Grant Agreement number: 313243 Project acronym: SUNNY Project title: Smart UNattended airborne sensor Network for detection of vessels used for cross border crime and irregular entrY Funding Scheme: Collaborative project D1.4: Surveillance Societal and Ethical Aspects Due date of deliverable: 31/08/2014 Actual submission date: 28/08/2014 Start date of project: 01/01/2014 Organisation name of lead contractor for this deliverable: Marlo Participating: BMT, KEMEA Duration: 42 Months Project co-funded by the European Commission within the Seventh Framework Programme (2007-2013) Dissemination Level PU Public PP Restricted to other programme participants (including the Commission Services) RE Restricted to a group specified by the consortium (including the Commission Confidential, only for members of the consortium (including the Commission CO Services) SUNNY D1.4: Surveillance societal and ethical aspects Document Title: Surveillance Societal and Ethical Aspects WP: 1 Document number: T1.4 Main Authors Org Frank Conde Tangberg Marlo Contributing Authors Org David Griffith BMT Jan Tore Pedersen Marlo Doc. History Version Comments Date V1 First draft for internal review 23.02.2014 V2 Submitted 28.08.2014 Number of pages: Number of annexes: D1.4 Authorised by 66 Page 2 of 66 SUNNY D1.4: Surveillance societal and ethical aspects Contents CONTENTS ........................................................................................................................................................ 3 ACRONYMS ........................................................................................................................................................................ 4 1. EXECUTIVE SUMMARY ................................................................................................................................................. 6 2. INTRODUCTION ............................................................................................................................................................... 7 2.1 SUNNY Project Objectives .................................................................................................................................... 7 3. INTERNATIONAL REFUGEE LAW AND SEARCH AND RESCUE ....................................................................................................... 8 3.1 Introduction.......................................................................................................................................................... 8 3.2 International Refugee Law ................................................................................................................................... 8 3.3 Search and Rescue................................................................................................................................................ 9 3.4 Rules for Border Surveillance.............................................................................................................................. 10 4. EUROSUR .................................................................................................................................................................. 11 4.1 Overview ............................................................................................................................................................ 11 4.2 Criticism.............................................................................................................................................................. 14 5. THE RIGHT TO PRIVACY AND DATA PROTECTION .................................................................................................................. 17 5.1 Introduction........................................................................................................................................................ 17 5.2 1950 European Convention on Human Rights (ECHR)........................................................................................ 18 5.3 1966 International Covenant on Civil and Political Rights (ICCPR) ..................................................................... 18 5.4 1980 OECD Guidelines ........................................................................................................................................ 19 5.5 The 1981 Council of Europe’s (CoE) Convention for the Protection of Individuals with Regard to Automatic Processing of Personal Data..................................................................................................................................... 20 5.6 Data Protection Directive 95/46/EC ................................................................................................................... 21 5.7 The Charter of Fundamental Rights (2000) ........................................................................................................ 22 5.8 EC Regulation 45/2001 ....................................................................................................................................... 22 5.9 General Data Protection Regulation .................................................................................................................. 22 5.10 Police and Criminal Justice Data Protection Directive ...................................................................................... 23 6. PRIVACY BY DESIGN ....................................................................................................................................................... 25 6.1 Overview ............................................................................................................................................................ 25 6.2 Business Practices .............................................................................................................................................. 27 6.3 Physical design and infrastructure ..................................................................................................................... 29 6.4 Privacy-Enhancing Technologies ........................................................................................................................ 29 6.5 The Privacy by Design Principles ........................................................................................................................ 32 6.6 Privacy Risk Management .................................................................................................................................. 33 7. LEGAL FRAMEWORK FOR UAV’S....................................................................................................................................... 39 7.1 Introduction........................................................................................................................................................ 39 7.2 International UAS Legal Instruments and Initiatives .......................................................................................... 40 7.3 European UAS Legal Instruments and Initiatives ............................................................................................... 41 7.4 National UAS Legal Instruments and Initiatives ................................................................................................. 43 7.5 U.S Legal Framework for the use of UAS for Border Control .............................................................................. 45 7.6 Recommendations for Test-Sites ........................................................................................................................ 47 8. GENERAL CONCERNS ABOUT UAS USE ............................................................................................................................... 48 9. GUIDING PRINCIPLES FOR SUNNY .................................................................................................................................... 49 10. ANNEX 1: RECOMMENDATIONS MADE FOR OTHER EU PROJECTS .......................................................................................... 52 10.1 OPARUS ............................................................................................................................................................ 52 10.2 PRESCIENT ........................................................................................................................................................ 53 11. ANNEX 2: GUIDING QUESTIONS TO CONSIDER ................................................................................................................... 54 Page 3 of 66 SUNNY D1.4: Surveillance societal and ethical aspects Acronyms ACLU – American Civil Liberties Union AUVSI - Association for Unmanned Vehicle Systems International BCR – Binding Corporate Rules CBP - Customs and Border Protection Agency (USA) CCTV – Closed Circuit Television CISE – Common Information Sharing System CDT - Washington Center for Democracy and Technology CFREU - The Charter of Fundamental Rights of the European Union CoE – Council of Europe CPO - Chief Privacy Officer DHS – Department of Homeland Security (USA) DoW – Description of Work DPA – Data Protection Authority EASA - European Aviation Safety Agency EC – European Commission ECHR – European Convention on Human Rights ECtHR – European Court of Human Rights EDPS – European Data Protection Supervisor ELOS – Equivalent Level of Safety EP – European Parliament EPIC - Electronic Privacy Information Center ERSG - European Remotely Piloted Aircraft Systems Steering Group EU – European Union FAA – Federal Aviation Authorities (USA) FIP – Fair Information Practices GAO - Government Accountability Office (USA) HRC – Human Rights Committee ICAO - International Civil Aviation Organization ICCPR - International Covenant on Civil and Political Rights ICO – Information Commissioner’s Office (UK) IMO – International Maritime Organization INA - Immigration and Nationality Act (USA) INOUI - Innovative Operational UAS Integration JO – Frontex coordinated Joint Operations LIBE - European Parliament’s Civil Liberties, Justice and Home Affairs Committee NCC – National Coordination Centre NIR - Near Infrared OECD - The Organization for Economic Co-operation and Development PACE - Parliamentary Assembly of the Council of Europe PbD – Privacy by Design PET’s – Privacy-enhancing Technologies PIA – Privacy Impact Assessment PII – Personally Identifiable Information RPAS – Remotely Piloted Aircraft Systems SAR – Search and Rescue SES – Single European Sky TSA - Transport Security Administrator (USA) UAS – Unmanned Aerial Systems Page 4 of 66 SUNNY D1.4: Surveillance societal and ethical aspects UAV – Unmanned Aerial Vehicle UDHR – Universal Declaration of Human Rights UNCLOS – United Nations Convention of the Law of the Sea Page 5 of 66 SUNNY D1.4: Surveillance societal and ethical aspects 1. Executive Summary This document details issues that need to be taken into account with designing SUNNY capabilities: a. Data protection and privacy issues b. Privacy by Design (PbD) and the impact of the concept in SUNNY c. Current EU border management with examples of irregular migration in specific regions. d. Legal and human rights issues Page 6 of 66 SUNNY D1.4: Surveillance societal and ethical aspects 2. Introduction 2.1 SUNNY Project Objectives The SUNNY project’s ultimate aim is to contribute to EUROSUR by defining a new tool for collecting realtime information in operational scenarios. SUNNY represents a step beyond existing research projects due to the following main features: A two-tier intelligent heterogeneous Unmanned Aerial Vehicle (UAV) sensor network will be considered in order to provide both large field and focused surveillance capabilities, where the first-tier sensors, carried by medium altitude, long-endurance autonomous UAVs, are used to patrol large border areas to detect suspicious targets and provide global situation awareness. Fed with the information collected by the first-tier sensors, the second-tier sensors will be deployed to provide more focused surveillance capability by tracking the targets and collecting further evidence for more accurate target recognition and threat evaluation. Novel algorithms will be developed to analyse the data collected by the sensors for robust and accurate target identification and event detection; Novel sensors and on-board processing generation, integrated on UAV system, will be focus on low weight, low cost, high resolution that can operate under variable conditions such as darkness, snow, and rain. In particular, SUNNY will develop sensors that generate both RGB image, Near Infrared (NIR) image and hyperspectral image and that use radar information to detect, discriminate and track objects of interest inside complex environment, over land and sea. Alloying to couple sensor processing and preliminary detection results (on-board) with local UAV control, leading to innovative active sensing techniques, replacing low-level sensor data communication by a higher abstraction level of information communication 1. To ensure that the societal and ethical dimensions are being properly taken into account during the project, the contributors to this deliverable will participate in the quality assurance processes in the project. 1 SUNNY., 2013., Description of Work. Page 7 of 66 SUNNY D1.4: Surveillance societal and ethical aspects 3. International Refugee Law and Search and Rescue 3.1 Introduction SUNNY will take place within the framework of EUROSUR, a recently adopted European Union (EU) Regulation for Schengen States, which is aimed at guiding the implementation of a structure that will allow border management to be carried out more effectively, particularly by instructing the participating Member States to install new and coordinated surveillance mechanisms. These will provide both a European and a National Situational Awareness Picture, with real-time data provided by a variety of sources from numerous sectors operating in the maritime environment. Frontex will coordinate efforts between National Coordination Centres (NCC’s), which will all provide data to Frontex. The Agency will coordinate surveillance operations to make sure that illegal immigration, the death toll at sea and crossborder crime are all reduced. EUROSUR reiterates that Member States must nonetheless comply with obligations already assumed through instruments governing the law of the sea, search and rescue, human rights, international refugee law and protection of data and the right to privacy. The operating mechanisms and the affirmation of obligations related to data protection, search and rescue and international human rights/refugee law are important considerations for SUNNY. The project will produce an end-result (surveillance mechanisms) that must be able to fulfil determined purposes while enabling users to safeguard fundamental rights of those affected. This requires an understanding of the legal instruments that govern these issues. On numerous occasions, all the main EU organs have expressed that it is a requirement to guarantee that the projects they fund, such as SUNNY, facilitate compliance with these obligations. In order to achieve this, SUNNY partners must understand these legal commitments. 3.2 International Refugee Law The definition of a refugee is not widely known, but should be understood by everybody involved in SUNNY. Its definition is found in Art.1 (A)(2) of the 1951 International Convention Related to the Status of Refugees: “Refugees have a well-defined fear of persecution due to reasons of race, religion, nationality, membership of a particular social group or political opinion and is outside of his own country and unable/unwilling to seek domestic protection”. It is one’s de facto circumstances, not the official validation of them, which gives rise to the rights established in the Refugee Convention. This is relevant, as one can imagine a scenario where an UAV picks up the images of a person on a raft that is sailing towards an EU Member States, and that this person fulfils the criteria established by the Convention. That person is a refugee once he or she leaves the country where he or she had a well-founded fear of being persecuted (assuming that his country is his country of origin or habitual residence and that he is not able to seek protection from these authorities), for the defined reasons in the Convention, even if he or she has not been recognised by the EU. That person also has the right not be rejected at the frontier, to be granted entry and to access all the rights in the Refugee Convention. It is unclear how such rights will be respected, in practice, in the EUROSUR framework, especially considering the history of rejection and “push-backs” several of the EU Member States have. This is the reason several experts have expressed fear that the EUROSUR Regulation will be more inclined to attempt to seal the borders than to respect international refugee law. It is disappointing that the wording in the EUROSUR Regulation uses the word “illegal immigrant” instead of “irregular”, considering that the Member States have a responsibility to admit and process any asylum claim (respecting the assumption of innocence) before attributing an “illegal” status to a person. SUNNY has chosen the wording “irregular” which is commendable. Page 8 of 66 SUNNY D1.4: Surveillance societal and ethical aspects One of the cornerstones in international refugee law is the right to “non-refoulment”. This right is manifested in Art.33(1) of the Refugee Convention, and reiterated as a non-derogatory right in several other human right instruments (amongst others, the 1984 Torture Convention) states that: “No Contracting State shall expel or return (“refouler”) a refugee in any manner whatsoever to the frontiers of territories where his [or her] life or freedom would be threatened on account of his [or her] race, religion, nationality, membership of a particular social group or political opinion”. It is particularly this right that there is a deep concern that could be broken with the implementation of EUROSUR. Breaking this right normally entails sending a person back to a place where he will be tortured, executed or otherwise have his or her rights severely violated. No State should receive assistance in breaking this right. Whenever control is assumed over a migrant by a State, even if it is done extraterritorially, the State also assumes the legal obligation to make sure the person’s rights are protected as well (Bankovic vs Belgium in the ECtHR 2). This entails that if, for example, a border management mission assumes de facto control over migrants at sea, even if it is in the high seas or in a third country, they assume the human rights responsibilities associated with such control. Therefore, a screening of every migrant of which control is assumed is necessary to see whether or not this person is a refugee or whether the person could be in danger of torture or another serious human rights violation (see Sale v. Haitian Centers Council 3). It is also important to keep in mind that one does not have a right to deny people the right to leave any country, including one’s own 4. The scepticism concerning the EU Member States will to actually respect the right to non-refoulment in the EUROSUR, especially at the southern border, is easy to understand. One has to keep in mind that Italy was recently sentenced for violating this right by the ECtHR in the case Hirsi Jamaa and Others V. Italy 5. 3.3 Search and Rescue The obligations set out under the ‘search and rescue’ concept are addressed in several international instruments. The International Maritime Organization (IMO) established ‘The Convention on Search and Rescue’ in 1979. In short this instrument establishes it as an international legal obligation to provide aid for those at sea, independent of their nationality and status. EUROSR, with its massive surveillance, has a strong potential to strengthen the Search and Rescue operational capability in the region if the political will to implement this obligation exists. ‘The 1982 UN Convention of the Law of the Sea (UNCLOS)’ establishes that it is an international obligation to promote the establishment, operation and maintenance of an adequate and effective search and rescue service. Again, EUROSUR has the potential to strengthen such an establishment and operation. 2 Sperotto., 2006., Beyond Bankovic: Extraterritorial Application of the European Convention on Human Rights. 3 Supreme Court of the United States of America., 1993., Sale v. Haitian Centers Council 4 International Covenant on Civil and Political Rights., 1966., Art.12(2). 5 European Court of Human Rights., 2012., Hirsi Jamaa v. Italy Page 9 of 66 SUNNY D1.4: Surveillance societal and ethical aspects The SAR Convention and UNCLOS both affirm that ships should not be subject to undue delay, financial burden or other related difficulties after assisting persons at sea; therefore coastal States should relieve the ship as soon as practicable (Ch.5. Reg.7 & Ch.1.3.2.). The IMO furthermore passed a Resolution (A920 (22)) in which one objective is that ships, which have retrieved persons in distress at sea, are able to deliver the survivors to a place of safety. In the SAR Convention Art.1.3.2, the IMO defined “a place of safety”: • • • as a location where rescue operations ends; as a place where the survivors safety of life is no longer threatened and where their basic human needs (such as food, shelter and medical needs) can be met; and that considerations of well-founded fear of persecution have been respected. In summary, it is important that EUROSUR and SUNNY helps Members States meet these obligations, but this will nonetheless rely on political will, which unfortunately, on too many occasions, has been absent. As a consequence, people have died. 3.4 Rules for Border Surveillance The EU recently adopted a Regulation that establishes rules for surveillance operations coordinated by Frontex 6. This piece of legislation helps clarify search and rescue obligations, as it reiterates the right to non-refoulment, and how to provide more effective mechanisms to identify migrants at sea. The Proposal states that migrants that are intercepted or rescued on the high seas be disembarked in the third country from which the ship departed, unless there is a risk of violating the principle of nonrefoulment. Art.4(1) states that: “No person shall, in contravention of the principle of non-refoulement, be disembarked in, forced to enter, conducted to or otherwise handed over to the authorities of a country where, inter alia, there is a serious risk that he or she would be subjected to the death penalty, torture, persecution or other inhuman or degrading treatment or punishment, or where his or her life or freedom would be threatened on account of his or her race, religion, nationality, sexual orientation, membership of a particular social group or political opinion, or from which there is a serious risk of an expulsion, removal or extradition to another country in contravention of the principle of non-refoulement.”. Moreover, it requires border guards to be trained on fundamental rights, refugee law and SAR 6 Europa., 2013., EC Proposal for Regulation concerning Border Surveillance operations. Page 10 of 66 SUNNY D1.4: Surveillance societal and ethical aspects 4. EUROSUR 4.1 Overview The EUROSUR Regulation was adopted by the European Union (EU) in October in 2013 7 and is aimed at enhancing cooperation between national agencies concerned with border management. It will be coordinated by the EU’s border management agency Frontex. Throughout the EU these agencies will by using state-of-the-art surveillance technologies to form both national and regional real-time situational pictures of what is going on at the external borders 8. The Regulation will give an option to deploy advanced technologies, which include UAV’s to patrol its frontiers 9. Although the Regulation was not adopted until 2013, a roadmap was published back in 2008 and developments were really already under its way before it was officially adopted. EUROSUR will allow real-time data and intelligence to be shared between various authorities and operators in the maritime environment through different surveillance tools, such as satellites or ship reporting systems. In a press release, EU emphasized that the EUROSUR would prevent the Mediterranean from becoming ‘a graveyard for refugees’ who try to cross the sea in unseaworthy vessels. The Regulation prohibits violating the principle of non-refoulment and demands respect for fundamental rights such as personal data protection. EUROSUR should not be used as an excuse to ignore data protection rights, to seal the borders or disregard obligations set out in international human rights law 10. EUROSUR has three primary aims, which are to: reduce the number of illegal immigrants entering undetected; reduce the death toll at sea; and increase EU security by preventing cross-border-crime 11. EUROSUR will have three different phases of implementation, with eight specific and corresponding steps. Phase 1: Interlinking and streamlining existing (national) surveillance systems and mechanisms at Member States level (e.g. National Coordination Centres – NCC). Establish a NCC in each Member State with ‘the capacity to provide a situational awareness of conditions and activities along the external borders as well as all the necessary tools to react accordingly’. External border Member States should have implemented these NCC’s by the end of 2013, while other participating States will have a chance to complete this task later on. Set up a secure computerised communication network to ‘exchange data 24 hours a day in realtime between centres in Member States as well as with Frontex’. Increase EU financial and logistical support for neighbouring third countries for the setting up of border surveillance infrastructure. 7 EUROSUR Regulation. Heinrich Böll-Stiftung., 2012., Borderline – EU Border Surveillance Initiatives., p.5. 9 Information and Privacy Commissioner of Ontario, Canada., 2012., Privacy and Drones., p.4. 10 European Parliament., 2013., Press Release., EU border surveillance: MEPs approve EUROSUR operating rules. 11 Erik Berglund, Front., 2010., Presentation ‘UAVs for European Border Surveillance. 8 Page 11 of 66 SUNNY D1.4: Surveillance societal and ethical aspects Phase 2: Development and implementation of common tools and applications for border surveillance at EU level. Conduct research and development to improve the performance of surveillance tools, in particular earth observation satellites and UAVs. Development of shared surveillance tools, with Frontex acting as a facilitator. Develop surveillance systems covering the open seas to provide a ‘Common Pre-Frontier Intelligence Picture’. Phase 3: Creation of common information sharing environment (CISE) for the EU maritime domain 12. Establish an integrated network of reporting and surveillance systems for border control and internal security purposes covering the Mediterranean Sea, the southern Atlantic Ocean (Canary Islands), and the Black Sea; common pre-frontier intelligence pictures could be developed to combine intelligence information with that obtained from surveillance tools. Create an integrated network of all European maritime reporting and surveillance systems covering all maritime activities, including safety, protection of the marine environment fisheries control, and law enforcement 13. 12 13 Erik Berglund, Front., 2010., Presentation ‘UAVs for European Border Surveillance. Heinrich Böll-Stiftung., 2012., Borderline – EU Border Surveillance Initiatives., p.15-16. Page 12 of 66 SUNNY D1.4: Surveillance societal and ethical aspects EUROSUR is by some being presented as a response to the Arab Spring, but this is not the case. The work with updating and enhancing the EU’s border protection has been under way for years 14. The EUROSUR proposal was published in 2011, while its roadmap was issued by the EC in 2008 15. It is but one part of a broad and long-term policy within the EU that started with the entry of force of the Amsterdam Treaty in 1999, which has extended EU’s powers over national border controls, immigration and asylum policies. Parallel to this the Member States have called for efficient border policing and a ‘global approach to migration’, which combined means that there is a demand to prevent the arrival of irregular migrants and, according to some even refugees, from entering the Union through strong externalized border control. EUROSUR is a product of these political developments 16. In 2002 the EU adopted an Action Plan on ‘illegal immigration’, which provided a structure for funding for migration controls in countries of origin, including border management and expertise, asylum processing infrastructure, registration structures (databases), reception centres, etc. In 2005, after a migration summit, the EU extended its approach to include surveillance of the southern borders and Frontex was by then up-and-running. Transparency about EU’s surveillance has however not been optimal, as evidenced when it classified the BORTEC study by Frontex, which analysed the EU’s Border Surveillance System. Some have raised questions in this respect suggesting that BORTEC may have recommended some elements, which have been included in EUROSUR, such as new airborne sensors. Furthermore, the EU has been pursuing an ‘Integrated Maritime Policy’ since 2007. EUROSUR will ultimately be part of a more interoperable surveillance system that brings together existing monitoring and tracking systems used for maritime safety and security, protection of the marine environment, control over fisheries, control over the external borders and other law enforcement activities 17. Hundreds of thousands of migrants and refugees fled the turmoil in North-Africa deriving from the Arab Spring in 2011, but less than 5% of them actually ended up in Europe. According to experts the problem is not that Europe is overrun by refugees and irregular immigrants; rather the problem is that they are concentrated in very few places (i.e. Lampedusa, Greece’s Evros region and Malta), which suffer the burden of something which should be a common challenge for the region 18. This however, is a problem of Europe’s own decision-making. The EU has for years aimed at creating a Common European Asylum System (CEAS), meaning that it would harmonize standards for protection of refugees, provide effective and wellsupported practical cooperation and increase solidarity between Member States and non-members 19. As part of this, the Dublin II legislation was created, which prohibits asylum seekers from seeking asylum in another EU country than that of entry to the Union – putting a larger burden to provide protection on the countries with an external borders, particularly those in Southern and Eastern Europe. In reality, CEAS is no more than a few pieces of legislation that has not translated into any harmonized standards for protection nor increased solidarity. It has however concentrated the majority of asylum-seekers in the EU in the countries at the southern external border. 14 Heinrich Böll-Stiftung., 2012., Borderline – EU Border Surveillance Initiatives., p.8. Heinrich Böll-Stiftung., 2012., Borderline – EU Border Surveillance Initiatives., p.12. 16 Heinrich Böll-Stiftung., 2012., Borderline – EU Border Surveillance Initiatives., p.13. 17 Heinrich Böll-Stiftung., 2012., Borderline – EU Border Surveillance Initiatives., p.14-15. 18 Heinrich Böll-Stiftung., 2012., Borderline – EU Border Surveillance Initiatives., p.6. 19 Europa., 2013., Asylum (Accessed 20/03-2013). 15 Page 13 of 66 SUNNY D1.4: Surveillance societal and ethical aspects 4.2 Criticism Several reports by civil society have criticised EUROSUR. Most of these have expressed concerns that EUROSUR might undermine the rights to asylum and international protection for refugees, as well as the right to have individual’s data and privacy protected – despite the fact that these rights are actually protected in the final Regulation. There seems to be a worry that EUROSUR will be used to identify vessels with irregular migrants who are then ‘pushed-back’ or rejected at the border. Without proper screening, this will have catastrophic consequences, as there may be refugees (who by definition have a well-founded fear of persecution) who could be forced to return to the country of origin where they might face severe human rights violations. Another risk is that they might be stranded in transit countries (for example Libya), with a poorly functioning asylum system (or none at all). The Meijers Committee (Standing committee of experts on international immigration, refugee and criminal law) has raised several problems with EUROSUR. In a letter to the European Parliament’s Civil Liberties, Justice and Home Affairs (LIBE) Committee, they raised the following issues with the Proposal, before it was adopted: Humanitarian concerns. The processing of personal data by Frontex. The risk of exchange of personal data with third states The possible profiling of migrants 20. The Heinrich Böll-Stiftung have expressed almost identical concerns, but also added to this a severe criticism of the decision making process, which they considered technocratic, as it has allowed for the development of the system and its corresponding expenditure to occur before the legislation was on the table 21. The Meijers Committee has, however, expressed support for a uniform legal framework within the EU to address the arrival of asylum seekers and refugees at the external borders of Europe. The Committee, therefore, stated their support for the Parliamentary Assembly of the Council of Europe’s (PACE CoE) report that called for a uniform application of maritime law (for instance responsibility sharing regarding Search and Rescue zones, the need for an interpretation of the definition ‘distress’, the need for agreement on disembarkation), abolition of national legislation that deters commercial or civilian vessels from responding to distress calls, and European responsibility sharing regarding asylum seekers reaching (or trying to reach) Europe. The Committee uttered particular concerns regarding the effects of EUROUSR on the fundamental right to asylum, the rights of asylum seekers and refugees and the right to privacy and data protection. Moreover, they warned against the risks of increased surveillance as this might also increase the human 20 21 The Meijers Committee., 2012., Letter to LIBE regarding EUROSUR., p.1. Heinrich Böll-Stiftung., 2012., Borderline – EU Border Surveillance Initiatives., p.8. Page 14 of 66 SUNNY D1.4: Surveillance societal and ethical aspects costs of undocumented migration: border surveillance, they argued, will have an impact on migration routes but not on the root causes of migration 22. The Committee moreover noted that increased situational awareness gives increased responsibility under international refugee law as well as in the Search and Rescue regime based on the International Convention on Maritime Search and Rescue 23. EUROSUR has an ambiguous relation with the right to asylum. The Regulation clarifies that it does not absolve any Member States of its human rights or its search and rescue responsibilities assumed under international law. The EU Fundamental Rights Agency has also argued that the ‘best use should be made of the live-saving potential of the EUROSUR system’. EUROSUR could help bring more people to ‘safety’ but how to do this is not defined, nor are there procedures for what to do with the people who are ‘rescued’. Actually, it does the contrary. Art.2.3 of the Regulation states that the EUROSUR shall ‘This Regulation shall not apply to any legal or administrative measure taken once the responsible authorities of a Member State have intercepted cross-border criminal activities or unauthorised crossings by persons of the external borders’. The impact assessment of the Proposal to the Regulation stated that ‘asylum, readmission, and return’ was out of the scope of EUROSUR. The Heinrich Böll-Stiftung has argued that if the EU has genuine ambitions to save lives at sea, it must at least specify how EUROSUR will send information or alerts to Rescue Coordination Centres of the State responsible for a specific Search and Rescue area. This is something that is included in the 2010 amendment of the Schengen Border Code that includes a provision in its non-binding annex on ‘Guidelines for search and rescue situations for disembarkation in the context of sea border operations’. It is important to understand that refugee law cannot be circumvented by equating interceptions with search and rescue 24. The Regulation and the EU’s general migration policies could create buffer zones outside of the EU where cooperation with third countries prevents the departure of migrants and refugees bound for Europe. Human Rights organizations have challenged the legitimacy of such policies, as they could encourage ‘pushback operations’ that result in the circumvention of the responsibilities under the Refugee Convention and in particular a breach of the non-refoulment principle 25. Commissioner Cecilia Malmström argued that in the end it ends up being a question about whether EUROSUR is merely just being portrayed as a system that will help save migrants at sea or whether it is simply intended to make the borders more impenetrable. Nor does it address what will happen when there is a lack of will to aid those in distress, such something with happened in 2011 when 72 people on an overcrowded boat in the Mediterranean sent out a distress call, were seen by a NATO helicopter and the Italian Coast Guard, but were given some crackers and water and left at sea to die. 22 The Meijers Committee., 2012., Letter to LIBE regarding EUROSUR., p.2. The Meijers Committee., 2012., Letter to LIBE regarding EUROSUR., p.2. 24 Heinrich Böll-Stiftung., 2012., Borderline – EU Border Surveillance Initiatives., p.44-45. 25 Heinrich Böll-Stiftung., 2012., Borderline – EU Border Surveillance Initiatives., p.68. 23 Page 15 of 66 SUNNY D1.4: Surveillance societal and ethical aspects The Meijers Committee expressed concerns throughout the development of the Regulation, was that personal information related to potential asylum seekers might be exchanged with the authorities of third states from which they are fleeing. Finally, the Regulation’s article 20.5 prohibited this. There still remain certain doubts as to how this will complied with in practice in a CISE. The EC is required to make sure that all its proposals comply with the Charter of Fundamental Rights, and that its implementations of regulations also are in accordance with the Charter. The EUROSUR Regulation claims that data protection concerns are minimal as the system will not collect large amounts of personal or biometric data, nor include a central database. However, there will be some personal information collected, therefore the potential of CISE, and the potential for sharing personal data with third states and agencies does raise concerns. These can have significant effects on data protection rights and the right to asylum 26. Concerns have been expressed regarding the use of UAV’s and other means of aerial surveillance, since their use has not been very precisely addressed in the Regulation. As mentioned, the EC has stressed that EUROSUR is not intended to regulate collection, storage or cross-border exchange of personal data. It argues that EUROSUR will focus on surveillance of geographical areas (borders) and specific activities (irregular border crossings). Moreover, it stated that ‘the situational picture will as a general rule not involve personal data but rather the exchange of information on incidents and depersonalised objects, such as the detection and tracking of vessels’. It does not state how images collected by a UAV, for example, would be depersonalised and protected and this is a conundrum SUNNY should be investigating. Incidents involving irregular border crossings of migrants (and other scenarios) could include personally identifiable information (PII). When a vessel is being tracked, data about ownership of the vessel, its operators, passengers, crew, agents, etc., is highly likely to be processed27. This could indirectly identify an individual, and would therefore be PII and invoke data protection rights. Frontex are allowed to use personal data in the context of Joint Operations (JO), pilot projects, and rapid interventions for the preparation of risk analyses (in the result of the risk analyses the data must be depersonalized). Heinrich Böll-Stiftung argues that the European Situational Picture is similar to such a risk analysis. The explanatory memorandum of the EUROSUR specifies that only in ‘exceptional cases’ may personal data be shared by the Member States with Frontex, and if such data can be found in a national situational picture, it ‘may be exchanged between neighbouring Member States only’. The same organization also expressed concerns that the limitless amount of information, together with the lack of meaningful oversight on the sharing of data between these parties – implies that ‘mission creep’ is actually built into EUROSUR from the start – since in CISE – information collected for fishery, maritime authority, defence, internal security and other sources can be used for other purposes than it was originally intended 28. 26 Heinrich Böll-Stiftung., 2012., Borderline – EU Border Surveillance Initiatives., p.35. Heinrich Böll-Stiftung., 2012., Borderline – EU Border Surveillance Initiatives., p.36. 28 Heinrich Böll-Stiftung., 2012., Borderline – EU Border Surveillance Initiatives., p.20. 27 Page 16 of 66 SUNNY D1.4: Surveillance societal and ethical aspects Ultimately, Frontex can use information from satellites and UAVs to supply NCCs with information to help compose the European or National Situational Picture, but it remains to be seen how the exchange of personal information will be limited to the correct actors. Furthermore, it could be the case that the UAVS will fly not only over border areas but also over third countries. Monitoring preparatory activities that might indicate the departure of potential irregular migrants, in other countries (with a coast of more than 40 nautical miles from the coasts of EU Member States) can happen. Moreover, it is unknown whether UAVs will have the capacity to recognize persons or process and store personal data, but in SUNNY’s case this likely to be the case as there are both small and large UAVs being developed. In Frontex’s nine months study (carried out in 2012) to identify more cost-efficient and operational effective solutions for aerial surveillance (in particular UAVs with Optional Piloted Vehicles) which could be used for JO, it is indicated that Frontex will develop and test surveillance tools. These tools are likely to come with very high resolution optical satellite imagery capable of identifying individuals 29. The Regulation prohibits the exchange of personal data with third countries that could use this information to identify persons, or groups of persons, who are at serious risk of being subjected to torture, inhuman and degrading treatment and punishment, or any other violation of fundamental rights. However, it remains unclear how this would work in practice, seeing that the exchange of data under EUROSUR with ‘neighbouring third countries’ would take place on the basis of bilateral or multilateral agreements between the Member State(s) and third countries. This, the Heinrich Böll-Stiftung argue, should be logged completely to enable national supervisory authorities to properly review the sending of information. They argue the supervision should be layered so that NCCs are supervised by national Data Protection Authorities (DPA) and so that Frontex are reviewed by the European Data Protection Supervisor (EDPS) 30. 5. The Right to Privacy and Data Protection 5.1 Introduction One of the first, if not the first, relevant document to explicitly mention the right to privacy was The Universal Declaration of Human Rights (UDHR) of 1948. It is the founding document of international human rights, and its Art.12 states that; ‘No one shall be subjected to arbitrary interference with his privacy, family, home or correspondence, nor to attacks upon his honour and reputation. Everyone has the right to protection of the law against such interference and attacks’ 31. The UDHR is not in itself a binding document, as it is not a treaty, but should rather be considered a declaration of will (which no State voted against). Nonetheless, through adopting the ‘Charter of the United Nations’ of 1945 all States agree ‘to achieve international co-operation in solving international problems of an economic, social, cultural, or humanitarian character, and in promoting and encouraging respect for human rights and for fundamental freedoms for all without distinction as to race, sex, language, or 29 Heinrich Böll-Stiftung., 2012., Borderline – EU Border Surveillance Initiatives., p.37-38. Heinrich Böll-Stiftung., 2012., Borderline – EU Border Surveillance Initiatives., p.40. 31 The 1948 Universal Declaration of Human Rights.,Art. 12. 30 Page 17 of 66 SUNNY D1.4: Surveillance societal and ethical aspects religion’ 32. Therefore all the 193 States who are members of the United Nations are legally responsible for ‘encouraging respect for human rights’. These rights were first codified in the 1948 UDHR. 5.2 1950 European Convention on Human Rights (ECHR) The right to privacy in Europe as a whole was first established through the adoption of the ECHR. Art.8 deals with protection of private and family life and states that: ‘Everyone has the right to respect for his private and family life, his home and his correspondence’ 33. The right to privacy is not absolute as exceptions to this right are established in the mentioned article. ‘There shall be no interference by a public authority with the exercise of this right except such as in accordance with the law and is necessary in a democratic society in the interests of national security, public safety or the economic well-being of the country, for the prevention of disorder or crime, for the protection of health or morals, or of the protection of the rights and freedoms of others’ 34. States are responsible for securing the rights established in these conventions. Individuals who feel that they have their rights under the ECHR violated have the right to seek remedy 35 with the European Court of Human Rights (ECtHR), if no domestic remedy is achieved. As one can read from the exceptions to the right to privacy established in the convention, three important requirements must be fulfilled for there to be legitimate reasons to interfere with the right to privacy: The interference must be in accordance with the law, meaning that there is a clear legal basis for the interference. Such basis must be easily accessible and must meet the standard of foreseeability. In other words, the law must give clear indications on which terms and conditions public authorities can interfere. The law must furthermore define the scope and manner of exercise of such a power clearly enough to ensure adequate protection from arbitrary interference. Any interference by a public authority into the personal sphere must pursue a legitimate aim, meaning it must pursue either interests of national security, public safety, economic well-being of the country, prevention of disorder or crime, the protection of health or morals, or the protection of rights and freedoms of others. The interference must also be ‘necessary in a democratic society’, meaning that the interference must be proportionate. 5.3 1966 International Covenant on Civil and Political Rights (ICCPR) The right to privacy that was established in Art.12 of the UDHR was subsequently codified in several legally binding treaties such as the 1966 ICCPR, the 1950 ECHR, and the 1989 United Nations Convention on the 32 The 1945 Charter of the United Nations., Art. 1(3). The 1950 European Convention for the Protection of Human Rights and Fundamental Freedoms., Art. 8(1). 34 Ibid., Art. 8(2). 35 1950 European Convention for the Protection of Human Rights and Fundamental Freedoms., Art. 13. 33 Page 18 of 66 SUNNY D1.4: Surveillance societal and ethical aspects Rights of the Child and the 1978 American Convention on Human Rights, which are also all legal obligations to those who ratify them. To exemplify, Art. 17 of the ICCPR states that: 1. No one shall be subjected to arbitrary or unlawful interference with his privacy, family, home or correspondence, nor to unlawful attacks on his honour and reputation. 2. Everyone has the right to protection of the law against such interference or attacks. The article is not terribly specific and leaves room for interpretation. The authoritative treaty body that is responsible for interpreting the ICCPR is the Human Rights Committee (HRC). The HRC will not only provide for interpretations through its General Comments, but is also to provide a remedy for violations of the ICCPR. States are responsible for providing periodical reports on compliance with the ICCPR, which the HRC will give feedback to. Further, under the First Protocol of the ICCPR, the HRC may receive complaints from individuals and organizations. As for the meanings and implications of Art.17 of the ICCPR, the HRC gave its interpretation in General Comment No.16. The spheres of privacy are as stated in the article; 1) family, 2) home, 3) correspondence and, 4) unlawful attacks on honour and reputation. Privacy is to be protected whether attacks or interferences come from State authorities or from natural or legal persons. It is also protected from both unlawful and arbitrary (even if provided for by law) attacks and interferences. Data protection has been addressed and the HRC stated that processing must be regulated by law, that data does not reach unauthorized persons, that collected and processed data are only used for purposes that are in line with the ICCPR, that people have a right to ascertain which public authority or private individuals or bodies control their files and to correct or eliminate any information that might be wrong. As we shall see, this draws the ICCPR towards the ‘Fair Information Practices’ established by other instruments. 5.4 1980 OECD Guidelines The processing of data is necessary in order for the modern world to progress, to maintain efficiency and to administer almost every aspect of our life. Regulating information privacy has thus become ever more prevalent as this development increases its velocity. The Organization for Economic Co-operation and Development (OECD) established as early as 1980 the ‘Recommendation Concerning and Guidelines Governing the Protection of Privacy and the Transborder Flow of Personal Data’. This was a framework that allowed personal data to flow across borders while safeguarding the right to privacy of the individual. These guidelines are based on eight primary principles: Collection Principle: Personal data must be obtained by lawful and fair means and where appropriate with the knowledge and consent of the data subject. Furthermore the collection should be within reasonable limits. Data quality principle: Collected personal data must be relevant, accurate, and complete and kept up-todate. Purpose specification principle: The purpose of collected personal data must be specified not later than at the time of data collection and must only be used for the fulfilment of such purpose. Use limitation principle: Data should not be disclosed, made available, or otherwise used for purposes other than those covered by the purpose specification. Page 19 of 66 SUNNY D1.4: Surveillance societal and ethical aspects Security safeguards principle: Personal data collected and used should be protected by reasonable security measures to minimize the risk of unauthorized access, destruction, use, modification or disclosure of personal data. Openness principle: There should be a general openness about developments, practices, and policies with respect to personal data. Means should be readily made available to establish the existence and nature of personal data, the main purposes of their use, as well as the identity and residence of the data controller. Individual participation principle: The data subject has the right to obtain information from the data controller whether his information is being processed, to have his information communicated to him within a reasonable time, manner and form that is intelligible to him, and the right to challenge data relating to him, and if successful have it erased, rectified, completed or amended. If collected data cannot reasonably be made available, the reasons for it must be legitimate and communicated to the data subject. Accountability principle: Data controllers are accountable for complying with measures that give effect to the stated principles 36. These OECD Privacy Guidelines have been used as one of the primary influences in the creation of the European personal data protection regime 37. These guidelines in themselves are however not binding law. They are meant to be ‘guidelines’ and are as such ‘soft law’, but have inspired other conventions and directives that have a binding legal effect, as is the case with the Data Protection Directive in the EU. These principles are a major part of what is now considered ‘Fair Information Practices’, which SUNNY should take into account. 5.5 The 1981 Council of Europe’s (CoE) Convention for the Protection of Individuals with Regard to Automatic Processing of Personal Data In 1981 the Council of Europe (CoE) adopted the ‘Convention for the Protection of Individuals with Regard to Automatic Processing of Personal Data’. The aim of the Convention is to ‘achieve greater unity between its members, based in particular on respect for the rule of law, as well as human right and fundamental freedoms’ 38. Its purpose is specifically oriented towards respecting the right to privacy with regard to personal data 39. This instrument is legally binding for all of the ratifying States. This convention is at large based on the same principles as the OECD Guidelines 40. 36 Schermer, B.W., 2007., p.88-89. Ibid., p.89. 38 The Council of Europe’s 1981 Convention for the Protection of Individuals with Regard to Automatic Processing of Personal Data., Preamble. 39 Ibid, Art.1. 40 Schermer, B.W., 2007., p.90. 37 Page 20 of 66 SUNNY D1.4: Surveillance societal and ethical aspects 5.6 Data Protection Directive 95/46/EC In 1995 the European Union adopted the Data Protection Directive (95/46/EC). The purpose of this directive was to set up a regulatory framework which seeks to strike a balance between a high level of protection for the privacy of individuals and the free movement of personal data with the EU, which is essential to secure efficient business transactions. It sets limits for the collection and use of personal data 41, and is legally binding for all of the EU Member States. Equally important is the ‘enforceability’ in that it that it requires all the States in the EU to set up a DPA to enforce the national law (in effect the national implementation of the Directive) and to provide a remedy for violations of the Directive 42. These different DPA’s are endowed with powers to investigate, to intervene, to order blockings, erasure and destruction of data or to impose a definite ban on processing. Furthermore, if a person’s rights have been infringed, the person could seek remedy in front of national courts 43. These bodies have not however been as efficient as desired, due to problems with funding and lack of independence 44. The Directive applies only to data processed by automated means (e.g. computer databases) and data contained in or intended to be part of a non-automated filing system (e.g. traditional paper files) 45. It would of course apply to the use of UAVs and video surveillance. All countries in the EU now have a DPA and it is expected that the countries with which the EU does business will need to provide a similar level of oversight 46. The Data Protection Directive is based on the same principles as the OECD Guidelines, only it provides a specific remedy to persons whose rights have been violated 47. The Directive also sets up a body called ‘The Working Party on the Protection of Individuals with regard to the Processing of Personal data’ (Art.29 Working Group). This independent body, composed of representatives of each national supervisory body, has advisory status and can therefore give authoritative interpretations of the directive 48. This body will be rebranded under the new General Data Protection Regulation, which is aimed at replacing this directive. This regulation will probably be adopted in 2014. Exemptions set out in the Data Protection Directive are described in general terms. Whether or not exemptions apply is usually considered on a case-by-case basis. If exemptions apply, one is exempt from the requirement: to register with the DPA; and/or to grant subject access to personal data; and/or to give privacy notices; and/or not to disclose personal data to third parties. 41 Europa., 2007., Summaries of EU legislation.(Accessed 14th of November 2010). European Union Data Protection Directive 95/46/EC., Art.28. 43 Privacy International., 2007., Europe. (Accessed 15th of November 2010). 44 Privacy International., 2007., Overview of Privacy. 45 Europa., 2007., Summaries of EU legislation. (Accessed 14th of November 2010). 46 Privacy International., 2007., Overview of Privacy. 47 Ibid. 48 European Union Data Protection Directive 95/46/EC., Art.29. 42 Page 21 of 66 SUNNY D1.4: Surveillance societal and ethical aspects The Directive recognizes that it is sometimes appropriate to disclose personal data for certain purposes to do with criminal justice, such as for the prevention of a crime and to capture or prosecute offenders for example. Law enforcement may process an individual’s personal data because they suspect him of involvement in a serious crime and notifying him would be likely to prejudice the investigation (perhaps because he might abscond or destroy evidence) then the police do not need to do so. However, the exemption applies, in any particular case, only to the extent that applying those provisions would be likely to prejudice the crime 49. 5.7 The Charter of Fundamental Rights (2000) In the year 2000, the EU adopted the Charter of Fundamental Rights of the European Union (CFREU), which entered into force in 2009 when the Lisbon Treaty entered into force. Art.8 of the Charter acknowledges some of the rights set out in the Data Protection Directive. Four important protections are set out: The right to have personal data about oneself protected. The data must be processed fairly and for legitimate purposes with consent or as established in some other way by law. The data must be accessible to individuals who must also have a right to rectify the data if it is erroneous. An independent authority shall control compliance with the rules set out 50. These provisions are also in line with the ‘Fair Information Practices’. It is legally binding for all of the Member States of the EU. 5.8 EC Regulation 45/2001 The processing of personal data by EU institutions and bodies is governed by EC Regulation 45/2001, as mandated by Art.286 of the EC Treaty. Its objective is to protect the fundamental rights and freedoms of natural persons, in particular their right to privacy with respect to the processing of personal data. Furthermore, the institutions and bodies shall neither restrict nor prohibit the free flow of personal data between themselves or to recipients subject to the national law of the Member States implementing the Data Protection Directive 95/46/EC. The Regulation also established the European Data Protection Supervisor (EDPS), under Art.41(F). This body has a consultative status and an influential task of advising the commission and other EC institutions on proposals for new legislation that can affect protection of personal data, such as the new General Data Protection Regulation 51. 5.9 General Data Protection Regulation On the 25th of January 2012 the EC unveiled a draft for a new General Data Protection Regulation that will replace the Data Protection Directive. The primary reason for this is the varied protection offered by national interpretations of the Data Protection Directive. When the Data Protection Directive was written there were not challenges such as social media or cloud computing, so the scenery requires updating of 49 ICO., 2014., Exemptions. The 2000 Charter of Fundamental Rights of the European Union., Art.8. 51 Privacy International., 2007., Europe. 50 Page 22 of 66 SUNNY D1.4: Surveillance societal and ethical aspects relevant legislation. The Regulation will provide one single set of rules, as opposed to the different national legislations, and there will be one DPA depending on where the company is based. It has still not been adopted and recent negotiations have suffered some setbacks. Fresh negotiations are expected to resume in mid-2014. The NGO Privacy International considers that the proposed Regulation goes a long way towards ensuring that data protection law is capable of adequately responding to contemporary and emerging threats to the right to privacy. It also ensures a more equal access to these rights for citizens across the EU. Control by individuals has increased with regards to access, correction and deletion by ensuring that these rights become meaningful in practice. It strengthens independent authorities (Art.47 and 48), provides better redress for individuals (Art.73 and 77) and provides a right for associations or organizations who represent citizens to take collective action. Privacy International are also particularly pleased with the emphasis on responsibility and accountability of controllers for building privacy in their systems (privacy by design) and the requirement for breach notifications (Art.23, 31 and 32) 52. Privacy International has also through the negotiation process highlighted some weaknesses that undermine the rights of individuals. They argue that the definition and following recital of ‘data subject’ (and therefore personal data) leaves potentials for loopholes for people to be singled out but not protected. There could be convenient loopholes provided by “legitimate interests” that could allow for abusive or excessive processing (Art.6). Moreover, further non-compatible use of personal data completely undermines the use/purpose limitation principle, one of the fundamental pillars on which data protection is based (Art.6(4)). Provision rights against profiling are weak, they argue, leaving the door open for discrimination (Art.11, 14 and 20). There is also a lack of restrictions for “public interest” reasons, which are not properly defined. That could render all the rights and obligations in the Regulation null and void (Art.21) 53. The relevant article should restrict the use of “public interest” exemptions to specific and welldefined circumstances, such as criminal offences and important economic and financial interests, and it should also include detailed safeguards and guarantees in relation to the purposes, necessity, proportionality and categories of data to be processed. Furthermore, the organization argues that a provision should be added where controllers should not be forced to retain data or take other measures beyond what is strictly necessary for their original processing purposes in case it was needed for law enforcement purposes 54. The adoption is aimed for 2014 and the Regulation is planned to take effect in 2016 after a transition period of 2 years. It will be applicable to controllers and processors who are located in the EU, and if they process personal data about EU residents. 5.10 Police and Criminal Justice Data Protection Directive This Directive will replace the EU’s 2008 Framework Decision, which aimed at providing a horizontal data protection instrument in the field of data used by police and judicial authorities. It was created to establish 52 Privacy International., 2012., Analysis of EC proposal for a General Data Protection Regulation., p.2. Privacy International., 2012., Analysis of EC proposal for a General Data Protection Regulation., p.2-3. 54 Privacy International., 2012., Analysis of EC proposal for a General Data Protection Regulation., p.9. 53 Page 23 of 66 SUNNY D1.4: Surveillance societal and ethical aspects a common level of privacy protection and a high level of security when exchanging data. Moreover, the Decision is applicable to cross-border exchanges of personal data within the framework of police and judicial cooperation. The instrument contains rules applicable to onward transfers of personal data to third countries and to the transmission to private parties in Member States 55. The new Directive will lay down rules to protect individuals whose personal data may be processed by ‘competent authorities’ for the purposes of ‘prevention, investigation, detection or prosecution of criminal offences or the execution of criminal penalties’. It aims to harmonize laws regarding data processing by police and judicial authorities and clarify existing legislative principles. It will be providing access rights to individuals, the right to information and the right to rectify or delete wrong information or illegally processed data 56, in line with ‘Fair Information Practice Principles’. There are obviously exemptions to subject access, but the Working Party argues that these exemptions and limitations are too broad. This, it argues, should be decided on a case-by-case basis. Moreover, it considers that Data Protection Impact Assessments (PIAs) should be applied when appropriate 57. Finally, it has stated that there is a need to further align the powers of the DPAs. In contrast to the Data Protection Directive which was subject neutral, this Directive introduces a distinction between the personal data of different categories of data subjects, including suspected and convicted criminals and victims. The Directive also introduces an obligation to notify the "supervisory authority" and, in some circumstances, the data subject in the event of any personal data breaches. The Art.29 Working Party has expressed some concerns about the draft of the Directive in regards to the use of data of non-suspects, the rights of data subjects and the use of privacy impact assessments and the powers of data protection authorities 58. It argues that the data of the group defined in Art.5, category E, which must be understood as having no known relation to a crime or being suspected thereof, should only be processed under specific conditions and ‘when absolutely necessary for a legitimate, well-defined and specific purpose’. As it stands they consider the Directive allows law enforcement to process data which is ‘nice to have’ rather than what they ‘need to know’. The Working Party does not question that there could be purposes for which the processing of non-suspects, but they argue it should be ‘indispensable’ for a ‘legitimate, well-defined and specific purpose’ 59. The law governing how personal data may be processed by law enforcement authorities, at the moment, is contained in the current Data Protection Directive 60. 55 EDRI-Gram., 2009., Data Protection Framework Decision Adopted. (Accessed the 3rd of March 2013). Art.29 Working Party., 2013., Opinion 01/2013 on the Police and Criminal Justice Data Protection Directive., p.4. 57 Art.29 Working Party., 2013., Opinion 01/2013 on the Police and Criminal Justice Data Protection Directive., p.5. 58 Art.29 Working Party., 2013., Opinion 01/2013 on the Police and Criminal Justice Data Protection Directive., p.2. 59 Art.29 Working Party., 2013., Opinion 01/2013 on the Police and Criminal Justice Data Protection Directive., p.3. 60 rd Out-Law.Com., 2011. (Accessed the 3 of March 2013). 56 Page 24 of 66 SUNNY D1.4: Surveillance societal and ethical aspects 6. Privacy by Design 6.1 Overview Privacy by Design is a broad concept, aimed at designing privacy and data protection right into any data processing scheme from the outset. Ann Cavoukian, the Information and Privacy Commissioner of Ontario, Canada and the Dutch Data Protection Agency developed the concept in the 1990’s. It aims to build Fair Information Practice principles into the design, operation, and management of the information processing technologies and systems. The basic idea is to use these principles to design privacy and data protection into any data processing system from the outset, rather than bolting it on later on, which can be more expensive and complicated. It is not a compliance-based idea. Rather it proposes the idea of a positive-sum (instead of zero-sum) motivation, creating a win-win situation for controller/processor and the individual whose data is being processed, since data is protected and so is the organization (its reputation/credibility and from litigation). Information Technology Privacy by Design Accountable Business Practices Physical Design and Infrastructure Privacy by Design (PbD) has received numerous endorsements by the EC, the U.S. Federal Trade Commission and has been unanimously adopted as an International Standard by Data Protection Authorities and Privacy Commissioners. It is by most considered the future of privacy. Forbes declared it the ‘New Corporate Hotness’ 61. One of the main reasons for the need for PbD, as the Art.29 Working Party noticed, is that the current Data Protection Directive has not been sufficient in ensuring that privacy is embedded into ICT. This is why they recommended that PbD be introduced in new data legislation, as it 61 Information and Privacy Commissioner of Ontario, Canada., 2011., A Foundational Framework for Privacy by Design – Privacy Impact Assessments., Foreword. Page 25 of 66 SUNNY D1.4: Surveillance societal and ethical aspects looks like it will 62. Similarly, the Commissioner Viviane Reding also endorsed PbD when she recommended review of the Data Protection Directive 63. The EDPS has also called for the compliance with PbD. He argued the need for it to be implemented in two different ways. First he called for the incorporation of it as a general binding principle, and secondly by incorporating it in particular ICT areas where privacy risks can be mitigated through adequate technical architecture and design 64. The EDPS further notes that PbD will be especially important in the area of freedom, security and justice, in particular in relation to the goals of the Information Management Strategy, as foreseen in the Stockholm Programme 65. Furthermore, he recommends that the Seventh Framework Programme and the following ones should be used as a tool to support projects that aim at analysing standards, ICT technologies and architecture that better serve privacy and more particularly at the principle of PbD 66. The Norwegian DPA has also repeatedly insisted that laws and regulations are not enough to secure privacy and data protection. This has to be further addressed by management in various organizations. It has called on organizations to use the principles set out in PbD, as they claim that if privacy protections are not built in to a data processing scheme from the outset, it will be difficult to this afterwards. Furthermore, it called for an extended mandate for DPA’s to pursue this 67. The EC does recommend that PbD be considered during the development of Remotely Piloted Aircraft Systems (RPAS) 68. In its document on Data Privacy and Border Control the British DPA, the Information Commissioner’s Office (ICO), recommended adhering to the principles of PbD, especially data minimisation, the employment of privacy-enhancing technologies (PETs) and utilizing privacy impact assessments (PIAs). This it argues should specifically be applied to technologies such as UAVs, profiling of travellers and future checkpoints. Such recommendations should be carefully considered in the SUNNY project. PbD aims to solve a classic dilemma poised as not having solutions. It is the dilemma between security and privacy. Normally these are viewed as mutually exclusive values where one must prevail over the other. This can be characterized as a zero-sum mentality. PbD gives a dual protection for both. This has been branded as positive-sum thinking and awards solutions based on an understanding of both the potential harm and the proposed benefits that can be attributed to surveillance technologies and other data processing systems. It is a rejection of the zero-sum mentality where surveillance and security necessarily comes at the expense of privacy or reversely. Through PbD it is possible to add privacy protecting measures 62 Art.29 Working Party., 2009., Opinion 168 – The Future of Privacy., p.13. Viviane Reding., 2010., Keynote Speech at the Data Protection Day. 64 European Data Protection Supervisor., 2010., Opinion on Promoting Trust in the Information Society by Fostering Data Protection and Privacy., p.2. 65 European Data Protection Supervisor., 2010., Opinion on Promoting Trust in the Information Society by Fostering Data Protection and Privacy., p.9. 66 European Data Protection Supervisor., 2010., Opinion on Promoting Trust in the Information Society by Fostering Data Protection and Privacy., p.10. 67 Datatilsynet., 2010., Årsmelding (Annual Report)., p.31-32. 68 European Commission., 2012., Working Document – towards a strategy for development of RPAS., p.19. 63 Page 26 of 66 SUNNY D1.4: Surveillance societal and ethical aspects to surveillance systems without weakening security or the functionality of the system. In this manner all participants gain by protecting both security and privacy. It is a win-win situation (positive-sum) 69. Essential to the success is that it is embedded into the design of the processing scheme and that it is designed into three areas of application; 1) information technology, 2) business practices, and 3) physical design and infrastructures. For PbD to be an effective approach, it must consider the entire lifecycle of any system or process that manages personal data. That means from the earliest stage of the system, through requirements gathering and design, to delivery, testing operations and out until the final decommissioning of the system 70. Besides being a valuable organizational due diligence exercise, it helps obviate the need for expensive system design changes and retrofits later on, after an ill-fated disaster has occurred 71. It is important to make a security Threat and Risk Assessment in the field of information technology (IT), and to mitigate all the risks identified in this area 72. Policies and procedures should be developed to outline the acceptable use of IT 73. The organization needs to consider whether a vulnerability assessment and penetration tests need to be conducted on an on-going basis. Consider whether it ensured that your information system audit logging functionality has the capacity to generate audit log alerts based on business rule thresholds and generate routine and ad hoc audit log reports. Monitor and report on system control and audit logs on an on-going basis 74. 6.2 Business Practices Sharing of personal data is often a necessary part of an organization’s work, both in private and public sector. It is increasingly more complex and widespread, with a stronger potential to reveal, often sensitive, information about our private lives. The public in many cases feel alienated as they do not understand the processes involved and feel left behind and unable to control their own information 75. Sharing personal information is probably the primary reason for major privacy breaches, especially within government 76. Considerations have to be made with regard to the organization’s governance structure, operational and strategic objectives, roles and accountabilities, policies, information systems and data flows, decisionmaking processes, relationships with and perceptions of internal stakeholders, as well as the organization’s culture 77. There are primarily two manners in which information is shared. The first is when two or more organizations sharing information between them. This could be done by granting access to each other’s 69 Information and Privacy Commissioner of Ontario, Canada., 2009., Privacy by Design – Taking the Challenge., p.1617. 70 Information Commissioner’s Office., 2008., Privacy by Design., p. 7. 71 Information and Privacy Commissioner of Ontario, Canada., 2009., Privacy by Design – Taking the Challenge., p.23. 72 Information and Privacy Commissioner of Ontario, Canada., 2011., A Foundational Framework for a Privacy by Design Impact Assessment., p.15-16. 73 Information Commissioner’s Office., 2007., Framework code of practice for sharing personal information., p.17. 74 Information Commissioner’s Office., 2007., Framework code of practice for sharing personal information., p.21-22. 75 Information Commissioner’s Office., 2007., Framework code of practice for sharing personal information., p.3. 76 Information Commissioner’s Office., 2008., Privacy by Design., p. 15. 77 Information and Privacy Commissioner of Ontario, Canada., 2010., Privacy Risk Management., p.8. Page 27 of 66 SUNNY D1.4: Surveillance societal and ethical aspects information systems or establishing a separate shared database. This could lead to the disclosure of a limited amount of information on a one-off basis or regularly sharing large amounts of information. The second involves the sharing of information between the different parts of a single organization, for example between a local authority’s various departments 78. In any case, a contract or a framework code for the sharing of personal information must be drawn up in order to clearly divide and award responsibilities for each step of the process. The difficulties of sharing data can be illustrated in the ‘silo problem’. Silos refer to systems that have been designed in isolation within an organization that operates several systems. The most important technology matter is that of managing multiple systems as ‘data silos’, without considering wider systemic implications of many silos across one or more organizations, and the combined impact of those silos on private information. It may be irrelevant that one silo has built in the necessary data protection measures if that silo (organization) shares personal data with another silo that does not have the same data protection measures in place. This is a classic example of how data sharing can endanger the protection of personal data 79. Another privacy dilemma stems from ‘data aggregation’. Too often, instead of creating an index that facilitates cross-referencing between existing databases, it is considered simpler to create a new, larger database containing aggregated data. This kind of centralization can lead to duplication of personal information, increased risk of inaccurate or inconsistent registration of the data, loss of control over data, increased data processing and storage costs; and a lack of transparency of the processing which could have regulatory consequences 80. Data aggregation could also complicate individual’s right to make a ‘subject access requests’, which is a fundamental part of transparency 81. The British DPA, the ICO, has drawn up a framework for sharing personal information. It is divided up into numerous sections with detailed instructions/guidance on how to draw up such a document. First, the document describes the legal considerations that must be made prior to deciding to share personal information. Secondly it demonstrates how information can be shared while respecting principles such as fairness and transparency. Thirdly, it details what information standards must be respected. This means that information must be adequate, relevant, not excessive, accurate and up to date. Next, it elaborates on the matter of data retention so that personal information is not stored longer than necessary. Another aspect such a framework must address is security, in other words that the appropriate technical and organizational measures are in place. Furthermore, the framework must attend to individual’s right to access their personal information and freedom of information 82. 78 Information Commissioner’s Office., 2007., Framework code of practice for sharing personal information., p.5. Information Commissioner’s Office., 2008., Privacy by Design., p.15. 80 Information Commissioner’s Office., 2008., Privacy by Design., p.16. 81 Information Commissioner’s Office., 2008., Privacy by Design., p.24. 82 Information Commissioner’s Office., 2007., Framework code of practice for sharing personal information. 79 Page 28 of 66 SUNNY D1.4: Surveillance societal and ethical aspects 6.3 Physical design and infrastructure There should be created a set of guidelines related to physical design and the protection of individual’s privacy. Controlled access to the premises and locations where PI is retained. One could also consider implementing varying levels of security and restrictions depending on the information that is stored. A risk assessment of the inherent risks of the physical design and networked infrastructure is recommended. The identified risks must in any case be mitigated. 6.4 Privacy-Enhancing Technologies 6.4.1 Introduction Both companies and governments can apply technologies that are potentially intrusive with regards to people’s privacy or pose a risk to the protection of their data. They can however implement choose technologies that go further in the empowerment of individuals, giving them increased control over their data 83. Privacy-Enhancing Technologies, a term coined by the Dutch DPA and Ann Cavoukian, are based on the idea that there are methods and technologies allow for anonymous and/or minimized collection of PII as technology are essentially neutral. By designing the universal principles of Fair Information Practices (FIP) directly into it, such technological tools allow for the collection of information, whilst allowing individuals to maintain anonymous and have increased participation and control over the data related to them. Data controllers and processors must start by asking; how much PII is truly required for the operation and proper functioning of the information system and how can it be minimized without damaging the information system’s operability 84? PET’s also provide enhanced confidentiality, integrity and general security for personal data 85. Privacy and security are often viewed as two opposing forces in a zero-sum game, where one prioritizes one over the other. This has led to a major threat for privacy, considering that the public’s desire for safety is so high. PET’s dismisses this by proposing a positive-sum game where both privacy and security exist in a data processing system, without detriment to the system’s functionality 86. PET’s increase user confidence and makes it possible to use information technology to achieve multiple objects without having to sacrifice important aspects of a data processing scheme 87. As mentioned above, PET’s can in fact become ‘transformative technologies’, meaning that they go from being privacy-intrusive to privacy-protective since they: minimize unnecessary disclosure, collection, retention and use of personal data; empower individuals to participate in the management of their own personal data; 83 Information Commissioner’s Office., 2007., Data Protection Guidance Note: Privacy enhancing technologies (PET’s)., p.1. 84 Information and Privacy Commissioner of Ontario Canada & Registratiekamer of the Netherlands., 1995., PrivacyEnchancing Technologies: The Path to Anonymity Vol. 1., p.3-4. 85 Information and Privacy Commissioner of Ontario, Canada., 2009., Privacy by Design – Take the Challenge., p.43. 86 Information and Privacy Commissioner of Ontario, Canda., 2002., Security Technologies Enabling Privacy (STEP’S) – Time for a Paradigm Shift., p.1. 87 Information and Privacy Commissioner of Ontario, Canada., 2009., Privacy by Design – Taking the Challenge., 24. Page 29 of 66 SUNNY D1.4: Surveillance societal and ethical aspects enhance the security of personal data; promote public confidence and trust; and help promote and facilitate widespread adoption of the technology 88. The Data Protection’s Art.17 requires data controllers to implement appropriate technical and organizational measures and generally to ensure a level of security appropriate to the nature of the data and the risks related to processing it. Technology should be used to support this legislation 89. The EC considers that ‘… the use of appropriate technological measures is an essential complement to legal means and should be an integral part in any efforts to achieve a sufficient level of privacy protection …’ 90. Furthermore, it supports a wider development and use of PET’s as it would be strengthen the protection of privacy protection and help secure the enforcement of data protection legislation. Deploying PET’s will act as complementary, rather than as a replacement, to the existing legal framework 91. The EC has therefore stated that it intends to support RTD projects and large scale pilot demonstrations to develop and stimulate the uptake of PET’s. It also encourages the private sector to invest in the development of these tools 92. Broadly, the EC set out three targets regarding the use of PETs; 1) To support their development, a. Identifying the need and technological requirements of PET’s, 2) to support the use of available PET’s by data controllers, a. promoting the use of PET’s by industry b. to ensure respect for appropriate standards for protection of persona data through PET’s, i. standardisation, ii. coordination of national technical rules on security measures for data processing, c. promoting the use of PET’s by public authorities 3) to encourage consumers to use PET’s a. raising awareness of consumers, b. Facilitating consumers’ informed choice: privacy seals 93. 6.4.2 How do they work? Information system usage normally requires a procedure, including; authorization, authentication, access control, auditing and accounting. It is the exchange of information between two or more components within the information system. Usually, the user’s identity will be viewed as being crucial to the performance of all the above processes. This is not necessarily the case, however and one must therefore examine carefully whether the identity is truly required 94. 88 Information and Privacy Commissioner of Ontario, Canada., 2009., Privacy by Design – Taking the Challenge., p.24. European Commission., 2007., Communication on Promoting Data Protection by PET’s., p.3. 90 European Commission., 2007., Communication on Promoting Data Protection by PET’s., p.3. 91 European Commission., 2007., Communication on Promoting Data Protection by PET’s., p.4. 92 European Commission., 2007., Communication on Promoting Data Protection by PET’s., p.6. 93 European Commission., 2007., Communication on Promoting Data Protection by PET’s., p.6-10. 94 Information and Privacy Commissioner of Ontario Canada & Registratiekamer of the Netherlands., 1995., PrivacyEnchancing Technologies: The Path to Anonymity Vol. 1., p.6. 89 Page 30 of 66 SUNNY D1.4: Surveillance societal and ethical aspects The Information Commissioner of Ontario, Canada and the Dutch DPA argue that the user’s identity is only needed for the authorization and accounting. For the processes of identification and authentication, access control, and audit, the identity of the user can be shielded as through identity protection – a ‘pseudoidentity’. This refers to an element of the system that will control the release of a person’s true identity to various processes within the information system. In this manner it limits areas of the system which do not require access to the real identity, so it remains user-centric, by producing an alternate digital identity. This works for bank account numbers, social insurance numbers, health insurance numbers, etc. 95 6.4.3 Examples One example relates to body scanning technology which is used for security checks at airports. This is obviously a system that has the potential to be highly privacy-intrusive. Normal metal detectors are inadequate as there are substances and tools that can be used as weapons which are not made of metal. On the other side physical body searches can also be considered as too privacy-intrusive and uncomfortable, and it will most likely not detect anything hidden in certain intimate body cavities. The U.S. Department of Energy have however produced a system that uses 3-D holographic imaging that only reveals objects hidden underneath the clothing of airline passengers, rather than displaying the entire body. It could detect items that are non-metallic as well. Concerns that the unclothed physical features of the scanned person might be visible to the operator are tackled as only the concealed items are displayed 96. The University of Toronto has created a PET for video surveillance. They have found a way of removing the personally-identifying parts of an image, such as face or body, and storing these separately from the rest of the image in a secure way. The footage can then be scanned for suspicious events and if an incident merits deeper investigation, the police, for example, could be given access to decrypt the video content to identify the subjects 97. This tool which is developed by Karl Martin and Konstantinos N. Plataniotis is called Secure Shape and Texture SPIHT. It is a scheme for secure coding of arbitrarily shaped visual objects and can be deployed in a privacy protected surveillance system. The visual objects are encrypted so that the content is only available to certain entities, such as persons of authority who possess the correct decryption key 98. Normally, the security model for the verification of identity, protection of information, and authorization to access premises is based on using a token (template), tied to and thereby representing an individual, to either authenticate identity or allow access to information, premises or services. This token could take the form of a password or shared secret (something you know), an identity card (something you have), or a biometric (something you are). In any case, a third party holds the details of the token and is responsible 95 Information and Privacy Commissioner of Ontario Canada & Registratiekamer of the Netherlands., 1995., PrivacyEnchancing Technologies: The Path to Anonymity Vol. 1., p.6. 96 Information and Privacy Commissioner of Ontario, Canda., 2002., Security Technologies Enabling Privacy (STEP’S) – Time for a Paradigm Shift., p.7. 97 Enterprise Privacy Group., 2008., Privacy by Design – PET’s Overview., p.7. 98 Martin, K. and Plataniotis, K. N., 2008., Privacy Protected Surveillance Using Secure visual Object Coding., p.2. Page 31 of 66 SUNNY D1.4: Surveillance societal and ethical aspects for authorizing and at times allowing the transaction to proceed if the details of an individual’s token match those stored in a database. It is by many viewed as the ultimate for of authentication or identification 99. The privacy concerns arise whenever biometric data are used for purposes other than those stated by the controller/processor (mission creep), such as data matching, aggregation, and surveillance and profiling. Biometric data which is transmitted across networks and stored in various databases can also be stolen, copied, or otherwise misused in way that can negatively affect individuals 100. 6.5 The Privacy by Design Principles Recognition that privacy interests and concerns must be addressed proactively; More than a moral imperative respecting privacy will be beneficial to all parties concerned. The ‘payoff’ for organizations would come in many ways, such as improved customer satisfaction, enhanced reputation and trust, reduced legal liabilities, etc.; Application of core principles expressing universal spheres of privacy protection; Privacy must be built into the relevant technologies and systems systematically, with reference to widely agreed upon principles, standards and other relevant guidance; Early mitigation of privacy concerns when developing information technologies and systems, throughout the entire information lifecycle – end to end; It is essential that privacy is addressed at the design stage, as well as throughout the entire processing scheme. Having analysed, identified and mitigated risks, through the use of Privacy Impact Assessments and other relevant tools, from beginning to end of a system will help avoid making costly mistakes later, requiring expensive retrofits; Need for qualified leadership and/or professional input; Designing privacy protection into a data processing scheme requires increasingly specialized expertise which is critical to organizations’ operations. There is a need for the understanding of information technologies, legal compliance, business operations and customer relations in order to protect privacy effectively. Employing a Chief Privacy Officer (CPO) or similar is often recommended to enable strong privacy leadership and accountability. Adoption and integration of PETs; PbD parts from a perspective where Information and Communication Technologies (ICT) are essentially neutral. The important thing is the choices we make when we design and use them. PET’s embody 99 Cavoukian, A. & Stoianov, A., 2007., Biometric Encryption., p.2. Cavoukian, A. & Stoianov, A., 2007., Biometric Encryption., p.6. 100 Page 32 of 66 SUNNY D1.4: Surveillance societal and ethical aspects fundamental privacy principles by minimizing personal data use, maximizing data security and empowering individuals; Embedding privacy in a positive-sum (not zero-sum) manner as to enhance both privacy and system functionality; Adding privacy to information technologies and systems should not require subtracting security, usability, efficiency, organizational control or other desirable functions or attributes. There is no necessary trade-off. It is possible to achieve a win-win situation where privacy and security are enabled; and Respect for users’ privacy - this is where it all begins and where it all ends 101. 6.6 Privacy Risk Management Cavoukian has identified 7 essential steps for designing privacy into technology: Define privacy expectations of the public and identify legislated requirements. Develop privacy policies and principles. Undertake an assessment of human and informational resources with a focus on personally identifiable data (collection, processing, management, flows and storage). Undertake threat risk assessment by completing a Privacy Impact Assessment. Deploy a methodology for privacy risk management at the system level. Introduce the rules of controls developed in the previous step at the source of code level. Deploy and audit through a model of continuous improvement. Review expectations and requirements102. Leadership needs to take into account both legal compliance and business benefits. The failure to address privacy can severely damage a company or institution’s reputation. It can put into question its leadership as well. Furthermore, if privacy is not protected, it can seriously harm customers, which again will lead to mistrust and deterioration of the organization’s information asset quality. Lack of management is considered as one of the primary barriers for the adoption of PbD. The lack of respect for privacy can again lead to fines for not complying with the law, as well as loss in market share, unexpected costs and drop in stock prices 103. The risk will vary depending on the organization’s nature and the individual’s data, but potential consequences include: damage to the organization’s reputation and brand; physical, psychological and economic harm to customers whose personal information is used or disclosed inappropriately; 101 Information and Privacy Commissioner of Ontario, Canada., 2009., Privacy by Design. Information and Privacy Commissioner of Ontario, Canda., 2002., 7 Essential Steps for Designing Privacy Into Technology. 103 Information and Privacy Commissioner of Ontario, Canada., 2007., Privacy and Boards of Directors., p.1. 102 Page 33 of 66 SUNNY D1.4: Surveillance societal and ethical aspects financial losses associated with deterioration in the quality and integrity of personal information due to customer mistrust; and loss of market share or a drop in stock prices following a ‘privacy hit’ resulting in negative publicity or the failure or delay in the implementation of a new product or service due to privacy concerns 104. Good privacy practices will enhance customer loyalty and in the end save time and money. It is a strategic business differentiator as it allows you to protect the interests of the organization and customers at once, instead of pegging them up against each other 105. The potential benefits of implementing sound privacy policies and practices include: consumer confidence and trust; a more positive organizational image and a significant edge over the competition; business development through expansion into jurisdictions requiring clear privacy standards; enhanced data quality and integrity, fostering better customer service and more strategic business decision-making; enhanced customer trust and loyalty; and savings in terms of time and money 106. According to the Information and Privacy Commissioner of Ontario, Canada, Ann Cavoukian, emphasizes the importance of creating a culture of privacy. This terminology refers to a culture that moves beyond legislation, regulation and policy to help ensure that errors regarding the control and processing of personal data does not occur. Such a culture will provide the necessary imperative to promptly detect and correct errors if they occur. Key components that help establish a culture of privacy is training, on-going monitoring, auditing, and regular evaluation 107. Directors will need to ensure that privacy is an important consideration whenever their organization enters a partnership or contractual arrangement with other companies and institutions for the provision of specific services, including any UAV operations. An organization may be held liable if agents and service providers fail to comply with privacy legislation; therefore, in order to avoid fines and lawsuits, organizations must take reasonable steps to meet the minimum requirements for privacy protection and set these out in all contractual arrangement with third parties 108. Moreover, when a privacy breach occurs, directors should ensure that their organizations have a privacy crisis management tool in place. Such a tool should instruct organizations on the appropriate steps to be taken to minimize the damage to individuals and the organization’s reputation and business relationship. Prevention of future breaches is also vital 109. 104 Information and Privacy Commissioner of Ontario, Canada., 2007., Privacy and Boards of Directors., p.2. Information and Privacy Commissioner of Ontario, Canada., 2007., Privacy and Boards of Directors., p.1. 106 Information and Privacy Commissioner of Ontario, Canada., 2007., Privacy and Boards of Directors., p.3. 107 Information and Privacy Commissioner of Ontario, Canada., 2007., Privacy and Boards of Directors., p.4. 108 Information and Privacy Commissioner of Ontario, Canada., 2007., Privacy and Boards of Directors., p.10. 109 Information and Privacy Commissioner of Ontario, Canada., 2007., Privacy and Boards of Directors., p.10. 105 Page 34 of 66 SUNNY D1.4: Surveillance societal and ethical aspects Education is a fundamental aspect to ensure protection of privacy. Therefore directors should hold thorough training programs to make sure staffs understand their responsibilities. Directors should consider invite privacy experts to speak as part of such training 110. Accountability is another fundamental aspect of privacy protection. Organizations should, if possible, assign the responsibility for privacy to a senior member of staff or hire a so-called Chief Privacy Officer (CPO). This person should have expertise related to privacy and must be awarded the responsibility for overseeing the design, implementation, monitoring and reporting on the organization’s privacy policies and to ensure that the company’s compliance system and control measures. The extent of this role will depend on the business. Regardless, this individual will need to possess knowledge about all aspects of the business 111. Periodic self-assessments and privacy audits are central methods used to report activities related to privacy protection. One of the primary tools is, as mentioned, PIA’s 112. It is important that the risks to PII are addressed throughout the entire lifecycle, which in general is: creation/collection distribution and use retention storage and maintenance permanent storage OR destruction 113. Ann Cavoukian has created a 20-point checklist for management to ensure privacy compliance; 1. Has your organization designated at least one individual to be responsible for privacy? 2. Does your organization collect personal information? If so, would any of this information be considered sensitive? 3. Is the purpose for the collection of personal information explained to customers at the time it is collected? 4. Is personal information collected only for purposes that are appropriate in the circumstances? 5. Is the personal information that is collected, used or disclosed by your organization limited to that which is necessary to achieve the specified purpose? 6. Have all necessary consents been obtained for the collection, use or disclosure of the information and consistent with the reasonable expectations of the individual? 7. Is the form of consent appropriate for the level of sensitivity of the information and consistent with the reasonable expectations of the individual? 8. Have controls been implemented to ensure that personal information is as accurate, complete and up-to-date as necessary for the purpose for which it is to be used? 9. Are the security safeguards to protect personal information appropriate for the level of sensitivity of the information? 10. Are the information management practices of the organization transparent? Does the organization make available to customers information about its policies and practices relating to the handling of personal information? 110 Information and Privacy Commissioner of Ontario, Canada., 2007., Privacy and Boards of Directors., p.19. Information and Privacy Commissioner of Ontario, Canada., 2007., Privacy and Boards of Directors., p.19. 112 Information and Privacy Commissioner of Ontario, Canada., 2007., Privacy and Boards of Directors., p.20. 113 Information and Privacy Commissioner of Ontario, Canada., 2010., Privacy Risk Management., p.10. 111 Page 35 of 66 SUNNY D1.4: Surveillance societal and ethical aspects 11. Do customers have the right to access and correct their own personal information? 12. Is there a mechanism through which customers can make an inquiry or complain about the organization’s personal information management practices? 13. Has an organizational privacy policy been implemented? Is the privacy policy available to the public? 14. Has an employee privacy policy been implemented? 15. Has a privacy crisis management protocol been implemented to deal with privacy breaches? In the event of a privacy breach, do you communicate information to individuals whose privacy has been breached so that they may take appropriate steps to protect themselves from harmful consequences, such as identity theft? 16. Are all employees aware of the organization’s privacy policy? Is privacy training, tailored to roles and responsibilities, mandatory for all employees? 17. Are privacy requirements built into contractual agreements with business partners and services suppliers and agents? 18. Are privacy requirements built into all employment contracts? Do these contracts include consequences for breaching the organization’s privacy policy? 19. Does your organization conduct a PIA prior to implementing new technologies, programs, products or services that could impact on privacy? 20. Does your organization have a compliance program that includes regular privacy self-assessments and privacy audits to ensure compliance with your privacy policy and privacy legislation? 114 Mitigation of privacy risks is an essential aspect of PbD and is required by the Data Protection Directive’s Art. 20 which states: ‘1. Member States shall determine the processing operations likely to present specific risks to the rights and freedoms of data subjects and shall check that these processing operations are examined prior to the start thereof. 2. Such prior checks shall be carried out by the supervisory authority following receipt of a notification from the controller or by the data protection official, who, in cases of doubt, must consult the supervisory authority. 3. Member States may also carry out such checks in the context of preparation either of a measure of the national parliament or of a measure based on such legislative measure, which define the nature of the processing and lay down appropriate safeguards’. One commonly used risk management technique is called Privacy Impact Assessment (PIA). In the UK and Canada, for example, all government systems that collect and process personal information are required to have carried out a PIA (in the UK they are required by the Cabinet Office, although they are not legally required) 115. Although there is an obligation on prior checks in the Data Protection Directive, PIA’s are not 114 115 Information and Privacy Commissioner of Ontario, Canada., 2007., Privacy and Boards of Directors., p.22-23. Information Commissioner’s Office., 2008., Privacy by Design., p. 8. Page 36 of 66 SUNNY D1.4: Surveillance societal and ethical aspects required by law. It is primarily English-speaking countries who apply PIA’s and are more commonly applied in the public sector than in the private sector. They are however endorsed by privacy commissioners, government agencies, private corporations and privacy advocates and do help address privacy concerns, and are useful if applied effectively before processes are designed 116. One definition provided is that a PIA is a ‘process whereby a conscious and systematic effort is made to assess the privacy impacts of options that may be open in regard to a proposal’ 117. An alternative definition is that a ‘PIA is an assessment of any actual or potential effects that the activity or proposal may have on individual privacy and the ways in which any adverse effects may be mitigated’ 118. PIA’s are not compliance checks, nor privacy audits. They are prospective tools aimed at addressing privacy concerns in new programs, services or technologies. Their aim is to identify and mitigate risks so that plans can be modified at an early point. It works as a prompt warning system. Moreover, the PIA should raise the largest issues as well, such as questioning not only whether it is legally compliant, but also whether or not it is a necessary processing of personal data in the first place. If the schemes are too intrusive, PIA’s should modify or even stop them. A PIA should also an adjustable document that should evolve if the scheme evolves, as the PIA is not an end-product in itself. It is an open-ended process 119. One integral part of most PIA’s is the analysis of the flow of personal information. Once a broad description of the nature and scope of the project has been completed, the next stage in a PIA is to describe and map the flows of personal information the project. This could include: • • • • • • • • what personal information is to be handled in the project; how the personal information is to be collected; how it will be used; internal flows; disclosures; security measures (privacy and security policies/procedures/processes); any privacy, secrecy and other relevant legislation applying to those flows 120; and an analysis of the accountability structures 121. The preparations for a risk assessment must include the description of an aim and targets – meaning the description of a hypothesis that needs to be investigated. This description must contain information about who is affected by this work (organization, department, co-workers, and external personnel) 122. 116 Lougborough University – Linden Consulting., 2007., Privacy Impact Assessments., p.6 of the Ex. Summary. Lougborough University – Linden Consulting., 2007., Privacy Impact Assessments., p.2. 118 Lougborough University – Linden Consulting., 2007., Privacy Impact Assessments., p.2. 119 Lougborough University – Linden Consulting., 2007., Privacy Impact Assessments., p.2. 120 Lougborough University – Linden Consulting., 2007., Privacy Impact Assessments., p.17. 121 Information and Privacy Commissioner of Ontario, Canada., 2011., A Foundational Framework for Privacy by Design – Privacy Impact Assessments., p.9. 122 Datatilsynet., 2009., Risikovurdering av informasjonssystem., p.8. 117 Page 37 of 66 SUNNY D1.4: Surveillance societal and ethical aspects A risk assessment can be organized as a project and be executed like a project plan. It needs to be executed by personnel who possess the knowledge and experience necessary. They must understand the assets and the environment in which the assets find themselves. Finally, an evaluation of the assessment should be carried out by someone who is not directly involved in the actual assessment 123. Obviously it is necessary to communicate with all relevant sections of the agency to complete these tasks. It cannot be done in isolation. A PIA requires a broad understanding of how the project will work 124. One way to achieve accountability and transparency for such a process is to deliver PIA’s to the DPA and perhaps to publish them online. Security measures aimed at addressing risks should be proportional to the probability and the consequences of security breaches. The work aimed at revealing risks should not be more extensive or formalized than necessary. Risk assessments should have certain holding points to determine when a risk exceeds the accepted level. Risk assessments should be taken at the design stage of an information system. A prerequisite to be able to say anything about security measures is that there has been a mapping of the personal information that is processed. Furthermore it is necessary to identify the incidents that actually entail a risk that demands an assessment of security measures. Moreover it needs to take into account the loss- or damage-potential that can be estimated, which will form part of the consequence assessment. Probability of such incidents taking place would also have to be addressed 125. Risk assessments in this context have the aim of identifying incidents that may have an impact on data protection, and to express a hypothesis regarding these incidents and the probability of them occurring. One important part of the task is mapping of the assets (personal information) that must be secured and mapping the environment in which the assets find themselves. Risk assessments must also identify the need for mitigating actions, by comparing the risks with the accepted risk level. In this scenario it is natural to give recommendations for security measures 126. Moreover, there must be made estimates regarding threats – meaning one must try to identify the possible scenarios that can lead to a security breach. For example, internet network connections with the location of the personal information can lead to a range of threats that must be assessed. The probability of such an incident occurring as a result of human activity, either by coincidence, qualified knowledge or some degree of determination. Would negligence suffice or must it be intended action 127? It must be possible for organizations to use evidence to determine when a risk exceeds an accepted security level. Organizations are not free to choose how much risk personal information can be exposed to. 123 Datatilsynet., 2009., Risikovurdering av informasjonssystem., p.8. Lougborough University – Linden Consulting., 2007., Privacy Impact Assessments., p.17. 125 Datatilsynet., 2009., Risikovurdering av informasjonssystem., summary. 126 Datatilsynet., 2009., Risikovurdering av informasjonssystem., p.4. 127 Datatilsynet., 2009., Risikovurdering av informasjonssystem., p.6. 124 Page 38 of 66 SUNNY D1.4: Surveillance societal and ethical aspects There will be expectations of a minimum security level for the protection of personal information. These relate to confidentiality, availability and integrity 128. The accepted risk level must be described and include what personal information and processes are touched upon, what incidents could have consequences for data protection and the acceptable levels for consequence and probability. The description must determine the prioritization between different security needs and describe the risk mitigating measures 129. The environment refers to those surroundings or situations in which the assets can be found. This includes the information systems, the physical installations and the organization. Also those processes and operating conditions which personal information forms a part of. Additionally, it is necessary to reveal the existing security measures, whether they are organizational or technical. Mapping out the connections, for example between the information system and internet/internal networks, physical premises, relations between humans/machines, competences and routines, etc. is also important 130. Results from a process-mapping will tell where and how assets are processed, and simultaneously give information about the possibility for loss or damage. Security tests will reveal if the mitigating actions actually work 131. Both cause and consequences must be assessed. The consequence assessment must part from the undesired incidents that have been identified. Consequences can be expressed through economic loss, legal liability and other negative effects for the company. There will also be consequences for those people whose personal data is compromised 132. 7. Legal Framework for UAV’s 7.1 Introduction The international community does not have any international regulation concerning the use of UAVs that governs safety, licensing, airworthiness, privacy and data protection in a non-segregated airspace for the different varieties of such vehicles. In fact, there are many different legal considerations to take into account when analysing the obligations and restraints for those wishing to fly UAVs. There are international, regional and national legislations that put obligations and restraints on the use of UAVs. One will have to consider whether it will be operated for military, law enforcement and customs, commercial or individual use. Different legal instruments apply to vehicles of different sizes. Whether or not the vehicle will collect data through surveillance will also define requirements. Moreover, in Europe the whole regional data protection framework is under reform which will have an impact on the use of these vehicles. 128 Datatilsynet., 2009., Risikovurdering av informasjonssystem., p.6. Datatilsynet., 2009., Risikovurdering av informasjonssystem., p.7. 130 Datatilsynet., 2009., Risikovurdering av informasjonssystem., p.9. 131 Datatilsynet., 2009., Risikovurdering av informasjonssystem., p.9. 132 Datatilsynet., 2009., Risikovurdering av informasjonssystem., p.13-14. 129 Page 39 of 66 SUNNY D1.4: Surveillance societal and ethical aspects Similarly, new legislation that will affect the use of UAVs is being rolled out in several new countries. This creates a very confusing legal context that must be taken into account. 7.2 International UAS Legal Instruments and Initiatives UAVs are flying objects and are therefore subject to the rules made by the International Civil Aviation Organization (ICAO). Consequently, any action taken in the EU should be taken in agreement with the ICAO and its rules 133. One particularly important piece of legislation is the Convention on International Civil Aviation, which is also known as the Chicago Convention. This is however not applicable to aircrafts defined as military, customs or police aircrafts. States are therefore required to develop legislation for such aircrafts 134. In 2011 the ICAO issued Circular 328 that touched primarily on matters related to safety, licensing and airworthiness. The Circular is prudent when assessing the integration of a non-segregated airspace as it stated that: ‘Integrating remotely-piloted aircraft into non-segregated airspace and at aerodromes can likely be achieved in the medium-term … Development of the complete regulatory framework for UAS will be a lengthy effort, lasting many years’ 135. In March 2012 the ICAO adopted amendments to Annexes 2 and 7 of the Chicago Convention. This achieved the full insertion of the Remotely Piloted Aircraft Systems (RPAS) in the aviation system. It sets requirements for safety certification, licensing of remote pilots and certification for operators 136. The intrusiveness into people’s right to privacy and to have their data protected is not prioritized by industry and the regulatory authorities 137. The Association for Unmanned Vehicle Systems International (AUVSI) did nonetheless issue an Unmanned Aircraft System Operations Industry ‘Code of Conduct’. AUVSI, an influential UAV industry group, took a step in the right direction, but it is far from good enough. The Code of Conduct is too broad and consists of generic promises and only makes a general reference to ‘respect the privacy of individuals’. There is no reference to enforcement, oversight or who would be responsible for this 138. Similarly, the International Association of Chiefs of Police Aviation Committee issued ‘Recommended Guidelines for the use Unmanned Aircraft’. These focus primarily on community engagement, system requirements and operational procedures. They also have one short section on image retention. It merely specifies that images should primarily only be retained if there is an on-going investigation and that their usage should be transparent and open for public inspection unless more secrecy is mandated by law 139. It 133 th The European Commission., 2011., Discussion Paper from the 4 Workshop on Societal Impacts on UAS., p.4. OPARUS., 2011., Workshop 1 Report., p.16. 135 th The European Commission., 2011., Discussion Paper from the 4 Workshop on Societal Impacts on UAS., p.5. 136 European Commission., 2012., Working Document – towards a strategy for development of RPAS., p.13. 137 European Commission., 2007., Study Analyzing the Current Activities in the Field of UAV’s., p.70. 138 Information and Privacy Commissioner of Ontario, Canada., 2012., Privacy and drones., p.11. 139 International Association of Chiefs of Police – Aviation Committee., 2012., Guidelines for the Use of UAV’s. 134 Page 40 of 66 SUNNY D1.4: Surveillance societal and ethical aspects obviously falls very short of the standards required to effectively protect privacy and personally identifiable data. 7.3 European UAS Legal Instruments and Initiatives Safety is, without doubt, the most important consideration that leads the work on integration of UAV’s into controlled airspace. In the EU, the need for UAV’s to guarantee an equivalent level of safety (ELOS) to manned aircraft is the dominant priority 140. There is however no all-encompassing regulation that governs the use of UAVs in a non-segregated airspace in the EU, especially not one that guarantees data protection. The EC has placed an important part of the responsibility on national governments in order to promote the UAV technology, so it will receive public acceptance. It emphasizes that government agencies (i.e. Coast Guard, Police) will be the first users of civil UAVs. Consequently, successful demonstrations of relevant technology, its safety and its cost-effectiveness will be highly valued in this respect. The military use of UAVs has rightly produced a very negative reception 141. Under current legislation and with the standard of technology available today, it is only possible to fly UAVs in segregated airspaces, with special conditions. Flight in non-segregated airspace is not possible. Short range operations (out to 500m range), meaning within visual line of sight of the pilot, is however allowed by some countries 142. The current guiding legislation on UAVs in Europe is EC Reg. 785/2004. It requires all UAVs weighing more than 20 kg’s to have adequate insurance cover. Many UAVs will therefore never get off the ground at the moment. State aircrafts (military, customs and police) are however exempt across the EU, i.e. self-insured. Civil UAVs fly under civil aviation jurisdiction for Air Traffic Management purposes, while military UAVs are subject to military flight rules 143. In Europe unmanned aircrafts are divided in two major groups, which are each regulated by different authorities: UAVs with a maximum take-off mass of more than 150kg. These systems are regulated by the European Aviation Safety Agency (EASA) 144 and fall under the EC Regulation No 216/2008 145. UAVs with a maximum take-off mass of less than 150kg, commonly designated as Light UAS. These systems are regulated by the national civil aviation authority (NAA) 146. EASA is engaged, although with limited resources, in developing a safety Regulatory Roadmap for civil RPAS above 150kg. It is expected to deliver in 2016. 140 European Commission., 2007., Study Analyzing the Current Activities in the Field of UAV’s., p.60. European Commission., 2007., Study Analyzing the Current Activities in the Field of UAV’s., p.87. 142 Europe., 2012., OPARUS Periodic Report Summary. 143 European Commission., 2007., Study Analyzing the Current Activities in the Field of UAV’s., p.54. 144 European Commission., 2012., First Hearing on Light Unmanned Aircraft Systems., p.1-2. 145 European Commission., 2012., Working Document – towards a strategy for development of RPAS., p.12. 146 European Commission., 2012., First Hearing on Light Unmanned Aircraft Systems., p.1-2. 141 Page 41 of 66 SUNNY D1.4: Surveillance societal and ethical aspects The EC published a Staff Working Paper in September 2012, entitled ‘Towards a European Strategy for the development of civil applications of Remotely Piloted Aircraft Systems’. The document concludes that there was a necessity to set up a European RPAS Steering Group (ERSG). Its aim is to ‘foster the development of civil RPAS by planning and coordinating all the activities necessary to achieve the safe and incremental integration of RPAS into European air traffic by 2016’. The group is responsible for designing a comprehensive roadmap towards the integration of civil UAVs into European airspace by 2016 147. The Single European Sky (SES) and its technological pillar SESAR, which aims to establish a European air traffic management environment, capable of accommodating UAVs into a non-segregated airspace, is not expected to be complete until 2020 148. It provides a series of measures enabling safer, greener and more cost-efficient flights. JARUS is a European initiative aimed at developing operational and technical regulations for UAVs 149. This is for light UAVs weighing less than 150kg 150. EUROCAE WG 73 is another initiative developing a requirements framework that would enable UAVs to operate within the constraints of the existing Air Traffic Management (ATM) environment in an unsegregated airspace. INOUI (Innovative Operational UAS Integration) is a third initiative, funded by the EC 6th Framework Programme, focused on the integration of UAS in an unsegregated airspace in the context of SES 151. UAVs have also reportedly been used for police surveillance or border control in several European countries, such as France, Belgium, Italy, Switzerland and the Netherlands, on certain occasions. The police department in Kent in the UK has reportedly working on a £3m project to use unmanned aircraft to patrol the coast 152. During a European UAS Conference the Dutch Police expressed interest in the use of UAVs but also registered a series of difficulties with its usage. They highlighted challenges related to the integration within the police, usability, reliability of the equipment, the quality of sensors, weather challenges, day and night issues, as well as mentioning that the lack of a regulatory framework and costs was still a problem 153. These are relevant considerations to keep in mind during the SUNNY project. 147 Cole, C., 2012., Europe to open skies to drones by 2016 says Commission document. European Commission., 2007., Study Analyzing the Current Activities in the Field of UAV’s., p.74. 149 Masutti, A., University of Bologna., 2010., European UAS conference. 150 European Commission., 2012., Working Document – towards a strategy for development of RPAS., p.11. 151 Masutti, A., University of Bologna., 2010., European UAS conference. 152 The Guardian., 2012., The Rise of drones in UK airspace prompts civil liberties warning. 153 The Dutch Police., 2010., European UAS Conference Presentation. 148 Page 42 of 66 SUNNY D1.4: Surveillance societal and ethical aspects 7.4 National UAS Legal Instruments and Initiatives Generally, too few authorities have provided for regulation that covers privacy law, torts law, insurance law, civil aviation regulations, etc. in the field of UAVs. In Italy however, ENAC, the Italian Civil Aviation Authority recently published a Regulation. This is however, only applicable to UAVs that weigh less than 150kg and operators must seek approval from ENAC. The Regulation does however not cover data protection. It is the EU’s legislation on data protection which is applicable and national DPAs will probably be involved in interpreting regulations and breaches of them. As of early April this Regulation was being discussed by legislators 154. In Portugal, the lack of a regulatory framework has raised concerns for privacy advocates. The use of UAVs has become increasingly more common and even users have lamented the legal void that exists. The primary concern among users seems to be compliance with safety standards and accessing insurance, which is quite difficult. However, there is recognition that UAVs can constitute a threat to data protection. Nonetheless, regulating privacy and data protection in the field of UAV use has not so far been contemplated by Portuguese legislators 155. In the U.S. President Obama signed the Federal Aviation Authority (FAA) Appropriations bill (Modernization and Reform Act of 2012) which mandated that the U.S. airspace must be opened to UAVs by 2015. The FAA is the agency which is responsible for developing ‘a comprehensive plan to safely accelerate the integration of civil unmanned aircraft systems into the national airspace system’. By September 2015 this plan should be ready 156. In the U.S. it is the FAA, which is responsible for the safety of U.S. airspace. At the current moment, they do have the possibility to grant permissions, but do so on only a few occasions. The FAA is nonetheless under a great deal of pressure from industry and Congress to speed-up developments 157. Even though the FAA is responsible for ensuring these systems fly safely in the U.S. airspace, with only two years left until the drones will fly in an unsegregated airspace, no federal agency has taken the lead to deal with the full implications of using UAVs and developing the relevant policies and guidelines for their use. This is true, despite the fact that the Government Accountability Office (GAO) recommended the Secretary of Homeland Security direct the Transport Security Administrator (TSA) to examine the security implications of future, non-military UAV operations in the national airspace system and take any actions deemed appropriate 158. In the U.S. they have a particularly legitimate reason to worry about UAV-surveillance domestically due to the absence of adequate privacy and data protection legislation. They have no equivalent to the Data Protection Directive and privacy matters are regulated by the Supreme Court’s interpretation of the Fourth Amendment of their constitution. 154 Global Legal Post., 2014., Can drones break into the commercial market? Público., 2013., Em Portugal há drones a mais e legislação a menos. 156 th U.S. Congressional Research Service., 2012., Drones in Domestic Surveillance Operations – 4 Amendment Implications and Responses., p.3. 157 American Civil Liberties Union., 2011., Protecting Privacy – From Aerial Surveillance – Recommendations for Government use of Drones., p.9. 158 Department of Homeland Security., 2012., Using UAS’ within the Homeland – Security Game Changer., p.2. 155 Page 43 of 66 SUNNY D1.4: Surveillance societal and ethical aspects The American Civil Liberties Union (ACLU) has expressed concerns that the debate regarding UAVs in the U.S. has mostly been spinning around safety – which is also a concern that could be expressed regarding the EU legal framework. The organization has called for a mandated agency, for example the FAA, to regulate the use of UAVs with an aim to protect privacy; similar to the way the FAA governs matters related to safety with respects to UAV usage. If the FAA cannot assume this role, the organization argues that Congress should enact additional protections to preserve privacy 159. The American Civil Liberties Union (ACLU) has made several recommendations to the U.S. government, regarding the use of UAV for law enforcement: To restrict the number of users of UAVs. Only allow for the use of UAV for evidence collection where there has been a criminal wrong-doing or where there is a warrant or probable cause; or where there is a geographically confined, time-limited emergency situation in which particular individuals’ lives are at risk, such as fire, hostage crisis or a person lost in the wilderness; or for reasonable non-law enforcement purposes by non-law enforcement agencies, where privacy will not be substantially affected, such as geological inspections or environmental surveys, and where the surveillance will not be used for secondary law enforcement purposes (i.e. mission creep). Not to retain or share images unless there is reasonable suspicion that the images contain evidence of criminal activity or are relevant to an on-going investigation or pending criminal trial. That policies and procedures for the use of aerial surveillance technologies by the police are explicit, in writing and public. That there is democratic control regarding the deployment and policy decisions surrounding UAVs, based on transparent information. That there is a clear, systematic examination into the costs and benefits involved in order to audit and track the effectiveness of these tools 160. The Washington Center for Democracy and Technology (CDT) has called for greater approval and oversight to be in place in order to protect civil liberties. It recommended that the FAA carry out PIAs and design rules regarding privacy and transparency for both government and non-government use of UAVtechnology. Furthermore, the group suggested that all FAA applications for a UAV-license include a data collection statement that defines whether the UAVs will collect information about individuals and, if so, the circumstances under which that information will be retained, used, and disclosed. This should include; The purpose for which the UAV will be used and the circumstances under which its use will be authorized and by whom. The specific kinds of information the UAVs will collect about individuals. 159 American Civil Liberties Union., 2011., Protecting Privacy – From Aerial Surveillance – Recommendations for Government use of Drones., p.2. 160 American Civil Liberties Union., 2011., Protecting Privacy – From Aerial Surveillance – Recommendations for Government use of Drones., p.15-16. Page 44 of 66 SUNNY D1.4: Surveillance societal and ethical aspects The length of time for which the information will be retained. The possible impact on individuals’ privacy. The specific steps the applicant will take to mitigate the impact on individuals’ privacy, including protections against unauthorized disclosure. The individual responsible for safe and appropriate use of the UAV. An individual point of contact for citizen complaints 161. These are recommendations directed at government, but nonetheless, a lot can be learned and taken into account for the SUNNY project. Recommendations regarding declaration of purpose, geographic confinement, time-limited deployment, mission creep, image retention and disclosure, taking into account the nature of the information collected, the impact on individuals privacy, the transparency of operations,, mitigating risks, audits and monitoring of the deployment and its efficiency and having a contact point for complaints are all valuable aspects that could be considered for SUNNY. In June 2012, identical bills were introduced in the U.S. House of Representatives and Senate – ‘The Preserving Freedom from Unwarranted Surveillance Act of 2012’. Their aims are ‘to protect individual privacy against unwarranted governmental intrusion through the use of unmanned aerial vehicles’. There have also been committee-hearings on the domestic use of UAVs by the Department of Homeland Security (DHS) 162. One author called for the FAA to adopt a 2008 DHS framework, where applicants for a UAV license would have to describe: The purpose for which the UAV will be used and the circumstances under which its use will be authorized and by whom. The specific kinds of information the UAV will collect about individuals. The anticipated uses and disclosures of that information. The possible impact on individuals’ privacy. The specific steps the applicant will take to mitigate the impact on individuals’’ privacy, such as protections against unauthorized disclosure. The individual responsible for safe and appropriate use of the drone. An individual point of contact for citizen complaints 163. Again the recommendations proposed are similar to those expressed by the previously mentioned organizations. The tendency of concerns is clear and should be considered in SUNNY. 7.5 U.S Legal Framework for the use of UAS for Border Control Law enforcement agencies in the U.S. are generally granted significant deference to conduct surveillance at or near its borders. The federal government has a significant interest in protecting its borders from 161 Information and Privacy Commissioner of Ontario, Canada., 2012., Privacy and drones., p.13. Information and Privacy Commissioner of Ontario, Canada., 2012., Privacy and drones., p.15. 163 Geiger, H., 2012., The Drones are Coming. 162 Page 45 of 66 SUNNY D1.4: Surveillance societal and ethical aspects irregular border crossings, drug trafficking, and, perhaps most importantly, the transit of weapons and persons seeking to do harm to local people and infrastructure 164. The U.S. Congress has granted federal law enforcement agencies significant search powers at the border. Section 287 of the Immigration and Nationality Act (INA) codified at 8 U.S.C. 1357, authorizes immigration officers to conduct warrantless searches of any vessel within a reasonable distance from the border and any vehicle within 25 miles from a border for the ‘purpose of patrolling the border to prevent the illegal entry of aliens into the United States’. The Supreme Court has likewise acknowledged this federal interest in the borders, observing that ‘the Government’s interest in preventing the entry of unwanted persons and effects is at its zenith at the international border’. Again, the touchstone in every Fourth Amendment case is whether the search is ‘reasonable’. The Court observed in United States v. Montoya De Hernandez that ‘the Fourth Amendment balance of reasonableness is qualitatively different at the international border’. In late 2003 the Border Patrol in the U.S. tested the ‘Predator B’. The Coast Guard tested the same UAV in the summer of 2004 in Alaska. During the same summer the U.S. started scanning the Arizona-Mexico border with two ‘Hermes 450’s’. The reported cost of leasing, fuelling and maintaining these two UAVs for three months was $4m. The Department of Homeland Security also has also used UAVs along the Canadian border and in Puerto Rico 165. Between 2004-2005 estimates state that the Predator drones assisted in the capture of 2300 undocumented immigrants and 3760kg of marijuana on the U.S.-Mexico border 166. In 2011 the ACLU stated that the Customs and Border Protection Agency (CBP) in the U.S. have operated UAVs along the border since 2005 and in 2011 had seven Predator drones carrying out the task of border control. By 2010 the entire southern border was being patrolled. In 2011 the Department of defence moved beyond the border and sent UAVs into Mexico to provide surveillance on drug cartels 167. In 2012 the CBP had ten UAVs that were used to monitor drug smuggling tunnels, video dams, bridges, levees, and riverbeds at risk of flooding and assist with the deployment of National Guard resources responding to flooding. They have also flown missions for Border Patrol, for the FBI, the U.S. Forest Service, the Texas Rangers, etc. 168 U.S. authorities have however suspended the use of UAVs for homeland border surveillance in the Mexican and Canadian borders due to what seems an insufficient operational value because operational interest is marginal with respect to extra cost added 169. EPIC stated in one of their documents that UAVs often are equipped with surveillance cameras that also have thermal and night-vision capabilities. If they have Electro-Optical sensors they can identify an object 164 U.S. Congressional Research Service., 2012., Drones in Domestic Surveillance Operations., p.10. EPIC., 2005., Spotlight on Surveillance – Unmanned Planes offer New Opportunities for Clandestine Government Tracking., p.2. 166 P. Lee from Bird & Bird., 2011., Presentation on ‘Legal Risks and issues through the UAS lifecycle and privacy issues surrounding the use of UAS. 167 American Civil Liberties Union., 2011., Protecting Privacy – From Aerial Surveillance – Recommendations for Government use of Drones., p.6-7. 168 Department of Homeland Security., 2012., Using UAS’ within the Homeland – Security Game Changer., p.1. 169 OPARUS., 2011., Workshop 1 Report., p.22. 165 Page 46 of 66 SUNNY D1.4: Surveillance societal and ethical aspects the size of a milk carton from an altitude of 60.000 feet. Several UAVs also have radar systems to produce high-resolution imagery that are able to track moving targets. Ground operators using these systems can therefore be provided with precise real-time imagery. Some of these UAVs can even fly for 20-50hrs without refuelling, further extending their surveillance capacity way beyond what has been possible before 170. The president of the National Border Patrol Council in the U.S. said at subcommittee hearing that ‘substituting detection technology for staffing and equipment lawbreakers is unwise. While such technology can be useful … it cannot catch a single violator. Only trained people can accomplish that task’ 171. This indicates that UAVs should not be portrayed as a panacea for surveillance, border control or law enforcement. Reports claim border patrols along the U.S.-Mexican/Canadian borders have been suspended due to the lack of operation value 172. 7.6 Recommendations for Test-Sites The U.S. Congress has instructed the FAA to select six domestic sites to test the safety of UAVs. The primary mission of the FAA will be safety and not privacy 173. The then requested comments on UAVs test sites from relevant stakeholders. They requested comments on test site requirements, designation standards and oversight activities. The Electronic Privacy Information Center (EPIC) was one of the groups that responded174. The organization has called for federal agencies to regulate and control the proliferation of UAVs that are used for the purposes of surveillance in the U.S. They stressed that UAVs possess unparalleled surveillance capabilities that the FAA should assess and risks mitigated before these are deployed further 175. UAVs will, according to EPIC, invoke Fourth Amendment interests and well established common law privacy rights. The group further recommended that the FAA support privacy by mandating transparency and accountability in UAVs operations, prevent unlawful access to UAVs surveillance information and limit the exposed population whenever possible. EPIC requested specific rulemaking on UAV surveillance, and indicated that such rules should take into account data use and retention, property rights, use limitations and enforcement. They also expressed concerns about UAS network security to be considered, especially within the confines of the test sites. Considerations should be made regarding; 1) the ability to circumvent encryption codes within drone 170 EPIC., 2005., Spotlight on Surveillance – Unmanned Planes offer New Opportunities for Clandestine Government Tracking., p.3. 171 EPIC., 2005., Spotlight on Surveillance – Unmanned Planes offer New Opportunities for Clandestine Government Tracking., p.4. 172 OPARUS., 2011., Workshop 1 Report., p.22. 173 th New York Times., 2012., The Dawning of Domestic Drones. (Accessed the 6 of March 2012). 174 EPIC., 2012., Comments on the Federal Aviation Administration of the Department of Transportation. 175 Information and Privacy Commissioner of Ontario, Canada., 2012., Privacy and drones., p.12. Page 47 of 66 SUNNY D1.4: Surveillance societal and ethical aspects surveillance software, and 2) the ability to manipulate hardware to gain access to drone surveillance data. To limit the possible intrusion on people’s privacy, the group further recommended that the flight testing be carried out in sparsely populated areas. Moreover, the stated that public notices are insufficient as privacy safeguards and that a proactive approach that provides affected members of the population with relevant information would be necessary to maintain transparency around test sites 176. 8. General concerns about UAS use Mission creep means situations where PII have been collected for a specific purpose, but their use extended beyond this defined purpose. For example if a UAV data collection scheme is defined as a tool for search and rescue, but the data collected is then provided for law enforcement purposes, this is mission creep. This is an aspect which must be considered in the SUNNY project, as it will work under the auspices of EUROSUR where the CISE will pose potential problems with regards to sharing such information. Under EUROSUR many different sectors operating in the maritime environment will be allowed to collect and distribute information. It is not clear how PII will be protected in the CISE. Data security is another challenge related to the use of UAS’, which is quite relevant for SUNNY. EPIC have expressed concern with the dangers that can result from the hacking of UAVs. This refers to the interception and compromise of UAV operations that can pose a threat to the security of lawful UAV operations. To mitigate these risks (especially at test sites) EPIC recommended that the FAA explore; 1) the ability to circumvent encryption codes within UAV surveillance software and, 2) the ability to manipulate hardware to gain access to UAV surveillance data 177. The ‘security’ principle has special relevance, because without strong security, there can be no privacy and personal data cannot be protected. Applied security standards must assure the confidentiality, integrity, and availability of personally identifiable data throughout its lifecycle including, inter alia, methods of secure destruction, appropriate encryption, and strong access control and logging methods 178. The relevance of this problem can be drawn from an example in Iraq. Militants there have used $26 off-theshelf software to intercept live video feeds from U.S. Predator drones, potentially providing them with information they need to evade or monitor U.S. military operations. These Iranian-backed insurgents intercepted the video feeds by taking advantage of an unprotected communications link in some of the UAVs using software programs such as SkyGrabber to regularly capture UAS video feeds. They do not think that they took control of the drones however. U.S. military personnel in Iraq discovered this when they apprehended a Shiite militant whose laptop contained the files of intercepted drone video feeds. Gen. Deptula stated, in regards to the incident, that there was an inherent risk to using drones since they are remotely controlled and need to send and receive video and other data over great distances. The military was however trying to solve the problems by better encrypting the drones’ feeds. Military officials stated that adding encryption to a network that was more than a decade old involved more than placing a new piece of equipment on individual drones. Instead, many components of the network linking the drones to 176 EPIC., 2012., Comments on the Federal Aviation Administration of the Department of Transportation. Information and Privacy Commissioner of Ontario, Canada., 2012., Privacy and drones., p.12. 178 Information and Privacy Commissioner of Ontario, Canada., 2012., Privacy and drones., p.25. 177 Page 48 of 66 SUNNY D1.4: Surveillance societal and ethical aspects their operators in the U.S., Afghanistan or Pakistan have to be upgraded to handle the changes 179. This echoes the arguments for designing privacy protections into the design, rather than bolting them on later at a more expensive prize. Another example is found in a demonstration by Todd Humphreys at the University of Texas in front of the Department of Homeland Security. With a few researchers, around $1.000 in parts and some sophisticated software to send signals to an UAV’s GPS receiver he hijacked a UAV in mid-air, effectively controlling it. Humphreys explained ‘The navigations systems of these drones have a variety of sensors, but at the very bottom is a GPS unit’ – and most of these UAVs which will be used in the civilian airspace have a civilian GPS unit, that is vulnerable to those who are able to spoon feed false navigation information to the navigation centre of these UAVs. He furthermore warned the FAA about not adjusting to these threats, as these can cause serious collisions. Although he is a supporter of the utilities of UAVs he still warned of their threat to privacy which he also called for the FAA to address before opening the U.S. airspace in 2015 180. Privacy advocates further expect that law enforcement will start to call for actual intervention in law enforcement situations. The development of airborne technologies that would allow UAVs to dispel protesters (through gas or other technologies), stop a fleeing vehicle or even deploy weapons is of great concern181. This should not be a problem under SUNNY, where no mention of armed UAVs has been uttered. There is also a fear that increased surveillance will lead to a Panoptican chilling-effect 182. It is proven that people who are being observed start to behave differently and make different decisions. Other associated problems are institutional abuse and discriminatory targeting. Law enforcement, as most other workplaces suffer the consequences of having ‘bad apples’. When these ‘bad apples’ sit on the top of the chain, abusive behaviour can spread quickly. Many law enforcement agencies have notorious human rights records characterized by abuse. Trusting them to handle UAS’ can have detrimental effects on human rights. 9. Guiding Principles for SUNNY The EC has stated in one of its working documents that the development of RPAS must respect the rights and principles enshrined in the CFREU, and in particular the right to private life and family life (Art.7) and the protection of personal data (Art.8). The Lisbon Treaty recognizes that these rights have the same value as treaties. The document further stresses that the Data Protection Directive must be respected as it also applies to RPAS. It is merely an extension of technologies that collect PII already available in cameras and 179 Gorman, Dreazen & Cole., 2012., Insurgents Hack U.S. Drones. st RT., 2012., Drone hack explained: Professor details UAV hijacking (Accessed 21 of March 2012). 181 American Civil Liberties Union., 2011., Protecting Privacy – From Aerial Surveillance – Recommendations for Government use of Drones., p.11. 182 Refers to the ‘Panoptican Prison’ created by Jeremy Bentham – The concept of the design is to allow a watchman to observe (-opticon) all (pan-) inmates of an institution without them being able to tell whether or not they are being watched. 180 Page 49 of 66 SUNNY D1.4: Surveillance societal and ethical aspects satellites. Similarly, the new General Data Protection Regulation will apply to data processing by commercial RPAS operators. The EC claims there is no need for a new or modified legal privacy and data protection regime to accommodate commercial RPAS applications, which of course could be discussed further. National rules might impose restrictions on the use of RPAS by states, for example, for public video surveillance. In order to allow for the development of RPAS services for state use, some degree of harmonisation might need to be envisaged. To that end, the different national rules would need to be analysed. The future adoption of the new Police and Criminal Justice Data Protection Directive, would, if adopted, define the benchmarks for data processing carried out by law enforcement. The EC does recommend that PbD be considered during the development of RPAS. The EC also called for transparency and extensive consultations to be a factor in the development of RPAS, considering the negative perception that may surround their use. It stated that the European Group on Ethics, the LIBE Committee of the European Parliament of the EU, the Agency for Fundamental Rights and the EDPS would be natural organizations to consult with. Defining permissible and forbidden usage of RPAS could further increase public confidence. The EC also stressed that privacy and data protection PIAs could further strengthen their position. The Data Protection Directive does not apply to state use of RPAS in the context of police and border surveillance. In these cases, national rules apply. If Member States however agree on the adoption of the Police and Criminal Justice Data Protection Directive would be a good step for the harmonization of data protection rules. Such harmonization, according to the EC, would further strengthen the perception of RPAS. Nonetheless, the EC has recommended that PbD be considered for the development of RPAS’. PbD however is based upon FIP which is what the Data Protection Directive has codified. The correct implementation of PbD also requires a user-centric approach that goes beyond mere compliance, and to have a sincere interest in protecting privacy and personally identifiable data. Such a line of thought is line with the British DPA, the ICO. In its document on Data Privacy and Border Control the DPA recommend adhering to the principles of PbD, especially data minimisation, the employment of PETs and utilizing PIAs. This it argues should specifically be applied to technologies such as UAS, profiling of travellers and future checkpoints. This is because the ultimate aim should be to secure borders AND protect data/privacy. UAVs have primarily become famous or rather infamous due their use on the battlefield as a weapon. However, even on the battlefield their primary purpose is surveillance. The main arguments applied for the use of UAVs is their potential endurance and persistence, cost-effectiveness (although some are concerned that the cost of UAVs will rise) and their ability to function in environments which are difficult for human beings – i.e. ‘dull, dirty and dangerous’. Furthermore, since they do not require carrying a pilot it is possible to keep them relatively small, providing low visibility and enabling a ‘stealthy’ approach. Therefore people will often be unaware that they are being observed by the UAVs. This is of course an advantage in warfare, but raises many questions when it comes to surveillance. The prospects of cheap, small, portable flying video-surveillance machines threatens to eradicate existing practical limits on aerial monitoring and allow for pervasive surveillance, police fishing expeditions, and use of these tools in a way that could eventually eliminate the privacy people expect . Page 50 of 66 SUNNY D1.4: Surveillance societal and ethical aspects It poses a series of questions with regard to collection, retention, use, disclosure and eventual safe destruction of PII, just like in any other data processing scheme. These concerns are applicable to government agencies, commercial entities or small entities such as private individuals alike. A natural comparison is often made between the use of Closed Circuit Television (CCTV) cameras (either fixed ones or those used in a helicopter for example) and the surveillance capacity of UAVs. Public surveillance is not necessarily illegal in Europe, but must be balanced up against individuals’ right to private life. In ‘Peck vs. the United Kingdom’ the ECtHR reiterated that ‘the monitoring of the actions of an individual in a public place by the use of the photographic equipment which does not record the visual data does not, as such, give rise to an interference with the individual’s private life’. Public surveillance which records visual data will therefore be considered personal data under the Data Protection Directive and would invoke individual rights that are stated in it. That means that individuals whose images are recorded should have the right to consent, access and correct, which is quite difficult in practice. To compare, Google have been required by the EU to warn local residents (and online) before sending out the cameras for Google Street View and to keep the unblurred versions of the photos no longer than 6 months, instead of a year, which was previously the case . It is however difficult to inform individuals of the presence of UAVs due to high altitude the may fly at (providing invisibility), their silence and the extensive territory they may cover. Nonetheless, there could be creative solutions such as local and online warnings. When authorities are carrying out covert surveillance, which they are not required to notify, they must conform to national surveillance laws. Furthermore, if UAVs are hovering over homes, possibly with thermal imaging, etc. they would likely need further special authorization. Large scale, random surveillance of communities and populations using such enhanced UAVs would be difficult to justify however. This latter example would however be an improbable result of the SUNNY project as UAVs are expected to fly over border areas. In its presentation to the European UAS Conference, the Dutch police informed that images of people will, in most cases, fall under the national data protection legislation derived from the Data Protection Directive. Images or voices will be considered personal insofar that they provide information on an individual that make him/her identifiable, even if indirectly, and that will engage the jurisdiction of the Directive. So will the information about people that is derived from such images (for example vehicle registration numbers). Such data can also reveal sensitive personal data. National interpretations of the Data Protection Directive have however varied (which is one of the reasons why the EC has proposed a new General Data Protection Regulation). In Norway, camera-surveillance of persons that can be recognized on the images will enact the national law that implements the Data Protection Directive (personopplysningsloven). This legislation was amended in 2012. One of the changes that were made was the introduction of the word ‘fixed’ – referring to fixed-cameras – cameras that are fixed to one determined location. Camera-surveillance there means ‘consistent, regular or repeated surveillance with the assistance of a remotely-controlled or automatic surveillance-camera or similar equipment that has been fixed’ in a certain location. This means that handheld cameras will not be considered camera-surveillance in this piece of legislation. UAV cameras are fixed to the vehicle, but not to a specific location. Private camera use is nonetheless restricted in this law when it comes to the publication, but not to the recording itself. The Norwegian DPA (Datatilsynet) expressed a concern that if Page 51 of 66 SUNNY D1.4: Surveillance societal and ethical aspects UAV technology becomes so accessible, cheap and technologically fascinating then many will be tempted to abuse these cameras for surveillance, spying and voyeurism. 10. Annex 1: Recommendations made for other EU Projects 10.1 OPARUS OPARUS has been developed under the auspices of the EU’s Seventh Framework Programme. The goal of OPARUS was to elaborate an open architecture for the operation of unmanned air-to-ground wide area land and sea border surveillance platforms in Europe. This is based on an analysis of concepts and scenarios for UAV-based aerial surveillance of European borders (Schengen). The architecture will consist of different operational and technical aspects covering surveillance sensors, aerial platforms, communications and networking and control stations 183. The threats they identified were illegal immigration, smuggling and/or terrorism, and the solution was of course the use of surveillance through UAVs with new sensors 184. Ms Jeanny Lucas from SAFRAN CNIL advised the OPARUS consortium on the ethical aspects by focusing primarily on privacy. She emphasized that the Data Protection Directive would be applicable for the use of UAVs in the civil domain. Moreover, Lucas argued that to provide a roadmap for the development of a project in which privacy is protected, she recommended the implementation of PbD, to which it is important to apply PIA’s in order to identify threats and solutions to privacy protection 185. Furthermore, Lucas has addressed the complex legislative environment in which such a project would take place. One example would be when a ship with persons on-board is identified by taking images from a UAV. In such a case the Data Protection Directive should be applied she argued – which is the same argument utilized by the Dutch Police during the European UAS Conference. Lucas further raised some standardized questions that would need to be responded in order to respect the Directive: Who is responsible for the processing? What organization requires the collection of the data? Who will process the data? What is the perimeter? What legislation applies? Are they State- or private actors? Will any individual be filmed or can individuals be indirectly identified? Is there a clear division of responsibility within the processing scheme? What type of data will be processed? How long the images will be stored? Has the data receiver be identified and authorized for data processing 186? 183 OPARUS., 2011., Workshop 1 Report., p.1. OPARUS., 2011., Workshop 1 Report., p.6. 185 th European Commission., 2011., Unmanned Aircraft System Panel Process – 4 Workshop on Societal Dimension., p.8-9. 186 OPARUS., 2011., Workshop 1 Report., p.8. 184 Page 52 of 66 SUNNY D1.4: Surveillance societal and ethical aspects Lucas concluded that the whole process should meet the Data Protection legislation framework. She also stated that PII data transfers would be unproblematic as this particular project would be restricted to the Schengen area. Nonetheless, Lucas did remind the consortium that the Data Protection Directive has some exceptions in fields such as; Safety Defence Public security Prevention and research Detection and penal infringement pursuit or deontology issues for regulated work Control, inspection or regulation mission, even occasionally, in cases of public security, prevention, detection and financial or economical interest Concerned people protection or right and liberty of other people. Additionally, Lucas reminded the consortium of the relevance of the Binding Corporate Rules (BCR), which are supported by the EU and were developed by Art.29 Working Party (representatives of every national DPA in the EU). The rules stress that multinational corporations, international organizations and groups of companies that make intra-organizational transfers of PII across borders must comply with the Data Protection Directive. The legal requirement in the Directive is that the country to which the transfer will be made has an adequate level of data protection (i.e. the same as in the EU). Finally, she raised the question of whether it is problematic to receive images from third countries (non-European) under the Data Protection Directive – to which she claims Frontex have stated that this issue is regulated on a case by case basis through bilateral agreements 187. 10.2 PRESCIENT Another EU project that is relevant to SUNNY is called PRESCIENT. It aims to identify and assess privacy issues posed by emerging sciences and technologies and to contribute to the development of new instruments for the governance of science and technology 188. The project has identified research that specifies a range of negative implications on privacy and data protection. References are made to comments from EPIC about UAVs increased capability to monitor citizens clandestinely and that its cost may outweigh the benefits. More comments are made about the possibility of mass deployment of UAV surveillance as this could lead to an environment where individuals believe that a UAV is watching them even when no UAV are in operation. This could create a self-governing effect as described by Jeremy Bentham in the Panoptican prison. Moreover, the advancement of surveillance technology threatens to erode society’s expectations of privacy 189. A deliverable from the project also states, as this report has highlighted, that there is a lack of international and European legal framework to govern UAVs. Furthermore, it emphasises that UAV regulations are likely 187 OPARUS., 2011., Workshop 1 Report., p.8. PRESCIENT., 2013., http://www.prescient-project.eu/prescient/index.php (Accessed on the 4th of March 2013). 189 PRESCIENT., 2012., Deliverable No.2 – Privacy, data protection and ethical issues in new and emerging technologies., p.97. 188 Page 53 of 66 SUNNY D1.4: Surveillance societal and ethical aspects vary depending on the model, size, weight and speed, making regulations significantly complex and difficult to understand and enforce. ‘The Economist’ also warned that, ‘below a certain size, unmanned aircrafts could be impossible to regulate’ 190. One of the main problems will be that in many countries, there will be an ‘alphabet soup’ of organizations that have some jurisdiction over UAVs 191. The document further refers to arguments made by law enforcement officials who state that UAVs will not present any new form of surveillance, as this is what has been done with helicopters for a long time 192. This is however, misleading, considering the stealth and the endurance of these UAVs which gives surveillance increased covertness and longevity. When it assesses European privacy and data protection legislation, it makes special emphasis on the CFREU of 2000’s Art.7 and 8, which protects privacy, family life, home and communications, and data protection respectively. Highlighted are the rights to fair processing, consent, access to data and the right to rectification. The ‘Peck vs. United Kingdom’ case of the ECtHR is mentioned, as it reiterates that ‘the monitoring of the actions of an individual in a public place by the use of photographic equipment which does not record the visual data does not, as such, give rise to an interference with the individual’s private life’, making public surveillance such as CCTV lawful under the Charter. Under this consideration, the document argues, UAVs surveillance that monitors but does not record would be lawful. However, public surveillance which does record visual data would be considered ‘personal data’ under the CFREU and would mean subjects have rights of access and correction 193. 11. Annex 2: Guiding questions to consider In order to respect the principles of Privacy by Design SUNNY must have a genuine intent on respecting the right to privacy and data protection. That interest must go beyond mere compliance and must secure that the foundations for the protection of these rights are set out in three areas; information technology, accountable business practices and the physical design and infrastructure in which the project will operate. The intent of complying with the FIP Principles can be a good start to consider a serious lifecycle protection of PII. The report will end with some guiding questions that will help set of some initial considerations for SUNNY. Collection Principle: Who is responsible for data collection? Who is responsible for data processing? 190 PRESCIENT., 2012., Deliverable No.2 – Privacy, data protection and ethical issues in new and emerging technologies., p.98. 191 PRESCIENT., 2012., Deliverable No.2 – Privacy, data protection and ethical issues in new and emerging technologies., p.99. 192 PRESCIENT., 2012., Deliverable No.2 – Privacy, data protection and ethical issues in new and emerging technologies., p.99. 193 PRESCIENT., 2012., Deliverable No.2 – Privacy, data protection and ethical issues in new and emerging technologies., p.100-101. Page 54 of 66 SUNNY D1.4: Surveillance societal and ethical aspects Has the responsibility for collection and processing been divided and understood in a legally binding document? How will unnecessary data aggregation be avoided? Will UAVs with surveillance capacities be operated by law enforcement or civilian actors? What kind of data could be collected? Could PII be collected? Are adequate data collection and processing management procedures in place? Has the lifecycle of PII been identified? Data quality principle: What is the purpose for collecting PII? Will the data collected by UAVs be of necessary quality for its purposes? Purpose specification principle: Is there a legitimate reason for collecting PII? Will UAV surveillance data be used for evidence collection? Has there been carried out a PIA? How will the impact on individual’s privacy be mitigated? Use limitation principle: Who will access data? Should the use of UAV be geographically confined? Should the use of UAV be confined to specific time-limits? Is there a proper framework for the legitimate sharing of data? Is disclosure minimized? When is PII no longer necessary to store? Is there a way to secure that PII is destroyed when it is no longer necessary? Security safeguards principle: Could PII data collected by a UAV be depersonalised? Who is responsible for identifying inadequate receptors of PII? Will the exchange of PII be logged? How will UAVs integrate with other systems while maintaining the security for PII? Are there PET solutions available? Are proper safeguards with regards to the physical storage of PII in place? Are all the security risks in the PII lifecycle identified and mitigated? Openness principle: Is there a contact point for the public? Is there a transparent policy regarding the use of UAVs for surveillance purposes? Is there a way to notify the public of the surveillance? Has there been written a public data collection statement? Individual participation principle: Is there a possibility of receiving subject access requests? Who are responsible for receiving subject access requests? Page 55 of 66 SUNNY D1.4: Surveillance societal and ethical aspects Accountability principle: Who is responsible for the potential violations of data protection and privacy rights? What could the impact on individuals be if such PII is collected? Will there be a data protection supervisor? Is there adequate democratic control regarding the use of UAVs? Are relevant DPA’s informed and consulted? Page 56 of 66 SUNNY D1.4: Surveillance societal and ethical aspects 12. Annex 3: The Situation at the External Border of the EU This is an annex to Deliverable 1.4. for the SUNNY project. The aim of the annex is to shortly describe the movement across the external border of the EU, with a particular focus on irregular migration and crossborder crime. Particular attention will be placed on those indicators related directly to border-crossings which could be detected by the surveillance activities that will be tested in SUNNY. Irregular border crossings in the maritime domain and at the external land borders will be addressed thoroughly. The report will excludes analysis of pre-frontier control mechanisms such as Visa systems; post-border issues such as prolonged irregular stay; forgery of documents; and the return of migrants. Irregular border crossings will be analysed in statistically and in terms of the routes used. The annex will then shortly describe the number of asylum applications submitted in the EU, as well as the number of facilitators that operate around the EU’s external borders. Finally, the most relevant cross-border crime aspects will be addressed. Irregular border-crossings Frontex report that there was a sharp increase in the detections of migrants who irregularly crossed the EU’s external borders from 2012 to 2013. 72.500 detections were made in 2012, while 107.000 were made in 2013. This represents an increase of 48%. The number of detections for 2013 is however, more along the lines of the detections made in 2009 and 2010 (104.600 and 104.000 respectively). During 2011, which was the year of the “Arab Spring”, 141.000 detections were made, that being the highest number of detections in a year so far since Frontex started registering these numbers 194. Three phenomena characterized the recent trend: a large increase in Syrians applying for asylum after taking the Eastern- or Mediterranean route; a steady flow of migrants departing from North Africa (Libya and Egypt) who travelled across the Central Mediterranean; and finally a sharp increase of migrants crossing the land-border between Hungary and Serbia 195. The most common nationalities of those detected were Syrian, Eritrean, Afghan and Albanian. These nationalities accounted for 52% of the total detections (55.400). Syrians represented approximately a quarter of the total number of detections. The number of Syrians detected tripled between 2012 and 2013 and was by far the most common nationality among asylum seekers (50.096 applications – almost twice the number of applications made in 2012). 194 195 Frontex., 2014., Annual Risk Analysis., p.7. Frontex., 2014., Annual Risk Analysis., p.7. Page 57 of 66 SUNNY D1.4: Surveillance societal and ethical aspects (BBC map of the migration routes, 2013) Central Mediterranean Detections progressively increased in the Central Mediterranean throughout 2013, peaking in the third quarter, before it reached a total of 40.304 detections at the end of the year 196. Detections in the Central Mediterranean represented 38% of all the irregular border crossings. This represented a fourfold increase in detections compared to the previous year (albeit below the number from 2011) 197. The lack of a stable government in Libya made it an easy departure point for facilitators to use, by organizing boat trips 198. SubSaharan and Eastern Africans (especially an increasing number Eritreans) used the Central Mediterranean route. The exception was Syrians who ranked second, even on this route. Somalis, Nigerians, Malians, Senegalese and Gambians were among the common nationalities that used the same route 199. Some 1.982 Egyptians were also detected on this route in 2013 200. There is a strong tendency of numbers peaking in the summer months, when the weather conditions are easier to travel under 201. This is also a route where a large number of boats capsize. The use of rubber boats has been reported to have become more common, mostly by sub-Saharan Africans. These boats are, in comparison with fishing boats, even more likely to 196 Frontex., 2014., Annual Risk Analysis., p.8. Frontex., 2014., Annual Risk Analysis., p.30. 198 Frontex., 2014., Annual Risk Analysis., p.8. 199 Frontex., 2014., Annual Risk Analysis., p.30. 200 Frontex., 2014., Annual Risk Analysis., p.34. 201 Frontex., 2014., Annual Risk Analysis., p.32. 197 Page 58 of 66 SUNNY D1.4: Surveillance societal and ethical aspects capsize. However, since they are the cheapest sailing option, they are often preferred. This tendency requires search and rescue operations to be carried out even closer to the Libyan coast 202. In 2014, estimates say that more than 40.000 people have reached Italian shores, which is more than the number of immigrants who arrived in Italy by boat in the entire 2013 203. The Italian authorities have saved more than 50.000 people at sea, and the number is in fact expected to surpass the record from 2011 when approximately 62.000 people arrived in Italy 204. That estimate has taken into account that approximately 600.000 migrants are in transit in Libya, waiting to depart. The summer months are heavily trafficked and between the 5th and 9th of June some 4.500 people were picked up by the Italian navy. Somewhere around 2.000 migrants have reached Malta since the start of the year 205. Eastern Mediterranean There were 24.800 detections in the Eastern Mediterranean in 2013, that being the lowest level of detections since 2009. It was nonetheless ranked second, of all the various routes in the EU, as far as detections go 206. The peak was reached in 2011, when 57.025 detections were made. Most detection of irregular migrants was made in the Eastern Aegean Sea, followed by the land border between Bulgaria and Turkey 207. The decrease is probably owed to strengthened surveillance on the Greek side, the erection of a fence along the 12-km land connection with Turkey, the deployment of border patrols along the river Evros and change to internal policy related to asylum and returns 208. Frontex also carried out Joint Operations Poseidon Sea and Land in the region to stem irregular migration near Greece 209. Syrians represented more than half of all detections on the route (12.727 – 51%). They were mostly intercepted on the border between Bulgaria and Turkey, but were also the nationality that was intercepted the most on the border between Greece and Turkey. In most cases, they travelled in family groups. In Bulgaria they often applied for asylum, while in Greece this was less common, probably due to the conditions asylum seekers live in in Greece. Afghans ranked second (6.129), mostly detected in the Eastern Aegean Sea. The detections of Afghans have declined since 2011 however (19.618). The decline was also applicable to Africans from 8.479 in 2012 to 3.460 in 2013 210. In the Aegean Sea, most migrants targeted the islands of Lesvos and Samos. Most of the migrants (70%) were detected on the islands after their crossing. Afghans and Syrians were the most detected nationalities 211. 202 Frontex., 2014., Annual Risk Analysis., p.34. Time Magazine., 2014., Boat Migrants Risk Everything for a New Life in Europe. 204 Reuters., 2014., EU should share out refugees rescued at sea: UNHCR. 205 The Guardian., 2014., Thousands of migrants cross Mediterranean in effort to reach Europe. 206 Frontex., 2014., Annual Risk Analysis., p.8. 207 Frontex., 2014., Annual Risk Analysis., p.8. 208 Frontex., 2014., Annual Risk Analysis., p.32. 209 Frontex., 2014., Annual Risk Analysis., p.35. 210 Frontex., 2014., Annual Risk Analysis., p.35. 211 Frontex., 2014., Annual Risk Analysis., p.37. 203 Page 59 of 66 SUNNY D1.4: Surveillance societal and ethical aspects The Western Balkan The Western Balkan route saw 19.500 detections in 2013, rising from the 6.400 detections made the previous year. The land border between Hungary and Serbia was heavily transited. Many of the detected migrants applied for asylum and subsequently absconded to continue their journey to other Member States, according to Frontex 212. Kosovo was the most detected nationality, representing 32% of all the detections on this route. Media campaigns in Kosovo and return flights from Hungary to Pristina started to create a decline in detection rates towards the end of 2013. Among other common nationalities Frontex registered Pakistanis and Afghans. African and Asian migrants were often detected on the border between Hungary and Serbia, after originally having crossed the external border on the Eastern Mediterranean route and then transited through the Western Balkans via Greece and the Former Yugoslav Republic of Macedonia, and increasingly via the Bulgarian-Serbian border. It is worth noting that Croatia’s accession to the EU on the 1st of July 2013 did not affect the movement of migrants along the Western Balkan 213. Albania and Greek border Circular migration between Albania and Greece increased substantially (59%) to total 8.729 detections. In 2009 and 2010 however, the number of detections reached 40.250 and 35.297 respectively 214. The Western Mediterranean The Western Mediterranean area experienced 6.800 detections, while 300 were made in on the Western African route. These were stable and comparable numbers to the year before 215. There are several areas on this route; especially important are those close to the southern Spanish coast and the border areas of Ceuta and Melilla. Nearly two-thirds of the detections in 2013 were reported at the land borders of Ceuta and Melilla. Frontex consider this to be due to the effective prevention of sea departures by the Moroccan authorities. The Joint Operation Indalo has probably also reinforced this effect. Furthermore, Frontex warned of the potential risk of larger groups crossing the borders of Ceuta and Melilla 216, a prediction which came true in the summer of 2014 when more than 1.000 migrants stormed a razor-wire fence at Melilla 217. The detections made by Spanish authorities are often of unknown nationalities, but they are normally assumed to be sub-Saharan Africans in most cases. These migrants are often reluctant to cooperate with the authorities 218. 212 Frontex., 2014., Annual Risk Analysis., p.8. Frontex., 2014., Annual Risk Analysis., p.38. 214 Frontex., 2014., Annual Risk Analysis., p.32. 215 Frontex., 2014., Annual Risk Analysis., p.8. 216 Frontex., 2014., Annual Risk Analysis., p.39. 217 The Guardian., 2014., Europe faces 'colossal humanitarian catastrophe' of refugees dying at sea. 218 Frontex., 2014., Annual Risk Analysis., p.39. 213 Page 60 of 66 SUNNY D1.4: Surveillance societal and ethical aspects Black Sea According to Frontex, detections of irregular migrants along the Black sea are extremely rare. However, in 2013 Bulgaria and Romania reported incidents of where Syrians and Afghans were detected. These incidents were nonetheless considered isolated cases which could be a response to increased surveillance on the Eastern Mediterranean route and the increasing number of migrants in transit waiting to get to the EU from Turkey 219. 219 Frontex., 2014., Annual Risk Analysis., p.40. Page 61 of 66 SUNNY D1.4: Surveillance societal and ethical aspects Asylum applications In 2013 a total of 1.1 million people submitted an asylum application worldwide, and most of them in developing countries. This is just a small proportion compared to the total of over 50 million refugees worldwide. Germany was the largest single recipient of asylum applications in the world220. Data provided by Frontex suggest that applications increased by 28%, totalling 353.991 asylum applications in the EU (up from 276.308 the previous year). Naturally, the most common nationality among applicants was Syrian (50.096). Almost two-thirds of all Syrian applications in the EU were made in Sweden, Germany and Bulgaria 221. Russians (often in Poland and Germany), Afghans and nationals from the Western Balkans (often in Hungary) represented the majority of the nationalities that applied for asylum in the EU 222. Facilitators The detection of facilitators actually decreased from 2012 to 2013 by 11%. A total of 6.900 detections of facilitators were made in Frontex considers this to be due to the shift towards the abuse of legal channels and the use of document fraud to enter the EU. In this way facilitators can operate remotely rather than accompanying the migrants 223. 220 UNHCR., 2014., Global Trends. Frontex., 2014., Annual Risk Analysis., p.8. 222 Frontex., 2014., Annual Risk Analysis., p.49. 223 Frontex., 2014., Annual Risk Analysis., p.8. 221 Page 62 of 66 SUNNY D1.4: Surveillance societal and ethical aspects Cross-border Crime Drug smuggling Cannabis resin had been the most seized drug in Europe for many years according to information Frontex has received. Morocco is the main provider, despite its production capacities being reduced. Afghanistan however is re-emerging. Spain reported the largest detections, having seized amounts that exceeded domestic demand by around 15%. Secondary movement of cannabis to the Netherlands and Belgium in particular has been a common pattern. The smuggling of cannabis across the EU external border has however decreased in later years due to increased domestic production. The tendency has nonetheless differed in parts of southern Europe where Albania has increased supplies to Greece, Italy, Slovenia and Hungary 224. Cocaine is the third most intensively smuggled drug in Europe after cannabis resin and herb. The seizures had increased from the mid-nineties up to 2007, but declined from 2009. Spain accounted for approximately 50% all cocaine seizures between 2001 and 2011. Most of it came from South America (Argentina, Brazil, Chile, Colombia, Ecuador, Mexico, Peru and Venezuela). Some if it was also channelled to Europe through West-Africa (Guinea, Guinea-Bissau, the Gambia and Senegal). Traffickers used aircrafts, speedboats, maritime vessels and couriers on commercial flights. Even the Balkan Sea route has been used in later years, where Bulgaria, Greece, Romania and Turkey have made important seizures 225. The seizures and treatment numbers could suggest that the heroin use in Europe has been decreasing for the last decade. The smuggling of heroin has nonetheless kept using traditional routes. Most of it is produced in Afghanistan and to a lesser extent in Iran and Pakistan. It is mostly transported either through the Balkan route (through Turkey) or the Northern route (through Central Asia and the Russian Federation) 226. Seizures in Turkey increased three to four times between 2001 and 2009, representing a contrasting trend to the rest of Europe. From here the heroin tends to be smuggled in through the land borders of Greece or Bulgaria 227. Trafficking in Human Beings Victims of human trafficking are often not aware of their destiny when they are smuggled and/or intercepted by border guards, for which they represent a very difficult challenge for the authorities. The number of identified victims registered has increased from 3.691 in 2008 to 5.535 in 2010. Improved reporting could be one reason for the increased identification rates. The identified victims were primarily from Nigeria, China, Paraguay, the Dominican Republic, Colombia, Russia, Brazil, Vietnam, Namibia and Algeria 228. 224 Frontex., 2014., Annual Risk Analysis., p.42. Frontex., 2014., Annual Risk Analysis., p.43. 226 Frontex., 2014., Annual Risk Analysis., p.43. 227 Frontex., 2014., Annual Risk Analysis., p.44. 228 Frontex., 2014., Annual Risk Analysis., p.45. 225 Page 63 of 66 SUNNY D1.4: Surveillance societal and ethical aspects European foreign fighters in Syria Europeans with a jihadist agenda fighting in Syria has significantly increased in 2013 according to information provided to Frontex. Reports show that at the end of 2013, somewhere between approximately 400 to almost 2.000 persons travelled to fight in the Syrian conflict 229. This represents a challenge for border guards. Weapons smuggling The French police discovered a large smuggling ring in December 2013 who smuggled firearms and ammunition through the Western Balkans. There have also been large discoveries in Greece. Frontex have also been warned by UNODOC that the instability in Northern Africa and the Middle East might fuel the weapons smuggling 230. 229 230 Frontex., 2014., Annual Risk Analysis., p.45. Frontex., 2014., Annual Risk Analysis., p.46. Page 64 of 66 SUNNY D1.4: Surveillance societal and ethical aspects Outlook Frontex considers it likely that irregular migration to the EU will continue in large numbers. More migrants will require search and rescue operations and international protection. Secondary movement of migrants within the EU is also expected according to the Agency 231. The Agency predicts that the Mediterranean will continue to be the main crossing point for migrants. It also recognizes that there will be an increased demand on authorities to engage in search and rescue operations in large geographic areas, in particular in the Mediterranean Sea. Sub-Saharan Africans departing from Libya is not expected to decrease 232. Egypt and Tunisia could also become potential hot-spots for departures of migrants. Furthermore, it expects to see an even larger number of people seeking international protection at the external borders. As long as the Syrian civil war continues unresolved the number of Syrians seeking refuge will continue 233. It is worth to note that UNHCR, in its new Global Trends report, states that the number of refugees worldwide at the end of 2013 exceeded 50 million people for the first time since WWII. The number grew by 6 million from the previous year, which is mainly due to the war in Syria, but also due to armed conflicts in countries such as the Central African Republic and South Sudan. No European country is among those countries hosting the largest numbers of refugees either, as it is a problem which in its majority is absorbed by other developing countries. Pakistan, Iran and Lebanon are the countries that host the largest number of refugees. 3.5 million People are seeking refuge in Asia and the Pacific, thereby constituting the regions with the most refugees in the world 234. The borders with Turkey are also expected to see a large number of irregular border crossings. On the Southern Mediterranean route, surveillance has been enhanced along the Greek land border with Turkey. This has led to displacement to the Eastern Aegean Sea and the Bulgarian land border with Turkey. This will require larger and better reception facilities and increased allocation of resources for search and rescue operations 235. It is possible that organised crime groups could get increasingly involved in the facilitation and smuggling of migrants and trafficking in human beings across the external borders of the EU. There are still however great uncertainties about the level of organization and structure of the smugglers. Many are opportunistic groups with a low level of organization. Little is known about the potential connection between smugglers and traffickers as well 236. 231 Frontex., 2014., Annual Risk Analysis., p.9. Frontex., 2014., Annual Risk Analysis., p.63. 233 Frontex., 2014., Annual Risk Analysis., p.63. 234 UNHCR., 2014., Global Trends. 235 Frontex., 2014., Annual Risk Analysis., p.63. 236 Frontex., 2014., Annual Risk Analysis., p.66. 232 Page 65 of 66 SUNNY D1.4: Surveillance societal and ethical aspects In the end, cross-border movement on the external borders of the EU will to a large extent be dependent on external social, political and economic factors in third countries. The Arab spring created an unexpected influx of migrants, but also debilitated border control in third countries such as Tunisia, Libya and Egypt. The influx of Afghans and Iraqis in previous years was more predictable due to the U.S. invasion. It is however difficult to predict what will happen on the external borders of the EU. Tunisia are trying to implement a democracy, but it is however unstable. Libya is struggling to create a State apparatus but is not advancing quickly, quite on the contrary. It seems to be a failed State. That is unfortunately likely to remain the same for another few years. Migrants from sub-Saharan Africa will therefore probably continue to travel through Libya in order to migrate to Europe. Egypt has suffered two coup d’états and has recently held elections of dubious standards where a former military general has been elected president. That election followed by systematic human rights abuses will continue to fuel instability in Egypt. The wars in Iraq and Syria have morphed into each other, creating a very unpredictable environment that will most likely force a lot of people to flee their homes. It will perhaps also create a void that can be exploited by criminal and terrorist groups. These conflicts are already having a spill-over effect that must be considered. There can also be many situations further away from the EU’s external borders that will affect the cross-border movement. Page 66 of 66