Copyright 2008-09 1 Roger Clarke Xamax Consultancy, Canberra Visiting Professor at ANU, UNSW, and the Uni. of Hong Kong Chair, Australian Privacy Foundation.

Slides:



Advertisements
Similar presentations
Conducting your own Data Life Cycle Audit
Advertisements

1 Yell / The Law and Special Education, Second Edition Copyright © 2006 by Pearson Education, Inc. All rights reserved.
Copyright Roger Clarke Xamax Consultancy, Canberra Visiting Professor – Cyberspace Law & Policy UNSW and at the ANU and the Uni. of.
1 UNIVERSITIES of AUSTRALASIA BENCHMARKING RISK MANAGEMENT BILL DUNNE DIRECTOR RISK MANAGEMENT UNSW. PROUDLY SPONSORED BY UNIMUTUAL.
Advanced Piloting Cruise Plot.
Copyright Roger Clarke Xamax Consultancy, Canberra Visiting Professor in Cyberspace Law & Policy, UNSW and in Computer Science, ANU Chair, Australian.
Copyright Xamax Consultancy Pty Ltd, Canberra Visiting Professor, Uni. of Hong Kong, A.N.U. & U.N.S.W.
Copyright, Invitation to Research RESEARCH ETHICS Roger Clarke, Xamax Consultancy, Canberra Visiting Professor, CSIS, Uni of Hong Kong Visiting.
Copyright Digital Privacy Roger Clarke, Xamax Consultancy, Canberra Board Member, Australian Privacy Foundation Visiting Professor, Unis. of.
Copyright, Issues from Internet Technologies 2 – Apps for Collaboration & Subversion Roger Clarke, Xamax Consultancy, Canberra Visiting Prof/Fellow,
Copyright Roger Clarke, Xamax Consultancy, Canberra Visiting Professor in Computer Science, ANU and in Cyberspace Law & Policy, UNSW
© 2008 Pearson Addison Wesley. All rights reserved Chapter Seven Costs.
Copyright © 2003 Pearson Education, Inc. Slide 1 Computer Systems Organization & Architecture Chapters 8-12 John D. Carpinelli.
Chapter 1 The Study of Body Function Image PowerPoint
1 Copyright © 2013 Elsevier Inc. All rights reserved. Appendix 01.
Task Group Chairman and Technical Contact Responsibilities ASTM International Officers Training Workshop September 2012 Scott Orthey and Steve Mawn 1.
NCATS REDESIGN METHODOLOGY A Menu of Redesign Options Six Models for Course Redesign Five Principles of Successful Course Redesign Four Models for Assessing.
RXQ Customer Enrollment Using a Registration Agent (RA) Process Flow Diagram (Move-In) Customer Supplier Customer authorizes Enrollment ( )
Document #07-2I RXQ Customer Enrollment Using a Registration Agent (RA) Process Flow Diagram (Move-In) (mod 7/25 & clean-up 8/20) Customer Supplier.
1 Introduction to Safety Management April Objective The objective of this presentation is to highlight some of the basic elements of Safety Management.
GEOSS Data Sharing Principles. GEOSS 10-Year Implementation Plan 5.4 Data Sharing The societal benefits of Earth observations cannot be achieved without.
ActionDescription 1Decisions about planning and managing the coast are governed by general legal instruments. 2Sectoral stakeholders meet on an ad hoc.
the European Union policy
1 ITU Interconnection Workshop 17 August 2001 Role of the Regulator K S Wong Office of the Telecommunications Authority Hong Kong, China.
The Basel Convention and its application to ship recycling
ICAO State Safety Programme (SSP) Implementation Course
Module N° 6 – SMS regulation
Module N° 7 – Introduction to SMS
FACTORING ax2 + bx + c Think “unfoil” Work down, Show all steps.
Year 6 mental test 10 second questions
Chapter 6 Negotiating access and research ethics
1 Discreteness and the Welfare Cost of Labour Supply Tax Distortions Keshab Bhattarai University of Hull and John Whalley Universities of Warwick and Western.
Evaluating Provider Reliability in Risk-aware Grid Brokering Iain Gourlay.
Site Safety Plans PFN ME 35B.
1 Implementing Internet Web Sites in Counseling and Career Development James P. Sampson, Jr. Florida State University Copyright 2003 by James P. Sampson,
Privacy Impact Assessment Future Directions TRICARE Management Activity HEALTH AFFAIRS 2009 Data Protection Seminar TMA Privacy Office.
Chiu Choi, Ph.D., P.E. Technical Consultant OIML workshop on the metrology of vehicle speed measurement devices NIST Headquarters, Gaithersburg, MD July.
Insert the title of your presentation here Presented by Name Here Job Title - Date A reduction in fatal casualties Who, why and what does this mean? Louise.
SCATTER workshop, Milan, 24 October 2003 Testing selected solutions to control urban sprawl The Brussels case city.
PRESENTATION TO THE JOINT RULES COMMITTEE 15 MARCH 2012 ON THE PROGRESS ON IMPLEMENTATION OF THE INDEPENDENT ASSESSMENT PANEL ADOPTED RECOMMENDATIONS ADOPTED.
1 Public Speaking: From Large Audiences to Internal Staff Meetings Rebecca Otto State Auditor NASACT Middle Management Conference April 18, 2013 St. Paul,
VOORBLAD.
Building repositories Iryna Kuchma, eIFL Open Access program manager, eIFL.net Presented at “Open Access: Maximising Research Impact” workshop, May 25.
Checking & Corrective Action
Developing and Implementing a Monitoring & Evaluation Plan
Digital Futures International Forum - Tuesday 18th September 1 Digital Futures International Forum The Digitisation Standard: Back & Forth Stephen Clarke.
Factor P 16 8(8-5ab) 4(d² + 4) 3rs(2r – s) 15cd(1 + 2cd) 8(4a² + 3b²)
© 2012 National Heart Foundation of Australia. Slide 2.
Understanding Generalist Practice, 5e, Kirst-Ashman/Hull
Presented to: Minnesota Chamber of Commerce October 1, 2012.
A tool to protect Minnesota's waters Minnesota Pollution Control Agency, Sept. 10, 2012.
Model and Relationships 6 M 1 M M M M M M M M M M M M M M M M
25 seconds left…...
Slippery Slope
H to shape fully developed personality to shape fully developed personality for successful application in life for successful.
Januar MDMDFSSMDMDFSSS
Internal Control and Control Risk
©Brooks/Cole, 2001 Chapter 12 Derived Types-- Enumerated, Structure and Union.
PSSA Preparation.
Accounting Principles, Ninth Edition
Government of the Republic of Macedonia Secretariat for European Affairs Fifth Meeting, Subcommittee on Transport, Environment, Energy and Regional Development,
NIMS Resource Management IS-700.A – January 2009 Visual 5.1 NIMS Command and Management Unit 5.
RollCaller: User-Friendly Indoor Navigation System Using Human-Item Spatial Relation Yi Guo, Lei Yang, Bowen Li, Tianci Liu, Yunhao Liu Hong Kong University.
NORMAPME ISO User Guide for European SMEs The essence of.
Police ANPR Systems Surveillance camera Code of Practice An overview Presented by:Bill Mandeville Date:23 rd October 2013.
The Legal Framework of the Digital Surveillance Economy Roger Clarke & Angela Daly APSN – Uni Hong Kong – 27 September 2017 Xamax Consultancy,
Presentation transcript:

Copyright Roger Clarke Xamax Consultancy, Canberra Visiting Professor at ANU, UNSW, and the Uni. of Hong Kong Chair, Australian Privacy Foundation {.html,.ppt} Social Implications of Covert Policing Workshop – 7 April 2009 The Covert Implementation of Mass Vehicle Surveillance in Australia

Copyright Red Light and Speed Cameras

Copyright Cynicism about Red Light and Speed Cameras (Vic)

Copyright Covert Implementation of Mass Vehicle Surveillance AGENDA Red-Light / Speed Cameras to ANPR Traffic Applications Blacklist-in-Camera Architecture Quality Factors LEAs – Operational Applications LEAs – Intelligence Applications Mass Surveillance ANPR ANPR Deployments in Australia ANPR Coordination in Australia

Copyright Beyond Red Light / Speed Cameras To Vehicle Surveillance Vehicles can be monitored in various ways, e.g. Manual Inspection of VINs, registration plates Passive RFID-tags passing control-points On-Board Transmitters, with self-reporting of GPS-based or other coordinates Vehicle Registration Data can be monitored: Cameras were wet chemistry, are now digital Data Extraction was manual, is now automated Auto-Lookup of Blacklists is now feasible

Copyright Automated Number Plate Recognition (ANPR)

Copyright Automated Number Plate Recognition (ANPR) A Digital Camera Captures an image of a motor vehicles 'number' plate Software Extracts the registration data (numbers, letters, perhaps other data such as colour and jurisdiction identifiers) List(s) of Numbers Being Sought Enables evaluation of the significance of the extracted data Transmission Facilities Sends the extracted data and perhaps other data elsewhere

Copyright Traffic Applications Traffic Law Enforcement. Detection and prosecution for: running red lights driving at a point-in-time speed over the speed limit Traffic Law Enforcement. Detection and interception of: Unregistered Vehicles ?Driving at an average speed over the speed limit ??Vehicles owned by currently Unlicensed Drivers Public Safety. Deterrence of unsafe practices, e.g. running red lights, speeding ?driving unregistered vehicles ??driving while unlicensed

Copyright 'Blacklist in Camera' ANPR Architecture

Copyright 'Blacklist in Camera' ANPR Architecture

Copyright 'Blacklist in Camera' ANPR Architecture

Copyright ANPR Quality Alliances of purveyors and purchasers suggest that data extraction is accurate and reliable... BUT... Very little evidence is publicly available There appear to be no independent tests Many factors reduce reliability, including: the nature and condition of the registration plates the condition of the camera lens the conditions of the light-path and back-lighting The extraction is by its nature 'fuzzy', and confidence threshholds have to be set Reliable extraction of the registration data may be as low as 70% even under favourable conditions

Copyright ANPR Traffic Applications Some Implications Deterrence of Targeted Behaviour Targeted Fines and Points Deductions Substantial Resources Required, in particular Police Cars Downstream False-Negatives Escape False-Positives Suffer: Financial Impacts Licence-Retention Impacts

Copyright LEAs – Operational Applications Detection and Interception of: Wanted Vehicles, in particular: 'Reported Stolen' 'Get-Away Cars' Vehicles associated with Persons of Interest Dependent on: Real-Time Acccess to... Real-Time-Maintained Data Sources

Copyright LEA Operational Applications Quality Factors and Implications Data-Source Quality Factors are critical, esp. Accuracy, Precision and Currency (Rare?) Instances of Large Benefits (Common?) Instances of Error: High Risk to Vehicle Occupants because of the Interceptor's Suspicions Substantial Embarrassment, Confusion Likelihood of Collateral Police Actions – arbitrary vehicle inspection, search

Copyright LEAs – Intelligence Applications Retrospective Analysis of Vehicle Movements: Detection of Duplicates False Registration Numbers Retrospective Inferences about Owner Location and Movements Retrospective Inferences about Co-Location, and Co-Location Frequency, of: Vehicles People Real-Time Inferences about Location, Co-Location

Copyright Mass Surveillance ANPR Architecture

Copyright Mass Surveillance ANPR Architecture

Copyright LEAs – Intelligence Applications Quality Factors Unreliable Extraction of Registration Data Data Collection Speculative i.e. without Due Cause / Reasonable Grounds for Suspicion This protection is a foundation of a free society Retention Periods unclear and possibly very long Use of Probabilistic (Speculative) Data Mining in order to generate suspicions

Copyright ANPR Deployments in Australia In most States and Territories, one or more agencies has deployed or at least piloted ANPR cameras acquired, some currently operational One longstanding application exists: NSW RTA Safe-T-Cam for trucks 24 fixed-location cameras since 1989 relatively recently migrated to ANPR

Copyright Features of ANPR Deployments in Australia Every Single Deployment Lacks: Explicit Legal Authority Public Justification Public Information Public Consultation Operational Transparency Effective Regulatory Control Effective Privacy Laws

Copyright Submissions expressing serious concern about privacy: APF OFPC OVPC QCCL

Copyright OVPC: "The whole concept of an individuals right to anonymity is sacrificed: it is no longer possible to drive on a public road anonymously, even if one is doing nothing wrong" OFPC: "ANPR can result in the routine collection of the personal information of large numbers of people. For many of these people, there may be no cause for suspicion and hence no reason to collect information about them. A widespread ANPR system may permit government agencies to track a large number of vehicles (and individuals), revealing where individuals have been, when and potentially with whom. Other than in specific circumstances, this does not seem to be information that government agencies would routinely need to know about members of the community... The Office would caution against establishing infrastructure that could [be] used in such an expansive and invasive manner"

Copyright Recommendations of the Qld Parliamentary Committee: [because there is no current justification,] further research of the road safety benefits of ANPR [because the proposal is so privacy-intrusive,] crucial legislative safeguards... to protect... privacy [because quality is low,] the resolution of technical problems that prevent ANPR devices reading some number plate designs

Copyright Coordinative Activities by Crimtrac The national LEA information systems operator (e.g. fingerprint, DNA databases) Given $2.3m for an 'ANPR Scoping Study' Privacy Issues Analysis conducted Nov 2007 "We have not yet determined exactly the extent to which we would capture all data. It may well be that we only capture hot list data" (Transcript of Evidence to Qld Parltry Travelsafe Committee, 14 Mar 2008, p. 17) PIA and Consultation (Jun-Nov 2008)

Copyright Crimtrac's PIA Consultation Paper June 2008 "... the system will collect and store... all sightings of all vehicle passengers" A 'National Automated Vehicle Recognition System' (NAVR) "data-matching to identify alerts would take place centrally..." "sightings would be collected for all vehicles passing a camera site, and would contain an overhead image of the vehicle at sufficient resolution so that the driver or passenger could be identified if appropriate "[from] 300 fixed and 100 mobile to 4000 fixed and 500 mobile cameras" "all ANPR data would be held for five years" an indicative 70 million sightings per day – implying 127 billion photographs and associated metadata over a rolling 5-year cycle

Copyright Crimtrac's Untrustworthiness The position established in May 2008 is inconsistent with the statements of mid-Mar 2008 Committed to Mass Surveillance ANPR Expressly Facilitative of Mass Surveillance No Consideration of the negative consequences PIA Report withheld, despite an understanding it would be published Scoping Study Report withheld

Copyright Covert Implementation of Mass Vehicle Surveillance Conclusions LEAs are implementing ANPR covertly i.e. without full public information, without oversight, without express authority LEAs are using Mass Surveillance ANPR, not Blackist-in-Camera architecture Crimtrac is implementing the facilitative mechanism for Mass Surveillance ANPR After initially adopting some degree of openness, Crimtrac is operating covertly

Copyright Covert Implementation of Mass Vehicle Surveillance Implications For LEAs A further step in the slide into untrustworthiness Greatly increased risk of behaviour above the law Greatly increased risk of serious public distrust For Australian society A profound reduction in civil liberties A groundbreaker for a surveillance society A major contributor to social breakdown and anarchic behaviour

Copyright Covert Implementation of Mass Vehicle Surveillance Policy Implications ANPR is a litmus test of the Rudd Government's capacity to withstand the backroom pressure put on it by the law enforcement community The Australian public wants law enforcement agencies to have appropriate technology and appropriate powers... but not to the extent that freedoms and democracy are undermined

Copyright Counterveillance Principles 1.Independent Evaluation of Technology 2.A Moratorium on Technology Deployments 3.Open Information Flows 4.Justification for Proposed Measures 5.Consultation and Participation 6.Evaluation 7.Design Principles 1.Balance 2.Independent Controls 3.Nymity and Multiple Identity 8.Rollback

Copyright Roger Clarke Xamax Consultancy, Canberra Visiting Professor at ANU, UNSW, and the Uni. of Hong Kong Chair, Australian Privacy Foundation {.html,.ppt} Social Implications of Covert Policing Workshop – 7 April 2009 The Covert Implementation of Mass Vehicle Surveillance in Australia