e) the principle of integrity and inviolability of the body rules out that the
data subject’s consent is sufficient to allow all kinds of implant to be
deployed; and
f) the dignity principle prohibits transformation of the body into an object
that can be manipulated and controlled remotely – into a mere source
of information.
The conclusion is that ICT implants for non-medical purposes violate
fundamental legal principles. From the ethical perspective, ICT implants have
numerous issues, including the requirement for: non-instrumentalisation, privacy,
non-discrimination, informed consent, equity, and the precautionary principle (see
also IEEE 2007; Lewan 2007a; Burton and Stockhausen 2005). It should be stated,
however, that the EGE while not recommending ICT implants for non-medical
applications because they are fundamentally fraught with legal and ethical issues,
did state the following (Rodotà & Capurro 2005, p. 32):
ICT implants for surveillance in particular threaten human dignity.They
could be used by state authorities, individuals and groups to increase
their power over others. The implants could be used to locate people
(and also to retrieve other kinds of information about them).This might
be justified for security reasons (early release for prisoners) or for safety
reasons (location of vulnerable children).
However, the EGE insists that such surveillance applications of ICT
implants may only be permitted if the legislator considers that there is
an urgent and justified necessity in a democratic society (Article 8 of
the Human Rights Convention) and there are no less intrusive methods.
Nevertheless the EGE does not favour such uses and considers that
surveillance applications, under all circumstances, must be specified
in legislation. Surveillance procedures in individual cases should be
approved and monitored by an independent court.
The same general principles should apply to the use of ICT implants
for military purposes.
Although this Opinion was entirely comprehensive for its time, we hold growing
concerns for the development of the information society, the lack of public debate and
awareness regarding this emerging technology, and the pressing need for regulation
that has not eventuated commensurate to developments in this domain.
Herein rests the problem of human rights and the “balance” between freedom,
security and justice. First, it is a built-in fallacy to speak of a balance. In the microchip
implant scenario, there will never be a balance, so long as someone else has the
potential to control the implant device or the stored data about us which is linked to
Page 12
The Second Workshop on the Social Implications of National Security
the device. Second, we are living in a period where chip implants for the purposes
of segregation are being discussed seriously by health officials and politicians. We
are speaking here of the identification of groups of people in the name of “health
management” or “national security.”We will almost certainly witness new, and more
fixed forms, of ‘electronic’ apartheid.Whatever the guise of parliamentary speak we
are not far from such potentially explosive perils as a global community.
Consider the very real case where the “Papua Legislative Council is deliberating
a regulation that would see microchips implanted in people living with HIV/AIDS
so authorities could monitor their actions” (Somba 2007). Similar discussions on
“registration” were held regarding asylum seekers and illegal immigrants in the
European Union (Hawthorne 2001). RFID implants or the “tagging” of populations
in Asia (eg Singapore) were also considered “the next step” in the containment and
eradication of the Severe Acute Respiratory Syndrome (SARS) in 2003 before it
subsided (RFID 2003). Apart from disease outbreaks, RFID has also been discussed
as a response and recovery device for emergency services personnel dispatched to
terrorist disasters (BBC 2005), and for the identification of victims of natural disasters,
such as in the case of the Boxing Day Tsunami (Channel 2005).The question remains
whether there is a truly legitimate use function of chip implants for the purposes of
emergency management as opposed to other applications.‘Definition’ plays a critical
role in this instance. A similar debate has ensued in the use and application of the
Schengen Information System (SIS) II in the European Union where differing states
have recorded alerts on individuals based on their definition and understanding of
“security risk” (Guild and Bigo 2002).
In June of 2006, legislative analyst, Anthony Gad, reported in brief 06-13 for
the Legislative Reference Bureau, that:
2005 Wisconsin Act 482, passed by the legislature and signed by
Governor Jim Doyle on May 30, 2006, prohibits the required implanting
of microchips in humans. It is the first law of its kind in the nation
reflecting a proactive attempt to prevent potential abuses of this emergent
technology.
Today a number of states in the United States have passed similar laws, despite the
fact that the U.S. Food and Drug Administration (FDA, 2004) at the national level
have allowed radio frequency identification implants for medical use in humans.
The Wisconsin Act (2006) states:
The people of the state of Wisconsin, represented in senate and assembly,
do enact as follows: SECTION 1. 146.25 of the statutes is created to read:
146.25 Required implanting of microchip prohibited. (1) No person
may require an individual to undergo the implanting of a microchip. (2)
Any person who violates sub. (1) may be required to forfeit not more
than $10,000. Each day of continued violation constitutes a separate
offense.
North Dakota was the next state to follow Wisconsin’s example. Governor John
Page 13
The Second Workshop on the Social Implications of National Security
Hoeven signed a two sentence bill into state legislature on 4 April 2007.The bill was
criticised by some who said that while it protected citizens from being “injected”
with an implant, it did not prevent someone from making them swallow it (Songini
2007). More recently, Californian Governor Arnold Schwarzenegger, signed bill SB
362 proposed by state Senator Joe Simitian barring “employers and others from
forcing people to have a radio frequency identification (RFID) device implanted
under their skin” (Woolfolk 2007; Jones 2007). According to the Californian Office
of Privacy Protection (2007) this bill
…would prohibit a person from requiring any other individual to
undergo the subcutaneous implanting of an identification device. It
would allow an aggrieved party to bring an action against a violator for
injunctive relief or for the assessment of civil penalties to be determined
by the court.
The bill which will be effective 1 January 2008, did not receive support from the
technology industry on the contention that it was “unnecessary”.
Interestingly, however, it is in the United States, that most chip implant
applications have come to pass despite the calls for caution. This is not surprising
given the first human-implantable passive RFID microchip (the VeriChipTM)
was approved for medical use in October of 2004 by the U.S. Food and Drug
Administration.Today theVeriChip Corporation has 900 hospitals across the United
States that have registered the VeriMed system, and now the corporation’s focus
has moved to “patient enrollment” including people with diabetes, Alzheimer’s and
dementia (Diabetes News 2007). The VeriMedTM Patient Identification System is
used for “rapidly and accurately identifying people who arrive in an emergency
room and are unable to communicate” (VeriChip 2007).
In July of 2006 (The Age, 2007), CityWatcher.com reported two of its employees
had “glass encapsulated microchips with miniature antennas embedded in their
forearms… merely a way of restricting access to vaults that held sensitive data and
images for police departments, a layer of security beyond key cards and clearance
codes.” It is not difficult to see how implants may soon find themselves being
applied to the corrective services sector (RFID 2006). In 2002, 27 of 50 American
states were using some form of satellite surveillance to monitor parolees. Similar
schemes have been used in Sweden since 1994. In the majority of cases, parolees
wear wireless wrist or ankle bracelets and carry small boxes containing the vital
tracking and positioning technology. The positioning transmitter emits a constant
signal that is monitored at a central intelligence point (Michael & Masters 2006a).
Despite continued claims by researchers that RFID is only used for identification
purposes, Health Data Management (2005a) disclosed that VeriChip (the primary
commercial RFID implant patient ID provider) had enhanced its patient wander
application by adding the ability to follow the “real-time location of patients, the
ability to define containment areas for different classes of patients, and one-touch
alerting.The system now also features the ability to track equipment in addition to
Page 14
The Second Workshop on the Social Implications of National Security
patients.” A number of these issues have moved the American Medical Association
to produce an ethics code for RFID chip implants. Due to copyright restrictions,
we cannot quote this code here but it can be sourced online (Sade 2007; Reichman
2006; Bacheldor 2007).
In chip implant cases outside the U.S. we also find a number of diverse
applications for humancentric RFID.VeriChip’s Scott Silverman had stated in 2004
that 7,000 chip implants had been given to distributors of which it was estimated
1,000 chips had been implanted in humans by year end worldwide (Weissert 2004).
Today the number ofVeriChip implantees is estimated to be at about 2,000. So where
did all these chips go? Well, they may not be mainstream applications, but they are in
operation. As far back as 2004, a nightclub in Barcelona, Spain, the VIP Baja Beach
Club in Catalan City (Chase 2007) was offering “its VIP clients the opportunity to
have a syringe-injected microchip implanted in their upper arms that not only [gave]
them special access to VIP lounges, but also [acted] as a debit account from which
they [could] pay for drinks” (Morton 2004). Microchips have also been implanted in
160 Mexican officials in the law enforcement sector (Weissert 2004).“Mexico’s top
federal prosecutors and investigators began receiving chip implants in their arms…
in order to get access to restricted areas inside the attorney general’s headquarters.”
In this instance, the implant acted as an access control security device despite the
documented evidence purporting to the fact that RFID is not a secure technology
at all (see Gartner Research report by Reynolds 2004).
In the United Kingdom, The Guardian (Wilson 2002), reported that 11-year old
Danielle Duval had an active chip (i.e. containing a rechargeable battery) implanted
in her. Her mother believes that it is no different to tracking a stolen car, simply that
it is being used for another more important application. Mrs Duvall is considering
implanting her younger daughter age 7 as well but will wait until the child is a bit
older, “so that she fully understands what’s happening”. In Tokyo, Japan, the Kyowa
Corporation in 2004 manufactured a schoolbag with a GPS device fitted into it,
to meet parental concerns about crime, and in 2005 Yokohama City children were
involved in a four month RFID bracelet trial using the I-Safety system (Swedberg
2005). In 2007, we now have a company in Lancashire in England, Trutex, which
is seriously considering fitting the school uniforms they manufacture with RFID
(Meikle 2007).What might be next? Concerned parents enforce microchip implants
on minors?
More recently decade-old experimental studies on microchip implants in rats
have come to light tying the device to tumours (Lewan, 2007b). The American
Veterinary Medical Association (AVMA 2007) was so concerned with the report
that on 13 September 2007 they released the following statement, quoted here in
full:
The American Veterinary Medical Association (AVMA) is very
concerned about recent reports and studies that have linked microchip
identification implants, commonly used in dogs and cats, to cancer in
Page 15
The Second Workshop on the Social Implications of National Security
dogs and laboratory animals. AVMA staff and member veterinarians
are actively looking into any potential for this technology to induce
tumor formation in dogs, cats, or people but must await more definitive
data and test results before taking further action. Based on the fact
that a large number of pets have already been implanted with this
microchip technology and there has been a relatively small number
of confirmed cases of chip-induced tumors, the AVMA advises pet
owners against a rush to judgment on the technology. In fact, there
is a concern among veterinary medical researchers that some of the
research into chip-induced tumors may be flawed, because the animals
used were genetically predisposed to cancer. In addition, removal of
the chip is a more invasive procedure and not without potential
complications. It’s clear that there is a need for more scientific research
into this technology. [bold eds.]
We can see here, already, evidence pointing to the notion of ‘no return’- an
admittance that removal of the chip is not easy, and not without complications.
Let us for a moment revisit the decade old case of the Norplant System, the
levonorgestrel contraceptive inserts that over 1 million women in the United States,
and over 3.6 million women worldwide had been implanted with through 1996
(AMA 1997).The implants were inserted just under the skin of the upper arm in a
surgical procedure under local anesthesia and could be removed in a similar fashion.
As of 1997, there were 2,700 Norplant suits pending in the state and federal courts
across the United States alone. Most of the claims had to do with “pain or damage
associated with insertion or removal of the implants… [p]laintiffs have contended
that they were not adequately warned, however, concerning the degree or severity
of these events” (AMA 1997). While the Norplant system did not use RFID there
are many lessons to be gained. Concerns for the potential for widespread health
implications caused by humancentric implants have also been around for some time,
it should not surprise us. In 2003, Covacio provided evidence why implants may
impact humans adversely, categorizing these into thermal (i.e. whole/partial rise in
body heating), stimulation (i.e. excitation of nerves and muscles) and other effects
most of which are currently unknown.
The future is here now, and it is wireless. What is not completely here yet are
the formal service level agreements to hand-off transactions between different types
of networks owned by a multitude of network providers (few of whom are truly
global)- free or commercial.These architectures and protocols are being developed,
and it is only a matter of time before existing technologies have the capability to track
individuals between indoor and outdoor locations seamlessly, or a new technology
is created to do what present-day networks cannot (Identec 2007). For instance, a
wristwatch device with GPS capabilities to be worn under the skin translucently is
one idea that was proposed as far back as 1998. Hengartner and Steenkiste (2005)
Page 16
The Second Workshop on the Social Implications of National Security
forewarn that “[l]ocation is a sensitive piece of information” and that “releasing it
to random entities might pose security and privacy risks.”
In short, there is nowhere to hide in this digital society, and nothing remains private
(in due course, perhaps, not even our thoughts). Nanotechnology, the engineering of
functional systems at the molecular level, is also set to change the way we perceive
surveillance- microscopic bugs (some 50,000 times smaller than the width of the
human hair) will be more parasitic than even the most advanced silicon-based
auto-ID technologies. In the future we may be wearing hundreds of microscopic
implants, each relating to an exomuscle or an exoskeleton, and which have the power
to interact with literally millions of objects in the ‘outside world’. The dangers are
not whether state governments will invest in this technology, they are and they will
(Ratner & Ratner 2004), but whether the next generation will idealistically view
this technology as super ‘cool’ and ‘convenient’ and opt-in without comprehending
the full extent of their compliance.
The social implications of these über-intrusive technologies will have no
restricted limits or political borders. They will affect everything from our day-today existence, to our family and community relations.They will give rise to mental
health problems, even more complex forms of paranoia and obsessive compulsive
disorder.The refusal of some thinkers to admit to a body and mind correlation, i.e.
psychophysical interaction, is progressively losing ground with many now agreeing,
especially with the support of modern neuroscience, that “the intimate relation
between bodily and psychic functions is basic to our personal identity” (Rodotà
and Capurro 2005, p. 3). Even those engaged in religious observances will be
affected, especially in the context of their practice of confession and their specific
understanding of absolution of ‘sin’- we might ‘confess’ as much as we might want,
but the records on the database, ‘the slate’, will not be wiped ‘clean’. The list of
social implications is endless; it is an exercise for our imaginations. Whatever our
respective –ism or not, condition of our mental health or not, this ‘peeping Tom’
which we will carry on the inside, will have manifest consequences for that which
philosophers and theologians normally term self-consciousness.
In all of this rest the multiple paradoxical levels of überveillance. In the first
instance, it will be one of the great blunders of the new political order to think that
chip implants (or indeed nanodevices) will provide the last inch of detail required to
know where a person is, what they are doing, and what they are thinking.Authentic
ambient context will always be lacking, and this will further aggravate the potential
‘puppeteers’ of any comprehensive surveillance system. Marcus Wigan captures this
critical facet of “context” very well in his paper where he speaks of “asymmetric
information” held by third parties. Second, chip implants will not necessarily make
you smarter or more aware (unless you can afford it, of course), but on the contrary
and under the ‘right’ circumstances make us increasingly dumb and mute. Third,
chip implants are not the panacea they are made out to be- they can fail, they can
be stolen, they are not tamper-proof, and they may cause harmful effects to the
Page 17
The Second Workshop on the Social Implications of National Security
body- they are after all a foreign object and their primary function is to relate to
the outside world not the body itself (as in the case of pacemakers and cochlear
implants). Fourth, chip implants in our present framework in any case, do not give
you greater control over your space, but allow for others to control you and to
decrease your autonomy and as a result your interpersonal trust at both societal
and state levels. Trust is inexorably linked to both metaphysical and moral freedom.
Therefore the naive position routinely heard in the public domain that if you have
“nothing to hide, why worry?” misses the point entirely. Fifth, chip implants will
create a presently unimaginable digital divide- we are not referring to computer
access here, or Internet access, but access to another mode of existence.The “haves”
(implantees) and the “have-nots” (non-implantees) will not be on speaking terms;
perhaps a fresh interpretive approach to the biblical account of the tower of Babel
(Gen. 11:9).
At this point of adoption, unless the implant is removed within a short time,
the body will adopt the foreign object and tie it to tissue. At this moment, there
will be no exit strategy, no contingency plan, it will be a life enslaved to upgrades,
virus protection mechanisms, and inescapable intrusion. Imagine a working situation
where your computer- the one which has all your personal data stored on it- has
been hit by a worm, and becomes increasingly inoperable and subject to overflow
errors and connectivity problems, being the only machine you could use; now
imagine the same thing happening with an embedded implant. There would be
little choice other than to upgrade or, the unthinkable, to opt out of the networked
world altogether.
The first discernible movement towards this escalating and forward-looking
scenario, with the potential to entangle us all “both small and great”, will be our
unique and ‘non-refundable’ identification number (ID). The universal drive to
provide us all with cradle-to-grave ULIs (unique lifetime identifiers) which will
replace our names is gaining increasing momentum, especially post September 11.
Philosophers have generally held that our names are the most identifiable expressions
of our personhood. Names, they have argued, are the signification of identity and
origin; our names possess both sense and reference (Honderich 1995a, 602f). Two
of the twentieth century’s greatest political consciousness (one who survived the
Stalinist purges and the other the holocaust) Aleksandr Solzhenitsyn and Primo
Levi, have warned us of the connection between murderous regimes and the
numbering of individuals. There is no quicker way to dehumanize an individual
than by ‘removing’ someone’s name and replacing it with a number. It is far easier
to extinguish an individual on every level if you are ‘rubbing’ out a number rather
than a life history.
Aleksandr Solzhenitsyn recounts in one place from his famous anti-Stalinist
testament, The Gulag Archipelago (1918-56), (2007, p. 346f):
Then again, they [Corrective Labor Camps] quite blatantly borrowed
Page 18
The Second Workshop on the Social Implications of National Security
from the Nazis a practice which had proved valuable to them – the
substitution of a number for the prisoner’s name, his “I”, his human
individuality, so that the difference between one man and another was
a digit more or less in an otherwise identical row of figures… [i]f you
remember all this, it may not surprise you to hear that making him
wear numbers was the most hurtful and effective way of damaging a
prisoner’s self-respect.
Primo Levi writes similarly in his own well-known account of the human condition
in The Drowned and the Saved (1989, p. 94f):
Altogether different is what must be said about the tattoo [the number],
an altogether autochthonous Auschwitzian invention… [t]he operation
was not very painful and lasted no more than a minute, but it was
traumatic. Its symbolic meaning was clear to everyone: this is an indelible
mark, you will never leave here; this is the mark with which slaves
are branded and cattle sent to the slaughter, and this is what you have
become.You no longer have a name; this is your new name.
And many centuries before both Solzhenitsyn and Levi were to become
acknowledged as two of the greatest political consciences of our times, an exile
on the isle of Patmos- during the reign of the Emperor Domitian- expressed a
disturbingly comparable position when referring to the abuses of the emperor cult
which was especially practiced in Asia Minor away from the more sophisticated
population of Rome (M.G. Michael 1998, pp. 176-196). He was Saint John the
Evangelist, commonly recognized as the author of the Revelation (c. A.D. 95):
He causes all, both small and great, rich and poor, free and slave, to receive
a mark on their hand or on their foreheads, and that no one may buy
or sell except one who has the mark or the name of the beast, or the
number of his name. Here is wisdom. Let him who has understanding
calculate the number of the beast, for it is the number of a man: His
number is 666 (Rev 13:16-18).
The technological infrastructures: the software, the middleware, and the
hardware for ULIs, are readily available to support a diverse range of humancentric
applications, and increasingly those embedded technologies which will eventually
support überveillance. Multi-national corporations, particularly those involved in
telecommunications and banking, are investing millions (expecting literally billions
in return) in such ‘identifiable’ technologies that have a tracking capability. At the
same time the media which in most instances can yield more sway with people than
government institutions themselves, squanders this influence and is not intelligently
challenging this auto-ID (automatic identification) trajectory.As if in chorus, blockbuster productions from Hollywood are playing up all forms of biometrics as not
only hip and smart, but also as unavoidable mini-device fashion accessories for the
upwardly mobile, and attractive. Advertising, of course, plays a dominant role in
Page 19
The Second Workshop on the Social Implications of National Security
this cultural tech-rap. Advertisers are well aware that the market is literally limitless
and demographically accessible at all levels (and more tantalizingly from cradle-tograve consumers). Our culture, which in previous generations was for the better
part the van guard against most things detrimental to our collective well-being, is
dangerously close to bankrupt (it already is idol worshipping) and has progressively
become fecund territory for whatever idiocy might take our fancy. Carl Bernstein
(1992) of Bernstein and Woodward fame has captured the atmosphere of recent
times very well:
We are in the process of creating what deserves to be called the idiot
culture. Not an idiot sub-culture, which every society has bubbling
beneath the surface and which can provide harmless fun; but the culture
itself. For the first time the weird and the stupid and the coarse are
becoming our cultural norm, even our cultural ideal.
Oddly enough, given this technological fixation with which most of the world
is engaged, there is a perceptible mood of a collective disquiet that something is
not as it should be. In the face of that, this self-deception of ‘wellness’ is not only
taking a stronger hold on us, but it is also being rationalized and deconstructed
on many authoritative platforms and levels. We must break free of this dangerous
daydream to make out the cracks that have already started to appear on the gold
tinted rim of this seeming 21st century utopia. The machine, the new technicized
“gulag archipelago” is ever pitiless and without conscience. It can tear sinew; crush
bones; break spirits; and rip out hearts without ever needing to take a break.
Lest there be any misunderstanding the authors of this note are not antigovernment, after all, the alternative is anarchy-; nor are they conspiracy theorists
(though we now know better than to rule out all conspiracy theories). Nor do they
believe that these dark scenarios need necessarily eventuate as precisely as they are
describing them. But they do believe that we are close to reaching the critical point
of no return. Others believe that point is much closer (ACLU, 2007). It remains for
individuals to speak up and argue for, and to demand regulation, as has happened
in several states in the United States where Acts have been established to avoid
microchipping without an individual’s consent, i.e. compulsory electronic tagging of
citizens. Our politicians (there are some exceptions) for a number of reasons will not
legislate on this issue of their own accord, it would involve multifaceted industry and
absorb too much of their time, and the fear they might be labelled anti-technology
or worse still, failing to do all that they can in the fight against “terror”. This is
one of the components of the modern-day Realpolitik which in its push for the
transparent society is bulldozing ahead without any true sensibility for the richness,
fullness, and sensitivity of the undergrowth. As an actively engaged community, as
a body of concerned researchers with an ecumenical conscience and voice, we can
make a difference by postponing or even downgrading the doomsday scenario of
even the most pessimistic futurist.
Page 20
The Second Workshop on the Social Implications of National Security
Finally, the editors would like to underscore two main points. First, the positions,
projections, and beliefs expressed in this summary do not necessarily reflect the
positions, projections, and beliefs of the individual contributors to this volume. And
second, as with our previous workshop, it is clear that the authors of the papers do
embrace all that which is vital and dynamic with technology, but reject its rampant
application and diffusion without studied consideration as to the potential effects
and consequences.
References
ACLU (2007). “Surveillance Society Clock 23:54”, American Civil Liberties Union,
<http://www.aclu.org/privacy/spying/surveillancesocietyclock.html>
(Accessed 5 October 2007).
AMA (1997). “Norplant System Contraceptive Inserts“, Report 9 of the Council on
Scientific Affairs (I-97), American Medical Association, <http://www.ama-assn.
org/ama/pub/category/print/13593.html> Accessed 5 October 2007.
AVMA (13 September 2007). “Breaking News: Statement on Microchipping”,
American Vetinerary Medical Association, <http://www.avma.org/aa/
microchip/breaking_news_070913_pf.asp> Accessed 5 October 2007.
Bacheldor, B. (17 July 2007). “AMA Issues Ethics Code for RFID Chip
Implants”, RFID Journal, <http://www.rfidjournal.com/article/
articleprint/3487/-1/1/> Accessed 4 October 2007.
Ball, E. and Bond, K. (2005). “Bess Marion v. Eddie Cafka and ECC Enterprises,
Inc., No. 2005-CV-0237”, IT Moot Court, <http://www.itmootcourt.
com/2005%20Briefs/Petitioner/Team18.pdf> Accessed 2 October 2007.
BBC. (28 July 2005). “Implant Chip to Identify the Dead”, BBC News, <http://
news.bbc.co.uk/1/hi/technology/4721175.stm> Accessed 10 January 2006.
Bernstein, C. (1992). The Guardian, June 3.
Burton, P. and Stockhausen, K. (22 February 2005). The Australian Medical
Association’s Submission to the Legal and Constitutional’s Inquiry into the Privacy
Act 1988 <http://www.ama.com.au/web.nsf/doc/WEEN-69X6DV/$file/
Privacy_Submission_to_Senate_Committee.doc> Accessed 5 October 2007.
Californian Office of Privacy Protection. (23 July 2007). “California Privacy
Legislation”, Office of Privacy Protection, State of California, <http://www.
privacy.ca.gov/califlegis.htm> Accessed 10 October 2007.
Channel (3 January 2005). “Thai Wave Disaster Largest Forensic Challenge In
Years: Expert”, Channel News Asia, <http://www.channelnewsasia.com/
stories/afp_asiapacific/view/125459/1/.html> Accessed 10 February 2005.
Chase, C. (n.d.).VIP Verichip, Baja Beach House- Zona VIP, <http://www.bajabeachclub.com/bajaes/asp/zonavip2.aspx> Accessed 12 October 2007.
Clarke, R.A. (1988). “Information Technology and Dataveillance”,
Communications of the ACM, 31(5), pp. 498-512.
Covacio, S. (2003). “Technological Problems Associated with the Subcutaneous
Page 21
The Second Workshop on the Social Implications of National Security
Microchips for Human Identification (SMHId), InSITE-“Where Parallels
Intersect, June, pp. 843-853.
Diabetes News. (20 March 2007). “13 Diabetics Implanted With VeriMed RFID
Microchip At Boston Diabetes EXPO”, Medical News Today, <http://www.
medicalnewstoday.com/articles/65560.php> Accessed 9 October 2007.
FDA (10 December 2004). “Medical Devices; General Hospital and Personal Use
Devices; Classification of Implantable Radiofrequency Transponder System
for Patient Identification and Health Information”, U.S. Food and Drug
Administration- Department of Health and Human Services, 69(237), <http://
www.fda.gov/ohrms/dockets/98fr/04-27077.htm> 5 October 2007.
Gad, A. (June 2006). “Legislative Brief 06-13: Human Microchip Implantation”,
Legislative Briefs from the Legislative Reference Bureau, <http://www.legis.state.
wi.us/lrb/pubs/Lb/06Lb13.pdf> 5 October 2007.
Guild, E. and Bigo, D. (2002). “The Schengen Border System and Enlargement”
in Malcolm Anderson and Joanna Apap (eds), Police and Justice Co-operation
and the New European Borders, European Monographs, pp. 121-138.
Hawthorne, M. (13 December 2001). “Refugees Meeting Hears Proposal To
Register Every Human In The World”, Sydney Morning Herald, <http://
www.smh.com.au/breaking/2001/12/14/FFX058CU6VC.html> Accessed
1 July 2003.
HDM. (May 2005a). “VeriChip Enhances Patient Wander App”,
Health Data Management, <http://healthdatamanagement.com/
HDMSearchResultsDetails.cfm?articleId=12361> Accessed 5 October 2007.
HDM (July 2005b). “VeriChip Buys Monitoring Tech Vendor”,
Health Data Management, <http://healthdatamanagement.com/
HDMSearchResultsDetails.cfm?articleId=12458> Accessed 5 October 2007.
HDM. (October 2005c). “Chips Keep Tabs on Babies, Moms”,
Health Data Management, <http://healthdatamanagement.com/
HDMSearchResultsDetails.cfm?articleId=15439> Accessed 5 October 2007.
HDM. (July 2007). “Baylor Uses RFID to Track Newborns”,
Health Data Management, <http://healthdatamanagement.com/
HDMSearchResultsDetails.cfm?articleId=15439> Accessed 5 October 2007.
Hengartner, U. and Steenkiste, P. (2005). “Access Control to People Location
Information”, ACM Transactions on Information and System Security, 8(4), pp.
424-456.
Honderich, T. (ed.) (1995a). “Names” in Oxford Companion to Philosophy, Oxford
University Press, Oxford, p. 602f.
Honderich, T. (ed.) (1995b). “Nietzsche, Friedrich” in Oxford Companion to
Philosophy, Oxford University Press, Oxford, p. 619-623.
Identech (2007). “RFID Tags Equipped with GPS”, Navigadget, <http://www.
navigadget.com/index.php/2007/06/27/rfid-tags-equipped-with-gps/>
Accessed 10 October 2007.
Page 22
The Second Workshop on the Social Implications of National Security
IEEE (March 2007), “Me & My RFIDs”, IEEE Spectrum, 4(3) 2007, pp. 14-25.
Jones, K.C. (4 September 2007). “California Passes Bill To Ban Forced RFID
Tagging”, InformationWeek, <http://www.informationweek.com/shared/
printableArticle.jhtml?articleID=201803861> Accessed 10 October 2007.
Lewan, T. (2007a) “Microchips Implanted in Humans: High-Tech Helpers, or Big
Brother’s Surveillance Tools?” The Associated Press, <http://abcnews.go.com/
print?id=3401306> Accessed 5 October 2007.
Lewan, T. (9 September 2007b). “Chip Implants Linked to Animal Tumors”,
Associated Press/ WashingtonPost.com, <http://www.washingtonpost.com/
wp-dyn/content/article/2007/09/09/AR2007090900467.html> Accessed 4
October 2007.
Meikle, J. (21 August 2007). “Pupils Face Tracking Bugs in School Blazers”, The
Guardian, <http://www.guardian.co.uk/uk_news/story/0,,2152979,00.
html> Accessed 24 August 2007.
Michael, K. (2007). “Selected Works of Dr. Katina Michael”, University of
Wollongong, <http://ro.uow.edu.au/kmichael/> Accessed 5 October 2007.
Michael, K. & Masters, A. (2006a). “Realised Applications of Positioning
Technologies in Defense Intelligence” in D. Essam & H. Abbass (eds),
Applications of Information Systems to Homeland Security and Defense, IDG Press,
ch. 7, pp. 164-192.
Michael, K. & Masters, A. (2006b). “The Advancement of Positioning
Technologies in Defence Intelligence” in D. Essam & H. Abbass (eds),
Applications of Information Systems to Homeland Security and Defense, IDG Press,
ch. 8, pp. 193-214.
Michael, K. & Michael, M.G. (2006). “Towards chipification: the multifunctional
body art of the net generation”, Cultural Attitudes Towards Technology and
Communication, (28th-1st July: Tartu, Estonia), pp. 622-641.
Michael, K. & Michael, M.G. (2007). “Homo Electricus and the Continued
Speciation of Humans”, in Marian Quigley (ed.), The Encyclopedia of
Information Ethics and Security, IGI Global, pp. 312-318.
Michael, M.G. (1998). “Ch IX: Imperial Cult” in The Number of the Beast, 666
(Revelation 13:16-18): Background, Sources, and Interpretation Unpublished
Honors Masters by Research Thesis at Macquarie University, pp. 176-196.
Michael, M.G. (2007). “Überveillance: 24/7 x 365- People Tracking and
Monitoring”, The 29th International Conference of Data Protection and Privacy
Commissioners: Privacy Horizons,Terra Incognita, 25-28 September, Montreal,
Canada, <http://www.privacyconference2007.gc.ca/Terra_Incognita_
program_E.html> Accessed 30 September 2007.
Morton, S. (2004). “Barcelona Clubbers Get Chipped”, BBC News, <http://
news.bbc.co.uk/2/hi/technology/3697940.stm> Accessed 11 October 2007.
Ratner, D & Ratner M.A. (2004). Nanotechnology and Homeland Security: New
Weapons for New Wars, Prentice Hall, New Jersey.
Page 23
The Second Workshop on the Social Implications of National Security
Reichman, J. H. (2006). “RFID Labeling in Humans”, American Medical
Association House of Delegates: Resolution: 6 (A-06), Reference Committee
on Amendments to Constitution and Bylaws <http://www.ama-assn.org/ama1/
pub/upload/mm/471/006a06.doc> Accessed 5 October 2007.
Reynolds, M. (20 July 2004). “Despite the Hype, Microchip Implants
Won’t Deliver Security”, Gartner Research, <http://www.gartner.com/
DisplayDocument?doc_cd=121944> Accessed 12 October 2007.
RFID. (4 June 2003). “Singapore Fights SARS with RFID”, RFID Journal,
<http://www.rfidjournal.com/article/articleprint/446/-1/1/> Accessed 10
August 2005.
RFID. (22 August 2006). “I Am Not A Number - Tracking Australian Prisoners
With Wearable RFID Tech”, RFID Gazette, <http://www.rfidgazette.
org/2006/08/i_am_not_a_numb.html> Accessed 11 October 2007.
Rodotà, S. and Capurro, R. (16 March 2005). “Ethical Aspects of ICT Implants
in the Human Body”, Opinion of the European Group on Ethics in Science and
New Technologies to the European Commission N° 20 Adopted on 16/03/2005,
<http://ec.europa.eu/european_group_ethics/docs/avis20_en.pdf>
Accessed 4 October 2007.
RNZI (25 July 2007). “Papua Legislative Council Deliberating Microchip
Regulation for People With HIV/AIDS”, Radio New Zealand International,
<http://www.rnzi.com/pages/news.php?op=read&id=33896> Accessed 12
October 2007.
Sade, R.M. (2007). “Radio Frequency ID Devices in Humans, Report of the
Council on Ethical and Judicial Affairs: CEJA Report 5-A-07” in R.E.
Quinn Reference Committee on Amendments to Constitution and Bylaws <http://
www.ama-assn.org/ama1/pub/upload/mm/369/ceja_5a07.pdf> Accessed 5
October 2007.
Schuerenberg, B.K. (February 2005a). “Implantable RFID Chip Takes
Root in CIO: Beta tester praises new mobile device, though some
experts see obstacles to widespread adoption”, Health Data Management,
<http://www.healthdatamanagement.com/HDMSearchResultsDetails.
cfm?articleId=12232> Accessed 5 October 2007.
Schuerenberg, B.K. (November 2005b). “Patients Let RFID Get Under Their
Skin”, Health Data Management, <http://healthdatamanagement.com/
HDMSearchResultsDetails.cfm?articleId=12601> Accessed 5 October 2007.
Somba, N.D. (24 July 2007). “Papua Considers ‘Chipping’ People with HIV/
AIDS”, The Jakarta Post, <http://www.thejakartapost.com/yesterdaydetail.
asp?fileid=20070724.G04> Accessed 12 October 2007.
Songini, M.L. (12 April 2007). “N.D. Bans Forced RFID Chipping, Governor
Wants a Balance between Technology, Privacy”, ComputerWorld, <http://
www.computerworld.com/action/article.do?command=viewArticleBasi
c&taxonomyId=15&articleId=9016385&intsrc=hm_topic> Accessed 10
Page 24
The Second Workshop on the Social Implications of National Security
October 2007.
Snow, D.M. (2005). National Security For A New Era: Globalization And Geopolitics,
Addison-Wesley.
Swedberg, C. (16 December 2005). “RFID Watches Over School Kids
in Japan”, RFID Journal, <http://www.rfidjournal.com/article/
articleview/2050/1/1/> Accessed 11 October 2007.
Swedberg, C. (25 May 2007). “Alzheimer’s Care Center to Carry Out
VeriChip Pilot”, RFID Journal, <http://www.rfidjournal.com/article/
articleview/3340/1/1/> Accessed 8 October 2007.
The Age (22 July 2007). “Chips: High Tech Aids or Tracking Tools?” Fairfax
Digital:The Age, <http://www.theage.com.au/news/Technology/MicrochipImplants-Raise-Privacy-Concern/2007/07/22/1184560127138.html>
Accessed 4 October 2007.
Verichip. (11 October 2007). “VeriChip Corporation Adds More Than 200
Hospitals at the American College of Emergency Physicians (ACEP)
Conference”, VeriChip News Release <http://www.verichipcorp.com/
news/1192106879> Accessed 11 October 2007.
Weissert, W. (14 July 2004). “Microchips implanted in Mexican officials”,
Associated Press, <http://www.msnbc.msn.com/id/5439055/> Accessed 11
October 2007.
Wilson, J. (2002). “Girl to Get Tracker Implant to Ease Parents’ Fears”, The
Guardian, <http://www.guardian.co.uk/Print/0,3858,4493297,00.html>
Accessed 15 October 2002.
Wisconsin Act (30 May 2006). “Wisconsin Act 482”, <http://www.legis.state.
wi.us/2005/data/acts/05Act482.pdf> Accessed 4 October 2007.
Woolfolk, J. (12 October 2007). “Back Off, Boss: Forcible RFID Implants
Outlawed in California”, Mercury News, <http://www.mercurynews.com/
portlet/article/html/fragments/print_article.jsp?articleId=7162880&siteId=
568> Accessed 13 October 2007.
Page 25
The Second Workshop on the Social Implications of National Security
Page 26
The Second Workshop on the Social Implications of National Security
3
What ‘überveillance’ is and
what to do about it
Roger Clarke
Xamax Consultancy Pty Ltd
Visiting Professor at UNSW, ANU and the University of Hong Kong
Abstract
Mere surveillance is passé. The idea was worth discussing as recently as a quarter-century
ago, but no longer. Technologists have delivered, and marketers have promoted (and
exaggerated), a host of additional capabilities.
A new term that might better describe the current circumstances is ‘überveillance’. This
paper provides both a theoretical and an empirical context within which to assess alternative
interpretations of that notion. It culminates in a set of Principles whereby the balance
that has been lost in recent years can be restored.
Keywords: surveillance, dataveillance, omni-surveillance, pan-electron, Counterveillance
Principles
Page 27
The Second Workshop on the Social Implications of National Security
1 Introduction
Corporate marketers have promoted a vast array of technologies as means to
monitor the behaviour of all manner of things. Parliaments have suspended their
disbelief and permitted government agencies to buy technologies and install systems.
Some corporations have imposed similar schemes on their employees, and on their
customers.
There is enormous diversity among the schemes that have been installed or
proposed. Indeed, there are many objectives, and considerable specialisation is
occurring, with the result that surveillance is going through divergence and even
splintering.
But there are also signs of convergence and coordination, and this creates both
some degree of promise and a vastly increased level of threat to society. The
workshop committee has selected ‘überveillance’ as the theme around which the
new direction can be examined.
This keynote commences by underlining key aspects of the surveillance notion.
It then briefly scans the range of surveillance schemes. The intention is to lay a
foundation for a typology of schemes, for comparison and contrast, and ultimately
for a critical appreciation of the benefits, disbenefits and risks that are inherent in
the process of inter-relating surveillance schemes.
Three alternative interpretations of the notion of ‘überveillance’ are then
discussed, translating ‘über’ variously as ‘all’, as ‘exaggerated’ and as ‘supra’. Finally,
themes arising from these discussions are developed into a small set of Principles
that must be applied in order to avoid the over-reaction to the threat of ‘terrorism’
causing our societies to eat themselves.
2 The fundamentals of ‘surveillance’
The number of different surveillance schemes is so great that a comprehensive
survey requires substantial resources. This section commences by re-visiting a
couple of key concepts, as a prelude to vignettes of a number of rather different
kinds of surveillance.
In my work in this area over the last 20 years, I’ve referred to surveillance as “the
systematic investigation or monitoring of the actions or communications of one
or more persons”. This requires some adjustment, in particular to take account of
the monitoring of spaces, and of objects other than humans. The primary concern
of this paper is the surveillance of people and their behaviour, whether directly or
indirectly.
The original forms of physical surveillance were typified by visual observation,
and symbolised by Bentham’s panopticon.
Watching and listening have come to be aided by equipment of various kinds
which offers enhancement of optical and aural signals, e.g. through telescopes and
directional microphones. This has enabled physical surveillance at distance.
Page 28
The Second Workshop on the Social Implications of National Security
A development in recent years has been the emergent phenomenon of what
might be called auto-physical surveillance. This is enabled by means of devices
that are attached to the person (whether loosely but reliably, as with a mobile
phone, or tightly as with an anklet, or even embedded). Rather than the modern
connotation of ‘automated’, the prefix ‘auto-’ is intended here to convey its original
meaning of ‘self-’.
Progressively, surveillance ceased to be constrained to the observation of
ephemera. The recording of signals meant that data trails could be built up, and
that retrospective analysis could be undertaken of those trails. As the number of
such trails increased, information originating from different times and places could
be interwoven, enabling additional inferences to be drawn.
The monitoring of data-flows, and the analysis of data-holdings, are economically
efficient because they can be automated. Furthermore, they are inherently
surreptitious, so the watched are far less aware of the watchers than is the case with
physical surveillance, even at distance. As a result, dataveillance (a convenient
contraction of ‘data surveillance’) has been used to augment, and increasingly to
substitute for, physical surveillance (Clarke 1988). The volume of monitoring
undertaken has also grown, because its inexpensiveness enables more of it to be
done within the same budget. The natural limitations on the number of men who
can be hired to wear trench-coats and watch doorways have been overcome.
As telecommunications improved, a further capability was added. The data
became available very shortly after it was collected, which meant that the trail was
warm and real-time tracking could be conducted. This increased the chances
of being able to intercept a target. It also created the possibility of predictive
tracking, by inferring a target’s intended destination.
As telecommunications developed, first telegraphic, then telephonic and later
facsimile transmissions became vehicles for electronic surveillance. In recent
decades, this has been extended to all forms of Internet communications, particularly
those that depend on wired connections, but also the various unwired channels.
Until recently, electronic communications supported the equivalent of speech.
Generally, the law permitted connections monitoring or traffic analysis (who is
talking with whom) although it subjected such activities to controls. Because of the
enormous intrusiveness and the risks involved in granting powers to law enforcement
agencies, much greater obstacles were placed in the way of communications
surveillance (who is saying what to whom).
Since the advent of the Web in the early-to-mid-1990s, however, electronic
communications also support the equivalents of buying books and going to the
library. The monitoring being conducted by employers and governments is now
far more intrusive, because what might be described as experience surveillance
provides access not merely to what a person is saying, but also to what they are
thinking about and researching.
Within each of the categories discussed above, it is important to distinguish two
Page 29
The Second Workshop on the Social Implications of National Security
sub-categories:
• personal surveillance. This is focussed on an identified person, generally for
a specific reason. It is undertaken because suspicion has arisen from some other
source
• mass surveillance. This is far less precisely targeted, and is imposed on groups
of people, often large groups. Generally, its purpose is to identify individuals who
belong to some particular class of interest to the surveillance organisation. In
short, it is a suspicion-generator, designed to produce candidates against whose
actions counter-measures or pre-counters can be implemented, or who can be
submitted to personal surveillance
Physical surveillance was applied to a location or place. Enhancements enabled
the watcher and their equipment to be separated by some distance from that place,
but the locus of the surveillance remained the same. Three different categories of
place have been discernible, which might be described as private, controlled and
public.
The notion of private places corresponds to locations in which an individual,
or two, or perhaps a few, could reasonably expect not to be subject to surveillance
by other parties. This has seemed to have a central core of the marital bedroom, a
more qualified zone comprising the rest of the home and even more so its visible
exterior (gardens and patios), and some further outposts such as the insides of toilet
cubicles.
Organisations that exercise substantial control over particular places have asserted
the right to conduct surveillance where, when and how they wish. The contestability
of claims in relation to controlled places increases from, for example, the rooms
from which nuclear power stations and air traffic are controlled, via the footpaths
outside government agencies and the faces presenting to ATMs, to railway stations
and cinema precincts.
One interpretation of public place is ‘everywhere that is neither of the other
two’. The numerous subscribers to the ‘original sin’ philosophy of life tend to
assert that all forms of surveillance of public places are legitimate, on the grounds
that privacy inherently doesn’t exist in public places, or no longer exists in public
places, or should not exist in public places.
Yet people have always had reasonable expectations of privacy in public places.
That applies all the more to people who are not well-known. More generally, people,
whether well-known or not, have a reasonable expectation of privacy when they
are behaving in a manner that is intended to be private, e.g. when in the company
of family, rather than projecting themselves (or their ‘public persona’) to some kind
of ‘public’. Because parliaments have been slow to protect such behaviours, the
courts are being forced to develop a tort through case law.
Electronic surveillance broke the nexus with a single location. Initially, it was
feasible to re-define it to a multi-location phenomenon, as in the monitoring of
Page 30
The Second Workshop on the Social Implications of National Security
both ends of a phone conversation. But first dataveillance and then new forms of
electronic surveillance forced further re-thinking. It is now necessary to define the
actions or communications that are subject to surveillance as occurring in ‘space’
rather than ‘place’, and to conceive of the space as being either physical or
figurative (as in abstractions such as ‘cyberspace’). With that change, the old concepts
of private, controlled and public places have given way to private, controlled and
public spaces.
The purposes and potential benefits of surveillance are discussed in section 2 of
Wigan & Clarke (2006). This paper focusses primarily on its negative impacts.
3 Mini-case studies in surveillance
As an intrinsic part of this presentation, a collection of vignettes was prepared.
These describe a wide array of instances of surveillance, with considerable differences
in purpose, style and intensity. Partly because of the length of the text and partly in
order to make them accessible independently of this paper, they have been presented
in an Appendix to this paper (see chapter 4).
4 The categorisation of surveillance
The diversity that is evident in that collection of vignettes suggests the need to be
clear about the dimensions across which applications vary. Drawing on the outline
of the surveillance concept in section 2 above, the following can be distinguished:
(1) Of What?
That which is subjected to surveillance may be a specified individual, specified
groups of individuals, specified objects, specified groups of objects, or a specified
space.
(2) For Whom?
The beneficiaries of surveillance may be the individual who is the subject of the
surveillance, an individual who has a direct interest in the subject of the surveillance,
or another party with an interest in the behaviour of the subject.
(3) By Whom?
The surveillance may be conducted by the individual who is the subject of the
surveillance, an individual who has a direct interest in the subject of the surveillance,
another party with an interest in the behaviour of the subject, or a third party that
is in some sense acting on behalf of one of the above.
(4) Why?
The primary purpose of the surveillance may be to assist with the health or
safety of the subject of surveillance, to detect or collect evidence of behaviour that
conforms or does not conform with some norm, or to encourage conformant
Page 31
The Second Workshop on the Social Implications of National Security
behaviour and/or deter non-conformant behaviour.
(5) How?
The means whereby the surveillance is conducted may be physical surveillance
(visual and aural), physical surveillance at distance, auto-surveillance, retrospective
analysis, dataveillance, real-time tracking, predictive tracking, traffic analysis,
communications surveillance or experience surveillance; and each of them may
be targeted personal surveillance or much broader mass surveillance.
(6) Where?
The locus of the surveillance may be defined in physical space, or in some virtual
space. A common form of virtual space is that enabled by electronic communication
networks, but another is the web of ideas inherent in published text, uttered words
and recorded behaviour.
(7) When?
The timeframe in which surveillance is conducted may be defined across a single
span of time, or recurrent spans (such as a particular span within each 24-hour cycle),
or scattered across time (e.g. triggered by particular conditions detected in published
text, uttered words and recorded behaviour), or continuous and unremitting.
The public and political acceptability, the legality, and the effectiveness of a
particular instance of surveillance differ greatly depending on the design choices
that it evidences. An approach to developing an ethical framework for surveillance
is in Michael, McNamee & Michael (2006).
5 What is überveillance?
The theme of the workshop originates in the work of the Editors, Michael
and Katina Michael, with the first published use in lecture notes (M.G. Michael
2006). The notion is emergent rather than established, and it continues to evolve.
A useful working definition that they offer is “an above and beyond omnipresent
24/7 surveillance where the explicit concerns for misinformation, misinterpretation,
and information manipulation, are ever more multiplied and where potentially the
technology is embedded into our body” (Michael & Michael 2006, p. 361)
In this section, this author approaches the idea afresh, and considers several
possible interpretations of the term, including, but not restricted to, the Michael &
Michael quotation above.
The word appears not to have existed until Michael & Michael coined it. Its
stem and suffix,‘-veillance’, are clearly co-opted from ‘surveillance’. Originally, this
derived from the French ‘surveiller’, whose contemporary senses include ‘to keep an
eye on’ (e.g. luggage), to supervise (e.g. people), to monitor (e.g. people, an object
or a space), and to invigilate (to watch candidates in an examination).
Judging by the entry in the Oxford English Dictionary, the word was coPage 32
The Second Workshop on the Social Implications of National Security
opted into English in 1799, originally in a report on the French Revolution. The
relationship was readily recognised with Bentham’s panopticon proposal, which
originated in 1787 but was current for 25 years. During the 200 years since then, the
English word ‘surveillance’ has come to be used primarily with sinister associations.
It has been subject to a number of adaptations and extensions, including this author’s
own neologism ‘dataveillance’, of 1988, which the Michaels explicitly identify as
one of the inspirations for their own work.
The prefix ‘über’ is drawn directly from German. Its several senses are investigated
in the following sub-sections.
5.1 Omni-Surveillance
An apocalyptic vision would see ‘überveillance’ as referring to surveillance that
applies across all space and all time (omni-present), and support some organisation
that is all-seeing and even all-knowing (omniscient), at least relative to some person
or object. The apocalyptic theme is a key thread in M.G. Michael’s work. See
Michael (1998; 2000a; 2000b; 2003).
An effective way to do this would be to embed the surveillance mechanism within
the person or thing to be monitored, and endow it with the capacity to monitor
itself continuously, and report to a monitoring authority, whether periodically, by
exception, or continuously. Applying the dictum that ‘information is power’, this
leads easily to a feeling of inevitability of the surveillance organisation becoming
an all-powerful (omnipotent) being.
On the one hand, this is the stuff of science fiction, and the dystopian genre
within sci-fi at that. On the other, most of the elements needed to realise the
nightmare already exist, including:
• chipswithsubstantialcapacitytogather,store,processandoutputdata;
• devicescontainingsuchchipsthatcanbereliablyassociatedwithindividuals
(as already occurs consensually with mobile phones, and non-consensually with
anklets and wristlets on various categories of the institutionalised, particularly
prisoners, parolees and even remandees);
• chips that can be (and, in small quantities already have been) embedded in
humans;
• convenient,readilyreplenishablepowersourcesforsuchchips(suchasthatalready
available when the carrier moves through a magnetic field to induce current in
an antenna); and
• wirelessnetworksthroughwhichdatacanbetransmitted.
Remarkable as it may seem, some categories of people are being enveigled,
coerced and even mandated to submit to such a ‘pan-electricon’, particularly as a
condition of employment, or in return for reduced constraints on the space within
which the individual is permitted to move. Aspects of the ‘digital persona’ in contexts
Page 33
The Second Workshop on the Social Implications of National Security
such as these are investigated in Clarke (2005b).
If the word ‘überveillance’ achieves broad currency, this may well be the primary
interpretation that our children and grandchildren have of it. It remains somewhat
speculative at this stage, however, and is sufficiently forbidding that many people
are likely to remain ‘in denial’. The following two alternative interpretations may
therefore be of greater immediate value in investigating the idea and what we need
to do about it right now.
5.2 Exaggerated Surveillance
One interpretation of ‘überveillance’ questions the extent to which surveillance
is undertaken. This can be along various dimensions, as discussed in section 4 above.
For example, surveillance may be excessive because it has too broad a scope, or is
instigated for reasons that are minor in comparison with its negative impacts. In
either case, its justification is exaggerated.
(1) The Costs and Disbenefits
Surveillance has costs and disbenefits, and its benefits need to be balanced against
them. The costs and disbenefits may be incurred by the organisation conducting
the surveillance, or by others, particularly the individuals subjected to it.
The term ‘costs’ is used here in the financial sense, and includes all forms of
expenditure, in particular on the conduct of the surveillance, on the infrastructure
to support it, and on the analysis of the resulting data stream(s). It encompasses
at least some of the costs of actions taken as a result of surveillance, in particular
those actions that transpire to have been unjustified because they arose from ‘false
positives’.
The notion ‘disbenefits’ is used to encompass non-financial impacts that are
negative, whether for the society, economy or polity as a whole, or only for some
individuals or groups. The enormous scope of disbenefits arising from surveillance
is exemplified by the list in Exhibit 1.
Page 34
The Second Workshop on the Social Implications of National Security
Exhibit 1: Real and Potential Dangers of Dataveillance
From Clarke (1988)
Dangers of Personal Dataveillance
wrong identiication
low quality data
acontextual use of data
low quality decisions
lack of subject knowledge of data lows
lack of subject consent to, data lows
blacklisting
denial of redemption
Dangers of Mass Dataveillance
•
To the Individual
arbitrariness
acontextual data merger
complexity and incomprehensibility of data
witch hunts
ex-ante discrimination and guilt prediction
selective advertising
inversion of the onus of proof
covert operations
unknown accusations and accusers
denial of due process
•
To Society
prevailing climate of suspicion
adversarial relationships
focus of law enforcement on easily detectable and provable
offences
inequitable application of the law
decreased respect for the law and law enforcers
reduction in the meaningfulness of individual actions
reduction in self-reliance and self-determination
stultiication of originality
increased tendency to opt out of the oficial level of society
weakening of society’s moral ibre and cohesion
destabilisation of the strategic balance of power
repressive potential for a totalitarian government
Page 35
The Second Workshop on the Social Implications of National Security
(2) Controls Over Excesses
A crucial question in any organic system is the extent to which natural controls
exist. If natural controls are in place and not seriously impeded, then the system
may be best left to find its own equilibrium. If, on the other hand, the controls are
retarded in a significant way, then some intervention may be needed, in order to
overcome the impediments, or to stimulate the control aspects. In some settings,
however, the system may be doomed to spiral out of control. In that case, the
architecture is in need of overhaul if the system is to survive.
To what extent is surveillance an organic system, and which of those archetypes
best describes it?
In Clarke (1995a), ‘intrinsic controls’ over the particular dataveillance technique
of data matching were examined. They were found to include:
• theexerciseofcountervailingpoliticalpowerbytheclassofdata
subjects affected by the process, by their representatives, by the mass
media, or by the general public. Given the imbalance of power
between organisations and individuals, it is not realistic to expect
this factor to be of any great significance except in particular
circumstances;
• the displeasure of some organisation, such as a competitor or
regulatory agency;
• self-restraintpractisedbytheagencyitself,inluencedbyprofessional
norms, or by an appreciation of the delicacy of public confidence in
its institutions and the resultant need to respect constitutional rights
and moral concerns; and
• generalblundering.
That paper concluded that “the intrinsic factor which might be expected to
exercise the most significant degree of control over computer matching is economics:
surely government agencies will not apply the technique in circumstances in which it
is not worthwhile. The primary means whereby the economic factor will influence
decision-making about computer matching programs is cost/benefit analysis”. The
various forms of cost/benefit analysis are described in Clarke & Stevens (1997) and
(Clarke 2007).
A mere decade later, that sentiment seems quaint. In the present decade,
government agencies have barely adopted so much as a pretence of conducting
cost/benefit analyses. They have become thoroughly politicised, and ‘business cases’
dominate. A ‘business case’ differs from a cost/benefit analysis in two important
ways. It is one-dimensional, because it adopts the view of the sponsor, rather than
reflecting the varying perspectives of multiple stakeholders. Secondly, it is essentially
designed as a justification of a policy position that has already been adopted, rather
than as an analytical tool.
In the surveillance arena, there has not only been little evidence of cost/benefit
Page 36
The Second Workshop on the Social Implications of National Security
analysis being applied, there has seldom even been a compelling business case. The
proponents of surveillance successfully avoid scrutiny of their proposals, especially
since the windfall of the terrorist strikes in New York and Washington DC in
2001, and what marketers refer to as ‘mid-life kickers’ in Bali in 2002, in Madrid
in 2004, and in London in 2005. Since 2001, surveillance has been implemented
as an imperative, as those worst forms of policy-formation – knee-jerk reaction,
bandwagon effect, and sacred cow.
The biometrics industry provides a valuable case study. Most biometrics
technologies cannot and do not deliver on their promises, partly because the
environments in which they are applied are complex and messy, and partly because
most biometrics technologies are technically flawed. It is therefore not in the interests
of the providers of technologies and services to provide truthful information or to
submit to evaluation.
Surely ‘the truth will out’, user organisations will discover that ‘the emperor has no
clothes’, and the mythologies of surveillance will become common knowledge?
Instead, an extraordinary phenomenon has emerged, that has not been evident
in other contexts – alliances of vendors and user organisations. The US national
security community has contrived the publication of tests and reports that have
been quite grossly twisted and biassed, in order to provide biometrics vendors with
breathing-space, and with credibility that their products do not warrant. The most
extreme instance is in the laughably inadequate technology falsely projected as
‘facial recognition’. The Face Recognition Vendor Test (FRVT) projects have been
breathtaking in their misrepresentation of reality. They were jointly sponsored by
a group including the Federal Bureau of Investigation (FBI), the National Institute
of Standards and Technology (NIST) and the Department of Homeland Security.
In Australia, the corruption has been mirrored in the Biometrics ‘Institute’. This
organisation has a grand-sounding name, but its function is to provide a forum for
the alignment of organisations whose interests, in an organic system, would be at
considerable variance from one another. Government agencies and suppliers have
conspired, and continue to conspire, to project biometrics technologies as things
that they are not: effective, reliable, and safe for human consumption.
Corporations, unlike governments and government agencies, are subject to the
constraints of return on investment (ROI). This somewhat tempers their enthusiasm
for monitoring. For these reasons, the financial sector has long resisted strong
authentication on its customers. It also appears that the full power of consumer
profiling and ‘customer relationship management’ technology may not yet have
been unleashed on Australian consumers.
But ROI has proven inadequate to ensure rational designs. The private
sector too makes decisions that are far from balanced, because knee-jerk and
bandwagon outweigh rationality. In addition, there has been increasing pressure
from Governments, using such ‘motherhood and apple pie’ sentiments as ‘moneylaundering’, ‘counter-terrorism’, ‘homeland’ and ‘critical infrastructure protection’.
Page 37
The Second Workshop on the Social Implications of National Security
The 2006-07 rounds of ‘Anti-Money-Laundering and Counter-Terrorism
Financing’ (AML-CTF) legislation represent one of the most extreme forms of
exaggeration to date, with business enterprises now obligatorily enlisted as spies
against their customers.
5.3 Master-Surveillance
Another possible interpretation of ‘überveillance’ derives from the use of ‘über’
to imply ‘meta’, ‘supra’ or ‘master’-surveillance.
This could involve the consolidation of multiple surveillance threads in order
to develop what would be envisaged by its proponents to be superior information.
This might be performed ad hoc, as occurs in ‘intelligence assessment’ agencies active
in foreign affairs and national security.
The challenges are enormous, however. In particular, the data-flows are typically
highly variable and highly unreliable. The bases on which they are conceived and
implemented vary greatly between the streams. There may be very considerable
differences between the aims of each individual operator and the would-be ‘master’.
The challenges of diversity in data sources, data meaning and data quality were
investigated in the context of data matching programs in Clarke (1995b).
In order to overcome the difficulties inherent in consolidating very different
streams of information, there could be endeavours to achieve coordination among
the various surveillance sources. An example of such an approach is the creation of
an organisation whose express purpose is to draw surveillance organisations closer
together. A prime example was the creation of the U.S. Department of Homeland
Security (which in the process changed the sense of ‘DHS’ from Human Services
to something differently protective and much more sinister).
An approach that might seem superior to both consolidation and coordination
is centralisation. This involves the conception of an architecture intended from
the outset to develop a set of feeds into a single ‘master’, with all of the subsidiary
surveillance processes serving the centrally-determined objectives. Stafford Beer
naively thought that a centrally-planned cyber-economy could be consistent with
an open society and a democratic polity. The experience of Beer’s Cybersyn project
(1970-73) could have delivered the coup de grace to such Promethean idealism if
Chile had not been seen to be acting against the interests of the American way of
profit. Its elected President was eliminated, and with him Beer’s experiment.
During the 1970s and 1980s, such ‘central planning’ approaches were derided.
To some extent this was due to their totalitarian nature, demanding as they do a
controlled and inherently static society. But the primary reason was that they had
been demonstrated not only behind the Iron Curtain, in Cuba and under East Asian
Communist regimes, but also in France, to lead to economic systems that were
ineffective, inefficient and in most cases downright stagnant.
Up to a point, systems generally exhibit efficiencies of scale, and efficiencies
of scope. Beyond that point, they become unwieldy, excessively complex, and
Page 38
The Second Workshop on the Social Implications of National Security
inherently unmanageable. Systems of the complexity of societies are well beyond the
flex-point. They accordingly exhibit substantial inefficiencies of scale and of scope.
General systems theory recognises that, for large-scale systems to have the flexibility
and adaptability that they need for survival, they need to comprise loosely coupled
elements, and to be subject to control through the interplay of those elements rather
than through any form of centrally-determined control.
6 What do we do about überveillance?
The picture painted in the preceding sections may seem bleak. Surveillance is
rampant. Human values have been trampled. Osama bin Laden and Al Qaeda,
or rather the effigies that have been made of them, have triumphed. The limited
and sporadic attacks in their names have struck at the moral weaknesses and
contradictions inherent in the ‘Western’,‘democratic’ world. That world has turned
inwards on itself. It is spiralling towards self-destruction through the denial of the
very freedoms on which it was supposed to be built. Our world needs an antidote
to ‘national security extremism’, and it needs it fast.
This section distills a few key messages about what we need to do in order
to ensure survival of society, the economy and the polity, in the face of rampant
‘control freaks’. It enunciates a small set of Principles that will contribute to the
restoration of Australian society by bringing the surveillance mania back under
control. The intention is to generate countervailing power against the extremism of
the national security agencies. In this context, a variant of the label ‘countervaillance
to ‘counterveillance’ is appropriate. Exhibit 2 lists the Principles, and the remainder
of the section provides brief descriptions of them.
Exhibit 2: Counterveillance Principles
1.
2.
3.
4.
5.
6.
7.
8.
Independent Evaluation of Technology
A Moratorium on Technology Deployments
Open Information Flows
Justiication for Proposed Measures
Consultation and Participation
Evaluation
Design Principles
1.
Balance
2.
Independent Controls
3.
Nymity and Multiple Identity
Rollback
The position adopted in developing these Principles is not itself extremist. It is
common ground across society that terrorists are killing people from time to time,
that there are (small numbers of) disaffected individuals who will be attracted to
violent ‘solutions’, that religious fundamentalism is a threat to open societies, that
Page 39
The Second Workshop on the Social Implications of National Security
countermeasures are needed, and that both general alertness and capable public
security institutions are needed.
Where this set of Principles might be seen by some to be radical is in the
following:
• itrecognisesthatterrorismisnotnewandnorisitunusual
• althoughthe‘powertoweightratio’ofasinglestrikehasincreased(because
fewer terrorists can deliver a bigger payload), it denies that this has particularly
significant implications for public policy
• itrefusestoacceptreactionaryextremismatfacevalue,andtoprovidenational
security and law enforcement interests with carte blanche to do what they say
needs to be done in order to counter the threats
• itdeniesthat‘secrecy’isanecessarypre-conditionof‘security’
• itrejectsthelegitimacyoftreatingwhatarereally‘publicsafety’issuesasthough
they were ‘national security’ matters
• itisdeeplyscepticalaboutcounter-terrorismdependingoneveryonehavingto
be limited to a single State-managed identity, because this helps not at all against
‘virgin terrorists’
(1) Independent Evaluation of Technology
Surveillance of the intensive kinds that are drastically altering our society are
heavily dependent on technologies. The assertions of technologists and marketers
must be viewed with scepticism, and subjected to testing. That testing must not
be warped, and must not be conducted by participants in the field of play (such
as the FBI, NSA, NIST, and, in Australia, the Defence Science & Technology
Organisation – DSTO). Normal science and technology must be resumed. Rather
than ‘Government policy’ driving and twisting outcomes, rational consideration of
technologies and their applications is essential.
(2) A Moratorium on Technology Deployments
Some years ago, I called for a moratorium on biometric implementations in
Australia (Clarke 2003). I did not do so idly. I argued that “[a] ban must be imposed
on the application of biometrics technologies until and unless a comprehensive and
legally enforced regulatory regime has been established”. My rationale was not
only that applications of biometrics had quite gross, negative impacts, but also that a
moratorium might well be the only means of saving an industry that has promised
much for years and delivered very little.
There are enormous impediments to the adoption of ‘advanced technologies’.
In the majority of cases, their dysfunctions are considerable, and the extent to which
they achieve their primary objectives is in serious doubt. The identification and
authentication schemes for the APEC meeting in Sydney were as much of a farce
Page 40
The Second Workshop on the Social Implications of National Security
as the traffic control system that let The Chasers’ convoy through beyond the point
of embarrassment.
(3) Open Information Flows
The antidote to inappropriate deployments of inadequate technologies is
openness. The public needs facts about the context in which surveillance schemes
are to be deployed. They need a statement of the scheme’s objectives. They need
to know sufficient about the design features that they can apply reasonable tests to
the scheme’s feasibility, and assess its effectiveness under varying circumstances. They
need the opportunity to apply systemic reasoning, in order to evaluate whether the
design features can give rise to the claimed benefits.
(4) Justification for Proposed Measures
No measure should not be implemented unless its negative impacts are
demonstrated to be outweighed by its benefits. It seems extraordinary that a case
has to be mounted in support of such a straightforward contention. Yet national
security and law enforcement agencies (NS&LEAs) have been permitted to make
untested assertions about both threats to public safety and the benefits of surveillance
measures in addressing those threats. The sacred cow of blind trust in NS&LEAs has
to be put to death. Those organisations must be required to present their arguments,
and defend them in public.
(5) Consultation and Participation
A further critical aspect of an open society is the ability of the public to participate
in the debate. This enables testing of the information and arguments. But it also
brings the many perspectives of a complex society to bear on the information and
the declared objectives.
(6) Evaluation
Another form of normal service that needs to be resumed is the application of
established techniques to the available information, in order to provide a basis for
comparison among financial costs and benefits, on the one hand, qualitative factors
on the second, and risks (and especially remote ones) on the third.
The technique of Privacy Impact Assessment (PIA) has been making headway
during the last few years, and has attracted support now from such inherently
conservative institutions as the Senate, the Privacy Commissioner, and in September
2007 the Australian Law Reform Commission (ALRC). An even broader notion
of social impact assessment is crucial to the survival of an open society.
(7) Design Principles
One of the key features of the vignettes was the existence of positive instances
of surveillance, both for individuals and society. Surveillance is not itself evil.
Page 41
The Second Workshop on the Social Implications of National Security
The problem has been the presumptiveness of its proponents, the lack of rational
evaluation, and the exaggerations and excesses that have been permitted.
Proponents of surveillance have Design Principles that guide the creation of
their systems. An alternative or complementary set of Design Principles is required,
which guides the conception of schemes that do not threaten free society from
within. Key examples includes the following:
• Balance. This must be achieved among the many competing values and
interests, rather than a small cluster of ‘security’ imperatives dominating, and
being protected by a veil of secrecy
• Independent Controls. These are essential in order to ensure that ‘national
security’ interests are not the means whereby ‘national security’ assertions are
validated
• Nymity and Multiple Identity. These must be recognised as natural human
needs, and as keys to the freedoms in free society, despite the inevitability that
they, like all freedoms, will be abused as well as used
Nymity encompasses both anonymity and pseudonymity, and is addressed in
depth in Clarke (1999a). Geniune anonymity precludes the link being discovered
between an identity and the entity or entities using it. It carries with it the risk of
non-accountability. With pseudonymity, the link can be made, but its effectiveness
depends on legal, organisational and technical protections, to ensure that the link
is not made unless pre-conditions are fulfilled.
(8) Rollback
Restoring sanity to the processes whereby schemes are evaluated and designed is
crucial, but far from sufficient. The depredations of the last 5 years are so great that
rollback of the great majority of anti-freedom provisions enacted by Parliaments
is necessary. The valuable Parliamentary Library catalogue of the actions of the
federal parliament is frightening for its sheer length, even without consideration
of its depth.
This is not to suggest that every provision of every amendment act must be
overturned. National security and law enforcement agencies were, as they claimed,
confronted by a variety of barriers that were accidental and inappropriate and needed
to be overcome. On the other hand, inadequately brisk processes for the issue of
warrants are not properly solved by creating extra-judicial warrants, but rather by
a faster, online judiciary. And although telephonic interception warrants based on
old, fixed-line numbering are inappropriate in the modern era of mobile phones,
the balanced solution is person-based interception warrants, not the removal of
controls.
7 Conclusions
A neologism can be a mere linguistic device intended to bring some intellectual
Page 42
The Second Workshop on the Social Implications of National Security
richness to a discussion. The English word ‘surveillance’ derives from the French
‘surveiller’, or ‘watch over’, which in turn derives from the French sur- and the
Latin vigilare. So ‘überveillance’ takes a somewhat ambiguous Romance stem and
imposes on it an abrupt and authoritarian Germanic prefix.
There are multiple flavours of ‘überveillance’, none of them comforting to
someone who lives in the real Australian world of moderate daily dangers from cancer,
heart conditions and road traffic, and of minuscule dangers from terrorism.
Unfortunately, as this paper has shown, all of the interpretations of ‘überveillance’
are descriptive of another reality, and one that has become rapidly more pervasive in
the few years since the turn of the present century. We are confronted by the twin
extremisms of religious fundamentalists in Muslim garb, on the one hand, and men
in short haircuts chanting the mantra ‘national security’, on the other.
We need to ensure that the national security fundamentalists, who have ruled our
lives for the last 5 years, are treated with the same seriousness as the terrorist threat
within Australia, and are encouraged to return to the professionalism of the 1980s
and 1990s, and respect for the free society that Australians believe they live in. This
country wants neither ‘unter-veillance’ nor ‘überveillance’. It wants balance.
Original sources re überveillance
Masters A. & Michael K. (2007) ‘Lend me your arms: the use and implications
of humancentric RFID’ Electronic Commerce Research and Applications
6, 1 (March 2007) 29-39
Michael K., Johnston K. & Michael M.G. (2007) ‘Consumer awareness in
australia on the prospect of humancentric rfid implants for personalized
applications’ Invited Industry Presentation, at the IEEE International
Conference on Mobile Business, at http://merc.mcmaster.ca/
mBusiness2007/
Michael K., McNamee A. & Michael M.G. (2006) ‘The emerging ethics of
humancentric GPS tracking and monitoring’ Proc. Int’l Conf. on Mobile
Business, 25th-27th July 2006, Copenhagen, Denmark, 34-44
Michael K., McNamee A., Michael M.G. & Tootell H. (2006) ‘Location-based
intelligence – modelling behaviour in humans using GPS’ Proc. Int’l
Symposium on Technology and Society, 8th-11th June 2006, New York City,
1-8
Michael K. & Masters A. (2006) ‘Realised applications of positioning
technologies in defense intelligence’ in H. Abbass & D. Essam (eds)
‘Applications of Information Systems to Homeland Security and Defense’
IDG Press, ch. 7, 167-195
Michael K. & Michael M.G. (2005) ‘Microchipping people: the rise of the
electrophorus’ Quadrant XLIX, 3 (March 2005) 22-33
Michael, K., Michael, M.G. (eds), (2006a), ‘The Social Implications of
Information Security Measures on Citizens and Business’, Wollongong:
Page 43
The Second Workshop on the Social Implications of National Security
University of Wollongong
Michael K. & Michael M.G. (2006b) ‘Towards chipification: the multifunctional
body art of the net generation’ Proc. Conf. Cultural Attitudes Towards
Technology and Communication, 28th June - 1st July 2006, Tartu, Estonia,
622-641
Michael M.G. (1998) ‘The Number of the Beast, 666 (Revelation 13:16-18).
An historical and theological investigation of Saint John’s conundrum’
Unpublished MA Honours Thesis, Macquarie University, NSW, Australia
Michael M.G. (2000a) ‘For it is the number of a man’ Bulletin of Biblical Studies
19 (January-June 2000) 79-89
Michael M.G. (2000b) ‘666 or 616 (Rev 13:18): Arguments for the authentic
reading of the Seer’s conundrum’ Bulletin of Biblical Studies 19 (JulyDecember 2000) 77-83
Michael M.G. (2003) ‘The Canonical Adventure of the Apocalypse of John in
the Early Church (A.D. 96 – A.D. 377)’ Unpublished PhD Thesis, Australian
Catholic University, 2003
Michael M.G. (2006) ‘Consequences of innovation’ Unpublished Lecture
Notes No. 13 for IACT405/905 – Information Technology and Innovation,
School of Information Technology and Computer Science, University of
Wollongong, Australia, 2006
Michael M.G. & Michael K. (2006) ‘National security: the social implications of
the politics of transparency’ Prometheus 24, 4 (December 2006) 359-363
Michael M.G. & Michael K. (2007) ‘Überveillance: 24/7 x 365 People Tracking
and Monitoring’ Proc. 29th International Conference of Data Protection
and Privacy Commissioner, at http://www.privacyconference2007.gc.ca/
Terra_Incognita_program_E.html
Michael K. & Michael M.G. (2008) ‘Innovative automatic identification
and location-based services: from bar codes to chip implants’ IGI Press,
Forthcoming, 350
Perusco L. & Michael K. (2006) ‘Control, trust, privacy and security: evaluating
location-based services’ IEEE Technology & Society Magazine 26, 1 (Spring
2007) 4-16
Perusco, L. & Michael, K. (2005) ‘Humancentric applications of precise locationbased services’, IEEE Conference on e-Business Engineering, (18-22nd
October 2005: Beijing, China), IEEE Computer Society, Washington, 409418
Perusco L., Michael K. & Michael M.G. (2006) ‘Location-based services and the
privacy-security dichotomy’ Proc. 3rd Int’l Conf. on Mobile Computing
and Ubiquitous Networking, 11-13th October 2006, London, England, 9198
Page 44
The Second Workshop on the Social Implications of National Security
The author’s papers on surveillance
This segment provides access to this author’s previous papers on surveillance,
indexed on his web-site.
Clarke R. (1988) ‘Information Technology and Dataveillance’ Commun. ACM
31,5 (May 1988) 498-512, and re-published in C. Dunlop and R. Kling
(Eds.), ‘Controversies in Computing’, Academic Press, 1991
Clarke R. (1994a) ‘The Digital Persona and its Application to Data Surveillance’
The Information Society 10,2 (June 1994)
Clarke R. (1994b) ‘Human Identification in Information Systems: Management
Challenges and Public Policy Issues’ Information Technology & People 7,4
(December 1994) 6-37
Clarke R. (1995a) ‘Computer Matching by Government Agencies: The
Failure of Cost/Benefit Analysis as a Control Mechanism’ Information
Infrastructure & Policy 4,1 (March 1995) 29-65
Clarke R. (1995b) ‘A Normative Regulatory Framework for Computer
Matching’ Journal of Computer & Information Law XIII,4 (Summer 1995)
585-633
Clarke R. (1997) ‘Chip-Based ID: Promise and Peril’ Invited Address to a
Workshop on ‘Identity cards, with or without microprocessors: Efficiency
versus confidentiality’, at the International Conference on Privacy, Montreal,
23-26 September 1997
Clarke R. (1999a) ‘Identified, Anonymous and Pseudonymous Transactions: The
Spectrum of Choice’ Proc. User Identification & Privacy Protection Conf.,
Stockholm, 14-15 June 1999
Clarke R. (1999b) ‘Person-Location and Person-Tracking: Technologies, Risks
and Policy Implications’ Proc. 21st International Conference on Privacy
and Personal Data Protection, pp.131-150, Hong Kong, September 1999.
Revised version in Information Technology & People 14, 2 (Summer 2001)
206-231
Clarke R. (2001) ‘While You Were Sleeping ... Surveillance Technologies
Arrived’ Australian Quarterly 73, 1 (January-February 2001)
Clarke R. (2005a) ‘Have We Learnt To Love Big Brother?’ Issues 72 (June 2005)
Clarke R. (2003) ‘Why Biometrics Must Be Banned’ Presentation at the
Cyberspace Law & Policy Centre Conference on ‘State Surveillance after
September 11’, Sydney, 8 September, Xamax Consultancy Pty Ltd, 2003
Clarke R. (2005b) ‘Human-Artefact Hybridisation and the Digital Persona’
Background Information for an Invited Presentation to the Ars Electronica
2005 Symposium on Hybrid - Living in Paradox, Linz, Austria, 2-3
September 2005
Clarke R. (2007) ‘Business Cases for Privacy-Enhancing Technologies’ Chapter
Page 45
The Second Workshop on the Social Implications of National Security
in Subramanian R. (Ed.) ‘Computer Security, Privacy and Politics: Current
Issues, Challenges and Solutions’ IDEA Group, 2007
Clarke R. & Stevens K. (1997) ‘Evaluation Or Justification? The Application Of
Cost/Benefit Analysis To Computer Matching Schemes’ Proc. Euro. Conf.
Infor. Syst. (ECIS’97), Cork, Ireland, 19-21 June 1997
Wigan M. & Clarke R. (2006) ‘Social Impacts of Transport Surveillance’ Proc.
RNSA Workshop on Social Implications of Information Security Measures
upon Citizens and Business, Uni. of Wollongong, 29 May 2006, in Michael
K. & Michael M.G. (Eds.) ‘The Social Implications of Information Security
Measures on Citizens and Business’ Research Network Secure Australia,
2006, Chapter 2, pp. 27-44. Revised version published as Wigan M. &
Clarke R. ‘Social Impacts of Transport Surveillance’ Prometheus 24, 4
(December 2006) 389-403
Page 46
The Second Workshop on the Social Implications of National Security
4
Appendix to what ‘überveillance’ is
and what to do about it:
Surveillance vignettes
Roger Clarke
Xamax Consultancy Pty Ltd
Visiting Professor at UNSW, ANU and the University of Hong Kong
Abstract
This document contains brief outlines of a range of diverse surveillance schemes. They
are drawn from a wide variety of sources and experience.
Page 47
The Second Workshop on the Social Implications of National Security
Baby-monitoring
In response to sudden infant death syndrome (SIDS), and to enable parents and
health carers to spend time away from the side of the cot, several technologies have
been developed or applied. One is the fairly crude mechanism of periodically or
continuously transmitting sound or pictures of the baby to a speaker or screen close
to the carer. Potentially more effective forms of surveillance include devices that
detect delay in breathing or heartbeat, or movement, particularly of the abdomen.
Acute health care
Automated monitoring is performed in many acute health care environments,
including ambulances, emergency wards and Intensive Care Units (ICU). The
monitoring focusses on the patient’s key physiological characteristics, such as the
cardio-vascular system and respiratory function.
Alerts are programmed to draw staff attention to parameters that have moved
outside pre-set limits. The limits are set variously by the machine manufacturer, the
hospital administration, and the particular nurse for the particular patient. There
are different intensities in the alert signals, so that the more urgent ones can stand
out. Individual devices generate different sounds depending on the level of the
alert and the make of the machine.
Examples of alerts for which different sounds may be generated include:
• heartmonitors,wheretheheart-beatistoofast,tooslow,orabsent–butoften
because the monitoring device has fallen off
• theintravenous(IV)machinehasrunoutofluid,thetubeiskinked,ithasan
air bubble, or the battery has run down
• theblood-pressurecuffdeliversameasurementthatistoohighortoolow,or
delivers an inconclusive result – or has fallen off
• theairmattresshasakinkintheline,orhasrunoutofbattery
• theblood-oxygen-deprivationmonitorregisterstoohigh,toolow,nobattery,a
poor signal – or no patient
There are so many sounds, which are unique to each environment depending
on machine makes and models, that even experienced nurses cannot recognise
them all.
The devices keep bleating for attention, and they are attended to when the
nurse needs them, or has a moment to address them. Any non-specialist visitors in
the vicinity (or, much worse, concerned relatives visiting their loved ones) find the
cacophony of alerts disturbing, and the apparent lack of attention to them even more
so. The noise often drives the health clinicians mad, but most are also very useful.
Some of the serious alerts (such as those for respiratory and cardiac arrest) have
been reproduced for other purposes (for example as ring tones on mobile phones),
Page 48
The Second Workshop on the Social Implications of National Security
and startle off-duty nurses when they are heard outside the health care context.
Staff movement monitoring
Some employers issue staff with tokens, emblazoned with the staff-member’s
name, photograph and perhaps other information. Such tokens commonly include
machine-readable storage (magnetic stripes, chips, or contactless / proximity chips),
which may contain the same data as is on the face of the card, but may also contain
additional data-items. Some employers impose tokens that are woven into the
uniforms that they provide to staff.
Staff may be under instructions to wear or carry their token, and they may
be required to present it at various control-points on the employer’s premises
or campuses. Alternatively, the monitoring may be active throughout an entire
controlled area, rather than only at control-points.
Carriage and presentation may be enforced by denying movement between
zones (e.g. because a door cannot be unlocked or a boom will not open) unless the
(or a) person presents (or is at least wearing or carrying) their own (or someone
else’s) token.
In addition to access control, some of these schemes provide current-location
information to a controller. This can be used for both service delivery (e.g. directing
an incoming phone-call to the nearest extension) and control applications. Schemes
that log transactions also support movement tracking, retrospective analysis of
movements, and potentially even real-time predictive capabilities relating to the
person’s likely destination.
Vehicle monitoring
A variety of organisations conduct surveillance of a variety of different kinds
of vehicles. For example, employers, road service organisations, third-party fleet
management companies, insurers, regulatory authorities, or law enforcement agencies
may monitor load-carrying vehicles, taxis and hire-cars, but also private vehicles.
Vehicle movements may be logged by having them automatically report when
they pass control-points (e.g. the entrances and exits of industrial or port complexes
and loading/unloading bays, but also convenient networks of locations such as traffic
lights). Alternatively, an on-board GPS device can compute the vehicle’s location,
enabling it to report its own position.
Data transfer can be done by active means (e.g. a transmitter on board initiating
a communication to some other device), or passive means (e.g. a transmitter on a
collecting device initiating a response from the monitored vehicle). In addition,
on-board devices may monitor and report the performance of the vehicle, its engine
and/or its load.
Among the characteristics that are measured may be apparent average speed over
a distance or a period of time, and aspects of driver performance, particular time
spent at, and not at, the wheel. (Excessive time at the wheel of a load-carrying
Page 49
The Second Workshop on the Social Implications of National Security
vehicle is a criminal offence, and excessive time not at the wheel may be against
the interests of the vehicle’s owner).
‘Speed cameras’
A speed detection device can trigger a camera to capture images of the
numberplates of passing vehicles. The registration-code can be extracted using
pattern-matching recognition in a manner similar to Optical Character Recognition
(OCR) for documents. A closely-related application uses a timing-based trigger to
capture photographs of cars that run red lights.
Such installations may be in a fixed place for an extended period of time; or
they can be mobile; and they may be declared or covert. The use of covert cameras
for detecting speeding infringements has been shown to be more effective than
declared cameras in securing generally lower traffic speeds. However, the use of
covert cameras, especially in what are apparently safe areas and locations, has the
effect of creating public cynicism about the motivation for, and the reasonableness
of, the surveillance.
Use of the photos, and of the data inferred from them (in particular vehicle
registration data, location and time), may be limited to a specific traffic law
enforcement purpose, or function creep may occur.
Automated number plate recognition (ANPR)
The technology used for speed cameras can be applied much more broadly, as
Automated Number Plate Recognition (ANPR). The data arising from ANPR can
be used to automatically generate charges for road-usage, and can be linked with
vehicle-registration databases to despatch notices of non-payment violations.
ANPR can also be used to compare passing registration-numbers against a
‘blacklist’. This could reflect, for example, cars that have been reported as being
stolen (and whose numbers have not yet been deleted from the database), or cars
that are subject to an alert because they are recorded as having been used in the past
by a person who is the subject of personal surveillance. A ‘hit’ on the blacklist may
be used merely to generate a record for future data-mining, or to trigger action by
law enforcement agencies, e.g. to intercept the vehicle on the basis of the suspicion
generated by the entry in the database.
An early form of ANPR has been used in N.S.W. for many years, to monitor
the time spent on the road and the average speed of heavy goods vehicles, and,
in combination with drivers’ log-books, driver work-hours. It has also been
surreptitiously applied to cars, without apparent legal authority and without public
disclosure, let alone debate.
ANPR is coming into general use in the U.K. for private cars. Its application
has been mooted by at least two State Governments in Australia, but without any
sign of an impact assessment being conducted at all, let alone independently from
the police force.
Page 50
The Second Workshop on the Social Implications of National Security
Denial of anonymity on toll-roads
Use of public thoroughfares has always been essentially anonymous. Even on
toll-roads, cash payment was available. Electronic payment was then added as an
option. There are several ways in which anonymous electronic payment can be
delivered, but most applications are either directly identified, or effectively identified
because they involve credit-cards or debit-cards.
In recent years, some toll-roads have been permitted to rely on electronic payment
mechanisms alone, and to remove all cash payment booths without providing an
effective anonymous alternative. Melbourne CityLink appears to have been the
first major thoroughfare in the world to deny anonymous travel. Sydney’s M7 has
been permitted to adopt the same approach. Neither company’s web-site even
addresses the question of anonymous payment.
The Privacy Commissioner has failed in her responsibilities under the Privacy
Act s. 27 (1)(a)-(e) to ensure that breaches of the law, in this case of NPP 8, are
avoided in the first place, or at least acted upon once they have occurred.
CCTV on railway stations, and everywhere else
There are occasional instances of violence on railways stations. Railway
authorities have installed successive rounds of more equipment, and nominally more
sophisticated equipment. Much the same has happened in shopping malls, cinema
precincts and city streets more generally.
There appear to be very few occasions on which a criminal is apprehended as a
result of the surveillance, or in which images from CCTV are instrumental in ‘solving’
a crime or achieving a conviction. People intent on committing a crime take steps to
avoid being recognised, and even where the perpetrator takes no such steps the quality
of images that is practicably achievable is limited. The primary functions of CCTV in
relation to crimes that have already occurred appear to be to provide media interest,
and to convey the impression that law enforcement agencies are ‘on the job’.
Some deterrent effects do appear to exist, but only in respect of the space that is
known to be subject to surveillance. The undesired behaviour appears to be largely
displaced to unmonitored locations. In addition, ‘crimes of passion’ are largely
unaffected. Even the claims of deterrence within the monitored area are in many
cases unjustified: “[o]ut of the 13 systems evaluated, 6 showed a relatively substantial
reduction in crime in the target area compared with the control area, but only 2
showed a statistically significant reduction relative to the control, and in 1 of these
cases the change could be explained by the presence of confounding variables” (Gill
& Spriggs 2005).1 So in a study commissioned by one of the primary proponents,
only 1 of 13 showed a statistically significant reduction.
1
Gill M. & Spriggs A. (2005) ‘Assessing the impact of CCTV’ Home Office Research Study 292, Home
Office Research, Development and Statistics Directorate, U.K., February 2005
Page 51
The Second Workshop on the Social Implications of National Security
Goods monitoring
RFID tags can be used in supply chains from the manufacturer, via the transporter
and wholesaler, to the retail oulet. This can provide benefits in stock control, for
example where the goods are highly valuable, or where recalls may arise.
The RFID-tags may be left on the goods beyond the cash-register, in order
to achieve a link between a category of product, or even a specific instance of a
product, and the purchaser. This can be done openly or surreptitiously. And it can
be done consensually, or pseudo-consent can be gained through coercion, or it can
be imposed by the supplier, or it can be mandated by law.
The data arising from this form of surveillance can be used for a variety of
purposes, such as after-sales service, consumer profile construction, consumer
marketing, consumer tracking, and in the case of goods carried by the consumer
(such as clothing) consumer association with a brand or style.
Goods monitoring is also applicable to dangerous materials, such as fissile
material, explosives, materials that can be used to manufacture explosives, highly
flammable materials (such as avgas), and to goods controlled for other reasons,
such as pharmaceuticals particularly opium and coca derivatives. It is challenging
to monitor bulk materials by means of RFID tags; but they are readily applied to
storage facilities and containers.
Freight interchange-point monitoring
Locations in which goods are loaded, unloaded, and switched from one mode
to another, may be subject to surveillance. This is particularly the case with loads
that are intrinsically dangerous, or of high-value.
Such monitoring can assist in managing risks such as theft (of the load), pilferage
(of some of the load), the introduction of additional materials into a load, tampering
with the load, sabotage of the load, and insertion of an unauthorised load.
In association with this form of monitoring, the staff who are involved may be
subject to various forms of indignity, including video-surveillance and recording
while on the job, searches on completion of a shift, and ‘positive vetting’ by a
government agency or private investigator as a condition of employment.
Financial transaction tracking
In the late 1980s, the Australian Government copied a US initiative and created
what is now known as Austrac, to gather financial transaction data from financial
institutions. The scheme was supposed to be a weapon against the drugs trade. Its
justification has drifted with the fashions of the times, via money-laundering by
organised crime, to the financing of terrorism.
There is very little evidence that it has ever delivered any benefits. But, rather
than curtailing its activities, the Government and Parliament have submitted to the
blandishments of law enforcement agencies, and have successively extended the
Page 52
The Second Workshop on the Social Implications of National Security
scheme’s scope.
The most recent iterations have been simply scandalous, and completely beyond
the boundaries of what a free society should be permitting. Under the 2006 ‘AntiMoney-Laundering and Counter-Terrorism Financing’ Act (AML-CTF), financial
institutions are now required to actively intrude into their customers’ privacy in order
to comply with ‘Know Your Customer’ (KYC) provisions, for reasons unrelated to
banking; and to be actively suspicious about their customers, for reasons unrelated
to the business relationship.
Yet worse, amendments introduced in 2007 propose to extend this to a range of
small businesses, including real estate agents, financial planners, and jewellers. Business
enterprises, large, and now small, are being forcibly enlisted into the business of
spying on their customers. This is a pattern associated until now only with repressive
regimes such as East Germany under the Stasi, and the People’s Republic of China.
It is extraordinary that Parliament could permit such a breakdown of the boundaries
between the public and private sectors, and grant such extraordinary power to the
national security and law enforcement apparatus.
Consolidation of agencies and databases
Meanwhile the mainstream mandarins have mounted a sustained campaign over
more than 20 years, in an endeavour to develop a centralised scheme for the storage
of personal data.
The centrepiece of the Australia Card proposal was a new database that the Health
Insurance Commission wanted to be the hub of the centralised databank. When that
was rebuffed, senior executives of the then Department of Social Security grasped
their opportunity. They leveraged off DSS’s substantial database and processing
capabilities to morph it into Centrelink – a central government agency through
which all of the c. 100 benefits paid by a score of agencies are funnelled. The
organisation thereby became the hub database for the 25-35% of the Australian
population who are recipients of some kind of benefit.
The next step in the process was the formation of a mega-ministry, currently
called Human Services. Its purpose was to link Centrelink with the old Health
Insurance Commission (now re-badged as Medicare). This, if it is allowed to be
successful, would pool the resources of the two. Medicare covers virtually 100% of
the population, because it is (or its core business is) the nationalised insurer.
Meanwhile, the ‘Medicare’ tag is being used in an attempt to broaden the agency’s
scope from health insurance to health data administration. The HealthConnect
scheme adopted a centrist philosophy, but failed. The current NEHTA scheme is
also being drifted from its initial federation and ‘inter-operability’ approach back
towards the simplistic centrism that seems to be all that the mandarins are capable
of understanding.
A further leg of the centralist agenda is the play by the Australian Bureau of
Statistics (ABS) to become the national databank consolidator. In 2006, ABS
Page 53
The Second Workshop on the Social Implications of National Security
corrupted the Census by keeping in an identified form data relating to 1 million
Australians. The ABS intends firstly linking all future returns into that pool of
data, and secondly drawing data from the administrative collections of government
agencies. The breach of trust with the Australian public will render the census
inoperable within a few years. But this is of no consequence to the mandarins,
because by then the agency’s philosophy will have been switched from a trustworthy
collector of original and unidentified data to a backroom consolidator of data from
other databases.
The limited privacy law that was created in the late 1980s has already been
undermined to the extent that the emergent consolidated databases are available
to any agency that wants them. In any case, national security and law enforcement
agencies are above the law in multiple senses, being exempt from privacy laws,
being not subject to sanctions when they breach such limited constraints as do
exist, and having been granted in recent legislation specific immunity for particular
breaches.
National identification schemes
The tracking of financial transactions and the consolidation of personal data
from multiple sources is only effective if individuals are constrained to a single
general-purpose identity.
The first serious attempt at this was Australia Card Mark I (1985-87). It failed,
because a very large proportion of the public emphatically opposed it once it
became clear what it was.
In the ensuing years, the pre-existing Tax File Number (TFN) was expanded in
scope. Successive Ministers and Prime Ministers breached their undertakings, and
the scope was extended well beyond the boundaries that had been agreed at the
end of the Australia Card debacle.
In the years following that, the Centrelink Access Number (CAN) was developed
as an identifier that enables the inter-linking of data from multiple agencies involved
in benefits payments.
Several attempts have been made to coordinate the driver’s licence numbers
issued by the States and Territories into a reliable national scheme, but this usually
founders on inter-jurisdictional jealousies.
The natural next step is the ‘Access Card’, better understood as Australia Card
Mark II. This is at heart a hub-database and a general-purpose identifier. (The
card is, as always, a minor part of the overall scheme). The foundation element
of the scheme would be registration interviews in which each individual would
be effectively challenged to claim an existing identity recognised in government
databases. To meet that challenge, every individual would have to respond to demands
for documents, would be restricted to the use of just one identity approved by the
government (possibly even a name that is dictated by the government), and would
be required to use that single identity across all agencies. Services would become
Page 54
The Second Workshop on the Social Implications of National Security
dependent on the acquisition, carriage and presentation of the card.
The Australian public, once it appreciates what the ‘Access Card’ actually is, will
reject it as emphatically as they did its predecessor.
Monitoring of human-attached chips
The miniaturisation of computers and storage has long since reached the point
that small but quite powerful chips can be fitted into various carriers. The plasticcard-with-chip (often referred to as a ‘smart card’) has made very slow progress since
its invention in 1974 and its initial deployments in the late 1980s. But suppliers are
currently trying again, and this time they are attracting a little more interest from
the major players: financial institutions and government agencies.
In addition to plastic cards, other carriers are possible. The chips used in
‘contactless cards’ are also used in ‘RFID tags’, which are appropriate for goods, and
have been woven into clothing. A closely-related technology referred to as Near
Field Communication (NFC) is being built into mobile phones.
This kind of chip has an antenna in which current can be induced by movement
through a magnetic field, enabling transmission of a small amount of data, including
the chip’s unique identifier. Often the identifier of the chip, when combined with the
location of the device that picked up the signal, is all that needs to be collected.
Various categories of livestock in the EU and the USA have been subject to
imposed identification requirements from the early 1990s onwards. In Australia, a
National Livestock Identification System (NLIS) exists. Breeding stock in particular
have been commonly identified using tail-tags or ear-tags.
Humans have been subjected to the same technology as animals. The same kinds
of chips have been installed in anklets and wristlets. These have potential application
for people suffering senile dementia, and perhaps patients during pre-operative,
operative and post-operative phases of their treatment. They have been imposed
on several other categories of institutionalised people, in particular prisoners, and
prisoners on parole. In the US, it appears that it is even being used for people who
are on remand, as a substitute for bail or a supplement to it.
The actual use of the chips is varied. For a person in a relatively open senile
dementia ward, for example, they could be used to raise alerts if the person approaches
a perimeter, or has been immobile for a long period in an unusual location (e.g.
neither their bed nor a sitting-room).
For prisoners, parolees and (in the US) people on remand, the intensity of the
surveillance can range from occasional automated ‘reporting in’, via obligatory
intentional reporting in by placing the device close to a fixed reader, to detection
at the perimeter of areas of permitted movement.
Reports have suggested that, in the USA, in excess of 100,000 parolees and the
remandees are wearing them, so the volume of data generated is vast. From the
viewpoint of the person forced to submit to them, the intrusions can vary from mild
to excruciating. A recent report on a ‘celebrity’ remandee (Lisa Nowak, a sometime
Page 55
The Second Workshop on the Social Implications of National Security
NASA pilot), showed how utterly degrading the process can be.
Monitoring of human-embedded chips
The kinds of chips in contactless chip-cards, RFID tags, and wristlets and anklets,
have also been implanted directly into animals. A primary application has been
for pet dogs and cats, to enable the return of lost animals to their owners. The
conventional location for implantation has been the neck. One such service goes
under the disarming brandname of Life Chip. In the livestock arena, moves are
under way to migrate the chips from external tags to embedded ones.
Consensual implantation of chips in humans appears to have begun with a selfpublicist academic who used it to open doors (in Reading UK). That was followed
by fashion-driven implantation for access to a night-club (in Madrid).
Staff in a few companies (in the USA) and a government agency (in Mexico)
have been enveigled into agreeing to the implantation of ‘contactless chips’ into
their bodies.
Non-consensual applications have been touted in institutions of various kinds.
In addition to prisoners, an often-mentioned category is senile dementia patients.
It has been promoted as a means of patient management in hospitals.
The monitoring patterns would appear to be comparable to those for HumanAttached Chips, with the primary differences being the ‘convenience’ and nonvisibility, the permanency, and the difficulty of removing it or suppressing its
behaviour. These work variously to advantage (in some circumstances to some
extent of the implantee, but mainly of the person doing the monitoring) and to
disadvantage (almost entirely of the implantee, particularly in terms of the increased
servility it entails).
Continuous monitoring of chips
The above discussions of human-attached and human-embedded chips assumed
the monitoring activities to be sporadic or periodic, episodic and in any case
occurring only within a limited span of time. It need not be so.
The ACT Government has stated its intention that the Territory’s new prison,
currently under construction, will use RFID tags to track prisoners. The scheme
appears to involve permanent monitoring of all inmates, throughout the complex,
every 2 seconds. It further appears that data is to be logged. It is therefore a
means firstly of remote, automated power over prisoners, and secondly of enabling
retrospective analysis and investigation.
Such effectively continuous and permanent surveillance is far less human even
than the (often seriously unpleasant) relationships between prisoners and warders.
It represents comprehensive denial of freedom, and comprehensive ceding of power
to the surveillance organisation.
Permanent surveillance of prisoners was rejected in the late eighteenth century,
in part because it was regarded as inhumane. At that time, the means was visual, in
Page 56
The Second Workshop on the Social Implications of National Security
the form of Bentham’s ‘panopticon’. The current proposal represents an even more
insidious form of observation, because it is unseen, unrelenting and not equilibrated
by any human element.
Such blanket electronic surveillance is unprecedented in Australia. This is a
form of human degradation, rather than part of a plan to prepare prisoners for a
positive return to life in the community. It would undermine the rehabilitation of
offenders – even though the facility has been designed to house many who are due
to be released back into the community in the near future. That in turns threatens
public safety.
Further, the imposition of such a gross surveillance mechanism would set a
precedent for the treatment of some people like cattle, pet dogs or pallets full of
goods for sale, in, of all jurisdictions, the first in Australia to implement a Human
Rights instrument.
Biometrics and foreigners
Biometrics, or measurements of some aspect of the human person or their
behaviour, brings with it a vast array of intrusions into civil rights and privacy.
The Australian Parliament has legislated to impose biometric requirements on
refugees, on applicants for visas, and on people infringing national boundaries (mainly
fishermen). These powers have been subject to little or no consultative processes.
Aliens have almost no protections under Australian law, and refugees in particular
are in a desperate state, and will concur with anything that a potential host-nation
demands of them.
Biometrics and Australians
The collection of biometrics is an invasion of the physical person, acquiring
something that is ‘of ’ them, and in many cases imposing on a person’s movements
in such ways as demanding placement of the hand, thumb or eye in a zone dictated
by an authority.
Biometrics schemes are technically very challenging, because it is very difficult
to capture measurements reliably. Some biometrics may embody personal data, at
least in the case of DNA. Biometrics create serious security problems, because the
characteristics that are measured are not something that can be kept a secret. They
can be captured surreptitiously and in some cases without the person being present
(e.g. latent fingerprints, and body tissue and fluids).
A person’s physical characteristics are unchangeable. This leads to seriously
problematical risks such as ‘entity fraud’ (masquerade by someone using an artefact
designed to replicate a person’s biometric), the planting of evidence, and even the
prospect of outright ‘entity theft’. Recent concerns about ‘identity fraud’ and
‘identity theft’ pale to very little in comparison with such prospects.
Despite these enormous concerns, a number of applications of biometrics have
emerged, including workplace bundying-on/off, building access control, electronic
Page 57
The Second Workshop on the Social Implications of National Security
access control (for logging on and off computer systems), device (PC and phone)
locking/unlocking, and prison-visitors.
In the area of DNA, voluntary provision lasted a mere decade. The State has
begun giving itself enormous powers to gather DNA, initially from long-term
prisoners, then from prisoners, and most recently from arrestees. Protections
that had been developed over many decades in relation to fingerprints have been
ignored. The slippery slope from freedom to State control has been measured in
a few short years.
International travel
Before the early 1920s, documents such as letter from a patron were useful in
crossing national borders, but not necessary. The international passport system was
established in a climate of mass movements of displaced persons following World
War II. It became increasingly common for governments to demand documents
that evidenced a person’s nationality. Passports have since been converted into a
near-universal requirement for international travel.
Government agencies sustained the ‘managed hysteria’ opportunity presented by
the post-September 2001 terrorism threat in order to arrange parliamentary approval
for a raft of changes to the Australian passport scheme. These swept away decades
of case law, reduced the rights of citizens in relation to passports, and established a
new form of passport that embodies various technologies.
The new document includes a contactless chip, which contains at least the same
personal data as the printing on the document and the previous magnetic-stripe,
but in a form that is machine-readable provided that the reader has access to a
cryptographic key. There remain doubts about its security.
The legislation granted freedom to the Passports Office to implement biometrics, in
whatever manner it sees fit, subject only to convincing their own Minister of the day.
This was done in such a manner as to avoid even mentioning the word or concept of
biometrics. This represents an extraordinary delegation of power to public servants.
At this stage, the agency has implemented only a low-integrity scheme based on
so-called ‘facial recognition’ technology. The very probable failure of the scheme will
be available as an excuse to implement successive biometric schemes, progressively
creating a government-controlled pool of biometrics of Australians, available for
sharing with friendly governments and other ‘strategic partners’.
The biometric passport, coupled with the reduced rights, represent a leap in
the power of the State over individuals. The passport has been transformed into
a general identity document, with apparently enhanced credibility through the
inclusion of a biometric element. This creates the risks of wider permeation of
biometric identifiers, and of function creep towards use of passports in circumstances
other than at national borders. The ability of the agency to achieve the wide
and uncontrolled powers that it has, without so much as the pretence of public
consultation, augurs very ill for the survival of freedom of anonymous movement
Page 58
The Second Workshop on the Social Implications of National Security
within the country’s borders.
Domestic travel
In general, identification has not been required in order to travel within free
countries in the past. Other than during World War II, public areas have almost
never been blocked to public access, although exceptions have arisen, such as the
occasional visits of security-hypersensitive US Presidents, that result in ‘lock down’
of segments of major cities and of major arteries in order to give free passage to
privileged ‘motor-cades’.
In the air travel industry, the practice grew up during the second half of the 20th
century of requiring that tickets carry the identity of the person they were purchased
for. The reason for this had nothing to do with security. It was an endeavour to
avoid the emergence of a secondary market in tickets, and hence ensure that all of
the revenue that could be extracted from air travellers went to the airline.
In recent decades, national security and law enforcement agencies have leveraged
off the identification carried on air-tickets for commercial reasons, and sought to
impose a requirement for air-travellers to identify themselves. The US in particular
has created specific barriers not only against anonymous domestic air-travel, but
also against travel by individuals who appear to use the same name as a person of
interest (the so-called ‘no fly’ lists). This has led to quite ridiculous false positives,
including Yusuf Islam (once known as Cat Stevens), and US Senator Ted Kennedy.
The ‘no fly’ list has had many failures, yet very little success.
Anonymous travel has always been a feature of road travel, but this has been
seriously compromised by toll-roads that demand identified forms of payment. The
first was Melbourne CityLink, but three segments in Sydney have also recently
become identified-payment-only roads. The problem is compounded by the
‘public-private partnership’ nature of these ‘public infrastructure’ operations. This
seriously compromises data protections, because each has access to data properly
available only to the other, and the schemes impose criminal sanctions in respect
of civil matters.
There has also been plenty of scope for anonymity with public transport
ticketing, compromised only in such cases as long-term season tickets, typically
for a year, and in some cases for heavily-discounted tickets, particularly for people
with disabilities. Schemes that are currently being trialled (mostly unsuccessfully)
in N.S.W. and Victoria appear to deny a practicable anonymous option, and perhaps
any anonymous option at all.
These together conspire to create a context in which individuals can be tracked
and located through domestic transport infrastructure. In short, constraints are
being enabled that were hitherto only implemented in seriously un-free countries
like apartheid-era South Africa and the Soviet Union.
It is reasonable to expect that ‘control orders’, having survived the test of
constitutionality, may be a testing-ground for extra-judicial constraints on travel.
Page 59
The Second Workshop on the Social Implications of National Security
Service denial
Many kinds of services involve positive discrimination, in that they are only
available to particular individuals, or individuals who satisfy particular eligibility
criteria. Typical of these are seniors’ discounts and disabled parking.
One form that has already been implemented on occasions is entrance
monitoring. For example, some individuals may be denied access to sporting or
entertainment venues, particularly fans / patrons who have previously exhibited
undesirable behaviour at that or a similar venue. It has been claimed that casinos
use so-called ‘facial recognition’ technology to detect problem gamblers banned
from the premises (including both those who are problems for themselves or their
families because they are compulsive, and those who are problems for the casino
because they are effective).
Mechanisms already exist whereby a great many services could be denied to
specific individuals. International travel is tightly regulated, and various categories
of people are denied access to it (e.g. the stateless, and those whose country refuses
to issue with a passport or ‘exit visa’, or whose passport has been withdrawn or
surrendered). In the USA, domestic air travel is denied to many people who either
refuse to provide evidence of identity or whose names are the same as names on
the ‘no-fly’ list. The increasing preclusion of anonymous travel on Australian roads
and public transport systems creates a vast array of possibilities for service denial.
So do the tight identification requirements in the financial services sector.
An Australian Government initiative in 2007 changed welfare distribution
mechanisms for aboriginals in the Northern Territory to limit the use of a substantial
proportion of the payments to specific categories of consumer items. It would have
been unreasonable to expect that the scope of negative discrimination and service
denial would be restricted to aboriginals. Any form of welfare payment may become
subject to diktat of such kinds. A Parliamentary Committee Recommendation
emerged within weeks of the N.T. legislation passing, proposing similar measures
for benefits-recipients with drug habits.
Many other possibilities exist. For example, security clearances, which in a few
short years have exploded from a narrow category of occupations to a vast array of
paid and even unpaid positions, can readily be used as the means for denying access
to locations and services.
Identity denial
A further step available to a powerful State is to deny a person legitimate existence.
The notion was pioneered by John Brunner’s ‘The Shockwave Rider’ in 1975, and
popularised in a film in the 1990s, ‘The Net’. It has physical parallels in refugees
without documentation stranded in airports, and in the Pacific Island ‘solution’ for
‘boat people’.
Page 60
The Second Workshop on the Social Implications of National Security
5
Owning identity- one or many- do we
have a choice?
Marcus Wigan
Oxford Systematics
Professorial Fellow, University of Melbourne
Abstract
Identity is the key to linking records and multiple identities are the key to maintaining
social functioning with appropriate anonymity, while retaining accountability. This paper
addresses these factors and adds the issue of ownership of one’s own ‘identity’. Collapsing
what are currently entirely legal multiple identities into a single identity through direct
or indirect digital means has implications for dataveillance and surveillance. The lack of
transparency in most such emergent developments amplifies an increasing asymmetry in
information between government and major organisations - and citizens, the subject of
this effect.
Keywords: identity, ownership, surveillance
Page 61
The Second Workshop on the Social Implications of National Security
1 Introduction
The rapid growth of databases, biometrics and RFID and other identity related
technologies are approaching a critical mass as a potential means of controlling the
population. The critical aspects of these diverse technical advances are the links
between identity and existing and accellerating intensification of dataveillance
capacities.Taking one example: DNA databases are perhaps the most salient, but their
comprehensive application is still to materialise in terms of a critical contribution
on a large scale. The legal infrastructure to expand them more rapidly is already
within the capacities enabled by recent legislation, but the cost and complication
(and indeed vulnerabilities) in building such databases mean that at present we can
consider them as simply fresh opportunities for function creep. Salience, DNA might
have, but its high profile potential is dwarfed by the already present risks inherent
in the many other cross-linkages now being enabled directly. These links may be
direct (via formal data matching legislation) or indirect by rapidly expanded powers
ranging from authority to secretly monitor parties on a prospective (trawling) basis
creating assemblies of data from many sources. The linkages enabled by a “unique
identity’ are central to both direct and indirect means of data and physical surveillance.
Identity is now commonly publicly discussed and treated in legislation as if it were
a unique item. This supposition has many ramifications and impacts. One might
surmise that these were emergent – or intended: in either case the social impact is
not widely appreciated.
2 What is identity?
This is a basic question, and is assumed to be obvious.The classic Compact Oxford
English Dictionary (OED) (1984, p. 1368) definition is, after discussing sameness,
likeness and oneness:
1. The quality or condition of being the same in substance, composition, nature,
properties, or in particular qualities under consideration: absolute or essential
sameness; oneness
2. The sameness of a person of thing at all times or in all circumstances; the
condition or fact that a person or thing is itself and not something else;
individuality, personality.
This definition demonstrates the ambiguity of the word. A clear distinction is
drawn in the dictionary between the various definitions and usages of the term
‘identity’ and the quite separate term ‘absolute identity’. Once again we profit from
examining the full version of this definitive work on language and find that the
confusions and asymmetric interpretations used for the word are just as varied as
the views on what identity comprises. The penetrating point made by the OED
authors is the choice of the phrase “in all circumstances.” This is the critical factor
that makes the verification of identity in one context assumed to apply to all contexts.
This is now the central issue.
Page 62
The Second Workshop on the Social Implications of National Security
There are few situations where complete and definitive verification of identity
is possible, and the tendentious term “Identity Card”; simply makes the implied
assumption that the token (the card) is indeed the person.This is actually a big step,
and one that has in the past considerably harder to do ‘in all circumstances’ than it
may seem.
“Identification” as a verb is the task that such tokens are aimed at addressing.
Again, identification for what? It is hard to find a case where the context does not
define the level of accuracy and reliability of the process of ‘identification’. Passports
are specifically intended and agreed upon as the relevant token for border crossing
(and in fact nothing else).Yet the idea of a passport as a high grade token for assertion
or verification of identity is almost irresistible as a simple means of establishing the
identity of a person in situations far removed from any border. The intrinsic value
of a passport as an identity token is explicitly exploited by hotels everywhere as a
means of securing payment from the client and to satisfy police and surveillance
records. Function creep will always be with us.
The most common form of identity is one’s name, but as there may be many
with the same name the addition of a photograph provides additional discrimination.
Yet an original birth certificate showing only the name is also deemed to be a high
quality form of identity verification. There are clearly far more factors involved in
a ‘simple verification of identity’ than meets the eye, and the OED has long been
onto it.
In this paper we address the different factors that comprise identity in two
ways:
1. The ability to achieve an accepted ‘identity’ as oneself by the use of tokens
or other forms of associated factors
2. The level to which a restriction to a single token-certified ‘identity’ can or
should be used for all purposes.
Once these rather different common interpretations of ‘identity’ are appreciated,
there then becomes a clear need for multiple ‘identities’ sufficient for any specific
purpose (usually a transaction, access or an event) requiring an assumed reliable
association between a person and a token. Many situations require only a temporary
identity: a movie ticket is a simple anonymous example usually with a linkage period
requiring a simple identity association of a very short duration (ie the holder is
identified as authorized to enter the cinema: a very clearly defined context)– and
with no attributes to be linked to a specific person required: the holder gets entry,
non holders do not. Transaction completed. Others require stronger links to the
person and for longer. But it is clear that not only is there a working acceptance of
an ‘adequate’ verification of identity, but there is also recognition that not all events
or transactions require the same identity to be used.
A professional woman may continuously operate in her unmarried name, a
stage name, a nom-de-plume – or her husband’s surname in different circumstances.
There is no suggestion made that this is in any way a criminal or even dishonest
Page 63
The Second Workshop on the Social Implications of National Security
behaviour. On the contrary, many authors, actors, police, psychologists, witnesses
etc all have valid and compelling reasons to be able to live under different identities.
In the case of family violence or witness protection the lack of any linkages is
imperative, sometimes for sheer survival. How is has it been possible to have multiple
identities in this way? Simply because if people undertake their legal responsibilities
with various bodies and the community this is a basic freedom – but this freedom
depends on trust and genuine security and credible security at that.
The Tax Office has long had taxpayers paying tax on activities illegal at the time
(prostitution being one example), and generated a solid reputation for keeping the
‘tax payer’ identity separate and unlinked to other forms of identity. The current
environment has dismantled these protections against linkage between legal multiple
identities both by data matching and by huge reductions in the constraints on a
range of public officers in many areas of state activity to access and link multiple
identities.This not only reduces the trust in these bodies, but also makes many people
vulnerable in new ways. Family violence victims and witness protection programs
are now not the only ones at risk. The pressures to eradicate multiple identities
are associated mainly with efforts to link different forms of real time and recorded
data and associate it with each individual for efficiency in establishing identity, and
over time to build a cumulative and increasingly cross-linked picture of the person
or thing (‘entity’) concerned. Tracing of behaviour, movements and characteristics
and location of animals serves a similar purpose in scientific studies.Treating people
as animals to be traced continuously wherever they go and whatever they do is
an interesting perspective which is a disturbing facet of überveillance (Michael &
Michael, 2006), and emphasizes the potentially dehumanizing aspects of asymmetric
information secured and held by anonymous third parties.
3 The basis of identity verification
The efforts to make a token identical to a person are now mediated by computers
and communications where a single tag or number enables a person to be the subject
to both intentional and generally undirected data trawling and integration.The results
of such trawls come up with links between people and activities but are vulnerable
to data quality, and other processes which may have been done for quite different
purposes. The issue of an initial verification of identity (say for a national ID card)
is one of data quality, and this is an expensive commodity. The processes outlined
for both the UK and the Australian national identity cards under consideration
have huge holes in them. These include the limited basis for verification before a
person is approved as having demonstrated their own identity, and the very limited
time allowed in most planning for such systems for this task to be executed. In the
Australian system it is proposed that a brief training of Post Office workers will
suffice to execute this in a few minutes.
For some a completely documented life record is easily supplied, but for others
even securing people who have known them by sight and joint activities will be
Page 64
The Second Workshop on the Social Implications of National Security
a real problem. Yet once the ID is issued it is assumed to be the unique identifier
linked to the person in some real way. This will inevitably corrupt the ID database
from the very start. This means that false positives will be widespread not only for
the person involved but other parties who have met ‘higher’ standards of verification.
This is an easily accepted argument but is very misleading. Personal knowledge of
a person covers many different attributes than simple appearance, yet a passport or
driver licence with a photo ID on it is regarded as ‘more reliable’. This is in spite
of a large volume of evidence that people are very poor at matching photos to the
relevant individual, as indeed are biometric facial recognition techniques at this
point.
So how do we assess these issues? As the major reason for government pressures
for ID uniqueness, matching tokens is essentially to facilitate management and
control of the population by longitudinal and cross-sectional linkages.The rhetoric
is to confirm right to access some location or service, or to be able to undertake a
transaction but this introduces a fundamental asymmetry in the relationship: false
negatives in token matching deny access to those with the rights to them, with
absolutely no penalty to government at all while false positives allow such access
and also contaminate the records of others thereby in both cases disadvantaging
the population as a whole. This basic issue of a single ‘do all’ identity is simply not
understood by many.This is not uncommon in cases of non-transparent information
asymmetries between governments and the population as a whole. It is however
an area where governance and identity interact. A complementary view on some
of these issues is given by Clarke (1994) but the over riding social aspect of such
mappings onto a single unique (and indeed easily copied) digital identity is that of
the inevitable denials of service, and most likely to those most in need of them as
these are the people who will tend to have most difficulty in establishing their own
identity in the first place.
4 Other mechanisms
In non-governmental interactions trust is a major feature of transactions, and a
recommendation, an introduction or even a simple referral can be quite sufficient
for most transactions. However, trust does not figure highly in everyday transactions
with governments or large organisations. This links governance to transparency in
the mediation of such interchanges requiring identity. Efficiency and cost savings
are major drivers in the long-standing bureaucratic thrust towards universal unique
identification. The role of trust in government surveillance in the United States
was discussed by Staples (1997) four years before the cultural shifts following the
destruction of the World Trade Centre. He argues that:
The movement to a post modernist culture of corrections is one of
normalising social control over all aspects of life - fit the power inequity
aspects of privacy measured by others (p. 128).
A society in a culture of surveillance, a society of judges exercising the
Page 65
The Second Workshop on the Social Implications of National Security
power to punish everywhere, a society increasingly lacking in personal
privacy and individual trust and a viable public life that supports and
maintains democratic values and principles (p. 129).
Were it not for function creep and the opportunistic approach of enforcement and
other dataveillance and surveillance bodies, there might have been a high integrity
medical ID card in Australia by now: yet this is one of the declared objectives of
the Australian governments ID card initiative which has been described as carrying
out many further functions from the start: demonstrated function creep before the
system is even properly designed. The trust factor is still largely there between the
community and the medical professions. Medical administration roles in handling
and linking such data is not usually seen as part of the patient-doctor relationship.
There are also asymmetries of information holding between doctors themselves
is a consequence of the ownership of patient records by the doctor that treats the
patient. These may be seen as barriers to efficiency or as good faith in very private
information held in trust – or, as is now increasingly the case in other fields, valuable
commercial micromarketing data.
In summary, identification is clearly contextual, and efforts to move towards a
unique token as formal ID can be seen to automatically trigger issues of governance,
transparency and trust. This perspective appears to replicate many of the aspects
of the original Australia Card, the current Australian and UK ID card debates, but
moves it on from the purely political aspects of power assertion to the mechanisms
we have discussed.
5 Implementing identity
So far we have avoided discussing the meaning of the tokens that are used as
proxies or in support of identity establishment or verification.This now needs closer
examination, as there may be many tokens associated with a single identity even
when the individual is using one of several multiple identities.A digital identity is an
assemblage of token (‘identifiers’) that describe that identity. One person may have
many personas (or operating or perceived identities) but for any particular function
or transaction requiring the establishment of an identity for a specific purpose or
occasion, there are usually only a few identifiers used, and these may not be the
same for transactions with another body or organisation.
In the contemporary, complex and high-paced world, organisations seek
to manage identities on the basis of their digital identities. The quality of the
management will reflect the quality of the digital identity. But that will vary
enormously depending on the usual data quality characteristics (accuracy, precision,
completeness, timelines, etc.), and especially on the quality of the acts of associating
data with identities.This leads us to the concept of a digital identity, which comprises
solely a set of data associated with a specific person or thing. This set of data is
assumed to be an accurate representation of the person or thing (the generic term
for this is ‘entity’, and is a physical item or person). There is a special set of digital
Page 66
The Second Workshop on the Social Implications of National Security
data that is associated directly with an entity. Examples are:
•inthecaseofaperson,biometrics;
•inthecaseofapersonorthing,embeddedRFIDchipsetc.
In such cases the entity is its own identifier, and this is invariant on circumstances
or situations requiring identity establishment or verification.
Organisations are seeking to manage entities on the basis of their digital entities.
The quality of the management will reflect the quality of the digital entity. But
that will vary enormously depending on the usual data quality characteristics, and
especially on the quality of the facts of associating data with entities. If biometrics
prove to be practicable in enough settings, the quality of digital entity may be higher
than could ever be the case with digital identity. The impact and implications are
far more drastic, however, because the level of social control that can be achieved
will chill individual behaviour, social discourse, economic innovation, and political
thought and speech.
This qualitative difference between intrinsic (entity bound) identifiers, which
stay the same for all circumstances, leads to an automatic deletion of multiple digital
identities, as such a unique key to a person is virtually irresistible to both commerce
(know your customer and tailor services to there their known wealth or other
accumulated identifiers integrated over time), and to government for cumulative
comprehensive population tracking and surveillance).
6 Links between surveillance and identity
There is little difference in principle between:
1. An anklet with a GPS tag that is fitted to a prisoner to constrain his or her
location, and to allow real-time monitoring as well as historical tracking of
all his or her activities, and;
2. An RFID location and access control badge that must be work worn to work
to access or move about a specific building or area;
3. An injected RFID chip to allow repeat Club patrons to be allowed to enter
the premises- and of course potentially to be monitored by other detectors.
The real difference is the voluntary nature of some of these identifiers (injection
of an RFID chip) and the nature of the usages made of the data stream that
follows: voluntary or not (intrinsic identifiers such as biometrics or DNA are not
voluntary).
Context is all.As long as the context is the domain solely, of say a Club premises,
then multiple identities are still possible outside that domain – but if this unique tag
(or biometric) is accessed by other organisations, then (in the case of biometrics) an
indelible trail is cumulatively created: one that can be readily extended backwards and
well as forwards, and over many organisation both prospectively or historically.
This process is the collection of a surveillance data set. The links between
surveillance and identity depend critically on the tokens or identifiers used to
establish identity. Persistent identifiers specific to the person or thing (entity) make
Page 67
The Second Workshop on the Social Implications of National Security
it very difficult to avoid function creep.
The scope of intrinsic identifiers is global, the differences are in the ease or
otherwise of securing them. As costs drop in securing and converting intrinsic
identifiers then the application widens rapidly. DNA databases used to be collected
solely from criminals, but are now routinely collected from suspects who may be
innocent. Function creep has already occurred with the general public in the area
of an event now having their DNA required as prospective scanning and profiling
tool with the data being retained to build on ever expanding databases. In whatever
way it proceeds and under whatever guise, such libraries of intrinsic identifiers can
only grow and expand.
National ID cards are specifically designed to make this possible. There is no
need for automatic ticketing cards to include high grade identification, but the
emergent practice is that it will be. The anonymous token (paper ticket) simply
does not provide enough marketing and trace information for the various parties,
commercial and enforcement, seeking it as a by-product of your purchase and use
of a right to travel from A to B. The days of anonymous travel or movement are
numbered.
As such cumulative records emerge, then the existence and use (let alone the
well documented tendency for abuse) of surveillance data will affect the social
space of all the surveillance subjects (ordinary citizens). Such constraints on social
space have a disproportionate effect on individuals who need to live with multiple
identities (or to have to alter) their identities.
The only way to conserve the existing legal right to operate using multiple
identities is to require a privacy audit of all systems and digital tokens used. This is
quite evidently not in the interest of many parties seeking such surveillance and
retrace capacities, and, as a result is highly unlikely to occur. Abuse, as is so well
documented already, (e.g. Independent Commission against Corruption, 1992) will
occur- and both the social space with be reduced and the security of individuals
concerned will become at greater risk as a result.The shrinking of social and physical
space has already been observed. As a result of the intrusive and extensive biometric
data capture and distribution at the borders, there are numbers of people who have
simply stopped travelling on routes that require entry to the USA.
7 Collapsing identities
The surveillance aspects of digital identity tracking also lead to a substantial
contraction of the social and transactional spaces that people can use. Examples are
already plentiful. CentreLink requirements for identity documents from the very
groups most likely to not ever have had them, simply are a plausible and defensible
means of denial of access. Currently the tests required to establish identity include
known persons and other normal social means of adequate identification for the
purpose in hand but once unique (or quasi-unique) digital identity tokens are held
by all, then there will be two major effects:
Page 68
The Second Workshop on the Social Implications of National Security
1. Such low grade data entering the system as many simply will not have the
levels of documentary ‘evidence’ of their identity (leading to both positives
and false negatives in the use of the supposedly unique digital identity), and
a general reduction of the integrity of the whole system
2. Lack of the token will enable denial of service.
It is clearly necessary to introduce a concept of Contextual Sufficiency into
identity establishment. This has been in the past implied in almost all transactions,
but will be lost if all one’s identities are required to be collapsed into one via the
existence of a unique identifier; and if this is a biometric, the contextual variations
and relaxations will be lost. Once the principle of contextual sufficiency is lost,
then validation failures and multiple matches will have pervasive and widespread
negative effects on individuals- and this will not be restricted to those with a major
need for multiple identities right now.
The marked increase in information asymmetries between the observed and
the observers will require compensating social action. One essential action must
be the removal of politicians exemption from privacy laws applied to their data
collections. Other less obvious steps will be needed as well to provide transparency
and accountability for linked or potentially linkable information resources. Brin
(1998) discusses an interesting highly speculative but stimulating case of full symmetry
of information between the surveillers and the surveilled. If only such a scenarios
could be realistically envisioned, let alone implemented, but it goes against the
pervasive enforcement organizations and political structures in most present cultures
and societies.
It is clear from public debate that the pervasive impact of collapsing identities
to one for each person introduces many restrictive and disturbing side effects
and vulnerabilities. These will grow with time, rather than diminish, due to the
retrospective matches that will become possible.
8 Ownership of identity
As almost all tokens of identity are now handled in a digital form, operational
identity is becoming a bundle of data items. Who owns these? The current TRIPS
(trade-related aspects of intellectual property rights) protocols of the World Trade
Organisation (WTO, 2007) is very clear on this:
1. Assemblages of public data have copyright in that collection, and:
2. Such assemblages may be created automatically by a computer and still retain
a copyright.
So if an organisation or organisations make the effort to collect data about
you that can be linked via intrinsic identifiers in a digital form, not only will they
own the digital form of the identifiers but also the full set of tokens the comprise
your digital identity. The Government asserts copyright over public information
Page 69
The Second Workshop on the Social Implications of National Security
and extracts a monopoly rent for it.1 How profitable it will be to own peoples
own digital identity. As this is clearly what is implied by the current database and
copyright law. In a real sense you will then not own your own identity. A highly
valuable commodity, as identity theft is now demonstrating. Only here it is not the
transaction done in your name but the very data that comprises your own identity
that is alienated from you.The potential for this outcome was discussed at the time
of the TRIPS negotiations by Wigan (1992).
9
Conclusion
The growing use of digital identifiers takes on a very special set of social impacts
if collapsed by the wide sue use of biometrics and especially with ID cards linked to
biometrics, however unreliable. Once identity becomes the presentation of a digital
dataset, then the very ownership of ones own ‘identity’ then comes into question.
While this may not prove to be a problem, the collapsing of our daily multiple
identities into one has far wider implications than are immediately obvious. This
paper has simply introduced a few of the implications. The term überveillance is
correctly applied to the combination of powers and asymmetries and consequences
of these trends.
References
Brin, D. (1998). The Transparent Society, Addison-Wesley, Reading Massachusetts.
Clarke, R. (1994). Human Identification in Information Systems: Management
Challenges and Public Policy Issues <http://www.anu.edu.au/people/Roger.
Clarke/DV/HumanID.html> (accessed 4 October 2007).
Independent Commission against Corruption (1992). Report on the Unauthorized
Release of Government Information, 3 vols., ICAC Sydney.
Michael M.G. and Michael K. (2006). “National Security: The Social Implications
of the Politics of Transparency”, Prometheus, 24(4), pp. 359-363.
Staples, W.G. (1997). “The Culture of Surveillance: Discipline and Social Control
in the United States”, in G. Ritzer (ed.) Contemporary Social Issues Series, St
Martins Press, New York.
Wigan, M. R. (1992). “Data ownership”, in R. A. Clarke & J. Cameron (Ed).
Managing Information Technologies, Organisational Impact II, 1 (pp. 159-169).
Amsterdam, North-Holland.
WTO. (2007). Trade-Related Aspects of Intellectual Property Rights, <http://www.
wto.org/english/tratop_e/trips_e/trips_e.htm> (accessed 4 October 2007).
1
This is a regular complaint in Australia about collections of data made and held by the Australian Bureau
of Statistics, and in the UK about the holdings of mapping data by the Ordnance Survey – where they
have attracted a widespread “give us back OUR data” movement.
Page 70
The Second Workshop on the Social Implications of National Security
6
Opposing surveillance
Brian Martin
Professor, School of Social Sciences, Media and Communication,
University of Wollongong
Abstract
If surveillance is potentially seen as unfair, then it is predictable that its proponents will
use a number of methods to reduce public concern: cover up surveillance activities, devalue
targets and opponents, offer plausible interpretations for actions, use official processes
that give an appearance of fairness, and intimidate and bribe targets and opponents.
Opponents of surveillance can be more effective by being prepared for these tactics and
working out ways to counter them.
Keywords: surveillance, tactics, opposition, outrage, resistance
Page 71
The Second Workshop on the Social Implications of National Security
1
Introduction
Over the years, many people have opposed surveillance, seeing it as an invasion
of privacy or a tool of social control. Dedicated campaigners and concerned citizens
have opposed bugging of phones, identity cards, security cameras, database linking
and many other types of surveillance. They have lobbied and campaigned against
abuses and for legal or procedural restrictions. Others have developed ways of getting
around surveillance.
In parallel with resistance, there have been many excellent critiques of
surveillance, exposing its harmful impacts and its role in authoritarian control (e.g.,
Dandeker 1990; Gandy 1993; Garfinkel 2000; Holtzman 2006; Lyon 1994, 2003;
Marx 1988; Murray 1993; Rosen 2000). However, comparatively little is written
about tactics and strategy against surveillance. Indeed, social scientists have little to
say about tactics and strategy in any field (Jasper 2006: xii-xiii). My aim here is to
present a framework for understanding tactics used in struggles over surveillance.
Actions that are seen to be unfair or to violate social norms can generate outrage
among observers (Moore 1978). Nonviolence researcher Gene Sharp (1973: 657703) found that violent attacks on peaceful protesters — something that many people
see as unjust — could be counterproductive for the attackers, generating greater
support for the protesters among the protesters’ supporters, third parties and even
the attacking group. Because of this potential for attacks to be counterproductive,
attackers, by design or intuition, may take steps to reduce possible outrage. By
examining a wide range of issues — censorship, unfair dismissal, violent attacks on
peaceful protesters, torture and aggressive war — a predictable pattern in tactics can
be discerned: perpetrators regularly use five sorts of methods to minimise adverse
reactions to their actions (Martin 2007).
1. Cover-up: the action is hidden or disguised.
2. Devaluation: the target of the action is denigrated.
3. Reinterpretation: plausible explanations are given for the action.
4. Official channels: experts, formal investigations or courts are used to give an
appearance of justice.
5. Intimidation and bribery: targets and their allies are threatened or attacked, or
given incentives to cooperate.
This is called the backfire model: when these methods are insufficient to dampen
public outrage, the action can backfire on the perpetrator. However, backfire is rare:
in most cases, the methods work sufficiently well to minimise outrage.
Consider an example different from surveillance: police use force in arresting
someone. This has the potential to cause public outrage if the force used is seen
as unnecessary, excessive or vindictive. Police in these circumstances regularly use
one or more of the five methods. If possible, they undertake the arrest out of the
public eye. They refer to the person arrested as a criminal or by derogatory terms.
If challenged, they claim arrestees were resisting and that using force was necessary
Page 72
The Second Workshop on the Social Implications of National Security
and carried out according to protocol. They refer those with grievances to official
complaints procedures, which almost always rule in favour of the police. And they
may threaten the arrestee with criminal charges should they make a complaint
(Ogletree et al. 1995).
On 3 March 1991, Los Angeles police arrested a man named Rodney King, in
the course of which King was hit by two 50,000-volt tasers and beaten with metal
batons more than 50 times. This arrest would have gone unnoticed except that
George Holliday, who lived nearby, recorded the beating on his new videocamera.
When footage was shown on television, it caused a massive public and political
reaction against the Los Angeles police. Holliday’s videotape cut through the normal
cover-up and allowed viewers to judge the events for themselves, overriding the
police’s interpretation of the events and the media’s normal police-sympathetic
framing (Lawrence 2000). Nevertheless, in the ensuing saga the police and their
supporters used every one of the five methods of inhibiting outrage — though,
unusually, in this case their efforts were unsuccessful in preventing a huge backlash
against the police (Martin 2005).
Tactics for and against surveillance can be analysed using the same framework.
The foundation for public outrage is a sense of unfairness. This is certainly present
at least some of the time: people may see surveillance as an invasion of privacy (as
with hidden video cameras), as a tool of repression (as in monitoring dissenters) or
a tool of exploitation (as in monitoring of workers). The very word “surveillance”
is a tool in opposing it, because the word has such negative connotations.
A sense of unfairness is not inherent in the act of observing someone or
collecting and analysing data about them. People’s sense of unfairness is the subject
of a continual struggle, with privacy campaigners trying to increase concern and
purveyors of surveillance techniques trying to reduce it. Methods to inhibit or
amplify outrage are used within the prevailing set of attitudes and in turn affect
those attitudes.
Given that some people see surveillance as inappropriate, unfair, dangerous or
damaging, there is a potential for resistance and hence it is predictable that one or
more of the five methods of inhibiting outrage will be deployed. In the remainder
of this paper, I look at each of the five methods of inhibiting outrage and ways to
challenge these methods.
The five-method classification used here is a convenient framework for
examining tactics for and against surveillance.To use this framework does not require
actors to be consciously engaging in a struggle, as many are simply reacting to the
circumstances in which they find themselves. For those who are concerned about
surveillance, though, it is useful to think in terms of tactics and strategies.
2 Cover-up and exposure
Surveillance is commonly carried out in secret. When people don’t realise it’s
happening, they are far less likely to become concerned about it. The secrecy
Page 73
The Second Workshop on the Social Implications of National Security
covering surveillance is part of a wider pattern of government and corporate secrecy
(Roberts 2006).
Political surveillance of individuals is normally done surreptitiously. Bugs are
installed in residences; telephones are tapped; remote cameras record movement;
police in plain clothes observe at a discrete distance. There is an obvious reason for
this: targets, if they know about surveillance, are better able to avoid or resist it. But
secrecy is maintained beyond operational necessities: in most cases, the existence
of surveillance is kept secret long afterwards, often never to be revealed. Exposures
may require exceptional circumstances (Marx 1984), such as the collapse of East
Germany’s communist regime or the “liberation” of FBI files at Media, Pennsylvania
in 1971 by the Citizens’ Commission to Investigate the FBI (Cowan et al. 1974).
When surveillance is exposed, for example FBI surveillance of individuals such as
Martin Luther King, Jr. and John Lennon, it can cause outrage. The revelation that
the National Security Agency had been spying on US citizens since 2002 caused a
massive adverse reaction.
Employers sometimes do not want to tell workers they are being monitored,
when there is a possibility this may stimulate individual or collective resistance. (On
other occasions employers are open about monitoring, when this serves to induce
compliance.)
Under the US Patriot Act, the FBI can obtain secret warrants to obtain records
from libraries, Internet service providers and other organisations.The organisations
subject to this intrusion cannot reveal it, under severe penalties. This draconian
enforcement of secrecy serves to reduce personal and popular concern about
surveillance, for example when the Patriot Act is used against non-terrorist groups
such as antiwar protesters.
In some cases, surveillance becomes routinised, so cover-up is less important. In
many areas, camera monitoring is carried out openly: it is possible to observe oneself,
on a screen, walking into a shop. On the other hand, some forms of surveillance are
hidden so effectively that they are completely outside of most people’s awareness,
for example collection of web data, meshing of database files, police checks on car
licence numbers and recording of bank transactions.
The importance of low visibility in enabling surveillance to continue and expand
is apparent through a thought experiment: imagine that you received, at the end
of every month, a list of instances in which data had been collected about you, by
whom and for what purpose. Imagine knowing whether you had been placed on
a list to be denied a loan or a job.
Exposing surveillance is crucial to challenging it. Exposure requires collection of
information, putting it into a coherent, persuasive form, providing credible backing
for the evidence, and communicating to a receptive audience. Sometimes a single
person can do all of these steps, collecting information directly and publishing it
on the web. Normally, though, a chain of participants is involved, for example an
insider who leaks documents, a researcher who prepares an analysis, a journalist
Page 74
The Second Workshop on the Social Implications of National Security
who writes a story and an editor or producer who publishes it. Campaigners help
in exposure, as with Privacy International’s Big Brother Awards for organisations
with bad records in threatening privacy.
3 Devaluation and validation
If a person is perceived as unworthy, then people don’t get as upset when bad
things are done to them. Executing an innocent person is seen as outrageous;
executing a serial murderer elicits less concern. The inmates of the US prison at
Guantánamo were portrayed as the “worst of the worst”; abrogating the civil rights
of people painted as terrorists was accepted by much of the population, at least
initially.
It is to be expected, therefore, that proponents of surveillance will denigrate
targets as a means to justify their operations. Three popular labels for targets of
surveillance are criminals, terrorists and paedophiles. Who could be opposed to
fingerprinting welfare recipients if it prevents cheating? Who could be opposed to
monitoring of emails or cameras on every street corner if it helps deter paedophiles?
Furthermore, devaluation is extended to those who oppose surveillance, who are
said to be defending criminals, terrorists and paedophiles.
The trite expression “If you have nothing to hide, you have nothing to fear” is
built on an implicit devaluation: if you’re concerned about privacy and surveillance,
you must have something to hide, which implies you’re guilty and devious (Marx
2007). Therefore, surveillance seems to be justified.
One way to challenge devaluation is to emphasise the essential humanity of
every individual.A powerful way to do this is to make targets human, by using names,
photos and personal details. Australian David Hicks was incarcerated without trial
at Guantánamo for over five years without trial, and stigmatised by the Australian
government as a terrorist. Opponents of Hicks’ treatment were eventually able to
generate concern, using photos of Hicks to make him appear as an ordinary person.
Hicks’ father Terry spoke out on his behalf, as did his US military lawyer Michael
Mori: having valued allies helps counter devaluation.
The same principle applies to validating targets of surveillance. Personal stories
of individuals subject to political surveillance are potent tools for validation. For
example, Penn Kimball (1984) in his book The File poignantly tells of discovering
spy agency files about himself in 1978, three decades after they were initiated on a
flimsy pretext. The 2006 German film The Lives of Others encouraged the viewer
to identify with the targets of East German political surveillance and with the Stasi
agent who came to sympathise with them. Personal stories of innocent victims of
surveillance gone wrong are similarly powerful.A few people will respond to abstract
arguments about human rights; many more will respond to personal stories. George
Orwell’s novel 1984, a powerful portrait of a dystopian future, uses the personal
story of Winston Smith to make larger political points.
Page 75
The Second Workshop on the Social Implications of National Security
4 Interpretation struggles
Proponents of measures that increase surveillance typically provide a justification,
often in terms that resonate with widely accepted values. Identification of vehicles
is to monitor traffic, detect lawbreakers or collect congestion fees; compilation of
corporate databases is to increase efficiency and provide better customer service;
cameras are to prevent crime; identity cards are to reduce fraud; baggage checks
are to prevent terrorism. The most effective justifications have an element of truth,
sometimes quite a large element.The increase in surveillance is simply a by-product,
deemed insignificant and unproblematical.
Proponents typically exaggerate the effectiveness of measures. One powerful
way to do this is to treat effectiveness as self-evident. Cameras on public streets
deter crime, of course.Who could doubt it? Seldom is empirical evidence provided;
perhaps little is collected or sought. This is an especially potent technique because
it doesn’t require the public to trust what authorities say, because members of the
public are the ones drawing the conclusion. Airline travellers who, in order to fly,
tolerate pointless checks through bags and removal of fingernail files and nail clippers
may not question the assumption that such measures are deterring terrorists.
Proponents seldom discuss alternative ways of accomplishing the same goal.
An alternative approach to aircraft hijackings is to train passengers in how to
communicate with each other and organise to overcome terrorists, as occurred
spontaneously on 9/11 United Airlines flight 93 (Scarry 2003). This approach
involves trusting passengers and increasing their awareness and skills rather than
treating them as potential terrorists. It is seldom mentioned by government
authorities, who focus exclusively on measures that give agencies greater power.
Radical alternatives are seldom articulated. Rather than keep extensive records on
poor people to prevent them cheating on welfare, an alternative is to increase the
level of free distribution. For example, free or low-cost food could be provided to
anyone who wants it, an expansion of current welfare services. This would reduce
the need to monitor individuals.
Problems with surveillance systems are typically said to be rare or non-existent.
Sometimes, though, surveillance abuses are publicised, for example cases in which
someone has been denied a loan due to incorrect information on a database.These
are explained away as rare mistakes. Then there are the systemic abuses, such as the
illegal selling of information from databases — for example those held by police
— to private investigators and others. These are commonly attributed to rogue
operators. The system of information collection is not blamed.
In summary, proponents of surveillance typically provide a plausible justification
for measures, exaggerate or simply assume their effectiveness, ignore alternatives
and explain away abuses as rare events due to rogue elements.
Opponents of surveillance have challenged every one of these interpretative
techniques. Most importantly, they have highlighted the potential of existing
Page 76
The Second Workshop on the Social Implications of National Security
or potential systems to increase unnecessary and damaging surveillance. They
have challenged claims or assumptions about effectiveness. They have proposed
alternatives. And they have argued that abuses are symptoms of flawed systems.
One of the key elements of interpretation struggles is the language used.
Proponents of intrusive measures almost never use the word “surveillance.” For
example, cameras are called security cameras, not surveillance cameras.What about
opponents? It is common to refer to use the language of “privacy,” which resonates
with people’s concerns about the sanctity of private life. But privacy rhetoric has
disadvantages, in particular that it is personal in focus, whereas surveillance is largely
an institutional practice (Stalder 2002).
John Gilliom (1994) analysed the arguments used for and against compulsory
drug testing in US workplaces in the 1980s. Proponents justified testing mainly in
terms of safety at work, the drug problem generally and the productivity of drug
users, whereas opponents mainly cited privacy followed by legal rights, testing error
and other concerns, of which surveillance was mentioned by only a few. Gilliom
argues that rights discourse was limited because the law is constructed to serve
the powerful, and improvements in drug test methods addressed concerns about
errors while allowing the testing to continue. The implication of Gilliom’s analysis
is that opponents’ choices of arguments against testing can have a major influence
on the success of opposition generally, because arguments lead to particular ways
of challenging testing — including legal methods, a form of official channel.
5
Official channels
Courts, ombudsmen, grievance procedures and formal inquiries are examples of
official channels. Many people believe that these provide justice. They do in quite
a few cases, but when the perpetrator is far more powerful than the victim, official
channels typically give only an illusion of justice. For example, some people who
speak out in the public interest are nominally protected by whistleblower laws,
but in practice these laws provide little or no protection (De Maria 1999). Official
channels are typically slow, focused on procedural technicalities, dependent on
experts (such as lawyers) and keep matters out of the public eye.They are the exact
opposite of using publicity to mobilise public concern. Regulatory agencies for
protecting privacy fit this mould.
Some opponents of drug testing in US workplaces took cases to courts, some
of which opposed testing. However, the Supreme Court supported testing, so the
legal approach failed overall (Gilliom 1994). Along the way, it soaked up a large
amount of money and effort, took a long time, distracted energy away from other
opposition options, and enabled proponents to achieve an authoritative legal opinion
in favour of testing.
In Australia, the Privacy Commissioner, a government-funded office, can
receive complaints and make judgements. But its role is severely constrained. The
Commissioner has to operate within the current law, which for example does not
Page 77
The Second Workshop on the Social Implications of National Security
cover private sector uses of information. As soon as the law is changed, for example
to allow another type of database matching, the Commissioner must accept this as
the new framework for judging privacy concerns. Furthermore, the Commissioner
cannot do much to oppose any practices that it judges to be violations. Anyone
who looks to the Privacy Commissioner for relief from actual invasions of privacy,
or to halt a new practice, is likely to be disappointed (Davies, 1996).
In most countries, government agencies charged with protecting privacy have
been ceding ground for decades. There are some legislative and administrative
constraints on surveillance, to be sure, but agencies provide little for anyone seeking
redress. If you know or suspect that your employer has been monitoring your
email, that your telephone company has been releasing logs about your calls or that
information about your purchases is on a corporate database, you can approach any
number of agencies, most likely to find out that either the practice is legal, that you
have no right to know, or that no information is available to you.
There are many people working in or with agencies who are dedicated to the
public interest.The problem is not motivation but the role of agencies in the social
structure: they are given limited mandates and inadequate funding, must operate
according to bureaucratic regulations and have little or no capacity to initiate
significant change. They can be simply overwhelmed by contrary forces, such as
the post-9/11 war on terror. Finally, a really effective agency, that gets in the way
of powerful interests, is likely to have its funding cut or mandate restricted.
The implication is that opponents of surveillance should not look to official
channels as the solution. Stronger laws and well-funded oversight bodies can be
worthwhile, but it is a mistake to put too much energy into promoting them,
especially because reforms can so easily be rolled back (Olmsted 1996). Increasing
public concern should be the primary goal, and that means publicising the issues,
gaining supporters, building alliances and developing campaigns. If these efforts are
effective, it is likely that governments will create or bolster official bodies to try to
convince people that the problem is well in hand.
In 2005, the British government introduced the Serious Organised Crime and
Police Act, which includes a provision requiring protesters within one kilometre
of Parliament Square to obtain a permit, a requirement that allows files on radicals
to be compiled. To even wear a T-shirt with a slogan requires a permit. Activist
comedian Mark Thomas (2007) promoted “Mass Lone Demos” by thousands of
people with diverse causes, for example some opposing the Iraq war and others
whimsically opposing the month of February, overloading the police with permit
requests and making fun of the law.
6 Intimidation, bribery and resistance
Surveillance measures can be intimidating: no one likes to imagine that their
conversations and actions are being recorded. Having one’s photo and fingerprints
taken by a government body can be humiliating and stigmatising. Intimidation
Page 78
The Second Workshop on the Social Implications of National Security
serves to reduce expressions of resistance. Local critics of surveillance abuses are
likely to come under increased surveillance themselves, rather like the way peace
activists can end up on US government no-fly lists. (Prominent critics may be a
bit safer, because surveillance of them, if discovered and disclosed, could generate
more publicity).
There is also a parallel process of encouragement to go along with intrusive
measures. If you supply your identification card, you have access to government
services. If you allow cookies, you have access to certain websites. If you allow your
licence number to be recorded, you can drive on certain roads. Surveillance often
comes along with benefits. Accepting the benefits creates a psychological debt: a
greater willingness to accept surveillance.
To oppose surveillance, there need to be some people willing to resist. Insiders,
with knowledge of abuses, can leak information to public critics. Investigative
journalists can probe political surveillance. Citizens can expose what has happened
to them. This is resistance aimed at mobilising wider awareness of surveillance and
its damaging effects.
Many individuals attempt to avoid or disrupt surveillance, for example by
giving incorrect information on forms, joining campaigns against identity cards,
or damaging speed cameras. If actions are widely taken up, they can have a major
impact and can stimulate development of new methods of resistance. Using and
promoting encryption is an example. If everyone puts some encrypted files on
their computer and sends occasional encrypted emails, even if they have nothing to
hide, this makes it harder for snoops to determine who is worth watching. This is
especially important in repressive regimes, where use of encryption might be seen
as implying subversive activities. Struggles to enable access to encryption technology
are a vital part of resistance (Schneier & Banisar 1997).
Gary Marx (2003) has distinguished 11 different types of individual resistance to
surveillance, for example avoiding detection, blocking intrusive measures, refusing to
provide information, and encouraging surveillance agents not to enforce regulations.
He gives examples of each type of resistance and argues that there will be an ongoing
struggle between controllers and resisters, with total control being unrealisable.
Methods of intimidation are often linked to cover-up. Beginning in the 1970s,
CovertAction Information Bulletin challenged secret agencies by exposing the identities
of undercover CIA agents; in response, the US Congress in 1982 passed a law against
this. This law later led to a giant scandal when government officials revealed the
identity of CIA agentValerie Plame in reprisal against her husband Joseph Wilson for
questioning false claims used to justify the 2003 invasion of Iraq (Wilson 2005).
This case suggests that data-gathering can sometimes be turned against powerful
groups. Normally, the groups that instigate and run surveillance systems, such as
politicians, employers, top bureaucrats and spy agencies, are not equally subject to
the techniques they use against others. For example, employers may monitor workers
but workers are seldom able to monitor employers to the same extent. Collecting
Page 79
The Second Workshop on the Social Implications of National Security
data about the rich and powerful, putting them on a par with others, challenges
and deters intimidation. In other words, if the rich and powerful want surveillance,
then make sure the searchlight is turned on them as well as others.
7 Conclusion
In order to gain insight into struggles over surveillance, it is useful to analyse
the methods typically used by perpetrators of perceived injustice to reduce outrage
over their actions. The promoters of surveillance commonly hide their operations,
denigrate the targets and critics of surveillance, give plausible justifications for
operations, set up oversight bodies that have little power to challenge anything more
than minor violations of regulations, intimidate opponents and provide incentives for
cooperation.To refer to “promoters of surveillance” and describe their methods does
not imply any conscious intent on their part: many of them do not see themselves
as promoting surveillance, but rather as cracking down on crime, providing better
consumer service or increasing the efficiency of service systems: they believe in their
own interpretations of what is happening. Likewise, to speak about the methods
used to reduce outrage need not imply any conscious strategy: these methods are
simply intuitive or obvious ways to reduce opposition.
The value of looking at methods used by promoters of surveillance is that it
gives guidance for opponents. Some of these are fairly obvious, including exposing
abuses and explaining what is wrong with surveillance. Others are less so, in particular
being sceptical of official channels and instead mobilising support. Over the decades,
many critics of surveillance have advocated stronger regulations, yet these have
been regularly superseded by new technologies, overturned by emergency powers,
undermined by loopholes and made hollow by weak enforcement. According to
the model used here — reflecting studies of a wide range of domains — relying on
regulations is seriously flawed: to a considerable extent, it gives only the appearance
of dealing with problems, dampening public concern while allowing developments
to continue.
To challenge surveillance, according to the framework used here, public outrage
needs to be fostered in a range of ways.The model gives guidance for actions that are
likely to be effective, but it does not say who will or should take action. Dedicated
opponents have too often been overwhelmed by the forces promoting surveillance.
In such circumstances, even the best tactics may be inadequate.
Nevertheless, it is far too soon to lose heart. Many other social movements —
against slavery, for women’s emancipation, against environmental destruction — only
gained widespread support after decades or centuries of exploitation and damage.
Surveillance may become more ubiquitous and insidious, but there remains a strong
reservoir of public concern about privacy, autonomy and freedom.Today’s critics and
campaigners are laying the basis for a future challenge to emerge. Understanding
tactics can help make that challenge more effective.
Page 80
The Second Workshop on the Social Implications of National Security
Acknowledgements
I thank Gary Marx, Steve Wright and two anonymous referees for valuable
comments on a draft.
References
Cowan, P, Egleson, N, Hentoff, N with Herbert, B & Wall, R 1974, State secrets:
police surveillance in America, Holt, Rinehart and Winston, New York.
Dandeker, C 1990, Surveillance, power and modernity: bureaucracy and discipline from
1700 to the present day, Polity Press, London.
Davies, S 1996, Monitor: extinguishing privacy on the information superhighway, Pan
Macmillan, Sydney.
Davies, SG 1997, ‘Re-engineering the right to privacy: how privacy has been
transformed from a right to a commodity’ in Technology and privacy: the new
landscape, ed PE Agre & M Rotenberg, MIT Press, Cambridge, MA.
De Maria, W 1999, Deadly disclosures: whistleblowing and the ethical meltdown of
Australia, Wakefield Press, Adelaide.
Gandy, OH 1993, The panoptic sort: a political economy of personal information,
Westview, Boulder, CO.
Garfinkel, S 2000, Database nation: the death of privacy in the 21st century, O’Reilly
& Associates, Sebastopol, CA.
Holtzman, DH 2006, Privacy lost: how technology is endangering your privacy, JosseyBass, San Francisco.
Jasper, JM 2006, Getting your way: strategic dilemmas in the real world, University of
Chicago Press, Chicago, IL.
Kimball, P 1984, The file, Allen & Unwin, London.
Lawrence, RG 2000, The politics of force: media and the construction of police brutality,
University of California Press, Berkeley, CA.
Lyon, D 1994, The electronic eye: the rise of surveillance society, Polity Press,
Cambridge.
Lyon, D 2003, Surveillance after September 11, Polity Press, Cambridge.
Martin, B 2005, ‘The beating of Rodney King: the dynamics of backfire’, Critical
Criminology, vol. 13, no. 3, pp. 309-326.
Martin, B 2007, Justice ignited: the dynamics of backfire, Rowman & Littlefield,
Lanham, MD.
Marx, GT 1984, ‘Notes on the discovery, collection, and assessment of hidden
and dirty data’, in Studies in the sociology of social problems, ed JW Schneider &
JI Kitsuse, Ablex, Norwood, NJ, 78-113.
Marx, GT 1988, Undercover: police surveillance in America, University of California
Press, Berkeley, CA.
Marx, GT 2003, ‘A tack in the shoe: neutralizing and resisting the new
surveillance’, Journal of Social Issues, vol. 59, no. 2, pp. 369-390.
Page 81
The Second Workshop on the Social Implications of National Security
Marx, GT 2007, ‘Rocky Bottoms: techno-fallacies of an age of information’,
Journal of International Political Sociology, vol. 1, no. 1, pp. 83-110.
Moore, Jr., B 1978, Injustice: the social bases of obedience and revolt, Macmillan,
London.
Murray, G 1993, Enemies of the state, Simon & Schuster, London.
Ogletree, CJ, Prosser, M, Smith, A & Talley, W 1995, Beyond the Rodney King
story: an investigation of police misconduct in minority communities, Northeastern
University Press, Boston.
Olmsted, KS 1996, Challenging the secret government: the post-Watergate investigations
of the CIA and FBI, University of North Carolina Press, Chapel Hill, NC.
Roberts, A 2006, Blacked out: government secrecy in the information age, Cambridge
University Press, New York.
Rosen, J 2000, The unwanted gaze: the destruction of privacy in America, Random
House, New York.
Scarry, E 2003, ‘Citizenship in emergency,’ in The Best American Essays 2003, ed A
Fadiman, Houghton Mifflin, Boston, 223-242.
Schneier, B & Banisar, D 1997, The electronic privacy papers: documents on the battle
for privacy in the age of surveillance, Wiley, New York.
Sharp, G 1973, The politics of nonviolent action, Porter Sargent, Boston, MA.
Stalder, F 2002, ‘Opinion. Privacy is not the antidote to surveillance’, Surveillance
& Society, vol. 1, no. 1, pp. 120-124.
Thomas, M 2007, ‘“Tony Blair is a cult”’, New Statesman, 25 April, viewed 24
September 2007, <http://www.newstatesman.com/print/200704250005>.
Wilson, J 2005, The politics of truth: inside the lies that put the White House on trial
and betrayed my wife’s CIA identity, Carroll & Graf, New York.
Page 82
The Second Workshop on the Social Implications of National Security
7
Message in a bottle: Stored
communications interception
as practised in Australia
Rob Nicholls1 and Michelle Rowland2
Consultant, 2Lawyer, Gilbert + Tobin
1
Abstract
This paper applies a commercial analysis to the operation of Australia’s interception
powers in practice, drawing on the experience of the authors in advising operators in this
area. The Blunn Report, the recent passage of legislation which permits access to stored
communications and the introduction of further amending legislation in 2007 are indicative
of the dynamic and increasingly intrusive nature of lawful interception and access powers.
This paper discusses the current framework for the interception of stored communications
and argues that short message service messages and most instant message services are
not caught by the current legislative drafting. The paper shows that despite this drafting
deficiency, carriers are responding to stored communications warrants as if the services
were capable of lawful interception. The paper goes on to critically assess the recently
introduced Bill in terms of the implications for operators in this area and the extent to
which the rationale for such change has been clearly espoused. We examine the interaction
between the Attorney-General’s Department and the relevant policy and regulatory actors
in the telecommunications sector. We conclude that the Australian telecommunications
legislative and regulatory regime, with its emphasis on industry self-regulation, is being
subsumed by the objectives of the Attorney-General’s Department and that operators in
the sector are responding to the spirit, but not the letter, of the law which facilitates lawful
interception and access.
Keywords: lawful interception, stored communication, SMS, instant message, reasonable
assistance
Page 83
The Second Workshop on the Social Implications of National Security
1
Introduction
This paper takes a practical approach to the activities associated with lawful
interception of both telecommunications and stored communications under the
current legislative regime. Whereas lawful interception of voice communications has
been practised for many years, there is an increasing demand from law enforcement
agencies for access to other forms of communication. In 2006, this led to
amending legislation which permitted appropriate agencies to gain access to stored
communications with the intention of being able to access each of emails, short
message service messages and instant messages. This paper discusses the implications
that arise from the change in requirements for access to communications and the
practical implementation of such access.
We begin by considering some of the literature on interception of
communications and move on to look at the fundamental mechanisms involved in
the handover of materials from a telecommunications carrier or carriage service
provider to relevant law enforcement agencies using the European model (ETSI
2007). We then consider the current legislative framework and the drafting which
must be interpreted by telecommunications carriers in Australia. After this, the
paper describes some practical cases which have affected carriers and carriage service
providers and the response made by those operators to demands (whether or not
supported by warrants) imposed by law enforcement agencies. We then present an
analysis of the issues that arise from case studies and draw conclusions.
2 Background
The need for the appropriate and lawful interception of voice communications
has been recognised for the past fifty years, if only because of the lawlessness of
interception in the first half of the twentieth century (Branch 2003). In Australia,
the focus from 1960 to 2005 was only on voice and access to stored communications
was provided either by a search warrant or an interception warrant (Holland 2004).
However, the increasing options for communications and the potential for criminals
to use communications mechanisms such as instant messaging (Nolin 2006) and
the lack of security of this technology (Williams and Ly 2004) has led to a change
in the Australian legislation.
Australia is not alone in changing the legislative and regulatory environments
to attempt to address new technologies. South Africa took a simple approach
and described communications as either “direct” or “indirect and provided an
interception regime for both (Bawa 2006). In the USA, there was debate about
the more prescriptive and proscriptive approaches in the amendments to the
Communications Assistance for Law Enforcement Act (CALEA) which now
encompasses internet-based communications environments and services (Schwaderer
2007). The debate included input from some of the original architects of the
internet (Bellovin et al. 2006; Landau 2005). Although this debate argued that there
Page 84
The Second Workshop on the Social Implications of National Security
were technical as well as social risks to amending CALEA, the technical standards
for emerging technologies already provided lawful interception access ports (ETSI
2007; Fonknechten et al. 2004; Gidari 2006; Gratzer et al. 2006; Miettinen 1999;
Milanovic et al. 2003a; Milanovic et al. 2003b; Open Mobile Alliance 2005; Street
2003).
Much of the focus of the debate over interception capability has been in
respect of voice over Internet Protocol (VoIP) (Del Bianco 2006; Drinan et al.
2005; Miller et al. 2005). Whereas the amendment to CALEA to introduce an
obligation for interception of VoIP services was a new obligation, this is not the case
in Australia. The Telecommunications Act 1997, imposes an obligation on all carriage
service providers with facilities in Australia to maintain an interception capability
(s.324(2)) and to provide assistance to relevant agencies (s.313(3)). The amending
legislation which created the current Telecommunications (Interception and Access) Act
1979 described below did not relax that obligation.
3 Interception and access
There are three broad interfaces between telecommunications operators and
law enforcement agencies. These have been standardised (ETSI 2007) and are
summarised in Table 1.
Essentially, the service provider interfaces with the law enforcement agency
(LEA) on three levels. The first level, referred to as handover interface 1, is simply
the administrative arrangements between the LEA and the service provider. In
Australia, this may be a service agreement and service level agreement with
the relevant LEAs. In other countries, this administrative interface is far more
standardised and has, as a result, a higher level of transparency. The second level,
referred to as handover interface 2, is the mechanism by which the service provider
delivers information as to communications but not the content of communications.
Typically, in Australia, this information is provided as part of the carriage service
provider’s “reasonable assistance” obligations under the Telecommunications Act 1997.
This type of information would include, in respect of an identified individual, the
addresses or phone numbers of communications to and from that individual and
information as to the time of the communication and limited information as to its
nature (for example, the duration of a voice call or the size of an email). The final
level, referred to as handover interface 3, is the mechanism by which the service
provider delivers communications content to the LEA. In Australia, this material
is delivered in response to a warrant.
Page 85
The Second Workshop on the Social Implications of National Security
Table 1 – Handover interfaces
Relationship
Deliverables
between carriage
service provider and
law enforcement
agencies
Ongoing
Service and service level agreements (these
agreements may derive from regulatory
obligations or, in the case of Australia, be
contracts between the carriage service
provider and the law enforcement
agencies.
Established for the
Information relating to the specified
duration of delivery
type of communications of a target
of communications
individual including the nature of that
related information in communication, the parties to that
response to a request communication, the location of the target
for assistance
and the commencement and cessation
time and date of the communication
The content of the communications
Established for the
duration of delivery
of communications in
response to a warrant
Handover
Interface
reference
HI1
HI2
HI3
This model provides a useful means to consider the development of interception
and access over time. The model is general enough to be applicable to both voice
and non-voice communications. It is also able to distinguish between information
about communications and the content of those communications.
As a practical matter, operators of large telecommunications networks acquire
switches from vendors which incorporate lawful interception ports into their
equipment. This means that the delivery of interception-related information or
communications content is readily facilitated and can be simply provisioned using
electronic control of the switching device. However, network elements such as
email systems and short message service systems do not have the same inbuilt lawful
interception access as voice telecommunications equipment.
4
The legislative framework
4.1 The core interception framework for calls
The primary objective of the Telecommunications (Interception and Access) Act
1979 (the Act) is to protect the privacy of personal communications by generally
Page 86
The Second Workshop on the Social Implications of National Security
prohibiting interception of those communications, subject to limited exceptions
in which privacy is outweighed by other considerations. As such, the Act
provides a general prohibition on interception of communications passing over a
telecommunications network unless the interception is in the national interest, or
is in connection with inquiries related to certain offences (s.7(1) of the Act).
The Act operates concurrently with the primary telecommunications law,
the Telecommunications Act 1997. Part 13 of the Telecommunications Act establishes a
primary prohibition against disclosure of information or documents that relate to
the supply of carriage services to a person, and the affairs or personal particulars
of such persons. It is a catch-all prohibition which is replicated in nearly every
telecommunications law in the world. Although not explicitly stated in the law, it
recognises that the privacy of a communications is a fundamental right which must
be protected in all but the most extreme or logically permissible circumstances.
Failure to comply with the primary prohibition in Australia is an offence punishable
on conviction by up to 2 years imprisonment.
Part 13 of the Telecommunications Act also sets out this limited range of exceptions
to the primary prohibition against the disclosure of information. These include
cases where the information is disclosed to assist ASIO, a regulator, or where the
relevant person has given their knowledge or consent to the disclosure of their
information. The important aspect to note about Part 13 is that it is a primary
prohibition which only permits disclosure on a specified exceptions basis. It is not
an authorising provision for any person to demand disclosure of information.
The Telecommunications (Interception) Amendment (Stored Communications) Act 2004
(the 2004 Amending Act) introduced the concept of stored communications
and provided that a stored communication could be intercepted without the need
for a telecommunications interception warrant. Whilst it introduced the concept
of stored communications, the 2004 Amending Act did create some confusion
regarding the particular situations in which a stored communications is deemed to
be passing over a telecommunications system. The Telecommunications (Interception)
Amendment Act 2006 (the 2006 Amending Act) clarified the procedures around
the interception of stored communications and implemented a separate warrant
regime for accessing stored communications.
4.2 The 2006 Amending Act
The 2006 Amending Act contains a general prohibition on the interception of
stored communications in the same manner as telecommunications interceptions
are prohibited in s.108 of the Act. It also provides for certain exceptions in which a
stored communication can be intercepted. These include where access is authorised
by a stored communications warrant, where access is authorised by an interception
warrant and certain other specific circumstances in s.108(2) of the Act.
Relevantly for our discussion, a “stored communication” is defined to mean a
communication with the 4 specific elements prescribed in s.5 of the Act:
Page 87
The Second Workshop on the Social Implications of National Security
•
•
the communication must have passed over a telecommunications system;
the communication must not be passing over that or any other telecommunication
system;
• the communication must be held on equipment operated by the
telecommunication carrier at its premises; and
• the communication must be accessible to the intended recipient of the
communication.
The concept of “passing over” is clarified within the 2006 Amending Act by
providing that a communication that is passing over a telecommunications system
continues to do so until it can be accessed by the “intended recipient” of the
communication in s.5(f) of the Act. “Intended recipient” is defined as in s.5(g) of
the Act as:
• individuals to whom the communication is addressed to;
• if not an individual, any person within a group who is able to access
communications sent via that address; or
• any person, or any employee or agent of the person, who has control over the
telecommunications services to which the communication was sent.
The Act also defines the concept of accessing a stored communication to mean
listening to, recording or reading a stored communication, by means of equipment
operated by a carrier, without the knowledge of the intended recipient in s.6A(a).
The distinction of knowledge means enforcement agencies are only regulated by
the stored communications regime when they are acting covertly in accessing these
communications. When acting overtly, existing access and compulsion powers of
the enforcement agencies remain applicable.
4.3 The warrant regime
The 2006 Amending Act inserted a separate warrant regime for access to stored
communications held by a telecommunications carrier. ASIO and enforcement
agencies are treated differently within the regime.
ASIO can access stored communications in the same manner as it is able
to intercept communications under a named person warrant in s.9(1a) of the
Act. This means the Attorney-General may issue warrants to ASIO to intercept
communications where the communications are being used by a person who is
“reasonably suspected” of engaging in (or likely to engage in) activities prejudicial
to security and the interception will, or is likely to, assist ASIO in its function of
obtaining intelligence relevant to security.
In contrast, a stored communications warrant can be made available under a
different and arguably lesser threshold, substantively set out in s.116 of the Act, to
an enforcement agency that is investigating a “serious contravention”; or an offence
which is punishable by a maximum period of imprisonment of at least three years,
or a pecuniary penalty of at least 180 penalty units. Indeed this is not a trivial
threshold, however the point to note is that the scope of offences defined as “serious
Page 88
The Second Workshop on the Social Implications of National Security
contraventions” prescribed in s.5E of the Act is finite, but the decision to issue the
warrant remains discretionary and based on the information made available to the
authority issuing the warrant. Additionally, all enforcement agencies (criminal,
civil and public revenue agencies) can obtain access to a stored communications
warrant, whereas only law enforcement agencies (the Australian Federal Policy, the
Australian Crime Commission and declared State and Territory law enforcement
agencies) can obtain an interception warrant.
A stored communications warrant is only in force until it is first executed or
5 days after the day it is issued, whichever occurs first, pursuant to s.119(1) of the
Act.
4.4 Application of the legislative framework to email
communications
Just as the Act imposes a primary prohibition against interception, stored
communications are also subject to a primary prohibition against access. It is an
offence, subject to penalties of 2 years imprisonment and/or a significant monetary
fine, for a person to access a stored communication or otherwise authorise access
without the knowledge of the recipient or the sender of the communication in
s.108 of the Act.
“Access” is defined to mean listening to, reading or recording a communication.
The threshold, like the other tests in the Act, is whether or not the intended recipient
had knowledge of the access in s.6AA.
Two initial observations are relevant:
• The Note to the prohibition against access in s.108 of the Act specifically
excludes accessing communications that are no longer passing over a
telecommunications system from the intended recipient. It appears this is
intended to exclude the forwarding of communications, and the recipient of
that forwarded communication accessing that message (either email, SMS or
MMS).
• The knowledge threshold in the definition of “access” refers only to the
knowledge of the intended recipient. However, the threshold in s.108 which
states the prohibition against access refers to the knowledge of neither the
intended recipient or the sender of the communication. One would think that
the appropriate drafting would refer to a prohibition against access without the
knowledge of either the sender or the recipient of a stored communication.
The conjunctive definition of a “stored communication” as noted above, appears
well-suited to describing an email communication. An email indeed becomes stores
when it ceases passing over a telecommunications system, is held on equipment
operated by and in the possession of a carrier (for example, the carrier’s server or
network equipment); and is unable to be accessed without the assistance of an
employee of the carrier (excluding a person who is not a party to the communication,
ie the sender or a recipient).
Page 89
The Second Workshop on the Social Implications of National Security
This describes the normal functionality of an email communication. It leaves
the server of an end user, which may be a company, and is carried by an ISP hosted
on a carrier’s network. That ISP of course may be the ISP of the host carrier (for
example, BigPond on the Telstra Network). The electronic message is then carried
to the ISP of the recipient’s ISP located on the host’s carrier network, to the server
of the end user as delivered to the recipient.
4.5 SMS/MMS communications
The definition of a stored communication, combined with the clarification of
the “passing over” concept (noted above), becomes problematic for SMS/MMS
communications. The Act has been constructed to describe the email scenario
where a communication passes over a system and is then accessed by a recipient.
The only other opportunity for access arise on the carrier side, by reference to the
equipment that stores the email communication on the carrier’s side.
In contrast, SMS/MMS communications are “store and forward” messages.
Unlike the direct transmission of an email from server to server via a network,
SMS/MMS messages are relayed by the sender’s device indirectly to the recipient
via a short message service centre or a (SMSC) or a mobile message service centre
(MMSC). The SMS/MMS message sits in the SMSC/MMSC which is essentially
a processor. The processor attempts to forward the message to the recipient device,
often making several attempts over a defined period, such as 24 hours, before the
delivery is successful. This is set out in Figure 1. It is informative to note that the
when a mobile handset displays “message sent” it simply means that the message
has been received by the SMSC. The two parts of the SMS message, the mobile
originated and mobile terminated are independent of each other.
M o b i l e o r i g i n a t ed
M o b i l e t er m i n a t ed
Sh o r t M essa g e Ser v i ce Cen t r e
Figure 1 – SMS as store and forward technology
Due to the enormous volume of messages transmitted to the SMSC/MMSC
in any given period, messages are routinely deleted by carriers on a daily basis. As
is commonly known, electronic files are never completely expunged completely
and retrieval of messages is not impossible but extremely difficult and requires
expensive technical processes to even locate an identifiable message. The relevance
of this point is that the definitions of “stored communication”, “passing over” and
Page 90
The Second Workshop on the Social Implications of National Security
“intended recipient” combined to require a communication to be accessible to the
recipient and held on equipment operated by the carrier at its premises. In terms
of the latter requirement, it is not impossible for a SMS/MMS to continue to be
held on carrier equipment in some form.
However, the requirement for the communication to be accessible to the
recipient is incapable of being satisfied. Once an end user deletes an SMS/MMS from
their device, the message is incapable of being accessed by that person. Importantly,
a carrier has no way of knowing whether or not a message has been deleted from
an end user’s device. The consequence is that it is impossible for a carrier to know
whether the fourth limb of the stored communication definition is satisfied at any
point in time.
The practical implications for the carrier include making a judgment on whether
or not access to a communication is subject to the new stored communications
warrant regime, or whether a search warrant is required pursuant to criminal
legislation. This is highly problematic for the carrier, as warrants must be complied
with. At the same time, a carrier risks criminal penalties for improper disclosure of
communications. The inconsistencies require a judgment call that is impossible to
satisfy in a practical sense.
4.6 Application of the legislative framework to instant messaging
The application of the Act to instant messages is even more problematic. Instant
message systems do not have any central storage facility. Instead, as set out Figure
2, messages are sent directly between users and the only need for a central system is
to be able to identify the Internet Protocol address of the two parties to a message
exchange.
I n st a n t m essa g e o p er a t o r
m a i n t a i n s d a t a b a se o f I P
a d d r esses
I n t er n et
User s
co m m u n i ca t e
o n p eer t o p eer
b a si s
Figure 2 – Peer to peer nature of instant messaging
Page 91
The Second Workshop on the Social Implications of National Security
When a person logs onto an instant message account such as Microsoft Messenger
or Yahoo! Messenger, the central database checks to see if any of the person’s contacts
from their “buddy list” are also signed into the system. Part of the process of signing
in, allows the instant message system to identify the Internet Protocol address being
used. Once the Internet Protocol addresses are known, each of the users of the instant
message system can contact each other directly on a peer to peer basis. That is, there is
no stored communication (but nor is there a standard form of communication which
could easily be identified under a telecommunications interception warrant).
5
Operation of the law in practice
The introductory comments to this paper noted that operators who are
subjected to the access and interception regime are being faced with the increasing
difficulty of acting in the spirit, but not to the letter, of the law in matters of law
enforcement. Whilst telecommunications is not alone as an industry in operating
in a self-regulatory environment, our experience as legal and technical practitioners
advising most of Australia’s operators at some point has led to the conclusion that
there are 3 key problems arising in the sector on matters of law enforcement.
First, some existing practices by law enforcement agencies are based on
convention rather than the letter of the law. For example, we are frequently called
to advise on warrants which have either expired, not been properly served, or are
invalid for other fundamental reasons such as mis-naming the operator on whom is
it purported to have been served. Frequently, warrants incorrectly cite the grounds
on which access is being demanded. For example, s.282 of the Telecommunications
Act 1997 is regularly stated as the basis on which access is being sought by an LEA.
This is a legally incorrect ground for access. Section 282 is a provision which
permits a person (in this case, a carrier) to disclose information to a LEA if that
disclosure will assist in the enforcement of the criminal law and other matters. It
operates as one of the exemptions to what would otherwise be an offence by the
carrier to the prohibition against disclosure of communications information that
is protected by law. It is not a provision which gives an LEA any rights at all to
demand information, whether or not under a warrant.
Secondly, the gap between LEA appreciation for the technical limitations of their
requests raises a raft of practical issues. We have seen stored communications warrants
that have been issued covering periods of over 12 months, seeking all SMSs sent and
received by any person in a particular city, containing any or all key words listed in
the warrant including (by way of illustration only) “Arab”,“building”,“suitcase” and
“car”. Granted that certain combinations of words are likely to satisfy a reasonable
suspicion test and may be no doubt critical to identifying and averting serious crimes,
there still appears to be a limited understanding of the time and complexity involved
for an operator to conduct a search of this nature and present it to an LEA in a
meaningful way. As mentioned earlier, SMSCs are purged of SMSs daily to prevent
the need for each operator to install a hardware the size of Tasmania to store the
Page 92
The Second Workshop on the Social Implications of National Security
billions of messages that are sent and received from their respective networks.
Thirdly, the level and multiple forms of regulation that permeate every aspect
of the telecommunications operator’s business – from its contracts with customers
to the level of interconnection charges it can impose on other operators – means
that the players have an acute awareness and sometimes heightened sensitivity to
regulation that is often inconsistent and misunderstood. Take for example the
by-product reactions of some law enforcement spokespeople during the recent
Haneef proceedings. We saw some of the most senior LEAs in Australia calling for
identity checks to be undertaken before SIM cards were sold to consumers. As
anyone who has a pre-paid mobile service will attest, a system of pre-paid identity
verification has operated in Australia for years, as well as an existing statutory
requirement for all operators to provide information about phone numbers and
their subscribers to an integrated public number database (IPND). Our experience
is that telecommunications operators understand that the nature of the industry
requires a form and level of regulation not seen in other sectors, but inconsistent
approaches to regulation and continually being made “the fall guys” for the sake of
a media grab does nothing to progress the carrier-LEA relationship.
The following examples provide a flavour of the issues that arise for carriers in
their access and interception compliance obligations on an almost daily basis:
5.1 Operators receiving stored communications warrants for SMS
Despite the analysis presented above, various LEA have served warrants on
mobile operators for the contents of SMS. The practical result of such a warrant
is that the operator provides the LEA with the communication content of all SMS
for any identified target individual. That is, personnel within the mobile operator’s
business determine that it is more appropriate to respond to a warrant which may
be incorrectly served than it is to decline to fulfil the warrant on the basis that to
do so could lead to that individual serving a prison term of up to two years.
5.2 Operators receiving warrants for instant messaging
As set out above, instant messages are peer to peer communications which are not
stored (other than on the computers of the users). Nevertheless, operators of instant
messaging systems do receive requests for assistance and the Australian branches of
the multinational corporations which provide such services may receive warrants.
The practical result of the warrant being served is that the operator of the instant
messaging system routes messages specifically to a facility so that the messages can
be recorded and sent on to the requesting LEA.
5.3 State bodies seeking assistance in contravention of
Commonwealth statute
Certain State-based statutory bodies have power under their establishing
legislation to demand the production of documents and materials. Despite the
Page 93
The Second Workshop on the Social Implications of National Security
fact that there is an obligation not to disclose material of the form of interception
related information under the Telecommunications Act 1997, the normal outcome
of such requests is that the material is provided to the State body - despite the fact
that such inconsistencies should mean that Commonwealth law “trumps” State law
by virtue of the Constitution.
5.4 Requests for information or action without a warrant
It is common practice for bodies such as LEAs and public prosecution entities
to issue requests for information or action by operators in the absence of a warrant,
citing provisions such as s.282 of the Telecommunications Act 1997 as the head of
power. As mentioned previously, this is an exemptions provision and not a standalone
head of power. In some cases when the validity of those requests is questioned on
this basis, we know of operators that have had s.313 of the Telecommunications Act
quoted back to them. Section 313 is an “umbrella” obligation that requires a carrier
or carriage service provider to give LEAs “such help as is reasonably necessary” to,
among other things, safeguard national security. The purposive approach to statutory
interpretation appears to have been disregarded by reliance on such a broad power
rather than specific provisions of the Act.
6
Discussion
The case studies and the legislative changes lead to a simple question: “Why do
the employees of telecommunications operators and the operators themselves, risk
prison time to deliver material to LEAs, simply because they are asked?”
It seems to us that the answer to this question must lie in a reasonable risk analysis
having been performed by the individual concerned. That is, the telecommunication
operator’s personnel take a view that the Australian Communications and
Media Authority (ACMA) which is responsible for enforcing elements of the
Telecommunications Act 1997 engages in regulatory forbearance when LEAs take
decisions that material is required.
This appears to be part of a more general trend which is reflected in the
legislative amendments that were introduced in 2006 and which are proposed
for 2007. Broadly, this sees the movement of responsibility for law enforcement
aspects of the telecommunications legislative and regulatory regime moving from
the Department of Information Technology, Communications and the Arts to the
Attorney General’s Department. The consequence of this change is dramatic in
that the objects of the Telecommunication Act form part of the interpretation of that
Act when it applies to law enforcement. These objects are drafted to promote the
long term interests of end users by strong development and innovation within the
telecommunications sector. In contrast, the Act has no objects and is solely devoted
to interception issues.
That there has been this shift in regulatory authority reflects government policies
since 9/11 in respect of security matters. We do not question the need for this shift
Page 94
The Second Workshop on the Social Implications of National Security
or the relevance of Australia’s enforcement agencies. What we do question is the
quality of some key elements of legislative drafting in Australia, that has been the
core of many of the commercial uncertainties described above.
7
Conclusions
Telecommunications operators in Australia are being increasingly compelled
to compromise their strict obligations under the law with a desire to be viewed
as co-operative rather than obstructionist with LEAs. Our view is that too many
“commercial calls” and “one-off relationship decisions” are made on issues of
national security obligations that should be clearly articulated in legislation and
in practice. This is an untenable situation and needs to be urgently addressed by a
more thorough and thoughtful application of the law by all parties. Regulation of
telecommunications for national security purposes is rightly viewed as serious. It
should be applied seriously and with the strictest and most robust legal standards.
The social implications of our conclusions are stark. There is an individual
expectation that calls will not be intercepted and that communications will not be
accessed because, as a matter of law, there is a strict prohibition on such interference.
In practice, this strict prohibition has been compromised under the banner of
commercial expediency and an over-zealous support of the spirit (but not the
letter) of a legislative regime which seeks to provide protections against terrorism
and other crimes. If the results of this enthusiasm are a reflection of the inadequacy
of parliamentary drafting, then the appropriate course is to redraft the legislation.
References
Bawa, N. 2006. “The Regulation of the Interception of Communications
and Provision of Communication Related Information Act.” In
Telecommunications Law in South Africa, eds. Lisa Thornton,Yasmin
Carrim, Patric Mtshaulana and Pippa Reyburn. Johannesburg: STE
Publishers.
Bellovin, Steven , Matt Blaze, Ernest Brickell, Clinton Brooks,Vinton Cerf,
Whitfield Diffie, Susan Landau, Jon Peterson and John Treichler. 2006.
“Security Implications of Applying the Communications Assistance to Law
Enforcement Act to Voice over IP.” Washington: Information Technology
Association of America.
Branch, Philip A. 2003. “Lawful Interception of the Internet.” Melbourne: Centre
for Advanced Internet Architectures, Swinburne University of Technology.
Del Bianco, Mark C. 2006. “Voices Past: The Present and Future of VoIP
Regulation.” CommLaw Conspectus 14:365-401.
Drinan, H., N. Fontaine and B. Kesler. 2005. “News Briefs.” Security & Privacy
Magazine, IEEE 3(6):7-8.
ETSI. 2007. “Lawful Interception (LI): Handover interface for the lawful
interception of telecommunications traffic. ETSI ES 201 671 V3.1.1 (2007Page 95
The Second Workshop on the Social Implications of National Security
05).” Sophia Antipolis Cedex - FRANCE: European Telecommunications
Standard Institute.
Fonknechten, D., B. Ghribi, C. Besset and B. Aidan. 2004. “Service Aware
Intelligent GGSN.” Alcatel Telecommunications Review 1st Quarter
2004:2-10.
Gidari, Albert. 2006. “Designing the Right Wiretap Solution: Setting Standards
under CALEA.” IEEE Security and Privacy(May/June 2006):29-36.
Gratzer,V., D. Naccache and D. Znaty. 2006. “Law enforcement, forensics and
mobile communications.” In Pervasive Computing and Communications
Workshops, 2006. PerCom Workshops 2006. Fourth Annual IEEE
International Conference on.
Holland, Bradley. 2004. “Overtaking privacy in the telecommunications transit
lane.” Privacy Law and Policy Reporter 10.
Landau, Susan. 2005. “Security, Wiretapping and the Internet.” Security and
Privacy Magazine, IEEE(December 2005):26-33.
Miettinen, Kari. 1999. “Lawful Interception in GPRS/UMTS Network.”
Helsinki: University of Helsinki.
Milanovic, A., S. Srbljic, I. Raznjevic, D. Sladden, I. Matosevic and D. Skrobo.
2003a. “Methods for lawful interception in IP telephony networks based on
H.323.” In EUROCON 2003. Computer as a Tool. The IEEE Region 8.
Milanovic, A., S. Srbljic, I. Raznjevic, D. Sladden, D. Skrobo and I. Matosevic.
2003b. “Distributed system for lawful interception in VoIP networks.” In
EUROCON 2003. Computer as a Tool. The IEEE Region 8.
Miller, H. G., H. D. Levine and S. N. Bates. 2005. “Welcome to convergence:
surviving the next platform change [Internet protocol].” IT Professional
7(3):18-25.
Nolin, Christopher A. 2006. “Telecommunications as a Weapon in the War of
Modern Organized Crime.” CommLaw Conspectus 15(Fall 2006):231.
Open Mobile Alliance. 2005. “Push to talk over Cellular (PoC) - Architecture.”
La Jolla: Open Mobile Alliance.
Schwaderer, Curt. 2007. “Lawful surveillance systems: Enforcing justice while
protecting individual privacy.” In CompactPCI and AdvancedTCA Systems.
Street, M. D. 2003. “Interoperability and international operation: an introduction
to end to end mobile security.” In Secure GSM and Beyond: End to
End Security for Mobile Communications, IEE Seminar on (Digest No.
2003/10059).
Williams, Nigel and Joanne Ly. 2004. “Securing Public Instant Messaging (IM) At
Work.” Melbourne: Centre for Advanced Internet Architectures, Swinburne
University of Technology.
Page 96
The Second Workshop on the Social Implications of National Security
8
Australia and the ‘War against
Terrorism’: Terrorism, national
security and human rights1
Mark Rix
Senior Lecturer, Graduate School of Business, University of Wollongong
Abstract
This paper considers whether in the ‘war against terrorism’ national security is eroded or
strengthened by weakening or removing the human rights of the individuals who constitute
the polity. It starts with the view that national security is, at its most fundamental, founded
upon the security and liberty of the person from criminal and violent acts, including terrorist
attacks. Such attacks, and the individuals and groups who perpetrate them, constitute
a grave threat to the peace and security of nations the world over and thus endanger the
security and liberty of the individuals who make up their populations. Governments are
therefore compelled to use the machinery of the state to protect the nation and the individual
from these attacks. However, the paper is based on another, equally important, assumption.
This is that the defence of national security requires individuals to be protected from the
arbitrary exercise of state power even in situations where the state claims to be acting
to protect national security and individual security against grave threats such as terrorist
acts. The rule of law not only protects individuals from such an exercise of state power by
protecting their human rights, in so doing it also protects the peace and security of the
nation from excessive and unchecked state power. But what happens when the rule of law
is overturned by governments declaring that they are protecting national security from the
terrorist threat? Who or what is then able to protect the individual and the nation from the
state? This paper will take up these important questions by considering the implications
of the anti-terrorism legislation that has been introduced in Australia since September
2001. It will also consider whether Australia’s national security has been enhanced or
damaged by this legislation.
Keywords: ‘war against terrorism’, national security, human rights, security and liberty of
the person, state power, rule of law
1
I am grateful to my colleagues Susan Dodds and Luke McNamara for helping me to clarify several of the
thorny issues discussed in this paper. Naturally, the usual disclaimers apply.
Page 97
The Second Workshop on the Social Implications of National Security
1
Introduction
This paper will investigate whether Australia requires a new conception of national
security that better equips it to meet the challenges it faces in the age of terror than
the conventional conception. In the conventional view, a major challenge facing the
Government is to balance its responsibility to protect the community from terrorist
attack with its equally important responsibility to respect individual human rights
and uphold the rule of law. According to this view, however, sometimes the defence
of national security requires human rights and the rule of law to be relegated to a
much lower priority. Instead, this paper argues that a new conception of national
security is required which embeds human rights and the rule of law in national
security. On this view, therefore, in defending national security human rights and
the rule of law also have to be protected. Put another way, the protection of human
rights and the rule of law is effectively the defence of national security.
Focusing on two of the most important and far-reaching pieces of anti-terrorism
legislation, the paper will consider the exceptional measures contained in Australia’s
anti-terrorism legislation. These are the ASIO Act (2003) and the Anti-Terrorism
Act (No. 2) (2005). The analysis of the exceptional measures will address two
separate but inter-related questions: 1) Are the exceptional measures included in
the anti-terrorism legislation necessary to protect Australia’s national security in
face of the terrorist threat? 2) Are there any protections available for the individual
and society from abuse of state power when a government weakens the rule of law,
thereby diluting the human, civil and political rights it protects, claiming that this
is an essential measure to protect national security from the terrorist threat? The
exceptional measures include removal of the right to remain silent, reversal of the
onus of proof, and the detention in secret of non-suspects merely for questioning
(Rix 2006). Moreover, the two Acts to be considered in the paper place tight
restrictions on the disclosure of information about cases in which persons are held
in custody by the security agencies. Under these circumstances, it is extremely
difficult for independent legal representatives to scrutinise and monitor the activities
of the security agencies thus impeding them from exercising the right of habeas
corpus on behalf of detained persons.They are also prevented from mounting media
and advocacy campaigns around such cases. The Government maintains that the
exceptional measures provide the Government and national security authorities
(including ASIO and the Australian Federal Police) with essential powers for
effectively meeting and neutralising terrorist threats (see, for example, Ruddock
2004 and 2005).
2
Australia’s national security, the terrorist threat and
human rights
Two fundamental assumptions underpin the paper. First is the view that national
security is founded upon the security and liberty of the person from criminal and
Page 98
The Second Workshop on the Social Implications of National Security
violent acts, including terrorist attacks.This puts a heavy responsibility on the state,
and the government administering it, to take effective measures to protect people,
as individuals and as members of social and economic groupings, from threats and
acts of this nature.Working from this basic assumption, governments are compelled
to use the machinery of the state, and the law and legal system framing it, to take
measures to protect individuals, the social and economic infrastructure of society,
and the state itself from attacks mounted by terrorist organisations and individuals.
However, the paper’s second underlying assumption is that the defence of national
security requires individuals to be protected from the arbitrary exercise and abuse
of state power even in situations where a government claims to be acting to protect
national and individual security from the threat of terrorism. On this view, the rule
of law not only protects the individual from the state, in so doing it also protects
the security and freedom of the nation from state repression. In the words of former
President of the Israeli Supreme Court Aharon Barak “There is no security without
law. Satisfying the provisions of the law is an aspect of national security” (Barak J
cited in Kirby J 2005: 328). Legislation which does not respect the rule of law and
the human and other rights it protects cannot credibly claim to be able to offer
an effective defence of the individual or the nation against threats and attacks by
terrorists who have nothing but contempt for these rights and for the rule of law.
As Martin Scheinin, the UN Special Rapporteur on the promotion and protection
of human rights and fundamental freedoms while countering terrorism asserts in
his study of Australia’s human rights compliance while countering terrorism:
States have a duty to protect their societies and to take effective
measures to combat terrorism. States are also obliged, by reason of their
international obligations and as emphasized in various documents of
the United Nations, including resolutions of the Security Council, to
counter terrorism in a manner that is consistent with international
human rights law. As stated in the United Nations Global CounterTerrorism Strategy (part IV) effective counter-terrorism measures and the
protection of human rights are not conflicting goals, but complementary
and mutually reinforcing ones.The defence of human rights is essential
to the fulfilment of all aspects of a global counter-terrorism strategy
(Scheinin 2006: 5; a number of relevant Security Council resolutions
will be briefly considered in the following section).
Attorney-General Philip Ruddock, in his 2004 paper ‘Australia’s Legislative
Response to the Ongoing Threat of Terrorism’ seemed to be in agreement with
the sentiments that were expressed by the Special Rapporteur. In the paper, the
Attorney-General asserted that the focus of measures to combat terrorism should
be on “creating ‘human security’ legislation that protects both national security and
civil liberties” (Ruddock 2004: 254). Recognising that “[t]he tightening of security
will have some effect on certain rights”, he assured his readers that “it is our duty
to ensure that we employ measures to minimise the impact of counter-terrorism
Page 99
The Second Workshop on the Social Implications of National Security
laws on human rights” (Ruddock 2004: 254). Ruddock also responded to criticisms
that the Government’s anti-terrorism “efforts” had failed “to adequately protect our
civil liberties” (Ruddock 2004: 255).While these criticisms were based “on the false
assumption that counter-terrorism legislation is inevitably at odds with the protection
of fundamental human rights”, Ruddock did nevertheless have to admit that “the
Government has sometimes compromised on these points to achieve the overriding
goal of enacting new laws to combat terrorism” (Ruddock 2004: 255).
Since, September 11, 2001 there has been a substantial increase in the volume
of Australia’s anti-terrorism legislation. During its hearing into Australia’s antiterrorism laws, the Eminent Jurists Panel on Terrorism, Counter-Terrorism and
Human Rights of the International Commission of Jurists (ICJ) remarked that its
attention had been “drawn to the large number of laws enacted since 2002 as part
of Australia’s strategy to counter terrorism” (EJP 2006: 1). In an earlier publication,
ICJ Australia had pointed out that “[a]s at September 11, 2001, there was in place
a patchwork of some 35 pieces of Commonwealth legislation in Australia relating
to terrorism, dealing with issues including air navigation, police powers, chemical
and biological weapons, criminal offences, hostages, immigration, border protection,
intelligence, nuclear non-proliferation, proceeds of crime, telecommunications, and
weapons of mass destruction” (ICJ Australia 2004: 1). High Court Justice Michael
Kirby has also called attention to the fact that since the attacks of September 2001
“17 items of legislation restricting civil freedoms have been adopted by the federal
Parliament” with complementary State legislation also being passed (Kirby J 2004:
226).
According to the Eminent Jurists Panel, Australia is widely regarded and
admired “as a country with longstanding democratic practices” in which “[t]he
independence of the judiciary, respect for the rule of law, the rights of the accused
and an accountable justice system are well established” (EJP 2006: 1). It also noted
that both civil society and the media are “active and vibrant”. Taken together all
these factors “provide an important protection against the arbitrary use of powers”
by the state and its agencies (EJP 2006: 1). However, the EJP also sounded a note
of caution:
Members of civil society and the legal community questioned whether
many of the new laws were indeed required. They stressed the need to
complement counter-terrorism laws with the ability to effectively test
them in court for compliance with international human rights standards.
Concerns were raised regarding provisions that have introduced broadly
defined offences, allowed retrospective application of the law, expanded
powers of the executive branch of government and constrained avenues
of judicial review and due process of law (EJP 2006: 2).
A number of the issues raised by the Eminent Jurists Panel will be taken up below
in the discussion of the exceptional measures that are included in the ASIO Act and
the ATA Act (No. 2).These exceptional measures include the executive proscription
Page 100
The Second Workshop on the Social Implications of National Security
power and the detention in secret of non-suspects merely for questioning and
intelligence-gathering purposes.
3 Australia’s anti-terrorism legislation: review and reality
Like the Eminent Jurists Panel, Martin Sheinin, the UN Special Rapporteur,
acknowledged that the need for legislative reform since 11 September 11 2001
had been questioned by “[m]any from civil society”. But, as he points out, while
the Australian Government itself acknowledged in a report to the UN CounterTerrorism Committee in 2003 that the pre-2001 legislative framework for counterterrorism was adequate and comprehensive—after all, as at September 11 2001, there
were already 35 pieces of terrorism-related legislation on the statute books—there
had nevertheless been a need to bring the existing legislation into line with UN
Security Council Resolution 1373. This resolution calls on States to prevent and
suppress the financing of terrorism and to criminalise providing or collecting funds
to finance acts of terrorism.There had also been a need to comply with the work of
the UN Security Council Al-Qaida and Taliban Sanctions Committee established
by UN Security Council Resolution 1267 in 1999. This Committee, amongst
other things, maintains and constantly updates (based on information provided
by members states) Consolidated Lists of individuals and groups belonging to or
associated with Al-Qaida and of groups and individuals belonging to or associated
with the Taliban. Under Resolution 1267 all States are obliged “to freeze the assets,
prevent the entry into or the transit through their territories, and prevent the direct
or indirect supply, sale and transfer of arms and military equipment, technical advice,
assistance or training related to military activities, with regard to the individuals and
entities included on the Consolidated List” (UN n.d.).
The Special Rapporteur also referred to the 2006 Report of the Security
Legislation Review Committee (SLRC) in his report. He noted that the SLRC “was
satisfied that separate security legislation, in addition to the general criminal law, was
necessary in Australia” (Scheinin 2006: 4; see SLRC 2006: 3). However, unfortunately
the Special Rapporteur did not mention several aspects of the SLCR’s report which
should have been taken as caveats on the SLRC’s statement regarding the necessity
of separate and additional security legislation (several of these same caveats, and for
similar reasons, apply to the Parliamentary Joint Committee on Intelligence and
Security’s 2006 Review of Security and Counter Terrorism Legislation; see PJCIS
2006). These caveats reveal the difficulties in fully protecting the human rights of
Australians in the absence of a Bill or Charter of Rights.They also demonstrate that
such an instrument would play an important role in opening up the Government
and the law enforcement and security agencies to greater public scrutiny by making
them subject to a more effective accountability regime. Before considering these
aspects of the report in some detail, some background information on the SLRC
and the legislation it reviewed is required.
The independent Security Legislation Review Committee was established by
Page 101
The Second Workshop on the Social Implications of National Security
the Federal Attorney-General on 12 October 2005 with the Honourable Simon
Sheller AO QC appointed as Chairman (thus, the Committee was known as the
Sheller Committee).The Committee was composed of major stakeholders including
the Inspector-General of Security and Intelligence, the Privacy Commissioner,
the Human Rights Commissioner, the Commonwealth Ombudsman and a
representative of the Law Council of Australia. The latter is “the peak national
representative body of the Australian legal profession, representing approximately
50,000 Australian lawyers through its representative bar associations and law
societies” (SLRC 2006: 20). The Committee conducted a public inquiry which
received nearly 30 submissions and took evidence from 18 witnesses during hearings
in Melbourne, Sydney, Canberra and Perth. It reported to the Attorney-General
on 21 April 2006 who tabled its report in the Parliament on 15 June 2006.
The SLRC was established pursuant to section 4(1) of the Security Legislation
Amendment (Terrorism) Act 2002 (the SLAT Act) as amended by the Criminal
Code Amendment (Terrorism) Act 2003. Under Section 4(1) the Attorney-General is
required to review “the operation, effectiveness and implications” of the amendments
made by the SLAT Act itself, the Suppression of Financing of Terrorism Act 2002,
Criminal Code Amendment (Suppression of Terrorist Bombings) Act 2002, Border
Security Legislation Amendment Act 2002, Telecommunications Interception
Legislation Amendment Act 2002 and Criminal Code Amendment (Terrorism) Act
2002 (SLRC 2006: 17). Here is the first caveat on the SLRC’s report. The SLRC
was established to review the operation, effectiveness and implications of the antiterrorism legislation enacted in 2002 and 2003, not the subsequent and even more
far-reaching legislation, in particular, the ASIO Act and the ATA Act 2005 which
will be considered below.The task of reviewing amending legislation was made even
more difficult for the SLRC because, since the enactment of the six amending Acts
it was mandated to review “the several amendments they made to other legislation,
such as the Criminal Code Act 1995 (Criminal Code), were later further amended”
(SLRC 2006: 17). This is a second caveat on the SLRC report, for the complexity
and confusion created by the use of amending legislation has been a defining feature
of the manner in which the Government has pushed the anti-terrorism legislation
through both houses of the Parliament. This has involved
the use of sprawling, omnibus legislation by which multiple Acts are
amended in a complex web of interlocking changes within a single
amendment Bill, which makes extensive debate and parliamentary
supervision difficult; an absence of appropriately argued justification
for such significant changes; minimal time for consideration of the
legislation by parliamentary committees; and, finally, a determination on
the part of the Government to implement its original proposals in the
face of parliamentary and community concerns (Hocking 2004: 322).
It is interesting that the SLRC did comment on the limited time available to it
for review of the legislation.As well as being granted only six months to conduct the
Page 102
The Second Workshop on the Social Implications of National Security
review (covering, as it pointedly noted, the Christmas/New Year and Easter holiday
periods) the Committee had difficulty in reviewing the operation, effectiveness and
implications of the “significant amendments” to the relevant legislation because it
was required to do so very soon after they had come into effect. Together, these
can be taken as a third caveat, for the Committee had very little opportunity to
conduct the comprehensive and far-reaching review that was required to ensure
that fundamental human rights and the rule of law were being safeguarded in the
legislation.
In addition to the above, a fourth caveat, the Committee was concerned with
the perplexing and significant issue of which version of the legislative amendments
that should have been subject to review. It sought the advice of the Australian
Government Solicitor as to whether its examination should be confined to the
original text of the amending Acts or broadened to include the amendments
contained in other legislation that had been created by the original legislation.
Mr Henry Burmester QC, Chief General Counsel of the Australian Government
Solicitor advised in this regard that “so long as the review examined the original
amendments (in the sense of noting that they had been replaced or amended), it
could not be criticised if it took the sensible decision to review the current form
of those amendments” (SLRC 2006: 18). The Committee agreed that this would
be a “sensible” course of action for it to take but was nevertheless concerned that
it would only exacerbate the considerable difficulties it already faced in fulfilling its
mandate of reviewing the operation, effectiveness and implications of the specified
amending legislation. There were two major difficulties here which together
constitute a fifth caveat on its report. First, the Committee did not have access to
information about the way in which the law enforcement and security agencies
had used the legislation or how the relevant provisions had been interpreted and
applied by the courts. Second, and perhaps more significantly, the SLRC had not
“itself received confidential briefings about the level of threat of terrorist activity
currently faced by Australia” (SLRC 2006: 3).This, however, was an issue on which
the Committee undertook to elaborate in its report.
It did so, but only obliquely, in the already cited comments about the difficulties
associated with reviewing not only amending legislation but also subsequent
amendments to the amending legislation. And it did so again in its remarks on the
small amount of time that it had been granted to review the operation, effectiveness
and implications of this complex web of amending legislation so soon after its
enactment. While these comments are interesting and valuable in their own right,
they do not address the more fundamental concern with the secrecy surrounding
the level of terrorist threat currently faced by Australia and whether therefore the
anti-terrorism legislation provides the Government, and the law enforcement and
security agencies it directs, with the resources and means adequate to meet the threat.
In other words, the Committee’s comments tells us next to nothing about whether
the legislation taken as a complete package is actually necessary to protect Australia’s
Page 103
The Second Workshop on the Social Implications of National Security
national security from that threat or even the precise nature of the threat.
The SLRC also expressed some misgivings about the ASIO Act 2003, but only
to point out that its terms of reference prevented it from considering in detail the
exceptional measures contained in that legislation. It was noted above that the SLRC
was established under section 4(1) of the SLAT Act (as amended by the Criminal
Code Amendment (Terrorism Act) 2003) which is headed ‘Public and independent
review of the operation of Security Acts relating to terrorism’. However, as the
SLRC pointed out in its report “Section 4 of the SLAT Act does not refer to
what are arguably the most controversial aspects of the security legislation found
in Division 3 of Part 3 of the Australian Security Intelligence Organisation Act
1979 (the ASIO Act) as currently amended, and in Divisions 104, ‘Control orders’
and 105, ‘Preventative detention orders’ of Part 5.3 of the Criminal Code (SLRC
2006: 22).” These are some of the exceptional measures that will be considered in
the next section. For clarification, the Australian Security Intelligence Organisation
Legislation Amendment (Terrorism) Act 2003 amended the ASIO Act 1979. In
essence, the amendments enable ASIO to obtain a warrant to detain and question
persons (who do not themselves have to be suspected of terrorism offences) in
order to gather intelligence related to terrorist activity. This ASIO Act was further
amended by the ASIO Legislation Amendment Act 2003 to ensure that in planning
and executing warrants ASIO has the ability to collect intelligence and information
that it regards as necessary to prevent a terrorist act.
The Australian Security Intelligence Organisation Legislation Amendment
(Terrorism) Act 2003 (the ASIO Act) that was introduced into Parliament in 2003 was
the outcome of a lengthy process of community consultation, inquiries conducted
by several parliamentary committees such as the Parliamentary Joint Committee
on ASIO, ASIS and DSD (renamed the Parliamentary Joint Committee on
Intelligence and Security in late 2005), and wider parliamentary debate. Some minor
improvements were made to the bill’s original harsh provisions such as those allowing
for incommunicado detention, executive proscription and preventing independent
legal representation for suspects during detention. But the Government’s earlier
failure to gain full Parliamentary endorsement of some of the harsher measures it
had proposed for inclusion in the SLAT Act, in particular the proscription power,
appears to have strengthened its resolve.When first introduced by the Government
into Parliament, the SLAT Act had contained provisions enabling the Executive
to proscribe so-called ‘terrorist organisations’ by allowing the Minister (AttorneyGeneral) to issue just such a proscription on his own authority. After community
consultation and parliamentary review a compromise was reached whereby “an
attenuated form of the power [of proscription] was introduced which allowed
provision for the proscription of organizations listed by the United Nations as
‘terrorist organisations’” (Hocking 2004: 321). As Hocking notes, however, the
Government effectively circumvented the Parliament and challenged its authority
by including the power of ministerial (or, executive) proscription in the Criminal
Page 104
The Second Workshop on the Social Implications of National Security
Code Amendment (Terrorist Organisations) Act 2004. But this was not enough,
for “[i]n late 2003, the Government introduced further amendments to the newly
empowered ASIO Act, seeking stringent secrecy provisions in relation to public
disclosure of the implementation of its detention regime and still further expanded
interrogation powers” including the doubling of the questioning period to 48 hours
if an interpreter had been present at any stage of the interrogation (Hocking 2004:
328).
The ASIO Act gives ASIO the power “to obtain a warrant to detain and question
a person who may have information important to the gathering of intelligence in
relation to terrorist activity” (‘Australian Laws to Combat Terrorism’ n.d.; emphasis
added). The Act defines a warrant “issuing authority” as a person appointed by
the Minister, who can be a federal magistrate or judge or “another class of people
nominated in regulations” (Michaelson 2005: 326). As Christopher Michaelson
points out, this act empowers ASIO to “detain people without judicial warrant
for up to seven days and interrogate them for up to 24 hours (if no interpreter
is present) within that seven-day period” (Michaelson 2005a: 178). Thus, persons
can be detained without charge, and do not even have to be suspected of having
committed any offence to be taken into custody.While being interrogated, a detainee
has to answer all questions and provide all the information or material requested
of them. A detainee also has to prove that they do not have the material requested.
If the detainee is unable to do so and does not provide the material they can be
imprisoned for up to five years. These special detention and questioning powers
granted to ASIO had initially been part of the SLAT Act.The SLRC Report notes
that the inclusion of these provisions in the ASIO Act “generated extensive debate”
which was “in part” about “detention for seven days, removal of the right to silence,
some restrictions on access to legal representation, secrecy of interrogation and the
extension of the system to non-suspects” (SLRC 2006: 22; see also Michaelson
2005a). After reviewing ASIO’s questioning and detention powers in 2005, the
Parliamentary Joint Committee on ASIO, ASIS and DSD recommended that they
be continued beyond the sunset period of July 2006 subject to certain conditions.
The Joint Committee will review the powers again in 10 years (PJCASIO, ASIS
and DSD 2005). In the meantime, the continuation of ASIO’s questioning and
detention powers was confirmed in the ASIO Legislation Amendment Bill 2006.
In addition to the above, the ASIO Act specifies a “prescribed authority” who
watches over a person held in detention for questioning as a federal magistrate or a
member of the Administrative Appeals Tribunal (AAT).The AAT, however, cannot be
regarded as a judicial body. Instead, the International Commission of Jurists Australia
regards the AAT as a “quasi-judicial body” which lacks the full independence of
the judiciary. This is because, with the exception of its presidential members, the
members of the AAT are appointed for fixed periods and are therefore “dependent
on the favour of the executive if they wish to be reappointed” (ASICJ 2004: 3). It
is inferior in this respect to the Special Immigration Appeals Commission (SIAC)
Page 105
The Second Workshop on the Social Implications of National Security
that was established in Britain in the wake of the European Court of Human
Rights ruling in Chalal v. United Kingdom 1996 (Michaelson 2005b: 137).The AAT
is rather more similar to the British ‘three wise men’ body that was superseded
by SIAC. In the Chalal case, the ECHR ruled that the non-judicial body known
as the ‘three wise men’, which up to then had reviewed decisions of the Home
Secretary to remove people from England whose presence in England was regarded
as “not being conducive to the public good” for reasons of national security, was in
contravention of the European Convention on Human Rights (House of Commons
2003). Furthermore, notes Michaelson, “the ‘prescribed authority’ as established
in the ASIO Act cannot be considered a ‘court’ or ‘officer authorized by law to
exercise judicial power’ within the meaning of Articles 9(3) and 9(4) of the ICCPR
[International Covenant on Civil and Political Rights]” (Michaelson 2005b: 137).
The Anti-Terrorism Act (No. 2) 2005 (the ATA Act 2005) was passed into law
in December 2005. The “key features” of the ATA Act 2005 include:
• a regime that will enable courts to place controls on persons who pose
a terrorist risk to the community
• arrangements to provide for the detention of a person for up to 48 hours
to prevent an imminent terrorist attack or preserve evidence of a recent
attack
• an extension of the stop, question and search powers of the Australian
Federal Police (AFP)
• powers to obtain information and documents designed to enhance
the AFP’s ability to prevent and respond effectively to terrorist attack
(Ruddock 2005a).
In issuing a control order a court can impose conditions on an individual
including a requirement that the person wears a tracking device, a prohibition
or restriction on the person talking to other people including their lawyer, and a
prohibition or restriction on the use of a telephone or the internet by the person
(Walton 2005: 4).As for preventative detention, the police can detain without charge
a person who they suspect will carry out an imminent terrorist act or is planning to
carry out such an act. They can also hold someone who they suspect “has a ‘thing’
that will be used in an imminent terrorist act” (Walton 2005: 4). The Act allows
for a person subject to a control order to be informed of why the restrictions were
imposed. However, this “would not require the disclosure of any information that
is likely to prejudice national security, be protected by public interest immunity,
put at risk ongoing law enforcement or intelligence operations or the safety of the
community” with similar conditions applying to an AFP request for variation of a
control order (‘Details of Amendments’; attachment to Ruddock 2005).
The ATA Act 2005 also includes an “updated” sedition offence “to cover those
who urge violence or assistance to Australia’s enemies” (‘Australian Laws to Combat
Terrorism’ n.d.). Commenting on this offence, George Williams points out that “[it]
punishes people with up to seven years’ jail not for what they do, but for what they
Page 106
The Second Workshop on the Social Implications of National Security
say, such as if they urge another person to forcibly overthrow the constitution or
government” (Williams 2006; emphasis added). It includes sweeping bans on free
speech and expression and allows for very few defences against the charge of sedition.
Williams regards it as one of “worst examples of the history of law-making in the
history of the Federal Parliament” and almost without precedent in that “[i]t is hard
to think of another example where a law targeting something as fundamental as free
speech has been enacted as quickly with as many people from all sides of politics
recognising that it needed to be amended even as it was being enacted” (Williams
2006). Chris Connolly remarks that, with the exception of Australia, “no modern
democratic nation has used sedition provisions for 50 years” (Connolly 2005: 14).
Countries that have repealed sedition laws, or which are in the process of doing so,
include Canada, Ireland, Kenya, New Zealand, South Africa,Taiwan, and the United
States. In introducing sedition laws, Australia joins China, Cuba, Malaysia, North
Korea, Singapore, Syria, and Zimbabwe (Connolly 2005: 14; see also ALRC 2006:
Chapter 6, Sedition Laws in Other Countries). In response to such criticisms, the
Attorney-General requested the Australian Law Reform Commission to conduct a
“detailed review” of the crime of sedition. In May 2006, the Commission released its
Discussion Paper 71 ‘Review of Sedition Laws’ which called for the removal of the
term ‘sedition’ from the Federal statute books and a redrafting of the offences relating
to urging force or violence against the government or groups in the community
(ALRC 2006). This recommendation has been rejected by the Government.
4
Australia, the war on terror and human rights protection
Why has Australia’s anti-terrorism legislation failed to provide human rights
safeguards and why has it with so little inhibition been allowed to subvert the rule
of law? Although Australia is a signatory to the International Covenant on Civil
and Political Rights (ICCPR), for example, its anti-terrorism legislation such as the
ASIO Act and the ATA Act 2005 does not conform with its human rights obligations
including those under Article 9 which prohibits arbitrary arrest or detention and
under Article 14 on due process of law (Coutts 2006: 40; see also Michaelson 2005b
cited above). As the SLRC blandly acknowledges in an unintended response to the
question at the opening of this section “Australia has no formal Charter of Human
Rights” (SLRC 2006: 3). Such an instrument would serve as a standard against which
to assess the validity of anti-terrorism legislation and other legislation impinging
on human rights. It would, for example, have allowed the Security Legislation
Review Committee to be more adventurous in its analysis and critique, and to be
more courageous in formulating the recommendations it provided arising from the
review of the legislation. The UN Special Rapporteur has expressed his concern
that “Australia does not have domestic human rights legislation capable of guarding
against undue limits being placed upon the rights and freedoms of individuals”
(Scheinin 2006: 5). While he acknowledges that the “Government of Australia
points to a robust constitutional structure and framework of legislation capable of
Page 107
The Second Workshop on the Social Implications of National Security
protecting human rights and prohibiting discrimination” the absence of domestic
human rights legislation “is an outstanding matter that has been previously raised
by the Human Rights Committee in its observations on Australia’s reports under
the International Covenant on Civil and Political Rights” (Scheinin 2006: 5).
According to George Williams, for many countries with a written constitution
like Australia “constitutional development in the second half of the 20th century
was dominated by concepts of human rights...Canada and South Africa gained
Bills of Rights while the United States saw an existing Bill of Rights expanded
through judicial interpretation” (Williams 2001: 782; see also Williams 2003 and
2004 and Nicholson 2005). In countries such as New Zealand and the United
Kingdom that do not have a written constitution “international human rights
standards were incorporated into domestic law through statutory Bills of Rights”
(Williams 2001: 782). The Eminent Jurists Panel has pointed out that Australia has
yet to enact federal legislation incorporating international standards into national
law, a move which “would help to establish a clear human rights framework based
on international standards” (EJP 2006: 3). For Amnesty International Australia, these
standards “constitute the bare minimum necessary to protect the safety and integrity
of individuals from abuse of power” (AIA 2005: 5-6). Greg Carne points out that
UN human rights bodies, such as the High Commissioner for Human Rights, the
Commission of Human Rights, the Secretary-General, the Secretary-General’s Policy
Working Group on the United Nations and Terrorism, amongst many others, have
long advocated a “more holistic approach” to human rights to ensure that measures
to counter terrorism are consistent with human rights values and the obligations
they entail (Carne 2004: 543). Australia also is not a party to binding international
human rights instruments. A good example of such an instrument, even if it is
not directly applicable in the Australian context, is the European Convention on
Human Rights (and its five protocols) to which many European countries are party
the United Kingdom included. The Convention enables the citizens of European
countries to appeal to the European Court of Human Rights and seek redress if
they believe that the laws of their own countries are in breach of the Convention
(just as in the Chalal case cited above) (Nicholson 2005: 3).
As seen above in the examination of the Security Legislation Review
Committee’s review of Australia’s anti-terrorism legislation, it is hard to gauge
whether the legislation has been effective in protecting Australia from terrorist attack.
Indeed, for those Australians who are not members of the Federal Cabinet or the
law enforcement agencies and security services it is an unanswerable question.This
is because of the secrecy surrounding the issues of whether Australia currently faces
a terrorist threat and, if so, the nature and imminence of that threat. In view of this
secrecy, little can therefore be said in an informed or sensible way about any terrorist
threat that Australia may face in the future. It is thus almost impossible to determine
whether the legislation is actually required to protect Australia’s national security
from the threat of terrorism.This is more than a little unsettling in the light of claims
Page 108
The Second Workshop on the Social Implications of National Security
made by US President Bush and his allies, including the Howard Government, that
the ‘war on terror’ or ‘war against terrorism’ will either be of “uncertain duration”
or “go for years” (see, for example, Power 2007 and ABC 2007). This means that
counter-terrorism measures, like the exceptional provisions included in Australia’s
anti-terrorism legislation, will also be of uncertain duration or go for years. To be
sure, national security is conventionally and rightly regarded as being based upon
the security and liberty of the person from criminal and violent attacks, including
terrorist acts. But, beyond this, the conventional view also holds that there are times
when the protection of national security requires human rights and the rule of law
to be given a lower priority. This gives rise to a significant shortcoming with this
view of national security, namely, its strong tendency to relegate the security and
liberty of the person to a secondary consideration after state security.
If the volume of anti-terrorism legislation and the measures included in it are
anything to go by, then the Australian Government has certainly not been backward
in using the machinery of the state to protect the country and its people from the
threat of terrorism (whatever the actual nature of that threat happens to be). It has
also not been backward in privileging state security over human rights and the rule
of law. Indeed, in these respects its diligence is to be commended. But, if national
security is also regarded as being just as fundamentally based on the security and
liberty of the person from the arbitrary exercise or abuse of state power then the
legislation would appear to be an abject failure. In the war on terror, as in any other
armed conflict or type of war, national security cannot be fully protected by giving
priority to the security and liberty of the person either from terrorist attacks or
from the arbitrary exercise or abuse of state power. These are two indivisible and
absolutely equal aspects of national security. Legislation such as Australia’s antiterrorism laws, therefore, which does not respect the rule of law and the human
and other rights it protects cannot credibly claim to be able to offer an effective
defence of the individual or the nation against threats and attacks by terrorists who
have nothing but contempt for these rights and for the rule of law.
5
Conclusion
Since September 11, 2001 the Australian Government has introduced a whole
raft of anti-terrorism legislation which it claims is needed to protect the country
and its citizens from terrorist attack.This legislation includes the ASIO Act and the
ATA Act 2005 both of which contain exceptional measures diluting or removing
established rights and liberties and seriously weakening the rule of law.They thus fail
a crucial test when the notion of national security is extended beyond the narrow,
conventional view which holds that national security is based on the security and
liberty of the person from criminal and violent acts including terrorism. On this
view, sometimes the defence of national security requires human rights and the rule
of law to be relegated to a much lower priority. This can lead to the privileging of
state security over the security and liberty of the person.When the conventional view
Page 109
The Second Workshop on the Social Implications of National Security
is widened to encompass the security and liberty of the person from the arbitrary
exercise or abuse of state power the anti-terrorism legislation clearly does not
protect Australia’s national security and even effectively undermines it.The absence
of a Bill or Charter of Rights has left Australians highly vulnerable to arbitrary and
excessive state power. Not only is such an instrument urgently required, so also but
even more fundamentally is a new conception of national security that will help to
ensure that the country’s national security is fully protected in the age of terror. A
conception of national security which includes the security and liberty of the person
from terrorist attack and from state repression as its two indivisible and absolutely
equal aspects would go a long way to providing such protection.
References
ABC (2007) ‘War on terrorism will go on for years: PM’. ABC News
Tasmania. July 15. Available at: http://www.abc.net.au/news/
stories/2007/07/15/1978787.htm
Amnesty International Australia (2005) Submission to the Parliamentary Joint
Committee on ASIO, ASIS and DSD regarding the Inquiry into the
Operation, Effectiveness and Implications of Division 3 of Part III of the
Australian Security Intelligence Organisation Act 1979. March. Available
at: http://www.amnesty.org.au/Act_now/campaigns/human_rights_and_
security/submissions
Australian Laws to Combat Terrorism (n.d.) Available at http://www.
nationalsecurity.gov.au/agd/www/nationalsecurity.nsf/AllDocs/826190776
D49EA90CA256FAB001BA5EA?OpenDocument
Australian Law Reform Commission (2006) Discussion Paper 71: Review
of Sedition Laws. Available at: http://www.austlii.edu.au/other/alrc/
publications/dp71
Carne, G. (2004) ‘Detaining Questions or Compromising Constitutionality? The
ASIO Legislation Amendment (Terrorism) Act 2003’. University of New South
Wales Law Journal. 27(2): 524-578.
Connolly, C. (2005) ‘Five key facts on sedition’. Human Rights Defender Special
Issue: The Anti-Terrorism Bill (No. 2) 2005. November/December: 14-16
Coutts, L.A. (2006) ‘A short review of the various Acts of the Federal Parliament
that constitute what might loosely be called “anti-terrorist” legislation’.
International Commission of Jurists Australia. 1 November. Available at:
http://www.icj-aust.org.au/images/stories/documents/061101_-_L_A_
Coutts_A-T_Legn_paper.pdf
Eminent Jurists Panel (EJP) on Terrorism, Counter-Terrorism and Human Rights
(an Initiative of the International Commission of Jurists (2006), ‘Eminent
Jurists Panel concludes Australia hearing on counter-terrorism laws, practices
and policies: Press Release’. 17 March 2006. Available at: http://www.icjaust.org.au/
Page 110
The Second Workshop on the Social Implications of National Security
Hocking, J. (2004) ‘Protecting Democracy by Preserving Justice: “Even for the
Feared and the Hated”’, University of New South Wales Law Journal. 27(2):
319-338.
House of Commons. (2001) Select Committee on Home Affairs - Appendices
to the Minutes of Evidence. Appendix 16 ‘The Special Immigration
Appeals Commission (SIAC)’. http://www.publications.parliament.uk/pa/
cm200102/cmselect/cmhaff/351/351ap20.htm
International Commission of Jurists Australia (2004) ‘Human Rights and
Terrorism: Legislative and Policy Responses to Terrorism Post September
11 in Australia’, ICJ Biennial Conference, 27-29 August 2004. Available at:
http://www.icj-aust.org.au/
Kirby J, Michael (2005) ‘Terrorism and the Democratic Response 2004’,
University of New South Wales Law Journal. 28(1): 221-244.
Michaelson, C. (2005) ‘Antiterrorism Legislation in Australia: A Proportionate
Response to the Terrorist Threat?’ Studies in Conflict and Terrorism. 28: 321329.
Michaelson, C. (2005a) ‘Security Against Terrorism: Individual Right or State
Purpose?’. Public Law Review. 16: 178-182.
Michaelson, C. (2005b) ‘Derogating from International Human Rights
Obligations in the “War Against Terrorism”?—A British-Australian
Perspective’. Terrorism and Political Violence. 17: 131-155.
Nicholson, A. (2005) ‘The Role of the Constitution, Justice, the Law, the Courts
and the Legislature in the Context of Crime, Terrorism, Human Rights
and Civil Liberties’. An address to the Post-Graduate Student Conference,
Post-Graduate Criminology Society, University of Melbourne. 4 November.
Available at http://www.mpso.unimelb.edu.au/mpso/media/transcripts
Parliamentary Joint Committee on ASIO, ASIS and DSD (2005) Review of
Division 3 Part III of the ASIO Act 1979—Questioning and Detention
Powers. Available at: http://www.aph.gov.au/house/committee/pjcaad/
asio_ques_detention/fullreport.pdf
Parliamentary Joint Committee on Intelligence and Security (2006) Review of
Security and Counter Terrorism Legislation. Available at: http://www.aph.
gov.au/house/committee/pjcis/securityleg/report/report.pdf
Power, S (2007) ‘Our War on Terror’. The New York Times. July 29. Available at:
http://www.nytimes.com/2007/07/29/books/review/Power-t.html
Rix, M (2006) ‘Australia’s Anti-Terrorism Legislation: The National Security
State and the Community Legal Sector’. Prometheus. 24(4): 429-440.
Ruddock, P (2004) ‘Australia’s Legislative Response to the Ongoing Threat of
Terrorism’, University of New South Wales Law Journal. 27(2): 254-261.
Ruddock, P (2005) ‘Government Enhances Anti-Terrorism Bill (No. 2) 2005’.
Media Release 222/2005. 1 December. Available at: http://www.ag.gov.au/
agd/WWW/MinisterRuddockHome.nsf/Page/Media_Releases
Page 111
The Second Workshop on the Social Implications of National Security
Ruddock, P. (2005a) ‘Passage of Anti-Terrorism Bill (No. 2) 2005. Media Release
230/2005. 7 December 2005. Available at: http://www.ag.gov.au/agd/
WWW/MinisterRuddockHome.nsf/Page/Media_Releases
Scheinin, M (2006) Report of the Special Rapporteur on the promotion and
protection of human rights and fundamental freedoms while countering
terrorism. Australia: Study on Human Rights Compliance While Countering
Terrorism. Available at: http://daccessdds.un.org/doc/UNDOC/GEN/
G06/155/49/PDF/G0615549.pdf?OpenElement
SLRC (2006) Report of the Security Legislation Review Committee.
June. Available at: http://www.ag.gov.au/www/agd/rwpattach.nsf/
VAP/(03995EABC73F94816C2AF4AA2645824B)~SLRC+Rep
ort-+Version+for+15+June+2006[1].pdf/$file/SLRC+Report+Version+for+15+June+2006[1].pdf
UN (n.d) The Consolidated List established and maintained by the 1267
Committee with respect to Al-Qaida, Usama Bin Laden, and the Taliban and
other individuals, groups, undertakings and entities associated with them.
Available at http://www.un.org/sc/committees/1267/consolist.shtml
Walton, M. (2005) ‘The Anti-Terrorism Bill (No. 2) 2005: An Overview’,
Human Rights Defender Special Issue: The Anti-Terrorism Bill (No. 2) 2005.
November/December: 3-5
Williams, G (2001) ‘Human Rights and the Second Century of the Australian
Constitution’, University of New South Wales Law Journal. 24(3): 782-791.
Williams, G. (2003) ‘Australian Values and the War against Terrorism’. National
Press Club Telstra Australia Day Address. 29 January.
Williams, G (2004) The Case for an Australian Bill of Rights: Freedom in the War on
Terror. UNSW Press.
Williams, G. (2005) ‘Jumping the gun on terror’. The Age. 27 October.
Williams, G. (2006) ‘Speak up in defence of free speech’. Sydney Morning Herald.
May 30.
Page 112
The Second Workshop on the Social Implications of National Security
9
Panel session: The case for
detention without charge
in suspected terrorism
cases in Australia
Nick O’Brien
Associate Professor, Graduate School of Policing, Faculty of Arts,
Charles Sturt University
Abstract
This paper is the introduction to a more detailed referenced paper, currently in draft form,
which discusses the need for detention without charge in terrorist cases in Australia. This
document is intended for panel discussion. The paper examines the way that terrorism
has changed in the past decade and concludes that detention without charge is needed
in terrorist cases in Australia because of the exceptional problems posed by terrorism and
counter terrorism. It is also argued that safeguards need to be imposed to ensure that
human rights are protected as far as possible.
Keywords: detention, suspected terrorists, terrorism, powers
Page 113
The Second Workshop on the Social Implications of National Security
1
Terrorism has changed both in its complexity and violence over the last decade.
This change has largely been because of Al Qaeda (AQ) and associated groups.
The transformation has manifested itself in a number of different ways.
2
AQ related terrorists have a desire to kill as may people as possible. Early
indications of this desire was evidenced with the attacks on the Embassies of
the United States of America in Dar es Salaam, Tanzania and Nairobi, Kenya
on 7th August 1998. Over 300 people were killed in these bombings. Prior to
these incidents mass casualty attacks were rare, although some 270 people were
killed on 21st December 1988 when Pam Am flight 103 was bombed over the
Scottish town of Lockerbie. The Lockerbie attack, however, differs from AQ
related attacks as it is likely that it was a State sponsored action rather than one
perpetrated by a non-state terrorist group.
3
Suicide terrorism has become increasingly popular with terrorist groups,
especially those groups that empathise with AQ. The phenomenon of suicide
terrorism in modern times began in 1983 with attacks on the US and France in
the Lebanon, but has been increasingly used over the past decade in a number
of countries including the US, UK, Spain, Iraq, Russia and Afghanistan.
4
It is known that AQ desires to use Chemical, Biological, Radiological and
Nuclear (CBRN) weapons against its enemies. This is one of the most disturbing
facets of 21st century terrorism and some experts consider that a radiological
attack is likely to happen in the short to medium term.
5
In most cases authorities or third parties can negotiate with terrorist groups,
witness the Israel/Palestine dispute, Irish terrorism in the UK, the Basque
nationalist dispute in Spain and the situation in Sri Lanka with the Liberation
Tigers of Tamil Eelam (LTTE). It would be difficult to negotiate with AQ,
although the US government shows little sign of wanting to begin that
process.
6
Terrorism is now global in nature rather than being confined to a particular
country. AQ has links in over 60 countries and terrorist investigations against
AQ related groups will always involve at least one other country and often many
more. This brings with it the complexities of other countries’ legal systems as
well as different time zones and languages.
7
With the internationalisation of terrorism comes this issue of translating
documents and providing interpreters for prisoners who may not be able, or
willing, to speak English. Ideally both interpreters and translators should have
some vetting to ensure the confidentiality of the information with which they
are dealing. Good translators and interpreters are in short supply and may have
to be flown in from other cities.
8
As well as the change in terrorism, terrorist groups are also taking advantage
Page 114
The Second Workshop on the Social Implications of National Security
of the sophistication of Information and Communication Technology (ICT).
Arrested persons could have information on mobile phones, Personal Digital
Assistants (PDAs), computers, cameras as well as a variety of media including
compact disks and USB sticks. This information will need to be examined by
police officers. This examination is a complex process as computers can contain
as much information as is found in a library. Additional complications will
occur if the information is encrypted or steganography is used. If suspected
terrorists make use of internet cafés, it may be necessary to seize and examine
all the computers in the café.
9
Premises that are suspected of having been used by terrorists should be
forensically searched. Police officers should be looking for items as small as a
SIM card or USB stick which can be concealed easily. In one case in the UK,
police took six weeks to search one address, although this was the ‘bomb factory’
in Beeston used by the London bombers of 7th July 2005. It would not be
unusual in the UK for police to take 2 weeks to search premises suspected of
having been used by terrorists.
10 The issue of Australia being a target for AQ or related groups is important. If
Australia is not a target for AQ or related groups then extraordinary powers
will not be needed. However it is apparent that Australia is a target for AQ,
indeed Australia has been mentioned a number of times by senior AQ leadership,
including Ayman al Zawahiri and Usama bin Laden.
11 The issue of human rights needs consideration when considering detention
without charge. In 1948 the United Nations (UN) adopted and proclaimed
the Universal Declaration of Human Rights,Article 3 of which states,‘everyone
has the right to life, liberty and security of person.’ Other Human Rights
declarations have similar provisions to the UN declaration of Human Rights.
The European Union (EU) Convention for the Protection of Human Rights
and Fundamental Freedoms protects the right to life (Article 2), and the right
to liberty and security (Article 5). The rights set out in various human rights
provisions cannot be absolute and there will be occasions when the rights are
not compatible with each other. Governments must make decisions on when
one right overrides another, for example when the right to life overrides the
right to liberty or the right to privacy.
12 This paper will examine the way that terrorism has changed and will conclude
that police need to be able to detain people suspected of having been involved
in terrorism without charge for at least 28 days. Extraordinary situations
need extraordinary laws. The detention should be judicially sanctioned after
48 hours and any magistrate or judge should only be able to grant further
periods of detention if they are satisfied that police are dealing with the case
expeditiously and that there is a need to further detain the suspect for the
Page 115
The Second Workshop on the Social Implications of National Security
purpose of questioning him/her or further examining any seized evidence or
that it is reasonably believed that evidence is about to be obtained which may
be relevant to the case. The powers should have a ‘sunset’ clause and should
be examined by parliament annually. The use of such legislation requires as
much transparency as possible. Whilst it would not be prudent to release all
details of investigations to the public as there will be matters of national security,
classified documents and the danger of informing terrorists of police/ASIO
tactics, the legislation would need independent oversight. A senior judge should
be appointed to report to parliament on the use by police, ASIO and other
agencies with a law-enforcement remit that covers terrorism, of the use of all
counter terrorism legislation. It should be illegal for police, defence lawyers
or any third party to disclose details of the case, including interview transcripts
during this period as trial by media serves neither the interests of the arrested
person nor the interests of justice.
13 As stated, modern terrorism is an extraordinary phenomenon and police need
extraordinary powers to deal with suspected terrorists. Involvement of the
judiciary, both to allow continued detention and to report to parliament, is
necessary to reassure the public that the human rights of arrested persons are
being considered.
Page 116
The Second Workshop on the Social Implications of National Security
10
The benefits and concerns of
public data availability in Australia:
a survey of security experts
Roba Abbas
Graduate, School of Information Systems & Technology, University of Wollongong
Abstract
This paper gauges the attitudes of security experts in Australia with regards to public data
availability on critical infrastructure protection (CIP). A qualitative survey was distributed to
a individuals considered experts in CIP-related research in Australia, in order to address the
censorship versus open access debate concerning public data. The intention of the study
was to gain an insight into the perceived benefits and threats of public data availability
by security experts, and to provide the basis for a security solution to be utilised by the
Australian Government sector (at all levels). The findings however can also be applied
to other data supplying agencies. This includes the identification and assessment of the
technical and non-technical security mechanisms that can be enforced to protect sensitive
public data elements that reveal information about Australia’s critical infrastructure.
Keywords: critical infrastructure, critical infrastructure protection (CIP), public data,
security mechanisms, security
Page 117
The Second Workshop on the Social Implications of National Security
1 Introduction
Critical infrastructure protection (CIP) refers to safeguarding essential services
from harm. CIP has gained recognition as a priority area on the national security
agendas of many countries in recent years, most notably Australia, due to events that
have compromised the critical infrastructure (CI) of other nations.The importance
of the CIP process is evidenced extensively in the related literature, where the major
phases of the process are discussed.Traditionally, the CIP focus is on the three major
stages of vulnerability identification, risk assessment and risk management. A study
conducted by Breeding (2003) introduced the risk of ‘sensitive but unclassified’
data to America’s infrastructure, viewing the threat on CIP from an alternative
viewpoint. ‘Sensitive but unclassified’ data refers to information that may not on its
own appear harmful but when amalgamated with additional data elements can be
truly revealing about CI, thus posing a threat to CIP.
The primary aim of this study was to raise awareness with respect to the
censorship versus open information access debate, which is presently a prominent
issue. Of great importance is to deliberate on whether certain CI-related information
should be restricted from the public arena in the interest of national security, through
a survey of security experts in Australia.
The primary objective of the survey is to gauge the attitudes of the experts
with regards to the public data availability dilemma, a dilemma that is conflicted
between whether public data should be restricted from public availability or be freely
available. Public data related to critical infrastructure (CI) provide details about the
characteristics of the CI, and in some instance can reveal sensitive information that
can compromise the CIP process.
A qualitative survey was distributed to individuals considered experts in CIPrelated research within Australia. Due to the vast and unstructured nature of public
data availability, it is evident that many components and aspects of the protecting
public data must be considered and a multi-faceted security solution must be devised,
based on non-technical and technical mechanisms.
The solution provided throughout this paper is based on the outcomes of the
survey, which highlights the need to evaluate alternative security mechanisms, and
determine a possible restriction process through the use of a stakeholder matrix.
The solution offered is focused on providing practical tools and recommendations
that can be applied by government agencies and other data supplying bodies in
Australia to assist in protecting CI from the negative implications associated with
public data availability.
2 Background to the study
Critical infrastructure (CI) are the essential services that contribute to the
stability and security of a country (Chakrabarty and Mendonca, 2004; Rinaldi et. al.,
2001). A comprehensive listing of critical infrastructure includes energy, banking/
Page 118
The Second Workshop on the Social Implications of National Security
finance, water, transportation, agriculture, health and emergency, information and
communications, storage and transportation, government, law and order, and cultural
services (Breeding, 2003; Chakrabarty and Mendonca, 2004; Scholand et. al. 2005).
A standard, global definition of critical infrastructure is not available; rather, each
respective country determines their critical categories independently, based on the
relative importance of each infrastructure item.
Critical infrastructure protection refers to safeguarding the identified services
from potential harm, including physical and/or electronic attacks (ASIO, 2006).
Although minor variations exist regarding the specific phases of the CIP process, it
is widely agreed that the typical steps encompass vulnerability assessment/scanning,
risk assessment, and risk management (Luiijf and Klaver, 2004; Jones et. al., 2003).
The CIP process is a crucial consideration today, particularly due to the prevalence
of national security issues as a result of global events, including 9/11 and the Bali
bombings.
CIP has been a global concern since the Cold War. However, the issue has
gained increased exposure in Australia since the incidents of Y2K, September 11,
2001 and Bali, 2002 (Luiijf and Klaver, 2004; Emergency Management Australia,
2003).
Additionally, the importance and increased use of the Internet and Information
and Communication Technologies (such as biometrics, database processing, geospatial
information exploitation, video processing and visualisations) have amplified the
risks on critical infrastructure (Popp et. al., 2004).These technologies provide outlets
for data/information exchange, and have simplified the ability to transmit data. Of
particular importance to this research is the exchange of ‘sensitive but unclassified’
public data; data that on its own may be considered unclassified, but when combined
may reveal previously unobvious or revealing patterns, which may prove harmful
(Thuraisingham, n.d.). Access to such information does serve positive purposes, but
can also expose the weaknesses of particular CI, thereby potentially compromising
national security efforts if the data is applied maliciously.
An introductory study into the consequences of public data availability on
critical infrastructure states that there is an increase in the education levels of the
individuals/groups attempting to penetrate critical services (Breeding, 2003). In
particular, their use of technologies, and the availability of certain tools, has become
progressively sophisticated, allowing room for the collection, use and duplication of
information. These concepts are supported by authors such as Weinmann (2006),
who asserts that the Internet offers a vast repository of data that may potentially be
exploited, and be used to compromise the CIP process, and consequently undermine
national security.
The amalgamation of the abovementioned factors has resulted in, or prompted
the need for national security to become a major global concern. While there are
current government and research initiatives in place focussed on CIP and national
security, inadequate attention is paid the notion public data availability in Australia
Page 119
The Second Workshop on the Social Implications of National Security
as a fundamental consideration in the CIP process. Furthermore, it is evident that
the benefits of providing and accessing CI-related information online are generally
promoted, whereas the negative implications are often ignored. The focus of CIP
efforts, to date, have been on the establishment of risk assessment and management
strategies, thus reinforcing the need for perceiving CIP from an alternative, but
equally significant viewpoint.
This paper will attempt to address the public data availability issue through a
survey of individuals considered experts in the CIP field. The study will focus on
whether the experts are aware of the apparent threat, and will document the opinions
of the individuals, in addition to possible solutions to the identified dilemma.
3 Critical infrastructure protection (CIP) survey
The Critical Infrastructure Protection Survey was distributed in hardcopy, at
the National Security Technology Conference (21 September, 2006) and also
subsequently online.The primary objective of this survey was to discuss issues relating
to public data availability in Australia. Of great importance was to determine and
gain an appreciation of the public data availability situation, as perceived by security
experts. A key factor was to provide an outlet for security experts, researchers and
interested parties who are knowledgeable about CIP to communicate their concerns
and attitudes, and assist in providing suggestions to solve the public data availability
dilemma.This dilemma is centred on the debate of whether public data concerning
Australia’s critical infrastructure should be restricted from the public domain to
ensure that high levels of security are maintained, and that critical infrastructure
are not compromised.
An additional objective of this research was to develop a solution using
both technical and non-technical security measures. It is clear that the required
solution must offer equal benefits to the four distinct community member groups
or stakeholders within the Australian community, so as to ensure that a particular
stakeholder is not disadvantaged in terms of public data access. The stakeholders
include Australian Government agencies, operators of critical infrastructure,
educational institutions and research networks, and the general public (citizens).
4 The profile of survey respondents
The qualitative survey yielded twenty-one security expert responses, almost half
of which came from individuals employed by the government sector. With respect
to the response rate, the survey was primarily focused on qualitative responses
to public data availability concerns and the establishment of a practical solution.
Therefore, it must be emphasised that the number of responses received was not a
limiting factor to the study.
The collective profile of survey respondents reveals a heavy reliance on the use
of free public data, or a combination of both free and purchased data. An interesting
observation is that not one individual (organisation) depended solely on purchased
Page 120
The Second Workshop on the Social Implications of National Security
public data; a majority of the respondents found that free public data is beneficial
for their purposes and in many instances is sufficient for their use.
In terms of day-to-day uses of critical infrastructure data, over half the
respondents utilise public data to conduct risk assessment/risk management activities.
Additional uses include government intelligence purposes, business intelligence
purposes, service provisioning, Customer Relationship Management (CRM),
navigation, construction, supporting response agencies with geospatial information,
and research (tertiary education) purposes.
The overall profile of the respondents revealed that the group is knowledgeable
concerning public data use, and that the data is beneficial for accomplishing daily
tasks. Consequently, such information provided the foundations for determining
the perceived benefits and concerns of public data availability in Australia, and
working towards a solution to reach a balance between restricting data from the
public domain and openly providing access.
5 The benefits and concerns of public data availability
Security experts reinforce the need for a balance between data accessibility and
restricting access to data.The survey responses generally indicate that the difficulty
in this situation stems from the fact that public data availability can present both
positive and negative consequences, depending on how the data is applied.
The respondents felt that the benefits accruing from public data availability
include promoting community trust, allowing immediate responses in time-critical
situations, and assisting in the completion of daily tasks in specific occupations.The
use of public data for such applications is crucial; therefore, the security experts
generally maintained that it would be unwise to restrict access to the relevant datasets
in such situations.
A number of security experts felt that community members have a basic right
to access information concerning their surroundings and community. According
to a respondent in the government sector, encouraging the concealment of basic
community data and enacting harsh restrictions will inevitably result in Australia
becoming a “secretive, scared society”, which is a disagreeable effect. An additional
point raised was that CI-related data should be publicly accessible “to ensure that
governments and infrastructure providers are not relying on security through
obscurity.” Trust is an imperative factor in this situation, particularly in view of
sustaining a positive relationship and level of transparency between the Australian
Government and citizens.
Certain applications, such as emergency management, rely on the transfer and
exchange of CI-related data in a timely fashion. A common notion expressed in
the survey is that in such applications, direct data access is essential. Public data can
therefore aid with activities including continuity planning, evacuation, infrastructure
protection, and emergency management for incidents, such as earthquakes, cyclones,
tsunamis, bushfires, infrastructure disruptions, and terrorist attacks.
Page 121
The Second Workshop on the Social Implications of National Security
Additionally, the survey revealed that the majority of respondents rely on public
data in their respective industries to accomplish daily tasks. Public data access is
beneficial in these situations, and increases safety in particular occupations. For
instance, a security expert in the construction industry maintained, “as a structural
engineer, information such as ground levels, location of buildings, location of
electricity, water, gas, etc is critical to the safe design of buildings and infrastructure.”
Therefore, access to relevant CI-data, regardless of sensitivity, is required.
Despite these positive aspects, the situation is complicated due to the potentially
devastating implications of public data availability, which encourages that the issue
of data restriction be considered in order to minimise the existing threats. The
concerns relating to public data availability include impacting on national security
efforts (and therefore CIP), facilitating other forms of misuse, and affecting the
privacy and confidentiality of individuals. These concerns are further explained.
The major concern identified regarding public data availability was the
potentially damaging effects on national security and CIP programs, more specifically
the use of public data for aiding in terrorist-related activities.As a survey respondent
noted “access to data should be well-controlled to minimise the possibility of use by
foreign and domestic adversaries”. This thought is shared by other experts, one of
which claims “if potential terrorists can access good quality data over the Internet,
this can eliminate the need for on-site reconnaissance, which in turn eliminates the
opportunity for the behaviour to be noticed, investigated, and attacks disrupted.”
Disregarding this concern can result in widespread and immeasurable physical and
psychological consequences.
The concerns associated with public data availability are not limited to terroristrelated activities. Security experts expressed that CI-related public data can aid other
forms of misuse and offences, with consequences such as increased crime, services
disruption, vandalism, identity theft/fraud and obtrusive telemarketing.
Privacy and confidentiality are also key concerns in this discussion. While the
data of interest to the research is CI-related, a number of respondents felt that
personal privacy is an additional concern, which introduces the ‘personal safety’
dimension to the study. This is an important area for future research.
Therefore, public data availability presents positive and negative implications,
although a government official responded that open access to data results in
“CONCERNS ONLY”. Similarly, a respondent in the education industry claimed
that there were “no major benefits”, as the positive aspects of public data availability
are somewhat overshadowed by the potentially devastating damage. However, the
majority of respondents feel that strict censorship and data restriction is not a viable
option.
A common thread in the survey responses is that information should be available
on a “need-to-know basis”, to the appropriate personnel who require the data for
carrying out tasks that are advantageous in some way. That is, “the TRADE-OFF
between what one needs to have to do their work well, and what needs to be
Page 122
The Second Workshop on the Social Implications of National Security
kept sensitive because it may be used against a nation” must be managed. This is
based on the concept that data should not be made available to individuals with no
“legitimate” purpose to access it. Legitimate, in this instance, refers to whether an
individual can justify that the data accessed will be used positively.
6 Achieving the balance: the public data availability solution
A notable outcome of the survey is that data should only be accessed for
“legitimate” reasons.While in theory, this argument is seemingly valid and rational,
in practice it is difficult to accomplish. For instance, a number of important questions
emerge that require further thought:
1) What CI-related data elements will be available to certain individuals?
2) What conditions define a “legitimate” purpose?
3) How will the process as a whole be enforced?
The basis for a solution utilising non-technical and technical security mechanisms
is put forward based on the survey results, providing practical answers to these
questions.
An important outcome is the introduction of a stakeholder matrix, which is a
non-technical method that can assist in establishing the sensitivity of CI-public data
elements. The stakeholder matrix provides a sensitivity-based grading system that
determines the relative sensitivity of CI data elements, and recommends who should
be granted access to that particular element. The underlying concept behind the
stakeholder matrix is to clearly outline the three grades that can be assigned to a data
element. The first grade is ‘unclassified/public’ defining that a data element can be
accessed by any individual; the second grade is ‘restricted’ meaning that only certain
stakeholders are granted access and the final grade is ‘classified/private’ indicating
that a data element cannot be publicly accessed under any circumstance.
The recommendation with respect to such a matrix is that it be used by data
supplying agencies and bodies to decide which data elements may require censorship
or restricted access. A sample matrix, based on the findings of the survey, is provided
in Figure 1. The diagram depicts a possible classification system to be used as the
foundation of the proposed public data availability solution. In its present form, the
matrix can be used as a guideline; however, it is suggested that an expanded matrix
be devised containing a comprehensive list of CI-related data elements and a similar
analysis be performed by any agency that makes CI data available to the public.
The grade assigned to each specific data element in the matrix is based on
whether security experts felt that the particular element should be available to the
respective stakeholder. For example, if more than 66 percent of security experts
felt a data element should be available, an ‘unclassified’ grade is assigned; if between
33 to 66 percent of security experts believe a data element should be available, a
‘restricted’ grade is assigned and if less than 33 percent of security experts believe
it should be available, a ‘classified/private’ grade is assigned.
Page 123
The Second Workshop on the Social Implications of National Security
Au st r a lia n
Gov e r n m e n t
Bodie s
Ope r a t or s of
CI
Edu ca t ion
I n st it u t ion s &
Re se a r ch
N e t w or k s
Ge n e r a l Pu blic
M a j or D e fe n ce Sit e s
100
58
32
16
Te le com Ex ch a n ge s
100
89
50
17
Se w a ge Ou t fa lls
100
95
68
53
89
74
47
32
100
79
84
79
Cu lt u r a l I con s
84
53
74
74
Ga s Pipe lin e s
100
79
42
32
84
89
68
84
Dam s
100
79
47
37
H ospit a ls
100
84
63
74
Pla ce s of W or sh ip
83
67
67
89
Ele ct r icit y Gr ids
94
83
58
17
Ba n k s ( Fin a n cia l H u bs)
Sch ools
Sh oppin g M a lls
Ke y:
Classified
Rest rict ed
Unclassified
Figure 1. Data Sensitivity Stakeholder Matrix
The stakeholder matrix is a fundamental concept that will form the basis or
foundation of any public data protection campaign, and is currently a missing
element from the censorship versus open access debate. The survey reinforced the
idea that this mechanism should be supported by additional security techniques,
both non-technical and technical in nature.
Non-technical security mechanisms refer to public data protection tools that
do not require the use of technology to be accomplished. Survey respondents feel
that non-technical security techniques can be beneficial in public data protection
initiatives, the most appropriate being:
• Legalandlicenceagreementcontainingconditionsofuse,deiningtheowner
of the data elements and “WHO” will enforce the agreement
• Legislations,regulationsandpenalties,suchasinesforbreachoflegislationor
for inappropriate use
• Unambiguouspoliciesandguidelines,accessiblebythepublic
• Developingaregisterofapprovedusers,anddeininghowtheymayusedata.A
suggestion was the use of “access control matrices”, auditing and classification
Page 124
The Second Workshop on the Social Implications of National Security
• Communicatingfrequentlywithusersabouttheirrightsandresponsibilitieswith
respect to data use. Educating users is particularly important; “Educate staff in
government agencies about how data can be used, and what tabs governments
are keeping. E.g. internal audit systems that run on intrusion detection systems
might keep logs of all transactions to do with spatial and statistical data”
• Limiting sharing between departments and agencies, particularly within the
Government sector, as it is not possible to distribute data and be sure that the
data will be used appropriately
• Introducingphysicalsecurityonassetstoensurecorrectstorage,andprevent
illegitimate physical access of data
• Encouraging a coordinated‘whole-of-Government’ approach to data
protection
• Prohibitingcompaniesfromsellingdata,whichisanextremeoptionandisnot
realistic given the nature of the commercial data sector
• Using“commonsense”
Information and Communication Technologies (ICTs) facilitate access to
public data through the Internet, and consequently are at the centre of the public
data availability dilemma. However, there is the potential to supplement the abovementioned security techniques with technical measures in certain situations, and
use ICT to assist in protecting and restricting access to sensitive datasets. According
to the surveyed security experts, technical security mechanisms may include:
• Secure networks not displayed to the public on networks and the Internet,
containing regular and real time encryption, logging, auditing, standard protection
from damage (firewalls, intrusion detection systems) and appropriate filters
• Access control, and password protection, requiring identity checks to be
performed for more sensitive data, such as defence information
• Securityclearanceforaccesstosensitivedata,includingprovidingproofofidentity
and justification in terms of data use
• “Deliberatelynon-integratedsystems”
• “Centralstorageanddistributedaccess”
• Review and update of technical security techniques, and measuring their
effectiveness
7
Conclusion
A key outcome of this survey is that the public data availability situation may be
interpreted in many ways, and one solution alone (for example, a technical solution)
cannot be employed. Rather, there is the need for a responsive solution that targets
Page 125
The Second Workshop on the Social Implications of National Security
specific stakeholders, and is concerned with the sensitivity of public data in terms
of compromising the CIP process, and protecting individual CI elements. However,
it is important to note that the response suggested requires further work, and that
the approach itself is not infallible.
An important point raised by a respondent is that perhaps the public data
availability dilemma is being approached from an incorrect angle, that we should
not address the issue only in terms of the mechanisms that can be implemented.
Rather, it may be “about facing the root problems of terrorism, and addressing them.”
Extending this point beyond the terrorist threat, it may be valuable to address other
adverse issues such as vandalism, fraud and competitive intelligence, and engage in
why such activities take place and attempt to limit or address the causes.This requires
further research, as it is beyond the scope of this paper.
When considering critical infrastructure protection, it is worth noting that CIP
is one aspect of a broader solution. As stated by a security expert, “a government
cannot hope to achieve a comprehensive approach to critical infrastructure
protection if they are giving away data about their own infrastructure.” Providing a
wealth of CI-related data online can result in unscrupulous individuals conducting
their own risk assessments, defining areas where the greatest losses will occur, and
easily identifying the location of the CI elements. However, censorship is not the
answer.
As demonstrated in this paper, a balance is crucial and many elements such as
employing a structured approach using technical and non-technical mechanisms, in
addition to determining the root cause of detrimental activities that can be carried
out using public data, is essential.
References
Abbas, R. (2006). ‘The Risk of Public Data Availability on Critical Infrastructure
Protection’, in K. Michael and M.G. Michael (eds), The Social Implications
of Information Security Measures on Citizens and Business, University of
Wollongong, NSW, Australia, pp. 201-212.
ASIO (2006). ‘ASIO’s Work: Critical Infrastructure Protection’ [Online],
Available: www.asio.gov.au/Work/Content/CIP.htm [Accessed January,
2006].
Breeding, A. J. (2003). Sensitive but Unclassified Information: A Threat to
Physical Security, SANS Institute [Online], Available: http://www.sans.org/
rr/whitepapers/country/ [Accessed December, 2005].
Chakrabarty, M. and Mendonca, D. (2004). ‘Integrating Visual and Mathematical
Models for the Management of Independent Critical Infrastructures’, IEEE
International Conference on Systems, Man and Cybernetics: 1179-1184.
Emergency Management Australia (2003). ‘Mapping the Way Forward for LargeScale Urban Disaster Management in Australia’ [Online], Available: www.
ema.gov.au [Accessed February, 2006].
Page 126
The Second Workshop on the Social Implications of National Security
Jones, E.V., Lyford,V. J., Qazi, M. K., Solan, N. J. and Haimes,Y.Y. (2003).Virginia’s
Critical Infrastructure Protection Study. Systems and Information Engineering
Design Symposium, IEEE: 177-182.
Luiijf, E. A. M. and Klaver, M. H. A (2004). Protecting a Nation’s Critical
Infrastructure: The First Steps. IEEE International Conference on Systems, Man
and Cybernetics: 1185-1190.
Popp, R., Armour, T., Senator, T. and Nymrych, K. (2004). ‘Countering Terrorism
Through Information Technology’, Communications of the ACM, 47(3): 36-43.
Rinaldi, S. M., Peerenboom, J. P. and Kelly, T. K. (2001). Identifying,
understanding, and analyzing critical infrastructure interdependencies.
Control Systems Magazine, IEEE 21(6): 11-25.
Scholand, A. J., Linebarger, J. M. and Ehlen, M. A. (2005). Thoughts on Critical
Infrastructure Collaboration. Sandia National Laboratories, ACM November
6-9: 344-345.
Thuraisingham, B. (n.d.). Data Mining, National Security, Privacy and Civil
Liberties. SIGKDD Explorations 4(2): 1-5.
Page 127
The Second Workshop on the Social Implications of National Security
Page 128
The Second Workshop on the Social Implications of National Security
11
Re-using public sector
information (PSI) for profit:
Who’s data is it anyway?
Mark Burdon
PhD Candidate, Faculty of Law, Queensland University of Technology
Abstract
This paper will outline legal and policy developments regarding the commercial re-use of
public sector information (PSI) by government agencies and the information privacy and
national security concerns that may arise. Whether governments should be allowed to re-use
their information for income generation purposes is a contentious issue as exemplified by
the opposing philosophical rationales of the EU and the USA. Australian governments take
a more pragmatic approach that has resulted in a diffusion of different policy statements.
This paper will highlight real life examples of commercial re-use of PSI activities that have
caused information privacy concerns in the UK and the USA along with a brief overview
of Australian legislative and information policy implications. In conclusion, the paper will
discuss the potential influences that governmental income generation activities may have
upon national security and the societal benefits occurring from an open and transparent
information society.
Keywords: commercialisation, public sector information (PSI), information privacy,
e-government, information ownership and consent.
Page 129
The Second Workshop on the Social Implications of National Security
1 Introduction
The last decade has witnessed the fruition of e-government aims into practical
strategies and implemented projects.The enhanced development of information and
communication technologies (ICTs) in government has created new opportunities
for agencies to collect, share and re-use their data. At the same time, the commercial
worth of governmental data sets and value added information products/services
have increased. Government agencies are now finding that data which they have
routinely collected to fulfil their statutory and business functions can now more
easily be re-used for commercial purposes.
Underlying commercial re-use issues represent differing philosophical outlooks
that place different emphases on the balance between public access rights to
government information and the economic benefits that can be gained from the
marketisation of government information. These philosophical differences are
evident in the commercial re-use of PSI policies that have been developed in the
EU and the USA. Australian governments take a more pragmatic outlook which
makes it more difficult to ascertain the existence of a comprehensive philsophical
intention.
The prospect of increasing revenue through the commercial re-use of PSI is
clearly appealing for governments and their agencies. However, it raises a key question
about the technocratic public administrations of the future, namely, what happens to
e-government organisations when they move from being purely service providers
to market-oriented, income generators? This change could see a re-balancing of
government priorities that favour income generation policies over previously held
democratic and social norms that defined the scope, nature and the boundaries of
the relationship between governments and their citizens. Moreover, a paradigmatic
change of governmental ethos could also impact upon the realm of national security.
The enhanced publication of PSI, particularly for income generation purposes, could
lead to conflicts within, and between government agencies, regarding the restriction
and distribution of information.
This is not merely an academic question as the EU’s PSI policies now attach
economic considerations to one of the historical core functions of government – the
collection, storage and use of data. These shifting priorities become more apparent
when the commercial re-use of PSI is addressed against the information privacy legal
obligations placed upon agencies. Ultimately, the shifting priorities, boundaries and
relationships will influence the shape of and prospects for a transparant and open
information society, which in turn, will influence notions of national security.
2 Re-use of public sector information
At the onset, it is important to acknowledge the unique position that governments
have as a collector of public data (OECD 2006). Agencies have statutory means to
enforce disclosure and they are the only feasible provider of comprehensive national
Page 130
The Second Workshop on the Social Implications of National Security
data sets (Rowlands 1995, 227). However, defining PSI is not a simple task as can
first be assumed. This is due to the inherent tensions between rights of public
access and governmental economic benefits from commercialisation which result
in changing notions and different definitions of PSI (Blakemore and Craglia 2006,
2). During the course of the last two decades, EU policy objectives have reflected
these changing notions, as PSI has been defined in different ways, at different times,
to reflect different policy and economic ambitions (Aichholzer 2004).
2.1 EU – the commercialisation rationale
The first attempt to develop an EU-wide policy on PSI was the “Guidelines for
Improving the Synergy between the Public and Private Sectors in the Information
Market” (European Commission 1989) which sought to synergise public and
private sector initiatives to stimulate economic growth in the European information
market. The initial reception to the idea of commercially re-using PSI was luke
warm at best. The Guidelines were criticised for not paying enough attention to
the importance of public access to government information, but at the same time,
the private sector was also critical because the Guidelines had no binding force
on the member states (Janssen and Dumortier 2003, 187). The Guidelines were
followed in the early to mid 1990’s by three European Commission reports called
the “PUBLAW Reports” which sought to examine why the Guidelines failed.
The reports ultimately resulted in a European Commission Green Paper entitled
“Public sector information:A key resource for Europe” (1998) which was part of a
consultative process involving the public and private sectors, citizens and user groups
to rekindle the ailing prospects of an EU-wide internal information market.
The Green Paper initiated an European Commission communication in 2001
which lay the foundations for a commercial re-use of PSI directive (European
Commission 2001). The economic importance regarding the commercial re-use
(or exploitation as referred to by the Communication) of PSI was confirmed as the
clear and unambiguous priority of the Commission (Janssen and Dumortier 2003,
194). As such, the Communication laid the foundation for a governance framework
that would alleviate those problems encountered during the previous decade, such as
different national administrative rules, digital formats and pricing regimes. Its broad
economic intent lead to the provision of a general principle of commercial re-use,
namely “whenever public sector information is generally accessible, commercial
re-use should be considered” (Janssen and Dumortier 2003, 195).
The Communication became a Commision proposal (European Commission
2002) which eventually resulted in a commercial re-use EU-wide directive the
following year (European Commission 2003). Finally, fourteen years after the
publication of the 1989 Synergy Guidelines, a confirmed EU-wide commercial
re-use of PSI policy was implemented.The Commission had consistently stated that
one of its aims was to harmonise member state commercial re-use of PSI rules.Yet
despite that, the Directive left any commercial re-use decision to the discretion of
Page 131
The Second Workshop on the Social Implications of National Security
member state governments. Thus making it very difficult to develop one unified,
EU-wide PSI framework (Pas and Du Vuyst 2004, 12). The Directive is also solely
concerned with the public sector and no conditions were placed upon private sector
information brokers.Again, this reflects the Commission’s commitment to realizing
the economic potential of PSI despite the negative consequences that may arise
from placing no restrictions on the private sector (Pas and Du Vuyst 2004, 12).
Paradoxically, and rather ambiguously, the Directive does create income
generation opportunities for government agencies by allowing public sector bodies
to make profits from the commercial re-use of their PSI (European Commission
2003, Art. 14). Government agencies can seek to recover costs as long as any charge
is a “reasonable return on investment” and is not “excessive”.This would appear to
vary somewhere in between a marginal cost recovery and market cost return which
provides public sector agencies with income generation opportunities (Pas and Du
Vuyst 2004, 4). The UK is one member state that has embraced the commercial
purposes of the Directive and has created the Office of Public Sector Information
(OPSI) to enhance commercial opportunities and to rationalise the development
of information policy across the public sector (Office of Public Sector Information
2007).The OPSI regulates PSI transactions involving government agencies and also
investigates complaints against agencies made under the Re-use of Public Sector
Information Regulations issued in 2005.
Not surprisingly, given its contradictory nature, the Directive has come under
some criticism. Blakemore and Craglia (2006, 3) state that the Directive is “ based
on an untested assumption that there is a latent demand for information that is
unfulfilled because of technological and policy ‘barriers’ that therefore need to be
removed”. As such, the commercial re-use of PSI is a market oriented approach
that has a rationalistic and a linear viewpoint that overly focuses on technologies,
information and benefits but does not encapsulate the true complexities of the
situation. Several authors have also criticized the overt economic interests of the
EU’s policies which overshadow the information access rights of citizens (Aichholzer
2004, Pas 2002, Pas and Du Vuyst 2004, Prins 2004).
2.2 USA – the principle of free and open access
At a Federal level, the situation in the USA is somewhat different. Unlike the EU,
the dichotomy between the commercial re-use of PSI and the information access
rights of citizens does not exist. Instead, the Federal Government is not allowed to
differentiate between general access and commercial re-use (Papapavlou 1999, 3).
The vast majority of Federal Government information is therefore freely available
to the private sector and the public.The purpose of this approach is to ensure that
taxpayers do not pay twice for government information and to encourage the
widest possible dissemination of information (Pas 2002).
Four existing laws form the PSI foundation of the US Federal Government
(Gellman 2004, 123). The first is the First Amendment of the US Constitution
Page 132
The Second Workshop on the Social Implications of National Security
which guarantees freedom of speech and promotes open political dialogue. Whilst
the First Amendment does not specifically preclude the Federal Government from
commercially re-using PSI, it sets a tone of prohibiting government interference in
the marketplace that has been followed by subsequent pieces of legislation (Gellman
1996). For example, rule 34 of the Copyright Act 1976 expressly states copyright
protection is not available for any work to the US Government. The effect of the
legislation is to place all Federal Government information in the public domain
(Gellman 1996).The public interest is therefore “served by keeping governmentally
created works as free as possible of potential restrictions on dissemination” (Gellman
2004, 126).The practical effect is that anyone can reproduce and re-use government
information and sell it at any price. However, the prohibition of copyright does not
extend to state governments who are allowed to copyright their data and therefore
have the legal sanction to commercially re-use their information.
The third piece of legislation, the Freedom of Information Act 1966, ensures
public access to government information. The act permits any person to request
any record in the possession of a federal agency in order to establish a culture of
disclosure for government records (Gellman 2004, 124). In 1996, amendments
were made to act to reflect technological changes and the advent of electronic
recordkeeping.Accordingly, if an agency receives three or more requests for the same
records, the agency should make the records available on its website thus adding a
wider information dissemination purpose to the public access aims of the legislation
(Gellman 2004, 125). The final piece of legislation, the Paperwork Reduction Act
1995 aims to prevent bureaucratic control of information by directing agencies
to ensure that information is disseminated to the public in a timely and equitable
manner.A key purpose of the legislation is to ensure that government does not have
a monopoly over its information and thus prevents an agency from commercially
re-using its own PSI (Gellman 2004, 130).
2.3 Australia – the pragmatic approach
The Australian situation, at the Federal level, is philosophically less clear cut as
there appears to be no coherent or overriding PSI policy agenda. Instead, there
is a mix of different policy objectives relating to intellectual property principles,
the development of the information economy and cost recovery guidelines. For
example, the “Intellectual Property Principles for Australian Government Agencies”
(Australian Government Attorney-General’s Department 2005) provides “a broad
policy framework for intellectual property mangement” that covers a wide range
of works produced by the Commonwealth. Despite this, agencies are nonetheless
encouraged to develop their own individual intellectual property management
frameworks that reflect their own needs and objectives. Whilst the principles
provide an overarching guideline for Commonwealth agencies, the ultimate form
of implementation is left to the agencies themselves.
Principles 11 to 15 are particularly relevant to the issue of commercialising
Page 133
The Second Workshop on the Social Implications of National Security
PSI. Principle 11 states that agencies “should encourage public use and easy access
to copyright material” that is primary to the function of government. This is
similar to the access rights provisions of both the EU and the USA which deem
fundamental government information should be made freely available. However,
the use of the words “should encourage” is by no means as strong as the obligations
that US Federal Government agencies must comply with. Principle 13 states that
Commonwealth agencies should be responsive to opportunities for commercial use
and exploitation of intellectual property. Furthermore, agencies should consider the
potential benefits that may be realised through commercialisation by the private
sector to create cost savings and continued product development. Principle 13
therefore supports Commonwealth agencies to undertake commercialisation of
PSI activities particularly in conjunction with the private sector.
The Intellectual Property Principles recognise the importance of making core
government information freely available (like the USA and the EU) and offer a
watered down version of the EU’s marketisation strategy.That said, the importance
of re-using PSI in the development of the information economy is highlighted as a
priority in “Australia’s Strategic Framework for the Information Economy 2004-06”
(Australian Government Department of Communications 2004). Strategy 4.3 of the
Approach recognises the necessity for a structured approach to the collection and
re-use of information by Australian governments with the private sector (2004, 54).
The Approach confirms that tensions may arise between whole-of government and
single agency initiatives but it is silent on the issue of agency PSI commercialisation
activities, especially as a foundation for information market development. In that
regard, the Approach is different to the PSI policies adopted by the EU.
Furthermore, the “Australian Government Cost Recovery Guidelines”
(Australian Government Department of Finance and Administration 2005) provide
a framework to assist agencies to design and implement cost recovery arrangements.
The Guideline’s overarching aim is to ensure that coherent cost recovery practices,
regarding fees for goods and services, are implemented uniformly. As such, the
Guidelines are seen as an “important means of improving the efficiency with
which Australian Government products and services are produced and consumed”
(2005, 11). Finally, one other guideline worth noting is the “Commonwealth IT
IP Guidelines” (Australian Government Department of Communications 2004)
which provides a guide for agencies to maximise the benefits from Commonwealth
IT related intellectual property. However, whilst recognising the benefits that can
be gained out of commercialisation, the IT Guidelines do not cover government
information per se, but instead, cover elements such as documentation, databases,
websites, methodologies and models.
2.4 Summary
The different philosophies of the EU and the US reflect differing priorities
regarding the role of PSI and governmental information dissemination. The EU
Page 134
The Second Workshop on the Social Implications of National Security
prioritises economic purposes and views PSI as a commodity that can be used to
develop an EU-wide information market. The primary relationship of concern in
the EU is between government and the private sector. Citizen rights of access are
secondary.The US prioritises access rights over economic concerns and the primary
purpose of PSI laws and policies is to ensure that government information, at least
at the Federal level, is made as freely and widely available as possible. The primary
relationship of concern is between government and the access rights of individuals
which also includes the private sector. In Australia, Commonwealth policy on
the commercial re-use of PSI is somewhat fractured. When viewed as a whole,
commercial re-use of PSI policies show the absence of a dominant philosophical
outlook, whether it be economic or access oriented, and instead places commercial
re-use policy decisions in the hands of individual agencies, who are compelled to
operate within the bounds of different guidelines.
3
Information privacy concerns
Information privacy laws and regulations consign upon data collectors various
constraints that govern the collection, the use and the dissemination of personal
information. Information privacy therefore ensures that information about an
individual is kept confidential and is only used for certain purposes, which that
person, has consented to (Bannister 2005). Within the context of e-government,
an analysis of information privacy issues is integral to resolve the trust tensions that
arise from the enhanced use of technologies by governments and the anxieties of
citizens regarding the use that their information is put to (Dutton, et al. 2005, 13).
Those same tensions are more likely to arise with the commercial re-use of PSI
because personal data could possibly be used in a way beyond the original purpose
for which it was collected and for the purposes of governmental income generation.
This may ultimately result in citizens having even less control and influence over
the handling of their data by government agencies.
3.1 Privacy Act implications – Information Privacy Principle (IPP) 10
Unlike the situation regarding commercial re-use of PSI policies, there is largely
one overarching Australian information privacy law that governs the information
collection, storage and use activities of the different levels of government and the
private sector. The Privacy Act 1988 (Cth) governs the activities of Commonwealth
and ACT government agencies and forms the basis of separate state-based legislation
that regulates state government agencies (Paterson 2005, 79).
Section 6(1) of the Act defines personal information as information or an opinion
that can identify a person.This definition has a broad application and a record does
not have to identify a person directly for it to be classed as personal information. For
example, it is possible for a record to be classed as personal information, even if a
person is not mentioned by name, but he/she can be identified by cross-referencing
with data in the record, with other data that uniquely identifies that individual.
Page 135
The Second Workshop on the Social Implications of National Security
For the purposes of the Act, ‘record’ is also broadly defined to include a document,
a database or a photograph of other pictorial representation of a person (Paterson
2005, 61). Section 13(a) indicates that agency practices can constitute “an actionable
interference” with an individuals privacy if that practice or act breaches one of the
IPPs. Under section 36, an individual has recourse for action under a breach of the Act
by notifying the Privacy Commissioner of their grievance. Section 46 provides the
Commissioner with investigatory powers and the Commissioner can direct relevant
parties to attend a conference regarding any complaints. Following investigation
of a complaint, the Commissioner has a number of powers under section 52(1)(b),
including the power to make a declaration that the awarding compensation for any
damage suffered by a breach of privacy.To enforce or appeal determinations by the
Commissioner under section 55A, an action must be initiated in the Federal Court
or the Federal Magistrates Court.
An actionable interference will be assessed by reference to the IPPs as detailed
in section 14. For the purposes of this paper, IPP 10 is of particular importance
because it limits the use of personal information by governmental organisations. It
states that an agency must only use personal information for the purpose for which
it was originally obtained unless:
a. An individual has consented to the use of their information for
another purpose;
b. The agency reasonably believes that use of the information is beyond
the scope for which it was originally collected and is necessary to
prevent or lessen a serious and imminent threat to life of the health
of a person;
c. The agency is authorised by law to use the information for a
different purpose;
d. The agency is using the information for another purpose that is
reasonably necessary for the enforcement of criminal law, or laws
relating to pecuniary penalties for the protection of public revenue;
or
e. The agency is using the information in a way that is directly related
to the purpose for which it is collected.
A difficulty arises for government agencies regarding the commercial re-use of
PSI because of the principle of consent that is fundamental to IPP 10. In practice,
a government agency is likely to be mandated by a certain piece of legislation to
collect data, including personal data from individuals. Those individuals consent to
providing their data for the original purpose it is collected. This ‘primary purpose’
of data collection fulfils the agencies legislative obligations and fulfils an essential
administrative function of the agency. However, when an agency attempts to
commercially re-use its information, either as raw data or as value added information/
product, it does so for a ‘secondary commercial purpose’. In this situation, it is
possible that an individual has consented to the primary purpose but may not have
Page 136
The Second Workshop on the Social Implications of National Security
consented to the secondary commercial purpose.
The issue at hand is therefore whether government agencies actually have
the legal means under the IPPs, and IPP 10 in particular, to collect and to re-use
personally related information for income generation purposes.The key concern is
whether agencies can legitimately claim a ‘secondary commercial use’ for personally
related information under one of the exemptions of IPP 10 listed above. Otherwise
the consent of those individuals whose data is being re-used may be required. If
that is the case, given the size of some government data sets, seeking the consent of
individuals could prove to be administratively difficult and perhaps economically
infeasible. Moreover, given the economic pressures now being placed on government
agencies to generate their own income, there could potentially be an economic
incentive to bypass information privacy legal obligations. Especially in situations that
are perceived as ‘harmless’ and involve tangental or indirect personal information that
requires some form of re-identification in order to identify individual persons.Two
actual examples of PSI re-use problems from the USA and the UK highlight such
situations of concern where an individual’s control over his/her personal information
can be seen to have been eroded by the economic priorities of agencies.
3.2 US and UK situations of concern – Kehoe and the DVLA
In the US case of Kehoe v Fidelity Federal Bank & Trust, (4 S.Ct. 1612 (Mem.),
21 F.3d 1209 126), a class action, involving hundreds of thousands of persons, was
brought against the Fidelity Bank regarding its purchase of 565,600 names and
addresses of Florida citizens from the Florida State Government’s Department of
Motor Vehicles (DMV). Upon purchase, the Bank used the DMV’s information
to mass mail Florida residents’, in three counties, about car loan advertisements.
This was in direct contravention of the Federal Drivers Privacy Protection Act (18
U.S.C. § 2721) (DPPA) which requires state governments to protect the privacy of
an individual’s personal information contained in motor vehicle records (Electronic
Privacy Information Center 2005).
The DPPA was enacted in 1993 to deter would be stalkers, and their ilk, from
gaining access to existing or potential victims via publicly listed motor vehicle
records. A further amendment was put forward in 1999 that required a state DMV
to obtain the consent of any individual whose driver license information was being
released, including commercial re-use for bulk marketing purposes. In the Kehoe
case, the plaintiffs’ consent was required before the DMV could re-use and sell their
information to the Bank. However, the 1999 amendment, which was enacted in 2000
by the Florida legislature, was never updated into Florida law because of an oversight.
As such, driver licence information continued to be used for commercial purposes
and without consent. The US District Court for the Southern District of Florida
found for the Bank at first instance because the plaintiffs’ could not demonstrate
that the Bank’s breach of the DPPA did not cause them actual harm.The plaintiffs’
appealed to the 11th Circuit Court of Appeals and the court overturned the decision
Page 137
The Second Workshop on the Social Implications of National Security
holding that it was not a requirement under the DPPA to prove actual harm for a
claim of damages.The Bank was required to pay $US50 million to the plaintiffs’ for
using their personal information for marketing purposes without their consent.
In 2005, the UK Government’s Driver and Vehicle Licensing Agency (DVLA)
also encountered problems with selling driver licence information. The DVLA is
responsible for collecting data on persons who have been issued with a UK driving
license and for vehicles registered within the UK. For a small sum, the DVLA
routinely sold its driver licence information to certain companies, such as car park
managers, car clamping firms etc. For an extra charge of around £3,000, the DVLA
authorised direct access to its database system which allowed companies to type in
a registration number and to download corresponding personal information about
the registered car owner (Purves 2005). The DVLA claimed that it was obliged to
commercially re-use its PSI because of a 2002 statutory instrument that required
the organisation to sell information to anyone with ‘a reasonable cause’ (Purves
2005).
Despite the fact that only companies with a reasonable cause were supposed to
access the DVLA’s database, the agency authorised access to one of Europe’s largest
credit card companies, who are were known to employ extensive direct mailing
tactics, on the pretence that the company had a reasonable cause because it owned
a private car park at its central office (Delgado, et al. 2005). More worryingly, the
DVLA also sold its information to a private car clamping firm whose directors
were found guilty of blackmailing unsuspecting motorists. The blackmailers sent
threatening letters to victims citing their registration details and claiming that
a spurious parking violation had taken place (Purves 2005). Subsequent critical
media coverage about the DVLA’s commercial activities, led to the Department of
Transport, which houses the DVLA under its accountability framework, to respond
by establishing a public review and consultation exercise (McCue 2006).The review
resulted in 14 new measures including detailed guidance on what constitutes a
reasonable cause; a requirement for organisations to be members of an accredited
trade association and the instigation of a new complaints procedure.
3.3 Discussion
Several points of interest arise from the Kehoe and the DVLA examples. Firstly,
the construction of the DPPA is unusual in the context of information privacy
and data protection laws.The DPPA was established to deter would be stalkers and
it therefore obliges the buyers, rather than the collectors (or sellers) of data, to act
within certain confines. As such, in Kehoe, an action was brought against the Bank
but no action was brought against the Florida DMV. Contrast that with the DVLA
example, where the agency received voluble criticism that resulted in a consultation
review of its actions and the implementation of stricter guidelines to correct its
information re-selling practices.
At face value, whilst acknowledging the different circumstances, this maybe a
Page 138
The Second Workshop on the Social Implications of National Security
reflection of how the different PSI philosophies of the US and the UK impact upon
information privacy concerns. In the US, the general perception is that government
information should be freely available. Hence the focus placed on the actions of the
information buyer rather than the provider.The UK, on the other hand, has accepted
the income generation activities of governmental agencies with a consequence
that the commercial re-use of PSI may come with a price tag. Hence the criticism
directed at the DVLA as a seller of information rather than the companies who
illegitimately used that information. In particular, it is interesting to note that none
of the press articles overtly criticised the credit card company for using the DVLA
data for mass mailings when it was clearly using personal information for a purpose
beyond the reasonable cause requirement.
This leads to the key point of interest regarding the consent of individuals
for a secondary commercial purpose. Both examples provide different methods of
obtaining consent but both failed to supply an effective means of privacy protection
regarding the commercial re-use of PSI. For example, section 2721 of the DPPA
indicates the purposes for which motor vehicle records can be used. This includes
a provision for mass mailing solicitations if the information provider has obtained
the express consent from the individuals named in the mailing list. If an individual
has not provided consent to the release of his/her motor vehicle record for the
purpose of mass mailings then the DPPA prohibits the use of their data in that
specific way (Electronic Privacy Information Center 2005). In the Kehoe case, the
consent requirement was inadvertently not enacted and the DMV continued to
sell its information without restriction. However, the actions of the Florida DMV
are still open to question given that they forwarded personal information directly
to a third-party mass mailing service retained by the Bank. The mass mailing
service then mailed the Bank’s advertisements to individuals. Bearing in mind the
comments above regarding the open access model to PSI in the US, it is remarkable
that the Florida DMV forwarded their information straight to a direct mailing firm,
thus surely knowing the purpose that the Bank was going to use the information
for. Regardless of whether the consent requirement was enacted or not, it would
certainly appear that the information privacy of Florida residents was not their
primary concern.
In the DVLA example, only interested parties (i.e. those with a reasonable cause)
should have been able to gain access to driver’s personal information. However,
as detailed above, the practical definition of ‘a reasonable cause’ was so broad that
it allowed illegitimate access by companies, and once information was accessed,
there was practically no restriction on the use that the information was put to.The
implicit assumption behind the DVLA’s commercial actions was that individual
drivers had consented to any re-use of their information. This was clearly not the
case as witnessed by the widespread criticism heaped on the DVLA after the media
broke the story. As such, both cases represent a failure of government agencies to
obtain individual consent for a ‘secondary commercial purpose’ which highlights
Page 139
The Second Workshop on the Social Implications of National Security
either (a) a disturbing lack of concern regarding information privacy issues entailing
a cavalier attitude to the sale of personal information or (b) an elevated income
generation focus, particularly in the DVLA’s case, which places commercialisation
needs over information privacy obligations.
4
National security implications
The Kehoe and DVLA examples underline information privacy concerns arising
from the commercialisation of PSI that have an effect at an individual level. It is
further possible to define issues that give rise to national security concerns arising
from the commercialisation of PSI which take place at a governmental level.
Firstly, it is worth noting just how cheaply personal information was being sold
for in both cases. In Kehoe, the Bank paid $US5,656 for the personal information
of more than half a million Florida residents which approximates to only one cent
for each name and address they bought. The DVLA sold details of individuals for
only £2.50 per record. Nevertheless, the DVLA earned £6.3 million in 2005
from its commercial re-use of personal information (McCue 2006) which gives a
clear indication of just how many records were routinely being re-used and sold.
Furthermore, evidence from the US has also suggested that state based DMV’s
have been susceptible to fraud, corruption and weak security practices (Center
for Democracy and Technology 2005). For example, in December 2003 a former
state employee from the Nevada DMV pleaded guilty to receiving bribes totalling
more than $US300,000 to provide unauthorised identification documents to
illegal immigrants. In June 2002, 36 people, including DMV staff, were indicted
in a complex criminal operation that involved the fraudulent issue of New Jersey
driving licences. The criminals involved were so sophisticated, and the demand so
great, that different brokers competed against each other to provide the best choice
of illegal services at a price to suit (Office of the New Jersey Attorney General
2002).
This shows the commercial value of driving licence personal information. In
the case of the ‘legitimate’ sales of the Florida DMV and the DVLA, the commercial
value exists because of the potential uses that third parties can utilise the information
for (e.g. direct marketing). In the case of fraudulent or other criminal acts, a
commercial value exists for the provision of falsely accredited identification that
can be used to dishonestly confirm a false identity. Although the reasons behind
the agency sales and the criminal acts are very different, they nonetheless provide
consequential threats for national security because both situations provide greater
access to the fundamental material of identity theft – personal information that can,
with relative ease, be recycled into a fraudulent identity. In fact, it is astonishing, at
a time when identity theft is fast becoming the highest crime concern in most first
world countries, that both agencies were selling personal information at basement
store prices, and more worryingly, paid scant regard to who they were providing
it to. So much so, that is difficult to avoid the conclusion that commercial reasons,
Page 140
The Second Workshop on the Social Implications of National Security
whether directly or indirectly, outweighed the potential threats of national security
arising from the misuse of personal information for identity theft reasons.
Issues regarding the governmental commercialisation of personal information,
particularly driving licence data, may therefore impact upon national security
concerns. Whilst governments have recognised the security issues arising from the
identification purposes of driving licences, they have not been as quick to recognise
the concerns that may arise through the commercialisation of driving licence
information. As such, legislative and technical responses have tended to focus on
the construction of more robust forms of licence that can be used for identification
purposes, as exemplified by the Real ID Act in the USA and the Queensland Smart
Driving Licence. However, the personal data that form those licences has, and is
continuing, to be sold to commercial entities and other bodies.
This creates a somewhat paradoxical situation. Governments throughout the
world are setting aside large amounts of financial, legislative and technical resources
to create stronger forms of driving licence identification.Yet the information behind
those licences is commercially available at inexpensive prices with little recourse
as to who is buying it. As highlighted above, the DVLA received just criticism
regarding its commercial practices that infringed individual privacy and which
provided foundational support for criminal fraudsters. Those same criticisms are
equally applicable to national security concerns.
It should also be recognised that governmental commercial information
transactions with legitimate sources (e.g. information brokers), still give rise to
national security issues, due to the reduction of control that government agencies
have over information once it has been sold to a commercial third party. Whilst a
government agency can licence certain uses that its information should and should
not be put to, the ultimate decision on who a commercial third party sells information
to resides with the third party. It is difficult to imagine that any commercial third
party could have done as poor a job as the DVLA but it has to be acknowledged that
there are potentially less stringent checks and requirements imposed on the private
sector information broker in comparison to the public sector, government agency.
In effect, once governmental information is distributed for sale, it is difficult for
governments to control who it is ultimately sold to and the uses that the information
is put to. That said, it is clearly unacceptable for a government agency to provide,
let alone sell, personal information to an illegal or illegitimate source.
Thus far, this paper has focused on the information privacy and national security
issues that arise from driving licence personal information. More complex privacy
and national security issues may arise from the commercialisation of geospatial
information because information is derived from multiple agency data sources, it is
replete in a number of different data formats and it can be interpreted in multiple
ways and beyond the purpose it was originally intended for (Onsrud 2003, Onsrud,
et al. 1994, Snellen 2000, ANZLIC 2004). It is not within the scope of this paper to
cover the issue in depth but it is important to highlight in the context of national
Page 141
The Second Workshop on the Social Implications of National Security
security concerns arising from the commercialisation of geospatial PSI.The enhanced
proliferation and publication of governmental geospatial information may have the
consequence of putting information in the public domain that may more easily be
available to fall into the proverbial ‘wrong hands’. However, whilst it is important to
recognise this point, it is equally important to balance risks arising from extended
publication with the public good emanating from wider distribution of governmental
information (Onsrud 2003).
5
Conclusion
This paper has highlighted the different philosophical approaches of the EU, the
USA and the Australian Federal Government regarding the commercial re-use of
PSI.The EU’s outlook is overtly economic and encourages member governments to
commercially re-use PSI for the development of an EU-wide information economy.
The USA adopts a different perspective, at least at the Federal level, which aims to
make government information freely available.The Australian Federal Government
lies somewhere in the middle of the scale and adopts a pragmatic approach that is
not as philosophically guided as either the EU or the USA.The paper continued to
highlight information privacy concerns for governments regarding consent issues. In
Australia, IPP 10 is of particular issue and actual US and UK examples highlighted
situations where such consent concerns have arisen.
The Kehoe and DVLA examples highlight the sheer volume of PSI that is
commercially re-used for governmental income generation purposes. This in itself
raises implications for the prospect of an open, transparent and secure information
society. A balancing of societal interests is required which reflects the differing
priorities within governments and their effects on individuals. On one side of the
scale, we have the societal interest arising from access to government information
whether it is in the form of free and open access, to enhance democracy, or whether it
is in the form of the commercial re-use of PSI, to enhance the information economy.
On the other side, we have the societal interest arising from the trust relationship
between citizens and their governments which is founded upon and constructed
around the keystone notion of information privacy. At face value, the two sides of
the interest scale appear to be, if not irreconcilable, then certainly at conflict with
each other. Both interests represent competing values involving the requirements
of economically self-sufficient governments to sell, restrict and distribute their
information versus the individual citizen’s right to access and to control the use and
re-use of their personal information. The complex reconciliation of these interests
is further compounded when issues of national security are added to this mix.
It is perhaps easier to identify the conflicting societal interests entailed in the
commercial re-use of PSI and the information privacy of citizens than it is to
counterbalance fundamental competing concerns, especially in light of national
security issues. It is perhaps equally clear that a balance will not be found by simply
examining and updating PSI, information privacy and national security legislation.
Page 142
The Second Workshop on the Social Implications of National Security
Current laws do not adequately reflect the conceptual complexity and the democratic
importance of maintaining a balance between governmental income generation,
through the commercial re-use of PSI; the information privacy of citizens and the
national security requirements of governments.
All of which points to the fact that government agencies need to pay care
and attention to privacy and national security issues when making decisions to
commercialise PSI held under their custodianship. Both the Kehoe and the DVLA
examples highlight concerns that can arise from the commercialisation of PSI and
the negative consequences that can emerge for government agencies that have an
overt income generation outlook.The advent of wide spread, identity related crimes
and increased terrorist threats place greater requirements on government agencies
to think carefully before they adopt new PSI commercialisation strategies or they
re-engage in existing commercial transactions. Otherwise advanced and unchecked
marketisation of government information could have a detrimental effect on both
individual privacy and societal national security.
6
References
Aichholzer, G. (2004) “Electronic Access to Public Sector Information: Some Key
Issues.” In Electronic Government, 525-28: SpringerLink.
Australian Government Attorney-General’s Department (2005) “Intellectual
Property Principles for Australian Government Agencies.” Available at
http://www.ag.gov.au/www/agd/rwpattach.nsf/VAP/(22D92C325127572
0C801B3314F7A9BA2)~Statement+of+IP+Principles+for+Australian+Gov
ernment+Agencies-t.pdf/$file/Statement+of+IP+Principles+for+Australian
+Government+Agencies-t.pdf (Accessed 7 June 2007)
Australian Government Department of Communications, Information
Technology and the Arts (2004) “Australia’s Strategic Framework for the
Information Economy 2004–2006: ‘Opportunities and Challenges for the
Information Age’.” Available at http://www.dcita.gov.au/__data/assets/
pdf_file/20457/New_SFIE_July_2004_final.pdf (Accessed 1 June 2007)
Australian Government Department of Communications, Information
Technology and the Arts (2004) “Management and Commercialisation
of Commonwealth Intellectual Property in the Field of Information
Technology.” Available at http://archive.dcita.gov.au/__data/assets/pdf_
file/10079/Commonwealth_IT_IP_Guidelines.pdf (Accessed 1 June 2007)
Australian Government Department of Finance and Administration (2005)
“Australian Government Cost Recovery Guidelines.” Available at http://
www.finance.gov.au/finframework/docs/Cost_Recovery_Guidelines.pdf
(Accessed 1 June 2007)
Bannister, F. (2005) “The Panoptic State: Privacy, Surveillance and the Balance of
Risk.” Information Polity:The International Journal of Government & Democracy in
the Information Age 10: 65-78.
Page 143
The Second Workshop on the Social Implications of National Security
Blakemore, M., and Craglia, M. (2006) “Access to Public-Sector Information in
Europe: Policy, Rights, and Obligations.” Information Society 22: 13-24.
Center for Democracy and Technology. (2005)”Tracking Security at
State Motor Vehicle Offices.”. Available at http://www.cdt.org/
privacy/030131motorvehicle.shtml. (Accessed 18 September 2007)
Delgado, M., Ludgate, R. and Nichol, M. (2005) “DVLA Sells Your Details to
Criminals.” Mail on Sunday, 27 November.
Dutton, W., et al. (2005) “The Cyber Trust Tension in E-Government: Balancing
Identity, Privacy, Security.” Information Polity:The International Journal of
Government & Democracy in the Information Age 10: 13-23.
Electronic Privacy Information Center. “The Drivers Privacy Protection Act
(DPPA) and the Privacy of Your State Motor Vehicle Record.” Available at
http://www.epic.org/privacy/drivers/. (Accessed 27 July 2007)
European Commission (2003) “Directive 2003/98/EC of the European
Parliament and of the Council of 17 November 2003 on the Reuse of
Public Sector Information”. Available at http://europa.eu.int/eur-lex/pri/
en/oj/dat/2003/l_345/l_34520031231en00900096.pdf (Accessed 30 April)
European Commission (2001) “eEurope 2002: Creating a EU Framework for the
Exploitation of Public Sector Information.” Available at http://ec.europa.
eu/information_society/policy/psi/docs/pdfs/eeurope/2001_607_en.pdf
(Accessed at 11 May 2007)
European Commission (1989) “Guidelines for Improving the Synergy between
the Public and Private Sectors in the Information Market.” Available
at http://ec.europa.eu/information_society/policy/psi/docs/pdfs/
brochure/1989_public_sector_guidelines_en.pdf (Accessed 8 May 2007)
European Commission (2002) “Proposal for a Directive of the European
Parliament and of the Council on the Re-Use and Commercial Exploitation
of Public Sector Documents.” Available at http://ec.europa.eu/information_
society/policy/psi/docs/pdfs/directive_proposal/en.pdf (Accessed 11 May
2007)
European Commission (1998) “Public Sector Information: A Key Resource for
Europe.” Available at http://ec.europa.eu/information_society/policy/psi/
docs/pdfs/green_paper/gp_en.pdf (Accessed 11 May 2007)
Gellman, R. (1996) “The American Model of Access to and Dissemination of
Public Information.” In Access To Public Information: A Key To Commercial
Growth And Electronic Democracy. Stockholm. Available at http://europa.
eu.int/ISPO/legal/stockholm/en/gellman.html (Accessed 10 May 2007)
Gellman, R. (2004) “The Foundations of United States Government Information
Dissemination Policy.” In Public Sector Information in the Digital Age : Between
Markets, Public Management and Citizens’ Rights, edited by Aichholzer, G. and
Burkert, H. 123-36. Cheltenham, UK: Edward Elgar.
Janssen, K., and Dumortier, J. (2003) “Towards a European Framework for
Page 144
The Second Workshop on the Social Implications of National Security
the Re-Use of Public Sector Information: A Long and Winding Road.”
International Journal of Law and Information Technology 11: 184.
McCue, A. (2006) “DVLA Nets £6m from Sale of Motorist Details.” Available
at http://www.silicon.com/publicsector/0,3800010403,39159537,00.htm.
(Accessed 10 July 2007)
McCue, A. (2006) “Government Considers DVLA Data Sale Restrictions.”
Available at http://www.silicon.com/publicsector/0,3800010403,39159622
,00.htm. (Accessed 10 July 2007)
OECD (2006) “OECD Workshop on Public Sector Information: Summary.”
1-38: OECD. Available at http://www.epsiplus.net/epsiplus/media/
files/37865140__1 (Accessed 8 July 2007)
Office of Public Sector Information (2007). Available at http://www.opsi.gov.
uk/about/index.htm. (Accessed 30 April 2007)
Office of the New Jersey Attorney General. (2002)” Multi-Agency Investigation
Targeted “Brokers” & Corrupt DMV Employees.” Available at http://www.
state.nj.us/lps/dcj/releases/2002/dmv0624.htm (Accessed 18 September
2007)
Onsrud, H J. (2003) “Access to Geographic Information: Openness Versus
Security.” In Geographic Dimensions of Terrorism, edited by S Cutter, D
Richardson and T Wilbanks, 207-13: Routledge.
Onsrud, H J, J Johnson, and X Lopez. (1994) “Protecting Personal Privacy in
Using Geographic Information Systems.” Photogrammetric Engineering and
Remote Sensing, 60:9:1083-95.
Papapavlou, G. (1999) “Public Sector Information Initiatives in the European
Union.” Available at http://webworld.unesco.org/infoethics2000/
documents/paper_papapavlou.rtf. (Accessed 10/05/07)
Pas, J. “The Commercialization of Government Information and the Proposal for
a Directive Com(2002) 207 by the European Commission.” E Law 9, no. 4
(2002). Available at http://www.murdoch.edu.au/elaw/indices/title/pas94_
abstract.html (Accessed 8 May 2007)
Pas, J. and Du Vuyst, B. (2004) “Re-Establishing the Balance between the
Public and the Private Sector: Regulating Public Sector Information
Commercialization in Europe.” Journal of Information, Law and Technology, no.
2. Available at http://www2.warwick.ac.uk/fac/soc/law2/elj/jilt/2004_2/
pasanddevuyst/ (Accessed 10 May 2007)
Paterson, M. (2005) Freedom of Information and Privacy in Australia : Government and
Information Access in the Modern State. Chatswood: LexisNexis Butterworths.
Prins, C. (2004) “Access to Public Sector Information: In Need to Constitutional
Recognition?” In Public Sector Information in the Digital Age : Between Markets,
Public Management and Citizens’ Rights, edited by Aichholzer, G. and Burkert,
H. 48-68. Cheltenham, UK: Edward Elgar.
Purves, L. (2005) “Licensed to Sell Your Identity.” The Times Available at
Page 145
The Second Workshop on the Social Implications of National Security
http://www.timesonline.co.uk/tol/comment/columnists/libby_purves/
article597642.ece. (Accessed at 10 July 2007)
Rowlands, I. (1995) “Toward Public-Private Synergy in the European
Information Services Market.” Journal of Government Information 22: 227-35.
Snellen, Ignace Th.M. (2000) “Territorialising Governance and the State: Policy
Dimensions of Geographic Information Systems.” Information Infrastructure &
Policy 6: 3: 131.
Page 146
The Second Workshop on the Social Implications of National Security
12
The Internet as a communication
medium and a social space: a
social constructivist approach
to the use of open data
Lucy Resnyansky
Research Scientist, Defence Science and Technology Organisation
Abstract
This paper adopts a social constructivist approach in order to address issues related to
the use of the Internet as a source of data. The paper identifies and critically analyses
theoretical assumptions and discourses that are shaping public debates about the social
impact of security practices and intelligence for an information age. These discourses
promote a technological concept of the Internet as a communication medium and a
powerful yet neutral technology of information storage and access. Such a construct
entails assumptions and epistemologies whose usefulness has to be problematised due to
the specific nature of contemporary threats and security needs. An uncritical adoption of
such a construct of the Internet may have a negative impact both upon specific practices
(e.g., data collection and analysis) and long-term strategies and goals. This paper outlines
a concept of the Internet as a social space (a locus of social interaction) and suggests
how this concept can enhance data analysis. It is argued that the use of Internet sources
needs to be supported by an analysis of the conditions of their production, distribution,
and consumption, and that information technologies (search engines, databases, websites,
etc) need to be approached as social (discursive) practices. Such tools should provide
conceptual frameworks and analytical means enabling security/intelligence practitioners to
critically reflect upon data as being shaped by particular discourses, knowledge systems,
and cultural worldviews. This can be achieved if social sciences were integrated in the
development of technological tools supporting security/intelligence practices.
Keywords: Internet, data, social space, social constructivist approach
Page 147
The Second Workshop on the Social Implications of National Security
Today, various technologies create the means for governments,
intelligence services, and even individuals to gather and interpret
information about others that was historically held only in the coffers
of intelligence services in Washington and Moscow. Because of this
information and communications revolution, access to this information
is often exceptionally fast and relatively inexpensive. The era of
transparency is upon us.
At the same time, the world of terrorist cells and the illicit trade in,
among other items, weapons of mass destruction that intelligence targets
remains murky.Accordingly, transparency does not mean that everything
is completely open, not that it should be. It means rather that there are
increasingly unprecedented types and amounts of information available
to any one interested party about almost any other (O’Connell 2005,
p. 142).
1 Introduction
The era of transparency creates new challenges for security and intelligence and,
as O’Connell (2005) notes,“[w]hile some might believe that intelligence is immune
to such developments, it is actually in many ways driven by transparency” (p. 143).
For security/intelligence practices aiming at an analysis of events and trends related
to political violence, social conflicts, and cultural changes, transparency means that
such an analysis can draw upon diverse sources of data, both classified and unclassified
- from the research literature to media, computerised databases, websites created by
organisations and individuals, and so on (Pillar 2004). The Internet, in particular, is
widely used as a starting point, a primary resource and a powerful technology of
information access (see, e.g., Reid et al. 2004).
Debates about ICTs, security and intelligence are still largely shaped by the
discourses that construct technology as a powerful yet neutral augmenting tool.This
construct entails and re-enforces a positivist concept of data, a cognitive concept
of reliability of information sources, and a trend to ignore the diverse nature of the
information/knowledge field. This, in turn, may result in sharpening the division
between such activities as collection and analysis of data, which makes the interaction
between security/intelligence organisations less efficient. Such a division can also
be counter-productive from the perspective of the long-term security goals and
the balance between security and citizen rights.
This paper’s objective is to contribute to the integration of social sciences in
the area of the development of tools supporting intelligence analysis and modelling
(see also Resnyansky 2006; 2007a; 2007b). Integration of social scientific knowledge
in the development of models and modelling (analytical) tools requires: (a) analysis
of the heuristic significance of a particular social scientific theory, concept or
approach; (b) critical reflection upon the sociocultural implications of the conceptual
Page 148
The Second Workshop on the Social Implications of National Security
and computational models; and (c) understanding how security practices can be
affected due to the implementation of particular technological tools. In this paper,
this approach is used in order to understand how the use of information sources
and technologies in security/intelligence can be informed by social knowledge
developed in postmodernist, critical, and social constructivist theories and approaches
in sociology, communication and media studies, philosophy of technology, and
sociology of science. A comprehensive outline of the relevant social scientific
concepts and theories is beyond the scope of this paper. Rather, this paper aims to
give a general idea of the kind of alternative knowledge that can usefully inform the
development of tools supporting the use of the Internet as a source of information
for intelligence analysts aiming to understand (rather than collect) data.
2 Overview
The paper starts with a critical analysis of current discourses on security,
transparency and intelligence. On the one hand, I draw upon selected studies of
some major challenges faced by intelligence in the age of information, such as works
of O’Connell (2005) and Treverton (2003). In my opinion, these studies provide
excellent overviews of the ICT-generated advantages and problems, as well as
possible solutions.They also give very useful insights into the world of intelligence.
My reading of these works resulted in a better understanding of a need for social
scientific knowledge to be integrated in the technologies supporting intelligence
analysis and data collection. On the other hand, I focus upon the current discourse
on technology, transparency, and security. I show that it encourages an uncritical
acceptance of the construct of technology as a powerful yet neutral augmenting
tool and the market-driven construct of technology as a solution to the current
problems – whatever they are (even those that have been caused by technology
itself).This can explain why technology – in spite of its huge and increasing impact
upon security and intelligence practices – remains to be perceived as ‘just a tool’
by many practitioners. I suggest that, apart from technological tools, intelligence
practitioners need conceptual tools that would enable them to critically assess the
effects of specific information technologies upon their everyday practices and
strategic purposes.
I then proceed to the conceptualisation of the Internet for the purposes of
intelligence. I suggest that adoption of a social scientific concept of the Internet as
a social space (a locus of social interaction) can usefully inform the development
of reliability assessment criteria and enhance data analysis. The use of Internet
sources needs to be supported by an analysis of the conditions of their production,
distribution, and consumption. Also, information technologies (search engines,
databases, websites, etc) need to be approached as social (discursive) practices that
are both selected and selective. Social sciences can provide conceptual frameworks
and analytical tools enabling security/intelligence practitioners to critically reflect
upon data as being shaped by particular discourses, knowledge systems, and cultural
Page 149
The Second Workshop on the Social Implications of National Security
worldviews.
3 Technology, security and intelligence
At present, understanding of the social implications of modern ICTs in security
practices is conducted mainly within legal and political discourses which aim to
highlight the necessity of the balance between security and democracy (see, e.g.,
Strickland et al. 2005). However, the legal and political discourses tend to explain
the technology’s effects (both negative and positive) as dependent mainly upon the
conditions of its use, thus ignoring the fact that technology can also shape those
conditions. Such thinking can result in an illusion that the only and primary area
of critical intervention and public control is the area of political decisions and
legislations that can direct and regulate the activity of security agencies:
It is certain that information science and technology professionals
are ideally situated to provide the tools and mechanisms by which
the necessary domestic intelligence is collected and civil liberties are
protected through established law and policy.What is different today is
that the application of information analysis technology (i.e., knowledge
discovery tools) must be managed…. (Strickland et al. 2005, p. 500,
italic added).
This way of thinking is based upon a concept of technology as a neutral tool that
augments human senses and abilities and enhances practices. The legal discourse
highlights issues and factors external to the technology and naturalises the concept
of technology as a neutral (although powerful) tool whose applications need to be
regulated but whose intrinsic qualities are beyond questioning.This concept makes
it difficult to problematise technology as yet another ‘player’ in the contemporary
security arena and to critically assess its contribution to and effects upon specific
security practices. Nor can it help find constructive technological solutions that may
be applied to the emerging problems.
Also, the legal and political discourse is characterised by a trend to present
the field of security technologies as comprising entirely of the technologies of
surveillance and data collection, which is not quite so:
While technology supports all aspects of intelligence, it dominates the
collection function through its role in SIGINT, IMINT, MASINT, and
even the more recent construct of geospatial intelligence, or GEOINT….
But technology’s reach extends beyond collection.Technology also assists
in conducting intelligence analysis by helping analysts sort, manage,
highlight, and share data. Modern computing and communications
capabilities allow for the use of complex models – such as exploratory
modelling and social network analysis – to understand multilayered
relationships among people, events, and technologies.Within the realm
of intelligence sharing, technology provides the foundation for expanded
collaboration among analysts from diverse disciplines, agencies and
Page 150
The Second Workshop on the Social Implications of National Security
geographic locations…. Data storage, communications, collaboration
tools, and data mining technologies are of particular importance
(O’Connell 2005, pp. 146-147).
Nevertheless, legal discourse can create an impression that the current debates
about technologies, security and intelligence address the whole spectrum of
technologies and their possible applications in security practices. Such a vision can
also contribute to the public and decision makers’ understanding of what security/
intelligence is and should be about. However, the issues highlighted within the
legal and political discourses relate to one particular kind of activity – surveillance
and data collection, which is characteristic of security practices aiming to obtain
specific kinds of data (individuals’ data that are stored in databases and relate to
identities, physical appearance and observable actions). For example, in Strickland
et al. (2005), surveillance is stated to be the primary intelligence tool and is defined
as “the systematic observation or monitoring of ... places, persons, or things” (p.
434). The broad range of techniques (from covert to overt) and means (visual,
aural, electronic, photographic and other) represent, nevertheless, just one kind of
technological tools: they all are used for surveillance and the mining of “public or
private sector databases” (p. 501). This kind of information can be quite useful in
some cases but intelligence researchers (Schmitt 2005;Treverton 2003) warn against
focusing primarily on this kind of data and over-reliance upon ‘hard facts’.
Technological tools that support the analysis of trends, causes and factors
contributing to the emergence of threatening actors, or tools supporting collaboration
and information exchange, are ‘silenced’ and technologies of surveillance and data
collection are highlighted. This can result in pre-occupation with operational
and tactical – rather than strategic - activities and goals. Therefore, in spite of all
possible criticism and debates around surveillance and transparency issues, the legal
discourse may actually contribute to the further proliferation of the practices that
may potentially violate or reduce human rights, because they objectively support
an already significant imbalance between different technologies and activities in the
security/intelligence area (the technologies and activities aiming at data collection
vs. technologies of analysis). This imbalance may result in the reproduction of an
obsolete Cold War model of intelligence.This model is based upon a sharp distinction
between data collection and analysis, a distinction that does not make much sense
in the new conditions.This distinction significantly restricts analysts’ understanding
of what can be counted as useful or relevant information because it entails a
positivist understanding of data as some objective facts that exist independently
from the ‘observer’ (analyst) and need to be discovered. As Schmitt (2005) notes,
such a positivist stance based upon “the antinomies of fact and value, scholarship
and partisanship” (p. 46) has been acquired by the intelligence community in order
to break from the intelligence-policy maker nexus. However, the usefulness of the
positivist mindset has recently been questioned by intelligence researchers (see, in
particular, Treverton 2003).
Page 151
The Second Workshop on the Social Implications of National Security
Emergence of new threats and non-traditional threatening actors results in the
intelligence agencies’ changing role, culture and needs.The role of ICTs is growing
in these new conditions. In order to use the technological potential effectively,
technology should be approached not just as a tool but as a ‘participant’ of the
intelligence and security practices, a participant that suggests – and even imposes
- socioculturally specific and ideologically loaded worldviews and conceptual
frameworks. However, similarly to the legal discourse on technology and security,
the dominant research discourse on intelligence for an age of information tends
to construct technology as a tool that can affect upon the quantity of information
but is quite neutral in relation to the quality of intelligence analysis and subsequent
political and strategic decisions. The implication is that the search for the ways to
improve intelligence practices focuses upon the conditions that are external to the
technological tools. Researchers discuss such issues as organisational structure and
ethos, mind-sets of intelligence community, relationships with policy, and legislation
(Berkowitz 2005; Treverton 2003). Meanwhile, the concepts that are given to the
user together with the new ICTs – e.g., the narrow-technological and /or positivist
scientific concepts of the Internet, data, and reliability – need to be re-examined in
the changing conditions.
The age of information is characterised by rapid technological developments
and overwhelming amounts of information, which makes reshaping of intelligence
an imperative, argues Treverton (2003). In today’s world, intelligence business is less
about collection and secrets but more about information “defined as a high-quality
understanding of the world using all sources, where secrets matter much less and
where selection is the critical challenge” (p. 98). The previously sharp distinction
between collection and analysis is blurring, in particular when the Internet is used as
a source of information.This creates a set of new requirements for the ‘information
brokers’, such as an ability to sort “fact from fiction, or signals from noise” (p. 9).
Accordingly, the consumers of intelligence information (politicians and decision
makers) “need to beware of those who surf the Net but are not themselves experts:
Who knows what such people might make of the Net’s mix of fact, fancy, and pure
error?” (p. 10).
Although open sources are very important for today’s intelligence, intelligence
is returning to a preoccupation with secrets. Treverton (2003) explains why this is
happening and what issues need to be addressed in order to reshape intelligence for
an age of information. He points out multiple factors – starting from the intelligence
ethos, professional norms and organisational features as historically shaped by the
Cold War. However, this overview does not include one more important factor –
the patterns of thinking embodied in technology. Treverton outlines the range of
information brokers whose number and influence will be increased in the age of
information, and argues that the competition between different information brokers
will also increase. However, this list does not include such an important player as
technology: technology is just something that is used by actors but it does not
Page 152
The Second Workshop on the Social Implications of National Security
act itself. In other words, when it comes to information technology, Treverton’s
otherwise quite innovative approach to intelligence for an age of information
seems to be still influenced by technologists’ discourse on technology. Technology
is constructed as a tool that is used by competing information brokers rather than
one more ‘competitor’, which means that the quality of intelligence analysis is stated
to be dependent entirely upon people’s expertise (or lack of it). For example, the
Internet search engines are presented as tools that, while not currently able to solve
the problem of information reliability on the Internet, are, without doubt, evolving
towards the brighter future:
The Web is rich on sources but short on reliability. Over time, search
engines will improve and help provide first-cut assessments of reliability.
Still, the best Net surfers are experts who can make sense of the Net’s
stew of fact, fancy, and mistake (Treverton 2003, p. 104).
The discursive construction of technology as a neutral augmenting tool needs
to be problematised. It is difficult to say whether such a critical enterprise could
help the development of omnipotent search engines that Treverton thinks they can
become.1 At least, it can help understand that the technologies mediating access to
information may be partly responsible for the fact that sometimes analysts have to
deal not with meaningful information (data, knowledge) but with “stew of fact,
fancy and mistake”. Such a critical analysis could help the intelligence practitioners
to really “keep up with advancing technology” because keeping up with technology
means not only an ability to master search engines but also an ability to critically
assess the Internet as a sociocultural phenomenon, and to use this meta-knowledge
effectively. The intelligence community needs to be educated on the ICTs as a
sociocultural phenomenon; they need to be able to critically assess the ICTs as
being both selected and selective and, therefore, capable of influencing the dataset
and data interpretation. Tools are needed that enable users to make this kind of
critical reflection upon technologies and resources part of their meta-description
of sources and data. The social sciences can help develop such awareness and can
provide frameworks and tools to be used by practitioners to make more sense of
diverse data (knowledge, insights) obtained from different kind of sources as well
as for facilitating interaction and collaboration between intelligence practitioners.
4
Distributed intelligence: a need for meta-information
Due to the changing nature of threats and threatening agents, the mentality
of the intelligence community is changing, as well as the structure of intelligence
organisations. For example, Scott (2006) criticises the idea of vertically integrating
intelligence collection, analysis and operations, and argues that new strategies should
be developed.These strategies may require creation of distributed intelligence networks
1
See also O’Connell (2005) about such expectations:“There are high expectations for science and technology
in helping to solve some of the more modern aspects of intelligence, like the analyst’s challenge of information
overload and the visualization of complex phenomena like radar and biological data” (p. 140).
Page 153
The Second Workshop on the Social Implications of National Security
supporting exchange of information between decentralised groups with diverse
skills and expertise:
It may take distributed intelligence networks to fight globally connected
networks of local terrorist cells. … Informal bonds may need to
grow among diverse experts with idiosyncratic personal skills and
the operational branches fighting terrorism, so that a phone call from
an expert or operator in one country to another country can trigger
specific responses without plodding through official channels… (Scott
2006, pp. 293-294).
What aspects of practice and technological support need to be addressed in order
to enable intelligence branches to share their views and expertise? Scott (2006)
highlights the importance of the organisational structure and discusses such
alternatives as centralisation and network. Centralisation is not desirable and, indeed,
should be avoided because it may decrease the quality of analysis:
[I]f you want to solve a novel problem in an applied field… you are
more likely to succeed by consulting a decentralized group of problem
solvers with diverse skills and expertise rather than a hierarchically
organized group of like-minded experts who seek consensus, even if
they are the best in the field (Scott 2006, p. 294).
However, the proposed organisational changes may have multiple and not necessarily
beneficial socio-political consequences. Therefore, the search for a solution in
technology seems to be more attractive and promising.
For such a network to be efficient, technological tools are needed that could
support an effective and meaningful exchange of information between problem
solvers with diverse expertise and diverse sets of data. The problem with the
development of such tools (e.g., collaboration software, databases, analytical and
modelling tools) is that they are largely shaped by the narrow-technological
concepts of data, information, meta-data and communication.These are the concepts
that technology developers (engineers, computer scientists, etc) acquire in their
professional training and whose heuristic significance and utility they sometimes
tend to over-generalise (Resnyansky 2002).Technological concepts and values, such
as the primacy of the quantity of information over its quality and the acceptability of
decontextualised pieces of information, however, are not necessarily those that make
sense in intelligence practice. On the contrary, it may be the uncritical acquisition
of the technological concepts and values that have contributed to the regrettable
and problematic turning of intelligence analytic centres into ‘newsrooms’ and the
changing nature of the products of intelligence:
[P]olicy officials seldom have time or patience to articulate their
information requirements precisely. Nor do most of them know enough
to task intelligence operators effectively should they find the time to try.
“More on Iran” or “better stuff on Saddam Hussein’s intentions”: [sic]
This is the level at which most policy officials express their intelligence
Page 154
The Second Workshop on the Social Implications of National Security
needs… By organizing the process in this way, each bit of intelligence
stands by itself as a discrete commodity. Each bit can be updated, but
the updating, too, comes in discrete chunks. The cycle creates the
perception that the product of intelligence is “products,” most often
pieces of paper (or symbols on a computer screen). In fact, by contrast,
those pieces of paper are only inputs. The output of intelligence is
better understandings in the heads of people who must act or decide
(Treverton 2003, pp. 106-107).
The ICTs - due to their emphasis upon keyword search or the equalisation of
‘document’ and ‘content’ (without care about meaning and context) – can amplify
some counter-productive aspects of the organisational structure and culture of
intelligence-policy nexus, such as outlined by Treverton (2003) above.Therefore, the
dominance of technological concepts needs to be questioned and the development
of tools supporting intelligence analysis needs to be informed by the concepts
developed in social sciences.
The concept of distributed intelligence implies that an exchange of information
within the intelligence community requires a development of critical approach to
information sources.The participants of such exchange need to be able to explicate
and problematise their own and others’ assumptions and evaluation of sources, rather
than to take them for granted. Meta-information about sources is needed so that
analysts could assess others’ evaluation of the sources, rather than take for granted
others’ subjective opinions about the sources’ reliability and credibility:
While technology can help make greater use of collected data, it must
do so with relevant operational concepts and what might be called
“metadata.” For example, though constructing a massive database with
current and archival data of all types may provide a powerful tool for
an intelligence analyst, it will be useless without some regard for the
educational level, experience, and technical skill of the analyst who is
using that database. Further, if horizontal integration is the wave of the
future, it must accommodate more than a massive accumulation of data
in the hope that “smoke, light, and heat” – one analyst’s description
of a fully comprehensive intelligence picture – will emerge. If data
are not thought about more holistically – including how it [sic] may
be processed, evaluated, and understood by both analysts and decision
makers – utter confusion may just as likely be the outcome. Among
other issues, consideration must be given to the relative values of specific
pieces of information, their real or potential error values, and their
overall potential utility in providing intelligence assessment to someone
with little or no experience in the exotica of intelligence (O’Connell
2005, p. 150).
The concept of distributed intelligence implies that intelligence analysts need
a framework for a meaningful referencing and description of the sources that they
Page 155
The Second Workshop on the Social Implications of National Security
used. In order to support intelligence communication across organisations, states, and
cultures, such a framework needs to be embodied in technological tools supporting
interaction and analysis. Due to the complexity and the specific nature of data on
social processes, a social sciences’ contribution is required. Social sciences can help
develop a meta-analytical framework that enables analysts to capture information
about a broader context in which certain facts or events are embedded.They can also
provide theoretical frameworks that enable analysts to identify and collect relevant
data in a systematic way. Most importantly, they provide conceptual foundations
and methodologies for an analysis of discourses, ideological stances, grand narratives,
and commonsensical clichés that shape both the politicians and researchers’
conceptualisation of the phenomena they need to know about. Specifically, the
development of tools supporting intelligence analysis of political and mass violence
can benefit from an integration of the body of social scientific knowledge revealing
how contemporary threats of terrorism are constructed in various discursive
practices - media, the Internet (e.g., blogs), official speeches, analytical papers, etc
(see, e.g. Baudrillard 2002; Edwards and Martin 2004). As social research has shown,
the contemporary citizen is exposed to competing constructions of terrorism that
are shaped by different rhetorical themes. These constructions intend to serve the
interests of particular groups and to affect how terrorism is perceived by the public,
decision makers, and, to a certain degree, by researchers and analysts.Therefore, it is
important that the technological tools supporting intelligence analyses could enable
analysts to critically reflect on the heuristic significance of different constructions,
and to approach collected data as products of multiple and biased interpretations
rather than as objective decontextualised facts. Such tools can also help analysts
exchange information in a more meaningful and productive way.
5 The Internet as an information source and a discursive practice
The issue of reliability is one of the most important when it comes to the use of
the Internet as a source of information in intelligence.This issue has two interrelated
aspects: the criteria of reliability assessment and the very legitimacy (and usefulness)
of the category of reliability for intelligence activities aiming at an understanding
of social actors and trends. Currently, in the intelligence area, reliability of sources
can be assessed in such terms as: almost always reliable, usually reliable, fairly reliable,
fairly unreliable, unreliable, and cannot be judged; credibility of source is assessed in such
terms as almost certainly true, very likely, likely, unlikely, very unlikely, and cannot be
judged (Pope and Jøsang 2005).2 These abstract evaluative terms capture the results
of practitioners’ subjective perception of the reliability of information sources but
do not provide any qualitative information about the sources and the logic and
foundations behind analysts’ reasoning.The practice of using such abstract estimative
terms may be based upon an implicit assumption that the evaluated sources are of
2
For a classic exposition of estimative intelligence, see also Kent (2007).
Page 156
The Second Workshop on the Social Implications of National Security
the same nature and that all practitioners share knowledge regarding the nature of
the sources. Such an assumption, however, cannot be taken for granted in the case of
the Internet due to the diversity and non-homogeneous nature of the information
sources that can be accessed and data that can be used.
According to Myburgh (2005), information professions developed categories
for the evaluation of different information entities such as data, records, documents,
information, and knowledge. Specifically, data is evaluated in terms of accuracy,
validity, completeness, timeliness, auditability and integrity. Documents – in terms of
format, scope of content, relation to other works, authority of author and publisher,
treatment, arrangement, cost and longevity. Records – in terms of authenticity,
completeness and accuracy (evidential value). Information – in terms of authority,
currency and completeness. Information has a relative rather than absolute value,
and is influenced by the context of use. Knowledge is evaluated in terms of ‘truth’
and validity; these depend upon methodology, type of knowledge, or knowledge
framework in a discipline.These categories and evaluation criteria closely connected
with the practices and ethos of the information profession and, therefore, are not
universal. Categories and criteria of information sources’ reliability developed within
the field of academic research are not universally applicable as well.They are shaped
by specific practices of scientific research and, consequently, their applicability to
and usefulness for the security and intelligence practices need to be critically reexamined.
Uncritical acceptance of technological discourse by analysts and modellers can
also affect how the data are used in modelling and analysis. Specifically, it can result in
treating all kinds of sources equally. For example,Weaver et al. (2006) put data from
very different sources (such as news articles, web material, technical analyses, etc)
into a database used in order to “characterize the terrorist organization, its ideology,
political goals, campaign characteristics, operational environment, capabilities,
tactics, and many other attributes” (p. 4). Sources of a different nature were then
approached as a homogenous field, as if news articles, technical analyses, and web
materials were written from a single perspective and had equal value as sources of
factual knowledge.
The concept of the Internet as a source of information needs to be problematised
because it highlights just one – and not necessarily the most relevant - aspect of this
complex phenomenon.As Scott (2006) argues, the Internet needs to be approached
first of all as a communication space, a virtual “market” in which social entities are
emerging in the process of social interaction:
The semi-anonymity of internet communication, which lessens the
compulsion to hedge and defend oneself, promotes self-disclosure
and facilitates disregard of contextual differences that might otherwise
distract from or hinder communication…. [T]he need to make verbally
explicit one’s feelings and ideas favors disambiguation of messages and
reaching mutual understanding and consensus…. A new and vibrant
Page 157
The Second Workshop on the Social Implications of National Security
Jihadist “market” is emerging, which is decentralized, self-organizing
and self-adjusting (Scott 2006, p. 293).
In other words, the Internet can become yet another site of the formation of
threatening identities and groups. This vision of the Internet corresponds to the
postmodernist concepts of identity (Turkle 1995), literary criticism and semiotics
(Bakhtin 1981, 1984; Barthes 1979, 1992), and discourse theory (Foucault 1983,
1984).This vast area of social thinking is still outside the boundaries of intelligence
research, although it can provide theoretical frameworks for the development of a
qualitative approach to the Internet sources (as will be shown below).
For the purposes of threat anticipation, we need to analyse not only ‘reliable’
sources but also sources that function as virtual space for social interaction and
emergence of threatening agents. Although such sources cannot provide factual
information, their very existence, dynamics of their appearance, number of visitors,
and other characteristics provide valuable data.Therefore, it is important to approach
the Internet sources in the functional terms.The purely ‘cognitive’ categories (such
as true – false, reliable – unreliable) are insufficient and their dominance may result in
ignoring the value of the Internet as a locus of pragmatic action and social interaction.
An evaluation framework is needed that takes the diverse nature of the Internet
sources into account and helps the information user to evaluate information sources
in connection with specific fields of knowledge, institutional settings and practices,
and to approach it as a locus of social interaction and identity formation.
6 Language, information, and technology
The discussion conducted above aimed at a provision of a rationale for the
integration of social sciences into the development of analytical frameworks and
tools supporting intelligence use of the Internet as a resource and a technological
tool of information access.This section outlines theoretical foundations of a qualitative
approach to the Internet – both as a resource and a technological tool.
The Internet is mainly about data represented in the linguistic mode. Different
concepts of language can shape the technology developers’ and the users’ thinking
about the Internet. Their thinking may be shaped, for example, by a semiotic
concept of language as a code (system of signs and rules) that is used as a means
of communicating ideas or feelings. This concept emphasises, however, only
one - cognitive - aspect of linguistic activity. According to a functional approach
in linguistics (Halliday 1985), language is used in order to offer/demand both
information and service. This means that some utterances should be perceived as
actions and, as such, they may be quite important even if they convey incorrect
information about reality. In the case of the Internet, Jihadist websites aimed at the
propaganda of ideas are examples of such kinds of utterances.Although they may be
unreliable and convey untrue facts, they should not be dismissed as sources of data
on this ground. However, pre-occupation with the evaluation categories informed
by the cognitive/information concept of language may actually result in assigning
Page 158
The Second Workshop on the Social Implications of National Security
less value to these kinds of websites as sources of data. Meanwhile, the area of ICTs is
based upon the concept of language as a code (formal systems of signs and symbols)
rather than as an activity. In addition, this concept of language presents it as a ‘thing
in itself ’ (a closed system) while the functional theory of language emphasises its
connection with the social and cultural context.
The Internet provides access to multiple visions that are developed, on the one
hand, within scientific disciplines and, on the other hand, in media, blogs, etc. It is
important to distinguish between the visions formulated within scientific disciplines
and the views constructed within the filed of ‘doxa’ (opinion). Intelligence analysts
are interested in both, although they use them differently. Therefore, it is required
to clearly identify the status of data in terms of production, in particular because
opinion (doxa) may be disguised as a piece of research. Social researchers are quite
concerned about this phenomenon (see, e.g., Horgan 2005; Schmid and Jongman
1988; Silke 2004a).
There are Internet websites (e.g., so called ‘Jihadist propaganda’ websites, or
blogs, etc) that cannot and, indeed, should not be approached in such terms as truefalse. Their primary function is not to deliver information (facts, data) but to be a
pragmatic action aimed at the formation of opinions and shaping minds.They also
serve as loci of social interaction and of the processes of the formation of identities,
groups, and movements (Bailey and Grimaila 2006; Hoffman 2006;Weimann 2006;
Whine 1999a, 1999b). In the latter case, in particular, it is not secondary information
about facts but ‘reality’, which has its value due to existential status.The propaganda
websites may contain false or distorted messages but they cannot be dismissed on this
ground. On the contrary, such websites are a very interesting phenomenon whose
analysis can help analysts better understand the speaker and hypothesise about who
the intended audience is, the audience’s expectations, and what the interested agents
expect or encourage this audience to do. For example,Torres et al. (2006) show that
the analysis of propaganda websites can, first, help obtain an idea of the kinds of
agents that are functioning in a particular area. These may be: groups that directly
practice violence; those that support them morally; ‘ghost’ groups; and clandestine
denominations specialising in the information dimension of social movements.
Second, the analysis of propaganda websites can also help identify the kinds of
audiences and reference groups for particular ideas (e.g., groups within/outside the
domain of a political organisation; concrete or ‘imagined’ communities). Third, it
can help obtain an idea of the means and channels of ideas’ diffusion, distribution
and reproduction (e.g., close/open channels, networks, and geography).
Understanding of concepts such as data, information, knowledge and information
technology can affect upon the use of the Internet in intelligence. It is impossible to
review these concepts in this paper. Therefore, I just note that some of the current
trends and needs in intelligence can benefit from the concept of data in qualitative
social research (see, e.g., Mason 2002). This concept emphasises that data are not
given to the researcher as something that exists independently from the researcher’s
Page 159
The Second Workshop on the Social Implications of National Security
theoretical assumptions and ideological stance. Rather, data are constructed in the
process of research. Data, information, and knowledge are, therefore, socioculturally
specific and are shaped by institutional practices and interests of particular groups.
Also, as sociology of science has shown, the material aspects of knowledge production,
transmission and consumption are as important as its content (see, e.g., Reid (1993)
on the role of funding and network in terrorism research).
The concept of information technologies developed in the social theories of science,
technology and knowledge (e.g., Bijker, Pinch and Hughes 1987; Ellul 1964; van
House 2004) aims to highlight the social and transformative nature of technology.
According to this approach, information technology and resources are not neutral;
they are shaped by particular and partial views and values, are selective of both the
information and the information user, and can impose certain patterns of information
usage.
The sociocultural concepts of information and information technologies help
the user to understand that, due to the use of IT, he/she deals not with primary
information but with an information universe that has been already ordered by
somebody and, therefore, it is necessary to critically assess the potential effects of
that ordering.This understanding can be informed by the concept of knowledge as
a social construction (Foucault 1972) and by the idea of the role of social networks
within knowledge and information access (Davenport and Hall 2002; Lievrouw and
Farb 2003). Within this approach, information searching is understood as a social
process of becoming affiliated with particular communities and sharing concepts
and discourses developed within particular domains of knowledge and practice.
However, the development of such awareness may be affected by the concepts
embodied in technology – specifically, the concept of information searching
formulated within the domain of information science (see, e.g., Wilson 2000). It
can also be affected by the promotional discourse on ICTs. This discourse tends
to present ICTs as impartial and objective. For example, databases are constructed
as objective and reliable sources of information. This construction draws upon a
concept of electronic reference work developed within the fields of information and
library science and the publishing industry (see Armstrong and Large 1990). This
concept highlights the temporal and spatial aspects of such an activity as information
search. Electronic reference works are praised as having advantages described in
terms of size, comprehensiveness, and up-to-date information. However, those may
not all what the intelligence practitioner or a scholar working on terrorism-related
problems needs. Gordon (2004a), for example, identifies two major problems that
terrorism researchers encounter when they use electronic information sources,
such as directory and bibliographic databases. First, they are characterised by
instability:“new documents push out older documents, and the results of queries are
constantly changing” (p. 87). Second, interfaces and search strategies are changing,
which affects the results of the search. Gordon argues that “[t]he instability of these
resources… accentuates the realistic view that information technology was and is
Page 160
The Second Workshop on the Social Implications of National Security
unable to delineate the boundary lines of terrorism as a distinct subject of research
and teaching” (p. 87). This study shows that databases are not neutral technological
tools or resources; they can affect upon a research field, e.g., via establishing and
changing its boundaries.
Another possible effect of technologies is that the user may find it difficult to
distinguish between core and peripheral research on terrorism.The use of keyword
search results in that the field of research is perceived by the database user as
homogenous, in which there is no division between core and peripheral subfields
or between the hierarchy of scientific publications (see, e.g., Gordon 2004b; Silke
2004b).This, in turn, results in that the user may find it difficult to make a judgement
regarding the reliability and authority of the sources that are accessed with the help
of this technology.
Another problem with event databases is that the range of data is affected by
particular methodologies and theoretical assumptions.The selective nature of event
databases is, however, not obvious. Rather, the user may be misled by the databases’
descriptions emphasising the quantitative features of databases and presenting
them as comprehensive sources of data in spite of the fact that those data represent
only particular aspects of a phenomenon. The following description of the Global
Terrorism Database3 may be considered an example of the promotional discourse
on event databases:
The Global Terrorism Database (GTD) is an open-source database
including information on terrorist events around the world since 1970
(currently updated through to 2004). Unlike many other event databases,
the GTD includes systematic data on international as well as domestic
terrorist incidents that have occurred during this time period and now
includes almost 80,000 cases. For each GTD incident, information is
available on the date and location of the incident, the weapons used and
nature of the target, the number of casualties, and - when identifiable
- the identity of the perpetrator….
Characteristics of the GTD
•Containsinformationonover80,000terroristattacks
•The main types of information found in the GTD are items that
you would expect to find in a well written newspaper story about a
terrorist attack: the type of attack, the number of persons killed, the
group claiming responsibility, the date of the event and so on
•TheGTDiscurrentlythemostcomprehensiveunclassiieddatabase
on terrorist events in the world
•It includes information on more than 27,000 bombings, 13,000
3
‘Global Terrorism Database’ (2007), National Consortium for the Study of Terrorism and Responses to
Terrorism, retrieved July 17, 2007, from http://www.start.umd.edu/data/gtd/.
Page 161
The Second Workshop on the Social Implications of National Security
assassinations, and 2,800 kidnappings
•Theoriginaldataincludedinformationonover45variables;thenew
data includes over 120 variables
•Morethan75datacollectorswithexpertiseinsixlanguagegroups
are currently engaged in collecting GTD data
•Datacollectionissupervisedbyanadvisorypanelof12terrorism
research experts
•Over2,000,000newsarticlesand25,000newsourceswerereviewed
to collect GTD from 1998 to 2004 alone.
As Silke (2004a) argues, although event databases are widely used in terrorism
research and analysis, data collected in event databases is not very reliable since it
is often based on journalistic analyses and descriptive statistics. The result of this
is that terrorism research can provide rather reliable knowledge on factual details
of terrorist events but is not that reliable when it comes to the explanation and
behavioural patterns:
[R]esearch which emerges from the various event databases which are
available… tends to be relatively good at answering questions as to the
who, when and where of terrorist activity. Issues of why are not so solidly
covered; and perhaps even more surprisingly the how of terrorist events
is remarkably underexamined. (Silke 2004a, p. 10)
However, these limitations of event databases can be unnoticed due to the dominance
of the promotional discourse on ICTs.
The concepts of language, knowledge, information and information technologies
can be linked together via the concept of discursive practice developed in the
linguistic and semiotic studies informed by critical social theory. This approach is
developed, for example, in the works of Hodge and Kress (1988), Kress and van
Leeuwen (1990), Lemke (1995) and Fairclough (1992).Within this approach, texts are
conceptualised as being embedded in the processes of their production, distribution
and consumption (understanding and interpretation). The processes of textual
production, distribution and consumption are shaped by social institutions, cultural
traditions, and communication technologies. Texts are products of a social order
and power relations, and they may have the reproductive and transformative effects
upon the systems of knowledge, social relations, and social identities (Fairclough
1992). Adoption of the concept of text as an instance of discursive (social) practice
can help develop IT-based tools enabling the user to take context into account and
to consume the Internet information sources in more meaningful ways.
If the ICTs is approached as a thing in itself, the use of ICTs in security and
intelligence practices will remain to be shaped by the discourses of technological
determinism and be influenced by the narrow-professional views of technology
developers and/or the interests of sales people, with their specific vision of the
advantages and disadvantages of ICTs. This can significantly restrain the efficiency
of attempts to minimise the undesirable impact of ICTs upon security practices.
Page 162
The Second Workshop on the Social Implications of National Security
From the perspective of the war on terrorism, the imbalance of intelligence
practices and technologies means that the security practitioners and decision makers
will be more likely to adopt reactive rather than proactive strategies – if not always
in relation to events and actions but almost always in relation to the causes and
conditions of the emergence of actors that may wish to make those events occur.
Thus, due to this construction of technology as a neutral tool and because of preoccupation with the technologies and activities of surveillance and data collection,
the legal and political discourses – while aiming to find ways of reaching a balance
between security and individuals’ rights – can actually narrow the range of strategies
and means that a society can choose in order to deal with new threats effectively.
7
Conclusion
This paper has identified and critically analysed theoretical assumptions and
discourses that are currently shaping public debates about the social impact of
security practices and the intelligence researchers’ discussion of the intelligence for
an information age.These discourses promote a technological concept of the Internet
as a powerful yet neutral technology of information storage and access and the
market-oriented concept of the Internet as a communication medium.An uncritical
adoption of such a construct of technology may have a negative impact both upon
specific practices of data collection and analysis and the long-term strategies and
goals. It entails positivist assumptions and epistemologies whose usefulness is highly
problematic due to the specific nature of contemporary threats.
The Internet offers data/information/knowledge produced within such diverse
and heterogeneous fields as academic studies, media, adversary propaganda, etc.The
use of the Internet in intelligence analysis needs to be informed by an understanding
of the following: (a) those sources not usually intended to be used for the purposes
of intelligence; they are shaped by other practices, needs, and interests (e.g., news
stories in the media aim at the promotion of certain views and ideas rather than at
the provision of objective facts); (b) data and information are shaped by different
discourses, knowledge systems, and cultural worldviews; and (c) access to data is
mediated by information technologies and resources (databases, search engines, etc).
Therefore, the use of the Internet needs to be supported by tools that enable the
analyst to critically reflect upon and take into account the conditions of the data/
information/knowledge production, distribution, and consumption.
Development of such tools can benefit from an integration of the multifaceted
and insightful knowledge about the Internet developed within qualitative
social research. It may also benefit from the use of sophisticated approaches and
methodologies of data analysis developed in such areas as sociology of science, social
semiotics and critical discourse analysis. These approaches can help analysts better
understand ideologies and values that may be used in order to manipulate, socialise,
and organise social actors.
Page 163
The Second Workshop on the Social Implications of National Security
8
Recommendations
Adoption of social scientific concepts implies that the Internet sources need to
be approached:
1) in terms of their communicative function - Internet sources are divided into
sources of information and space for social interaction and/or pragmatic action.
These two types of Internet sources can be used differently as sources of data
for intelligence analysis and modelling. Accordingly, only the first types can
be assessed with the categories such as ‘true-false’ information and ‘reliable
and credible’ source. Both types of sources can and need to be analysed as
social (discursive) practices.
2) in terms of the field of knowledge production/consumption - disciplinary
research, doxa, and propaganda. In order to use data in meaningful ways, the
different kinds of Internet sources need to be categorised in terms that are
specific for each field.
3) in terms of the distribution of information/knowledge.This requires an analysis
of the networks and promotional techniques, and, in particular, critical attitude
towards the technologies that mediate access to information. Practitioners
need to be aware that the technologies can affect the intelligence practice.
An uncritical perception of the IT- and market-specific discourses on
technology can result in the ineffective and even counter-productive use of
both information technologies and information itself. A critical assessment of
technologies mediating access to information needs to be part of the use of
the Internet as a source of data in the areas of intelligence and security.
The sociocultural concepts of ICTs and discursive practice can be used by
intelligence practitioners in order to understand:
• Whataspects/featuresofawebsitetolookat?
• Howtoassessthemasindicationsofthedata’susefulnessandasmanifestations
of social practice and a particular worldview?
• Howtotakeintoaccounttheroleofthetechnologiesandresourcesthatmediated
access to the data?
• How to capture this meta-knowledge and evaluation in a way that would
facilitate – rather than slow down – exchange of information between different
agencies?
References
Armstrong, CJ & Large JA (eds) 1990, CD-ROM information products: An
evaluative guide and directory:Volume 1, Gower, Aldershot.
Bailey, TD & Grimaila, MR 2006, ‘Running the blockade: information
technology, terrorism, and the transformation of Islamic mass culture’,
Terrorism and Political Violence, vol. 18, no. 4, pp. 523-543.
Page 164
The Second Workshop on the Social Implications of National Security
Bakhtin, MM 1981, The dialogic imagination: four essays, ed. M Holquist, trans.
C Emerson and M Holquist, University of Texas Press, Austin, TX.
Bakhtin, MM 1984, Problems of Dostoevsky’s poetics, ed. and trans. C Emerson,
University of Minnesota Press, Minneapolis.
Barthes, R 1979, ‘From work to text’, in Textual strategies: perspectives in poststructuralist criticism, ed. JV Harari, Cornell University Press, Ithaca, NY, pp.
73-81.
Barthes, R 1992, ‘The death of the author’, in Modern literary theory: a reader,
eds P Rice & P Waugh, Edward Arnold, London, pp. 114-121.
Baudrillard, J 2002, The spirit of terrorism and other essays, trans. C Turner,Verso,
London.
Berkowitz, P (ed) 2005, The future of American intelligence, Hoover Institution
Press, Stanford University, Stanford, CA
Bijker, W, Pinch, T & Hughes, T 1987, The social construction of technological
systems: New directions in the sociology and history of technology, The
MIT Press, Cambridge, MA.
Davenport, E & Hall, H 2002, ‘Organizational knowledge and communities of
practice’, in Annual Review of Information Science and Technology:Volume
36, ed B Cronin, Information Today, Medford, NJ, pp. 171-228.
Edwards, J & Martin, RJ (eds) 2004, Interpreting tragedy: the language of 11
September 2001, Discourse & Society (Special issue), vol. 15, no. 2-3.
Ellul, J 1964, The technological society, trans. J Wilkinson,Vintage Books, New
York.
Fairclough, N 1992, Discourse and social change, Polity Press, London.
Foucault, M 1972, The archeology of knowledge, trans. AM Sheridan Smith,
Tavistock, London.
Foucault, M 1983, ‘The subject and power’, in Michel Foucault: Beyond
structuralism and hermeneutics, eds HL Dreyfus & P Rabinow, University of
Chicago Press, Chicago, pp. 208-226.
Foucault, M 1984, ‘The order of discourse’, in Language and politics, ed. M
Shapiro, Basil Blackwell, Oxford, pp. 108-138.
Gordon, A 2004a, ‘The effect of database and website inconstancy in the
terrorism field’s delineation’, Studies in Conflict and Terrorism, vol. 27, pp.
79-88.
Gordon, A 2004b, ‘Terrorism and knowledge growth: a databases and internet
analysis’, in Research on terrorism: trends, achievements & failures, ed A
Silke, Frank Cass, London, Portland, OR, pp. 104-118.
Halliday, MAK 1985, An introduction to functional grammar, Edward Arnold,
London.
Hodge, R & Kress, G 1988, Social semiotics, Polity Press, London.
Hoffman, B 2006 The use of the Internet by Islamic extremists: testimony
presented to the House Permanent Select Committee on Intelligence, The
Page 165
The Second Workshop on the Social Implications of National Security
RAND Corporation, viewed 18 May 2007, <http://www.au.af.mil/au/
awc/awcgate/congress/hoffman_testimony4may06.pdf>.
Horgan, J. 2005 The psychology of terrorism, Routledge, London.
Kent, S 2007, Sherman Kent and the Board of National Estimates: Collected
essays, viewed 3 September 2007, <http://onlinebooks.library.upenn.edu/
webbin/book/lookupid?key=olbp21035>.
Kress, G & van Leeuwen, T 1990, Reading images, Deakin University Press,
Geelong,Victoria.
Lemke, JL 1995, Textual politics: Discourse and social dynamics, Taylor & Francis,
London, Bristol, PA.
Lievrouw, LA & Farb, SE 2003, ‘Information and equity’, in Annual Review of
Information Science and Technology:Volume 37, ed. B Cronin, Information
Today, Medford, NJ, pp. 499-539.
Mason, J., 2002, Qualitative researching, 2nd edn., Sage, London.
Myburgh, S 2005, The new information professional: how to thrive in the
information age doing what you love, Chandos Publishing, Oxford.
O’Connell, KM 2005, ‘The role of science and technology in transforming
American intelligence’, in Peter Berkowitz (ed), The future of American
intelligence, Hoover Institution Press, Stanford University, Stanford, CA, pp.
139-174.
Pillar, PR 2004, ‘Intelligence’, in Attacking terrorism: elements of a grand
strategy, eds AK Cronin and JM Ludes, Georgetown University Press,
Washington, D.C., pp. 115-139.
Pope, S & Jøsang, A 2005, ‘Analysis of competing hypotheses using subjective
logic’, in Proceedings of the 10th International Command and Control
Research and Technology Symposium (ICCRTS’05), McLean Virginia,
USA, viewed 25 May 2007, <http://sky.fit.qut.edu.au/~josang/papers/
PJ2005-ICCRTS.pdf>.
Reid, E 1993, ‘Terrorism research and the diffusion of ideas’, Knowledge &
Policy, vol. 6, no. 1, pp. 17-38.
Reid, E, Qin, J, Chung, W, Xu, J, Zhou,Y, Shumaker, R, Sageman, M & Chen,
H 2004, ‘Terrorism knowledge discovery project: A knowledge discovery
approach to addressing the threats of terrorism’, Proceedings of the Second
Symposium on Intelligence and Security Informatics, June 10-11, Tucson,
AZ, pp.125-145, viewed 24 November 2006, <http://ai.arizona.edu/
people/edna/AILab_terrorism%20Knowledge%20Discovery%20ISI%20_
apr04.pdf>.
Resnyansky L 2002, ‘Computer-mediated communication in higher education:
educators’ agency in relation to technology’, Journal of Educational Enquiry,
vol. 3, no. 1, pp. 35-59, <http://www.education.unisa.edu.au/ JEE>.
Resnyansky, L 2006, ‘Conceptualisation of terrorism in modelling tools: critical
reflexive approach’, Prometheus, vol. 24, no. 4, pp. 441-447.
Page 166
The Second Workshop on the Social Implications of National Security
Resnyansky L 2007a Integration of social sciences in terrorism modelling: issues,
problems and recommendations. DSTO-TR-1955, (U), http://www.dsto.
defence.gov.au/publications/5099/DSTO-TR-1955.pdf.
Resnyansky, L 2007b ‘Integration of social sciences in modelling: an interactionist
approach to research practice’, paper presented at the First International
Conference on Computational Cultural Dynamics (ICCCD 2007), 27-28
August, University of Maryland, USA, <http://www.umiacs.umd.edu/
conferences/icccd2007/lucy-r.pdf>.
Schmid, AP & Jongman, J 1988, Political terrorism: a new guide to actors,
authors, concepts, data bases, theories, and literature, Transaction Books,
Amsterdam.
Schmitt, GJ 2005, ‘Truth to power? Rethinking intelligence analysis’, in The
future of American intelligence, ed. P Berkowitz, Hoover Institution Press,
Stanford, CA, pp. 41-64.
Scott, A 2006, ‘A failure of imagination (intelligence, WMDs, and “virtual
jihad”)’, Studies in Conflict and Terrorism, vol. 29, pp.285-300.
Silke, A 2004a, ‘An introduction to terrorism research’, in Research on terrorism:
trends, achievements & failures, ed. A Silke, Frank Cass, London, Portland,
OR, pp. 1-29.
Silke, A (2004b), ‘The road less travelled: recent trends in terrorism research’, in
Research on terrorism: trends, achievements & failures, ed. A Silke, Frank
Cass, London, Portland, OR, pp. 186-213.
Strickland, LS with DA Baldwin and M Justen 2005, ‘Domestic security
surveillance and civil liberties’, in Annual review of information science and
technology,Volume 39, ed. B Cronin, Information Today, Medford, NJ, pp.
433-513.
Torres, MR, Jordan, J & Horsburgh, N 2006, ‘Analysis and evolution of the global
jihadist movement propaganda’, Terrorism and Political Violence, vol. 18, no.
3, pp. 399-421.
Treverton, GF 2003, Reshaping national intelligence for an age of information,
Cambridge University Press, Cambridge, UK.
Turkle, S 1995, Life on the screen: Identity in the age of the Internet. Simon &
Schuster, New York.
Van House, NA 2004, ‘Science and technology studies and information studies’,
in Annual review of information science and technology, ed B Cronin,
Information Today, Medford, NJ, pp. 3-86.
Weaver, R, Silverman, BG, Shin, H & Dubois, R 2001, Modeling and simulating
terrorist decision-making: A “performance moderator function” approach to
generating virtual opponents, viewed 7 September 2006, <http://repository.
upenn.edu/cgi/viewcontent.cgi?article=1026&context=hms>.
Weimann, G 2006, ‘Virtual disputes: the use of the Internet for terrorist debates’,
Studies in Conflict & Terrorism, vol. 29, pp. 623-639.
Page 167
The Second Workshop on the Social Implications of National Security
Whine, M 1999a, ‘Cyberspace – a new medium for communication, command
and control by extremists’, Studies in Conflict & Terrorism, vol. 22, pp. 231245.
Whine, M 1999b, ‘Islamist organisations on the Internet’, Terrorism and Political
Violence, vol. 11, no. 1, pp. 123-132.
Wilson, TD 2000, ‘Human information behavior’, Informing Science (Special
Issue on Information Science Research), vol. 3, no. 2, pp. 49-55, viewed 23
April 2004, <http://inform.nu/Articles/Vol3/v3n2p49-56.pdf>
Page 168
The Second Workshop on the Social Implications of National Security
13
The Agora-Pnyx paradox
George Mickhail
Senior Lecturer, School of Accounting and Finance, University of Wollongong
Professeur des Universites Invité, IAE, Université d’Orleans, France
Abstract
The avatars of the new capitalism are decreeing how the larger economy should evolve,
and follow their efficient reconfigurations of human, technological and physical resources,
because it adds up to more freedom. This presented the political space with the opportunity
to converge with the economic space. The result was the corporatisation of government
that is inherently neo-liberal (or neo-conservative) that often produced analysis-free
policies. Coupled with that, was the evolution of the passive consumer-citizen. These three
challenges facing our transparent society bring into question the legitimacy of a democratic
process, that seems to be driven by cultural forms which celebrate personal change and
indifference, but not collective progress. This paper concludes that freedom is not just
an individual matter, given the complexity of the issues, such as with surveillance and
privacy, so a collective response backed by intellectual analysis can effectively confront
the totalising discourse of the powerful, and force its own version of reality on the public
agenda.
Keywords: Agora, efficiency, Pnyx, privacy, surveillance
Page 169
The Second Workshop on the Social Implications of National Security
The processing potential of information technology has lured public
organisations towards mass surveillance and has led critics to warn against
‘creeping authoritarianism’. The fear expressed there is not the one of
totalitarianism - undemocratic leadership using the existing structures
as a means of repression, although this fear is also expressed - but rather
of a gradual, generally unnoticed and almost unconscious encroachment
of individual privacy and liberty by institutions, under the auspices of
improved efficiency (Angell 1995, p.331).
1 Introduction
Plato, believed in separating the Agora (economic space) from the Pnyx (political
space), because he believed that need and greed enervates people’s capacity for
what is just and right. This paper draws upon Plato’s idea of how society is being
weakened by the machinations of need and greed that seem to expand their sphere
of influence over almost all aspects of our lives. It is particularly instructive when
discussing how economic rationalism, not political idealism, is shaping the debate
over public policy issues, such as: surveillance and privacy. This paper explores three
challenges facing our increasingly transparent society: (a) problems due to the uneasy
alliance between the economic-political space, (b) evolution of the new institutional
structures and the consumer-citizen class, and (c) corporatisation of government and
analysis-free policy. Those challenges will be analysed to inform our understanding
of their capacity to misinform analysis of public policy issues.
2 The Agora-Pnyx liaison
Technology that lowers the cost of capital for a firm is an attractive value
proposition, and naturally results in reconfiguring the capital and labour resources
within the firm, in favour of the technology. Airline travel had to rely on such
technological developments, such as: X-Ray machines and metal detectors, when
labour intensive methods of searching through the luggage and long queues of
passengers were not compatible with the rapid growth in global travel and airline
schedules.
The rapid expansion of airline hubs, with airlines taking control of terminal
buildings and airports, meant that airline security was also part of their business,
though, a non-core function. This meant that airline companies would seek the
lowest bidder on their security contracts, who would also seek the minimum wage
person, in order to make a little profit for themselves (CNN 2001). Comprehensive
screening during peak periods often presented a conflict of interest, between profitdriven airlines trying to minimise flight delays and the responsibility the companies
carry to provide security.
Airlines, like most businesses, attempt to influence federal oversight through
their contributions to political candidates in both major parties. Coupled with their
powerful trade organisations and direct representation, it ensured their sway over
Page 170
The Second Workshop on the Social Implications of National Security
much of the Federal Aviation Authority (FAA) policies. For example, following the
TWA-800 disaster in 1996, the commission delayed the immediate implementation
of the recommended baggage matching measures, because the airlines argued that it
was too costly and would enrage passengers. This inept role for the FAA continued
in its relationship with the airlines over the decade and leading to September 11th,
2001. The FAA would fine the airlines for security incidents and violations and
the airlines would negotiate their fines and often end up paying 10 cents in a dollar
for their fines, which was far cheaper than making the necessary expenditure on
security enhancements recommended by the FAA.
T o p 10 U S Airlin es
1991-2000 T o tal Airlin e S ecu rity In cid en ts an d V io latio n s
1949
American Airlines
3769
1740
Delta Air Lines
3866
1539
United Airlines
3556
1183
Northwest Airlines
2734
1140
US Airways
2578
889
Southwest Airlines
1990
855
Continental Airlines
1767
661
Trans W orld Airlines
300
Alaska Airlines
America W est
289
0
1228
652
589
1000
2000
No. of Security Incident s
3000
4000
5000
6000
No. of Security Violations
Table A – 1991-2000 Total Airline Security Incidents and Violations
(Source: U.S. Bureau of Transportation Statistics)
On September 11th, 2001 the two carriers whose jets were hijacked, were at
the top of the list of airlines with security incidents and violations over a decade
(1991-2000). American Airlines was the highest, with 1949 incidents and 3769
violations, and United Airlines was the 3rd highest, with 1539 incidents and 3556
violations. This perhaps highlights the dysfunctional nature of a system that was
levying the same fines year after year.
It was not then surprising that Congress would come to the rescue and
established the victims’ compensation fund two weeks after September 11th attacks,
to not only help the families of those killed and the injured survivors, but to also
discourage lawsuits against American and United airlines. Those who accepted
payment from the fund waived their rights to sue individual companies (CNN
2007). However, 90 families (of which 14 have decided to settle out of court on
Page 171
The Second Workshop on the Social Implications of National Security
September 19th, 2007 with terms of the settlement not disclosed) did not accept
payment from the fund and sued instead the airlines and the private airline security
company,Argenbright Security (released from its contract in 2002 by the Department
of Transport amid allegations of inferior security standards), for their failure in their
duty of care (wrongful death).
The rhetorical question is whether airlines, or other corporations, finance
political campaigns of major parties, so as to wield ‘some’ influence over political
oversight, given that politicians are left with no option but to offer ‘protection’ to
their benefactors at the expense of the citizenry? The problem thus is with this
unholy union between the economic (agora) and political (pnyx) space, which
seem to privilege their interests, with the unintended result of a political oversight
that sanctions the interests of the economic space to the detriment of the political
space.
3 Citizen as consumer
The global boom in the hi-tech industry, financial services and media service
organisations, which represent the new cultural ideal of the new capitalism despite
being only a small part of the whole economy, exerts a profound moral and
normative force as a cutting edge standard for how the larger economy should
evolve. Avatars of the new capitalism proclaim that their reconfigurations of work,
talent and consumption add up to more freedom (Saul 1997: 82, Sennett 2006:10).
This is perhaps the nexus that brings both the economic (agora) and political (pnyx)
space together in this union.
Institutions in the new capitalism are driven by an economic ideal of optimal
resource allocation, through information technology, leading to maximised utility,
or in short: efficiency. The quest for efficiency (Mickhail & Ostrovsky 2005: 290)
is a reality involving both private and public corporations alike, where an emphasis
on control over resource utilisation is done through methods of “bureaucratic
accounting technology which can be coupled to totalitarian and democratic political
regimes alike” (Power 1995: 293).
Power (1995: 299) argues that accounting can be regarded as
a technology that subjects individuals to the ‘objectifying’ gaze of
distant regulators, a system of surveillance that stimulates a style of selfregulatory behaviour. Subjects must constantly act and behave as if they
are being watched and will be forced to account for themselves.
The language of asset, cost, expense, liability and profit which informs accounting
is often less precise; its objective measurement of what an asset or an expense is, for
example, is often dubious. Contestable profit (or loss) measurement have real
consequences: share prices may fall, bank branches may be closed down, CEOs
may indulge themselves with higher rewards, mass lay-offs of workers, loans may
be granted, and so on. This technically ambiguous and not so readily transparent
practice, with its abstractness from operational detail, can lead to tangible freedoms,
Page 172
The Second Workshop on the Social Implications of National Security
or the lack of them.
Accounting wields influence over any aspect of society that is subject to
economic calculation, propounding a complex moral technology that expresses and
endorses specific models of social and economic relations. Surveillance technology,
chiefly used for its perceived economic efficiency, like accounting, whilst driven by
ideals of procedural fairness and impartiality, are nevertheless dubious as to their
accuracy and precision. Their ambiguous practice within society leaves room for
misinformation and misinterpretation, but can also lead to material freedoms, or
the lack thereof.
The social implications of such reality have been widely discussed, with the
bleak warning about the erosion of privacy in the “transparent society”, due to
the technological efficiency of low-cost surveillance. David Brin (1998) argues
that despite the loss of true privacy, we will still have the choice between one that
offers the illusion of privacy by restricting the power of surveillance to authorities,
or one that destroys that illusion by offering everyone access (including the ability
to observe the observers). He favors an egalitarian access to surveillance, with the
public having the same access as those in power, because corrupt abuses of power
would prevail without accountability and transparency.
The prevalence of the agora over the pnyx has gone one step further with not
only state sponsorship of private accounting practices, but with the re-internalisation
of private sector norms of business conduct (Power 1995: 298). This, to my mind,
has exacerbated another shift in society: the shift from citizen to consumer.
The dominance of the economy in our daily life may help us understand how
people learn to consume the new. In the past, economic inequality furnished the
economic energy for politics. Strains on the economic system during the age of social
capitalism produced “ressentiment” (Sennett 2006: 132). This cluster of emotions
principally described the belief that ordinary people who have played by the rules
have not been dealt with fairly. This intense social emotion tended to stray from its
economic origins to produce resentment of old orders of patronage and privilege
or minorities, such as: Jews or immigrants – who seem to ‘steal’ the social prizes to
which they had no right. Under the sway of ressentiment, religion and patriotism
were weapons of revenge.
Today, inequality is being reconfigured in terms of work experience, where
symbolic analysts (Reich 1994) are at the top. The middle is fearful of being displaced,
sidelined or under-used, while the bottom comprises two distinct groups. The first
is the traditional working class, who was once protected by the unions and have
less room to manoeuvre. The second is the immigrant class who find themselves
room in a fluid and fragmented economy (Glyn 2006: 102). Ressentiment may
explain why so many workers moved from the centre left to the far right translating
material stress into cultural symbols.
However, Sennett (2006) argues that ressentiment is too narrow a way to relate
economics and politics, because material insecurity prompts more than ways to
Page 173
The Second Workshop on the Social Implications of National Security
demonise those who herald unsettling change. So, instead of thinking of citizens as
an angry voter, then, we might consider the citizen as a consumer of politics faced
with pressures to buy.
Walmart and Carrefour are examples of the megastore that draw upon the use of
advanced technology, fast-developing Chinese manufacturing practices, concentrated
power at the top, disempowered unions, and has dealt with their mass workforce
as if they were provisional and temporary labourers (McKinsey 2004). Consumers
experience mirror centralisation of command where everything is available instantly.
Sales personnel are stripped out of the consumption process as there is no need for
mediation or persuasion, which as Saul (1997: 79) points out is somewhat similar to
other cutting-edge bureaucracies that have stripped out their middle interpretative
layer of staff, including government departments after public sector reforms in the
1980s and 1990s.
The question then becomes whether people shop for politicians the way they
shop at those megastores? Has the centralised grip of political organisations grown
greater at the expense of local and mediating party politics? If political leaders
become instantly recognisable brands, like car models then the crux of politics
becomes marketing, which is not good for political life. The very idea of democracy
requires mediation and face-to-face discussion. It requires deliberation rather
than packaging. However, the political version of the megastore may repress local
democracy, but it may stimulate the imagination for change.
Imagination is strongest in anticipation, but it grows ever weaker through use.
The new economy strengthens this kind of ‘self-consuming passion’ (Sennett 2006:
136) both in shopping malls and in politics. Consumption, during the 20th century,
was considered to be driven by the motor of fashion and planned obsolescence.
However, both of those views assumed that the consumer was passive. The new
institutions (Glyn 2006: 133) with their change of work bureaucracies, from a
possession with fixed content, to a position in a constantly changing network, so
that work identities and institutions are continually reinvented, so they would never
get used up. Hence, consumption in the 21st century thrives on the self-consuming
passion.
The self-consuming passion is stimulated through active engagement in imaging
(where the consumer perceives the gold-plating instead of the production-platform
as the object’s real value) and arousal by potency. Branding deploys platform
construction on a global scale to produce the common chassis, and gold-plating
to produce the small material differences, which are inflated in value. Potency is
when the consumer’s desires become mobilized even though they are divorced from
practice. For example, how many song titles can you possibly remember from your
collection of 10,000 songs on your 30GB iPod? Similarly, we buy computer software
and hardware that are beyond our utilitarian needs, but it is the ‘dramatisation of
their potential’ (Sennett 2006: 151) that leads us to desire them even if we cannot
fully utilise them.
Page 174
The Second Workshop on the Social Implications of National Security
Sennett (2006: 157) poses the question: “aren’t people set free when they
transcend in spirit what they directly know, use or need?” To him, the self-consuming
passion might be just another name for liberty. Arendt (1998: 231) argues that in
a truly democratic forum, every citizen should have the right to think aloud and
debate with others, no matter their expertise. Furthermore, the test of utility and
practicality should not rule either, as this test emphasizes what is rather, than what
might be. Her argument, in a sense, is similar to Sennett’s view of the consuming
passion, as a precondition to freedom and democracy.
The consuming passion brings focus on what is really missing in the hope
for progressive change: an understanding of the profoundly ‘enervating’ role that
illusion plays in modern society. The illusion (Brin 1998) of giving the power of
surveillance to either the authorities or everyone is perplexing, because we do not
limit what we want from surveillance to what we can actually do with it. Similarly,
we do not limit what we want from the illusion of privacy or accountability to
what we can actually do with them. Angell (1995: 331) observes that it is rather
difficult to establish what exactly constitutes an infringement of privacy, let alone
how it constitutes an attack on freedom. These confounding illusions may actually
contribute to our own passivity. Sennett (2006: 161) identifies five ways in which
the consumer-citizen is turned away from progressive politics (the belief that citizens
are bound together in a common project, such as: privacy, limiting surveillance,
accountability, and so on) and toward this more passive state:
1. Consensus politics, where we are offered political platforms which resemble
product platforms (generally, they tend to be business friendly, socially inclusive
and immigrant ambivalent). For example, wider surveillance powers of
immigrants from Muslim countries may be a shared political platform for either
side of the political spectrum. After all, either side of the spectrum are immigrant
ambivalent, especially from the Muslim world after September 11th, 2001.
2. Gold-plated differences, where a re-contextualisation of the fact may take place.
For example, making Muslims in their totality a terror threat, despite of the
fact that the majority are law-abiding citizens. This may justify the expansion
of surveillance powers given their broader presence in our society.
3. We are often asked to discount the “twisted timber of humanity”, a phrase
coined by Kant. For example, surveillance technology discounts our individual
complexity, where Muslims from the Middle East may speak Arabic but the
dialects are quite different within each country let alone the different countries.
Imagine the number of computerised Arabic interpreters to decipher taped
phone conversations.
4. We tend to credit more user-friendly politics, where consumer-citizens disengage
from difficult issues by comparison to craftsmen-citizens who would like to
understand how things work, so they engage with difficult and resistant issues.
Democracy requires citizens to be willing to make an effort to find out how
Page 175
The Second Workshop on the Social Implications of National Security
the world around them works. The consumer-citizen tends to disengage from
difficult and complex issues, such as: privacy and transparency. Additionally,
technological overload prompts disengagement, so one can imagine the cognitive
impact of the technological jungle of surveillance.
5. We continually accept new political products on offer. For example, modelling
reform on advanced business practices breeds anxiety (psychoanalysts call it
ontological insecurity: fear of what will happen even if no disaster looms. It
is also called: free-floating to indicate that someone keeps worrying even if s/
he has nothing to fear in a specific situation). Another example is the antiterror warning around cities such as with the slogan: “if you see something, say
something”, which is plastered around train stations and billboards.
This shift in our role from an engaging citizen to a passive consumer-citizen is a
product of the convergence of both the economic and political space, with the former
dominating the latter. This brings into question the legitimacy of a democratic
process that seems to be driven by cultural forms which celebrate personal change
and indifference, but not collective progress. The question then would be- should
we be at all concerned about this malaise of the consumer-citizen phenomenon?
4
The analytics of complexity
The convergence of both the economic and political space has brought another
malaise to bear on society and the democratic process, namely: the corporatisation of
the public service (Saul 1997: 76). It was a calculated assault on the independence
of public servants, which hindered any meaningful analysis on policy, regardless of
whether it may be contrary or not, to the policy line of the government of the
day.
It is instructive to reflect on the Thatcher years of public reform to understand
the machinations of public policy ‘reform’. David Willetts (1987: 445) provides an
illuminating account of such change, while he was a member of the Prime Minister’s
Policy Unit. Mrs Thatcher disbanded the fifteen members of the Central Policy
Review Staff (CPRS) and replaced them with eight members comprising the Prime
Minister’s Policy Unit in 1983.
Unlike the CPRS, the Policy Unit did not undertake long-term or large-scale
studies, but rather offered policy advice on ‘current’ matters of concern, with deadlines ranging from an hour to few days. More importantly, the advice did not go
to Cabinet for rebuttal or debate by departmental ministers. It was for her eyes
and ears only, given that the Prime Minister’s Policy Unit was not a Cabinet Office
body serving all of Cabinet, like the CPRS.
The composition of the Policy Unit in 1986 was at eight or nine, with at
least three members on secondment (Willett 1987: 546) from large private sector
organisations, such as: McKinsey’s, Consolidated Gold Fields and Shell, advising
on their respective specialisations (and possibly their corporations’ interests). A
fourth was a retired senior partner from Coopers & Lybrand. The rest were civil
Page 176
The Second Workshop on the Social Implications of National Security
servants and a university professor. Rosenhead (1995: 309) argues that her Policy
Unit “did not, could not, originate the flood of radical but untested policy ideas”
which reached Cabinet, as many emerged from right-wing think-tanks, and the
Policy Unit was simply the messenger. Rosenhead (1995: 311) explains the ‘robust
simplicity’ by which those think-tanks justified their policies.
It starts with strong value assertions and then proceeds directly to detailed
prescriptions.Argumentation is intuitive (with a ‘public choice’ flavour), and proposals
are not costed or quantified. There is appeal at most to anecdotal evidence, but
certainly not to research.
One very ‘unpopular’ policy, which was announced in a glare of publicity, and
without advanced notice to the relevant departments, was the Poll Tax.
The preceding account of events seems hauntingly familiar, not just at federal
or state governments in Australia, but wherever economic rationalism is dominating
public policy discussion. There has been a catastrophic retreat from reason in public
affairs, in which a quasi-mystical ideology attributes magical powers to the markets
(Saul 1997: 80, Stiglitz 2002: 138, Glyn 2006: 77). Since the collapse of the Soviet
Union, this ideology has gone far towards establishing a hegemonic hold in the form
of neo-liberal regimes in the UK, USA and Australia, which manifests a centrist
political platform, which enabled economic development friendly to globalisation,
flexibility and meritocracy (Sennett 2006: 163, Stiglitz 2002: 53).
Markets are thought to be correcting government malfunctions (rather than
vice versa). No matter that, in so many instances of infrastructure privatisation,
such as: electricity and water, the most convoluted socio-economic reengineering
can only produce “a market which is artificial, rigged, imperfect and imperfectable”
(Rosenhead 2006: 313). For the uncritical mind that dwells with fervour for
intelligent design, the market is seen as a ‘pseudo-natural’ phenomenon, which
substitutes for the exercise of collectively rational choice. The elevation of the
market to almost divine, omnipotent, omniscient status has been at the expense of
the down-grading of rational choice based on analysis. It is of no surprise then,
that hyper debate concerning public policy issues such as surveillance is taking on
similar omniscient status inflating surveillance into überveillance (Michael & Michael
2006: 361).
Setting public policy is a complicated business. Porter (1987: 87) outlines
the difficulty facing the US President and others in positions of comparable
authority:
They are expected to make a large number of decisions about issues on
which they themselves are not expert, and therefore they are going to
rely on the other people for information, for analysis, for structuring
alternatives and for an assessment of the advantages and disadvantages
associated with the alternatives. Many of the issues coming at them, and
on which they are expected to decide, are interrelated, in the senses that
what they decide on issue A today will affect the choices, and the relative
Page 177
The Second Workshop on the Social Implications of National Security
attractiveness of those choices, on issue B, C and D that they are going
to be considering two weeks, three months or a year from now.
Rosenhead (1995: 316) rhetorically asks the question of how can diversely interested
parties, many of them largely excluded from influence, become active and effective
advocates in public debate when analysis-free policy is on offer? He believes that data
and information are no longer sufficient, in such an information-rich and complex
world, to have power over one’s own life. Rather, ‘analytic capability’ (Rosenhead
1995: 308) would help us shape, discard and manipulate information in order to
understand our situation, devise an appropriate strategy, and advance convincingly
our own problematique or to garner support for our causes or to undermine or
demolish competing propositions.
Freedom, then for Rosenhead (1995: 319), is not just an individual matter.
The complexity of issues in our world, are no longer affecting social life details
but predominantly its structures and opportunities. Individualised responses are
ineffectual, when only collective responses backed by critical analysis can effectively
confront the totalising discourse of the powerful, and force its own reality on the
public agenda.
5 Conclusion
This paper outlined three challenges facing the transparent society, when
discussing some of the issues associated with surveillance and privacy. Firstly, the
unholy union between the economic and political space is problematic, because the
unintended effect of this alliance is often political oversight that sanctions the interests
of the economic space to the detriment of the political space.
Secondly, the evolution of the passive consumer-citizen shaped by their
experience of the new institutional structures. The shift in our role is a direct
product of the convergence between the economic and political spaces, with the
former dominating the latter. Surveillance technology, among other issues of public
concern, chiefly used for its perceived economic efficiency, are nevertheless dubious
as to their accuracy and precision, given their ambiguous practice within society,
which leaves room for misinformation and misinterpretation.
Thirdly, the corporatisation of government and analysis-free policy is yet another
malaise from the economic-political convergence. In order to be involved in the
democratic process, one needs to be able to analyse the information that may affect
one’s own interests. Obviously, this is quite problematic in an information-rich
society, given the information quagmire that we have to sort through. Hence, the
right to information is of limited use by itself, for any effective involvement in the
democratic process.
In conclusion, the discussion of those challenges brings two points to the fore: the
right to analysis, and the passive citizen-consumer. Having the right to information
about our privacy or the lack thereof, for example, is not sufficient for us to be
involved in any discussion concerning its potential use. Having the right to analysis
Page 178
The Second Workshop on the Social Implications of National Security
is paramount for us to do so, but we must be willing to seek that right. Today, we
have a better opportunity in having access to better analytical tools through the
internet. The paradox of our time might be if the passive citizen-consumer will be
‘bothered’ to seek the right to analysis, so as to be able to engage in the democratic
process.
References
Angell, A & Laidler, P 1995, ‘Information Technology and Freedom’, in LSE on
Freedom, ed. E Barker, LSE Books, UK.
Arendt, H 1998, The Human Condition, University of Chicago Press, USA
Brin, D 1998, The Transparent Society:Will Technology Force Us to Choose Between
Privacy and Freedom?, Perseus Books, USA.
CNN Special Report on Airport Security 2001, In-Depth Report: Flight Risk,
viewed 20 November 2001, <http://www.cnn.com/SPECIALS/2001/
trade.center/flight.risk/stories/part1.mainbar.html>
McKinsey Global Institute 2001, ‘US Productivity Grown, 1995-2000,’ Section
VI, ‘Retail Trade,’ viewed 17 September 2007, <http://www.mckinsey.com/
knowledge/mgi/productivity>.
Michael, MG & Michael, K 2006, “National Security: The Social Implications of
the Politics of Transparency”, Prometheus, vol. 24, no. 4, Routledge.
Mickhail, G & Ostrovsky, A 2005, “The MetaCapitalism Quest”, American
Academy of Business Journal, vol. 6, no. 1, pp.290-298.
Nneji, N 2007, 14 families of 9/11 victims settle suit, viewed 19 September 2007,
<http://www.cnn.com/2007/US/law/09/18/sept.11.lawsuits/index.html>.
Porter, R 1987, ‘The United States’ in Advising the Rulers, ed. W. Plowden,
Blackwell, UK.
Power, M 1995, ‘Reconnecting accounting to the problem of freedom’, in LSE
on Freedom, ed. E Barker, LSE Books, UK.
Reich, R 1994, ‘The revolt of the anxious class’, viewed 18 September 2007, <
http://www.dol.gov/oasam/programs/history/reich/speeches/sp941122.
htm>.
Rosenhead, J 1995, ‘Liberty! Fraternity! Analytic Capability!’, in LSE on
Freedom, ed. E Barker, LSE Books, UK.
Saul, JR 1997, The Unconscious Civilisation, Penguin Books, Australia
Sennett, R 2006, The Culture of the New Capitalism,Yale University Press, New
Haven, USA.
Stiglitz, J 2002, Globalization and its Discontents, Penguin Books, USA.
Willetts, D 1987, ‘The Role of the Prime Minister’s Policy Unit’, Public
Administration, vol. 65, no. 4, pp.443-54.
Page 179
The Second Workshop on the Social Implications of National Security
Page 180
The Second Workshop on the Social Implications of National Security
14
Something smart going on:
the apocalyptic aesthetics
of surveillance
Marcus O’Donnell
Associate Lecturer, School of Journalism and Creative Writing, University of Wollongong
Abstract
This paper analyses surveillance as an integral element in contemporary discourses of
the apocalyptic. It outlines a model of the apocalyptic that has its roots in the western
religious tradition particularly the last book of the Christian bible: The Book of Revelation.
It explores the intersecting narratives of surveillance, the apocalyptic and the forensic as a
way of contextualising contemporary political, pop cultural and technological events. Each
of these narratives play themselves out through a dialectical logic: surveillance is seen as
bringing both intrusion and protection; the apocalypse is harbinger of both destruction
and a new world; while the forensic revels in both discovery and horror. Each of these
narratives is related to a search for meaning and authenticity and each is expressed through
a broad range of multimodal contemporary mythic structures in news, film, television and
politics.
Keywords: apocalyptic, surveillance, forensic aesthetics, myth
Page 181
The Second Workshop on the Social Implications of National Security
1 Introduction
Walking down the street, getting money from a bank ATM, entering a building,
countless times every day we are warned by signs: “You may be photographed
while…”. The intensity of this visual surveillance is matched by the voice heard
every time we que for a telephone service:“This call may be monitored for…”The
technological eye and ear have become ubiquitous parts of our everyday.
A recent study calculates that if you live in London – the most surveilled of
modern cities – you will appear on camera some 300 times a day just going about
your normal business. (Van Melik et al 2007:26). The London CCTV system –
one camera per 15 inhabitants – played a starring role in the media stories of the
capture of those associated with the so-called July 2007 “Doctors Plot” which saw
failed bombings in London and Glasgow. A Time magazine report on the bombings
referred to “London’s wondrous surveillance system” and quoted U.S. Senator Joe
Lieberman’s praise of that system:
“The Brits have got something smart going.They have cameras all over
London… I think it’s just common sense to do that here much more
widely.” (Ripley 2007)
What once would have been tagged “Orwellian” is now called “wondrous” and
lauded as “common sense”. In fact in an age where “Big Brother” has become a
global brand quite different to the one George Orwell predicted in his totalitarian
allegory 1984, it is hard to know exactly what Orwellian is anymore.This is indicative
of an increasingly complex, shifting cultural landscape that can only be understood
by looking at a range of intersecting cultural narratives.
This paper explores the intersecting narratives of surveillance, the apocalyptic
and the forensic as a way of contextualising contemporary political, pop cultural
and technological events. Each of these narratives play themselves out through a
dialectical logic: surveillance is seen as bringing both intrusion and protection; the
apocalypse is harbinger of both destruction and a new world; while the forensic
revels in both discovery and horror. Each of these narratives is related to a search for
meaning and authenticity and each is expressed through a broad range of multimodal
contemporary mythic structures in news, film, television and politics.
I will argue that understanding the contemporary aesthetics of surveillance is
essential to understanding the cultural work of surveillance technologies. Firstly I
will situate surveillance within the myth of the apocalyptic. Secondly I will look at
how these ideas are played out in contemporary television and film through what
Ralph Rugoff (1997) has called “forensic aesthetics”. I will conclude with some
brief reflections on how these ideas relate to the current news context and national
security.
2 The Apocalyptic
Apocalypse – Greek for revelation – is the name given to the final book of the
Page 182
The Second Workshop on the Social Implications of National Security
Christian bible,1 a highly symbolic end-time narrative of “blood-drenched scenes
of nature gone deadly, war, and famine” (Quinby 1999:283). Images from this book
– such as the four horseman of the apocalypse who bring famine and plague and
Armageddon, the site of final conflict between the forces of good and evil – are
familiar motifs of popular culture. But the apocalyptic story is not just catastrophic
it is also freighted with utopic millenarian promise rooted in the prophecy of the
thousand-year kingdom of the saints (Rev 20:1-7) and the restoration of the holy
city of Jerusalem. It is a story of redemption and transformation butted up against
condemnation and destruction. It dramatises the dialectic between hope and fatalism,
the end and the beginning, annihilation and transformation.
Scholars have long argued about what defines apocalypses as a genre (Webb
1999) but the generic definition of these ancient texts is relatively simple when
compared with broader issues such as defining “apocalyptic ideology” or “apocalyptic
movements”. What is undisputed however is the reach, the influence and the
ongoing power of the ideas, beliefs and rhetorical devices that trace their lineage
to this biblical book and its genre.
The apocalyptic is a theme that has been studied widely across a range of
disciplines including: history (Cohn 1970;) sociology (Robbins and Palmer 1997)
literature (Ahearn 1996; Kermode 2000) rhetorical studies (O’Leary 1994) cinema
studies (Sharrett 1993; Dixon 2003) visual art (Cunningham and Grell 2000) and
postmodern philosophy (Dellamora 1994).2
In both subtle and not so subtle ways the apocalyptic retains much poetic, religious
and political power and is an influential individual and collective ordering force.
The most obvious dimension of this influence can be seen in connections between
the many current discourses of crisis – the war on terror, environmental collapse,
threatening epidemics such as SARS and HIV – and the common understanding
of the apocalyptic as cataclysm. Although the Christian apocalyptic forms the main
context for this study it is important to note that the biblical story is not an isolated
work it belongs to a genre of ancient middle eastern texts that deal with similar
issues and share similar literary forms (Hultgard 1998). It could in fact be argued
that the clash of competing Jewish, Christian and Islamic apocalyptic narratives is
fundamental to understanding contemporary international relations and national
security. (Gorenberg 2000; Juergensmeyer 2001; New 2002).
In this context I have previously argued (O’Donnell 2005) that the rhetoric of
1
The last book of the New Testament is also known as Revelation or The Revelation of John. It is thought
to have been composed at the end of the first century CE. It’s author is identified as John – “your brother
who shares with you in Jesus the persecution and the kingdom and the patient endurance…on the island
called Patmos because of the word of God and the testimony of Jesus” (Rev 1:9). Traditionally this “John”
has been associated with the apostle John also the reputed author of the fourth Gospel. Although the exact
authorship of these Johannine texts is disputed by contemporary scholars, the book is thought by some to
have emerged out of a “Johannine” school within the early church, while others point to affinities with
the Pauline and Synoptic traditions. (Schussler-Fiorenza 1998: 85-113)
2
This is obviously only a brief noting of select key works
Page 183
The Second Workshop on the Social Implications of National Security
George W. Bush in his construction of the war on terror and homeland security
is firmly rooted in the apocalyptic religious world-view. In a radio address to the
nation on September 15 2001 Bush began to establish a pattern in his war on terror
rhetoric. Comforting and challenging a nation in shock from the attacks on the twin
towers he quickly established that moment as an ongoing conflict and reiterated
that it would be “a different kind of conflict against a different kind of enemy”.
This is a conflict without battlefields or beachheads, a conflict with
opponents who believe they are invisible.Yet, they are mistaken. They
will be exposed, and they will discover what others in the past have
learned: those who make war against the United States have chosen
their own destruction.
Underlying this implied promise of victory was this presidential caveat: “We
have much to do and much to ask of the American people. You will be asked for
your patience, for the conflict will not be short. You will be asked for resolve, for
the conflict will not be easy.You will be asked for your strength, because the course
to victory may be long.” This rhetoric of test and endurance is strikingly similar to
the calls at the beginning of the Book of Revelation in the seven letters to the seven
churches to whom the book is addressed:
I know your works, your toil and your patient endurance. I know that
you cannot tolerate evildoers…I also know that you are enduring
patiently and bearing up for the sake of my name, and that you have
not grown weary. (Rev 2:2-3)
To the “saints” who endure is promised a crown, a white cloak and a new name
written in the book of life.The specific echoes of the language of Revelation and its
promises would have been heard by many of Bush’s Christian base and the generic
language of national mission familiar from American frontierism (West & Carey
2006) meant that its power was not lost on others.
David Domke (2004) in an analysis of Bush’s speeches for the eighteen months
following September 11 notes a concentration on “moment and mission”. He
argues that this crisis discourse contributes to what he calls the Bush administration’s
“political fundamentalism”. Calls for imminent action and enduring commitment create
a strategically powerful discourse. He writes:
When combined these time focused emphases become politically potent:
They allowed the administration to push for immediate action on
specific policy goals [Patriot Act; establishment of Homeland Security
Department; doctrine of pre-emption] with others’ questions dismissed,
and to justify these desires as unchallengeable steps in a God-ordained,
long term process. (2004:64)
In the next part of this paper I want to explore three other less obvious but not
unrelated aspects of the rhetoric of the apocalyptic that also have telling implications
for current discourses of national security and surveillance. Firstly I will look at a
set of ideas that cluster around, sight, secrets and surveillance in the context of what
Page 184
The Second Workshop on the Social Implications of National Security
Lee Quinby (1994) has called the techno-apocalypse. Secondly I will look at the
visceral embodiment of these ideas in what Tina Pippin and other scholars (Pippin
1999; Gomel 2000) have called “the apocalyptic body”. Thirdly, both these ideas
are related to one of the central images of the apocalyptic literature: the Beast and
his mark.
3 Strange things
From the opening verse of the Book of Revelation we know that this text is about
secrets: a “revelation” of strange things that “must soon take place” made known by
a message from an angel. (Rev 1:1) As the visionary journey unfolds the extent of
access is also revealed:
After this I looked, and there in heaven a door stood open! And the first
voice, which I had heard speaking to me like a trumpet, said, “Come
up here, and I will show you what must take place after this.” At once
I was in the spirit, and there in heaven stood a throne, with one seated
on the throne! And the one seated there looks like jasper and carnelian,
and around the throne is a rainbow that looks like an emerald. (Rev
4:1-3)
Readers of this text are invited into a secret world – through a door into heaven
– they are given access to esoteric knowledge but they are also shown how deeply
forces conspire in the unfolding of the cosmic drama. Gerard Von Rad argues that
one of the messages of Jewish apocalyptic writing is that “the last things” can be
known and exactly calculated but that this knowledge is only open to the initiated,
this is why the key textual device of this genre is the esoteric cipher.The gnosticism
of these texts goes to the heart of the apocalyptic world view:“He who understands
the secrets understands what holds the world together in its inmost being” (Von
Rad 1975:302).
The other side of this access to mysteries and esoteric knowledge is the
knowledge that you too are known, fully known. The one who grants access to
this new knowledge is “the one who searches minds and hearts, and…will give to
each of you as your works deserve” (Rev 2:23). The story of revelation is one of
both secrets and surveillance.
The seven letters to the seven churches to whom Revelation is addressed all follow
a set formula. The refrain of these letters is: “I know.” The Son of Man whose eyes
are like a flame of fire sees all, knows all and judges all:“I know your works…I know
your patient endurance…but I also have this against you….For those who conquer
I promise…” Surveillance, endurance and promise form the rhetorical rhythm of
the Book of Revelation. As Henry Maeir puts it:
As the readers travel with John to the heavenly throne room, where he
unveils to them a vision of a slain lamb with seven horns and seven eyes,
“which are the seven spirits sent out into all the earth,” the audience,
already revealed to itself in the seven letters, knows that it has entered
Page 185
The Second Workshop on the Social Implications of National Security
a world of perfect universal surveillance. It responds to John’s unfolding
visions as an observed audience. This depiction of an all-seeing God
is a commonplace in both Jewish and early Christian apocalyptic
literature. The omniobservant eye of God serves as a hortatory device
to guarantee obedience in the face of coming or threatened judgment
against evildoers. In apocalyptic plots of the end of the world, God
plays a character who sees, records, and rewards or punishes all human
actions. (1997:141)
This “omniobservant God” is at the heart of what Quinby calls the “twin
millennial pillars of dread and desire” (1999: 284): the desire to know and embrace
the great cosmological secret and the simultaneous dread of being completely
known and thus perhaps judged unworthy to share in the promise of that secret
world. These dual apocalyptic impulses are deeply entrenched in western culture,
and play out across three different modes of contemporary apocalyptic thinking: the
divine apocalypse, the technological apocalypse and the ironic apocalypse (Quinby
1994: xv-xvi). The divine mode includes both fundamentalists from the American
right as well as Latin American proponents of liberation theology.The ironic mode
reflects the nihilistic and absurdist tendencies of post modern philosophy. The
technological mode includes both narratives of technological devastation (from
nuclear to environmental) and technological salvation (from life saving technologies
to visions of a utopic world order).
4
Techno-apocalypse and the Beast
Although Quniby’s three apocalyptic modes are a useful typology, she herself
notes that expressions of the apocalyptic often cluster across modes with surprising
effects. One of the reasons why the apocalyptic is such a buoyant form – expressing
itself in movements as diverse as dissenting religious movements in the European
middle ages (Cohn 1970) the Puritan settlement of America (Boyer 1992) and
the Russian revolution (Rowley 1999) – is the almost viral way it combines and
recombines across these various modes of expression.
The techno and divine modes have converged in recent years in a variety of
significant ways. This was particularly notable in the countdown to the year 2000.
A number of scholars have noted (McMinn 2001; Tapia 2002; Schaefer 2004) the
convergence of techno and divine apocalyptic in discourses surrounding “Y2K”
computer systems meltdown.These studies throw some light on apocalyptic attitudes
to both earthly and heavenly technologies of surveillance.
Many respondents in Tapia’s study of the “millennialist” Christian response to
Y2K, saw technology as an “evil” force that fragmented society. They argued that
it was an “idol” that turned people away from God. (278). Schaefer points out that
although many “evangelicals evidently feared that society’s increased dependency on
technology….might usher in worldwide domination by the Antichrist… their stance
toward globalism and technology is both paradoxical and ambiguous. Committed
Page 186
The Second Workshop on the Social Implications of National Security
to spreading their message by every (legitimate) means possible, evangelicals do not
hesitate to employ technological advancements in production, mass communications,
and travel to help them reach their goal.” (Schaefer 2004:98)
This ambiguous relationship between millennial evangelicals and technology can
be also seen in one of the most popular contemporary mass communications of the
apocalyptic: the best selling Left Behind series of “prophecy novels” from evangelical
leader Tim LaHaye and novelist Barry Jenkins. The twelve part series fictionalises
the events of the Book of Revelation narrating the last days after God’s chosen are
“raptured”3 up to heaven and non-believers and not-quite-right Christians alike
are left behind to endure the “tribulation” or the reign of the Antichrist.
The series is something of a publishing phenomenon. The first novel was
published in 1995 and several novels in the series have topped the bestseller lists.
According to Newsweek (Gates 2004) the events of September 11 boosted the sales
of the 2001 instalment, Desecration, which became the best selling novel of that year.
Presales of the final instalment published in 2004 reached 2 million and all up the
series has sold some 62 million copies.
At the heart of the series is the work of the Tribulation Force who spearhead an
underground resistance movement that battles the Antichrist and his “council of
ten”. In his analysis of the novels Glenn Shuck (2005) points out that surveillance
technologies are integral to both the work of the Antichrist and the Tribulation
Force. He contrasts LaHaye and Jenkin’s “beast system” with the “network culture”
of social theorist Manuel Castells and shows how both the Antichrist and the
Tribulation Force display implicit understanding of the interaction between, new
technologies and new decentralized flows of global capital.
The success of the Tribulation Force depends on its ability to clone
vital components of the network culture – the Beast system it seeks to
resist. Operatives require flexibility, the latest technologies, ultra modern
weapons, mobility and a decentralized organizational logic. They even
understand image and the possible benefits of deception in a world
characterized by confusion and uncertainty. (Shuck 2005:110)
The image of the Beast that both Shuck and the authors of Left Behind rightly
take as a metaphor for the totalizing power of the anti-God forces of apocalyptic
times is a key symbol in the Book of Revelation. There are two Beasts referred to in
chapter 13, the first Beast rising from the sea and the second Beast rising from the
land. The first Beast has ten horns and seven heads and immediately assumes an
irresistible position of power in the complex mythological system of Revelation:
One of its heads seemed to have received a death-blow, but its mortal
3
The idea of the rapture proposed by some Christians does not come from the Book of Revelation like
most other key elements of apocalypticism but is based on a literal interpretation of 1 Thessalonians 4:1618: “For the Lord himself will descend from heaven with a cry of command, with the archangel’s call, and
with the sound of the trumpet of God. And the dead in Christ will rise first; then we who are alive, who
are left, shall be caught up together with them in the clouds to meet the Lord in the air; and so we shall
always be with the Lord. Therefore comfort one another with these words.”
Page 187
The Second Workshop on the Social Implications of National Security
wound had been healed. In amazement the whole earth followed the
beast. They worshiped the dragon, for he had given his authority to
the beast, and they worshiped the beast, saying, “Who is like the beast,
and who can fight against it?”….Also it was allowed to make war on
the saints and to conquer them. It was given authority over every tribe
and people and language and nation, and all the inhabitants of the
earth will worship it, everyone whose name has not been written from
the foundation of the world in the book of life of the Lamb that was
slaughtered (13:3-8)
This introduction of the Beast couples him with the Dragon previously identified
with Satan (12:9) and places his power over all the earth in the context of an earlier
battle between the forces of God and the forces of Evil staged in the previous chapter.
The second Beast has “two horns like a lamb and it spoke like a dragon” and it acts
as the lieutenant of the first Beast forcing all to worship this master. It is this second
Beast that inaugurates the “Beast system”: the mark of the beast that attributes all
economic and social status to those who are marked as followers.
It performs great signs, even making fire come down from heaven to
earth in the sight of all; and by the signs that it is allowed to perform
on behalf of the beast, it deceives the inhabitants of earth, telling them
to make an image for the beast that had been wounded by the sword
and yet lived; and it was allowed to give breath to the image of the beast
so that the image of the beast could even speak and cause those who
would not worship the image of the beast to be killed. Also it causes
all, both small and great, both rich and poor, both free and slave, to be
marked on the right hand or the forehead, so that no one can buy or
sell who does not have the mark, that is, the name of the beast or the
number of its name.This calls for wisdom: let anyone with understanding
calculate the number of the beast, for it is the number of a person. Its
number is six hundred sixty-six. (13:13-18)
For the original audience of Revelation the Beast had a clear lineage that linked
to both similar figures in Jewish mythology and the imperial cult of the Roman
emperor. Thus they understood the Beast in both cosmological and localized
political terms (Schussler Fiorenza 1991:82-87). In the Middle Ages the Beast was
linked to the Antichrist figure who become a vital part of the apocalyptic legend
(Rusconi 1998). Both the figure of the Beast and the Antichrist still function today
as a lightening rod for cosmological and political conspiracy. Google searches will
identify numerous current candidates for the Antichrist including the Pope, Barak
Obama, George Bush andVladimir Putin.This game of spot the Antichrist has a long
tradition from the writings of Joachim de Fiore and Nostradamus to contemporary
conspiracy websites and feeds the rhetoric of secrets and signs that I have argued
is essential to an understanding of the apocalyptic. This vision of the Beast and the
Beast System also clearly mirrors the you-are-with-us-or-you-are-with-the-terrorists
Page 188
The Second Workshop on the Social Implications of National Security
language of the war on terror. In the mythological system envisaged in this chapter
of Revelation those remaining in the end times belong to one of two groups, those
marked by the Beast and those whose names are written in the book of the Lamb.
These positions are irrevocable and these marks of identity are indelible.
The Left Behind authors re-envisage this web of power and the mark of the Beast
in quite a specific form which clearly links to both contemporary Christian and
broader fears about technological intrusion and domination.They describe the mark
not as the traditional number of the beast but as a tiny microchip inserted under
the skin. Shuck (2004) summarises the functions of this Beast chip:
First, it permits believers to participate in Antichrist’s economy, using
their implanted chips as debit cards which eliminate fraud and speed
transactions. Second, the mark gives its bearer a sense of place, specifying
one of ten regional kingdoms as the bearer’s homeland.Third, it conveys
a permanent identity which cannot be effaced. It instantly identifies
one to authorities, and suggests where one belongs, allowing Antichrist’s
forces to track citizens and make his kingdom more secure. Fourth,
every mark bears the name of Antichrist. Finally, Antichrist displays a
remarkable knowledge of consumer preferences, making provision for
those who want a customized, vanity design. (54-55)
However in spite of the impressive reach of the “beast system” Shuck shows that
the active resistance of the Tribulation Force introduces a new kind of post rapture
activism not seen in earlier prophecy novels. He points out the “naïve” faith the
authors place in the skills of the heroes to outwit the vast technological resources
available to the “one world government” controlled by the novels’ designated
Antichrist figure Nicolae Carpathia. This is largely achieved through several wellplaced moles within the Beast system. The authors’ “focus on individuals acting
against powerful structures may serve them textually – to a limited extent….but
its wisdom appears dubious outside the realm of prophecy fiction”(107). This post
rapture activism sits oddly with traditional apocalyptic ideas of fated destiny but
sits well with the contemporary emergence of the politicized evangelical religious
right and is cognizant with a view of apocalypticism as a mobile mythic cluster that
can be successfully reconfigured by believers to bouy-up their current needs and
concerns. In her reader ethnography of the Left Behind series Amy Frykholm (2004)
notes the way the novels’ framing of technologies is affecting evangelical reader’s
fears of technology and like Shuck she notes a developing commitment to activist
millennialism: “many readers identify with the Tribulation Force as a group….a
community that will overcome the isolation, competition and fearful complexity
of the modern world…Jason [a reader] imagines himself not as an individual hero
but instead as ‘part of a secretive organization’.” (129)
These narratives, however naïve, allow readers to project themselves into an
increasingly complex world as actors. In both the early Christian narratives of the
apocalypse and in their contemporary manifestations, secrets, signs and surveillance
Page 189
The Second Workshop on the Social Implications of National Security
are essential rhetorical motifs as well as essential technologies in the divine economy
of the end. These secret ciphers are embodied in particular marks of the Beast and
the Lamb. The hortatory function of an omniobservant God is clear, and such a
theology brings with it a particular apocalyptic subjectivity of faithful endurance
– and increasingly it would seem of active engagement – which parallels more
contemporary paradigms of authenticity. For millennialist Christians, those who
live well under the all knowing gaze of God are seen to be living authentically:
in sync with the deepest secrets that will be revealed to all at the end times. This
authenticity, can now be conceptualised as a participatory event within the domain
of complex networked culture rather than as merely passive resistance under the
surveillance of God.
5 The new authenticity and the surveilled self
This active connection between the surveilled self and the revelation of an
authentic lifestyle or real self can be seen at play in a variety of both religious and
secular discourses.
Mark Andrejevic (2002; 2003) has argued that the current bonanza in reality TV
programming has helped “to define a particular form of subjectivity consonant with
an emerging online economy: one which equates submission to comprehensive
surveillance with self-expression and self-knowledge” (2002:253) rather than
corporate or governmental control. Reality TV programs have also become in some
senses “training” documentaries for what Andrejevic calls lateral surveillance: the
call for good citizens to watch one another. In the new televisual economy that
Andrejevic describes this willingness to subject oneself to surveillance serves as a
demonstration of the strength of one’s self-image.
Being ‘real’ is a proof of honesty, and the persistent gaze of the camera
provides one way of guaranteeing that ‘realness’. Further, in a teeming
society wherein one’s actions often go unnoticed by others, the reality of
those actions can be validated if they are recorded and broadcasted – they
become more real to oneself to the extent they become real for others.
Submission to comprehensive surveillance is a kind of institutionally
ratified individuation: it provides the guarantee of the authenticity of
one’s individuality. (266)
The sense of not having anything to hide is both reified and problematised by
these programs. If everything is in view then both the realness and the manipulative
construction of character become evident, as do the prevailing models of normative
characterisation.
Surveillance data and a variety of video and audio evidence, are not just used in
reality programming they are now essential plot devices in popular crime shows.
Here the forensic power of surveillance data is shone on characterisations of the
deviant and the criminal. Hardly an episode goes by in series like the CSI franchise
without someone pouring over hours of CCTV footage from a crime scene. Such
Page 190
The Second Workshop on the Social Implications of National Security
work is often represented as mundane but fruitful, as one amongst many forms
of looking at/through evidence. Often however it comes to the forefront of the
plot and takes on a more integral element linking the voyeuristic game of viewers
and characters. The connections between forensic logic, the apocalyptic and visual
surveillance are also evident. Like prophecy believers, television’s forensic scientists
are looking for the signs of the times, for portents that will help them understand
reality and in each of these episodes “reality” or “evidence” is mediated through a
series of visual signs.
Recently broadcast episodes4 of two popular crime dramas, CSI and Criminal
Minds, bear this out. In an episode of CSI,5 CCTV footage is used to reconstruct
a complex multi-gunman supermarket shoot out. In the following episode of CSI
Miami6 it is not CCTV footage but the video extras from a pornstar victim’s most
recent film that provides the video evidence. In recent episodes of Criminal Minds
surveillance footage is even more central One storyline7 is constructed around a
paedophile’s online video auction of a child through a live web cam feed timestamped to indicate the minutes and hours left before the child goes to the highest
bidder. The next episode8 features videos of a sadistic duo who send DVDs to
their victims’ mothers. In each of these instances the video evidence is read by the
protagonists and the viewers as a potential revelation of something real or authentic
about the victims or their unknown attackers. The DVDs from the sadists for
example, are read closely by the show’s behavioural scientists to reveal the presence
of the unseen accomplice. In a pop-psychological interpretation – a staple of this
show – it is also read as an “intrinsic” element of the two criminals’ “perversion.”
We are told that the accomplices “need” the video evidence as an artefact to share
and a way of reliving their sadistic crimes.
The connections between the surveillance data and the apocalyptic moment are
particularly acute in the paedophile auction episode of Criminal Minds.The “ticking”
clock code at the bottom of the live feed, which allows paedophile voyeurs into
the world of the child, is a literal marker of the countdown to the apocalyptic fate
that awaits the boy when the auction is over. It is also a marker for the work of the
criminalists of the FBI, who have a limited time span to decipher the images before
them. It thus represents both a fated end and a hoped for salvation.
4
The episodes of CSI and Criminal Minds were broadcast in Australia on 29 and 30 July.As Nick Groombridge
(2002) points out in his survey of CCTV imagery on popular television this method of looking to episodes
“at hand” may seem random but is indicative of the widespread references in popular culture because
almost any night or week’s viewing can be chosen and will yield interesting “results” for analysis. While
the episodes discussed here were broadcast over two days recently in Australia they include repeats that had
first aired in the United States in 2004. They thus represent a narrative of surveillance that has remained
“current” over the last three years.
5
“Paper or Plastic” Episode 83/Season 4 first broadcast 12/02/2004
6
“Innocent” Episode 48/Season 2 first broadcast 24/05/2004
7
“P911” Episode 24/Season 2 first broadcast 27/09/2006
8
“The Perfect Storm” Episode 25/Season 2 first broadcast 04/10/2006
Page 191
The Second Workshop on the Social Implications of National Security
The time codes of surveillance footage marks it as a mediation of both “real”
bodies and of “real” time and in shows like CSI and Criminal Minds it is the ability
to read the complex evidence of space and time together that is often most revealing.
This work is imaginative and psychological, it involves the players getting “inside”
the heads of the criminals or reconstructing the crime after the event. It is often
through staring at these surveillance images that insight occurs – in a psuedovisionary experience – allowing a connection to be made between the after image
and the real bodies of the crime.
6 The forensic and the apocalyptic body
Novelist J. G. Ballard has written of his own fascination with the CSI series
and asks the question: “Why is it so riveting?”. He finds his answer in an existential
apocalypticism: the finality of the autopsy room, which he describes as the “inner
sanctum” of the series:
Here the victims surrender all that is left of their unique identities,
revealing the wounds and medical anomalies that led to their demise.
Once they have been dissected - their ribcages opened like suitcases,
brains lifted from their craniums, tissues analysed into their basic
components - they have nothing left, not even the faintest claim on
existence. I suspect that the cadavers waiting their turn on the tables
are surrogates for ourselves, the viewers.The real crime the C.S.I. team
is investigating, weighing every tear, every drop of blood, every smear
of semen, is the crime of being alive. I fear that we watch, entranced,
because we feel an almost holy pity for ourselves and the oblivion
patiently waiting for us. (Ballard 2005)
But Andres Vaccari (2005) accuses Ballard of missing the point: yes the body
on the table is key but the fantasy of CSI is not just psychological, there is also “a
right-wing edge to CSI, a morally conservative paranoia”:
CSI is, in fact, a parable about the War on Terror. It is full of paranoid
warnings, admonitions, explorations of fear. The space the forensic
investigators tread on every day is a landscape of death and remains,
of accidents and rotten intentions. This is the modern traumascape, an
unsafe and paranoid place, a netherworld of catastrophe and loss. No,
there’s no heaven; just decomposing bodies, flesh cracked open on
the stainless-steel table, organic fluids and chunks of tissue under the
microscope. CSI portrays a world in which we have come to accept
these things as necessary and inevitable.
Investigating this televisual traumascape requires what Rugoff (1997) has dubbed
“forensic aesthetics.” He notes (1997:91) that “any good investigator…must have a
nose…for smelling out the significance not only of seemingly trivial clues but of
non-events and missing details as well.” It is the overall “gestalt” of the “crime scene”
that matters because “clues do not betray their secrets when directly examined;
Page 192
The Second Workshop on the Social Implications of National Security
their story emerges only if they are approached obliquely.” This forensic aesthetic
finds surprising resonance in the Christian apocalyptic. Rugoff ’s “gestalt” echoes
VonRad’s (1975) apocalyptic “cipher” described earlier. For prophecy believers the
world is in fact a “crime scene,” an “after image” that follows on from the original
sin of Adam and Eve (Genesis 3). And both the Christian apocalyptic and Rugoff ’s
forensic aesthetic are corporeal narratives that depend on the trace of the body for
their impact and intrigue. The aftermath of the expulsion from Eden is always a
bodily experience, more specifically of the body under surveillance. Expelled from
the garden Adam’s first thought is of his body, a new instinct, a sensation of being
watched, compels him to cover his nakedness, and quickly following this experience
of bodily shame comes the realisation of bodily exertion: he will have to labour to
feed and clothe the body.
As Ballard notes, in the inner sanctum of forensic dramas is the autopsy table, on
the autopsy table the contemporary body is naked but not in a pre-edenic sense,
here the apocalyptic signs of pain, exertion and violence are examined.The Book of
Revelation might be read as a bizarre autopsy report of “the lamb that was slain” (Rev
5:6; 13:8) so crucial is the wounded body in this narrative. Christian commentators
like to point out that it is “the lamb that was slain” who is triumphant in Revelation.
(cf Barr 1984). Many argue that this is a remarkable image of a reverse theology of
power: the weak will come to rule over the brutalising and the strong. However
what is perhaps more notable is that the lamb is not the only figure in Revelation
who is slain. The book is awash with ruptured bodies. As Elana Gomel (2000) has
pointed out, Revelation’s “baroque scenarios are shaped by the eroticism of disaster”
and these erotics are double edged:
On the one hand, its ultimate object is some version of the crystalline
New Jerusalem, an image of purity so absolute that it denies the organic
messiness of life. On the other hand, apocalyptic fictions typically linger
on pain and suffering. The end result of apocalyptic purification often
seems of less importance than the narrative pleasure derived from the
bizarre and opulent tribulations of the bodies being burnt by fire and
brimstone, tormented by scorpion stings, trodden like grapes in the
winepress. In this interplay between the incorporeal purity of the ends
and the violent corporeality of the means the apocalyptic body is born.
(Gomel 2000:405)
In the current environment the image of the devastated apocalyptic body – the
bodies still falling from the towers of September 11, the bodies of Abu Ghraib, the
bodies of starvation in Darfur – seem to elide any millennial hope. The forensic
analysis of such images refuses to give up its meaning and leaves us hankering for a
conjuring trick that will transform the vulnerability they do reveal.
These connections between apocalyptic bodies and the contemporary security
state become acute in the world of nanotechnologies.These evolving technologies
produce the mechanisms whereby human bodies become controllable nodes in
Page 193
The Second Workshop on the Social Implications of National Security
an information network of somantic surveillance. “Smart-warriors” become fully
mission-controlled through an array of wearable and inplantable technologies
that see, sense and report. It is here that the discourse of future bodies oversteps
the messiness of today’s realities. Monahan and Wall (2007) point out that these
technologies are caught between current realities and a discourse about their future
potential. They note that this discursive “history of the future,” also creates the
necessary parameters for generous funding and development opportunities.
Discourses about the revolutionary potential of nanotech should also be
read as cultural tools for conjuring those worlds into existence, while
simultaneously foreclosing alternative pathways for technoscientific
development…. By stressing the “new” groundbreaking features of
nanoscience and nanotechnology… proponents of nanotech biomedical
monitoring seek to construct a “break in time”…. or a point at which
the future lifts off from the present, transporting us away from current
problems and concerns. In this framing, any resistance to such bold
futures is seen as increasing national vulnerability to terrorists who might
not be as ethically constrained or responsible as the US. (Monihan &
Wall 2007:159)
While these “bold futures” are being explored for very real military and corporate
ends, in a fascinating feedback loop this discourse of the future has also found its
way back into contemporary reimaginings of traditional apocalyptic bodies such
as the Beast micro-chip of the Left Behind novels.
7 The image rhetorics of surveillance and national security
Films, television drama and popular cultural artefacts like Left Behind are critical
players in the contemporary “image rhetorics” of securitisation (Muller 2004). We
live in an environment where security – national, homeland, personal – must be
configured in response to what Liotta (2005) calls “creeping vulnerabilities” as well
as specific “threats”. And as Barkun notes it is also an environment in which “war”
and “disaster” are conflated with very real policy consequences:
It implies that all forms of emergency response must be linked,
whether civilian or military, national or local. This potential breaching
of boundaries between types of response mirrors the breaching of
conventional boundaries among types of threats. Thus there are no
longer clear distinctions between war and peace, war and crime, war
and disaster. Rather myriad forms of “low intensity” conflict inhabit a
transnational zone of ambiguous events (Barkun 2002:31)
This “transnational zone of ambiguous events” is not just apparent in the news
and the rhetoric of politicians. As we have seen the “traumascape” of popular crime
shows and the apocalyptic scenarios of prophecy novels all contribute to this ongoing
sense of low intensity conflict and creeping vulnerabilities. Popular culture is not just
used by viewers to try to make individual psychological sense of this contemporary
Page 194
The Second Workshop on the Social Implications of National Security
situation it is also a potent tool available to advocates and policy makers. Popular
image rhetorics are an essential part of conjuring the history of the future. Benjamin
Muller argues, for example that “by exposing the painful procedures necessary
for cheating biometrics, films like Minority Report only strengthen the resolve to
introduce such technologies into the contemporary politics of discriminating friend
from foe.” He continues:
Minority Report, Mission Impossible, and other films, become the space in
which the merits, dilemmas, and even considerations of political agency
are evaluated. In this sense, it would seem that industry representatives
and policy advocates consistently evoke Hollywood representations
of biometric technologies in order to justify the introduction of such
measures and even extol their virtues. (Muller 2004:286)
Michael Shapiro gives quite a different reading of this same situation. In his
formulation, the hero’s painful eye surgery to avoid retinal identification is a decisive
movement that marks John Anderton (the Tom Cruise character) as a “subversive
body”.
He manifests a counter energy and goes so far as to modify his body
to subvert the surveillance system…Anderton is therefore a Deleuzian
fugitive;“Everybody runs,” he says when the police first try to apprehend
him, and thereafter his running requires him to move in ways that allow
him to escape from the coding apparatuses and exemplify the Deleuzian
suggestion that there are always forms of flow that elude the capturing,
binary organizations. (2005:30)
Significantly, as Shapiro points out, this is a critical movement from the opening
scenes of the film where Anderton’s body is choreographed as an integrated part
of the surveillance machinery of the state.
Minority Report can and will be read both ways by audiences, critics and policy
makers.And certainly overall the discourse of “the history of the future” is inherently
unstable and competing fragments will ensure that is not reduced to either unadorned
paranoia or easy optimism. However there is no doubt that since September 11 there
does seem to have been a shift in the way that surveillance futures are conceptualized
and represented. As the Time magazine article quoted at the beginning of this paper
and much of the press coverage of the July 2007 London bombings indicates, the
balance between surveillance as protection and surveillance as intrusion has tilted
dramatically. As one commentator put it recently: “I think the genie is out of the
bottle.” Paul Levinson, chairman of communication and media studies at Fordham
University told the Washington Post that people now have different expectations
about their right to privacy. And the genie that has escaped?
“The genie is the lowest level of privacy that human beings have had in
their history,” Levinson says.“We just have to get used to it. It’s a question
of redefining what our public and private lives are.” (Duke 2007)
One recent media survey (Lirtzman 2007) indicates that 70% of Americans
Page 195
The Second Workshop on the Social Implications of National Security
support the increased use of surveillance cameras in public places and another
shows 62% support continued wiretapping to fight terrorism (Duke 2007). Post
writer Lynne Duke identifies Jason Bourne and Jack Bauer9 as part of a culture
that promotes a new “swashbuckling and romantic” view of surveillance.
In these types of adrenaline-pumping portrayals of electronic
eavesdropping, reality must step aside so that Bourne (when he’s not
crashing a car) or “24’s” Jack Bauer (when he’s not torturing someone)
can eavesdrop in real time, real fast. And it’s always for the good, you
see, because Bourne’s gotta find out what sinister spook programmed
him to be a stone-cold killer and Bauer’s gotta save the world.The ends
justify the means. No time for questions. (Duke 2007)
Certainly cries of “I’m repositioning the satellite now” or “Send the feed to my
PDA” are part of the familiar patter that pretends to make shows like 24 “realistic”
encounters with contemporary technologies of spying. Nicola Rafter has detected
a similar “swashbuckling” attitude in another recent surveillance film: Tony Scott’s
DejaVu. Although it has the structural earmarks of classic surveillance films it bears
little of the social critique. It uses a futuristic surveillance device as a principle visual
element but does not use it as a plot device to critique technology or to explore
the character’s identity. (Rafter 2007)
But not all recent surveillance films take this approach. The Lives of Others has
enjoyed both critical acclaim – an Oscar for Best Foreign picture – and unusually
long playing seasons at Melbourne and Sydney arthouse cinemas. At its heart is a
devastating critique of the East German surveillance state under the Stasi. Although
the brutality of the state is represented through the ubiquity of its surveillance, the
intensity of its interrogation techniques and the corruption of friend against friend
that this inculcated, the film also presents a story of resistance and transformation.
This attempt to produce a transformational story has been criticised by those who
believe it fails to come to terms with the severity of the East German security state
(Ash 2007; Funder 2007).
What is unique about Florian Henckel Von Donnersmarck’s debut feature
and what troubles his critics from the point of view of history, is the portrayal of
a genuine “encounter” through the mechanics of surveillance. Stasi agent Gerd
Wiesler is gradually transformed through his day-to-day encounter with playwright
Georg Dreyman and his circle of friends who have been placed under surveillance.
Wiesler gradually becomes addicted to their lives as he sits in the attic of Dreyman’s
apartment building listening to the clumsy old reel-to-reel wire taps. His existential
encounter with the lives of others leads to his taking unusual risks to protect them.
Whether such risk taking would have been historically possible given the multiple
levels of lateral surveillance in place during the Stasi era is not my concern here.
9
Jason Bourne is the lead character played by Matt Damon of three highly successful movies (The Bourne
Identity;The Bourne Supremacy;The Bourne Ultimatum) about a rouge CIA assassin. Counter terrorism agent
Jack Bauer, played by Kiefer Sutherland is the hero of six seasons of the high-rating television drama 24.
Page 196
The Second Workshop on the Social Implications of National Security
What I find interesting is the way this narrative, this reimagining of the past, links
in with contemporary narratives of surveillance as a site of authenticity. While,
as we have seen, the culture of reality TV “equates submission to comprehensive
surveillance with self-expression and self-knowledge,” (Andrejevic 2002:253) Von
Donnersmarck’s film explores this relationship from the other side. Surveillance
becomes not an objectifying method of control – of “othering” – but a site of
existential encounter with the other. Both self and other are reimagined in this
encounter.
8
Conclusion
The trope of surveillance is ubiquitous in contemporary culture and the reach
of surveillance technology in contemporary urban spaces is constantly expanding
through both technical advances and policy creep.Two metaphors have commonly
been adopted to mediate reflections on cultures of surveillance.At a popular level the
Orwellian figure of Big Brother has been the focal point for fears of technological
encroachment on private lives. At a policy or academic level the Foucaultian
Panopticon10 (Foucoult 1977) has often been employed to conceptualise the modern
disciplinary power of the surveillance state.
I have argued in this paper that the discourse of the apocalyptic and the forensic
are deeply embroiled in contemporary cultural mediations of surveillance. These
narratives allow for both a critique of surveillance cultures as well as an interrogation
of unexpected resistances, opportunities, fears and new cultural spaces of the
surveilled subject.
Neither of these narratives allow us to abandon the totalitarian metaphors of Big
Brother and the Panopticon. As Maier (1997) notes the apocalyptic omniobservant
God is a model of Foucault’s panoptic watcher. But the twin impulses of the
apocalyptic and the forensic: transformation and catastrophe; discovery and horror;
enable us to conceptualise the cultural work of surveillance in a range of ways. One
of the surprising insights that emerges at the intersection of these narratives is a story
of authenticity and self discovery that shadows the wider story of state intervention
that subjects identity to interrogation in quite different ways.
As media academic Paul Levinson said to the Washington Post: “the genie is out
of the bottle.” He might have added: be careful what you wish for.
References
Andrejevic, Mark, 2002, “The kinder, gentler gaze of Big Brother: Reality TV in
the era of digital capitalism,” New Media Society 4 (2) pp. 251-270
Andrejevic, Mark, 2004, Reality TV: the work of being watched, Rowman &
Littlefield, Lanham, Md.
10 This model prison has been widely described, with its unseen watcher in the middle and its prisoners
constantly on view around the perimeter.The possibility of surveillance at any point becomes the disciplining
factor leading to extremely effective internalised self-surveillance.
Page 197
The Second Workshop on the Social Implications of National Security
Ahearn, Edward J., 1996, Visionary fictions: apocalyptic writing from Blake to the
modern age, New Haven:Yale University Press.
Ash, Timothy Garton, 2007, “The Stasi on Our Minds,” New York Review of Books,
Volume 54, Number 9 · May 31.
Ballard, J., G., 2005, “In Cold Blood,” The Guardian, June 25, available online:
<http://film.guardian.co.uk/features/featurepages/0,,1512152,00.html>
accessed: 28 July 2007.
Barkun, M., 2002, “Defending against the apocalypse: the limits of homeland
security,” Policy Options, September 2002, pp. 27-32
Barr, D.L. 1984, ‘The Apocalypse as a Symbolic Transformation of the World: A
Literary Analysis’, Interpretation, vol. 38, no. 1, pp. 39-50.
Boyer, P.S., 1992, When time shall be no more: prophecy belief in modern American
culture, Belknap Press of Harvard University Press, Cambridge, Mass.
Cohn, Norman, 1970, The pursuit of the Millennium: revolutionary millenarians and
mystical anarchists of the Middle Ages, Revised and expanded edn, Maurice
Temple Smith Ltd., London,.
Dellamora, R., 1995, Postmodern apocalypse: theory and cultural practice at the end,
University of Pennsylvania Press, Philadelphia.
Dixon, Wheeler W., 2003, Visions of the Apocalypse: spectacles of destruction in
American cinema, London; New York: Wallflower.
Domke, D.S. 2004, God willing?: political fundamentalism in the White House, the
“War on Terror,” and the echoing press, Pluto Press, London
Duke, Lynne, 2007, “Who’s on the Line? These Days, It Could Be Everyone,”
Washington Post, August 12; Page D01, available online: <http://
www.washingtonpost.com/wp-dyn/content/article/2007/08/11/
AR2007081101219.html> accessed 12 August 2007
Foucault, Michel, 1977, Discipline and punish: the birth of the prison, London: Allen
Lane.
Frykholm, A.J. 2004, Rapture culture: left behind in Evangelical America, Oxford
University Press, Oxford, England; New York.
Funder, Anna, 2007, “Eyes without a Face,” Sight and Sound, May.
Gomel, Elana, 2000, “The Plague of Utopias: Pestilence and the Apocalyptic
Body,” Twentieth Century Literature,Vol. 46, No. 4, pp. 405-433
Gorenberg, G., 2000, The end of days: fundamentalism and the struggle for the
Temple Mount, Free Press, New York.
Gates, David, 2004, “The Pop Prophets,” Newsweek, May 24, available online:
<http://www.msnbc.msn.com/id/4988269/site/newsweek/> accessed
25/07/07.
Groombridge, Nic, 2002, “Crime Control or Crime Culture TV?”
Surveillance & Society 1(1): 30-46
Hultgard, A. 1998, ‘Persian apocalypticism’, in J.J. Collins (ed.), The encyclopedia of
apocalypticism,Volume 1:The origins of apocalypticism in Judaism and Christianity,
Page 198
The Second Workshop on the Social Implications of National Security
Continuum, New York, pp. 39-83.
Juergensmeyer, M., 2003, Terror in the mind of God: the global rise of religious
violence, 3rd edn, University of California Press, Berkeley.
Kermode, F., 2000, The sense of an ending: studies in the theory of fiction: with a
new epilogue, Oxford University Press, Oxford; New York.
Lirtzman, Michelle, 2007, “Surveillance Cameras Win Broad Support” ABC
News, July 29, available on line: <http://www.abcnews.go.com/US/
story?id=3422372&page=1> accessed 3 August 2007
Liotta, P.H., 2005, “Creeping Vulnerabilities and the Reordering of Security,”
Security Dialogue,Vol. 36 No. 1, pp.49–70
McMinn, Lisa, 2001, “Y2K, The Apocalypse, and Evangelical Christianity: The
Role of Eschatological Belief in Church Responses” Sociology of Religion,Vol.
62, No. 2, pp. 205-220
Maier, H. 1997, “Staging the Gaze: Early Christian Apocalypses and Narrative
Self-Representation”, The Harvard Theological Review,, vol. 90, no. 2, pp. 131154.
Maxwell, Richard, 2005, “Surveillance: Work, Myth, and Policy,” Social Text 83,
Vol. 23, No. 2
Monahan, Torin and Tyler Wall, 2006, “Somatic Surveillance: Corporeal Control
through Information Networks,” Surveillance & Society, 4(3): 154-173
Muller, Benjamin J., 2004, ‘(Dis)qualified bodies: securitization, citizenship and
‘identity management’’, Citizenship Studies, 8:3, 279 - 294
New, D.S., 2002, Holy war: the rise of militant Christian, Jewish, and Islamic
fundamentalism, McFarland & Co., Jefferson, N.C.
O’Donnell, M., 2004b, ““Bring it on”: the apocalypse of George W. Bush,” Media
International Australia Incorporating Culture and Policy, No 113
O’Leary, Stephen D., 1994, Arguing the apocalypse: a theory of millennial rhetoric,
New York: Oxford University Press.
Pippin, T. 1999, Apocalyptic bodies: the biblical end of the world in text and image,
Routledge, London; New York.
Quinby, Lee, 1994, Anti-Apocalypse: exercises in genealogical criticism, University of
Minnesota Press, Minneapolis.
Quinby, Lee, 1999, “Women and the Techno-Millennium,” Review of Education,
Pedagogy, and Cultural Studies, 21:4, 281 - 300
Rafter, Nicola, 2007, “Surveillance and Spying in Film: I – Déjà vu,” OUPBlog,
February 22, available online: <http://blog.oup.com/2007/02/surveillance_
an2/> Accessed 16 July 2007
Ripley, Amanda, 2007, “Can We Spot The Threat?” Time, 16 July 2007
Robbins, Thomas and Susan J. Palmer (eds), 1997, Millennium, messiahs, and
mayhem: contemporary apocalyptic movements New York: Routledge.
Rowley, David G., 1999,“ ‘Redeemer Empire’: Russian Millenarianism’ The
American Historical Review,Vol. 104, No. 5 pp. 1582-1602
Page 199
The Second Workshop on the Social Implications of National Security
Rusconi, R., 1998, “Antichrist and Antichrists” in Bernard McGinn, The
encyclopedia of apocalypticism volume 2: Apocalypticism in Western history and
culture, New York; London: Continuum, pp287-325
Schaefer, N. A., 2004, “Y2K as an Endtime Sign: Apocalypticism in America at
the fin-de-millennium,” Journal Of Popular Culture Vol 38; Number 1, pp 82105
Schüssler Fiorenza, E., 1998, The book of Revelation: justice and judgment, Fortress
Press, Minneapolis.
Schüssler Fiorenza, E. 1991, Revelation: vision of a just world, Fortress Press,
Minneapolis.
Sharrett, Christopher, 1993, Crisis cinema: the apocalyptic idea in postmodern narrative
film, Washington, D.C.: Maisonneuve Press.
Shuck, G.W., 2004, “Marks of the Beast: The Left Behind Novels, Identity, and the
Internalization of Evil,” Nova Religio:The Journal of Alternative and Emergent
Religions, Vol 8, No 2, pp. 48–63.
Shuck, G.W., 2005, Marks of the beast: the left behind novels and the struggle for
evangelical identity, New York University Press, New York.
Tapia, A. H., 2002, “Techno-Armageddon: The Millennial Christian Response to
Y2K,” Review of Religious Research,Vol. 43, No. 3, pp. 266-286
Vaccari, Andres, 2005, “Why I love/hate CSI,” available online: <http://
andresvaccari.com/blog/?p=23> accessed: 28 July 2007
Van Melik, Rianne,Van Aalst, Irina and Van Weesep, Jan
Webb, R.L. 1990, ‘’Apocalyptic’: Observations on a Slippery Term’, Journal of
Near Eastern Studies, vol. 49, no. 2, pp. 115-126.
West, M. & Carey, C. 2006, ‘(Re)Enacting Frontier Justice: The Bush
Administration’s Tactical Narration of the Old West Fantasy after September
11’, Quarterly Journal of Speech, vol. 92, no. 4, pp. 379 - 412.
Page 200
The Second Workshop on the Social Implications of National Security
15
Auto-ID and location-based
services in national security:
Social implications
Holly Tootell
Lecturer, School of Information Systems and Technology, University of Wollongong
Abstract
This paper provides an overview of auto-ID and location-based service technologies that
are currently being used for the purposes of national security. The paper addresses the
social dimensions of technology which have a bearing on their acceptance by individuals.
This overview from both a technology and social perspective allows for an understanding
to be created as increasingly decisions regarding adoption need to be made by different
sectors in society.
Keywords: automatic identification, location-based services, national security, terrorism,
liberty, privacy, security
Page 201
The Second Workshop on the Social Implications of National Security
1 Introduction
The primary purpose of a literature review is to provide evidence of relevant
research being conducted in a particular field of study. This paper explores the
use of auto-ID and location-based services technologies for national security
purposes. This includes discussion of technologies currently being used, and also
discussion of technologies being proposed for national security applications.
Firstly the development and role of location technologies is covered in regard to
national security. Secondly, a critical review of the social constructs that relate to
the introduction of the technologies is necessary.This issue is addressed through the
social dimensions of the technology, sometimes thought to be the consequences of
its use: privacy and security. These concepts need to be treated separately but are
closely related.Thirdly, the current context of national security and technology will
be examined.
2
Background to automatic identification and location-based
services
The following sections provide a review of auto-ID and LBS technologies. Each
section begins with an overview of the technology and then moves to examine
their presence in the national security arena. The sections have been organised in
line with the historical development of the technology.This progression reflects an
increase in precision of location identification.
Auto-ID technologies are those capable of providing automatic identification
where human intervention is not required (Ames 1990a, b, c; Cohen 1994; Michael
et al. 2006b). Auto-ID has traditionally been equivalent with barcodes, used on
goods in stores and cards for financial transactions. The scope of use is now more
widespread, with uses ranging from immigration control systems to pet identification.
Auto-ID technologies have had a mass market presence since the 1960s and their
potential for detrimental impact on human rights and privacy have been noted
since the 1970s (Michael and Michael 2004, p.434).
The following technologies have been developed over the past 50 years. The
drivers for this technology development have been the move by governments to
adopt electronic systems to replace the use of paper-based methods (such as vouchers,
coupons, ration cards and concession cards) to operate large-scale federal and
state programs, in order to increase efficiency (Michael and Michael 2006a, p.21).
Other reasons include greater social acceptance and affordability of the technology.
Each of the following technologies has made a significant contribution to the
area of location-based services, however it is their convergence that is of interest
as discussion moves toward the role of location-based technologies in relation to
national security. Smart cards, biometrics, RFID, GPS and GIS are technologies
that alone or in combination provide information about the location of a user.
Biometric technologies do not track location directly, but biometric identification
Page 202
The Second Workshop on the Social Implications of National Security
on a smart card ensures that every time the smart card is used to access a building
for example, a time and date stamp of that biometric identification and smart card
access is logged. This is able to be pieced together to enable movement patterns to
be established. GPS on the other hand is a real-time location tracker.
This research is concerned with the issue of the automatic identification of
people through location determination for national security purposes, in order to
understand whether a trade-off is made for enhanced perception of security, or
sacrificed in order to maintain an illusion of security.
2.1 Smart cards
A smart card is a credit card-sized plastic card that consists of an integrated
circuit or ‘chip’ which enables the card the ability to store and/or process data.
There are two broad categories of smart cards: memory cards that contain only
non-volatile memory storage components, and perhaps some specific security logic;
and microprocessor cards that contain memory and microprocessor components.
Smart cards emerged from the development of magnetic strip cards. The
innovation of the smart card was devised by Juergen Dethloff of Germany. The
first patent, although restricted to Japan, was taken out by Arimura in 1970. The
first international patent was given to Frenchman Roland Moreno in 1974, who
founded the Societé Internationale pour l’Innovation. This society was established
to develop new technologies and extend its patents world wide (Rankl and Effing
2000; Zoreda and Oton 1994).
Smart cards have been adopted by many industry sectors for a variety of purposes.
Table 1 provides an overview of some of the most common applications (Chaum
2000). In addition to these examples, smart cards are commonly used as access
cards to secure areas, as identification cards and as loyalty cards for many different
sectors.
Table 1: Smart Card Applications
Industry
Financial
Transport
Communication
Healthcare
Education
Government
Retail
Application
Electronic Purse, Credit/Debit cards and Secure Electronic payments
Electronic Toll collection, public transport fares and Drivers Licence
Mobile Phone accounts and Access to Pay TV
Medical Information cards and Government health insurance eligibility
Identification, library access, security access
Non-repudiation device for voting and Government benefit payments
National Identification schemes
Discount/VIP/membership cards
The technological development of smart cards has advanced the cards to include
larger memory and processing capacity which has increased the functional potential
for their application. In line with this is a perceived increase in the threat posed by
multi-purpose smart cards in terms of centralisation of data storage.This concern is
Page 203
The Second Workshop on the Social Implications of National Security
addressed specifically in regard to smart card national identification schemes by:
…the simple logic that the higher an ID cards value, the more it will
be used. The more an ID card is used, the greater the value placed on
it, and consequently, the higher is its value to criminal elements (LSE
2005, p.35).
2.2 Biometrics
Biometrics, as a form of identification, have been in use since early fourteenth
century China (Chirillo and Scott 2003, p.2).The earliest recorded uses of biometric
identification include Babylonian kings who used handprints to identify different
things such as engravings as their own (Harris andYen 2002); and Chinese merchants
in the fourteenth century stamping children’s palm prints and footprints on paper
with ink to be able to distinguish between them (Chirillo and Scott 2003).
A biometric is a “measurable physiological and/or behavioural trait that can
be captured and subsequently compared with another instance at the time of
verification” (Ashbourn 1994). It refers to identifying a person based on his or her
distinguishing physiological and/or behavioural characteristics (Jain et al. 2000).
Biometric identifiers include digital fingerprints, retinal scans, hand geometry, facial
characteristics, and vocal patterns.
The public perception of a biometric identification technology is an important
component in the success and adoption of a technique. In addition to this, the
technique must be legally and physically robust, safe to use, and not invade the
user’s privacy. An example of this is a fingerprint scanner, which is often associated
with criminal identification.The self-protection reflex of the eyes means that many
people are uncomfortable with having laser scans on a regular basis and are often
fearful of unfounded claims that regular scanning could be detrimental to their
health. To contrast this, hand geometry scanning and signature verification are
mostly regarded as innocuous (Kim 1995). One of the mistakes often made in the
discussions of biometrics and use of parts of the body for identification is where
the act of identification can be associated with a violation of bodily integrity (van
der Ploeg 1999). Overcoming public perception of the invasiveness of the scan or
acquisition of the biometric sample is the key to success of more pervasive use of
these technologies.
From the perspective of civil libertarians, biometric identification has been
seen as a threat to the location privacy of individuals (Davies 1998; Johnson 2004).
However the counter argument recognises that many of the biometric identifiers
being requested of a person are things that they have on show most of the time.
There is nothing private about your face (Branscomb 1994; Scheeres 2005).The same
was said of voice and handwriting by the US Supreme Court. A person’s reasonable
expectation of privacy could not extend to “those physical characteristics that are
constantly exposed to the public”(Woodward Jr 1997, 2001). However, this does
not overcome the controversy related to the legal issues surrounding the storage
Page 204
The Second Workshop on the Social Implications of National Security
and usage of biometric identification (Chandra and Calderon 2005; van der Ploeg
1999).
Biometric identification can be used for many purposes. Table 2 groups the
uses into three broad categories; forensic, civilian and commercial, and describes
typical uses for these forms of identification (Jain et al. 2000; Petersen 2001; Rood
and Hornak 2003).
Table 2: Applications for Biometric Identification
Forensic
Criminal investigation
Civilian
National ID
Commercial
ATM security
Corpse identification
Driver’s license
Credit card security
Parenthood determination
Welfare disbursement
Cellular phone
Prison security
Border crossing
Access control
Customs and immigration
initiatives
Ecommerce/ebanking
transactions
Protecting critical
infrastructure
Biometric identification is extremely useful for restricting access to areas that
involve national security, such as military bases or intelligence centres, and for
protecting critical civilian infrastructure, such as water supplies and power plants
(Rood and Hornak 2003). It must be noted that technology such as this is not
a panacea. No technology solution is absolutely foolproof (Michael and Michael
2006b, p.360).
Some biometric identification programs are mandatory, for example criminal
investigation and prison security.At present, almost all other programs are voluntary.
However, in some of the programs, biometric identification is used to make the
service more attractive to users by providing a faster, or more enhanced service, but
other forms of identification are still permitted (Alterman 2003).An example of this
is the INSPASS (Immigration and Nationalization Service Passenger Accelerated
Service System) program in the US. It has been operating since August 1993 as
a voluntary system for frequent travellers. It allows passengers to move through
immigration more quickly at the cost of a system that has the potential to create
a vast amount of international transfer of their personal data (Davies 1996; Kim
1995). This system has grown from 2000 frequent fliers at the outset, to over 100
000 by the year 2000 (Michael and Michael 2006a).
Van der Ploeg (1999) considers the groups targeted for obligatory biometric
identification disproportionately include criminals, recipients of welfare, or other
benefits, workers, and immigrants. However she classifies an alternate grouping
where biometric identification may typify privilege as well. It may include frequent
flyers who have been assessed as ‘low-risk travellers’, are given the privilege to jump
the queue and avoid thorough controls; those who have higher access privileges to
Page 205
The Second Workshop on the Social Implications of National Security
secured spaces, parts of IT systems or authorisation of high-risk types of financial
transactions.
Biometrics have the potential to enhance our current reliance on documents
such as birth certificates, drivers’ licences, and passports to establish each person’s
true identity. In the future, biometric information may be recorded at birth and
incorporated in the birth certificate, using the child’s DNA as the prime indicator
of identity. In such a case, a person’s biometric information (which may change
with age) may be linked with his DNA (Rood and Hornak 2003).
2.3 Radio frequency identification
Radio Frequency Identification is a technology used for automatic identification.
RFID is a generic term for technologies that use radio waves to automatically identify
entities; either live or inanimate. The objects are identified by information that may
include a unique identifier, or it could be more complex including data such as:
manufacturing history, temperature, or age (Kinsella 2003; Legner and Thiesse 2006).
RFID has been referred to as the new barcode (Kelly and Erickson 2005;Want
2004).The advent of barcode technology revolutionised data capture and handling
technologies in the retail industry. RFID has advanced data capture and stock
handling to a new level. One of the main advantages of RFID is overcoming the
reliance of barcodes on line-of-sight data processing. RFID offers more robust and
useful scanning options (Alippi and Vanini 2004; Srivastava 2007). Other advantages
discussed by Michael et al. (2006b) are that RFID is not limited by its size and is
not vulnerable to magnetic fields, or affected by substances such as dirt or paint
which may cover the tag.
RFID systems are being used for many item-level tracking applications.
The phrase ‘internet of things’ is being used to describe the potential network of
information that could be created by the use of RFID in the following applications
(see Table 3) (Alippi and Vanini 2004; Elliot 2003; Floerkemeier and Lampe 2004;
Garfinkel et al. 2005; Hsi and Fait 2005; IIE Solutions 2002; Jayakumar and
Senthilkumar 2005; Jones et al. 2004; Juels 2006; Smith 2005; Swartz 2004; Want
2004).
Since September 11 the threat of terrorism has ensured that the tracking offered
by RFID is a favoured system implemented to alleviate that threat, be it in shipping
containers or passport control. Atkinson (2004) observed that prior to September
11 the use of RFID was limited to supply chain security and loss prevention,
however in the post-September 11 world, the focus for RFID is ensuring tamperproof containers due to terrorism concerns. The continued development of RFID
technologies is regarded by many to have a significant impact on the way we conduct
our day to day life. US Senator Patrick J. Leahy stated that:
RFID has tremendous potential for improving productivity and security,
but it will also become one of the touchstone privacy issues of our
times (Swartz 2004).
Page 206
The Second Workshop on the Social Implications of National Security
Table 3: Commercial RFID Applications
Application
Commercial Examples
For airport baggage identification, RFID has eliminated the need
for manual sorting and lifting and is claimed to have enhanced
passenger security.
The clothing giant, Prada, have their New York dressing rooms
fitted with display screens that can identify a smart-tagged garment
Supply chain management and
when it is bought into the room.The display suggests other styles
supply chain theft reduction
and colours of the garment - even going so far as to show how
the garment was worn at a Prada fashion show.
Automobiles
Remote keyless entry.
Animal tracking
Identification and tracking for enhanced livestock management
Highway toll collection using RFID has allowed drivers the
Highway toll collection
convenience of driving straight through checkpoints without
needing small change.
The inclusion of RFID tags in passports and possibly drivers’
Passport security
licenses acts as an ‘anti-counterfeiting feature.
Museum exhibits
Enhancing interactivity of displays.
Product integrity can be monitored from factory to retail location.
Automatic product tamper
It might also help locate the source of activity when tampering
detection
is detected.
The use of passive-detector technology could be used on vehicles
Harmful agent detection
or security personnel, or in other uses where detection of biological
agents are needed.
Baggage tracking in airports
This sentiment was reflected by Rick Duris, from frontline Solutions Magazine,
and recorded by Albrecht and McIntyre (Albrecht and McIntyre 2005):
RFID will have a pervasive impact on every aspect of civilization,
much the same way the printing press, the industrial revolution and the
Internet and personal computers have transformed society…RFID is
a big deal. Its impact will be pervasive, personal and profound. It will
be the biggest deal since Edison gave us the light bulb.
The pervasiveness in Duris’ observation is seconded by Borriello (2005, p.36)
who believes that there is an imaginable future where; “Passive RFID tags are in
every manufactured object and maybe even in some non-manufactured ones (such
as natural resources, animals, and people).”
The US Department of Homeland Security is now using RFID technology at
US border checkpoints (Swartz 2004).Visitors entering the US will be issued RFID
tags that will track their comings and goings at border crossings. The technology was
tested at border crossings in Arizona, New York, and Washington state from the end
of July through to spring 2006 (Chabrow 2005). Angell and Kietzmann (2006) puts
forward the hypothetical of RFID cash being the preferred method of transaction in the
post-September 11 environment, where the threat of anonymity could be removed.
In emergency response situations, like the 2004 Boxing Day Tsunami and 2005
Hurricane Katrina, RFID tags can, and did, assist in management and location
Page 207
The Second Workshop on the Social Implications of National Security
identification of survivors as they were moved between emergency housing facilities
or graves (Smith 2005).
Consumer response to RFID is a considerable factor in the future of the
technology. Consumer perception is often linked to perceived risks relating to
personal data privacy, tracking and remote scanning (Hsi and Fait 2005, p.65; Nath
et al. 2006, p.24). Eckfeldt (2005, p.78) puts forward that a clear value proposition to
customers is what distinguishes between a successful and shunned RFID application.
This is seconded by Ohkubo et al. (2005, p.68), who also raises the problem
associated with killing an RFID tag as a privacy protection measure. He suggests
that if the tag was ‘killed’, the consumer would not be able to take advantage of
“future emerging services that would rely on the millions of RFID tags likely to
be dispersed throughout the consumer environment”. A survey by Metro Group,
investigating consumer’s major privacy fears relating to RFID found that:
Regardless of privacy-enhancing technology employed, consumers
feel helpless toward the RFID environment, viewing the network
as ultimately more powerful than they can ever be (Gunther and
Spiekermann 2005, p.74).
2.4 The global positioning system
The Global Positioning System (GPS) is a satellite-based navigation system. It is
used by both military and civilian users. GPS allows for precise location determination
however accuracy is different for civilian and military applications. The location is
determined based on the distance a user is away from the available satellites. The
effectiveness and accuracy of GPS can be affected by weather conditions, mountains,
buildings and other terrain (El-Rabbany 2002, p.1; Michael and Masters 2006;
Oderwald and Boucher 1997, p.2). The most significant drawbacks of the technology
for civilian applications are regarded as low availability/coverage in high-rise urban
settings, no system integrity and no guarantee of services performance in a shared
military/civilian environment (The Royal Academy of Engineering 2004). Getting
(1993) believes GPS to be “…the most significant development for safe and efficient
navigation and surveillance of air and spacecraft since the introduction of radio
navigation 50 years ago”.
GPS has been used for over two decades. In that time the range of uses has
expanded enormously as the cost of receivers has become less. Areas of applications
are outlined in Table 4 (El-Rabbany 2002, p.129-150; ESRI 2007).
Designed primarily as a military tool, GPS is used to facilitate accurate location
awareness. This can be applied to command and control of forces and targeting of
weapons. Geographical Information Systems (GIS) are systems used to create and
manage spatial information. GPS has the ability to identify events that happen in
large, hard to monitor areas like borders, harbours or military bases (Friedrick 2003).
For security agencies, there is the ability to more accurately manage resources and
access privileges once an incident has been identified.
Page 208
The Second Workshop on the Social Implications of National Security
Table 4: Commercial Applications of GPS
Application
Mapping
Resource
Management
Commercial Example
Asset management for utility companies and airborne topographic
mapping.
Forestry and natural resources: fire prevention, harvesting, aerial spraying.
Civil Engineering
Mining
Surveying
Navigation
Harvest yield monitoring, chemical applications control and property
management.
Road construction, earth moving and equipment tracking.
Assistance with drilling, vehicle tracking and surveying.
For both land and marine seismic surveying.
In-vehicle street directory systems.
Transit
Mass transport: position determination, fleet management and timetabling.
Retail
Delivery fleet monitoring and dispatch assistance.
Farming
3
Social dimensions of technology
With regard to technology, security and privacy are often used interchangeably.
To ensure privacy of information, security is required; and vice versa, without privacy
safeguards in place, security could be compromised.The following sections detail the
concepts of privacy and security as they can be experienced by individuals. Other
related concepts including surveillance and liberty are also addressed.These concepts
are relevant to discussions of the information society, and the power that exists
within that framework, which are addressed in the final section.The importance of
addressing these aspects in relation to technology is discussed at length by Ellul (1965,
p.90), who reminds us that the consequences of a technology are not necessarily of
technical significance, but can be of social or organisational consequence.
3.1 Privacy
Privacy is a concept that has eluded a single, clear definition. McLean (1995)
likens privacy to the concepts of liberty and freedom: each a concept unable to be
easily defined. To define privacy is to limit its scope (Day 1985; Schoeman 1992).
Many cultures do not have a single word for the concept the English language knows
as ‘private’ or ‘privacy’; this reflects on the complexity of the concept. Day (1985)
dedicated an entire thesis to the definition of privacy across cultures and languages
and found some five hundred definitions. However, for the purposes of this work,
a working understanding is necessary.
Privacy has been recognised as a concept that has evolved with the progress of
society, changing to suit the demands of the current times (Gotleib and Borodin
1973; Rule et al. 1980).Warren and Brandeis (1890) first wrote of the right of privacy
in 1890, asserting that privacy was the right to be left alone. Clarke (1997) prefers
not to assume privacy is a right: as a right implies an intrinsic and absolute standard,
Page 209
The Second Workshop on the Social Implications of National Security
something not always applicable to privacy. Recognising privacy as an interest that
an individual sustains allows for a more flexible definition that suits the application
of privacy in both the offline and online environment: a description suited to the
purposes of this work.
Privacy and surveillance, although being distinctly separate concepts, continue
to be linked together through popular media including fiction and films. This
reinforces a perceived public concept of them being one in the same. Popular
movies that show this include: Rear Window (Hitchcock 1954), Blowup (Antonioni
1966), The Conversation (Coppola 1974), The Osterman Weekend (Peckinpah
1983), Sneakers (Robinson 1992), Lost Highway (Lynch 1997), Gattaca (Niccol
1997),The End of Violence (Wenders 1997), Enemy of the State (Scott 1998),The
Truman Show (Weir 1998), Antitrust (Howitt 2001), Panic Room (Fincher 2002),
Minority Report (Spielberg 2002), Collateral (Mann 2004), Cache (Haneke 2005),
The Good Shepherd (De Niro 2006), The Departed (Scorsese 2006) and Déjà vu
(Washington 2006). In the literary world, George Orwell’s Nineteen Eighty Four
(1949) is an archetypical expression of what life would be like in a totalitarian state
where privacy did not exist.
The telescreen received and transmitted simultaneously. Any sound
that Winston made, above the level of a very low whisper would be
picked up by it; moreover, so long as he remained within the field of
vision which the metal plaque commanded, he could be seen as well
as heard. There was of course no way of knowing whether you were
being watched at any given moment (Orwell 1949).
3.2 Surveillance
Surveillance has been considered to be an important concept over a long period
of time; it derives from the French Revolution at the end of the 18th Century.Wigan
and Clarke (2006) define three functions for surveillance when it is utilised as a
security safeguard: “to anticipate a violation... to detect a violation... or to assist in
the identification of the person responsible for a violation or in the authentication
of an assertion as to the identity of the culprit”.
In the recent past surveillance has risen to a higher level of interest. This can
be attributed to the increase in database systems collecting information about us
(Garfinkel 2000) or it can be likened to the concepts of ‘dataveillance’ or ‘panoptic
sort’ described by Clarke (1997) and Gandy (1993) accordingly. Both of these terms
relate to the ability of collections of information to be equated with power. The
increase in technological capability over the past few decades has seen an increase
in the potential of machines and systems to collect information and then data
mine. The transition to an online economy, or at the very least, online commerce,
has created a whole new pool of information to be collected, tracked and stored.
Clarke (1997) and Gandy (1993) recognised that collection of data was occurring
well before the online world came into existence.
Page 210
The Second Workshop on the Social Implications of National Security
The introduction of online communications, and more particularly electronic
commerce, has resulted in a changing attitude to control of privacy. Privacy in the
online environment can be considered differently to a ‘traditional’ notion of privacy.
Privacy in the online arena is mostly concerned with the protection of information.
The term ‘information privacy’ has been defined by Clarke (1997) to be an interest
held by individuals regarding the control, and handling of data about themselves.
Gandy (1993) supports this theme in his notion of ‘informational privacy’ based
on Westin’s (Westin 1967) work as the “claim of individuals… to determine for
themselves... the extent information about them is communicated to others”.
3.3 Data surveillance
Data surveillance, or dataveillance as defined by Clarke (1988), is the:
…systematic use of personal data systems in the investigation or
monitoring of the actions or communications of one or more
persons.
It describes the surveillance practices facilitated by the collection and storage of
extensive quantities of personal data.The notion of data surveillance is supported by
Flaherty (1989) who classifies the practice of data surveillance within the broader
notion of surveillance as the “supervision, observation or oversight of individuals
behaviour through the use of personal data” (Davies 1996, p.248). The use of the
term data surveillance is quite narrow, however it is very similar to a number of
more specific terms outlined below: Langford (2000, p.73) has likened the concept
of data surveillance to the practices of data matching, data monitoring and data
recording. Bennett (1996) describes the concept of data surveillance as computer
matching.
Lyon (2002, p.353) attributes the pervasiveness of data surveillance to the
resulting convergence of information technology structures, the Internet and the
vast amounts of data which both are able to provide. Barr (1994) believes that the
concept of the information society has contributed to the increase in potential of data
surveillance. Clarke (1988) believes that the application of information technology
has been a factor in the increasing trend towards surveillance technologies and
their pervasive use in the surveillance of individuals through the use of personal
data. In contrast to these theories based on data surveillance being an entirely new
concept, Langford (2000, p.74) believes that the Internet is inextricably linked to
and is responsible for the exacerbation of data surveillance techniques and suggests
that it has not facilitated, but merely enhanced previously existing techniques.
As Langford (2000) suggests, the concept of surveillance techniques, such as
dataveillance, cannot only be attributed to the Internet and other information
technology trends, as much contemporary literature tends to suggest. This form
of surveillance has been used extensively within paper-based and localised data
systems. Subsequently, the Internet and similar trends have not created this new
form of surveillance, but merely facilitated the growth of such by utilising existing
Page 211
The Second Workshop on the Social Implications of National Security
techniques by providing access to more information and technology for exploitation
(Lyon 2002, p.346). This has been recognised by the Office of the Federal Privacy
Commissioner in understanding that the internet has only contributed to the
“proliferation of uses of personal information” (OFPC 2006) rather than initiating
such dataveillance practices. An extension to the concept of dataveillance has
been proposed by M.G. Michael (Michael et al. 2006a): überveillance. This term
describes a level of surveillance that goes beyond the scope of 24/7 surveillance.
M.G. Michael presents the issues for concern as “misinformation, misinterpretation,
and information manipulation.”
3.4 Security
Security can be used to describe many different issues but in the context of this
research it is about protection (Acharya 2002). The relationship between security
and privacy is often blurred, Starner (2001, p.57) distinguishes between them in the
following excerpt:
Security involves the protection of information from unauthorized
users; privacy is the individual’s right to control the collection and use
of personal information.
This is particularly of interest in the context of national security technology
innovations such as national ID and terrorism prevention measures (Michael and
Michael 2004). Security as a personal pursuit is being free from threat to personal
safety. The security in this instance is a perception or ‘feeling’ experienced by an
individual which means it is likely to be experienced differently for each person.
In terms of the preceding sections and Starner’s (2001) definition given above,
security needs to be considered as technology systems that create information are
developed. In relation to the auto-ID and location-based technologies focused on
in this work, the potential for privacy invasion to occur is high, which is why the
need to be aware of security implications is necessary.
A recurrent theme in technology implication discussions is the prospect of a
trade-off between privacy and security. Snow (2004, p.156) defines security as a
variable dependent on two issues: factors that threaten the things we value and our
interpretation of the environment. In this definition, it is clear that security, if placed
on a continuum, could have infinite variation depending on personal interpretations
of these factors.
4 National security and technology
4.1 National or homeland security
The specific notion of security in relation to protecting a country from threat
has been known variously as homeland security and national security.The concept
has been linked closely with military developments at points in time, and at others,
has referred to a much broader spectrum of protective initiatives designed to
Page 212
The Second Workshop on the Social Implications of National Security
ensure peace is maintained and the stability of government and society. ‘Homeland
security’ has been predominantly found in US-based literature following the
events of 11 September 2001. Since then the term has been gaining wider global
acceptance. National security is often used interchangeably with homeland security,
internal security, border management and counter terrorism (Relyea 2002). In the
literature, homeland security is often linked to terrorism. This limits the scope of
the discussion, which enables the introduction of the term national security to be a
more encompassing phrase to describe the current state of affairs. For the purposes of
this thesis national security encompasses the following categorisations as defined by
Kun (2004): intelligence gathering and warning; border and transportation security;
domestic counter-terrorism; protection of critical infrastructure; defending against
outside attacks; and emergency preparedness and response.
The rhetoric since September 11 has focused on the idea of the homeland
and the need for it to be protected and kept free from attack. The language of
government and media coverage has encouraged the development of the theme of
war on terror. This creates bias in the coverage of homeland awareness.
4.2 Sweeping changes in the name of national security
The recent focus on national security has renewed interest in technologies with
the potential to be used for security measures.A technology that has experienced this
refreshed approach is biometric imaging. Prior to September 11, it was discussed in
primarily defensive terms, as public interest focused on the more sinister potential
of the technology, and not the improved security potential it could offer. In the
immediate period following the attacks, airports announced urgent implementation
of scanning programs, and governments undertook expedited reviews of biometricsbased security systems.
The Defense Advanced Research Projects Agency has initiated a project
called Human ID at a Distance which aims to “develop biometric technologies…
that can be deployed to identify a known terrorist before he closes on his target”
(Alterman 2003). The US Department of Defense (DoD) is supporting research
into the application of biometrics, establishing the Biometrics Fusion Centre in
Bridgeport, West Virginia. The centre is to help evaluate, implement, and integrate
biometric technologies for DoD organisations. The US DoD has adopted a smart
card (with an embedded chip) as the standard method of identifying its employees
and controlling access to its sites. The DoD plans to add biometric information to
the card within the next year (Alterman 2003).
The ability of biometric systems to grant authorised users access to privileged
information and protected devices, while denying the same access to others, means
that they can assist with the protection of military facilities, airports, industrial plants,
offices, retail stores, personal residences, and recreational areas. Rood and Hornak
(2003) have questioned whether this form of identification and management of
person access would have prevented the events of September 11.
Page 213
The Second Workshop on the Social Implications of National Security
4.3 Legislative changes
The events of September 11 were a turning point for legislative changes.
Although the US, UK and Australia had counter terror measures in place, many
changes were made in the period since September 11 (Goldstone 2005; Northouse
2006). Some of the changes have met with much criticism from civil rights groups
as they are seen to stretch the limits of allowable actions.
The United States Congress passed the following Acts which enhanced the
reach of biometric identification of citizens and aliens: the PATRIOT Act – several
measures to improve the government’s ability to detect foreign threats operating in
the United States.Wire taps surveillance and subpoenas; the Aviation and Transport
Security Act and Enhanced Border Security and Visa Entry Reform Act
These were privy to an extraordinarily fast track through to becoming legislation
which was noted by many civil libertarians. This fast track came in the presence of
warnings prior to September 11 that the US Department of Defense did not have
concrete plans in place to address emerging threats (Michael and Masters 2006).
The change in this approach has had follow-on effects to other countries.
Australia and UK have border control law updates, and more dangerously, it is being
used as a ruse to justify other far greater repressive actions (Goldstone 2005, p.165).
The technology impact can be seen in the biometric passport system implemented
in Indonesia, considered to be the world’s most comprehensive and decentralised
(Poessl 2006); the implementation of BioPass in Singapore, which claims to have
enhanced security features to prevent tampering (Yeo 2006) and,Thailand has started
issuing citizens with a Java-based multi-application smart card, used primarily for
security purposes in the initial deployment (Bergman 2005).
5 Social implications of national security
5.1 Liberty
Liberty, as defined in the Oxford Dictionary of Philosophy, is of concern in
almost all constitutions. It associates the value of liberty with autonomy, and as
dependent upon the nature of the social context rather than on individual rights
(“liberty” 1996). Liberty is also understood as
…the right or power to do as one pleases …right, power, opportunity,
permission …freedom from control by fate or necessity …a right,
privilege, or immunity, enjoyed by prescription or grant …setting aside
of rules or convention (“liberty n.” 2004).
It is this list of expected freedoms that some fear is being threatened in the postSeptember 11 world. Increasing technology pervasiveness is a threat to being free,
or doing as one pleases. At extremes, it is taking away the power of choice. The
adoption of auto-ID and location-based technologies in a mandatory scheme will
challenge this definition of liberty.There is certainly a need to balance effective law
Page 214
The Second Workshop on the Social Implications of National Security
enforcement initiatives in the threat of terrorism, but commentators are pleading
for it to be done with respect for civil liberties (Goldstone 2005; Luban 2005;
Northouse 2006).
Liberty is inextricably bound together with the human rights movement which
is bringing privacy and security issues to the fore. From the research examined,
the concept of liberty encompasses the notion of civil liberties. Civil liberties,
although an essential part of our society, are often taken for granted where there
is no direct threat. Goldstone (2005, p.159) suggests that when society is free of
security threats, civil liberties are rarely in danger, but in times of war there is a real
danger of overreacting. His comments are particular to the United States in this
work, but hold true in a wider realm. Luban continues this theme, distinguishing
between times of danger and peace. He draws the concepts of security and liberty
together through an inevitable trade-off.
…and the only important question then becomes where to draw the
line. How much liberty should be sacrificed in the name of security
(Luban 2005, p.242).
5.2 Paying a price
Throughout the research on existing studies, there is a consistent theme of
citizens needing to waive certain liberties or have reduced access to services in
order for national security initiatives to be fully implemented. This is particularly
noticeable in the privacy-based studies. The concept of this can be summarised
as the figurative price that the average citizen is ‘paying’ for this increased level of
national security.
However, the concept goes back much earlier and in consideration of many
more issues than the rapid advancement of technologies. Over time, identifying the
price that is being paid for advancement is a difficult task, and it is harder still to
measure.Winner frames this observation in terms of consumer product developments
and makes the comment that:
They have gotten used to having the benefits of technological
conveniences without expecting to pay the costs. Of course, if anyone
had bothered to notice, it should have been obvious that a price for
“progress” was being paid all along. It was often a very subtle price, a
barely recognizable price, but a real one nevertheless (Winner 1986,
p.171).
In Winner’s research it is suggested that when people want something to happen,
they will find ways to justify the costs that need to be paid. It seems inevitable in
this model that it is only when the changes occurring through the payment of
costs have gone too far that people are able to step back to look objectively at the
impact those decisions have had on their life.The pervasive impact of technologies
on daily life is questioned only when certain boundaries are challenged. Winner
(1986, p.50) proposes the following issues as costs that are significant enough to
Page 215
The Second Workshop on the Social Implications of National Security
consider limiting the use or development of a technology:
• Itsapplicationthreatenspublichealthorsafety;
• Itsusethreatenstoexhaustsomevitalresource;
• Itdegradesthequalityoftheenvironment(air,land,andwater);
• Itthreatensnaturalspeciesandwildernessareasthatoughttobepreserved;
• Itsapplicationcausessocialstressesandstrainsofanexaggeratedkind.
Ng-Kruelle et al. (2002) established the concept of ‘Price of Convenience’ as a
means for understanding what a consumer is willing to give up of their privacy in
order to gain a factor of convenience.This study examined the use of mobile devices.
This research has established a direction in technology studies to look beyond the
benefits of the tool itself and instead evaluate the impact it can have on the end user.
Ng-Kruelle et al. (2002, p.4) discuss the concept of the “price” in the context of
mobile commerce applications and the consumer. The phrase under consideration
here is the ‘Price of Convenience’:
At an individual level, any potential “consumer” must always balance
costs (giving up for personal information such as location and driving
speed) against benefits (such as navigation support).
Technological determinism holds that technology has the ability to shape our
lives. Perusco et al. (2006) put forward that the social setting in which the technology
emerges is as important as the technology itself. Winner (1986, p.51) believes this
position can be countered when there is a clear form and limits on the idea of
what a society should be. In terms of lifeworld, there is a linking of technology
acceptance and shaping of social evolution. A society wishing to structure and
direct its forward progress must be aware of the implications of technology in terms
of costs and benefits. Without this knowledge, there is the presupposed position
of the technology driving social change and not vice versa. Winner (1986, p.68)
quotes Marcuse for the joining of the concept of freedom to technical progress of
the advancement of science. The position he takes is that at present, the structures
around the development of technology are not supportive of inclusion of lifeworld
response.They are rarely designed as technologies of liberation. Michael and Michael
pose the same question of balance in terms of the attempt to make the world safer
through the use of surveillance cameras and the equipping of children with tracking
devices. The consideration here again is whether privacy and freedom are being
sacrificed, but they note that:
…more and more people are willing to pay this price as heinous crimes
become common events in a society that should know better (Michael
and Michael 2004, p.441).
This society is being shaped through many influences particularly in this era of ‘real
and present danger’ of terrorism and biological, nuclear, chemical and radiological
threat.The plea in the article is that these and other implications should be considered
Page 216
The Second Workshop on the Social Implications of National Security
in the development stages of technology innovation, not after they are already in
place, unable to be changed easily.
Louie and Eckhartsberg (2006, p.70) dispute that a trade-off takes place or
even needs to take place. Using the example of data mining they suggest that there
are at least five choices that can be made during the process that make a trade-off
unnecessary. The weakness here is that these choices rely on individual reasoning
looking beyond the self, to the wider implications.Voluntary codes of practice are
put forward as an example where this level of decision making has failed, and their
fear is that the same will happen in the context of data mining and invasion of
liberties.
Westin (2006, p.19) proposes two models from which governments and the wider
public are operating (see Table 5).
Table 5: Westin’s Security-First and Liberty-First Models
Security First Position
Liberty First Position
If we do not modify some of our If we reduce our liberties by granting the
traditional constitutional norms limiting government sweeping and uncontrolled
government powers, we will not be investigative and surveillance powers, we
able to fight terrorism, function as a will weaken the constitutional system
reasonably safe society and enjoy our that has made our nation great.
liberties.
Westin (2006, p.20) believes there are five factors shaping public views in regard
to the security versus liberty dichotomy: perceptions of the current terrorist threat
and the likelihood of further attacks; perceptions of how well the government is
dealing with the threats thus far and the methods being used; perceptions of how
government antiterrorist programs are affecting valued civil liberties; underlying
orientations toward general security and liberty issues; and basic orientations on
political issues in general – which may be shaped by political philosophy, party
identification, and demographic factors.
Luban (2005) builds from this consideration framework to personalise the issue
more strongly. He strongly supports the notion that a trade-off is taking place and
asks what “you” are willing to sacrifice in order to have “minute increments in
security”. Luban believes that if the trade-off question is always asked in terms of
personal rights, answers may be significantly different to when the questions remain
a vague societal generality. He challenges the use of September 11 as the measuring
stick by which trade-off questions should be asked:
…we would be willing to sacrifice a lot of liberty to prevent September
11…what sacrifice of our rights would we be willing to undergo to
reduce the already-small probability of another September 11 by a factor
of, say, one in ten? (Luban 2005, p.243).
Northhouse (2006, p.5) and Wran (2006) support these notions, prompting us to
consider the role of technology in understanding the trade-off concerns, and also
Page 217
The Second Workshop on the Social Implications of National Security
recognising the impact and increasing pervasiveness of government in control of
personal information.
6
Conclusion
It was stated at the beginning of this paper that location-based services and
auto-ID technologies were being used for national security purposes and that their
use has a social impact. By examining the technologies currently being used in the
area, and also technologies being proposed for national security applications, it was
shown that much of the research is happening in technology silos. There is scant
research drawing together the technologies in order to understand the impact they
have when used collectively for national security purposes.
This paper also established an understanding of the social dimensions of the
technology which can sometimes be regarded as consequences of its use.The impact
of these technologies on privacy is often discussed from a negative perspective.
Although the concepts of privacy, security and liberty intersect to a degree, their
interplay with regard to technology use in for national security purposes has been
skewed toward the impact of terrorism. The literature on privacy and technology
is dominated by works that focus on a threatening impact. This is contrasted with
the security literature which proposes technology to be a fix for security concerns.
The concept of liberty is manifold, and in the context of technology and national
security is seemingly an emotional and tending toward biased patriotism and it seems
that a choice must be made: security before liberty, or liberty before security.
The unguarded acceptance of technology as we move through various phases
toward an information society, is a trend that has been inevitable, and yet still sinister.
We have reached a point in the development of technologies where it is prudent to
sit back and look at the potential impacts of what we are designing.Technology for
the sake of technology no longer holds importance for the emerging generation.
The integration of automatic-identification with location-aware technology has
significant benefits for the national security area. Promotion of a technology without
consent from the population may be understandable necessity in times of crisis, but
the cloak of national security and the associated imminent danger is wearing thin.
Technology alone will not prevent terrorist attacks. What it will do is assist society
in managing these events when they do happen. Requiring society to remain on
elevated levels of alert, or to be ‘alert but not alarmed’, propagates fear and insecurity.
This serves a purpose if the theatre of security can be boosted by the adoption
of a technology, however, without democratic debate; this method of technology
adoption does little to liberate populations (Brzezinski 2004, p.243).
References
Acharya, A. 2002, ‘State-Society Relations: Reordering Asia and the World After
September 11’, in K. Booth and T. Dunne (eds), World in Collision:Terror and
the Future of Global Order, Palgrave, London.
Page 218
The Second Workshop on the Social Implications of National Security
Albrecht, K. & McIntyre, L. 2005, Spychips: how major corporations and government
plan to track your every move with RFID, Nelson Current, Nashville.
Alippi, C. & Vanini, G. 2004, ‘A genetic-based application oriented approach to
optimize RFID-like passive sensor devices for homeland security’, in IEEE
International Conference on Computational Intelligence for Homeland Security and
Personal Safety,Venice, Italy, 21-22 July 2004
Alterman, A. 2003, ‘’A piece of yourself ’: Ethical issues in biometric
identification’, Ethics and Information Technology, vol.5, no.3, p.139.
Ames, R. 1990a, ‘Opportunities and Challenges’, in R. Ames (ed.), Perspectives on
Radio Frequency Identification: what is it, where is it going, should I be involved?,
Van Nostrand Reinhold, New York, pp.6.1-6.11.
Ames, R. 1990b, ‘RF Prophecy’, in R. Ames (ed.), Perspectives on Radio Frequency
Identification: what is it, where is it going, should I be involved?,Van Nostrand
Reinhold, New York, pp.5.2-5.6.
Ames, R. 1990c, ‘RF/ID systems’, in R. Ames (ed.), Perspectives on Radio Frequency
Identification: what is it, where is it going, should I be involved?,Van Nostrand
Reinhold, New York, pp.3.1-3.9.
Angell, I. & Kietzmann, J. 2006, ‘RFID and the end of cash?’ Communications of
the ACM, vol.49, no.12, pp.91-96.
Antonioni, M. (1966). Blowup.
Ashbourn, J. 1994, ‘Emerging technology for security and control’, Sensor Review,
vol.14, no.4, p.3.
Atkinson, W. 2004, ‘Tagged: the risks and rewards of RFID technology’, Risk
Management, vol.51, no.7, p.12.
Barr, T. 1994, ‘Australia’s information society: clever enough?’ in R. Guinery and
L. Green (eds), Framing technology : society, choice and change, Allen & Unwin, St
Leonards.
Bennett, C.J. 1996, ‘The public surveillance of personal data: a cross-national
analysis’, in D. Lyon and E. Zureik (eds), Computers, Surveillance and Privacy,
University of Minnesota Press, Minneapolis.
Bergman, C. 2005, ‘Thai smart ID card ready to roll’, Biometric Technology Today,
vol.13, no.5, pp.1-2.
Borriello, G. 2005, ‘RFID: Tagging the world’, Communications of the ACM, vol.48,
no.9, pp.34-37.
Branscomb, A.W. 1994, Who owns information?: from privacy to public access,
BasicBooks, New York.
Brzezinski, M. 2004, Fortress America: On the Front Lines of Homeland Security, An
Inside Look at the Coming Surveillance State, Bantam Books, New York.
Chabrow, E. 2005, ‘Homeland security to test RFID tags at U.S. borders’,
InformationWeek.
Chandra, A. & Calderon, T. 2005, ‘Challenges and constraints to the diffusion
of biometrics in information systems’, Communications of the ACM, vol.48,
Page 219
The Second Workshop on the Social Implications of National Security
no.12, pp.101-106.
Chaum, D. 2000, Smartcard 2000, Elsevier Science Publishers, Amsterdam.
Chirillo, J. & Scott, B. 2003, Implementing Biometric Security, Wiley Publishing Inc.,
Indianapolis, Indiana.
Clarke, R. 1988, ‘Information technology and dataveillance’, Communications of
the ACM, vol.31, no.5, pp.498-512.
Clarke, R. 1997, Introduction to dataveillance and information privacy, and definitions of
terms, accessed 2 June 2006, http://www.anu.edu.au/people/Roger.Clarke/
DV/Intro
Cohen, J. 1994, Automatic Identification and Data Collection Systems, McGraw-Hill,
London.
Coppola, F.F. (1974). The Conversation.
Davies, S. 1996, Monitor, Pan, Sydney, NSW.
Davies, S. 1998, ‘Biometrics: A Civil Liberties and Privacy Perspective ‘,
Information Security Technical Report, vol.3, no.1, pp.90-94.
Day, K. (1985). Perspectives on Privacy: a Sociological Analysis. Edinburgh,
University of Edinburgh.
De Niro, R. (2006). The Good Shepherd.
Eckfeldt, B. 2005, ‘What does RFID do for the consumer?’ Communications of the
ACM, vol.48, no.9, pp.77-79.
El-Rabbany, A. 2002, Introduction to GPS: the global positioning system, Artech
House, Inc., Boston.
Elliot, M. 2003, ‘They had me at Prada’, Industrial Engineer, vol.35, no.11, p.6.
Ellul, J. 1965, The Technological Society, Johnathan Cape, London.
ESRI. 2007, Case Studies, accessed 2 June 2007, http://www.esri.com/showcase/
case-studies/index.html
Fincher, D. (2002). Panic Room.
Flaherty, D.H. 1989, Protecting privacy in surveillance societies : the Federal Republic of
Germany, Sweden, France, Canada, and the United States, University of North
Carolina Press, Chapel Hill.
Floerkemeier, C. & Lampe, M. 2004, ‘Issues with RFID usage in ubiquitous
computing applications’, Pervasive Computing, Springer Berlin / Heidelberg,
pp.188-193.
Friedrick, J. 2003, ‘Homeland Security initiatives should boost the GPS market’,
Security Systems News, vol.6, no.4, p.51.
Gandy, O.H.J. 1993, The Panoptic Sort: A political economy of personal information,
Westview Press, Boulder, Colorado.
Garfinkel, S.L. 2000, Database nation : the death of privacy in the 21st century,
O’Reilly, Beijing.
Garfinkel, S.L., Juels, A. & Pappu, R. 2005, ‘RFID privacy: an overview of
problems and proposed solutions’, IEEE Security & Privacy Magazine,, vol.3,
no.3, pp.34-43.
Page 220
The Second Workshop on the Social Implications of National Security
Getting, I.A. 1993, ‘Perspective/navigation-The Global Positioning System’,
IEEE Spectrum, vol.30, no.12, pp.36-38, 43-47.
Goldstone, R. 2005, ‘The tension between combating terrorism and protecting
civil liberties’, in R. Wilson (ed.), Human Rights in the War on Terror,
Cambridge University Press, Cambridge, pp.157-168.
Gotleib, C.C. & Borodin, A. 1973, Social issues in computing, Academic Press, New
York.
Gunther, O. & Spiekermann, S. 2005, ‘RFID and the perception of control: the
consumer’s view’, Communications of the ACM, vol.48, no.9, pp.73-76.
Haneke, M. (2005). Cache.
Harris, A.J. & Yen, D.C. 2002, ‘Biometric authentication: assuring access to
information’, Information Management & Computer Security, vol.10, no.1, p.12.
Hitchcock, A. (1954). Rear Window.
Howitt, P. (2001). Antitrust.
Hsi, S. & Fait, H. 2005, ‘RFID enhances visitors’ museum experience at the
Exploratorium’, Communications of the ACM, vol.48, no.9, pp.60-65.
IIE Solutions 2002, ‘Florida airport gets first RFID system’, IEE Solutions, vol.34,
no.7, p.14.
Jain, A., Hong, L. & Pankanti, S. 2000, ‘Biometric Identification’, Communications
of the ACM, vol.43, no.2, p.90.
Jayakumar, S. & Senthilkumar, C. 2005, ‘Biometric fingerprints based radio
frequency identification’, in P. Kantor, G. Muresan, F. Roberts, D. D. Zeng,
Fei-YueWang, H. Chen and R. C. Merkle (eds), Intelligence and Security
Informatics, Springer-Verlag Berlin Heidelberg, pp.666-668.
Johnson, M.L. 2004, ‘Biometrics and the Threat to Civil Liberties’, Computer,
vol.37, no.4, pp.90-92.
Jones, P., Clarke-Hill, C., Hillier, D., Shears, P. & Comfort, D. 2004, ‘Radio
Frequency Identification in retailing and privacy and public policy issues’,
Management Research News, vol.27, no.8/9, p.46.
Juels, A. 2006, ‘RFID security and privacy: a research survey’, IEEE Journal on
Selected Areas in Communications, vol.24, no.2, pp.381-394.
Kelly, E.P. & Erickson, G.S. 2005, ‘RFID tags: commercial applications v. privacy
rights’, Industrial Management + Data Systems, vol.105, no.5/6, p.703.
Kim, H.-J. 1995, ‘Biometrics, is it a viable proposition for identity authentication
and access control?’ Computers & Security, vol.14, no.3, p.205.
Kinsella, B. 2003, ‘The Wal-Mart factor’, Industrial Engineer, vol.35, no.11, p.32.
Kun, L. 2004, ‘Technology and policy review for homeland security’, IEEE
Engineering in Medicine and Biology Magazine, vol.23, no.1, pp.30-44.
Langford, D. (ed.) 2000, Internet ethics, Macmillan, Basingstoke.
Legner, C. & Thiesse, F. 2006, ‘RFID-based maintenance at Frankfurt airport’,
IEEE Pervasive Computing, vol.5, no.1, pp.34-39.
“liberty n.” (2004). The Australian Oxford Dictionary. B. Moore. Oxford, Oxford
Page 221
The Second Workshop on the Social Implications of National Security
University Press.
“liberty” (1996). The Oxford Dictionary of Philosophy. S. Blackburn. Oxford,
Oxford University Press.
Louie, G. & von Eckhartsberg, G. 2006, ‘Security and liberty: how technology can
bridge the divide’, in C. Northouse (ed.), Protecting What Matters: technology,
security, and liberty since September 11, Brookings Institute Press, Washington
D.C., pp.63-73.
LSE (2005). The Identity Project: An assessment of the UK Identity Cards Bill &
its Implications. London, London School of Economics and Political Science.
Luban, D. 2005, ‘Eight fallacies about liberty and security’, in R. Wilson (ed.),
Human rights in the War on Terror, Cambridge University Press, Cambridge,
pp.242-257.
Lynch, D. (1997). Lost Highway.
Lyon, D. 2002, ‘Surveillance in cyberspace: the Internet, personal data, and social
control’, Queen’s Quarterly, vol.109, no.3, pp.345-357.
Mann, M. (2004). Collateral.
McLean, D. 1995, The Difficulty of Privacy as an Idea. Privacy and its Invasion,
Praeger Publishers, Westport.
Michael, K. & Masters, A. 2006, ‘Realized applications of positioning
technologies in defense intelligence’, in H. Abbass and D. Essam (eds),
Applications of Information Systems to Homeland Security and Defense, Idea
Group Publishing, Hershey, pp.196-220.
Michael, K., McNamee, A., Michael, M.G. & Tootell, H. 2006a, ‘Location-Based
Intelligence – Modeling Behavior in Humans using GPS’, in Proceedings
of the International Symposium on Technology and Society, New York, IEEE
Computer Society, 8-11 June 2006a
Michael, K. & Michael, M.G. 2004. ‘The social, cultural, religious and ethical
implications of automatic identification.’ Proceedings of the Seventh International
Conference in Electronic Commerce Research, Dallas, Texas.
Michael, K. & Michael, M.G. 2006a, ‘The proliferation of identification
techniques for citizens throughout the ages’, in K. Michael and M. G.
Michael (eds), First Workshop on the Social Implications of National Security,
University of Wollongong, Wollongong, pp.7-26.
Michael, K., Michael, M.G., Tootell, H. & Baker,V. 2006b, ‘The hybridization of
automatic identification techniques in mass market applications: towards a
model of coexistence’, in Third International Conference on Management and
Innovation, Singapore, IEEE Computer Society, 21-23 June 2006b
Michael, M.G. & Michael, K. 2006b, ‘National Security: The Social Implications
of the Politics of Transparency’, Prometheus, vol.24, no.4, pp.359 - 363.
Nath, B., Reynolds, F. & Want, R. 2006, ‘RFID Technology and Applications’,
IEEE Pervasive Computing, vol.5, no.1, pp.22-24.
Ng-Kruelle, G. & Swatman, P. 2002, ‘The price of convenience: privacy and
Page 222
The Second Workshop on the Social Implications of National Security
mobile commerce’, Quarterly Journal of Electronic Commerce, vol.3, no.3,
pp.273-285.
Niccol, A. 1997, ‘Gattaca’.
Northouse, C. (ed.) 2006, Protecting What Matters: technology, security, and liberty since
September 11, Brookings Institute Press, Washington D.C.
Oderwald, R.G. & Boucher, B.A. 1997, Where in the World and What? An
Introduction to Global Positioning Systems, Kendall Hunt Publishing Company,
Dubuque.
OFPC (2006). Information Technology and Internet Issues. Office of the Federal
Privacy Commissioner.
Ohkubo, M., Suzuki, K. & Kinoshita, S. 2005, ‘RFID privacy issues and technical
challenges’, Communications of the ACM, vol.48, no.9, pp.66-71.
Orwell, G. 1949, Nineteen eighty-four: a novel, Secker and Warburg, London.
Peckinpah, S. (1983). The Osterman Weekend.
Perusco, L., Michael, K. & Michael, M.G. 2006, ‘Location-based services and
the privacy-security dichotomy’, in Third International Conference on Mobile
Computing and Ubiquitous Networking, London, 11-13 October 2006
Petersen, J. 2001, Understanding surveillance technologies: spy devices, their origins &
applications, CRC Press, New York.
Poessl, S. 2006, Indonesian Government unveils the World’s most comprehensive,
decentralized, biometric Passport Project, delivered by Digital Identification Solutions
accessed 4 August 2007, http://www.findbiometrics.com/press-release/3440
Rankl, W. & Effing, W. 2000, Smart Card Handbook, John Wiley, Chichester,
England.
Relyea, H.C. 2002, ‘Homeland security and information’, Government Information
Quarterly, vol.19, no.3, pp.213-223.
Robinson, P.A. (1992). Sneakers.
Rood, E.P. & Hornak, L.A. 2003, ‘Are you who you say you are?’ The World & I,
vol.18, no.8, p.142.
Rule, J., McAdan, D., Stearns, L. & Uglow, D. 1980, The Politics of Privacy, Elsevier
Science Publishers, New York.
Scheeres, J. 2005, ‘When your mole betrays you’, Wired News, no.19 September.
Schoeman, C. 1992, Privacy and Social Freedom, Cambridge University Press, New
York.
Scorsese, M. (2006). The Departed.
Scott, T. (1998). Enemy of the State USA.
Smith, L. 2005, ‘RFID Report’, The Humanist, vol.65, no.3, p.37.
Snow, D. 2004, National Security for a New Era: Globalization and Geopolitics,
Pearson Education, Inc., New York.
Spielberg, S. (2002). Minority Report.
Srivastava, L. 2007, ‘Radio frequency identification: ubiquity for humanity’, info,
vol.9, no.1, pp.4-14.
Page 223
The Second Workshop on the Social Implications of National Security
Starner, T. 2001, ‘The challenges of wearable computing: Part 2’, IEEE Micro,
vol.21, no.4, pp.54-67.
Swartz, N. 2004, ‘Tagging toothpaste and toddler’, Information Management Journal,
vol.38, no.5, p.22.
The Royal Academy of Engineering (2004) “Response to the House of
Commons Transport Select Committee: Inquire into Galileo.” September
2004, accessed 4 August 2007, http://www.raeng.co.uk/news/publications/
list/responses/galileo.PDF
van der Ploeg, I. 1999, ‘The illegal body: ‘Eurodac’ and the politics of biometric
identification’, Ethics and Information Technology, vol.1, no.4, pp.295-302.
Want, R. 2004, ‘Enabling ubiquitous sensing with RFID’, IEEE Computer, vol.37,
no.4, pp.84-86.
Warren, S.D. & Brandeis, L.D. 1890, ‘The right to privacy’, Harvard Law Review,
vol.4, no.5, p.193.
Washington, D. (2006). Deja Vu.
Weir, P. (1998). The Truman Show.
Wenders, W. (1997). The End of Violence.
Westin, A.F. 1967, Privacy and Freedom, Atheneum, New York.
Westin, A.F. 2006, ‘How the public sees the security-versus-liberty debate’, in C.
Northouse (ed.), Protecting What Matters:Technology, Security, and Liberty since
September 11, Brookings Institute Press, Washington D.C., pp.19-38.
Wigan, M. & Clarke, R. 2006, ‘Social Impacts of Transport Surveillance’, in K.
Michael and M. G. Michael (eds), First Workshop on the Social Implications of
National Security, University of Wollongong, Wollongong, pp.27-44.
Winner, L. 1986, The whale and the reactor: a search for limits in an age of high
technology University of Chicago Press, Chicago.
Woodward Jr, J. 1997, ‘Biometrics: privacy’s foe or privacy’s friend?’ Proceedings of
the IEEE, vol.85, no.9, pp.1480-1492.
Woodward Jr, J. (2001) “Biometrics: facing up to terrorism.” RAND Issue Paper,
accessed 2 February 2006, http://www.rand.org/pubs/issue_papers/IP218/
Wran, N. 2006, Civil liberties: an endangered species, accessed 1 March 2007, http://
lionelmurphy.anu.edu.au
Yeo,V. 2006, S’pore unveils new biometric passport, accessed 4 August 2007, http://
www.zdnetasia.com/news/security/0,39044215,39346963,00.htm
Zoreda, J.L. & Oton, J.M. 1994, Smart cards, Artech House, Inc., Massachusetts.
Page 224
The Second Workshop on the Social Implications of National Security
16
Privacy implications of automated
GPS tracking and profiling
Muhammad Usman Iqbal1 and Samsung Lim2
PhD Candidate, 2Senior Lecturer, School of Surveying and Spatial Information Systems,
University of New South Wales
1
Abstract
Recent advancements in GPS technology have opened new avenues for its use in the
automotive sector. While GPS is a self-positioning system and does not threaten ‘locational
privacy’, its availability in telematics systems enables various privacy abuses both in realtime and retrospect. GPS devices are being used for surreptitious monitoring, for providing
alibis and more recently, by the government to access telematics-generated GPS data
for complementing their mass surveillance projects. While researchers have presented
theoretical studies of privacy abuses and their countermeasures, limited research has been
conducted to assess these threats in a real-life scenario involving data obtained from people.
This paper aims to raise awareness about privacy issues created as a result of GPS-based
surveillance by conducting an experiment involving collecting positional data from a number
of volunteers. A software protocol is implemented which takes this GPS data as input and
produces profiles of road behaviour, social activities and work activities of the volunteers.
Interviews are conducted with the volunteers to assess the accuracy of this profiling. Results
suggest that while these profiles can be highly predictive of personality traits, they may
also be misleading due to technical limitations and inaccuracies. Positional data is highly
detailed and it is important to negotiate the function, storage and use of such data so that
future telematics systems do not impinge upon privacy rights of motorists.
Keywords: surveillance, location privacy, data-mining, threats, GPS, ethics, profiling,
location tracking
Page 225
The Second Workshop on the Social Implications of National Security
1
Introduction
The automobile has gradually evolved from an analogue machine with mostly
mechanical and hydraulic components to an electronic system with a growing
number of computer-based systems.Within the realms of this ‘smart car’ revolution,
GPS vehicle navigation has attracted significant attention from consumers. It
is generally accepted that the automotive industry would be one of the largest
consumers of GPS technology. There are efforts already underway to use this
infrastructure for additional value added services, for instance, mobility-pricing of
insurance (Tripsense 2007; Norwich Union 2007), infrastructure-less electronic toll
collection and GPS-enabled parking fee collection (Grush 2005).
These applications would require disclosure of positional data by its users in
real-time through a communications infrastructure. These systems would process
the positional data to charge the motorist for the services rendered. A decrease in
the cost of electronic storage means that this captured data intended for a specific
purpose, originally transaction processing, may be retained indefinitely or at least
for long periods of time. Since GPS data is information rich, the temptation to use
it for secondary purposes may be too great to resist.
While theoretical research has aimed to raise awareness about these threats
and proposed algorithms to protect the privacy of individuals in location contexts
(Gruteser & Grunwald 2003; Duckham & Kulik 2005), limited research has been
conducted to assess these threats in a real-life scenario involving data obtained
from people. This paper aims to raise awareness about privacy issues created as a
result of GPS-based surveillance by conducting an experiment involving collecting
positional data from a number of volunteers. A software protocol is implemented
which takes this GPS data as input and generates a range of personal information
about the individual including their home addresses, social and work activities.The
next section explores pertinent issues in the ethics of GPS and society, followed by
a detailed explanation of the research study.
2
Background
2.1 GPS alibi and GPS-enabled surveillance
There have been instances where motorists have successfully challenged
issuance of speed tickets against them by providing their GPS data as evidence.
These cases have set a legal precedent to question the accuracy of hand-held radar
guns (Wainright 2007). Even navigation equipment manufacturers are taking this
opportunity to market their products as potential ‘alibis’.
In other instances, legal precedents have also been set where the surreptitious
installation and monitoring of GPS tracking devices does not require court orders
(McCullagh 2005).The court ruled that the motorist has no expectation of privacy
on a public roadway and it was legitimate for the police to perform surveillance of
the vehicle without requiring a warrant.While warrants are not hard to acquire, they
Page 226
The Second Workshop on the Social Implications of National Security
offer some judicial oversight where law enforcement personnel have to contact a
neutral magistrate or judge and justify their suspicions when engaging in the tactic
of surveillance, preventing abuse of the system.
Yet again, manufacturers are cashing in on the opportunity by advertising their
tracking devices for covert surveillance operations, e.g. for curious spouses and
employers. As shown in figure 1, some manufacturers even explain graphically how
to covertly install these devices (TrackStick Pro 2007). These ethical issues require
the attention of researchers and policy-makers to provide rigorous ethical safeguards
on GPS tracking procedures.
Additionally, whether used as an alibi, or to convict somebody of a crime, GPS
data is not suitable in its current form as evidence (Michael, McNamee & Michael
2006). The reason is that GPS devices lack any cryptographic protection for the
tracks, routes and waypoints stored on its memory, and a compatible software tool can
be easily used to edit the positional data. Unless there are cryptographic techniques
present to digitally sign the contents for non-repudiation, innocent people can be
framed and convicted, and traffic offenders would escape paying for fines.
Figure 1: Covert installation of GPS tracking device
2.2 Mobility-pricing and überveillance
Mobility-pricing of insurance is a new approach that employs location technology
allowing for the customisation of insurance premiums to more accurately reflect the
risks based on actual vehicle usage. This would reduce the cross-financing of high
risk drivers by low risk ones and increase fairness of insurance systems. There have
been successful pilot studies conducted throughout the world that use GPS and
telematics technology to offer actuarially accurate insurance products (Tripsense
2007; Norwich Union 2007). In the Australian context, a recent statement by an
NRMA (National Roads and Motorists’ Association) Insurance official lauded the
benefits that GPS-based insurance would offer to motorists but also acknowledged
the inherent “Big-Brother-ish” qualities that such a product would bring about
Page 227
The Second Workshop on the Social Implications of National Security
(NRMA 2007).
GPS logs are a form of data, and its monitoring would fall within the realms of
informational surveillance. “Dataveillance”, a term coined by Clarke (1988) refers
to the use of personal data in monitoring actions of communications of individuals.
M.G. Michael’s work gives rise to the emerging notion of “überveillance”, an above
and beyond almost omnipresent surveillance system (Michael et al. 2006). It is possible
that mobility-based insurance would conveniently enable this pervasive surveillance
and potentially have a chilling effect to the privacy rights of motorists.These issues
would be further aggravated by the government’s interest in acquiring this data from
insurance providers by offering them incentives.There is already speculation about
this practice in the UK where an insurance company that offers mobility-pricing has
been contacted by the government for data access for its own congestion charging
scheme (Hytch 2007) in exchange for certain benefits.These developments, however,
have not gone unnoticed by privacy researchers. Coroama and Langheinrich (2006)
implemented a GPS based insurance system which calculates premiums on-board the
vehicle guaranteeing privacy of owners. In this system, there is periodic transmission
of aggregated information to the insurance provider for bill generation. Iqbal and
Lim (2006) extended this idea further and proposed a GPS-based insurance product
that preserves location privacy by computing distances travelled on the on-board
unit and additionally safeguarded “spend privacy” by proposing smart card based
anonymous payment systems.
2.3 Privacy in public
As mentioned in section 2.1, public surveillance has become a part of a modern
citizen’s life. The ubiquitous presence of surveillance cameras, speed cameras and
electronic toll collection booths digitises and stores the movement of motorists on
various databases. Motorists relinquish the right to privacy to obtain the privilege
of using the road networks. That is why ‘Privacy in public’ is a difficult concept to
grasp. Past research and legislation has focused on the old adage, ‘A man’s home is
his castle’, and has aimed to characterise privacy as a notion to protect an individual’s
right in their homes against unreasonable searches and seizures (Krull, 1999). Not
much attention has been given to the notion of ‘location privacy’. However, with
emerging technologies that depend on GPS for their data processing, it is vital that
adequate attention is paid to building a theory of privacy in public by drawing from
existing legal frameworks and philosophical contexts.
Nissenbaum (2004) proposes the theory of ‘contextual integrity’ to tackle the
complex issue of privacy in public. This theory is built around the notion that all
realms of life are governed by norms of appropriateness and norms of distribution.
Norms of appropriateness distinguish between intimate information that is
appropriate to disclose and information that is inappropriate. Likewise, norms of
distribution govern how personal information about somebody is shared with others.
While norms of appropriateness would allow one to discuss relationship problems
Page 228
The Second Workshop on the Social Implications of National Security
with a close friend, the close friend would be violating the norms of distribution if
s/he discloses this information to a third party. Contextual integrity is maintained
when both the norms of appropriateness and norms of distribution are respected.
3
Research Motivation
3.1 Related Work
Location is an important aspect of context in pervasive computing, and has
attracted considerable attention from researchers to extract “significant locations”
from positional data. Signification locations may be the residential address, places
of interest for an individual including preferred shopping centres or restaurants.
Ashbrook and Starner (2003) used GPS data from a single volunteer collected over
a four month period and used it to derive the locational context of a user. They
developed an algorithm which extracted significant locations from the GPS data and
used it to design an intelligent predictive model of the user’s future movements.
Krumm developed a similar protocol and tested it to identify the home location
and infer identities of the volunteers. He collected the data from 172 individuals and
used a reverse geo-coder to infer home locations of roughly 5% of the participants
correctly. He then applied the theoretical countermeasures already present in location
privacy research, such as spatial cloaking (Gruteser & Grunwald 2003), noise and
rounding (Agrawal & SriKant 2000) on the GPS data and tested their effectiveness
by quantifying how well these algorithms prevented the inference algorithms from
finding the subjects’ home addresses.
Michael et al. (2006) used a combination of GPS receiver data and diary logs
of a volunteer over a period of two weeks to seek an understanding of the social
implications of tracking and monitoring subjects.Their research identifies the ethical
dilemmas associated with use of GPS on civilians and points out that adequate
safeguards need to be placed to avoid abuse of information gathered through GPS
technology.
In terms of driving behaviour, Greaves and De Gruyter (2002) discuss how a
driving profile of a person can be derived from GPS track data. They sought an
understanding of driving behaviours in real world scenarios by fitting low-cost GPS
receivers to vehicles, and logging the vehicle movements. Consequently they were
able to identify driving styles from this data.
3.2 Motivation
Previous sections have set the theoretical stage for conducting a privacy assessment
of GPS tracking.This paper is one of the first efforts to collect and analyse location
data from multiple volunteers and generate automated profiles without human
intervention. This motivation comes from the fact that it would be cumbersome
to analyse GPS data of a large number of individuals on a manual basis.
The attack model simulates a typical adversary’s three main moves. The first
Page 229
The Second Workshop on the Social Implications of National Security
step is information collection using passive surveillance. This step is followed by
information processing by using data-mining, pattern recognition, and reverse
geo-coding of significant locations. Finally in the third step, the adversary performs
information dissemination by creating summary profiles.
4
Research study
4.1 Surveillance
In order to mimic truly surreptitious surveillance, a GPS tracking device was
required that worked without any input and intervention from the users. The
selection process led to choosing a passive GPS device known as the Trackstick Pro
as shown in figure 2. This GPS stick uses power from the cigarette lighter in the
car and has a memory of 4 megabytes, which is suitable for storing the track data
for up to a period of one month.
Figure 2:
Figure 3:
The GPS device used
Installed and operational
A total of five volunteers were selected for this study. The sample consisted of
an undergraduate student, a research student, an academic staff member, and two
support staff from the school. Before the study began it was hypothesized that
different types of people would have different patterns, so a sample space was drawn
that represented the different communities at the university. As shown in figure 3,
volunteers were shown how to attach the GPS stick to their vehicle’s dashboard
using double sided tape and the cigarette lighter plug in the cigarette lighter jack.
The GPS device had to be placed such that the globe would face up, as shown in
figures 2, and 3. The volunteers were advised not to remove the stick or the power
source for the period of study. At least one week’s worth of data was collected from
all the volunteers.The sticks were circulated and collected on Wednesdays to include
both weekend and weekday driving. It was expected that the passive nature of the
device would yield data closest to the actual driving attitude of the volunteers and
would not result in behaviour modification on their part.
The GPS device was configured to be used in a vehicle through the software
drivers present on the PC (Personal Computer). On the average it logged location,
Page 230
The Second Workshop on the Social Implications of National Security
time, date, speed, elevation and temperature data at a rate of 6 times per minute.
Although the desired logging rate would have been on a per second basis, the
TrackStick is not capable of logging at such a high rate. Ultimately, this option was
chosen as a trade-off between granularity and convenience for the volunteers. On
completion of the specified period, the GPS data was downloaded to the PC and
stored anonymously without identifying the volunteer in any way.
4.2 Information Processing and dissemination
4.2.1 Home and work location identification
The first step in the analysis is to identify significant locations from the data. As
shown in figure 4, the GPS device logs the status as “Power Off ” when the ignition
of the vehicle is switched off. The data row prior to this event (marked with a red
circle) has a significant location since this is the last known position before the
vehicle stopped. Note that the speed for the record is not zero as the tracking device
roughly logs around 6 times per minute.This means that the actual parking position
can be metres away. This inaccuracy requires softening the location identification
algorithm and including a buffer of 4 properties around the one that the solution
finds to be the valid address of the volunteer.
Figure 4: GPS track data downloaded onto PC from GPS device
The algorithm is implemented in Visual Basic.net.The purpose of choosing this
programming language is that there are APIs (Application Programming Interfaces)
available in this language that would programmatically allow connecting to the
GIS (Geographical Information System) software for further analysis and profiling.
The algorithm selects all the locations prior to the “Power Off ” signal in an effort
to identify the home locations. Since all the volunteers are associated with the
university, the algorithm does not compute the work locations and concentrates in
identifying home locations only. The algorithm uses certain heuristics so that on
weekdays, it is weighted to give higher importance to significant locations during
the period between 3 PM – 10 PM.This rule is based on the fact that most people’s
trips would end at their home locations during this time period.
To find the nearest street address to the significant locations, PSMA (Public Sector
Mapping Agencies) Australia’s GNAF (Geo-coded National Address File) index is
used. This address file contains the geocode (specific latitude and longitude) of all
physical addresses in Australia. This data is stored in a spatial database capable of
Page 231
The Second Workshop on the Social Implications of National Security
performing spatial queries. PostGIS which spatially enables the PostgreSQL database
server is used to store the GNAF data, since it is open-source and reliable to use.
Due to the magnanimity of storage requirements, GNAF data for only New South
Wales is loaded into the database which requires 5 gigabyte of storage space alone.
Table 1: Protocol output of inferred home locations with
actual addresses obtained from interviewing volunteers.
Home
location
Street
number(s)
inferred
Volunteer Volunteer Volunteer Volunteer Volunteer
C
B
Y
J
U
7
39
24, 25
44
53
Actual
Different
51
street
11
39
22
street
number
Using Spatial SQL (Structured Query Language) the filtered significant positions
(through time heuristics) are queried from the database. The output is a set of
physical addresses.The statistical mode is used to short-list the physical address of the
volunteers. Since the mode is not necessarily unique, the physical address computed
by the protocol may be more than one. Table 1 summarises the protocol output at
this stage. Only initials of the volunteers are used to keep their details anonymous.
For Volunteer B, the inferred address was the actual street address. For three out
of the remaining four volunteers (C,Y, U), the physical address computed was the
next door address where they actually lived, which according to the assumption falls
within the 4 address buffer range. For Volunteer J, the physical address computed
was on a parallel street.The logical explanation for this is that the volunteer parked
his car in an underground car park and entered the street through a parallel street
so the last significant position is recorded on the road closest to the proposed street
address as shown in figure 5. The volunteers were shown a list of all the computed
addresses and asked to find out the closest one to their address.
4.2.2 Profile generation
After inferring the street address of the drivers, the next stage is to use the same
data and make inferences about their social and work related activities. The whole
GPS track data is sifted and aggregated, and the output of this step is summarized in
table 2. While this list is not exhaustive, it is evident that a lot of calculated guesses
can be made about individuals based on this data. Inferences can be drawn about
how long a person spends time at work, and what times the person is not at their
home. This information can be used by adversaries with malicious intent. Krumm
(2007) has furthered this idea and computed relative probabilities of the times when
a subject may be home.Additionally the speed and travelled distance details indicate
how long a person stays on the road and the average distance travelled each day.
Page 232
The Second Workshop on the Social Implications of National Security
Actual
Inferred
Figure 5: Street address for volunteer incorrectly
guessed by the home determination algorithm
Volunteer Y seems to spend the longest time at the university, and lives the
farthest distance. On average he/she has to travel approximately 40 kms to commute
to work and back home each day.The algorithm is also designed to guess the profile
type of the individual with the GPS. For example, a rule that is incorporated in the
protocol is that a person spending a great amount of time at university is most likely
a research student. Likewise, a person who has a vehicle and does not park at the
university parking lot is not privileged with a parking permit.Another heuristic used
is that if a person parks within 1 km buffer around the university, then he/she does
not have a parking permit and is most likely an undergraduate student. While these
heuristics have proven to be true in this particular case, they may not necessarily
always be valid. For instance, there might even be an academic staff member who
is putting in extra hours to prepare lecture material for the forthcoming semester.
Under the present algorithm, he/she would be identified as a research student.
Further inferences can also be drawn using this data to determine social networks,
for instance Wigan and Clarke (2006) have highlighted issues related to location
tracking and social networks. They argued that continuous tracking of vehicles
can produce trails which can tell where a person currently is. This information
can be correlated to another person’s location at the same time to probabilistically
infer social networks. Additionally, the routes that a person takes to reach different
destinations can also provide crucial information to their individual pattern.
Page 233
The Second Workshop on the Social Implications of National Security
Table 2: Profile summary of volunteers
generated by the software protocol
Work and
Volunteer Volunteer Volunteer
commute
C
B
Y
profile
Total GPS
5240
1997
2330
records
Total
301 km
174.59 km
172 km
Distance
Average
27.38 km 34.59 km
31.2 km
distance
Total travel
12 hr 45 m 4 hr 25m
5 hr 1 m
time
Average
1hr 10 m
52 m
54 m
travel time
Max Speed
101 kph
83 kph
86 kph
Average
32 kph
45 kph
39 kph
Speed
Average
time leaves
7:33 am
8:21 am
9: 10 am
home
Average
time leaves
3:30 pm
5:09 pm
4:54 pm
work
Average
time arrives 8:03 am
8:55 am
9:32 am
at work
Average
time at
7 hr 58 min 8 hr 10 min 7 hr 25 min
work
University University University
Parks car in
parking lot parking lot parking lot
Type of
Academic Academic Academic
person
Or Support Or Support Or Support
Volunteer Volunteer
J
U
4812
2147
284.9 km
149.72
40.7 km
37.43 km
11 hr 44 m
4 hr 51 m
1 hr 40 m
1 hr 12 m
98 kph
91 kph
33 kph
39 kph
07:46 am
9:54 am
08:58 pm
5:07 pm
08:40 am
10:15 am
12 hr 18 m
6 hr
University
Around
parking lot university
Research Undergrad
Student
Student
4.2.3 Driver behaviour analysis
In this section speed and acceleration analysis is carried out.While the algorithm
produced speed and acceleration graphs, as well as speed maps for all the volunteers,
for the sake of clarity and brevity, only one volunteer’s data is discussed.
Page 234
The Second Workshop on the Social Implications of National Security
Figure 6: Speed and acceleration graphs for volunteer
Intuition suggests that individual driving behaviour is a function of many
factors such as characteristics of that individual, for instance, the driver’s age, gender,
purpose of trip, the type of vehicle and reported traffic conditions. It is also widely
acknowledged that higher speeds increase the likelihood and severity of collisions
(Kloeden et al. 1997). The purpose of this section is to demonstrate that GPS data
can be used to make inferences about an individual’s driving behaviour. This road
activity analysis was carried out by generating speed and instantaneous acceleration
graphs as well as detailed speed maps of trip data where speed variability is represented
using different colours on GIS maps. As mentioned earlier, VB.net was used to
programmatically access the GIS APIs for dynamically constructing the required maps
of speed data. The road network data was obtained from PSMA’s “Transport and
Topography” dataset.This dataset was in MapInfo format, and had to be converted
to ESRI compliant format using a freely available conversion tool.
Page 235
The Second Workshop on the Social Implications of National Security
University
Inferred Home
Figure 7: Speed profile of volunteer using waypoint data
In this stage, the GPS data was programmatically converted to ESRI Shapefile
format, which is the preferred file format for ArcGIS.Version 9.2 of ArcGIS was used.
All the records from the GPS data that had a status of “Power On” were removed as
they had no positional information and could not be used on the map. The points
with the “Power Off ” status were edited in this process to have positional information
of its preceding GPS record.These would prove useful in demonstrating the idea of
significant locations mentioned in the location identification section.The resultant
output was two sets of Shapefiles, one for the GPS track and the other for GPS
waypoints respectively.
Figure 6 shows the speed and acceleration graphs plotted for a particular
volunteer. It can be observed in the acceleration sub-graph that the individual had
to decelerate the vehicle at -3 m/s2 at a certain stage, which is considered risky
according to prior research (Watson 1995; Greaves & De Gruyter 2002). In terms
of environmental impacts, even though the impact of overall driving styles may be
less obvious, high speeds (80 kph and above), rapid accelerations and decelerations of
more than +/- 3 m/s2 are considered to be a source of increased fuel consumption
and emissions and may indicate the driving behaviour of individuals.
Figure 7 represents the routes the individual took from the home location to
the university. The black dots on the map indicate significant locations that were
used to infer home locations. Note the black dots around the university vicinity,
where the volunteer had parked the car frequently and were used to predict if the
volunteer was an undergraduate student. The red dots indicate that the speed with
Page 236
The Second Workshop on the Social Implications of National Security
which the car was being driven was greater than 80 kph. With access to speed
data of all the roads, it can be easily correlated to find if an individual was over the
speed limit. It is also not hard to imagine that if insurance companies get access to
this data, they would use this information, in order to identify an individual with
an ‘aggressive’ driving style. The insurance provider can then assign the individual
a higher risk, leading to a higher premium or denied motor insurance altogether
(Iqbal & Lim 2006).
5
Discussion
Using an adversarial attack paradigm, the protocol involved information collection
using surveillance, information processing using data-mining and information
dissemination using spatial maps and tabular reports. The profiling exercise looked
at various aspects of the volunteers’ lives and predicted what class of personnel they
belong to (academic staff, support staff, graduate student or undergraduate student).
The protocol also identified the residential address of 4 out of 5 volunteers within
the specified spatial granularity.The protocol further characterised the road behaviour
of volunteers by looking at speeds and accelerations.
While results suggest that these profiles can be highly predictive of personality
traits, they may also be misleading due to various reasons. For instance, one of the
heuristics used was that the person spending the most time at university is most
likely a graduate student. Spending more time at the campus doesn’t necessarily
mean that one is at work. A student may be involved in extra-curricular activities
or work on campus cafes and bookshops. Similarly, an academic may be on campus
for extended periods of time preparing lectures for the forthcoming semester or
applying for a research grant.
Future telematics applications would work on location data in order to provide
services. For instance mobility pricing of insurance (Norwich Union 2007),
which brings the concept of “fairness” to insurance premiums would require
disclosure of positional to generate per-mile premiums. However, there would also
be unintentional transmission of data that may be used against the motorist, for
instance how hard one brakes/accelerates or how often one goes above the speed
limit. One solution to avoid these abuses is to aggregate the GPS data and send
only the information necessary for premium calculations. A similar privacy-aware
system recently identified is the GM FleetView (2007), which is primarily for fleet
management, but has built-in privacy features. Employees may find such systems
quite useful to track work-related travel for tax purposes; however, these individuals
operating such vehicles have a reasonable expectation of privacy when using the
vehicles after-hours.This system has a toggle switch in the vehicle which an employee
can select to identify a business or personal trip. Location of the vehicle would not
be transmitted when driving in personal mode. To conclude, it is imperative that
future telematics systems respect the privacy of motorist and provide configurable
features for motorists to opt-out or opt-in on a more granular scale.
Page 237
The Second Workshop on the Social Implications of National Security
6
Conclusion
The purpose of this experiment is to demonstrate that GPS data can be used
to draw numerous inferences about individual personality traits by a simple click
of a button. These inferences can be used to harm an individual and may prove
embarrassing to him/her when revealed publicly. Future invasions of privacy in
location contexts would employ technologies presented in this paper.With the recent
trend of installing GPS chips in mobile phones in order to accessorize them with
navigation features (Roche 2007), one should ask what safeguards have been provided
that mobile phones cannot be remotely hacked to gain access to this data? With
accounts of law enforcement officials remotely activating mobile phones of suspects
for audio surveillance (McCullagh & Broache 2006), it is not hard to imagine that
the GPS data could also remotely and surreptitiously be read providing a ubiquitous
surveillance device. The combination of motorists and mobile phone users form a
huge majority of the urban population and citizens should not be victims of mass
surveillance or privacy abuses based on location data. Rigorous ethical and legislative
safeguards need to be implemented to protect future abuses of individuals’ privacy
in this context. Location technologies are still in their nascent stages, therefore, from
a technology point of view, it is important to dispel these privacy concerns right
from the beginning, and focus on “building in” privacy protection within such
systems so that as new applications become available, appropriate privacy measures
are integral to them.
Acknowledgements
The author wishes to acknowledge the financial assistance provided by the
‘Metadata Scholarship’ from OMNILINK Pty. Ltd. for this research.
References
Agrawal, R & Srikant, R 200, ‘Privacy-Preserving Data Mining’, in ACM
SIGMOD Conference on Management of Data. Dallas, TX, USA: ACM Press.
Ashbrook, D & Starner, T 2003, ‘Using GPS to Learn Significant Locations and
Predict Movement across Multiple Users’, Personal and Ubiquitous Computing,
2003. 7(5): pp. 275-286.
Clarke, RA 1988, ‘Information Technology and Dataveillance’, Communications of
the ACM, 31(5),1988, pp. 498-512.
Coroama,V & Langheinrich, M 2006, ‘Personalized Vehicle Insurance Rates –
A Case for Client-Side Personalization in Ubiquitous Computing’, Paper
presented at the Workshop on Privacy-Enhanced Personalization at CHI 2006,
Montréal, Canada, 22 April, 2006.
Duckham, M & Kulik, L 2005, ‘A Formal Model of Obfuscation and
Negotiation for Location Privacy’. Lecture Notes in Computer Science, 3468, pp.
152-170.
Page 238
The Second Workshop on the Social Implications of National Security
GM Fleetview 2007 GM FleetView Presentation Video, viewed 18th March 2007,
<http://video.vividas.com/media/4630_GMFleet/web>
Greaves, SP & De Gruyter, C 2002, ‘Profiling driving behaviour using passive
Global Positioning System (GPS) technology’ presented at Institute of
Transportation Engineers International Conference, Melbourne, Australia.
Grush B 2005, ‘Optimizing GNSS-Based Mobility Pricing for Road-Use,
Parking, and PAYD Insurance’, 4th European Traffic Congress. Salzburg, Austria
Gruteser, M & Grunwald, D 2003, ‘Anonymous Usage of Location-Based
Services through Spatial and Temporal Cloaking’, Paper presented at the
First International Conference on Mobile Systems, Applications, and Services, San
Francisco, USA.
Hytch D 2007, ‘Service vendors target traffic-management deals’,
Computer Business Review Online, viewed 25 July 2007, <http://www.
computerbusinessreview.com/article_news.asp?guid=E01E9184-2F514B85-9577-D0A6C72AF895>
Iqbal, MU & Lim, S 2006, ‘A privacy preserving GPS-based Pay-as-You-Drive
insurance scheme’, Symposium on GPS/GNSS (IGNSS2006). Surfers
Paradise, Australia, 17-21 July, CD-ROM proceedings.
Kloeden, CN, McLean, AJ, Moore,VM and Ponte, G 1997, ‘Travelling speed
and the risk of crash involvement’, Report CR 172. Federal Office of Road
Safety, Canberra.
Krull, K 1999, A Kid’s Guide to America’s Bill of Rights, pp. 224, New York, Avon
Books.
Krumm, J 2007, ’Inference Attacks on Location Tracks’, Fifth International
Conference on Pervasive Computing (Pervasive 2007), May 13-16, 2007, Toronto,
Ontario, Canada.
McCullagh, D 2005, ‘Snooping by satellite’, CNET News, viewed 29 July 2007,
<http://news.com.com/Snooping+by+satellite/2100-1028_3-5533560.
html>
McCullagh, D & Broache, A 2006, ‘FBI taps cell phone mc as eavesdropping
tool’, CNET News, viewed 10 April 2007, <http://news.com.com/FBI+taps
+cell+phone+mic+as+eavesdropping+tool/2100-1029_3-6140191.html>
Michael, K, McNamee, A & Michael, MG 2006, ‘The Emerging Ethics of
Humancentric GPS Tracking and Monitoring’, in Proceedings of the
International Conference on Mobile Business, Copenhagen, Denmark, 25-27 July
2006. IEEE Computer Society.
Michael, K, McNamee, A, Michael, MG & Tootell, H 2006, ‘Location-Based
Intelligence – Modeling Behavior in Humans using GPS’, in Proceedings
of the International Symposium on Technology and Society, New York, 8-11 June
2006. Copyright IEEE Computer Society.
Nissenbaum, H 2004, ‘Privacy as contextual integrity’, Washington Law Review, 79
(1), 119-157.
Page 239
The Second Workshop on the Social Implications of National Security
NRMA 2007, ‘NRMA calls for car surveillance via GPS’, Ninemsn Science and
technology news, viewed 10 July 2007, <http://news.ninemsn.com.au/article.
aspx?id=59964>
Norwich Union Pay As You Drive Car Insurance, viewed 5 June 2007, <http://
www.norwichunion.com/pay-as-you-drive/index.htm>
Roche, J 2007, ‘Nokia N 95’, CNET News, viewed 28 July 2007,<http://www.
cnet.com.au/pdas/gps/0,239035573,339271384,00.htm>
TrackStick Pro, TrackStick Pro userguide, pp 30, viewed 12 April 2007, <http://
www.trackstick.es/files/STS_user_guide.pdf>
Tripsense, How TripSensor Works, viewed 11 January 2007, <https://tripsense.
progressive.com/about.aspx?Page=HowDeviceWorks>
Wainright R 2007, ‘Father and son stick to gins to prove radar wrong’,
Sydney Morning Herald, viewed 5 July 2007, <http://www.smh.com.
au/news/national/father-and-son-stick-to-guns-to-prove-radarwrong/2007/03/11/1173548023012.html>
Watson, HC 1995, ‘Effects of a Wide Range of Drive Cycles on the Emissions
from Vehicles of Three Levels of Technology’, Global Emissions Experiences,
SAE, Warrendale, Pa., USA. SP-1094, p. 119-132.
Wigan, M & Clarke, R 2006, ‘Social Impacts of Transport Surveillance’,
Prometheus, 24, pp. 389-403.
Page 240
The Second Workshop on the Social Implications of National Security
17
Human tracking technology in mutual
legal assistance and police inter-state
cooperation in international crimes
Katina Michael
Senior Lecturer, School of Information Systems and Technology, University of
Wollongong
Gregory Rose
Associate Professor, Centre for Transnational Crime Prevention, University of Wollongong
Abstract
The objective of this paper is to explore the role of human tracking technology, primarily the
use of global positioning systems (GPS) in locating individuals for the purposes of mutual
legal assistance (MLA), and providing location intelligence for use in inter-state police
cooperation within the context of transnational crime. GPS allows for the 24/7 continuous
real-time tracking of an individual, and is considered manifold more powerful than the
traditional visual surveillance often exercised by the police. As the use of GPS for human
tracking grows in the law enforcement sector, federal and state laws in many countries are
to a great extent undefined or even contradictory, especially regarding the need to obtain
warrants before the deployment of location surveillance equipment. This leaves courts ruling
on transnational crimes in the precarious position of having to rely on age-old precedents
which are completely void to the new capabilities of today’s tracking technologies. On one
side of the debate are civil libertarians who believe the individual’s right to be let alone is
being eroded to the compromise of human rights, and on the other side are law enforcement
agencies who wish to provide more precise evidence to judges and juries during hearings
against suspects (particularly in issues pertaining to national security). This paper argues that
there is a radical middle position, the via media: that a warrant process is legislatively defined
and not only for MLAs but also to formalise existing informal inter-state police cooperation.
Safeguards are required to overcome the potential misuse of human tracking technologies by
police officials and others in positions of power. And this particularly in light of the emerging
implantable high-tech identification and tracking devices now commercially available.
Keywords: inter-state police cooperation, law enforcement, intelligence, global positioning
systems (GPS), human tracking, covert surveillance, privacy, human rights
Page 241
The Second Workshop on the Social Implications of National Security
1
Mutual legal assistance in locating the accused
Mutual Legal Assistance (MLA)1 can be defined as a mechanism by which
lawyers and the courts of one jurisdiction can request assistance from another. MLAs
ensure that individuals cannot evade prosecution simply because the evidence to
prosecute them is located in another country.The MLA document states the required
assistance sought in the provision of evidence for criminal proceedings or proceedings
about to commence.2 Depending on the domestic law and that law of the requested
State, the most common types of assistance that is usually obtained includes: witness
interviews and material held by third parties (such as telecommunication documents,
phone records, e-mail, facsimile billing and subscriber information).3 This paper
deals with the latter and specifically the use of covert location-based surveillance.
MLAs should be used when evidence cannot be gathered using informal policeto-police cooperation.
In the treaty between the Government of Australia and the Government of the
United States of America on Mutual Assistance in Criminal Matters, the scope of
assistance ranges from ‘providing documents, records, and other articles of evidence;
locating or identifying persons; and executing requests for searches and seizures and
for restitution’.4 ‘These forms of legal assistance can be conducted by the judicial,
prosecutorial or law enforcement personnel of the requested state.’5 Mutual Legal
Assistance Treaties (MLATs) can be bilateral or multilateral.6 ‘As of the 1960s, the
practice of many states (within Europe, Latin America, the United States, and Canada)
shifted to bilateral MLATs… Still the number of bilateral MLATs is far less than
bilateral extradition treaties, as is the number of states having national legislation
1
Mutual legal assistance was developed during the 1960s but its origins can be found in the century-old
practice known as “Letters Rogatory.” Letters Rogatory is based on the principle of comity, when the ‘…
courts of one state address a request to those of another state for judicial assistance in the form of taking the
testimony of a witness or securing tangible evidence.’ See M. Cherif Bassiouni, Introduction to International
Criminal Law, International and Comparative Criminal Law Series (2003) 352. See also Ilias Bantekas and
Susan Nash, International Criminal Law (2003) 231. MLAs abide by the locus regit actum rule.
2
International Association of Prosecutors, Basic Guide to Prosecutors in Obtaining Mutual Legal Assistance in
Criminal Matters (2004) 2.
3
Ibid. See also, the Mutual Assistance in Criminal Matters Act 1987 (Cth). This Act should be read together
with the following relevant Australian legislation: Foreign Evidence Act 1994 (Cth), Proceeds of Crime Act 2002
(Cth), Telecommunications (Interception) Act 1979 (Cth), and the Surveillance Devices Act 2004 (Cth). Only by
studying the various Acts can one appreciate the complexity of MLATs and the various considerations that
need to be grasped in making a request to a given state, or satisfying a request by another state.
4
Department of Foreign Affairs and Trade, Treaty between the Government of Australia and the Government of
the United States of America on Mutual Assistance in Criminal Matters, and Exchange of Notes (2000).
5
Bassiouni, above 1, 354.
6
The 1959 Council of Europe Convention on MLA in Criminal Matters which was ratified in 1962 was one
of the first multilateral treaties and is recognized as an important step in international judicial co-operation.
See Bantekas, above 1, 234.
Page 242
The Second Workshop on the Social Implications of National Security
on the subject…’7 States have become increasingly willing to negotiate MLATs,8
particularly since 11 September 2001 (9/11), as a means to increased access of
evidence located abroad.9
What is unique about MLATs is that they are only really meant to benefit
governments, and only governments can make exclusive use of evidence to satisfy a
given request. However, governments are under no obligation to provide evidence
and they can reject a request based on any number of grounds.10 MLATs in most
instances contain provisions for human rights but through reservations and safeguards
which are ‘built-in’ to protect the accused. It is important to note, that MLAs can
only be executed by remaining in accordance with the law of the requested state,
without violating third party rights. In the context of search for and seizure of
evidence using location surveillance, this becomes very important.11
2
Inter-state police cooperation for information gathering
and sharing
Given the number of requests published in annual reports by government
agencies, and the highly publicized media accounts of increasing transnational crime,12
it is obvious that the collection and exchange of relevant information pertaining to
a transnational criminal investigation happens through informal police cooperation
at a federal level.13 One can conclude from this that mutual assistance and policeto-police assistance are complementary. However, while law enforcement and
7
Bassiouni, above 1, 353.
8
Bantekas, above 1, 231.
9
See, eg, Attorney-General’s Department, Annual Report 2004-2005 (2005) <http://www.ag.gov.au/
www/agd/rwpattach.nsf/VAP/(CFD7369FCAE9B8F32F341DBE097801FF)~80Recent+Statistics.
pdf/$file/80Recent+Statistics.pdf> at 1 June 2007. The number of requests made by Australia carried
forward from 2003–04 were 170, new requests made in 2004–05 were 151, requests finalized were 126,
and requests continuing were 195.The majority of requests came from the United Kingdom, Netherlands,
and the United States of America, and the majority type of assistance granted was for telecommunications
and email records etc, and bank and business records. A similar number of requests were made to Australia,
indicating that MLATs are highly reciprocal in nature.
10 Bassiouni, above 1, 354.
11 Bantekas, above 1, 233-234. See also, Model Treaty on Mutual Assistance in Criminal Matters, adopted by General
Assembly resolution 45/117, subsequently amended by General Assembly resolution 53/112 (entered into
force 14 December 1990). In the context of human rights, see, Ian Brownlie and Guy S. Goodwin-Gill
(es), Basic Documents on Human Rights (2002).
12 See, United Nations Office on Drugs and Crime, The Seventh United Nations Survey on Crime Trends and
the Operations of Criminal Justice Systems (1998 - 2000), (2006) <http://www.unodc.org/unodc/crime_
cicp_survey_seventh.html> at 4 June 2007. Compare with data found in Attorney-General’s Department,
above 9. The statistics for MLAs and national/international crime trends indicates that a great number of
investigations do not go through the MLA process but via the more informal police-to-police cooperation
route.
13 Bantekas, above 1, 236, 261. ‘Despite the increased willingness of States to engage in formal methods of
mutual legal assistance, there are many other less formal methods of evidence gathering, which permit law
enforcement agencies to exchange information and material relevant to transnational investigations.’
Page 243
The Second Workshop on the Social Implications of National Security
intelligence cooperation is increasing, it is not regarded in the same way from a
legal perspective. For instance, there are no treaties applicable to law enforcement
or police cooperation as there are for mutual assistance, nor are there codes of
conduct for how information should be gathered and shared between government
agencies.14 When one considers the need for location surveillance15 and other forms
of covert surveillance, particularly in the gathering of evidence, ‘there are no legal
or judicial safeguards to insure effective and regulated modalities of informationgathering and information-sharing between intelligence, law enforcement, and
prosecutorial agencies.’16 In fact, regulation is the major problem here. How are
potential abuses combated17 and how is effectiveness maintained? How can the
accuracy of information be guaranteed? And what of privacy when international
practices vary greatly? These are the challenges that new technologies and emerging
law enforcement workflows pose on the due process of law.
As any other organization in a given jurisdiction, law enforcement agencies are
bound by national criminal law at the domestic level. Yet, many have questioned
whether this is enough given that intelligence and law enforcement agencies
have been quite secretive about their practices. For the greater part the way that
these particular organizations have shared intelligence has been outside legal or
judicial supervision.18 Thus, the problem is two-fold: (i) a legal framework in most
jurisdictions does not exist to aid in regulation, and (ii) there is a reluctance of
members of the intelligence sector to provide transparency in their activities within a
judicial system.19 This issue has been exacerbated since 9/11 when the United States
demanded that states share more information with them, and that their intelligence
14 Bassiouni, above 1, 368. Bassiouni is strong in his stance commenting: ‘[r]egrettably, this important form
of international cooperation [ie police cooperation in transnational crime] has not yet been included in
mutual legal assistance treaties.’
15 Katina Michael et al, ‘Location-Based Intelligence – Modeling Behavior in Humans using GPS’ (2006)
International Symposium on Technology and Society (ISTAS ‘06) 1.
16 Bassiouni, above 1, 369. See also, Commission New South Wales. Law Reform, Surveillance: An Interim
Report (2001).
17 John S. Ganz,‘Comment: It’s Already Public:Why Federal Officers Should Not Need Warrants to Use GPS
Vehicle Tracking Devices’ (2005) 95 Journal of Criminal Law & Criminology 1360.‘Finally, again from a policy
perspective, some might argue that the failure to require warrants could lead to arbitrary and capricious
use of GPS by police. As dissenting Nevada Supreme Court Justice Robert Rose noted in Osburn, “The
automobile’s use is a necessity in most parts of Nevada, and place a monitor on an individual’s vehicle
effectively tracks that person’s every movement just as if the person had it on his or her person… I fear that
in some instances, the monitor will be used to continually monitor individuals only because law enforcement
considers them “dirty.” In the future, innocent citizens, and perhaps elected officials or even a police officer’s
girlfriend or boyfriend, will have their whereabouts continually monitored simply because someone in law
enforcement decided to take such action. This gives too much authority to law enforcement and permits
the police to use the vehicle monitor without any showing necessity and without a limit on the duration
of the personal intrusion.”’
18 Bassiouni, above 1, 369.
19 Ibid.
Page 244
The Second Workshop on the Social Implications of National Security
personnel gather more data so as to curb such terrorist20 acts in the future.21 Recent
events have shown the power of data accessibility, with numerous terrorist plots
foiled by intelligence organizations, preventing mass casualties.22 But at the same
time the rights of individuals to know that data is being collected about them, to
be able to rectify erroneous data, to protect privacy is also important.23 The whole
debate over weapons of mass destruction (WMD) allegedly located in Iraq, which was
later proven to be unreliable, indicated the systemic flaws in American intelligence
which were blamed primarily on management.24 Interestingly, the result of this flaw,
quite legitimately, was for American intelligence agencies to increase information
sharing even more.25 One can be lead to the hypothesis that greater intelligence
effectiveness is proportional to the amount of information shared by states but this
too has implications for privacy. Not only is the balance between personal privacy
and national security almost impossible to achieve but intelligence born from
“überveillance-type” regimes can introduce the potential for misinformation and
misinterpretation. Going to one extreme or the other has negative implications- i.e.
making all personal data public might increase transparency in the short-term but
may have the equal effect of increasing identity fraud in the long-term, and not
engaging in any information sharing practices would be detrimental to a nation’s
security.
20 For comparative definitions of terrorism see, Claire De Than and Edwin Shorts, International Criminal Law
and Human Rights (2003) 231-237.
21 Terrorism is considered to be just one reason why information gathering and sharing practices have
increased, other notable transnational crimes include: drug and people trafficking, money laundering, and
the smuggling of things. See eg, the role of intelligence in security informatics in Hsinchu Chen, Intelligence
and Security Informatics for International Security (2006).
22 See, eg, Transportation Security Administration, Information on Plot to Attack John F. Kennedy Airport (2007)
<http://www.tsa.gov/press/happenings/jfk_terror_plot.shtm> at 2 June 2007.
23 Bassiouni, above 1, 370. There are however efforts between nations to broker agreements that do try to
address data protection principles, at least in theory. See, eg, Agreement Between the United States of America and
the European Police Officer, Europol file no. 3710-60r2 (Dec 6, 2001), Supplement Agreement Between the United
States of America and the European Police on the Exchange of Personal Data and Related Information, Europol file
no. 3710/60r3 (Dec. 20, 2002).“Europol is essentially a police coordination centre for collecting, analyzing
and sharing information to help investigations being carried out in two or more EU countries”. European
Commission, Freedom, Security and Justice for All (2004) 19. See also, OECD, Guidelines on the Protection of
Privacy and Transborder Flows of Personal Data (1981).
24 GlobalSecurity.org, Intelligence:Additional Views of Senator Olympia Snowe (2004) <http://www.globalsecurity.
org/intell/library/congress/2004_rpt/iraq-wmd-intell_olympia-snowe.htm> at 3 June 2007.
25 Ibid.‘Surprisingly, the Committee’s review reveals that even after the lack of information sharing was found
to have played a key role in the intelligence failures of September 11, 2001, intelligence agencies still fail to
share information within and among its own cadre. … For example, the CIA failed to share information
on the reliability of two biological weapons sources with all Iraq biological weapons analysts. Information
about the credibility of these sources, upon which many assumptions regarding Iraq’s biological weapons
program were made, could have significantly altered analysts’ judgments. In addition, the CIA failed to share
some intelligence reporting with other agency [unmanned aerial vehicle] UAV analysts on critical issues
surrounding Iraq’s UAVs. … The Committee’s review shows that the CIA continues to overly compartment
sensitive HUMINT reporting and that this lack of information sharing prevented key analysts on certain
issues from making fully informed judgments.’
Page 245
The Second Workshop on the Social Implications of National Security
3
The nature of evidence and the new technologies
Evidence takes on two basic forms, that which is a written statement in place
of oral transmission, and anything on which something can be recorded. High-tech
gadgetry is becoming increasingly useful in storing recorded information digitally.
Not only can miniature devices do so with incredible amounts of storage power
but they can do so continually 24/7, using very little on-board battery power and
with a relatively low degree of risk to humans. Digital documentary evidence that
has been used in ad hoc tribunals for instance includes aerial photography, audio
and video tapes, maps and sketches of plans, and a variety of digital record formats.
‘Such evidence is deemed admissible if it contains information of probative value.’26
Digital evidence especially is prone to tampering however this is the emerging
context in which courts now have to operate.
New technologies, which have allowed for covert surveillance to be performed
without the permission of a given state, highlight the need for regulation.27 One need
only point to the Echelon operation, which was first considered a wild conspiracy,
but which was later shown to be a mass surveillance operation by the United
States, United Kingdom, Canada, Australia and New Zealand on major European
industries. ‘It was in short a major scandal of governmental industrial espionage
against friendly states.’28 It is not being argued here that new technologies should
not be exploited to their maximum potential to prevent or suppress criminality but
they presently remain unregulated. So in admitting evidence that has been gathered
in another country, national courts need to maintain that the evidence has been
gathered within the confines of a given state’s domestic law, and not by any other
means.29 If we cannot be confident in this, then not only are we making sweeping
assumptions about the reach of laws but we are creating a law unto ourselves, to do
as we please, as we see fit. When comparing the comprehensive and robust MLA
process (although to some seemingly long-winded and bureaucratic), with just-intime inter-state police cooperation, one can come to the resolution that there is a
great divide that needs to be bridged.With reference to police cooperation, it must
be said, that better processes with regulations at an inter-state and international
level, can only increase the likelihood that cross-border criminals will be brought
to justice and tried under the most suitable laws, resulting in a better outcome for
all parties concerned.30
In an attempt to bridge that gap the United Nations adopted the Convention
26 Bassiouni, above 1, 656.
27 Bantekas, above 1, 240.‘Due to the nature of modern telecommunications systems, interception frequently
does not require technical assistance from other States.’
28 Bassiouni, above 1, 371-373.
29 Bassiouni, above 1, 374. See also, Bantekas, above 1, 255. Interestingly however,‘… the Court is prepared to
focus on the nature of the evidence rather than the fact that human rights standards have been breached.’
30 David Lanham, Cross-border Criminal Law (1997) 44-45.
Page 246
The Second Workshop on the Social Implications of National Security
Against Transnational Organized Crime in 2000 that addressed but did not regulate
the question of inter-state law enforcement cooperation.31 Articles 26-28 raise the
matter of bilateral and multilateral agreements inviting ‘… state parties in accordance
with their national legal systems to develop national legislation permitting special
investigative techniques’,32 which could then be extended beyond the borders and
applicable to law enforcement and intelligence organizations.The articles specifically
addressed forms of electronic surveillance and how they might be used in joint
investigative operations. For example, although it took several years to agree on,
Member States finally ratified a convention which would allow them in appropriate
circumstances to intercept communications directly.33 It should be highlighted
that the convention was seen as going soft on data protection and in allowing for
dubious practices such as that of cross-border observation, in actual fact, hot pursuit
of suspects or fugitives by foreign police officers across borders.34
There is ‘… no evidence [that] exists outside court proceedings.’35 In common
law countries facts must be proved beyond a reasonable doubt.36 For a definite
conclusion to be sought however, the evidence which has been gathered must also
have been collected with the same level of confidence. ‘Implicit in the right to a
fair trial is the rejection of evidence obtained in breach of fundamental human
rights standards.’37 New technologies and techniques however may not coerce
an individual to confessing to a crime, but may apply irregular methods of data
collection that in some instances could be considered a type of intimidation.38 A
frequent happening in international criminal proceedings is when a prosecutor
does not wish to disclose their source of information for reasons of confidentiality,
31 See also, Bantekas, above 1, 236. In Title VI of the Treaty on European Union (TEU) a similar hope was
set out, to develop ‘common action among Member States in the fields of police and judicial co-operation
in criminal matters.’The EU has been to some degree successful at achieving these goals, at least insofar as
communicating standards, guidelines and protocols to Member States.
32 Bassiouni, above 1, 375. See also, Elia Zureik and Mark B. Salter (eds), Global Surveillance and Policing: Borders,
Security, Identity (2005).
33 Bantekas, above 1, 239, 259. ‘In addition to avoiding formal procedures, prosecuting authorities engage in
informal mutual co-operation practices by simply allowing police officers in another jurisdiction access to
evidence.’
34 Ibid 279.
35 Antonio Cassese, International Criminal Law (2003) 421.
36 Ibid 425.
37 Bantekas, above 1, 254-255, 284. Proceedings from the Corpus Juris Project in Europe stated ‘(1) [e]vidence
must be excluded if it was obtained by community or national agents either in violation of the fundamental
rights enshrined in the European Convention on Human Rights…’
38 Ibid 245, 246. See, eg, ‘[i]n R v Terry, the court also held that the Charter of Rights has no effect on law
enforcement officials abroad, and as such does not render illegally obtained evidence inadmissible. …
However, the failure to reject evidence which was obtained not merely in breach of foreign law, but also
in violation of international human rights standards … is lamentable and demonstrates a lack of sensitivity
and understanding of the rules operating in other legal systems.’
Page 247
The Second Workshop on the Social Implications of National Security
safety, or other.39 Quite often secret intelligence organizations are not prepared to
tell the public how they obtained a particular record or document, and in many
instances the evidence provided is still accepted.40 Courts are faced with a difficult
choice when it is obvious that unlawful means have been used to obtain evidenceexcluding the evidence may mean doing away with the reliable information, while
admitting it legitimized illicit and irregular modes of investigations.41
4
Human tracking technologies used for location
intelligence
How are authorities able to locate individuals who are suspected of transnational
crimes for the purpose of MLA requests and inter-state police cooperation? ‘Mobility
is a basic and indispensable human activity that is essential for us to be able to lead
independent lives on a daily basis’.42 Criminals suspected of a crime- like every
other human being- require to move around in public space in order to satisfy basic
living requirements. Someone who is moving can be tracked manually or digitally,
even if they (or persons harboring criminals) are using cash to pay for their every
transaction.43 The information being gathered as a person moves from one place
to the next can be considered a type of chronicle or breadcrumb. Today, given the
high-tech devices available to law enforcement and intelligence organizations, an
electronic chronicle44 and electronic breadcrumb45 can be gathered, stored, and
manipulated for presentation at a later date.To allow oneself to be tracked can be a
voluntary act, but in most cases it is imposed by a third party who has some control
39 Bassiouni, above 1, 656-657. ‘The problem, however, is when this evidence is provided by intelligence
agencies who do not wish to have their sources disclosed. This issue of confidentiality of sources makes it
difficult, if not impossible, to use valuable information.’
40 Antonio Cassese, International Criminal Law (2003) 424.
41 Liam Byrne,‘Admission of Evidence Obtained in Breach of Privacy Laws’ (2007) (78) Precedent 21. English,
Canadian, American, Australian, Irish and Scottish courts all differ on their positions regarding what
constitutes ‘lawful methods’ of data gathering for admittance of evidence in their courts.
42 K. Kayama, I.E. Yairi and S. Igi, ‘Semi-Autonomous Outdoor Mobility Support System for Elderly and
Disabled People’ (2003) International Conference on Intelligent Robots and Systems 2606.
43 Stephane Leman-Langlois, ‘The Myopic Panopticon: The Social Consequences of Policing through the
Lens’ (2003) 13(1) Policing and Society 51, 54. ‘The combination of face recognition, motion analysis and
sound analysis could become very interesting in the near future.’ Leman-Langlois writes of an ‘omniscient
surveillance.’ See also, the notion of ‘überveillance’ in Katina Michael et al, above 15, 7.
44 G. Pingali and R. Jain, ‘Electronic Chronicles: Empowering Individuals, Groups, and Organisations’ (2005)
IEEE International Conference on Multimedia and Expo 1540.
45 Wherify, Wireless Location Services (2005) <http://www.wherifywireless.com/> at 29 May 2007.
Page 248
The Second Workshop on the Social Implications of National Security
over the end-user.46 Tracking can be obtrusive taking the form of overt surveillance47
(ie the individual knows they are being followed), or as in most cases tracking is
unobtrusive taking the form of covert surveillance (ie the individual is not aware
that they are being tracked).
Today, tracking is possible via a vast array of technologies- from GPS devices,
to radio beepers, electronic mail, and even fixed and mobile telephony.48 In fact, the
use of a mobile phone in most more-developed countries means that a location
fix within about 50 meters of the user’s handset is possible, just by an individual
having their phone on.49 Increasingly, mobile phones are also being equipped with
GPS chipsets which means that if a mobile device is outdoors, a service provider
can perform a position fix within seconds if a request is made by the police.50
And it is not only the location position fix that is revealing, even more telling is
the continuous, real-time location information that can be gathered by a GPS,
including accurate geodetic information, such as longitude and latitude, time and
speed.51 Beyond statistical data, location intelligence ‘reveals a great deal about one’s
preferences, friends, associations, and habits.’52 Till now law enforcement agencies
46 R. Cucchiara, C. Grana, and G. Tardini, ‘Track-based and Object-based Occlusion for People Tracking
Refinement in Indoor Surveillance’ (2004) Proceedings of the ACM 2nd International Workshop on Video
Surveillance & Sensor Networks 81-87. Tracking is critical in the process ‘of people motion capture, people
behavior control and indoor video surveillance.’ See also, Clive Norris, Jade Moran and Gary Armstrong,
Surveillance, Closed Circuit Television and Social Control (1998).
47 Stephen Green,‘A Plague on the Panopticon: Surveillance and Power in the Global Information Economy’
(1999) 2(1) Information, Communication & Society 31. ‘In the United Kingdom, Newcastle police claim that
CCTV has led directly to 2,800 arrests from 1991-9, with 99 per cent of offenders pleading guilty when
presented with video evidence … In contrast to more radical libertarian accounts, the key point here is
that not every sacrifice of individual autonomy and ‘privacy’ is the same as the loss of freedom…’
48 William A. Herbert, ‘No Direction Home: Will the Law Keep Pace with Human Tracking Technology
to Protect Individual Privacy and Stop Geoslavery?’ (2007) 2(2) I/S: A Journal of Law and Policy 410. ‘‘In
contemporary American culture, some view the concept of freedom as being manifested in consumerism,
with the ubiquitous cell phone as a primary symbol. It is doubtful that most cell phone users are aware that
the same technology that grants them this sense of freedom, also results in wireless companies, receiving
automatic and continuous updates regarding their location. Physical possession of a cell phone renders an
individual vulnerable to location surveillance by government entities…’
49 Katina Michael ‘Location-based Services: aVehicle for IT&T Convergence’ in K. Cheng et al (eds), Advances
in e-Engineering and Digital Enterprise Technology 467. It should be noted that GPS data is not foolproof. Speed
miscalculations, location fix inaccuracies, signal dropouts, can all occur due to the physical structures that
the GPS passes through, and even to changes in climatic conditions, and the presence of dense foliage.
50 Leman-Langlois, above 43, 46. ‘First, there is deterrence: overt surveillance aimed primarily at discouraging
potential offenders from actually committing crimes. Second, intelligence gathering: a police force may be
interested in collecting images for their information content, to build files, understand relationships, create
chronologies, etc. Third, evidence: evidence is information that meets basic legal requirements and is thus
admissible in court to support the accusation of a suspect.’
51 Ganz, above 17, 1329. ‘One model, which a Law Enforcement Technology Magazine reviewer called a
“vehicle tracking system that would make James Bond envious,” sells for $2,396 per unit. Users pay $59 per
month of tracking data used.The product can be attached to a car in thirty seconds and operates anywhere
in the United States, Canada and Mexico where cell towers exist.’
52 April A. Otterberg, ‘Note: GPS Tracking Technology: The Case for Revisiting Knotts and Shifting the
Supreme Court’s Theory of the Public Space Under the Fourth Amendment’ (2005) 46 Boston College Law
Page 249
The Second Workshop on the Social Implications of National Security
have used GPS to investigate murder cases, drug investigations, robbery, public
corruption, probation violations and hostage situations.
5
GPS evidence in Court- case law examples in the United
States
Although GPS technology has been used in law enforcement since the early
1990s,53 it is only recently that a few cases have been heard regarding the validity of
using GPS tracking technology on suspected criminals.54 All of the cases presented
here are based on case law in the United States. The Fourth Amendment in the
United States Constitution is the main source of legislation pertaining to the
protection of an individual’s right to privacy.‘At present, the United States Supreme
Court has not ruled on the applicability of the Fourth Amendment to most recent
forms of human tracking technology.’55 There have been some landmark cases
however, that have pointed towards the requirements for warrants to conduct
surveillance activities. Compare for instance the cases Olmstead v. United States
with Katz v. United States. In 1928 the United States Supreme Court determined
that the Fourth Amendment did not prohibit the action of eavesdropping using
telecommunications networks, while almost forty years later in 1967 the Court held
that the FBI’s use of a microphone on the roof of a payphone, without a warrant,
constituted a violation of the Fourth Amendment.56 Still, the Court ruled that using
a tracking device to monitor vehicles or objects was not subject to the expectation
of a privacy test. For example, a person traveling in a car on a public road from A
to B had no reasonable expectation of privacy as he or she was out-n-about in full
view of the public.57 This decision was again reaffirmed in 1983 in the United States
Review 663.
53 Prior to GPS technology, less sophisticated technology was used, known as beepers. Beepers helped locate
a vehicle once an event occurred, such as a car door opening or the ignition starting, or movement. Beeper
technology could alert police officials to locate the originating position of the vehicle, and thereafter it
would be tailgated using traditional visual surveillance means.
54 Olmstead v. United States, 277 US 438 (1928). Katz v. United States, 389 US 347 (1967). United States v.
Knotts, 460 US 276 (1983). United States v. Karo, 468 US 705, 707 (1984). Kyllo v. United States, 533 US 27
(2001). State v. Jackson, 76 P.3d 217, 220 (Wash 2003). State v. Peterson, (Cal 2004). People v. Lacey, Indictment
No 2463N/02, 2004 WL 1040676 (Nassau, NY County Ct. May 6, 2004), People v. Gant, 9 Misc 3d 611
(Westchester, NY County Ct. 2005). See also, Otterberg, above 52, 680.‘Only a few courts have specifically
considered whether the monitoring of GPS tracking devices is distinguishable from the monitoring of the
beepers in Knotts and Karo.’
55 Herbert, above 48, 417.
56 Ibid 418-419, 420.‘… by mandating for the first time that the police obtain a court-ordered warrant before
engaging in electronic surveillance, the Katz decision established a significant judicial check on government
agents randomly engaging in such surveillance.’ In Katz it was also interesting to note a shift in emphasis
from protecting a place where someone resides, to protecting the person from government intrusion.
57 The definition of a ‘public space’ and that of a ‘private space’ has been open to debate in recent times. Is
private only the space in which we reside- the four walls of our home when the blinds are down, and the
inner lining of our roof? If so what happens when we walk outside our doorstep? Or even more precisely
if a vehicle that has a GPS unit attached, enters a garage which is connected to the home?
Page 250
The Second Workshop on the Social Implications of National Security
v. Knotts case when the Supreme Court again ruled ‘that the police did not have
to obtain a warrant under the Fourth Amendment before using a radio beeper to
monitor the movement and location of a vehicle.’58 The Court portrayed beepers as
a mere replication of the traditional, manual, police visual surveillance conducted
via physically tailing a vehicle.
In Kyllo v. United States in 2001 yet another twist to the interpretation of the
Fourth Amendment was played out. The Supreme Court declared that protections
within the boundaries of the home were only limited to devices that were not in
“general public use”.59 When one considers the proliferation of mobile telephones
many of which are now location-aware or GPS devices that are now found in upmarket vehicle models, the United States human tracking possibilities look vast.
What may this mean for average citizens wishing to take the law into their own
hands and begin to track one another?
At the state and local levels, courts hold differing positions based on their
jurisdiction. For the greater part, warrants must be obtained prior to the operation
of an electronic device to track an individual. In Washington’s highest court the
power of GPS to be more than a tracking device was recognized:
[U]se of GPS tracking devices is a particularly intrusive method of
surveillance, making it possible to acquire an enormous amount of
personal information about a citizen under circumstances where the
individual is unaware that every single vehicle trip taken and the duration
of every single stop may be recorded by the government.60
However, in the cases People v. Lacey and People v. Gant the opposite judgment
was reached on the same question of warrant requirements for a GPS tracking
device on a vehicle.61 This seemingly contradictory position of the State of Illinois
is disturbing especially when one considers the federal constitution in context and
the requirement for inter-state agreements in locating criminals or proceeds of
crime.Two of the most high profile cases where data was gathered using a GPS and
admitted as evidence was in the 1999 State v. Jackson and in 2003 State v. Peterson.
In the Jackson case a judge executed a search warrant on Jackson’s vehicles and
residence for ten days, and then subsequently granted two more warrants which
were extensions of time for the police to continue with covert surveillance.
Specifically, data showed that on November 6th, Jackson drove his truck
to rural Springdale and parked without leaving for forty-five minutes.
On November 10th, Jackson made a trip to Vicari and Springdale, two
remote sites, where he remained for sixteen minutes and thirty minutes,
respectively. The police discovered Valiree’s body in a shallow grave at
58 Herbert, above 48, 420-421.
59 Ibid 424.
60 Ibid 431-432.
61 Ibid.
Page 251
The Second Workshop on the Social Implications of National Security
the Springdale site and promptly arrested Jackson.62
It was the Jackson case which really demonstrated the power of GPS tracking
technology to justices all over America, in terms of the privacy implications. Counterarguments grew however as questions were raised about trusting law enforcement
personnel to act appropriately.63 In addition, the question of the right to privacy by
a suspected criminal also came to the fore.64 It was not until the Peterson case that
a judge reaffirmed that GPS location data was acceptable and fundamentally valid
as a generic methodology to employ in gathering evidence for a trial.65 What these
example cases reveal is that the warrant process and admissibility of evidence varies
dependent on the jurisdiction. This is magnified when one considers the absence
of provisions in an international setting.66
More recently the reliability of GPS data has come into question. While the
technology can have almost pinpoint accuracy, it does suffer from technological
limitations depending on environmental factors. There are a growing band of
domestic GPS-related cases in the United States, which have either been lodged
by individuals or unions,67 challenging companies or employers regarding GPS
accuracy and the individual’s right to be let alone.68 In most of the cases to do with
accuracy, GPS speed miscalculations or position fixes are at the heart of the matteremployees have either been fined for speeding in a company vehicle (e.g. truck), or
individual consumers have been charged an additional levy for allegedly crossing
state boundaries (e.g. car hire).69 In October of 2007, there were a few cases reported
62 Tenison Craddock, ‘Casenote: The Limitations on Police Regarding GPS Tracking Devices: A Necessary
Hindrance?’ (2005) 9 Computer Law Review & Technology Journal 506-507.
63 Ganz, above 17, 1325. ‘Global Positioning System (GPS)-based surveillance systems enable police to
cheaply and easily gather intelligence and evidence they would otherwise have to obtain through more
costly, cumbersome and risky means such as physical “tails” by pursuing officers. The efficiency gains GPS
tracking provides are especially significant because they enable police to extend their operational capability
with minimal incremental spending.’
64 Craddock, above 62, 510.
65 Ibid 511.
66 Byrne, above 41, 24. ‘Different results can also arise depending on which privacy law is breached and what
type of proceeding is in question.’
67 Email from William Herbert to Katina Michael, 10 April 2007. ‘… The union … is currently challenging
employers who have imposed GPS technology unilaterally on union members.’
68 See, eg, GPSTrackSys, 7th Circuit U.S. Court of Appeals Okays Surreptitious GPS Tracking by Police (4 February
2007) <http://gpstrackingsystems.biz/7th-circuit-us-court-of-appeals-okays-surreptitious-gps-tracking-bypolice/25/> at 1 October 2007. ‘The fourth amendment protects against unreasonable search and seizure,
but the judges ruled that the placement of a GPS tracking device without the suspect’s knowledge, does
not qualify as a search of his car. This is the first time the seventh circuit has weighed in on this issue,
which other circuits have split on. The court equated GPS tracking to police physically following a car, or
monitoring safety cameras to follow a car, neither of which amounts to illegal search and seizure.’
69 See, eg, Anita Ramasastry, Tracking Every MoveYou Make: Can Car Rental Companies Use Technology to Monitor
Our Driving? FindLaw (23 August 2005) <http://writ.news.findlaw.com/ramasastry/20050823.html> at 1
October 2007. ‘First, let’s look at the Connecticut case. It arose because American Car Rental had a policy
of charging its clients $150 for “excessive wear and tear” to the rental car, each time they drove over 79
miles per hour. American knew exactly when that occurred because its subsidiary, Acme Rental, used GPS
Page 252
The Second Workshop on the Social Implications of National Security
that stipulated that the U.S. government had terminated an employee’s contract
based on data collected covertly using the GPS chipset in the government-owned
mobile handset carried by the employee.70 Most of these latter cases have focused on
the physical location of the employee- e.g. that employees were claiming financial
remuneration for hours not physically worked at the office. But this too is open to
misinterpretation- what if the employee worked through his/her lunch break, or
took work home with them? We can see by this example how GPS data can reveal
only partial truths and cannot be used as the sole piece of evidence. GPS data also
has to be stored somewhere- and herein lies its greatest weakness- longitude and
latitude position coordinates can be changed on the fly to fabricate evidence (for or
against the defendant). Currently only 2 states in the U.S. require a company to let an
employee know when they are monitoring them.These cases are only indicative of
potential international issues that may arise when GPS is used to track suspects.
6
Human rights v. national security
Privacy advocates and civil libertarians often point to the erosion of human rights
through the development and application of novel technologies in the area of law
enforcement. It is true, that the new innovations pose legal and political challenges
but a balance must be struck between their usage for legitimate purposes such as in
the case of fulfilling an MLA request or formalised inter-state police cooperation,
and those that may be considered illegal and a breach of citizen privacy.71 The
growing problem is not that these technologies are diffused commercially but the
possibility that if they are used for law enforcement purposes, they will eventually
find their way into government mandated schemes for the general populous.72 In
quoting Jacques Ellul, privacy expert David Lyon, brings this notion to light:
“To be sure of apprehending criminals, it is necessary that everyone be
supervised.” Substitute the word ‘terrorists’ for ‘criminals’ and we have
installed in its cars to monitor renters’ speed as they traveled. Whenever GPS reported that the customer
drove at least 80mph for more than two minutes at a time, the company charged the customer’s credit or
debit card $150.’
70 See, eg,Allen Stern, Man Fired Thanks to GPS Tracking (31 August 2007) <http://www.centernetworks.com/
man-fired-thanks-to-gps-tracking> Center Networks at 1 October 2007. ‘The NY Post reports, “Schools
Chancellor Joel Klein yesterday fired a veteran worker whose movements were tracked for five months
through the GPS device in his cellphone, leading to charges that he was repeatedly cutting out early.’
71 Richard Abraham, ‘The Right to Privacy and the National Security Debate’ (2007) 78 Precedent 33. ‘…
Australia lacks an adequate framework for balancing the right to privacy (and human rights in general)
against competing rights and interests. … This is not an argument against maintaining a strong security
agency or enacting national security legislation. Instead, it is a call to improve the process by ensuring the
effective protection of the very rights they are said to protect.’
72 Otterberg, above 52, 670. ‘…[B]ut what concerns privacy advocates is the tracking of suspects and those
who have not yet been convicted of any crime. Privacy advocates draw parallels between such GPS tracking
and the Orwellian state—one where the average citizen must live and move about while knowing the
government may be watching and scrutinizing the individual’s every movement.’
Page 253
The Second Workshop on the Social Implications of National Security
an uncannily accurate description of the world since 9/11.73
For now, sweeping legislative changes that have taken place post-9/11 have
coincided with the widespread diffusion and use of human tracking technologies.74
The United States has been criticized in particular for their departure from human
rights standards; some even going as far as concluding that they have shown disregard
for the fundamental principles of international law.’75 Australia also has received
similar backlash by international political commentators:
The new legislation has serious implications for bodily, territorial,
communications and information privacy, specifically the Australian
Security Intelligence Organization Legislation Amendment (Terrorism) Act 2003
(Cth); Anti-Terrorism Act (No. 2) 2005 (Cth); and the Telecommunications
(Interception) Amendment Act 2006 (Cth).76
Perhaps what is most disturbing about the new legislation is its lack of clarity
in explicitly stating what devices can and cannot be used. For instance, in the
Australian Commonwealth Anti-Terrorism Act, a tracking device is defined as: ‘…
any electronic device capable of being used to determine or monitor the location of
a person or an object or the status of an object.’77 An electronic device could range
from a GPS wristwatch to an electronic ultra high frequency (UHF) bracelet to an
invasive radio-frequency identification (RFID) implant. In the United States, the
phrase “electronic instrument” is used instead.78 While legislation is drafted with
the knowledge that technology changes occur at a fast pace, there is an increasing
requirement for clarity, especially as embedded ‘beneath the skin’ technologies rise to
the fore. Chip implants clearly violate the individual’s private space, ie, they penetrate
the body. For civil libertarians the question is who decides whether someone is a
suspect to a crime? And if someone is innocent until proven guilty then how can a
government justify the use of tracking devices upon one of its citizens? The argument
is that technologies like GPS tracking technology are manifold more powerful than
police visual surveillance and that high-tech devices allow police to monitor people
73 David Lyon, ‘Sorting for Suspects’ (2004) 70 Arena Magazine 26.
74 Alan Davidson, ‘Electronic surveillance regulations’ (2004) 24(9) Proctor 31. ‘The [Patriot] Act authorizes
nationwide execution of court orders for pen registers, trap and trace devices, and access to stored email
or communication records.’
75 Bantekas, above 1, 18-19.
76 Abraham, above 67, 32.
77 Anti-Terrorism Act (No. 2) 2005 (Cth) s100.1(1)
78 Robert Chalmers, ‘Orwell or All Well? The Rise of Surveillance Culture’ (2005) 30(6) AItLJ 260. ‘At the
COAG meeting, the Commonwealth and States agreed on enhanced tracking (perhaps even pre-crime
electronic bracelets for people subject to control orders) and other extended law enforcement powers,
subject to extended sunset provisions.’ See also, Europa, ‘Ethical aspects of ICT implants in the human
body: opinion presented to the Commission by the European Group on Ethics’ (2005) <http://europa.
eu/rapid/pressReleasesAction.do?reference=MEMO/05/97&format=HTML&aged=0&language=EN&
guiLanguage=de> at 29 April 2007.
Page 254
The Second Workshop on the Social Implications of National Security
‘…for a much longer period of time, with much less chance of detection.’79
7
Recommendations
There are many recommendations that can be made towards the use of human
tracking technologies in inter-state police-to-police cooperation. However, first
there must be an acknowledgment that there is a via media in ‘protecting citizens’
reasonable expectations of privacy and permitting law enforcement officials to do
their job.’80 The via media is the radical middle, the radical centre, centrism, and
the third way philosophy.81 When one considers the extreme polar arguments they
are inherently flawed. Compare for instance the staunch position of some civil
libertarians who see all forms of surveillance in all circumstance as a degradation
of human rights versus some secret police organizations who wish to by-pass all
legal procedures. There is surely a middle position with a workable solution. Parts
of the solution may include the constitution of uniform procedures to be set up
and adopted for inter-state police cooperation, just as there currently are treaties
for MLA requests, police self-regulation to be more explicit about the acceptable
use of human tracking technologies with embedded prohibitive clauses, and the
mandate for warrants and court orders to be obtained prior to the implementation
and monitoring of an individual.82 A more difficult goal to achieve is the alignment
of state and federal laws of countries pertaining to human tracking technologies
and their limitations in terms of admissible evidence in a trial.83 This will come
with time as more and more international cases are heard on the matter of location
intelligence being used in a court of law to help in the conviction of a criminal.84
These recommendations are not merely meant to solve band-aid ‘jurisdictional
problems’ when police track individuals across state lines but are recommendations
towards a common protocol.85 Perhaps some of the more pressing questions that
79 Otterberg, above 52, 697-698. ‘The resultant lengthy, detailed record of one’s location then provides a
comprehensive picture of one’s life. Location information reveals everything from daily habits like stopping
at the same coffee shop on the way to work, to associations with other people, to visits to locales that reveal
much more about a person’s particular characteristics, affiliations or beliefs—such as a gay bar, a certain
church, synagogue, or mosque; a strip club; or various political and civic organizations.’
80 Simon Bronitt and Henry Mares, ‘Privacy in the Investigative Process: Striking a Balance?’ (2002) 14(3)
LegalDate 2. See also, Bantekas, above 1, 75. ‘In the preamble [of the Council of Europe Convention on
Cybercrime] reference is made to the need to maintain a balance between the interests of law enforcement
and respect for fundamental rights.’ See also, Colin J. Bennett and Rebecca Grant (eds), Visions of Privacy:
Police Choices for the Digital Age (1999).
81 See also, Lanham, above 30, 55.
82 Ganz, above 17, 1325-1326.‘While the use of GPS tracking devices grows among law enforcement, federal
law remains largely undefined regarding the need to obtain warrants before their deployment. State law
presents a similarly mixed picture…’
83 Ibid. ‘The federal-state split is a function of differing constitutional conceptions of personal privacy.’
84 Bassiouni, above 1, 682. ‘The need to harmonize the criminal international criminal justice system and
national criminal justice systems’ is a matter that is relevant to human tracking technology as well.
85 Otterberg, above 52, 679.
Page 255
The Second Workshop on the Social Implications of National Security
courts will face in the shorter term are: when is it appropriate to use particular
types of electronic devices for surveillance, for how long, and to monitor what type
of activity.86 These questions become even more complicated when we consider
them across borders.87
86 Chalmers, above 78, 260.
87 Malcolm Anderson and Joanna Apap, Police and Justice Co-operation and the New European Borders (2002).
Page 256
The Second Workshop on the Social Implications of National Security
18
ePassport security under
the microscope
Matthew Sirotich
Honours Candidate, School of Information Systems and Technology, University of
Wollongong
Abstract
This paper focuses on ePassport security which utilizes RFID chip technology. ePassports
are increasingly being used by governments to enhance the border entry and exit process.
The paper briefly describes the nature of RFID technology and its characteristics pertaining
to different aspects of security. The approach taken in this study is two-fold: experimental
in the first instance, followed by a proof of concept (POC). The experimental study uses
metrics to draw conclusions pertaining to the security, safety and privacy viability of the
ePassport. Conclusions drawn from the experimental work are used to inform a proof of
concept (POC) which provides one possible solution to eradicate the current issues related
to the existing ePassport implementation. The proposed ePassport system is then compared
to the existing ePassport using the defined metrics to determine which system provides
the end user with the most privacy and security. The basic premise for this study is that if
new technology is instituted to increase state security, then it should not be plagued with
problems which would only increase national security concerns.
Keywords: ePassport, radio-frequency identification, security
Page 257
The Second Workshop on the Social Implications of National Security
1
Introduction
A radio frequency identification (RFID) tag is a “tiny, inexpensive chip that
transmits a uniquely identifying number over a short distance to a reading device,
and thereby permits rapid, automated tracking of objects” (Jules, 2005a p. 1).
Fundamentally it is a device which responds to queries from readers with a unique
identification (UID) number. This paper deals exclusively with passive tags which
do not have their own power source and gain their power from reader interrogations.
As the medium for interaction is radio waves, the tag must be relatively close to
the reader because the intensity of the radio waves (and all other electromagnetic
waves) obeys the inverse square law.This law states that as the distance increases, the
intensity (I) decreases inversely by the square of the distance (d) (Centre, unknown).
I.e.
Once a message has been transported from the reader to the tag via
electromagnetic waves the tag will power itself through inductive conductance and
reply with its UID and optional information such as a Universal Product Code or
some predefined value. The reader will now capture this information and transmit
it to a back-end system.When this information is received it will be processed and
possibly shaped into structured queries (commands that search, alter etc a database)
that may be used to update databases (Wamba, 2006).
RFID is a wireless technology and hence interactions are not necessarily
observed meaning that there is the potential for transactions to occur in stealth.
With attributes like this, security conerns regarding tracking and much more are
coming into question (Want, 2004).
2
The cornerstones of security
Before this paper can proceed an understanding of what is implied by security
must be defined. Security is the provision of confidentiality, integrity, and availability
(Bishop, 2002).
• Confidentiality is the ability to keep a secret a secret, it is the provision to ensure
your private effects remain under your control. Access control mechanisms help
provide a user with confidentiality, such access control mechanisms are passwords,
tokens, biometrics, cryptography etc.
• Integrity is the assurance that data is correct and not malformed, i.e. it represents
wholly and truthfully the information it was intended to or originally documented
to.Two techniques exist to provide integrity which are prevention (which ensure
only authorized people edit data) and detection (the act of determining when
data has been altered such as a chesksum).
• Availability is the assurance that the data is accessible by authorized parties at all
times.
Page 258
The Second Workshop on the Social Implications of National Security
Cryptographic operations, data hashing and pseudo random number generation
are normally used to provide this security. A typical example of data hashing is the
MD5 scheme which “takes as input a message of arbitrary length and produces as
output a 128-bit “fingerprint” or “message digest” of the input” (Abzug, 1991). In
the RFID context it is however currently impossible (Brainard, 2004) for a passive
tag to carry out these calculations as they do not have their own power source and
gain their power from reader interrogations. As this is the case other techniques
such as embedded checksums must be applied to these RFID tags to ensure their
security.
3
RFID security approaches
Molnar et al (2005) take into consideration that the challenge is to provide
privacy protection without raising tag production and running costs. With this in
mind they developed the theory of privacy for RFID through trusted computing.
This proof of concept explains that tags will be developed to be used with dedicated
readers that contain a trusted platform module (TPM) which is also known as a
trustworthy reader.This ensures that a tag’s privacy is respected and hence data that
is not meant to be read by the reader is not read. The threat model they define is
that the reader can be compromised, but the TPM cannot as it is a tamper-resistant
hardware module. The reader is split into 3 distinct portions, the:
• ReaderCore–istheradiointerface,basicallyanRFIDreaderasweknowthem
today
• Policy Engine – software that controls reading to ensure it is preserving
privacy
• ConsumerAgent–enablesusersandorganizationstointerrogatethereaderto
ensure it is conforming to privacy standards (a monitoring tool).
When scanning of a tag is to occur, the policy engine receives a request for read
secrets, this is then passed to the TPM which determines if the reader core is valid.
If all checks are passed the data is given to the trusted root and the policy engine is
executed (Molnar, 2005).Yet the authors seem to cast doubt over their own proof
of concept. While they state that “these ideas could be implemented today,” they
go on to admit that “significant engineering challenges remain” before the product
can be shipped” (Molnar, 2005, p. 3). Seeing as this implementation of a TPM is
yet to be built and tested and a growing distain for trusted computing is evolving,
it can be assumed that this technology is under scrutiny by community groups.
Schoen (n.d.) is of the belief that trusted computing is not the answer as it delivers
users new risks of anti-competitive and anti-consumer behaviour. Another risk is
that manufacturers of trusted computing hardware may produce their products with
‘defects’ (Schoen, n.d.).
Another interesting security implementation for RFID tags that again places
the trust in the hands of the reader is the technical proposal of Jules (2005) which
Page 259
The Second Workshop on the Social Implications of National Security
describes ‘the privacy bit’. In this technical proposal a bit called the privacy bit is added
to the tags memory which tells readers if the tag is in private or public mode. The
theory relies solely on the readers being trustworthy and that restrictions are placed
on the firmware or software to ensure the readers respect tag privacy (Jules, 2005a).
As stated, this theory places the reliance of trust on the reader, what if rogue readers
were used such as those described by Newitz (2006)? Researchers such as Westhues
(2003) can devise their own readers, and it can be assumed that unscrupulous people
creating their own readers will not ensure that their devices are respectful of tag
privacy. Jules (2005) admits that the technology has not yet been released and also
admits that standards bodies have not accepted the idea, however Jules is relying on
developers to realize the problems of consumer privacy and maybe then his solution
may have a chance (Jules, 2005a).
The kill command is another technical approach which finally puts the onus
on the tag to be trustworthy. The tag has a built-in command such that when the
tag is authenticated to a reader, the reader can send the kill command to the tag
and the tag will self destruct rendering itself unusable.The issue however is that no
confirmation is given to whether the command was successful or if the command
even reached the reader. Karjoth et al. (2005) have presented a revised version where
visual confirmation can be observed as the kill command is a manual process of
removing a pull tab which is part of the antenna. When this tab is removed the tag
can no longer send or receive messages, nor power itself and hence is rendered useless
(Karjoth, 2005).While this option is attractive and appears to be the most viable and
most secure, it does not suit many environments as the user may wish for the tag
to operate for their own purposes.This kill command is however currently enabled
on RFID tags in circulation and is the first of the listed security technologies to be
used by consumers and businesses.
Finally blocker tags present a new perspective, instead of relying on encryption
and trust, deception is used. This system allows a tag to generate a set of 2k UID’s
which floods the reader with responses and leave it up to the reader to determine
which UID is the real one (Brainard, 2004).Whilst this approach is very promising
and has been shown to work in field studies and does not require changes to current
RFID systems, it can be categorised as malicious because the flooding process can
be described as a Denial-of-Service (DOS) attack (Jules, 2005a).
4
Established RFID security issues
As shown in section 3 there are avenues that can be followed to secure RFID
systems, however, each approach has its own respective limitations. This downside
means that the RFID security technique is flawed, as RFID systems cannot provide
any guarantees on confidentiality, integrity and availability as is explained below:
• Accessisnotalwaysauthenticated.Westhues’s(2003)deviceenableshimtoread
RFID tags in passing and gather the data off the tag.
Page 260
The Second Workshop on the Social Implications of National Security
• Integritycannotalwaysbepreserved.Integrityisprovidedviadetectionand
prevention. From the security approaches in section 3, it is obvious that none
implement either of these,
• Availabilitycanbecompromised.AsdetailedbyJules(2005a)denial-of-service
attacks can cause the reader to reset.
The major threats posed by RFID systems in humancentric applications are
tracking (the act of following a tags movements based upon its UID response to
interrogations) and inventorying (allowing a user to identify object(s) being carried by
another person) (Jules, 2006).Whilst this threat seems to contradict the reason RFID
tags exist (to track and find objects), in humancentric applications the user needs to
have the ability to be anonymous. Inevitably these shortcomings result in personal
security threats as people can be followed based upon the UID numbers emitted
by their personal effects. More seriously alarming though, personal information can
be edited and read by anyone with the technology and the know-how (Westhues,
2003).
5
RFID in ePassports and possible security attacks
An ePassport is just like an existing passport however it has an RFID tag inserted
in it which essentially holds the same information that is stored on the biographical
page of the passport.
The same information as a passport’s data page- passport holder’s name,
nationality, gender, date of birth, and a digitized photo. It will also store
the passport number, issue date, expiration date, and type of passport
(Department, 2005).
The RFID chip is simply a second data source which is used to verify the
printed data on the passport and hence identify the bona-fide holder with increased
confidence.The rationale behind the ePassport is to provide better protection against
misuse and tampering, reduce identify fraud, enhance border protection and provide
fast and efficient passport checks (Trade, n.d.). Civil libertarian groups especially
however question the motivation for the rapid implementation of the ePassport.
To use an ePassport, a user opens their passport to the biographical page and
presents it to the identification machine.This machine will read the specially prepared
area called the machine readable zone (MRZ) which provides the identification
machine with the ‘key’ to decrypt the public key (PKI) ciphertext which safeguards
the data. Once this step is complete, a check occurs to ensure the data on the
RFID matches the data on the passport’s biographical page (Trade, n.d.; Launch
of ePassport, 2005). The US state department has taken an experimental approach
to proving the security of their ePassports (which follow the same ICACO design
standards as Australia’s), however how secure this system is has been kept a secret.
Extensive testing has occurred however the department is not releasing their findings
(Gonsalves, 2005).
Page 261
The Second Workshop on the Social Implications of National Security
The most deep-rooted problem with RFID passports is not to do with the
technology itself, but the policies which govern the technology in the passport
domain. Coffee (2006) explains that “[a] passport with a failed e-chip remains
a valid travel document”. The reason this must be emphasised is because RSA
laboratories report that an RFID chip can be deactivated with nothing more than a
microwave (Labratories, n.d.). Furthermore RFID’s utilize the radio wave medium
to communicate, hence any transmission can be observed by a rogue reader within
the right range. Eavesdropping is a major security issue for RFID not just because
it is hard to stop, but harder still to detect (Juels, 2005b). Whilst the government
has employed Faraday cages into its ePassport design, it is not inconceivable that
an ePassport could become even a fraction open when being carried in a bag or
purse hence allowing it to become compromised (Lamb, 2006). On the successful
capturing of a signal through eavesdropping, the perpetrator is given the options
of:
1. using the signal in a replay attack: send the same signal again at a convenient
time such as when posing as the victim (Answers.com, n.d.) or;
2. an offline attack: where the signal is taken and interrogated to possibly break
the encryption etc (Chuvakin, 2004).
Moses (2006) has also documented claims by Laurie, which reveal that it is
possible to skim peoples’ information from their ePassport.This is contradictory to
the statements made by the Department of Foreign Affairs and Trade spokeswoman
that one canoe “compromise the security of Australia’s ePassport.”.The department
states that there is no way to read the RFID tag without first obtaining the key which
is printed in the machine readable zone on the biographical page of the passport.
However this information is simply a mixture of the date of birth, expiry date of
the passport and the passport number which Laurie explains can be determined
through sources such as online airline bookings (Moses, 2006). Due to this evidence
it is clear that another method must be constructed which allows this technology
to provide privacy and security for its users.
A reader can be set to continuously scan for ePassports, when one of interest is
found the user can follow the RF waves much like following an electronic beacon.
Critics such as Munro (2007) believe that the new ePassport systems could be
used to track a user quite simply if readers are placed in the right position. When
considering Gonsalaves (2005) claims that the RFID tags in passports can actually
be read from up to 30 feet, it is no wonder that conspiracy theories surrounding
the potential for governments to track passport holders are on the increase. These
notions are highlighted by the likes of Lamb (2006) who state that “[t]here’s clearly
something else that they [the government] have in mind here, and we believe that
they want the ability to track people without their knowledge.” These claims are
continuously given more force when it is considered that the US government
continued with the deployment of ePassports even after receiving 98% negative
feedback from the public regarding the proposal (Lamb, 2006). Whilst these claims
Page 262
The Second Workshop on the Social Implications of National Security
are not supported by current technical evidence, they do carry some weight.
Finally, the ePassport places all of the user’s personal information along with a
digital photo onto an RFID chip. It is all there for the taking, in one basket and plans
are in progress to use the same basket for even more. The ePassport was designed
conforming to guidelines provided by the (International Civil Aviation Organisation
(ICAO), one of the design aims for the ePassport is to “[provide] a path to the use
of ePassports to facilitate biometric or e-commerce applications” (Kaliski, 2005).
This increases the exposure of the ePassport and increases the risk of skimming
and tracking. All in all it is just giving unscrupulous people more opportunities to
steal your identity. All the user’s information is in a single location (the RFID chip)
for the taking. If someone does break into the chip they will have all the centrally
stored personal information and the owner would not even know it.Whilst this theft
of information could occur in a more clandestine fashion, simply by stealing the
passport and copying the information from the biographical page, the difference is
that someone may notice their passport physically missing, however they would never
know if someone remotely had broken into their chip and stolen their data.
6 Assessment of RFID’s in ePassports
Before a new, more secure implementation of an ePassport is possible, it is a
necessity to first asses the current technology being utilised. The rationale behind
these experiments is to create metrics by which to measure and assess security
in RFID which can then be reflected in an ePassport system. Not only are these
experiments paramount in assessing the current implementation of RFID tags in
ePassports, they are also central in creating a revised implementation of the ePassport
which will eliminate predecessor faults. The completion of each forthcoming
experiment will culminate in a value which will be either ‘breached’ or ‘resisted
breach’ as defined by the unit of measurement.
6.1 The Experiments
The following experiments were carried out with either Standard Apparatus 1
or Standard Apparatus 2.
6.1.1 Standard Apparatus 1
The apparatus used was a Motorola/Symbol XR400 RFID reader connected to
2 antennas configured in a non portal configuration. This system had an adjustable
reading range of approximately 3 meters to 1 centimetre.The antennas were facing
opposite directions and separated by a distance of 2 meters. The apparatus was
configured to scan continuously for Class 0 and Gen2 tags.Whilst this system had an
excellent read range, and was highly configurable with regards to scan frequencies,
distances and types, it did not have the capabilities to read the actual data stored
on the tag.
Page 263
The Second Workshop on the Social Implications of National Security
6.1.2 Standard Apparatus 2
The apparatus used was a BlackBay handheld RF scanner which was configured
to scan for ISO, Milfare, I-code and other protocols.This scanner had an extremely
limited range of less than 5 centimeters and hence was limited in its usefulness,
however it did allow for the data in tags to be read and stored.
6.2 Experiment 1- Injection attack on RFID
Aim: To determine the possibility of malforming database queries to cause
detrimental database functions.
Hypothesis: Injection attacks are malformed database queries which trick the
database into doing something otherwise illegal. This could be actions such as
editing a certain entry or dropping an entire table.This form of attack has occurred
time and time again over the internet in which interactive forms retrieve user
data (which may be malformed) and edit a central database according to the data
retrieved (Buehrer, 2005; Orso, 2005). It is to be assumed then that injection attacks
are possible for RFID systems as the only object changing in the two instances is
the medium upon which information is delivered to the back-end system (http to
wireless communications).
Method: The ‘Standard Apparatus 2’ was used to read a set of 3 RFID tags.The
tags ID and data were as follows:
ID
1111111111AAAAAAAAAAA1439
1111111111AAAAAAAAAAA1438
1111111111AAAAAAAAAAA1440
Data
Item1
Item2;Drop Table Data_table;
Item3
An SQL server is constructed with a table named ‘Data_table’ consisting of a
single column called data. This SQL server then interfaces with a simple program
which extracts the data held in the ‘docked’ scanner and constructs SQL queries
which insert the scanned data into the database such as “INSERT INTO Data_table
VALUES(“EXTRACTED DATA FROM SCANNER”);”.
Results: After the program updates the database with the first data element in
the docked scanner the database reflects:
Data_table
data
Item1
After the second data element is processed, the database reflects: ‘ERROR, NO
SUCH TABLE’
After the third and final data element is processed, the database reflects:‘ERROR,
NO SUCH TABLE’.
Page 264
The Second Workshop on the Social Implications of National Security
Security breach: Breached.
Conclusion: It has been shown that the malformed tag data deleted all items and
the entire database. After the second tag was added an error was reported stating
that the table specified ‘Data_table’ did not exist. This hence proves the hypothesis
correct and it can be stated that an Injection attack can occur on a database system
if the strings used to create the structured query are not parsed correctly.
6.3 Experiment 2- Blocking a reader
6.3.1 Part A - Faraday cage
Aim: To create a more secure Faraday cage in which to encase the ePassport to
address the current Faraday cage faults found by Flexills (2006).
Hypothesis: Currently a Faraday cage exists in the cover of the ePassport but as
Flexills (2006) pointed out, if the ePassport is thrown into a bag or purse and opens
only slightly, it is possible to read the passport.To overcome this, a purse like design
which is lined with a foil will alleviate the issues and prevent reads from occurring
unless the passport is removed from the purse.
Flap
Pouch
RFID TAG
Once complete the tag is placed into the pouch as shown and
the flap locked into place.
The Standard Apparatus 1 is then set to continuously scan
for the tag. The flap is then opened and the scanning is
allowed to continue. Finally remove the RFID tag completely
from the pouch and ensure the tag can still be read.
Lock
Figure 1- A Faraday Cage
Method: The Standard Apparatus 1 is used to firstly read a tag to create a control.
Alfoil was then used to fashion the below pouch allowing enough space in the
pouch to snugly fit the RFID tag.
Once complete the tag is placed into the pouch as shown and the flap locked
into place. The Standard Apparatus 1 is then set to continuously scan for the tag.
The flap is then opened and the scanning is allowed to continue. Finally remove
the RFID tag completely from the pouch and ensure the tag can still be read.
Results: The control tag returns its tag ID when it is not encased in the pouch
but when placed inside the pouch with the flap shut the tag ceases to respond
Page 265
The Second Workshop on the Social Implications of National Security
at all. Even when the flap is opened, the tag still does not respond. When the tag
is completely removed from the pouch the tag can be read and replies with the
correct tag ID.
Security Breach: Not applicable.
Conclusions: The new pouch enclosure design is by far a more secure method
to house an ePassport.The experiment proves that the tag cannot be read when it is
housed in the pouch, even if the flap is not secured. The current ePassport Faraday
enclosure is susceptible to reads when the ePassport is partially open hence suggesting
that the proposed enclosure will provide a higher degree of security.
6.3.2 Part B - External wave injection
Aim: To disrupt the reading of a tag for a short amount of time enabling a tag
to pass by a reader unnoticed.
Hypothesis: An RFID tag uses radio waves as its transmission media, hence
some device producing radio waves may disturb the transmission from the tag to the
reader or visa versa (Australia, 2007). This phenomenon will prevent the tag from
being read by a reader by either invoking destructive interference which degrades
the message such that sense cannot be made from it, or abolishes the message all
together. This occurrence will therefore enable the RFID tag to pass by the reader
unnoticed.
Method: Apparatus 1 is set up along with a Sony Ericsson S700i (GSM with
900MHZ radio transmission). The Sony Ericsson is placed 5 cm behind a tag
(class 0). The reader is then set to continuously scan the tag, which is hence read
continuously. The phone is then set to initiate a phone call (emit a large amount
of wave interference). The read rate is then assessed and then compared to the rate
recorded when the phone call is terminated.
Results:
Condition
Read rate
Before phone is introduced to system Approximately 1 read per second
Phone introduced, call not initiated
Approximately 1 read per second
Call initiated
0 reads per second
Security breach: Breached.
Conclusion: A large amount of wave injection into an RFID system can disrupt
reader interrogations causing tags to pass by unnoticed. This application could be
used to allow a user to pass by in stealth or even temporarily disable the chip in the
ePassport, reverting it to a basic passport.
6.4 Experiment 3- Skimming an RFID tag
Aim: To determine the possibility of tracking a user and skimming information
off their RFID enabled objects in a small scale example.
Page 266
The Second Workshop on the Social Implications of National Security
Hypothesis: Well-placed readers will provide enough information to allow
inference to take place to a high degree of confidence. These readers will not only
enable the tracking of a user, but also provide information about the RFID enabled
items being carried. This occurrence is highly intrusive and provides the system
owners the ability to profile and keep tabs on the user’s tag.
Method: The Standard Apparatus 1 is used but the antenna configuration is
modified to better model a real life implementation. Firstly 2 more antennas are
added to the reader and all readers read ranges are reduced to 35% (this approximately
reduces the read distance to 1.05 meters).The antennas are now spaced out around
a room such that the antennas read zones do not cross over and allow dead zones
(areas where no reader is monitoring the space) to occur to represent larger distances
between read points. The antennas themselves represent buildings or public places.
At selected antennas, tags are positioned to represent items that a user may wish
to take. A user is now given a tag with a recorded tag ID and encouraged to move
around the room at their own discretion and pick up any tags (items) as they please.
As the user now moves around the room with their unique tag ID they are tracked
via the antennas, each time a user enters an antennas zone, a log is formed with a
time stamp. This log reflects the time the tag ID was interrogated and the tag ID
itself. As the user picks up tags (items) and makes the transition to another zone, it
will be evident that they are carrying the tag as it will show up in a new zone with
their unique tag ID.
Results: Table 1 below represents the recorded events.The antennas were named
North, East, South and West for obvious reasons.
The table shows a user (1111111111AAAAAAAAAAA1437) started at the
Northern area. Two items were also positioned at the South and East areas. The
user progresses to the Eastern area and continues to slowly move into the southern
areas. Here they pick up an item (1111111111AAAAAAAAAAA1436) and continue
moving with this item into the Eastern area.
Security breach: Breached.
Conclusion: It is possible to track a user, skim for information regarding what
they are carrying and hence profile the user.The occurrence of this security breach
allows the RFID infrastructure owners to become ever more pervasive in the user’s
life. It allows the surveiller to know when a user carries out an act, when they
purchase something, when they are at a certain location and so much more. This
breach allows for the formation of a ‘Ralker’ (RFID Stalker) which under other
mediums is outlawed and only lawfully granted to governments under certain
circumstances.
Page 267
The Second Workshop on the Social Implications of National Security
Table 1- Experiment 3 results
TAG ID
1111111111AAAAAAAAAAA1437
1111111111AAAAAAAAAAA1436
1111111111AAAAAAAAAAA1431
1111111111AAAAAAAAAAA1437
1111111111AAAAAAAAAAA1437
1111111111AAAAAAAAAAA1437
1111111111AAAAAAAAAAA1436
TIME
STAMP
09:07PM
2/10/07
09:07PM
2/10/07
09:07PM
2/10/07
09:08PM
2/10/07
09:08PM
2/10/07
09:08PM
2/10/07
09:09PM
2/10/07
TAG
ANTENNA
TYPE
CLASS 0 NORTH
CLASS 0 SOUTH
CLASS 0 WEST
CLASS 0 EAST
CLASS 0 SOUTH
CLASS 0 EAST
CLASS 0 EAST
6.5 Experiment 4- Killing an RFID tag
Aim: To destroy an RFID tag such that it will no longer respond to reader
interrogations.
Hypothesis: An RFID tag contains a small circuit board, like all circuit boards
too much voltage or current will cause the board to overheat.As an RFID tag gathers
its electricity from electro magnetic frequency (EMF) radiation, it is assumed that
a large burst of EMF radiation will cause the circuit board to overheat.
Method: An RFID tag is firstly scanned to ensure that it is in working order.The
tag is then placed into a microwave and set on high for 10 seconds. The tag is then
removed from the microwave and scanned to determine if the tag is still usable.
Results: The RFID tag read correctly before entering the microwave, however
after 10 seconds in the microwave the RFID tag failed to respond to reader
interrogations. Whilst in the microwave a bright glow was recorded coming out of
the RFID tag, this was assumed to be the circuit board of the RFID tag frying.
Security breach: Breached.
Conclusion: The microwave appliance emits short 2.5 GHz waves called
microwaves when it is turned on. These high frequency waves caused an increased
voltage to flow inside the induction coil into the circuit board. This hence proved
that if a large burst of EMF waves comes into contact with an RFID tag it can be
destroyed.
6.6 Experiment 5- Flooding a reader
Aim: To flood a reader with so many requests, the reader either shuts down or
Page 268
The Second Workshop on the Social Implications of National Security
allows tags to pass by its reading range unnoticed.
Hypothesis: It is possible to flood a reader, but not overly practical as the amount
of tags required will not be easily concealable or manageable.
Method: Countless class 0 tags are placed within a single antenna’s read range.
One tag with a known ID is kept out of the read range to test if it can pass by
unnoticed.The reader is then turned on and the known tag is moved into the read
range and then removed from the read range. The known ID is then searched for
to determine if it has moved into the system unnoticed.
Results: A flood could not be created within the laboratory as not enough tags
were available to cause the reader to read incorrectly. This was shown by the tag
appearing each time it was introduced into the system and then removed.
Security breach: Resisted breach.
Conclusion: A flood attack on a reader is theoretically possible, however may
not practically be possible if a read range was reduced to 10 cm.There would not be
enough room to position enough tags to cause the flood to occur (for a summary
of results from each experiment, see table 2 below).
Table 2- Summary of experiments and metaanalysis and their effects on ePassports
Security Breach Does it impede on the privacy and security meant to be
provided by the ePassport?
Skimming
A user could be followed and profiled, a smart bomb could
be created if commonalities in data were found.
Injection attack A database could be destroyed hence rendering the ePassport
system useless.
Faraday cage
The failing Faraday cage in the current ePassport allows for
failing
rogue reading in stealth.
Killing a tag
A tag can be killed and hence reduce an ePassport back into
a paper-based passport. Hence no added security.
Copying a tag
An ePassport could be copied and the encryption taken
and mimicking home to be used in an offline attack to decrypt the data.
6.7 Compare experimental results with the work of Wethues
The work of Wethues (2003) has to be assessed in a meta analysis as the technical
requirements needed to build his device are beyond the scope of this study.To provide
credibility to Westhues’s findings as this study could not test his creation, Newitz’s
(2006) article is cited as it describes the device in question. Wethues (2003) has
developed a device which is capable of reading an RFID tag, copying the unique
ID emitted by that device and then replaying the captured ID to a reader. Simply
put, Westhues has created a ‘replay attack’ over the RFID medium. The device has
a small read range and requires the user to almost brush past the tag they wish to
Page 269
The Second Workshop on the Social Implications of National Security
copy, however if the device is set up near a read point, the read distance is magnified
enormously as the card is being ‘excited’ by another reader.This phenomenon allows
the device to read tags from behind a wall or over a distance (Westhues, 2003).
To provide the much needed credibility to these claims, Newitz (2006) describes
an encounter she has with Westhues.The author describes watching Westhues walk
past an Internet security company, CEO James Van Bokkelen with a concealed
antenna in the palm of his hand.Wethues returns to Newitz and plugs his device (via
USB) into this laptop to determine if a signal was correctly recorded. Convinced
that a successful read occurred, Westhues proceeds into the office building and sets
his device to ‘mimic’ mode and waves his antenna in front of the proximity reader.
Newitz (2006) concluded this device to be a complete success because the door
in front of them unlocked and opened. This occurrence reinforces that RFID tags
are not secure and can be copied at will. Furthermore, if this device was brought
into the ePassport domain, the device owner could walk through an international
airport stealing people’s passport details in stealth. They could then return home
and begin cracking the encryption hiding the data sets.With this information they
can begin to commit fraud and identity theft.
It has been shown that the current implementation of the ePassport was not
well-thought out and allows for unscrupulous people to steal personal information
and misuse this information.Through the meta analysis it has been shown that it is
possible to steal information using an RFID device and record the data. This data
could then be used in an offline attack as described by Sterling (2006) and Lettice
(2007). The added security that the ePassport is intended to provide is shown to
be non substantial but also shown to reduce the data security of its users. With this
knowledge it is assumable that another implementation must be sort after such that
the intended benefits can actually be achieved.
7 Proof of Concept
This paper has identified a number of shortcomings with the current ePassport
technology.The proof of concept below is aimed at developing an ePassport which
is more secure than the existing one by:
• RemovingtheabilitytoskimandtracktheePassportbyimplementingauser
verification system for the tag.
• Removingthelimsyencryptionsystemandreplacingitwithamulti-tiered
security system without a single point of failure.
• Providing a better implementation of the Faraday cage to deter rogue
scanning.
Page 270
The Second Workshop on the Social Implications of National Security
Figure 2- Message Flow Diagram
5 .1.1 Data flow di agr am
Step
User
1
User presents passport
open at machine readable
section to machine
Tag
2
Machine
Border Security
Sends search query
consisting of the
retrieved ID information
3
Responds with Users
fingerprint and pointer
to their information
4
5
Databases
Machine requests
fingerprint from user
User supplies fingerprint
to fingerprint reader
Matches fingerprint with
fingerprint on file. If match
sends pointer to database
6
7
Database replies with
User information and tag
password
8
Sends retrieved
password to tag
9
Replies with hashed user
information
10
Sends authentication
decision
11
Border security may opt to speak with the user (owner of the passport) or
simply rely upon the machines decision.
7.1 Steps Explained
Step 1: The user opens their passport to the machine readable zone and places
it on the read point of the machine. The machine will then scan the passport to
retrieve the data from the MRZ.
Step 2: The data that has been obtained from the passport is now used to
construct a database query.This data is simply date of birth, first name, last name etc
(information that is already contained on the passport).The query is then issued to
a database and a return is expected. This is the first layer of security, as a query that
retrieves no records means that the identity this person is attempting to masquerade
does not exist.
Step 3: If a match is found in the database, the users ‘fileprint’ (Khanna, 2004)
and a pointer to the user’s information in the second database is returned.
Step 4: The machine requests that the user place their fingerprint over the
fingerprint reader so that a ‘searchprint’ (Khanna, 2004) can be obtained.
Step 5: User supplies their own fingerprint (‘searchprint’) as the machine
requested.
Step 6: The ‘searchprint’ and ‘fileprint’ are now compared, if a positive match is
Page 271
The Second Workshop on the Social Implications of National Security
found then the pointer to the next database will then and only then be followed. If
the pointer is to be followed, the database will be queried with the pointer to directly
access the information required. This is the second step of security which proves
that the identity claimed belongs to that physical person through biometrics.
Step 7: The database replies with the user’s information (which is everything
that would be printed on the passport such as date of birth, names, etc.) along with
a tag password.This tag password exists in a 1–to-1 relationship by which only one
password exists for each unique tag.
Step 8: The retrieved password is issued to the tag. The tag will only respond
with its information when it receives the correct password. This system provides
a third step in security to ensure that the RFID chip within the passport is the
correct chip for this identity, if the correct password was not encountered the chip
would not respond. As a further security precaution, incorrect passwords could be
sent at random to the tag to ensure the tag is not compromised and programmed to
respond to anything.This password system is adapted from the kill-tag system which
when the correct password is received the tag calls its kill function and disables
itself. However this adaptation replaces the kill function with a reply function and
removes the standard reply function entirely as this proposed system never intends
for the tag to reply under any other circumstances.
Step 9: If the correct password was encountered, the response is a hash string
which is an ordered concatenation of the user’s information and password which
is then put through the MD5 hashing scheme.
Step 10: The machine will now hash the database retrieved user information and
compare the hash output to that obtained from the passport.This is the fourth step
in security which ensures that the information on the tag does actually represent
the bona-fide user.The reason the tag stores a hashed version rather than plain text
version is to ensure that skimming of tags can reap no reward. An authentication
decision (passed or denied) is determined by this comparison.
Step 11: This authentication decision can then either be sent to a border security
office manning the checkpoint at which point the officer may wish to conduct a
visual check also. Conversely, this system can be used on an unmanned checkpoint
and the decision will either allow the traveller to continue their journey, or prevent
them from continuing any further.
7.2 Questioning the “key” to the ePassport system
Currently ePassports use 3DES encryption for the data on the RFID tags.
Whilst this is an industry standard technology, the issue lies in the allocation of
the key to decrypt the data. When designing the current ePassport, ICAO decided
that the key to decrypt the data was to be composed using a concatenation of the
passport number, holders date of birth, and passport expiry date (in that particular
order). If an unscrupulous user was able to copy the passport data as detailed in the
meta-analysis above, and could combine this with a high level phishing attack, the
Page 272
The Second Workshop on the Social Implications of National Security
key space could be reduced considerably as detailed by (Sterling, 2006).To alleviate
this issue the proposed solution uses message digests. A message digest can never be
reversed to show the original data hence nobody can ever steal your information
from your passport in stealth. The issue with message digests is that because their
never reversed to their original form, somebody could make an ePassport to just hold
your message digest and nobody would be any the wiser.Whilst this is theoretically
possible, it is not very practical. In order to succeed in this form of attack, the attacker
would:
1. have to know the unique password for the ePassport he/she was trying to
copy; and
2. have to have the same fingerprint as the legitimate user; and
3. have to look exactly like the legitimate user.
7.3 Layers of security provided by the proposed system
There are 4 layers of security offered by the proposed system.
Layer 1: The data that defines a unique user is used as a query in the passport
holders database. If a match is not found it obviously shows that the passport does
not exist and hence the owner is attempting to act fraudulently. If a match is found, it
verifies that the user does actually exist and the document presented is legitimate.
Layer 2: To ensure that the person claiming to own the details in the passport
actually does, a biometric test is used. The user’s fingerprint (‘searchprint’) is taken
and compared to the ‘fileprint’ which belongs to the passport. If a match occurs, it
proves that the passport does belong to the bona-fide user.
Layer 3: Now that it has been established that the correct user is the holder
of the right passport, it is necessary to ensure that the right chip is in the passport.
This step prevents a person from cloning a passport and installing a fake RFID tag
in it instead. A unique password which corresponds to the passport in question is
sent to the tag. Upon receiving the correct password the chip will respond with
data, however if an incorrect password is encountered, the tag will remain dormant
and ignore all requests. To ensure someone has not altered the tag to respond at
any time, a sequence of passwords can be sent to the tag, all incorrect but one. If
the tag responds to an incorrect password, it can be assumed that the tag has been
tampered with.
Layer 4: The tag in the passport only stores hashed user values which are created
via a one way function and hence can never be reverted back to their original
form. This security feature preserves user data as personal information can never
be skimmed off the tag even if the right password is found. This means that smart
bombs cannot be made to be denominational as the hash string will not reveal
information regarding the country of origin etc.
7.4 Confidentiality
Preservation 1: The proposed system’s kill tag approach prevents a rogue reader
Page 273
The Second Workshop on the Social Implications of National Security
from tracking users as it is assumed that a rogue reader will not have the tags unique
password. Assuming this, a rogue reader will never get any form of response from a
tag. Hence the tag owner can travel at ease as their identity is never disclosed.
Preservation 2: In the event that a rogue reader does determine the tags unique
password, the information retrieved is in actual fact useless. The tag only stores
hashed information which according to the design and manifest behind hashing,
can never be processed back into its original form. Hence if a breach occurs and a
rogue reader does steal tag data, they have not stolen anything of worth.
7.5 Integrity
The integrity of this system lies in the comparison processes of stored
information to retrieved information.The system uses a multi-tiered authentication
verification process, by which a user makes an authentication claim (i.e. delivers a
passport to the machine) and must then verify that they actually own the passport
(via a fingerprint scan). This is again demonstrated when the tag must prove that it
belongs to the right passport which belongs to the bona-fide user by communicating
with the machine, if, and only if the correct password is received.This phenomenon
culminates in a final authentication and verification process by which the tag’s
hash string is compared to the on file hash string. This multi-tiered process aims at
ensuring that changes to data cannot occur, but ultimately if they do occur, one of
the tiers of authentication and verification will determine the fraudulence.
7.6 Availability
The user verification system for the tag is a simple means to provide the
availability characteristic as this scheme requires a password to read the tag. It is
assumed that only a bona-fide user will have the password and hence only makes
the tag available to intended users.
7.7 Databases
The user verification system for the tag is a simple means to provide the
availability characteristic as this scheme requires a password to read the tag. It is
assumed that only a bona-fide user will have the password and therefore the tag is
made available to intended users alone.
The reason the two databases (figure 3) are set up into an array is a performance
consideration and is intended to reduce the search space and hence allow for practical
searching. Using Australia as an example, the top 20 surnames are tabulated and the
total frequency of each of the first letters is recorded in figure 4.
The ‘W’ category holds 160,303 occurrences and when put into perspective
accounts for 20.9% of the top 20 occurrences. Applying this figure to the Australian
population as a total (approximately 20 million) to provide a rough generalization,
it is possible to see that the W database may hold approximately 4 million entries.
Considering that ‘Google’ can search its indexes and return 2,370,000,000 entries
Page 274
The Second Workshop on the Social Implications of National Security
for the letter ‘e’ in 0.09 seconds it is hence assumed that the intended database model
will function efficiently. Data was tabulated using Wikipedia (2007) who gathered
their results from IP Australia, Government of Australia.
1.
Ac cess es
data base
according
to
surname
(A -Z)
K
2. Re turns
dat a along
with a
pointer
(*PTR)
3. The *PTR is a memory
address in the 2nd database
array, hence no need
for searching
A
F
Application
User
P
U
4. Re turns
requested
data
A
F
K
P
U
Figure 3- Accessing records from the database
Figure 4- Letter-specific databases for faster searching on surname
Page 275
The Second Workshop on the Social Implications of National Security
7.8 Policy
Currently border security will accept an ePassport with a faulty RFID chip as
a legitimate identification document (table 3). This policy is a critical mistake as it
circumvents the reason the ePassport was created. If an unscrupulous person disables
an RFID chip, the ePassport is now only as secure as a passport without an RFID
chip. This is obviously a problem or else why would the government have wished
to introduce an ePassport? To remedy this, the policy surrounding the proposed
implementation of an ePassport will define a passport with a faulty RFID tag as
an illegitimate identification document and will take note of the owner for further
investigation.
Table 3- ePassport comparisons
Possible security
breach
Tracking
Killing
Injection attack
Blocking security device
Wave injection attack
Steal information
Flooding
TOTAL
Current ePassport
Proposed ePassport
Breach
Resisted Breach
Breach
Resisted Breach
Breach
Breach
Breach
Resisted Breach
Breach
Breach
Breach
Resisted Breach
Resisted Breach
Resisted Breach
Breach=6,
Breach=2,
Resisted Breach=1
Resisted Breach=5
Tracking: The proposed ePassport can only be tracked if the right password is
issued to the tag or else no response will be obtained, however the current ePassport
will respond to anything.
Killing: Both implementations are susceptible to a tag being destroyed however
the policy for the proposed implementation ensures that this occurrence does not
lead to a breach.
Injection attack: Both systems are perceptible to an injection attack if their
back-end systems are not configured correctly.
Blocking security device: The Faraday cage that houses the current ePassport
fails if the passport is only slightly open (this may occur if thrown into a bag).
The proposed enclosure stops the ePassport from opening, hence preventing an
inadvertent read window.
Wave injection attack: Both systems are perceptible to this attack as it attacks
the core technology.
Steal information: The current ePassport contains encrypted information
which can be decrypted, the proposed implementation keeps one way message digests
of the data which can never changed back into the information’s original form.
Flooding: Both the new and the proposed system would require so many tags
Page 276
The Second Workshop on the Social Implications of National Security
to actually produce a flooding attack that they could not all be concealed.
8
The irony of it all
“[A]ny system is only as secure as its weakest point of entry” (Microsoft,
n.d.).
Whilst this quote was not originally used in the context of ePassports, it applies
itself with the same meaning. By reviewing the process of obtaining a passport in
Australia the weakest points are quickly identified which render all attempts to secure
a passport useless. Figure 5 shows the relationship between these important personal
documents. It also shows that the single point of failure is the birth certificate. Zill
(n.d.) also takes this point of view and denotes a birth certificate is “a “weak” document
because it is relatively easy to forge and has no photo or fingerprint requirement
(Zill, n.d.). Following the schema presented, once a birth certificate is obtained, a
Medicare card can also be obtained.A driver’s license is the next obvious progression
as both a Medicare card and birth certificate are in possession. Finally, a passport can
be obtained as all the vital government documents are in possession. The previous
chronological investigation shows that a passport is not made secure by enhancing
the technologies and policies surrounding it, as an illegitimate passport can easily
be obtained using fake seminal documents. It is important however to realize that
the basis of this paper is not to solve the existence of fraudulent passports, but to
ensure that if this particular RFID technology ‘must’ be used, that the technology
is applied in such a way that it does not cause new afflictions upon society.
Passport
B i rth
C ertif i cate
Drivers
License
Medicare
C ard
B i rth C erti fi cate
Parent bi rth
certi fi cate
Parent
Medicare
card
M edi care
C ard
Parent
Drivers
license
B i rth
C ertif i cate
D ri vers L icense
B i rth
C ertif i cate
Medicare
C ard
Figure 5- Important personal identification documents
Page 277
The Second Workshop on the Social Implications of National Security
References
Abzug, M, T. 1991. MD5 Homepage (unofficial). Abzug, M, T. [Online] 1991.
[Accessed: 13 April, 2007] http://userpages.umbc.edu/~mabzug1/cs/md5/
md5.html.
Answers.com. n.d. Replay attack. Answers. [Online] Computer Language
Company Inc., n.d. [Accessed: 14 April 2007] http://www.answers.com/
topic/man-in-the-middle-attack.
Australia, Commonwealth of. 2007. Mobile Telephones Scientific Background.
Australian Radiation Protection and Nuclear Safety Agency. [Online] 2007.
[Accessed: 30 August 2007] http://www.arpansa.gov.au/mobilephones/
mobiles1.cfm.
Bishop, M. 2002. Computer Security: Art and Science. s.l.: Addison Wesley
Professional, 2002.
Brainard, J. Jules A. 2004. Soft Blocking: Flexible Blocker Tags on the Cheap.
Washington: Communications of the ACM, 2004.
Buehrer, G, T. Weide, B, W. Sivilotti, P, A, G. 2005. Using Parse Tree Validation to
Prevent SQL Injection Attacks. Columbus: ACM, 2005.
Centre, Radiation Emergency Assistance. n.d. Definitions related to radiation.
Radiation Emergency Assistance Centre/Training Site. [Online] n.d.
[Accessed: 4 November 2007] http://orise.orau.gov/reacts/guide/
definitions.htm.
Chuvakin, A. Peikari, C. 2004. Protect Yourself Against Kerberos Attacks.
WindowsDevCenter. [Online] O’Reilly, 2004. [Accessed: 14 April 2007]
http://www.windowsdevcenter.com/pub/a/windows/excerpt/swarrior_
ch14/index1.html.
Department, U.S. State. 2005. U.S. passports get tagged. s.l.: Expanded academic
ASAP, 2005.
Coffee, P. 2006. Passport to a Void Promise; Solving the wrong problem in the
wrong way is a stupid tech trick. eWeek. Aug 2006,Vol. 23, 34, p. 16.
Flexills. 2006. RFID Passport Shield Failure Demo.YouTube. [Online] Flexills,
2006. [Accessed: 15 April 2007] http://www.youtube.com/wath?v=XXaqraF7pl.
Gonsalves, C. 2005. A Ticket to Trouble; RFID-enabled passports pose privacy,
security risks. eWeek. 2005,Vol. 22, 19, p. 33.
Jules, A. Riverst, L, R. Szydlo, M. 2003. The Blocker Tag: Selective Blocking of
RFID Tags for Consumer Privacy. Washington: Communications of the
ACM, 2003.
Jules, A. 2005a. RFID Privacy: A technical primer for the non-technical reader.
MA: RSA Labratories, 2005a.
Kaliski, B. 2005. ravel Security and Function Creep: Thinking about the
ePassports in the Long Term. Speaking of security. [Online] 2005. [Accessed:
15 April 2007] http://www.rsa.com/blog/entry.asp?id=1019.
Page 278
The Second Workshop on the Social Implications of National Security
Karjoth, G. Moskowitz, A, P. 2005. Disabling RFID Tags with Visible
Confirmation: Clipped tags are silenced. Workshop on Privacy in the
Electronic Society. November 7, 2005.
Khanna, R. 2004. Systems Engineering for Large-Scale Fingerprint Systems.
[book auth.] N. Bolle, R. Ratha. Automatic Fingerprint Recognition
Systems. New York: Springer-Verlag, 2004.
Labratories, RSA. n.d. FAQ on RFID and RFID privacy. RSA Labratories.
[Online] n.d. [Accessed: 15 April 2007] http://www.rsa.com/rsalabs/node.
asp?id=2120#13.
Lamb, G, M. 2006. New ‘e-passports’ raise security issues; Despite official
assurances, some worry that thieves might read chip- toting US passports.
Boston: s.n., 2006, p. 13.
Launch of ePassport press conference. Downer, A. 2005. Canberra: http://www.
foreignminister.gov.au/transcripts/2005/051025_ePassport.html, 2005.
Lettice, J. 2007. How to clone a biometric passport while it’s still in the bag. The
Register. [Online] The register, 3 2007. [Accessed: 8 August 2007] www.
theregister.com/2007/03/06/daily_mail_passport_clone/.
Microsoft. n.d. Microsoft’s approach to secure government systems. Microsoft
Government. [Online] Microsoft, n.d. [Accessed: 1 October 2007] http://
www.microsoft.com/industry/government/securityprivacy.mspx.
Molnar, D. Soppera, A. Wagner, D. 2005. Privacy for RFID through Trusted
computing. Workshop on Privacy in the Electronic Society. November 7,
2005.
Moses, A. 2006. Passport hacker warns of identity risk. Sydney Morning
Herald. [Online] 2006. [Accessed: 14 April 2007] http://www.
smh.com.au/news/security/passport-hacker-warns-of-identityrisk/2006/12/12/1165685661999.html.
Munro, K. 2007. SECURITY MATTERS: Broadcast your details with an RFID.
February 28, 2007, p. 1.
Newitz, A. 2006. The RFID Hacking Underground. Wired. May 2006, 14.05.
Orso, William G.J. Halfond and Alessandro. 2005. AMNESIA: Analysis and
Monitoring for NEutralizing SQLInjection. California: ACM, 2005.
Schoen, S. n.d. Trusted Computing: Promise and Risk. Electronic Frontier
Foundation. [Online] n.d. [Accessed: 13 April 2007] http://www.eff.org/
Infrastructure/trusted_computing/20031001_tc.php.
Staake, T. Thiesse, F. Fleisch, E. 2005. Extending the EPC Network - The
Potential of RFID in Anti-Counterfeiting. Symposium on Applied
Computing. March 13-17, 2005.
Sterling, B. 2006. Arphid Watch: Find Own Foot, Aim Hastily, Pull Trigger.
WIRED. [Online] WIRED, 17 11 2006. [Accessed: 8 August 2007] http://
blog.wired.com/sterling/2006/11/arphid_watch_fi.html.
Thorsteinson, P, G. Ganesh, G, A. 2003. .NET Security and Cryptography. Upper
Page 279
The Second Workshop on the Social Implications of National Security
Saddle River: Prentice Hall, 2003.
Trade, Department of Foreign Affairs and n.d. The Australian ePassport. Australian
Government: Department of foreign affairs and trade. [Online] n.d.
[Accessed: 20 April 2007] http://www.dfat.gov.au/dept/passports/.
Wamba, S, F. Lefebvre, L, A. Lefebvre, E. 2006. Enabling Intelligent B-to-B
eCommerce Supply Chain. ICEC’06. 2006.
Want, R. 2004. Enabling Ubiquitous Sensing with RFID. Computer. 2004,Vol.
37, 4.
Westhues, J. 2003. Proximity Cards. cq.cx. [Online] October 2003. [Accessed: 29
March 2007] http://cq.cx/prox.pl.
Wikipedia. 2007. List of most common surnames. Wikipedia. [Online] Wikipedia,
05 2007. [Accessed: 1 October 2007] http://en.wikipedia.org/wiki/List_of_
most_common_surnames#Australia.
Zill, O. n.d. Crossing borders: How terrorists use fake passports, visas and other
identity documents. PBS. [Online] PBS, n.d. [Accessed: 1 October 2007]
http://www.pbs.org/wgbh/pages/frontline/shows/trail/etc/fake.html.
Page 280
The Second Workshop on the Social Implications of National Security
19
Improving information security
management: an Australian
universities case study
Tim Lane1 and Lauren May2
Graduate, 2 Senior Lecturer, Information Security Institute, Queensland University of
Technology
1
Abstract
Universities have an important role to play in the nation’s security - as well as the broad
social responsibility, the management of information security in Australian universities
is increasingly recognized as being strategically important to overall business continuity.
Despite this acknowledgement, many issues continue to hamper the effectiveness of realworld information security management in contemporary organisations such as universities.
Universities rely heavily on secure IT systems for the support of administration, teaching,
learning and research. On one hand data needs to be protected yet remain easily accessible.
The practices associated with collecting, storing and using data related to individuals
introduces issues of information aggregation akin to dataveillance. One perspective is to
acknowledge the inevitability of technologies used in this way and to pursue information
security policies and controls that reflect effective strategies accepted by the University
community. In order for this to occur an approach is required that takes into account
specific organisational requirements in a coordinated and structured manner. This paper
proposes a workable security practitioner’s management model designed specifically for the
enhancement of information security management by operational security staff in Australian
universities. The model is based on the results of a comprehensive survey of all Australian
Vice Chancellor Council (AVCC) listed Australian universities, with a 100% participation
rate. This is significant research as it is the first investigation of its kind in the Australian
university sector and has substantive implications for future directions.
Keywords: information security, information security management, security and privacy
Page 281
The Second Workshop on the Social Implications of National Security
1
Introduction
Universities have a role to play in the nation’s security. The social implications
of this role recognise that universities need to protect both their own information
(as individual institutions and as a sector) and as such become custodians for
important information and infrastructure in broader society. Looked at from a
social perspective, universities host a large number of diverse systems from both a
business and academic viewpoint. The sector also characterises a fertile breeding
ground for IT exploration and research as well as reflecting and promoting good
community standards through their practices, customs and processes. These factors
inevitably link universities to playing a key role in the broad security of the nation,
albeit not directly Critical Infrastructure Protection (CIP).
It is of interest that research on information security management in the
Australian university sector has had very little academic focus.The general research
that does exist on information security management often focuses predominantly
on context specific models for management or
specific behavioural aspects of managing security - not both. Existing management
models tend to concentrate on specific approaches for aspects of security (for
example risk management), whereas behavioural aspects often focus on areas such
as policy and awareness. What is lacking in the literature is a systemic approach to
the management of security specifically in Australian universities. A model which
integrates and shows the relationship between the organisational context, behavioural
aspects and a functional management model is therefore of practical use to security
practitioners.
1.1 The university environment
Universities are amongst the growing number of institutions that increasingly
acknowledge the importance of protecting information which is relied upon for
business purposes. Despite an acknowledgement of the importance of information
security to Australian universities, existing approaches, standards and guidelines
for security are not necessarily integrated. They do not provide a single point of
understanding for how the process of information security should be managed.
There is certainly no overall governance for how information security should be
managed within the higher education sector or sector specific recommendations.
The function of information security management in universities tends to
be wedged between conformity to corporate mandates linked to the business of
providing education on one side, and conversely the open cultural and pedagogical
pursuit of academic teaching, learning and research on the other side. Security
becomes somewhat of an art form in this environment, requiring navigation through
the various complexities of university culture and challenges. One aspect that
differentiates universities from a corporate environment is the fact that developers of
software and technology in universities attempt to enhance their reputation within
Page 282
The Second Workshop on the Social Implications of National Security
the scientific community, as opposed to basing motivation on purely economic
gain. This means that developments tend to occur with a regard for matters that
are deemed important to peers, and occur with a level of autonomy from economic
driven activity (Kesan and Shah, 2004b). Although this can be beneficial, one key
responsibility for universities in this rather exploratory environment is to ensure
that abuse of power in information collection, access and dissemination is regulated
through reasonable accountability and transparency.
Managing information security in the Australian university environment is
complex and remains a challenging area. It tends to be obfuscated by university
culture and operating environments. The practical implementation of information
security operations therefore requires a solid foundation from which to operate. In
determining how information security management could be improved in Australian
universities, analysis of the factors and issues that facilitate or impede information
security in Australian universities is necessary.
1.2 Literature overview
The literature review involved a broad-brushed approach to ensure adequate
coverage of information security.The areas focused on included senior management
involvement for effective corporate governance, approaches to operational security
management, policy frameworks and content, awareness of security and finally
cultural compliance to security.The literature review highlighted that, although the
need for information security is acknowledged and considered important, in many
cases security is not prioritised in line with its accepted importance.This is reflected
by a lack of prioritization, inadequate funding and a general lack of awareness and
understanding. These contributing factors include the intangibility of information
security issues, inadequate security governance, reactive approaches to managing
security and resistance by users due to work practice impacts.
To place historical context on the management of security,Von Solms (2000)
provides a perspective through three distinct generational waves.Von Solms proposes
that the first generation, the first wave, which he calls the technical wave, existed up to
the early eighties and was distinguished by a very technical approach to information
security (such as mainframe terminals and batch Electronic Data Processing (EDP)).
During this stage however, the technical administrators realised they would need
to obtain further management involvement, giving way to the second wave. The
second wave, which ranged from the early eighties to the mid nineties, is labelled the
management wave.This wave is characterised by an increasing interest and involvement
by management in information security.This wave supplemented the technical wave
and increased the importance of information security.
While improvements were seen under the management wave, the need for a more
comprehensive approach was identified - specifically, understanding security risks and
the commensurate value and effectiveness of information security to the organisation.
This necessitated the ability to measure and compare information security against
Page 283
The Second Workshop on the Social Implications of National Security
a baseline, as well as against other institutions. This saw the development of the
third wave, called the institutional wave. This is the existing wave today. This third
wave is represented by the recognition of and interest in, international standards,
codes of practice, security certification, cultivating a corporate security culture, and
dynamic and continuous security measurement. This third wave also incorporates
the ubiquitous requirement for security to transcend traditional notions of purely
restricting access to data. Restricted access must increasingly co-exist with open
access. This dichotomy of open access is not without criticism, as achieving a
balance in access and privacy is a subjective process depending on the perspective
of the observer. The literature review offered insights and potential explanation for
security problems, however further articulation and expansion through specific data
gathering was necessary to improve information security management at Australian
universities.
1.3 Methodology
The research problem is presented in three questions:
• Whatisthecurrentstatusofinformationsecuritymanagement?
• Whatarethekeyissuessurroundinginformationsecuritymanagement?
• Howcouldinformationsecuritymanagementbeimproved?
The research project applied a qualitative approach and used two main methods
to gather data. The primary data generation method involved applying a survey
instrument containing 35 open and closed questions to every Australian Vice
Chancellor (AVC) University in Australia. The objective of the survey tool was to
identify factors that affect the management of information security in contemporary
Australian universities from an operational perspective. The survey participants,
therefore, were university professional staff whose responsibilities include the direct
management of information security issues. This necessarily limited the scope by
not including end-user personnel such as administration staff, academic staff and
students.
The participation of all 38 universities represented a 100% survey response
rate. The survey was conducted via interviews over the telephone with the IT
Director and/or Security Manager equivalents. Each interview averaged 30 minutes
and was digitally recorded, then transcribed verbatim to a word processor. This
produced over 70 000 words of text, providing a very rich data set for analysis.
The secondary data gathering method involved the researcher as an instrument
through the role of Information Security Manager at Southern Cross University.
This provided opportunity for observation in the field as well as review and analysis
of various written material. Qualitative data analysis was applied to data sets in
order to identify themes, patterns and relationships. Theoretical constructs were
generated from the gathered data, validated from the literature and synthesized
into a Security Practitioner’s Management Model (see Section 3). The security
Page 284
The Second Workshop on the Social Implications of National Security
model aims to facilitate the transition of expert security practitioner knowledge
into implementation. This is achieved through channelling security knowledge
through the model’s abstracted security framework, focusing on an end goal of
cultural compliance towards security.
2
Information security management issues
The findings of the survey were wide ranging for each research question:
What is the current status of information security management? The survey results
primarily indicated that the status of information security management in Australian
universities varied between each institution dependent on a number of factors.These
factors included the security management method, senior management support
and involvement, resourcing and funding, the capacity to defend against security
threats, the level of IT centralisation, and the overall culture of the organisation. An
important finding was that the champion of information security (from a strategic
and operational management viewpoint) often occupied a non-senior position
within the central IT department, reported mainly within the IT department, and
yet had wide ranging responsibilities for security impacts across the business. This
person often had the most specialised knowledge of security and its impacts yet was
not always positioned with appropriate authority for decision making. A critical
finding was that a common method adopted to manage information security was
cited as being based largely on incident management, reflecting a reactive approach.
Comments and views expressed by participants supported the notion that a relatively
unstructured and reactive approach to managing security existed in many institutions.
This situation was reflected by an ad hoc approach to managing security, a general
lack of adoption of standards, a lack of security strategic plans and a cited lack of
full integration of security within the business processes and budgets for IT. In
summary a broad based enterprise wide approach to coordinated security efforts
was not prominent amongst institutions.
What are the key issues surrounding information security management? The key
findings identified that a lack of structure in managing information security impacted
effectiveness of security efforts across the organisation. The lack of an appropriate
structure to integrate throughout the enterprise business processes resulted in
security controls applied in an ad hoc manner, ensuing consequences of which
easily progress to a reactive nature to be apparent and, eventually, shortcomings in
resourcing and funding. A significant gap also existed between desired and actual
awareness of information security risks across the university community at large. A
major cause for this was cited as the intangibility of security in conjunction with
low perception of threat levels. This in turn impacted a broad number of other
issues, including work practices, allocation of resources and funding, prioritisation
of security, acceptance of the reality of risk, development of clearly written and
communicated policy, and general compliance to security.
How could information security management be improved? A structured and
Page 285
The Second Workshop on the Social Implications of National Security
coordinated approach was needed to improve effectiveness of current information
security management approaches. Developing a more structured and coordinated
management framework for progressing security within the university community
was seen as an essential step in delivering improved security management. The
human element of information security was seen as one of the greatest barriers to
improving security and therefore one of the key factors to focus on for improvement.
It is suggested by Kevin Mitnick (2002) that social engineering exploits will
increase as technology improves to the point that human weaknesses must be used.
Mitnick focuses on the human factor as a weakness that is exploited and cites many
examples of how security is generally an illusion. This illusion results from the fact
that people from a behavioural perspective wish to view themselves as secure, and
tend to believe that others are acting in a manner conducive to overall security,
when in fact this may not be the case. The goal of a culture of compliance towards
security was commonly highlighted through the research as the best strategic
goal to aim for, involving increased awareness of security issues. Engaging senior
management to help security resourcing and funding was also seen as a key step. A
gap was highlighted in that the use of existing common management frameworks
such as AS/NZS 27001:2006 was seen as helpful in what to implement but did
not necessarily assist in understanding how to progress security more effectively. An
integrated, structured approach was cited as being necessary to improve security
management throughout Australian universities. In this context integrated relates
to bringing together the necessary components and incorporating them into the
model itself, while structured implies replacing ad hoc approaches with a more clearly
defined and coordinated approach.
2.1 Senior management involvement
The coding results established that funding and resourcing is considered to be of
significant importance and a major function provided by senior management. This
is a function that impacts directly on the capacity to deliver security services. As
evidenced through the coding results, participants tended to focus on funding as a
primary gauge of support levels by senior management. In broad terms, participants
consider senior management support as critical and essential to information
security reflected by Senior Management Support ranking first out of the top three
critical success factors by participants.The survey established clear benefits to those
organisations that had in place active reporting and communication structures with
senior management. Despite the clear requirement for senior management support
for information security, however, less than one third of universities indicated that
they regularly reported on information security to senior management.
Key Issues Surrounding Senior Management Involvement: A strong correlation
existed between participants who considered senior management to be `involved
and engaged’ in security, and corresponding levels of support received from senior
management. Similarly, institutions who indicated that support was lacking correlated
Page 286
The Second Workshop on the Social Implications of National Security
with those institutions who reported that senior management was either not
`engaged’ with security or had a low level of awareness surrounding security issues.
The findings from this survey are also supported by findings from Knapp et al (2006)
in their survey involving 220 certified information system security professionals.The
results of their study indicate that `evidence suggests that top management support
is a significant predictor of an organisation’s security culture and level of policy
enforcement’. These findings lead to several primary interpretations. Firstly, senior
management support is considered to be critical to the success of the information
security function, particularly by way of funding and resourcing. Secondly, not
withstanding other organisational constraints, senior management is more likely
to be supportive of security if they are informed and engaged. Thirdly, increasing
senior management awareness is most likely to be achieved by ensuring that senior
management is included within the overall `structure’ of security management.This
is achieved through the process of regular liaison and reporting with the view of
increasing understanding and awareness of risk.
Improving Senior Management Involvement: Security is not always considered as
being an essential part of corporate governance by senior management, reflected
by the lack of established forums or committees regarding security and the fact
that security is rarely cited on documentation related to Universities’ corporate
governance. Fitzgerald (2005) suggests that a security committee has the capacity
to facilitate collaboration, ensuring that representative viewpoints are taken into
consideration.Without a council or committee, the Information Security officer is
effectively working in isolation, attempting to move initiatives forward, and obtaining
business management support one person at a time. Similarly, Peltier (2004)
maintains that for an information security management program to be effective, an
information security steering committee must be established, to act as a champion
of security. In order to elevate information security out of the technical realm into
the business realm, it is argued that having a structure for security provides a tangible
context for senior management (Dutta and McCrohan, 2002).This facilitates senior
management viewing security from an enterprise approach and lends support to
the security practitioner’s management model.
2.2 Security management approach
A clear pattern emerging from the study was the requirement for an improved
structure and coordination of how security was being managed. Almost half the
participants only somewhat agreed that the existing management approach adopted
for managing security was effective, and less than one third agreed that their approach
was effective.This finding has potential for much improvement.This situation clearly
indicates that a structured approach is deficient, despite the availability of references
such as the AS/NZS 27001:2006 Information Technology - Security Techniques –
Information Security Management Systems – Requirements, as well as a large range of
other security best practices, guidelines, standards and frameworks. The issue is not
Page 287
The Second Workshop on the Social Implications of National Security
so much what to implement (although this is extremely important), but more how
to implement security (that is, the processes and procedures). This problem appears
to be commonplace across higher education institutions in Australia, and is reflective
of the cultural impediments to security, as well as the emerging maturity of security
implementation.
Key Issues Surrounding Security Management Approach: The key issues that
emerged with management of security included problems associated with the
current management approaches adopted for information security, the lack of
coordination of information security impacting effectiveness, conflicting priorities
and standards within universities, and the difficulty in easily identifying industry
applicable standards. A significant challenge put forward by participants was that
existing management standards were not always applicable to universities. Although
the 17799 standard (now replaced with 27001:2006) was often quoted as being
a preferred management standard, several participants were critical, suggesting
that conforming to this standard would be highly time consuming and resource
intensive, and that it was not necessarily applicable to the university environment.
Another prominent issue arising for many security practitioners was cited as not
having control over the IT environment (both technically and culturally) due to
IT decentralisation. Conversely, many participants stated that centralisation of IT
made life easier in that control over the network could be established more readily.
Arguments could be stated for and against centralisation. The main argument for
centralisation is improved control over decision making, standards and enforcement
of policy. The main argument for decentralisation is based on the increased access
to resources outside the main IT department that can, in theory, apply a security
focus to their IT environment.
Improving the Security Management Approach: The main three suggestions for
improving the security management approach included having a more structured
approach, improving awareness and additional resourcing. It was obvious from some
comments that a fragmented approach existing in managing security. In part this
exists because of a lack of an enterprise security approach, but decentralisation
also plays a part. In considering the reactive approach to security incidents and
management, it is noted that the perception of risk is often used as the basis for
responding. This was an issue that was raised many times, by way of it won’t happen to
us where perception was dominant. Kotulic and Clark (2004) note that threats and
vulnerabilities are generally not considered until after a security breach has occurred,
a view reinforced by participant comments in the interviews. This highlights and
reinforces that the reactive state of managing via security incidents is due to risk
management being implemented in accordance with the perception that it won’t
happen to us.
2.3 Security policy
Universities vary widely in approaches to security policy. This is seen in
Page 288
The Second Workshop on the Social Implications of National Security
differences such as some universities having active committees reviewing and signing
off on template-based policies with active input from policy developers. Other
institutions cited that they simply need to start on policy development. In the context
of this paper we refer to processes and procedures as being components of policy in the
generic sense, without formalising the concept.
A large majority of participants considered policy to be instrumental in
establishing a culture of compliance to security, although many acknowledged
challenges associated with policy enforcement. Factors contributing to the
effectiveness of policy included having an established policy process that included
a formal approval mechanism, engagement of key stakeholders, backing from senior
management, as well as active communication and awareness of policy. Those
participants who felt the policy process was ineffective cited a lack of participation,
delays in policy approval, unwieldy policies, a lack of policy review, and difficulties
in gaining policy compliance.
Key Issues Surrounding Security Policy: For policy to be effective, several
attributes were noted as being required. These include senior management support,
appropriateness of policy to the organisation, awareness of policy and its meaning,
and available procedures for implementation. Several major themes stem from this
area. Development of policy in terms of the actual writing of policy, coverage of
policy and how policy should be constructed were raised as issues. The appropriate
context for policies, including business requirements down to the low level
procedures for policies, appeared to often be missing links for final implementation
of policy. The security practitioner’s model attempts to capture this requirement
through its layered approach by ensuring the Contextual layer provides business
requirements, and that the Operational layer includes procedures and operational
support. In practice, there is little evidence to suggest that any of the recognised
and documented policy development processes are rigorously adopted. Instead, as
with other research, anecdotal evidence suggests that areas of risk are considered
and policy statements are basically adapted from existing sources (Maynard2002).
As noted by Hone and Eloff (2002), difficulties are associated with this process in
that they do not truly reflect the culture of the organisation. An end result of this
is that they do not result in a document that effectively provider relevant direction
for information security in the organisation. This is a key issue as a theme emerging
from data analysis indicated that the relevant issues were more associated with
engaging people in policy development and gaining compliance to policy, rather
than obtaining written policy statements.
Improving Security Policy: One of the main problems with policies is inappropriate
abstraction according to Gaskell (2000). This was an issue mentioned in the
interviews, where policies were inappropriately written as either high level or very
detailed, where the level of abstraction is inappropriate for the audience. It is clear
that a differentiation between security policy and supporting security procedures
is required in these types of circumstances. This research recommended adopting
Page 289
The Second Workshop on the Social Implications of National Security
the layered policy abstraction and refinement method as proposed by Baskerville
and Siponen (2002) and Abrams and Bailey (2001).The abstraction and refinement
model effectively looks at `abstracting’ and `refining’ policy at a level where it is
most effective and relevant to the end user. The research also detailed the essential
elements contained in the international standards to provide approach direction on
security policy (Hone and Eloff, 2002).
2.4 Security awareness
The area of security awareness highlighted that awareness raising activities are
not well structured. Awareness is raised predominantly by occurrence of incidents
rather than a structured, targeted program of activities. The ad hoc approach to
raising awareness is reflected by the fact that less than 15% of participants stated
they had adopted the preferred formal or structured awareness program. Despite
opinions that raising security awareness was an important priority, less than five
percent of participants agreed that existing activities resulted in raising security
awareness levels adequately. Nearly 50% of participants somewhat agreed, and over
one third disagreed on the adequacy of activities, indicating that awareness raising
activities are far below requirements.
Key Issues Surrounding Security Awareness: Although resourcing was cited as the
main barrier to increasing awareness, cultural reasons and a lack of prioritisation also
impacted raising awareness activities. The types of issues raised included the lack of
awareness of the university community, particularly end users, a transient student
base, and lack of awareness by Management and Executive. The lack of a skill set
for security, and the lack of a coordinated approach to raising security awareness,
the resources and time required to raise awareness were also mentioned. The issue
appears to be one of a lack of mandate for structured awareness activities. Despite
its acknowledged importance, focus and effort on security activities was lacking.
Clearly a conflict exists between the importance placed on security awareness and
the priority actually given to improvements in this area. Insufficient communication
from security sections in universities causes users to construct their own models
of reality on possible security threats and the importance of security. This study
indicated the model of reality constructed by the user could be wildly inaccurate
due to insufficient knowledge. This caused security areas to view users as inherently
insecure, and users to view security people as obstructionist in mechanisms deployed,
creating a vicious cycle. Understanding people’s motivation and deconstructing any
false sense of realities towards information security, therefore, is a useful exercise
when undertaking awareness activities.
Improving Security Awareness: One of the key issues in security awareness in
universities is exacerbated by the fact that universities have a transient student base.
There needs to be a strategic, targeted and continuous program in place to increase
awareness in universities, one that is adequately funded and resourced. Users will
resist change if they cannot see the benefits, or the process is difficult or time
Page 290
The Second Workshop on the Social Implications of National Security
consuming. It is also necessary to balance awareness raising activities with transparent
technology based policy enforcement processes that minimise requirements for end
user awareness and voluntary compliance. The research adopted recommendations
by Siponen (2000) who argues that all information security awareness programmes
should use a `framework and content’ approach. The framework aspect would use
an appropriate structure and leverage from the use of standards and guidelines,
while the content approach focuses on appropriate internalization of guidelines. It
is worth considering that the approaches used in information security awareness
programmes should satisfy the requirements of behavioural theories in order for
end users to understand why they should follow security guidelines.
2.5 Security compliance
The section on compliance covered a diverse range of areas related to security
which indicate that higher education institutions could benefit from improved
governance over information security.The fact that a lack of measurement presides
over security indicates that coming to terms with the management of security
is difficult. The lack of measurement indicates that security has attributes of
intangibility of risk, and its value to the organisation is not always clearly recognised.
A poor culture of compliance was cited by participants as the number one barrier to
improving overall compliance to security, particularly in a decentralised environment.
This was followed by issues with funding and resourcing, and then awareness and
understanding.
Factors critical to the success of information security management focused on senior
management support, strategic governance, and awareness and education. When
asked what the critical success factors were for effective security management,
participants responded largely with a focus on the engagement and support from
senior management, ensuring that the correct structure and governance framework
was in place, underpinned by policy (structure and framework included both
governance structure and technical architecture), followed by ensuring that awareness
and education rates were high so as to facilitate a culture of compliance.
Key Issues Surrounding Security Compliance: The core issue surrounding
compliance to security centred on the fact that drivers for regulatory compliance are
still emerging for Australian universities. Another issue for compliance is associated
with the fact that the tangibility of measuring the effectiveness of security spending
is very difficult. Loose compliance drivers, therefore, linked with the difficulty in
understanding the effectiveness of approaches has resulted in compliance being
fragmented across the organisation.
Although technology is a key factor in protecting systems, the people and
processes that are integral to ensuring that technology is appropriately placed
were indicated as needing to be coordinated under a successful management
framework.This is particularly the case considering that as demand for open systems
expands, more threats emerge, more point based technology solutions appear, and
Page 291
The Second Workshop on the Social Implications of National Security
consequently a patchwork of technology based systems develops. Moving forward
it will be increasingly vital that universities are able to understand, measure and
demonstrate the effectiveness of security approaches, in order to ensure that necessary
standards can be met to achieve emerging regulatory compliance.
Improving Security Compliance: Despite security being a recognised issue, many
organisations lack a comprehensive understanding of security issues and the required
levels of controls to adequately mitigate risks is not always clear. A lack of availability
and comprehensiveness of security guidelines and standards is not the issue as
these are already available to a large extent. Obtaining compliance to information
security standards faces a number of challenges that Nosworthy (2000) describes
as `balancing factors’ between risk and control. In many cases universities have the
belief that because it hasn’t happened to them it never will. This type of mindset
results in a reluctance to fully commit to information security.
Obtaining a culture of compliance requires a change at the individual, group
and organisational levels (Vroom and Von Solms, 2004). Security must be viewed
as a multi-faceted problem which requires a comprehensive solution to encompass
physical, procedural and logical forms of protection. The security management
model provides the necessary view to facilitate this.
3
Security practitioner’s management model
The authors based the design of this model on the results of the survey, where
the basic concept of the management model is an adaptation of the Zachman
Architecture Framework (Stephenson, 2005 and Zachman, 1987). Detailed survey
outcomes are available from the author’s Masters thesis. The resulting security
practitioner’s model (Figure 1) provides a way to conceptualise the fundamental
challenges faced by the security practitioner in progressing security implementation
within Australian universities. The major challenges can be thought of as requiring a
way of understanding not so much what to implement, but how to conceptualise and
move forward with implementation in order to progress it within the institution.
3.1 A systemic approach
This model, although generically applicable, is designed specifically for Australian
university information security practitioners, whose role encompasses a responsibility
for security implementation at the operational level. The model facilitates an
improved process for information security management at the operational level by
providing a reference for security practitioners to consider how best to transition
security knowledge into effective implementation. Relevant, validated and
fundamental aspects are incorporated into the practical management model which
integrates and clearly shows the relationships between the layered organisational
contexts.
At the security practitioner’s level, the major goal of the model is to allow
practitioners to apply the management of information security in a structured
Page 292
The Second Workshop on the Social Implications of National Security
and cohesive manner. At the broader organisational level, the major goal of the
model is to increase the transparency and effectiveness of the information security
process towards facilitating organisational requirements (the business function).This
transparency is directly beneficial to the findings in Sections 2.1 and 2.2.
From the security practitioner’s perspective, an approach needs to provide a
meaningful structure for progressing information security in an environment where
competing priorities exist. This approach, underpinned by communication and
awareness, should be focused on developing the organisation’s culture of compliance.
Continuous security improvements applied through the framework can achieve
regulation of an aspired culture of compliance. This approach relates directly to
Section 2.1 and, consequently, to potential improvements by all in terms of security
compliance (Section 2.5) and improved policy approaches (Section 2.3).
The model is premised on findings from the study as well as fundamental
assumptions well evidenced in the literature. First, that information security
management is most effective when a structured process is aligned across the
organisation, from the senior executive down to the daily operational practices of end
users. Second, that the use of controls and standards alone is not enough; developing
a culture of security is an end goal of the model requiring communication and
awareness across all layers of the organisation. Third, that the resultant compliance
to security must be continuously monitored and adjusted through the adoption of
a review mechanism such as the ISO 27001 Plan, Do, Check, Act (PDCA) model
(27001:2006), or another similar audit-based monitoring and corrective action
process.
3.2 The use of standards in the model
Best practices are recognized as playing an extremely important role in
information security management. Standards such as AS/NZS ISO 27001:2006,
and Cobit (2000) are accepted and well-regarded globally.Any of these information
security management standards can be incorporated into the model, as can any
hybrid best practices.
Although a selection of various elements of disparate best practices can be
aligned to suit the organisation, the use of best practices needs to be applied in
context to organisational needs. If treated purely as a technical guide, information
security standards tend to be unfocused and costly. By incorporating the standard
into the model, the implementation of these best practices becomes consistent with
the business risk management and control framework (IT Governance Institute,
2005).
3.3 Process flow through the model
The model begins by processing knowledge (gained from information security
understanding, broader organisational knowledge, information technology expertise,
management ability, best practice frameworks, and previous experiences of the
Page 293
The Second Workshop on the Social Implications of National Security
individual practitioner) into the institution’s security programme. This knowledge
must be channelled into an appropriately designed interface to the organisation in
order for security practices to be gradually incorporated into daily processes and
procedures. This is necessary as part of developing the culture of the organisation
as inappropriate application of security procedures can result in an expensive or
unacceptable overhead (May, 2003). The interface ideally should be a structured
and well accepted information security management programme.
The information security management programme links into a five-level
abstracted layered structure which begins at the business strategic level, represented
as the contextual level, and is traceable through the organisation finishing at the
operational layer. Across the layered structure, the process of communication and
awareness facilitates the end by-product, a culture of compliance. The central goal
of the model is the required organisational level of a culture of compliance with the
depicted external and internal influences viewed as inter- and intra-organisational
factors impacting culture. The resulting compliance levels are then re-processed
into the knowledge that feeds back into the framework. A continuous loop is
thus established that represents the transition of knowledge towards a culture of
compliance.
The Contextual Layer is the business context of the organisation representing the
organisation’s security posture. The Logical Layer symbolizes the virtual constructs
of security. The Physical Layer denotes the actual physical security including
infrastructure. The Operational Layer involves people and support mechanisms.
Channelling Security Practitioner Knowledge The findings from this report and
other research on information security management support the concept of the
security practitioner’s role being one of a knowledge gatherer, with the challenge
of implementing knowledge. While the above mentioned frameworks provide
guidance on how information security should be implemented, it can be helpful
to view information security from the practitioner’s perspective as a challenge of
implementing knowledge.
Interfacing Through an Information Security Management Programme Security
practitioners need to transition their information security knowledge into an
implementation of security solutions, and should therefore pursue a management
model that coordinates an operational, tactical and strategic approach to security.
The proposed security practitioner’s model adapts and leverages existing enterprise
architecture models for security. The result is an enterprise framework that progresses
security knowledge into a culture of compliance.
Leveraging Zachman, Sherwood and Stephenson Frameworks The abstracted layers
of the model are well grounded and leverage off previous enterprise framework
concepts originally conceived by Zachman, which were later extended and applied
specifically to security architecture by Sherwood (Vroom,2004). Zachman initially
developed the Zachman framework, a six layer abstraction matrix which was later
modified by Sherwood into the SABSA methodology (SABSA being the Systems
Page 294
The Second Workshop on the Social Implications of National Security
and Business Security Architecture). This was then later referenced as the Sherwood
Applied Business Security Architecture. Stephenson (2005) later researched the model
and considers the model in a wider context as a `Security Architecture Reference
Model’ (SARM) noting its adaptability to security as well as other more generic
areas.The primary point of evolution of the model has been away from the SABSA
model according to Stephenson (2005), such that the model can be applied effectively
to other generic information systems applications.
Establishing Boundaries of Control for Security Domains The research undertaken
in this project found that `resourcing’ was consistently cited a major obstacle to
improved security management. In many institutions improved levels of resourcing
may not be easily achievable, and therefore processes themselves need to be
examined. Detert, Schroeder, and Mauriel (2000) advocate reviewing processes
through identification of cultural configuration and patterns, and within their eightdimensional framework reference orientation and focus as being related to examining
and improving processes. The implication is that where resources are not easily
increased, processes must be examined for improvement.Those processes should be
considered in terms of business requirements as opposed to simple tactical solutions,
and the layered abstraction model facilitates this way of thinking.
3.4 Communication and awareness
The use of communication and awareness in the model is so obviously
apparent that reference to it is best placed in relation to its role in influencing
behaviour. The role of communication and awareness in the model needs to
be directed towards a goal of normalising behaviour, in other words developing
a culture of compliance. Existing theory agrees that behaviour is related to the
interaction of ability, motivation and working conditions (Siponen2000).Therefore
communication towards normalising behaviour should be taken into account in
these interactions.
The two main ways of influencing changes in human belief in order to influence
behaviour are thought to occur through both active participation and persuasive
communication (Siponen, 2000). Motivation of people towards information security
is important and Siponen (2000) describes motivation as dynamic in nature and only
lasting from minutes to weeks. This correlates with shorter activity levels, where
attitudes are of a more static internalised nature, and relate mainly to the quality of
actions.
Siponen (2000) references a behavioural science framework for improving
information security awareness. The framework is based on existing theory, including
theory related to intrinsic motivation, planned behaviour and the Technology
Acceptance Model (TAM). Siponen (2000) maintains that certain persuasion
strategies based on motivational factors are likely to assist listeners to internalise
security guidelines. These strategies should be used in addition to the use of a reward
and sanction system, which takes into account the aforementioned theories in the
Page 295
The Second Workshop on the Social Implications of National Security
behavioural science framework. Siponen (2000) rationalises that a ‘set of persuasive
approaches based on morals and ethics, well-being, a feeling of security, rationality,
logic and emotions’ should be used where appropriate.
3.4.1 External and internal influences
The model takes into account factors that are internal and external to the
organisation which are likely to impact on the culture of the organisation and
therefore influence behaviour. Although most of these factors will be outside the
security practitioner’s control, it is helpful to be able to conceptualise and categorise
the types of influences.
3.5 Organisational culture of compliance
The security practitioner’s security management model has an end goal of a
culture of compliance where behaviour reflects compliance to information security
policy and practices. Information security policies are the guidelines that dictate
the rules and regulations of the organisation, which in turn govern the security of
information (Vroom2004) and are therefore significant determinants of culture.
Organisational culture includes the ideas shared by the people within the organisation
and communicated between each other. This system of learned behaviour and
culture is cited as the single most important factor accounting for success or failure in
an organisation (Vroom and von Solms, 2004). One goal of an organisational culture
of compliance, therefore, seeks to ensure that rules and regulations are normalised
as learned behaviour. Recognising an organisation’s culture of compliance towards
information security is a major factor in understanding how to manage information
security and is a key determinant of the success of information security.
The PDCA model (27001:2005) is widely referenced in standards as a continuous
improvement quality model which can be applied to all processes.
4
Validation
By its very nature, this study has a strong applied research component;
consequently the survey adopted a qualitative research model whose methodology
involved a broad approach to the study of real-world phenomena. This broad
approach is reflected through a pragmatic, inductive and interpretive method
based in a natural setting (the university environment) and enhanced through an
attempt to capture and define people’s experiences, as recommended by Marshall
and Rossman (1999). The main analysis technique applied to the survey responses
was thematic analysis which involves cross-referencing data for the purpose of
identifying emerging themes and patterns. The thematic approach was supported
by the triangulation of observations, participation, literature reviews and the survey
instrument. This approach tends towards an inductive model for illuminating
processes, one recommended by Miles and Huberman (1994) to ensure a visible,
easily recognizable and clearly objective methodology.This open structure supports
Page 296
The Second Workshop on the Social Implications of National Security
and validates the research from both the academic and practitioner perspectives.
Universities are inevitably social actors in the development of technology
and have origins in the social rules of how individuals participate with technology.
As universities come to grips with managing data from a privacy and accessibility
perspective, greater attention will need to be paid to developing and adopting an
approach that is appropriate for individual institutions. The model has the capacity
to provide a systemic approach in relation to security threats, as well as to privacy
aspects due to its holistic organisational wide approach. This is an important
aspect as there are growing calls for proactively designing security technologies to
regulate as an alternative or in conjunction with the law. For example, digital rights
management technologies are supplanting the rights established by copyright law
on how people can access and use content (Kesan and Shah, 2004b). The security
practitioner’s model is currently being trialled at Southern Cross University. The
model provides a holistic structure which has substantially improved the credibility
of the security management program.
Invariably, when faced with the need for privacy and accountability, individuals
demand the former for themselves and the latter for everyone else (Brin, 1998).
The model plays a role in ensuring that security achieved accountability without
extending to invasion of privacy. This decision balances security by meeting essential
security requirements related to authentication (thereby providing accountability
for use) without violating individual privacy. This leads us to the observation that
universities provide an environment that both nurtures and cultivates software
development, and software is the law of cyberspace that affects fundamental issues
such as privacy, trust and accessibility (Shah and Kesan, 2004). In effect, universities
are comprised of a group of actors who are subject to cultural aspects that shape
their activities, norms and behaviours, in turn impacting both security and privacy
aspects within society.
The proposed security practitioner’s management model represents a synthesis of
the emergent themes, patterns and theories derived from the survey data subsequent
to data analysis. The model provides direction for the practitioner in approaching
fundamental challenges that impinge upon the effective management of information
security. This is achieved through an enterprise and holistic approach to the issues
that require a way of understanding not so much what to implement, but how to
think about implementation in order to progress information security within the
organisation.
5
Conclusion
Universities participate in the recruitment of audiovisual, communications and
computer database information on individuals and research material. As universities
are an important foundation of society, the future of who and how this aggregation
of information is controlled becomes an increasingly important issue. From a macro
perspective, applying a transparent and accountable process to the collection, storage
Page 297
The Second Workshop on the Social Implications of National Security
and use of information is seen as a critical step towards finding a balance between
protecting civil liberties and state based control. This cannot be achieved without
taking into consideration individual requirements for specific institutions within the
wider context of society. Information security management in Australian universities
plays an important role in establishing standards and demonstrating effective methods
for information security management.
This research improves the current understanding of information security
management in Australian universities by synthesising the findings of the study to a
theoretical framework (the Security Practitioner’s Management Model). Effectiveness
of the model is measured most noticeably at both management and staff levels.
Management at the university recognise and accept the knowledge gathering role of
the information security manager’s position, and now not only support the role, but
expect this role to be involved in security research. General awareness of university
staff has increased with a particular emphasis on individuals’ willingness to participate
in the security management process, as both transparency and comprehensiveness
of process are evident.
References
Abrams, M. & Bailey, D., (2001), Essay 5: Abstraction and Refinement of Layered
Security Policy. Information Security: An Integrated Collection of Essays.
California USA, IEEE Computer Society Press.
Baskerville, R. and M. Siponen (2002) An Information Security Meta-Policy for
Emergent Organisations. Logistics Information Management 15(5/6): 337-346.
Brin, D., (1999), The Transparent Society: Will Technology Force us to Choose
Between Privacy and Freedom?, Perseus Books Group, New York.
Detert, J., Schroeder, R. and Mauriel J. (2000), A Framework for Linking Culture
and Improvements in Organisations, Academy of Management Review,Vol. 25,
No. 1, pp. 850-63.
Dutta, A. and McCrohan, K. (2002) Management’s Role in Information Security
in a Cyber Economy, California Management Review,Vol. 45, No. 1, pp. 67-87
Fitzgerald, T. (2005), Building Management Commitment through Security
Councils. Information Systems Security,Vol. 14, 2 pp. 27-36.
Gaskell, G. (2000) Simplifying the Onerous Task of Writing Security Policies.
ISRC, Queensland University of Technology (QUT). Proceedings from AUUG
Inc. Security Symposium, Brisbane Australia.
Höne, K. and Eloff, J., (2002), What Makes An Effective Information Security
Policy?, Network Security. Vol. 6, pp. 14-16.
IT Governance Institute, (2005). ‘Aligning CobiT, ITIL and ISO 17799 for Business
Benefit, 2005’.
Kesan, J and Shah R. (2004a), Nurturing Software: How Societal Institutions
Shape the Development of Software, University of Illinois College of Law,
Research Paper No. 04-07, Accessed from Social Science Research Network
Page 298
The Second Workshop on the Social Implications of National Security
on 30Jul2007.
Kesan, J and Shah R. (2004b), The Recursive Regulatory Model, Journal Article
downloaded from Goveringwithcode.Org, accessed 30July2007.
Knapp, K., Marshall, T., Rainer, R. and Ford, F. (2006) Information Security:
Management’s Effect on Culture and Policy, Information Management and
Computer Security,Vol. 14, No.1, 2006, pp. 24-36.
Kotulic, A. and Clark, J., (2004), Why There Aren’t More Information Security
Research Studies, Information and Management, No. 41, pp. 597-607.
Marshall, C. and Rossman, G. (1999) Designing Qualitative Research, Sage
Publications, London.
May, C.,(2003), Dynamic Corporate Culture Lies at the Heart of Effective
Security Strategy, Computer Fraud and Security, Issues 5, pp. 10-13.
Maynard, S. and Ruighaver, A. (2002) Evaluating IS Security Policy
Development. Presented at 3rd Australian Information Warfare and Security
Conference 2002.
Miles, M.B. and Huberman, A.M. (1994) Qualitative Data Analysis, Sage
Publications.
Mitnick, K., Simon, W. (2002) The Art of Deception: Controlling the Human
Element of Security. Chapter 1 Security’s Weakness Link and Chapter 16
Recommended Corporate Information Security Policies. Indianapolis,
Indiana, Wiley Publishing Inc.
Nosworthy, J. (2000) Implementing Information Security in the 21st Century –
Do You Have the Balancing Factors? Computers and Security.Vol 19, pp. 337347.
Peltier, T. (2004), Developing an Enterprise Policy Structure, Information Systems
Security,Vol, 13, No. 1, pp.44-50.
Sherwood, J., Clark, A. and Lynas, D., (2003) Systems and Business Security
Architecture, White Paper sourced from the Internet 13th July 2006 at:
http://www.sabsa-institute.org/whitepaperrequest.aspx?pub=Enterprise+Se
curity+Architecture
Stephenson, P., (2005), S-TRAIS: A Method for Security Requirements
Engineering Using a Standards Based Network Security Reference Model.
Conference Proceedings from SREIS 2005, Accessed from the Internet 14th
July 2006. http://www.sreis.org/old/2001/papers/sreis018.pdf
Von Solms, B. (2000) Information Security – The Third Wave? Computers and
Security.Vol. 19, No. 7, (2000) pp. 615-620.
Vroom C. and Von Solms, R. (2004). ‘Towards Information Security Behavioural
Compliance’, Computers and Security (2004) 23, pp.191-198.
Zachman, J. (1987) A Framework for Information Systems Architecture, IBM
Systems Journal,Vol. 26, No. 3, 1987.
Page 299
The Second Workshop on the Social Implications of National Security
Author Biographies
Ms Roba Abbas has recently graduated with first class honours in Information
and Communication Technology (majoring in Business Information Systems) from
the University of Wollongong. She is currently the product manager at local web
software development company Internetrix, and is involved in the areas of product
research, development and improvement. Roba’s primary research interest lies in
the critical infrastructure protection area, with a particular focus on the impact of
public data availability on critical infrastructure protection efforts in Australia. Ms
Abbas presented at last year’s RNSA Social Implications workshop and her honours
thesis is available at http://ro.uow.edu.au/thesesinfo/2/
[email protected]
Mr Mark Burdon is a PhD candidate in the Faculty of Law at QUT. His
thesis is investigating whether the commercial re-use of public sector information
in Australia affects the information privacy of Australian citizens. Mark has a law
degree from London South Bank University and a Masters degree in Public Policy
from the University of London’s Queen Mary and Westfield College. Since 2005,
Mark has worked on a diverse range of legal/socio/technology related projects with
QUT’s Information Security Institute (ISI) involving the reporting of data breaches,
e-government information frameworks, consumer protection in e-commerce and
information protection standards for e-courts.
[email protected]
Professor Roger Clarke is Principal of Xamax Consultancy Pty Ltd, Canberra.
He is also a Visiting Professor in the Cyberspace Law & Policy Centre at the
University of N.S.W., a Visiting Professor in the E-Commerce Programme at the
University of Hong Kong, and a Visiting Professor in the Department of Computer
Science at the Australian National University. He was for a decade the Chair of the
Economic Legal and Social Implications Committee of the Australian Computer
Society, and spent some time as the ACS Director of Community Affairs. He holds
degrees from UNSW and ANU, and has been a Fellow of the ACS since 1986. He
has been a Board-member of the Australian Privacy Foundation since its foundation
in 1987, and its Chair since 2006. He has undertaken research, consultancy and
public interest advocacy, and published extensively in Australia and overseas for over
30 years, in the areas of identification, security, dataveillance and social impacts and
implications of information technology. His website is one of the most extensive
and most used resources in these areas.
[email protected]
Mr Muhammad Usman Iqbal is a PhD candidate in the School of Surveying
and Spatial Information Systems, Faculty of Engineering, The University of New
South Wales (UNSW), Australia. He holds a Masters degree in Computer Science
from UNSW and a Bachelors degree in Computer Science from the University
Page 300
The Second Workshop on the Social Implications of National Security
of Karachi, Pakistan. His area of research is Privacy-aware Automotive Telematics
where he seeks an understanding of ‘locational privacy’ and the importance of
designing privacy-respecting technology solutions. Usman’s work is supported by
the ‘Metadata Scholarship’ from OMNILINK Pty. Ltd., where he has also developed
a GIS Metadata Software Portal. Prior to post-graduate studies, Usman has worked
in industry as a Software Engineer for 2 years. He is a student member of IEEE,
ACM, Australian Privacy Foundation (APF) and the Australian Computer Society
(ACS).
[email protected]
Mr Tim Lane has recently been awarded his Masters by Research (IT) at the
Queensland University of Technology. His thesis focused on information security
management in Australian Universities. Prior to this Tim has completed a Bachelor
of Management and Professional Studies (2002) through Southern Cross University,
and an Associate Diploma of Information Technology at Gold Coast Institute of
TAFE. Tim currently is the Information Security Manager at Southern Cross
University, responsible for the development and maintenance of an organisational
wide information security management programme. Tim’s interest in information
security extends across management, behavioural and technology aspects. tlane@
scu.edu.au
Dr Samsung Lim is a Senior Lecturer in the School of Surveying and Spatial
Information Systems, The University of New South Wales (UNSW), Sydney,
Australia. For the past fifteen years his research has been focused on the area of
GNSS and GIS. Samsung’s research interests are in theoretical problems related
to RTK-GPS and applying geo-spatial information technologies to real-world
problems. In 2005, Samsung developed an address-based search tool in conjunction
with contemporary web-map services such as Google Earth. Samsung received his
B.A. and M.A. in Mathematics from Seoul National University and his Ph.D. in
Aerospace Engineering and Engineering Mechanics from the University of Texas
at Austin.
[email protected]
Associate Professor Doug MacKinnon is the Director of the Centre for
Transnational Crime Prevention, Faculty of Law, at the University of Wollongong.
The CTCP was established in 2000 and officially opened in June of 2001. CTCP
focuses on the operation, prevention and responses to organised criminal activities
that impact on regional and global security. Doug was previously with the
Australian Federal Police in New South Wales, Australia. His research interests are
in transnational dimensions of maritime crime.
[email protected]
Professor Brian Martin is Professor of Social Sciences in the School of Social
Sciences, Media and Communication at the University of Wollongong, NSW,
Australia. He is the author of 12 books and hundreds of articles on nonviolence,
Page 301
The Second Workshop on the Social Implications of National Security
dissent, democracy, information issues, scientific controversies and strategies for
social movements.
[email protected]
Dr Lauren May was awarded a PhD, MASc (Research) and BASc (Maths) in
2002, 1996 and 1990 from Queensland University of Technology. Her research
degrees are in cryptology. Lauren worked full-time for the Information Security
Research Centre (now Information Security Institute) at QUT in a research assistant
position from 1991 to 1997. She commenced working as an academic in the School
of Software Engineering and Data Communications in 1997, firstly as a Lecturer
then a Senior Lecturer in 2002. Lauren currently holds this position and continues
with her research through the Information Security Institute. In recent years she
has developed interests in cross-disciplinary research areas building upon her solid
research foundations in information security.
[email protected]
Dr Katina Michael PhD (UOW) 2003, BIT (UTS) 1996, Senior Member
IEEE ‘04. Katina is on the IEEE Technology and Society Magazine editorial board,
and is the technical editor of the Journal of Theoretical and Applied Electronic Commerce
Research. Her research interests are in the area of location-based services, emerging
mobile technologies, national security, and their respective socio-ethical implications.
Katina is currently a Senior Lecturer in the School of Information Systems and
Technology, Faculty of Informatics, University of Wollongong,Australia. She teaches
eBusiness, strategy, innovation and communication security issues, and is the research
administrator of the IP Location Based Services Program. Katina has authored over
40 refereed papers and is currently working towards the completion of her second
book. She has held several industry positions including as a senior network and
business planner for Nortel Networks (1996-2001). In her role with Nortel she had
the opportunity to consult to telecommunication carriers throughout Asia. katina@
uow.edu.au http://ro.uow.edu.au/kmichael
Dr M.G. Michael Ph.D, MA(Hons), MTh, BTh, BA is a theologian and historian
who brings a unique perspective on Information Technology and Computer
Science. Presently he is an Honorary Fellow in the School of Information Systems
and Technology, at the University of Wollongong, Australia. He is the former
coordinator of Information & Communication Security Issues and since 2005
has guest-lectured and tutored in Location-Based Services, IT & Citizen Rights,
Principles of eBusiness, and IT & Innovation. He has presented papers at numerous
IEEE conferences including the International Conference on Mobile Business, the
International Conference on Mobile Computing and Ubiquitous Networking, and RFID
Eurasia. In 2000 he was invited to present a paper “Revelation 20:4-5 Chiliasm in
the Early Ecclesiastical Writers’, at the Millennium Conference on the Sea of Galilee and
the City of Jerusalem (Israel). More recently he was invited to deliver a paper at the
29th International Conference of Data Protection and Privacy Commissioners (ubiquitous
Page 302
The Second Workshop on the Social Implications of National Security
computing track) in Canada. He is currently co-authoring a book titled, Innovative
Automatic Identification and Location-Based Services: From Bar Codes to Chip Implants.
Alongside Katina Michael he has introduced the concepts of ‘überveillance’ and
‘electrophorus’ into the privacy and bioethics literature. Michael has been the
recipient of a number of scholarships and awards. He is a member of the American
Academy of Religion.
[email protected]
Mr George Mickhail, Senior Lecturer, School of Accounting and Finance,
Faculty of Commerce, University of Wollongong. He was trained in Commerce
and Computer Science at Ain Shams University (Egypt), Operations Research at the
Sadat Academy for Management Sciences (Egypt), and in Information Systems at the
London School of Economics and Political Science (UK). He holds a ‘Professeur des
Universites Etranger’ appointment at the Universite’ D’Orleans (France) concurrently
with his permanent appointment at the University of Wollongong, which he joined
in 1994, after being at The University of Sydney for four years. Prior to academe,
George held accounting and consulting appointments with a number of global
firms and continues to collaborate with industry and the profession. His primary
research exploits semiotics and autonomic computing for autonomic accounting
applications (AAA), as a practical proposition for implementing efficiency within
organisations. His secondary research critically examines how those new business
and technological models utilise IT developments to create –or deplete- value in
organisations. The research particularly evaluates the efficiency imperative in the
e-transformation of the role of government, business and markets and their global
effect on the individual and society.
[email protected]
Mr Rob Nicholls is an independent consultant who works with Gilbert + Tobin.
He is a communications specialist with a 25 year career focusing on technology,
regulatory and business strategy in broadcasting and telecommunications. He has an
extensive technical and regulatory background which he combines with commercial,
finance and analytical experience. Rob currently works in Asia, the Middle East
and Europe as well as in Australia. He is widely published and regularly presents at
local and international conferences in the fields of regulation, telecommunications
and broadcasting. Rob has an honours degree in Electronics and Communications
Engineering from Birmingham University and a Master of Arts in International
Relations at UNSW. He is currently a PhD candidate at UNSW in the field of the
global politics of the regulation of broadcasting.
[email protected]
Associate Professor Nicholas O’Brien specialises in Counter Terrorism. He
is a member of Australian Graduate School of Policing, Faculty of Arts at Charles
Sturt University (CSU). Before joining Charles Sturt University (CSU), Nick
represented the UK Association of Chief Police Officers - Terrorism and Allied
Matters Committee (ACPO-TAM) as the Counter Terrorism and Extremism
Page 303
The Second Workshop on the Social Implications of National Security
Liaison Officer (CTELO) at the British High Commission in Canberra. Nick
covered Australasia and had a ‘watching brief ’ on the Asia and the Pacific region.
Prior to this posting Nick was in charge of International Counter Terrorism in
Special Branch at New Scotland Yard, London. Nick has also represented the UK
at Europol, the G8 Counter Terrorism Practitioners meetings and the European
Police Working Group on Terrorism. Nick is a visiting Fellow at the Jakarta Centre
for Law Enforcement Co-operation in Indonesia. Nick first started working in the
counter terrorism related area in 1981 and has worked on Irish as well as international
terrorism.
[email protected]
Mr Marcus O’Donnell is an Associate Lecturer in the School of Journalism
and Creative Writing, University of Wollongong where he has played a key role in
the establishment of the new Bachelor of Journalism. Prior to this he worked widely
as a journalist and editor. He is currently completing his PhD on “Apocalyptic
Narratives in News and Popular Culture” in the Faculty of Humanities and Social
Sciences at the University of Technology Sydney. His research interests centre
around a narrative model of news media and popular culture and he has presented
at a number of interdisciplinary conferences and published in a number of journals
looking at the intersection of law, media, religion, terrorism and popular culture.
[email protected]
Dr Lucy Resnyansky Research Scientist, Command & Control Division,
Defence Science and Technology Organisation (DSTO) has graduate degree in
Linguistics (1985) and PhD in Social Philosophy (1994) from Novosibirsk State
University (Russia); and PhD in Education (2005) from the University of South
Australia. She has been affiliated with the University of Wollongong, Macquarie
University, and the University of Western Sydney. Her research experience covers
sociological studies of attitudes, beliefs and motivation; theoretical modelling and
empirical studies of human communication; analysis of media and advertising;
and ethnographic studies of work practices and human performance. Her research
interests are in such areas as social semiotics, sociology of science, social informatics,
and sociocultural theories of cognitive action, learning and meaning. Lucy.
[email protected]
Dr Mark Rix is a Senior Lecturer in the Graduate School of Business at the
University of Wollongong where he teaches subjects in the areas of organisational
behaviour and international human resource management. Mark’s research interests
are mainly in the field of public policy and public administration, with a focus on
issues relating to social exclusion, access to justice and citizenship. He also conducts
research on the implications of anti-terrorism legislation in Australia, Great Britain,
the United States, Canada and New Zealand for human rights and the rule of law in
these countries. Mark has recently had articles on his research published in Prometheus,
Page 304
The Second Workshop on the Social Implications of National Security
Australian Journal of Public Administration, Alternative Law Journal, Third Sector Review,
Australia and New Zealand Health Policy, and the Journal of Higher Education Policy
and Management.
[email protected]
Associate Professor Gregory Rose is an international law specialist with
substantial practical experience, including as Head of the Trade, Environment and
Nuclear Law Unit in the Legal Office of the Australian Department of Foreign
Affairs and Trade. Gregory’s expertise has enabled him to train officers of the Royal
Australian Navy in legal aspects of maritime security, to deliver counter-terrorism law
training courses to officials in South East Asia and to be an adviser to the Australian
Minister for the Environment. His research interests concern international law
standards and their implementation in the fields of counter-terrorism and marine
environment.
[email protected]
Ms Michelle Rowland is a lawyer at Gilbert + Tobin. She specialises in a broad
range regulatory and commercial telecommunications law including interconnection,
privacy, law enforcement, disputes and submissions to government and regulator
inquiries. Michelle has a working knowledge of Australia’s telecommunications
regulatory environment, having completed extended secondments in-house to
some of Australia’s leading telco providers. Michelle also has a broad range of
international communications expertise. This includes best practice regulatory
design and legislative drafting, particularly in emerging economies, representing
operators, investors, governments and regulators. Michelle has a Bachelor of Arts
(Hons), a Bachelor of Laws and a Master of Laws, each from the University of
Sydney. Michelle was awarded the 2004 Gilbert + Tobin Scholarship for a course
in utility regulation at the Public Utility Research Centre, University of Florida.
Michelle serves as Councillor and Deputy Mayor of Blacktown City Council, the
largest local government area in New South Wales.
[email protected]
Mr Matthew Sirotich, Honours Candidate, School of Information Systems and
Technology, Faculty of Informatics, University of Wollongong. Matthew’s research
interests are predominantly in the area of security and radio-frequency identification.
[email protected]
Ms Holly Tootell is a Lecturer in the School of Information Systems and
Technology, Faculty of Informatics at the University of Wollongong where she
teaches subjects in the areas of social implications of information technology and
innovation. Holly’s research interests are the social and privacy implications of
technology, with a focus on issues relating to national security. Her PhD used media
content analysis to establish an understanding of the interplay between privacy, liberty
and security when applied to location-based technologies. Holly is the Secretary of
the Australian chapter of the IEEE Society on Social Implications of Technology
Page 305
The Second Workshop on the Social Implications of National Security
(SSIT).
[email protected]
Dr Marcus Wigan (http://go.to/.mwigan) is Principal of Oxford Systematics,
Professorial Fellow at the University of Melbourne, Professor of both Transport and
of Information Systems at Napier University Edinburgh and Visiting Professor at
Imperial College London and serves on the Ethics Task Force and the Economic
Legal and Social Implications Committee of the Australian Computer Society, of
which he is a Fellow. He has worked on the societal aspects of transport, surveillance
and privacy both as an engineer and policy analyst and as an organisational
psychologist. He has published for over 30 years on the interactions between
intellectual property, identity and data integration in electronic road pricing and
intelligent transport systems for both freight and passenger movements. He is
spokesman for the Australian Privacy Foundation on transport issues, and works
with the University of Melbourne on transport engineering and information issues
in both logistics and social and environmental factors. His recent work in Scotland
has been focussed on data observatories, knowledge management and transport
informatics, currently as part of a European Union railway project in London on
the issues of a national transport data infrastructure; in Australia he has also worked
on vehicle identification and related issues.
[email protected]
Page 306