Upload
aaliyah-tobin
View
222
Download
4
Tags:
Embed Size (px)
Citation preview
Copyright2007-12
1
Roger ClarkeXamax Consultancy, Canberra
Visiting Professor in Cyberspace Law & Policy, UNSWand in Computer Science, ANU
Chair, Australian Privacy Foundation
http://www.anu.edu.au/Roger.Clarke/......../DV/MSR {.html, .ppt}
Surveillance Conference – Uni Sydney – 20 February 2012
Surveillance by the Media – and Its
Regulation
Copyright2007-12
2
Surveillance by the Media – and Its Regulation
AGENDA
• Media Surveillance Practices
• Empirical• Analytical
• Regulation of Media Surveillance
• Contemporary • Prospective
Copyright2007-12
3
Kidman – January 2005
QuickTime™ and aTIFF (LZW) decompressor
are needed to see this picture.
Copyright2007-12
4
Kidman – January 2005
Stake-out, listening device, still-image photography, car pursuit, AVOs granted
QuickTime™ and aTIFF (LZW) decompressor
are needed to see this picture.
Copyright2007-12
5
Falzon & Williams – April 2007
QuickTime™ and aTIFF (Uncompressed) decompressor
are needed to see this picture.
Visual recording, non-public place, covert, unconsented, unofficial media
Copyright2007-12
6
Elliott – May 2008
Visual recording, public place, vulnerable person, overt, persistent, consent denied
QuickTime™ and aTIFF (LZW) decompressor
are needed to see this picture.
•
Copyright2007-12
7
Elliott – At the Inquest
QuickTime™ and aTIFF (LZW) decompressor
are needed to see this picture.
Copyright2007-12
8
14yo Girl – July 2009
Coercion, vulnerable person, live-to-air
QuickTime™ and aTIFF (LZW) decompressor
are needed to see this picture.
Copyright2007-12
9
Campbell – May 2010
Stake-out, covert, visual recording, unconsented, no public interest
QuickTime™ and aTIFF (LZW) decompressor
are needed to see this picture.
Copyright2007-12
10
Campbell – May 2010
QuickTime™ and aTIFF (LZW) decompressor
are needed to see this picture.
Copyright2007-12
11
Madaleine Pulver – Aug-Nov 2011
Stake-out, visual recording, persistent, overt, consent denied
QuickTime™ and aTIFF (LZW) decompressor
are needed to see this picture.
Copyright2007-12
12
Madaleine Pulver – Aug-Nov 2011
Persistent, pursuit
QuickTime™ and aTIFF (LZW) decompressor
are needed to see this picture.
Copyright2007-12
13
Madaleine Pulver – Aug-Nov 2011
Stake-out, visual recording, presistent, overt, consent denied, pursuit
QuickTime™ and aTIFF (LZW) decompressor
are needed to see this picture.
Copyright2007-12
14
14yo Boy in Bali – October 2011
Stake-out, visual recording, consent denied, persistent, culturally risky
QuickTime™ and aTIFF (LZW) decompressor
are needed to see this picture.
Copyright2007-12
15
14yo Boy in Bali – October 2011
QuickTime™ and aTIFF (LZW) decompressor
are needed to see this picture.
QuickTime™ and aTIFF (LZW) decompressor
are needed to see this picture.
Copyright2007-12
16
Forms of Surveillance
1. Physical Surveillance
2. Communications Surveillance
3. Dataveillance
4. Location and Tracking Surveillance
5. Body Surveillance ['Überveillance' Type 1]
6. Omnipresent and/or Omniscient Surveillance ['Überveillance' Type 2]
Copyright2007-12
17
Dimensions of Surveillance
1. Of What?
2. For Whom?
3. By Whom?
4. Why?
5. How?
6. Where?
7. When?
Copyright2007-12
18
Forms of Media Surveillance
1. Physical Surveillance• Unaided watching and
listening with eyes and ears
• Aids, incl. telescopic lenses, directional microphones, recording devices, triggering devices
2. Comms Surveillance• Unauthorised access to
voicemails /'mailbox hacking'), telephone, email or chat/IM traffic
3. Dataveillance• Acquired login/passwd pairs• Hacking• Social Eng'g – pretexting /
blagging, masquerade
4. Loc, Track Surveillance
• Stake-out, pursuit, ...• More sophisticated tools
5. Body Surveillance 6. Omnipresent and/or
Omniscient Surveillance
Copyright2007-12
19
Contemporary Regulation of Media Surveillance
Tort• Interference with Real
Estate (Trespass, Nuisance)
• Interference with the Person (Trespass, Obstruction,False Imprisonment, Assault, AVOs / PSIOs)
• Interference with Emotional State (Stalking, Negligence)
• Deceitful Behaviour (Misrepresentation, Deceit, Passing-Off)
Surveillance Statutes• Telecomms (postal, TIAA,
computer offences)• Aural/Visual Surv Devices
(Clth, State, Territory)• Pornography, Anti-
Voyeurism
Other Statutes (Copyright,Trademarks, Media Law, Human Rights, Privacy)
Media Codes (APC, ACMA)
Direct Action (protecting the public, and the media)
Copyright2007-12
20
The Regulation of Surveillance – General Principles
1. Justification2. Proportionality3. Openness4. Access Security5. Controlled Use6. Controlled Disclosure7. Controlled Publication8. Non-Retention and Rapid
Destruction9. Review10. Withdrawal
Copyright2007-12
21
Media Use of Surveillance – Specific Principle
• DO NOT, unless a clear justification exists:• seek or gather personal data• observe or record personal behaviour
• Base justification only on:• consent by the person to whom the data relates• express legal authority; or• an over-riding public interest
• The nature of the activities, and their degree of intrusiveness:• must reflect the nature and extent of any consent
provided• must reflect the nature and extent of any express legal
authority; and• must be proportionate to the nature and significance of
the public interest arising in the particular circumstances
Copyright2007-12
22
The Public Interest
Relevance to:• the performance of:
• a public office• a significant corporate or civil society
function• the credibility of public statements
('hypocrisy')• arguably illegal, immoral or
seriously anti-social behaviour• public health or safety• a significant event
Copyright2007-12
23
Media Use of Surveillance – Controlled Activities
1. activities that intrude into the person's private space
2. activities that intrude into the person's reasonable expectations, even though they are in a public space
3. deceit, such as:• masquerade
• misrepresentation or subterfuge pretexting / blagging, masquerade
• unexpected observation or recording
4. exploitation of vulnerability, naiveté or ignorance, esp. children, limited mental capacity, etc.
5. intrusions into private space of people in sensitive situations
6. coercion, incl. implication of a legal or moral obligation, intimidation, excessive persistence
7. perceived trespass, nuisance, obstruction, pursuit, harassment or stalking
Copyright2007-12
24
Roger ClarkeXamax Consultancy, Canberra
Visiting Professor in Cyberspace Law & Policy, UNSWand in Computer Science, ANU
Chair, Australian Privacy Foundation
http://www.anu.edu.au/Roger.Clarke/......../DV/MSR {.html, .ppt}
Surveillance Conference – Uni Sydney – 20 February 2012
Surveillance by the Media – and Its
Regulation