Report on Surveillance Technology and Privacy Enhancing Design
Total Page:16
File Type:pdf, Size:1020Kb
”Surveillance, Privacy and Security: A large scale participatory assessment of criteria and factors determining acceptability and acceptance of security technologies in Europe” Project acronym: SurPRISE Collaborative Project Grant Agreement No.: 285492 FP7 Call Topic: SEC-2011.6.5-2: The Relationship Between Human Privacy And Security Start of project: February 2012 Duration: 36 Months D 3.1 – Report on surveillance technology and privacy enhancing design Lead Beneficiary: ULD Author(s): Eva Schlehahn (ULD), Marit Hansen (ULD), Jaro Sterbik-Lamina (ITA/OEAW, for chapter 2.2.3, Smart Meter Surveillance), Javier Sempere Samaniego (formerly APDCM, for chapter 2.3.2, Body scanners) Due Date: January 2013 Submission Date: June 2013 Dissemination Level: Public Version: 1 This document was developed by the SurPRISE project (http://www.surprise-project.eu), co-funded within the Seventh Framework Program (FP7). SurPRISE re-examines the relationship between security and privacy. SurPRISE will provide new insights into the relation between surveillance, privacy and security, taking into account the European citizens’ perspective as a central element. It will also explore options for less privacy infringing security technologies and for non-surveillance oriented security solutions, aiming at better informed debates of security policies. The SurPRISE project is conducted by a consortium consisting of the following partners: Institut für Technikfolgen-Abschätzung / ITA/OEAW Oesterreichische Akademie der Wissenschaften Coordinator, Austria Agencia de Protección de Datos de la Comunidad de APDCM Madrid*, Spain Instituto de Politicas y Bienes Publicos/ CSIC Agencia Estatal Consejo Superior de Investigaciones Científicas, Spain Teknologirådet - DBT The Danish Board of Technology Foundation, Denmark European University Institute, Italy EUI Verein für Rechts-und Kriminalsoziologie, Austria IRKS Median Opinion and Market Research Limited Company, Median Hungary Teknologirådet - NBT The Norwegian Board of Technology, Norway The Open University, United Kingdom OU TA-SWISS / TA-SWISS Akademien der Wissenschaften Schweiz, Switzerland Unabhängiges Landeszentrum für Datenschutz, ULD Germany This document may be freely used and distributed, provided that the document itself is not modified or shortened, that full authorship credit is given, and that these terms of use are not removed but included with every copy. The SurPRISE partners shall all take no liability for the completeness, correctness or fitness for use. This document may be subject to updates, amendments and additions by the SurPRISE consortium. Please, address questions and comments to: [email protected] *APDCM, the Agencia de Protección de Datos de la Comunidad de Madrid (Data Protection Agency of the Community of Madrid) participated as consortium partner in the SurPRISE project till 31st of December 2012. As a consequence of austerity policies in Spain APDCM was terminated at the end of 2012. Table of Contents List of Abbreviations .................................................................................................................................................................... ii Executive Summary ..................................................................................................................................................................... iv Objectives ..................................................................................................................................................................................... viii 1 Methodology and concepts ............................................................................................................................................... 1 2 Surveillance technologies ................................................................................................................................................... 4 2.1 Public space surveillance ............................................................................................................................................. 4 2.1.1 Smart CCTV ................................................................................................................................................................. 5 2.1.2 Drones ........................................................................................................................................................................ 14 2.2 Network & targeted device surveillance ............................................................................................................... 25 2.2.1 Deep Packet Inspection for Internet surveillance ....................................................................................... 25 2.2.2 Content surveillance on targeted devices ..................................................................................................... 33 2.2.3 Smart meter surveillance ..................................................................................................................................... 40 2.2.4 Location tracking .................................................................................................................................................... 45 2.3 Biometrics & body scanners ...................................................................................................................................... 52 2.3.1 Facial recognition ................................................................................................................................................... 53 2.3.2 Body scanners .......................................................................................................................................................... 62 2.4 Data matching, linkage & analysis ........................................................................................................................... 67 3 Observations & conclusions ............................................................................................................................................ 70 4 Bibliography .......................................................................................................................................................................... 71 List of Figures ............................................................................................................................................................................... 88 List of Tables ................................................................................................................................................................................ 89 Report on surveillance technology and privacy enhancing design i List of Abbreviations Abbreviation Meaning 2D Two-dimensional 2G Second generation 3D Three-dimensional 3G Third generation 4D Four-dimensional API Advanced Passenger Information System ATM Automated Teller Machine AuC Authentication Centre C/A Coarse Acquisition CCC Chaos Computer Club CCTV Closed Circuit Television CORS Continuously Operating Reference Stations DDOS Distributed Denial-of-Service DNA Deoxyribonucleic Acid DNS Domain Name System DPI Deep Packet Inspection DSO Distribution Service Operator DSS Digital Slow Shuttering DVR Digital Video Recorder EIR Equipment Identity Register esa European Space Agency ETSI European Telecommunications Standards Institute EU European Union FAA Federal Aviation Administration (of the United States of America) GPRS General Packet Radio Service GPS Global Positioning System GSM Global System for Mobile Communications HLR Home Location Register HTTP Hypertext Transfer Protocol ID Identifier, Identification Number IdM Identity Management IMEI International Mobile Equipment Identity IMSI International Mobile Subscriber Identity IP Internet Protocol IR Infrared ISCORS Interagency Steering Committee on Radiation Standards ISP Internet Service Provider LAN Local Area Network LBS Location-Based Service MSC Mobile Switching Centre ii Report on surveillance technology and privacy enhancing design NALM Nonintrusive Appliance Load Monitoring NGO Non-Governmental Organisation NPO Non-Profit Organisation NTRIP Networked Transport of RTCM via Internet Protocol NTSC National Television System Committee OSI Open Systems Interconnection PAL Phase Alternating Line PbD Privacy by Design PC Personal Computer PET Privacy-Enhancing Technology PNR Passenger Name Record POS Point of Sale PRN Pseudo-Random Number PTZ Pan-Tilt-Zoom RF Radio Frequency RPAS Remotely Piloted Aircraft System RTCM Radio Technical Commission for Maritime Services SbD Security by Design SIM Subscriber Identification Module SMS Short Message Service SOSS Surveillance-Oriented Security Solutions SOST Surveillance-Oriented Security Technologies SPI Shallow Packet Inspection SQL Structured Query Language SVGA Super Video Graphics Array SXGA Super Extended Graphics Array TCP Transmission Control Protocol TSMI Temporary Mobile Subscriber Identity UAS Unmanned Aerial System UAV Unmanned Aerial Vehicle UDP User Datagram Protocol UK United Kingdom UMTS Universal Mobile Telecommunications System URL Uniform Resource Locator U.S. United States of America VGA Video Graphics Array VLR Visitor Location Register VM Virtual Machine VoIP Voice over IP VPN Virtual Private Network WAAS Wide Area Augmentation System WLAN Wireless Local Area Network XML Extensible Markup Language Report on surveillance technology and privacy enhancing design iii Executive Summary Executive Summary This deliverable