The Detecter Project. Detecter - Objectives To identify human rights and other legal and moral standards that detection technologies in counter-terrorism.

Slides:



Advertisements
Similar presentations
Contents: The Consortium Background Goal Objectives Methodology, dissemination strategies and timetable UNIVERSITA CATTOLICA DEL SACRO CUORE MILANO.
Advertisements

Gordon Valentine Detective Inspector Child Abuse Investigation Command Metropolitan Police Service Child Migration & trafficking to the UK.
NHS Commissioning After Winterbourne View - An Update Geoff Baines Associate Director NHS South West 4 October 2011.
Briefing at UN SC CTC January 2008 Meetings of Special Services, Security Agencies, and Law-Enforcement Organizations Federal Security Service of the Russian.
How can you help Terrorist intent on carrying out deadly and determined attacks will conduct what is referred to as ‘hostile reconnaissance. One of the.
2 Counter Terrorism Awareness Week 2014 OFFICIAL Counter Terrorism Awareness Week 2014 Monday 24 th -Sunday 30 th November.
What about a future European Safety Act ? June 8, 2012 Noëlle Lenoir.
Care Act 2014: the new legal framework for adult safeguarding Tim Spencer-Lane PASUK BSAB seminar – 15 May 2014.
10-12 February 2015 UNSW, Sydney. Presented by: Dr Aminath Didi, UNSW Authors: Associate Professor Leanne Dowse, UNSW Dr Karen Soldatic, UNSW Dr Aminath.
Donna Monk MAPPA Co-ordinator.  Understand the purpose and function of MAPPA  Understand the language and terminology of MAPPA  Explore the framework.
Copyright 2010, The World Bank Group. All Rights Reserved. Background and governance Part 1 Crime, Justice & Security Statistics Produced in Collaboration.
USA PATRIOT ACT USA PATRIOT ACT
1 Supplement to the Guideline on Prevention of Money Laundering Hong Kong Monetary Authority 8 June 2004.
Scoping study for Improving Transparency through Citizen Charters in Serbia Transparency Serbia Presentation September 27 th 2010.
Michal Krejza, Head of Sport Unit DG Education & Culture, European Commission London, 20 October 2011 European Commission’s Priorities on Match Fixing.
THE CFATF MUTUAL EVALUATION PROCESS (IN A (SMALL) NUTSHELL) Robin Sykes Financial Investigations Division.
Extremism and Radicalisation Prevent
Information Commissioner’s Office: data protection Judith Jones Senior Policy Officer Strategic Liaison – public security 16 November 2011.
AUDIT TO DETECT FRAUD AND CORRUPTION: EVALUATION OF THE FIGHT AGAINST CORRUPTION AND MONEY LAUNDERING The 10th ASOSAI Research Project Atty. ALEXANDER.
7 March 2013 Counter-terrorism Committee Executive Directorate Facilitating the Provision of Technical Assistance to Member States.
Maritime Security Risk Analysis Model
PRIVACY. In pairs Work out a definition of the word PRIVACY that you think makes sense You’ve got about 7 minutes...
Heba Shams (World Bank) & Nadim Kyriakos –Saad (IMF) World Bank
Investigation and case planning Your responsibilities under the Children Act 1989 Brayne & Carr: Law for Social Workers: 10e Chapter 9.
Internal controls. Session objectives Define Internal Controls To understand components of Internal Controls, control environment and types of controls.
+ New Counterterrorism Technology & Laws Help or hindrance?
Professional Values and Basic Business Legislation.
1 SAPS Operational Strategy Presentation by Deputy National Commissioner LCA Pruis to NPA Stakeholders Conference: 29 March 2007.
AUTHENTICATION IN AN INTERNET ENVIRONMENT Dominick E. Nigro NCUA Information Systems Officer.
1 Office of the Privacy Commissioner for Personal Data Hong Kong SAR Tony LAM Deputy Privacy Commissioner for Personal Data Asian Personal Data Privacy.
1 PRecursors of ExplosiVes: Additives to Inhibit their use including Liquids PREVAIL.
Multi-source tools for assessing the users’ needs & perception on statistical quality. The Spanish experience. European Conference on Quality in Official.
Information Systems Ethics (Cyberethics) Dr. Robert Chi Department of Information Systems California State University, Long Beach.
‘The financial war on terror – a ten year review of counter-terrorist financing strategies'. Dr Nicholas Ryder University of the West of England Wednesday.
European Standards on Confidentiality and Privacy in Healthcare Dr Colin M Harper Division of Psychiatry & Neuroscience Queen’s University.
Cryptography and Network Security (CS435) Part One (Introduction)
Chapter Extension 16 Information Systems and Counterterrorism © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
LEARNING OBJECTIVES TO UNDERSTAND THE RELATIONSHIP OF ETHICS TO MANAGEMENT IN THE INFORMATION SOCIETY TO APPRECIATE THE MORAL DIMENSIONS INVOVED & THE.
Miriam’s Vision: A Response to the 2005 London Bombings History More Consequences of 7/7.
Security aspects in the construction and maintenance of infrastructures of the inland transport sector Richard Harris Director Intelligent Transport Systems.
S5: Internal controls. What is Internal Control Internal control is a process Internal control is a process Internal control is effected by people Internal.
1 PARCC Data Privacy & Security Policy December 2013.
Information Systems Unit 3.
Prevent Fighting extremism Alison Woodcock Pastoral Director – Carmel College 16 th September 2015.
Stakeholder Event 19 March 2015 SCOTT MARKWICK Tel: Mob:
UNECE – SC2 Rail Security Analysis and economic assessment of rail transport security 1st October 2009 Andrew Cook.
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
Ombudsman Western Australia Serving Parliament – Serving Western Australians Evaluation in the Western Australian Ombudsman’s Office Kim Lazenby & Jane.
STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Kristian Krieger, M. Brooke Rogers Chapter 7 - Promoting Public Resilience against Chemical, Biological, Radiological.
3-MINUTE READ THE PREVENT DUTY. What is it and what does it mean for me? This 3-Minute Read summarises the DfE’s document: ‘The Prevent duty: Departmental.
Madrid Barcelona Assessing the legal, social and ethical impact of security technologies.
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
Electronic counter surveillance.
Legal Implications.
Prevent.
Unit 7 – Organisational Systems Security
BSS 481 Competitive Success-- snaptutorial.com
BSS 481 Education for Service-- snaptutorial.com
BSS 481 Teaching Effectively-- snaptutorial.com
BSS 481 Education for Service-- tutorialrank.com
BSS 481 Inspiring Innovation-- snaptutorial.com
Setting Actuarial Standards
Moral principles of CSR
CONFIDENTIALITY, INTEGRITY, LEGAL INTERCEPTION
Chapter 8 Developing an Effective Ethics Program
National Statistician’s Data Ethics Advisory Committee
MARAC Multi Agency Risk Assessment Conference
FATF/GIABA Mutual Evaluation Process and the Role of the NGOs in the Successful Conduct of the Mutual Evaluation Review (MER) Abdul Rahman Mustapha Head,
Transparency Serbia Presentation September 27th 2010
DMCS Data Ethics Framework principles
Presentation transcript:

The Detecter Project

Detecter - Objectives To identify human rights and other legal and moral standards that detection technologies in counter-terrorism must meet, while taking into account the effectiveness of these technologies as judged by law-enforcement bodies responsible for counter-terrorism, and other relevant authorities

Detecter – what the project will do 1 After 9/11 and the terrorist bombings in Madrid (11 March 2004) and London (07 July 2005), policing and intelligence activity have increasingly focused on methods of preventing future attacks, and not just on identifying the perpetrators of offences already committed. Preventive police work includes the use of detection technologies. These range from CCTV camera-surveillance of suspicious behaviour in public places to secret Internet monitoring and data-mining.

Detecter – what the project will do 2 Such technologies raise ethical and legal issues (notably issues of privacy) that must be confronted against the background of the legal and ethical issues raised by counter-terrorism in general. This project will review a wide range of detection technologies, and identify the relative moral risks of preventive counter- terrorism measures.

Detecter – what the project will do 3 Detecter will survey developments in international law in support of counter terrorism, particularly in human rights. It will look in detail at data mining, electronic surveillance of Internet traffic and the use of pre-entry screening measures for migrants, including asylum- seekers.

Detecter – what the project will do day meetings are planned with policy makers, manufacturers and law-enforcement officials to present assessments of both desirable and undesirable features of detection technology products, as well as general standards for products to meet.

Detecter - results The project will produce a substantial review of the human rights consequences of countering terrorism, including with detection technology. The project will meet with technology developers, commissioners and users and provide reports and papers setting out the moral, ethical and legal framework for these products.

Detecter - results A survey of data mining technologies and electronic surveillance of the Internet and other counter terrorism techniques will be undertaken and assessed and safeguards proposed. A major conference will be held in the UK to disseminate the project’s results to all those working in this field.

Detecter