SlideShare a Scribd company logo
1 of 13
Monitoring and controlling Internet use Ian Brown
Human rights in 21 st  century ,[object Object],[object Object],[object Object]
UK surveillance regime ,[object Object],[object Object],[object Object],[object Object]
“ Snooper’s charter” ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Comms data requests/m people Data: European Commission review of Data Retention Directive; IMF World Economic Outlook
Proportionality of retaining data ,[object Object],[object Object]
Efficacy of data mining ,[object Object],[object Object]
Recent court decisions ,[object Object],[object Object],[object Object]
Trust us! ,[object Object],[object Object]
The Intelligence & Security Cttee ,[object Object],[object Object],[object Object],[object Object],[object Object]
Surveillance: public opinion Source: Eurobarometer #225 Data Protection in the EU, Feb. 2008 p.48
Conclusions ,[object Object],[object Object],[object Object]
References ,[object Object],[object Object],[object Object]

More Related Content

What's hot

2011 - Scope of the Regulations and General Principles of Coördination
2011 - Scope of the Regulations and General Principles of Coördination2011 - Scope of the Regulations and General Principles of Coördination
2011 - Scope of the Regulations and General Principles of Coördination
trESS Network
 
Asylum Procedures in the EU_A Method in the Madness_by Elisabeth Vos
Asylum Procedures in the EU_A Method in the Madness_by Elisabeth VosAsylum Procedures in the EU_A Method in the Madness_by Elisabeth Vos
Asylum Procedures in the EU_A Method in the Madness_by Elisabeth Vos
Elisabeth Vos LL.M.
 
Thesis Poster on Human Trafficking & Human Rights
Thesis Poster on Human Trafficking & Human RightsThesis Poster on Human Trafficking & Human Rights
Thesis Poster on Human Trafficking & Human Rights
Dan Sexton
 
Data Privacy, Ethics and Protection
Data Privacy, Ethics and ProtectionData Privacy, Ethics and Protection
Data Privacy, Ethics and Protection
Dr Lendy Spires
 

What's hot (19)

Immigrants in Detention
Immigrants in DetentionImmigrants in Detention
Immigrants in Detention
 
EU policies and legal instruments on counter terrorism
EU policies and legal instruments on counter terrorismEU policies and legal instruments on counter terrorism
EU policies and legal instruments on counter terrorism
 
GDPR and Copyright Law
GDPR and Copyright LawGDPR and Copyright Law
GDPR and Copyright Law
 
2011 - Scope of the Regulations and General Principles of Coördination
2011 - Scope of the Regulations and General Principles of Coördination2011 - Scope of the Regulations and General Principles of Coördination
2011 - Scope of the Regulations and General Principles of Coördination
 
Asylum Procedures in the EU_A Method in the Madness_by Elisabeth Vos
Asylum Procedures in the EU_A Method in the Madness_by Elisabeth VosAsylum Procedures in the EU_A Method in the Madness_by Elisabeth Vos
Asylum Procedures in the EU_A Method in the Madness_by Elisabeth Vos
 
Ukraine Mykhailo Chaplyha
Ukraine Mykhailo ChaplyhaUkraine Mykhailo Chaplyha
Ukraine Mykhailo Chaplyha
 
Thesis Poster on Human Trafficking & Human Rights
Thesis Poster on Human Trafficking & Human RightsThesis Poster on Human Trafficking & Human Rights
Thesis Poster on Human Trafficking & Human Rights
 
Anti Trafficking - The Rules
Anti Trafficking - The RulesAnti Trafficking - The Rules
Anti Trafficking - The Rules
 
Can the law control Digital Leviathan?
Can the law control Digital Leviathan?Can the law control Digital Leviathan?
Can the law control Digital Leviathan?
 
Is the algorithm reliable? The collaboration between technology and humans in...
Is the algorithm reliable? The collaboration between technology and humans in...Is the algorithm reliable? The collaboration between technology and humans in...
Is the algorithm reliable? The collaboration between technology and humans in...
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Sher bahadur budha
Sher bahadur budhaSher bahadur budha
Sher bahadur budha
 
Migration policy
Migration policyMigration policy
Migration policy
 
Commission's initiatives on violence against women
Commission's initiatives on violence against womenCommission's initiatives on violence against women
Commission's initiatives on violence against women
 
Week 3: Responses to terrorism
Week 3: Responses to terrorismWeek 3: Responses to terrorism
Week 3: Responses to terrorism
 
Professor skiadas eu operational schemes on border control
Professor skiadas eu operational  schemes on border controlProfessor skiadas eu operational  schemes on border control
Professor skiadas eu operational schemes on border control
 
Data Privacy, Ethics and Protection
Data Privacy, Ethics and ProtectionData Privacy, Ethics and Protection
Data Privacy, Ethics and Protection
 
Mapping Stakeholders, Decision-makers, and Implementers in Thailand’s Cyber P...
Mapping Stakeholders, Decision-makers, and Implementers in Thailand’s Cyber P...Mapping Stakeholders, Decision-makers, and Implementers in Thailand’s Cyber P...
Mapping Stakeholders, Decision-makers, and Implementers in Thailand’s Cyber P...
 
Mde1569832017 english
Mde1569832017 englishMde1569832017 english
Mde1569832017 english
 

Similar to Monitoring and controlling the Internet

Surveillance of communication by the National Defence Radio Establishment (FRA)
Surveillance of communication by the National Defence Radio Establishment (FRA)Surveillance of communication by the National Defence Radio Establishment (FRA)
Surveillance of communication by the National Defence Radio Establishment (FRA)
Klamberg
 
Surveillance of communication by the National Defence Radio Establishment (FRA)
Surveillance of communication by the National Defence Radio Establishment (FRA)Surveillance of communication by the National Defence Radio Establishment (FRA)
Surveillance of communication by the National Defence Radio Establishment (FRA)
Klamberg
 
DRAFT 2 - The Internet has effectively rendered privacy as a thing of the past
DRAFT 2 - The Internet has effectively rendered privacy as a thing of the pastDRAFT 2 - The Internet has effectively rendered privacy as a thing of the past
DRAFT 2 - The Internet has effectively rendered privacy as a thing of the past
Michael Owen
 
Privacy impact assessment
Privacy impact assessmentPrivacy impact assessment
Privacy impact assessment
Springer
 
Involving citizens in assessing dilemmas of privacy and security
Involving citizens in assessing dilemmas of privacy and securityInvolving citizens in assessing dilemmas of privacy and security
Involving citizens in assessing dilemmas of privacy and security
blogzilla
 
Privacy, human rights and Location Based Services
Privacy, human rights and Location Based ServicesPrivacy, human rights and Location Based Services
Privacy, human rights and Location Based Services
blogzilla
 

Similar to Monitoring and controlling the Internet (20)

Communications Surveillance: Justification and Efficacy
Communications Surveillance: Justification and EfficacyCommunications Surveillance: Justification and Efficacy
Communications Surveillance: Justification and Efficacy
 
Trusted government access to private sector data
Trusted government access to private sector dataTrusted government access to private sector data
Trusted government access to private sector data
 
Keeping our secrets? Shaping Internet technologies for the public good
Keeping our secrets? Shaping Internet technologies for the public goodKeeping our secrets? Shaping Internet technologies for the public good
Keeping our secrets? Shaping Internet technologies for the public good
 
Surveillance of communication by the National Defence Radio Establishment (FRA)
Surveillance of communication by the National Defence Radio Establishment (FRA)Surveillance of communication by the National Defence Radio Establishment (FRA)
Surveillance of communication by the National Defence Radio Establishment (FRA)
 
Surveillance of communication by the National Defence Radio Establishment (FRA)
Surveillance of communication by the National Defence Radio Establishment (FRA)Surveillance of communication by the National Defence Radio Establishment (FRA)
Surveillance of communication by the National Defence Radio Establishment (FRA)
 
DRAFT 2 - The Internet has effectively rendered privacy as a thing of the past
DRAFT 2 - The Internet has effectively rendered privacy as a thing of the pastDRAFT 2 - The Internet has effectively rendered privacy as a thing of the past
DRAFT 2 - The Internet has effectively rendered privacy as a thing of the past
 
Ubicomp challenges for privacy law
Ubicomp challenges for privacy lawUbicomp challenges for privacy law
Ubicomp challenges for privacy law
 
Net neutrality, citizenship and discrimination
Net neutrality, citizenship and discriminationNet neutrality, citizenship and discrimination
Net neutrality, citizenship and discrimination
 
Journal #1
Journal #1 Journal #1
Journal #1
 
Shall we learn how to protect out personal data? An introduction to personal ...
Shall we learn how to protect out personal data? An introduction to personal ...Shall we learn how to protect out personal data? An introduction to personal ...
Shall we learn how to protect out personal data? An introduction to personal ...
 
Electronic Surveillance of Communications 100225
Electronic Surveillance of Communications 100225Electronic Surveillance of Communications 100225
Electronic Surveillance of Communications 100225
 
Electronic Surveillance Of Communications 100225
Electronic Surveillance Of Communications 100225Electronic Surveillance Of Communications 100225
Electronic Surveillance Of Communications 100225
 
PL&B _UK_80
PL&B _UK_80PL&B _UK_80
PL&B _UK_80
 
Privacy impact assessment
Privacy impact assessmentPrivacy impact assessment
Privacy impact assessment
 
Whistleblowing and the Right to Freedom of Expression and Information under t...
Whistleblowing and the Right to Freedom of Expression and Information under t...Whistleblowing and the Right to Freedom of Expression and Information under t...
Whistleblowing and the Right to Freedom of Expression and Information under t...
 
Involving citizens in assessing dilemmas of privacy and security
Involving citizens in assessing dilemmas of privacy and securityInvolving citizens in assessing dilemmas of privacy and security
Involving citizens in assessing dilemmas of privacy and security
 
Privacy post-Snowden
Privacy post-SnowdenPrivacy post-Snowden
Privacy post-Snowden
 
Privacy, human rights and Location Based Services
Privacy, human rights and Location Based ServicesPrivacy, human rights and Location Based Services
Privacy, human rights and Location Based Services
 
Data Protection / EU Counter-Terrorism policy
Data Protection / EU Counter-Terrorism policyData Protection / EU Counter-Terrorism policy
Data Protection / EU Counter-Terrorism policy
 
Policy Brief on Europe's "Right to be Forgotten"
Policy Brief on Europe's "Right to be Forgotten"Policy Brief on Europe's "Right to be Forgotten"
Policy Brief on Europe's "Right to be Forgotten"
 

More from blogzilla

Copyright and privacy by design - what lessons have we learned?
Copyright and privacy by design - what lessons have we learned?Copyright and privacy by design - what lessons have we learned?
Copyright and privacy by design - what lessons have we learned?
blogzilla
 

More from blogzilla (20)

Interoperability for SNS competition
Interoperability for SNS competitionInteroperability for SNS competition
Interoperability for SNS competition
 
Transatlantic data flows following the Schrems II judgment
Transatlantic data flows following the Schrems II judgmentTransatlantic data flows following the Schrems II judgment
Transatlantic data flows following the Schrems II judgment
 
Lessons for interoperability remedies from UK Open Banking
Lessons for interoperability remedies from UK Open BankingLessons for interoperability remedies from UK Open Banking
Lessons for interoperability remedies from UK Open Banking
 
Covid exposure apps in England and Wales
Covid exposure apps in England and WalesCovid exposure apps in England and Wales
Covid exposure apps in England and Wales
 
Key issues in data protection policy
Key issues in data protection policyKey issues in data protection policy
Key issues in data protection policy
 
Interoperability in the Digital Services Act
Interoperability in the Digital Services ActInteroperability in the Digital Services Act
Interoperability in the Digital Services Act
 
Making effective policy use of academic expertise
Making effective policy use of academic expertiseMaking effective policy use of academic expertise
Making effective policy use of academic expertise
 
Introduction to Cybersecurity for Elections
Introduction to Cybersecurity for ElectionsIntroduction to Cybersecurity for Elections
Introduction to Cybersecurity for Elections
 
Cyber Essentials for Managers
Cyber Essentials for ManagersCyber Essentials for Managers
Cyber Essentials for Managers
 
Privacy and Data Protection in South Africa
Privacy and Data Protection in South AfricaPrivacy and Data Protection in South Africa
Privacy and Data Protection in South Africa
 
Human rights and the future of surveillance - Lord Anderson QC
Human rights and the future of surveillance - Lord Anderson QCHuman rights and the future of surveillance - Lord Anderson QC
Human rights and the future of surveillance - Lord Anderson QC
 
Data science and privacy regulation
Data science and privacy regulationData science and privacy regulation
Data science and privacy regulation
 
Where next for encryption regulation?
Where next for encryption regulation?Where next for encryption regulation?
Where next for encryption regulation?
 
Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?
 
Regulation and the Internet of Things
Regulation and the Internet of ThingsRegulation and the Internet of Things
Regulation and the Internet of Things
 
Global Cyber Security Capacity Centre
Global Cyber Security Capacity CentreGlobal Cyber Security Capacity Centre
Global Cyber Security Capacity Centre
 
The Data Retention Directive: recent developments
The Data Retention Directive: recent developmentsThe Data Retention Directive: recent developments
The Data Retention Directive: recent developments
 
Trust in the Cloud
Trust in the CloudTrust in the Cloud
Trust in the Cloud
 
Copyright and privacy by design - what lessons have we learned?
Copyright and privacy by design - what lessons have we learned?Copyright and privacy by design - what lessons have we learned?
Copyright and privacy by design - what lessons have we learned?
 
Investigating cybercrime at the United Nations
Investigating cybercrime at the United NationsInvestigating cybercrime at the United Nations
Investigating cybercrime at the United Nations
 

Recently uploaded

Powerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost LoverPowerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost Lover
PsychicRuben LoveSpells
 

Recently uploaded (20)

Powerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost LoverPowerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost Lover
 
Julius Randle's Injury Status: Surgery Not Off the Table
Julius Randle's Injury Status: Surgery Not Off the TableJulius Randle's Injury Status: Surgery Not Off the Table
Julius Randle's Injury Status: Surgery Not Off the Table
 
Lorenzo D'Emidio_Lavoro sullaNorth Korea .pptx
Lorenzo D'Emidio_Lavoro sullaNorth Korea .pptxLorenzo D'Emidio_Lavoro sullaNorth Korea .pptx
Lorenzo D'Emidio_Lavoro sullaNorth Korea .pptx
 
Embed-4.pdf lkdiinlajeklhndklheduhuekjdh
Embed-4.pdf lkdiinlajeklhndklheduhuekjdhEmbed-4.pdf lkdiinlajeklhndklheduhuekjdh
Embed-4.pdf lkdiinlajeklhndklheduhuekjdh
 
06052024_First India Newspaper Jaipur.pdf
06052024_First India Newspaper Jaipur.pdf06052024_First India Newspaper Jaipur.pdf
06052024_First India Newspaper Jaipur.pdf
 
2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docx
2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docx2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docx
2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docx
 
China's soft power in 21st century .pptx
China's soft power in 21st century   .pptxChina's soft power in 21st century   .pptx
China's soft power in 21st century .pptx
 
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
 
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 47 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 47 (Gurgaon)Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 47 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 47 (Gurgaon)
 
Kishan Reddy Report To People (2019-24).pdf
Kishan Reddy Report To People (2019-24).pdfKishan Reddy Report To People (2019-24).pdf
Kishan Reddy Report To People (2019-24).pdf
 
KAHULUGAN AT KAHALAGAHAN NG GAWAING PANSIBIKO.pptx
KAHULUGAN AT KAHALAGAHAN NG GAWAING PANSIBIKO.pptxKAHULUGAN AT KAHALAGAHAN NG GAWAING PANSIBIKO.pptx
KAHULUGAN AT KAHALAGAHAN NG GAWAING PANSIBIKO.pptx
 
2024 02 15 AZ GOP LD4 Gen Meeting Minutes_FINAL_20240228.docx
2024 02 15 AZ GOP LD4 Gen Meeting Minutes_FINAL_20240228.docx2024 02 15 AZ GOP LD4 Gen Meeting Minutes_FINAL_20240228.docx
2024 02 15 AZ GOP LD4 Gen Meeting Minutes_FINAL_20240228.docx
 
Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...
Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...
Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...
 
1971 war india pakistan bangladesh liberation.ppt
1971 war india pakistan bangladesh liberation.ppt1971 war india pakistan bangladesh liberation.ppt
1971 war india pakistan bangladesh liberation.ppt
 
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 48 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 48 (Gurgaon)Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 48 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 48 (Gurgaon)
 
Embed-2 (1).pdfb[k[k[[k[kkkpkdpokkdpkopko
Embed-2 (1).pdfb[k[k[[k[kkkpkdpokkdpkopkoEmbed-2 (1).pdfb[k[k[[k[kkkpkdpokkdpkopko
Embed-2 (1).pdfb[k[k[[k[kkkpkdpokkdpkopko
 
BDSM⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort Service
 
BDSM⚡Call Girls in Sector 143 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 143 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 143 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 143 Noida Escorts >༒8448380779 Escort Service
 
Enjoy Night⚡Call Girls Rajokri Delhi >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Rajokri Delhi >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Rajokri Delhi >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Rajokri Delhi >༒8448380779 Escort Service
 
Nara Chandrababu Naidu's Visionary Policies For Andhra Pradesh's Development
Nara Chandrababu Naidu's Visionary Policies For Andhra Pradesh's DevelopmentNara Chandrababu Naidu's Visionary Policies For Andhra Pradesh's Development
Nara Chandrababu Naidu's Visionary Policies For Andhra Pradesh's Development
 

Monitoring and controlling the Internet

Editor's Notes

  1. Data: European Commission evaluation of data retention directive p.33; IMF World Economic Outlook 2009 population figures for 2008
  2. http://ec.europa.eu/justice_home/fsj/privacy/docs/wpdocs/2006/wp119_en.pdf
  3. Surveillance Net Yields Few Suspects. NSA's Hunt for Terrorists Scrutinizes Thousands of Americans, but Most Are Later Cleared. By Barton Gellman, Dafna Linzer and Carol D. Leonnig Washington Post Staff Writers
Sunday, February 5, 2006; Page A01
  4. http://vortex.uvt.nl/TILTblog/?p=118#more-118 http://www.aip-bg.org/documents/data_retention_campaign_11122008eng.htm
  5. http://www.publications.parliament.uk/pa/ld200910/ldhansrd/text/100330-gc0001.htm
  6. Limits of opinion polling