Copyright 2007-12 1 Roger Clarke Xamax Consultancy, Canberra Visiting Professor in Cyberspace Law &...

24
Copyright 2007-12 1 Roger Clarke Xamax Consultancy, Canberra Visiting Professor in Cyberspace Law & Policy, UNSW and in Computer Science, ANU Chair, Australian Privacy Foundation http://www.anu.edu.au/Roger.Clarke/.... ..../DV/MSR {.html, .ppt} Surveillance Conference Uni Sydney 20 February 2012 Surveillance by the Media and Its Regulation

Transcript of Copyright 2007-12 1 Roger Clarke Xamax Consultancy, Canberra Visiting Professor in Cyberspace Law &...

Page 1: Copyright 2007-12 1 Roger Clarke Xamax Consultancy, Canberra Visiting Professor in Cyberspace Law & Policy, UNSW and in Computer Science, ANU Chair, Australian.

Copyright2007-12

1

Roger ClarkeXamax Consultancy, Canberra

Visiting Professor in Cyberspace Law & Policy, UNSWand in Computer Science, ANU

Chair, Australian Privacy Foundation

http://www.anu.edu.au/Roger.Clarke/......../DV/MSR {.html, .ppt}

Surveillance Conference – Uni Sydney – 20 February 2012

Surveillance by the Media – and Its

Regulation

Page 2: Copyright 2007-12 1 Roger Clarke Xamax Consultancy, Canberra Visiting Professor in Cyberspace Law & Policy, UNSW and in Computer Science, ANU Chair, Australian.

Copyright2007-12

2

Surveillance by the Media – and Its Regulation

AGENDA

• Media Surveillance Practices

• Empirical• Analytical

• Regulation of Media Surveillance

• Contemporary • Prospective

Page 3: Copyright 2007-12 1 Roger Clarke Xamax Consultancy, Canberra Visiting Professor in Cyberspace Law & Policy, UNSW and in Computer Science, ANU Chair, Australian.

Copyright2007-12

3

Kidman – January 2005

QuickTime™ and aTIFF (LZW) decompressor

are needed to see this picture.

Page 4: Copyright 2007-12 1 Roger Clarke Xamax Consultancy, Canberra Visiting Professor in Cyberspace Law & Policy, UNSW and in Computer Science, ANU Chair, Australian.

Copyright2007-12

4

Kidman – January 2005

Stake-out, listening device, still-image photography, car pursuit, AVOs granted

QuickTime™ and aTIFF (LZW) decompressor

are needed to see this picture.

Page 5: Copyright 2007-12 1 Roger Clarke Xamax Consultancy, Canberra Visiting Professor in Cyberspace Law & Policy, UNSW and in Computer Science, ANU Chair, Australian.

Copyright2007-12

5

Falzon & Williams – April 2007

QuickTime™ and aTIFF (Uncompressed) decompressor

are needed to see this picture.

Visual recording, non-public place, covert, unconsented, unofficial media

Page 6: Copyright 2007-12 1 Roger Clarke Xamax Consultancy, Canberra Visiting Professor in Cyberspace Law & Policy, UNSW and in Computer Science, ANU Chair, Australian.

Copyright2007-12

6

Elliott – May 2008

Visual recording, public place, vulnerable person, overt, persistent, consent denied

QuickTime™ and aTIFF (LZW) decompressor

are needed to see this picture.

Page 7: Copyright 2007-12 1 Roger Clarke Xamax Consultancy, Canberra Visiting Professor in Cyberspace Law & Policy, UNSW and in Computer Science, ANU Chair, Australian.

Copyright2007-12

7

Elliott – At the Inquest

QuickTime™ and aTIFF (LZW) decompressor

are needed to see this picture.

Page 8: Copyright 2007-12 1 Roger Clarke Xamax Consultancy, Canberra Visiting Professor in Cyberspace Law & Policy, UNSW and in Computer Science, ANU Chair, Australian.

Copyright2007-12

8

14yo Girl – July 2009

Coercion, vulnerable person, live-to-air

QuickTime™ and aTIFF (LZW) decompressor

are needed to see this picture.

Page 9: Copyright 2007-12 1 Roger Clarke Xamax Consultancy, Canberra Visiting Professor in Cyberspace Law & Policy, UNSW and in Computer Science, ANU Chair, Australian.

Copyright2007-12

9

Campbell – May 2010

Stake-out, covert, visual recording, unconsented, no public interest

QuickTime™ and aTIFF (LZW) decompressor

are needed to see this picture.

Page 10: Copyright 2007-12 1 Roger Clarke Xamax Consultancy, Canberra Visiting Professor in Cyberspace Law & Policy, UNSW and in Computer Science, ANU Chair, Australian.

Copyright2007-12

10

Campbell – May 2010

QuickTime™ and aTIFF (LZW) decompressor

are needed to see this picture.

Page 11: Copyright 2007-12 1 Roger Clarke Xamax Consultancy, Canberra Visiting Professor in Cyberspace Law & Policy, UNSW and in Computer Science, ANU Chair, Australian.

Copyright2007-12

11

Madaleine Pulver – Aug-Nov 2011

Stake-out, visual recording, persistent, overt, consent denied

QuickTime™ and aTIFF (LZW) decompressor

are needed to see this picture.

Page 12: Copyright 2007-12 1 Roger Clarke Xamax Consultancy, Canberra Visiting Professor in Cyberspace Law & Policy, UNSW and in Computer Science, ANU Chair, Australian.

Copyright2007-12

12

Madaleine Pulver – Aug-Nov 2011

Persistent, pursuit

QuickTime™ and aTIFF (LZW) decompressor

are needed to see this picture.

Page 13: Copyright 2007-12 1 Roger Clarke Xamax Consultancy, Canberra Visiting Professor in Cyberspace Law & Policy, UNSW and in Computer Science, ANU Chair, Australian.

Copyright2007-12

13

Madaleine Pulver – Aug-Nov 2011

Stake-out, visual recording, presistent, overt, consent denied, pursuit

QuickTime™ and aTIFF (LZW) decompressor

are needed to see this picture.

Page 14: Copyright 2007-12 1 Roger Clarke Xamax Consultancy, Canberra Visiting Professor in Cyberspace Law & Policy, UNSW and in Computer Science, ANU Chair, Australian.

Copyright2007-12

14

14yo Boy in Bali – October 2011

Stake-out, visual recording, consent denied, persistent, culturally risky

QuickTime™ and aTIFF (LZW) decompressor

are needed to see this picture.

Page 15: Copyright 2007-12 1 Roger Clarke Xamax Consultancy, Canberra Visiting Professor in Cyberspace Law & Policy, UNSW and in Computer Science, ANU Chair, Australian.

Copyright2007-12

15

14yo Boy in Bali – October 2011

QuickTime™ and aTIFF (LZW) decompressor

are needed to see this picture.

QuickTime™ and aTIFF (LZW) decompressor

are needed to see this picture.

Page 16: Copyright 2007-12 1 Roger Clarke Xamax Consultancy, Canberra Visiting Professor in Cyberspace Law & Policy, UNSW and in Computer Science, ANU Chair, Australian.

Copyright2007-12

16

Forms of Surveillance

1. Physical Surveillance

2. Communications Surveillance

3. Dataveillance

4. Location and Tracking Surveillance

5. Body Surveillance ['Überveillance' Type 1]

6. Omnipresent and/or Omniscient Surveillance ['Überveillance' Type 2]

Page 17: Copyright 2007-12 1 Roger Clarke Xamax Consultancy, Canberra Visiting Professor in Cyberspace Law & Policy, UNSW and in Computer Science, ANU Chair, Australian.

Copyright2007-12

17

Dimensions of Surveillance

1. Of What?

2. For Whom?

3. By Whom?

4. Why?

5. How?

6. Where?

7. When?

Page 18: Copyright 2007-12 1 Roger Clarke Xamax Consultancy, Canberra Visiting Professor in Cyberspace Law & Policy, UNSW and in Computer Science, ANU Chair, Australian.

Copyright2007-12

18

Forms of Media Surveillance

1. Physical Surveillance• Unaided watching and

listening with eyes and ears

• Aids, incl. telescopic lenses, directional microphones, recording devices, triggering devices

2. Comms Surveillance• Unauthorised access to

voicemails /'mailbox hacking'), telephone, email or chat/IM traffic

3. Dataveillance• Acquired login/passwd pairs• Hacking• Social Eng'g – pretexting /

blagging, masquerade

4. Loc, Track Surveillance

• Stake-out, pursuit, ...• More sophisticated tools

5. Body Surveillance 6. Omnipresent and/or

Omniscient Surveillance

Page 19: Copyright 2007-12 1 Roger Clarke Xamax Consultancy, Canberra Visiting Professor in Cyberspace Law & Policy, UNSW and in Computer Science, ANU Chair, Australian.

Copyright2007-12

19

Contemporary Regulation of Media Surveillance

Tort• Interference with Real

Estate (Trespass, Nuisance)

• Interference with the Person (Trespass, Obstruction,False Imprisonment, Assault, AVOs / PSIOs)

• Interference with Emotional State (Stalking, Negligence)

• Deceitful Behaviour (Misrepresentation, Deceit, Passing-Off)

Surveillance Statutes• Telecomms (postal, TIAA,

computer offences)• Aural/Visual Surv Devices

(Clth, State, Territory)• Pornography, Anti-

Voyeurism

Other Statutes (Copyright,Trademarks, Media Law, Human Rights, Privacy)

Media Codes (APC, ACMA)

Direct Action (protecting the public, and the media)

Page 20: Copyright 2007-12 1 Roger Clarke Xamax Consultancy, Canberra Visiting Professor in Cyberspace Law & Policy, UNSW and in Computer Science, ANU Chair, Australian.

Copyright2007-12

20

The Regulation of Surveillance – General Principles

1. Justification2. Proportionality3. Openness4. Access Security5. Controlled Use6. Controlled Disclosure7. Controlled Publication8. Non-Retention and Rapid

Destruction9. Review10. Withdrawal

Page 21: Copyright 2007-12 1 Roger Clarke Xamax Consultancy, Canberra Visiting Professor in Cyberspace Law & Policy, UNSW and in Computer Science, ANU Chair, Australian.

Copyright2007-12

21

Media Use of Surveillance – Specific Principle

• DO NOT, unless a clear justification exists:• seek or gather personal data• observe or record personal behaviour

• Base justification only on:• consent by the person to whom the data relates• express legal authority; or• an over-riding public interest

• The nature of the activities, and their degree of intrusiveness:• must reflect the nature and extent of any consent

provided• must reflect the nature and extent of any express legal

authority; and• must be proportionate to the nature and significance of

the public interest arising in the particular circumstances

Page 22: Copyright 2007-12 1 Roger Clarke Xamax Consultancy, Canberra Visiting Professor in Cyberspace Law & Policy, UNSW and in Computer Science, ANU Chair, Australian.

Copyright2007-12

22

The Public Interest

Relevance to:• the performance of:

• a public office• a significant corporate or civil society

function• the credibility of public statements

('hypocrisy')• arguably illegal, immoral or

seriously anti-social behaviour• public health or safety• a significant event

Page 23: Copyright 2007-12 1 Roger Clarke Xamax Consultancy, Canberra Visiting Professor in Cyberspace Law & Policy, UNSW and in Computer Science, ANU Chair, Australian.

Copyright2007-12

23

Media Use of Surveillance – Controlled Activities

1. activities that intrude into the person's private space

2. activities that intrude into the person's reasonable expectations, even though they are in a public space

3. deceit, such as:• masquerade

• misrepresentation or subterfuge pretexting / blagging, masquerade

• unexpected observation or recording

4. exploitation of vulnerability, naiveté or ignorance, esp. children, limited mental capacity, etc.

5. intrusions into private space of people in sensitive situations

6. coercion, incl. implication of a legal or moral obligation, intimidation, excessive persistence

7. perceived trespass, nuisance, obstruction, pursuit, harassment or stalking

Page 24: Copyright 2007-12 1 Roger Clarke Xamax Consultancy, Canberra Visiting Professor in Cyberspace Law & Policy, UNSW and in Computer Science, ANU Chair, Australian.

Copyright2007-12

24

Roger ClarkeXamax Consultancy, Canberra

Visiting Professor in Cyberspace Law & Policy, UNSWand in Computer Science, ANU

Chair, Australian Privacy Foundation

http://www.anu.edu.au/Roger.Clarke/......../DV/MSR {.html, .ppt}

Surveillance Conference – Uni Sydney – 20 February 2012

Surveillance by the Media – and Its

Regulation