SlideShare une entreprise Scribd logo
1  sur  17
Télécharger pour lire hors ligne
Surveillance of communication
by the National Defence Radio
Establishment (FRA)



  Mark Klamberg, doctoral candidate

                                      1
Summary of the legislation
adopted 18 June 2008:

IT- and telecom operators are obligated to transfer all
communication in cables crossing Swedish borders to
nodes controlled by the State

The Defence Radio Establishment will intercept
communication and collect data at the nodes (signal
intelligence)

                                                      2
Similar organizations, laws
and programs
USA
Organization:        National Security Agency (NSA)
Legislation:         FISA
Programmes:          “Echelon”,”Trailblazer”, “Stellar Wind”

United Kingdom
Organization:        Government Communications Headquarters
                     (GCHQ)
Legislation:         RIPA
Programmes:          “Echelon”, “Mastering the Internet”,
                     “Interception Modernisation Programme”
Case:                Liberty et al. v. The United Kingdom

N.B. The names of the abovementioned programmes have not all
                                                                3
been officially disclosed but rather through leaks to the media
Similar organizations,
laws and programs
France
Organization:   Direction Générale de la Sécurité Extérieure
                (DGSE)

Germany
Organization:   Bundesnachrichtendienst (BND)
Legislation:    G 10-law (Gesetz zur Beschränkung des
                Brief-, Post- und Fernmeldegeheimnisses)
Case:           Weber and Saravia v. Germany

Denmark
Organization:   Forsvarets Efterretningstjeneste (FE)
Legislation:    17 § forsvarsloven                         4
Why is there a debate now?
Technological change
Until the end of the 1990s satellites were the main
medium for international communication. Now it is
fiber optics in cables controlled by private companies.

Shift in Threats Relevant for National Security
The perceived threat from the Soviet Union has been replaced
with vague threats such as terrorism, international criminality,
migration, environmental threats and financial imbalances

New Legal Demands
The European Convention on Human Rights was incorporated in
Swedish Law 1994, which requires that interferences in the private
life and family has a legal basis (article 8)

Privatization
Telecom operators were previously state-owned and controlled.
Now they are private companies whose priority is to safeguard 5the
interests of their customers, not the interests of the state
Why new legislation?
Considering the changes in the 1990s:

The technological change and privatization creates a need to
adopt legislation or other binding measures that obligates the
private operators to surrender communication to the State. This
makes the existence of previously top secret surveillance public
knowledge

The shift in perceived threats creates a need to expand the
mandate or codify an already expanded mandate of signal
intelligence organizations

The public knowledge about this surveillance and new legal
demands creates a need for legislation protecting privacy     6
Key Features of the Swedish law
and the operations of the
Defence Radio Establishment

1. Mandate for Surveillance by the Defence Radio Establishment

2. Clients

3. Review Mechanisms

4. Method – what is signal intelligence?
   • Traffic analysis and social network analysis

5. Scope of Surveillance                                  7
1. Mandate of the Defence
    Radio Establishment
Mandate to monitor

1. external military threats,
2. factors relevant for peacekeeping operations,
3. international terrorism and international organized crime
4. the development and proliferation of weapons of mass destruction and
    arms control,
5. external threats against infrastructure (for example information and
    communication technology)
6. conflicts outside of Sweden that effect international peace and security and
7. international phenomena relevant for Swedish foreign-, security-, and
    defence policy (Government and diplomatic correspondence?)

                                                                            8
2. Clients (known)

1.   The Government
2.   The Government office
3.   The Defence Forces
4.   The Police, including the Security Service (SÄPO)
5.   National Inspectorate of Strategic Products
6.   Swedish Customs Service                                May be excluded
7.   Defence Materiel Administration Agency                 in Autumn 2009
8.   Defence Research Agency
9.   Civil Contingencies Agency

International Partners exist but unknown which those are.
Could include NSA, GCHQ, BND, DGSE and FE
                                                                                9

                                                               12 August 2009
3. Review Mechanisms
1. Defence Intelligence Court
    • Reviews applications for surveillance missions in advance
    • Professional judge and politically appointed lay-members
        representing the majority and the opposition in Parliament
2. Defence Intelligence Committee
    • Reviews, inter alia, the integrity and use of the databases held by
        the Defence Radio Establishment
    • Composed of a legal professional and politically appointed lay-members
        representing the majority and the opposition in Parliament
    • Reports to the Government
3. Internal oversight board inside the Defence Radio Establishment
4. Ombudsman who report cases of misuse to the Parliamentary Ombudsman
   (JO) or the Chancellor of Justice (JK), (proposal)
5. Extraordinary review to be presented 2011 by the Data Protection
    Authority and a parliamentary committee
                                                                       10
4. Method – what is
   signal intelligence?
Information life cycle

1. Interception of messages and communications data (meta data)

2. Processing
    1. Traffic analysis of communications data (who is communicating with who)

    2. Cryptanalysis

    3. Analysis of the content of messages

3. Analysis with the use of other sources, for example Open Source Intelligence
   (OSINT)
                                                                         11
4. Report to client
4.1 Traffic analysis and social
network analysis
We humans leave electronic footprints after us, in the form of
credit card payments, visits to websites, records of phone calls
and e-mail (communication data). Imagine that somebody could
collect everything and process it through a powerful computer.
With the right tools one could find patterns that in detail describe
what groups and networks you belong to. Such techniques are
referred to as traffic analysis and social network analysis




                                                                12
5. Scope of Surveillance
1. Fairly small amounts of messages are intercepted and processed
    Example from Germany, judgement of the First Senate of 14 July 1999, para. 89 :

    The capacity of the Federal Intelligence Service (BND) permits the screening
    of approximately 15,000 acts of telecommunication per day out of a total of
    approximately 8 million telecommunications contacts between Germany
    and foreign countries. The material and personal resources of the Federal
    Intelligence Service, however, are not sufficient to evaluate all contacts.

    Approximately 700 fall under the area of application of the G 10 Act. Only
    these acts are selected with the help of the search concepts.

    About 70 of them are examined more closely by employees of the Federal
    Intelligence Service.

2. Communications data (meta data) relating to all or large amounts of commun-
    ication is stored by the Defence Radio Establishment in a database (Titan)
    Example from the USA: The NSA Call database contains 1,9 trillion records which
                                                                               13
    include the records of tens of millions of Americans
A critical remark

Is this kind of data collection and surveillance…

• Consistent with the right to privacy? This is both a
human right and a constitutional right.

• Efficient?

• Proportional?

• Confident and reliable in the sense that it provide
accurate intelligence and not false alarms?
                                                         14
Further reading

Protecting Individual Privacy in the Struggle
Against Terrorists: A Framework for Program
Assessment
National Research Council, Washington D.C.,
National Academy of Sciences, 2008

FRA:s signalspaning ur ett rättsligt perspektiv
Mark Klamberg, Svensk Juristtidning 2009/04 p. 519

The Shadow Factory: The Ultra-Secret NSA from
9/11 to the Eavesdropping on America
James Bamford, 2008
                                                     15
Questions?




             16
Thanks!




Contact:
mark.klamberg@juridicum.su.se
+46 8 16 11 90
                                17

Contenu connexe

En vedette

Field Lesson 6th Grade
Field Lesson 6th GradeField Lesson 6th Grade
Field Lesson 6th Gradempena2015
 
Social media and lawyers
Social media and lawyersSocial media and lawyers
Social media and lawyersKlamberg
 
Field Lesson 6th Grade
Field Lesson 6th GradeField Lesson 6th Grade
Field Lesson 6th Gradempena2015
 
Electronic Surveillance of Communications 100225
Electronic Surveillance of Communications 100225Electronic Surveillance of Communications 100225
Electronic Surveillance of Communications 100225Klamberg
 
PETE&C 2011 morriston reading technology
PETE&C 2011 morriston reading technologyPETE&C 2011 morriston reading technology
PETE&C 2011 morriston reading technologymorristont
 
milieuproblematiek
milieuproblematiekmilieuproblematiek
milieuproblematiekkrikke90
 

En vedette (7)

Field Lesson 6th Grade
Field Lesson 6th GradeField Lesson 6th Grade
Field Lesson 6th Grade
 
Social media and lawyers
Social media and lawyersSocial media and lawyers
Social media and lawyers
 
Field Lesson 6th Grade
Field Lesson 6th GradeField Lesson 6th Grade
Field Lesson 6th Grade
 
Electronic Surveillance of Communications 100225
Electronic Surveillance of Communications 100225Electronic Surveillance of Communications 100225
Electronic Surveillance of Communications 100225
 
PETE&C 2011 morriston reading technology
PETE&C 2011 morriston reading technologyPETE&C 2011 morriston reading technology
PETE&C 2011 morriston reading technology
 
milieuproblematiek
milieuproblematiekmilieuproblematiek
milieuproblematiek
 
Bit Rememberance
Bit RememberanceBit Rememberance
Bit Rememberance
 

Similaire à Surveillance of communication by the National Defence Radio Establishment (FRA)

Electronic Surveillance Of Communications 100225
Electronic Surveillance Of Communications 100225Electronic Surveillance Of Communications 100225
Electronic Surveillance Of Communications 100225Klamberg
 
Electronic surveillance and privacy 130916
Electronic surveillance and privacy 130916Electronic surveillance and privacy 130916
Electronic surveillance and privacy 130916Klamberg
 
Cyber crime legislation part 1
Cyber crime legislation part 1Cyber crime legislation part 1
Cyber crime legislation part 1MohsinMughal28
 
A question of trust - uk spying review
A question of trust  - uk spying reviewA question of trust  - uk spying review
A question of trust - uk spying reviewRepentSinner
 
International Cybercrime (Part 1)
International Cybercrime (Part 1)International Cybercrime (Part 1)
International Cybercrime (Part 1)GrittyCC
 
Monitoring and controlling the Internet
Monitoring and controlling the InternetMonitoring and controlling the Internet
Monitoring and controlling the Internetblogzilla
 
Raduenzel - INTL621 Assignment 2
Raduenzel - INTL621 Assignment 2Raduenzel - INTL621 Assignment 2
Raduenzel - INTL621 Assignment 2Mark Raduenzel
 
Alex Haw Lecture - 090130 - Edinburgh School of Architecture - Vigilant Urban...
Alex Haw Lecture - 090130 - Edinburgh School of Architecture - Vigilant Urban...Alex Haw Lecture - 090130 - Edinburgh School of Architecture - Vigilant Urban...
Alex Haw Lecture - 090130 - Edinburgh School of Architecture - Vigilant Urban...Atmos
 
Alex Haw Lecture - 081101 - Kiss: Castlefield Gallery, Manchester - Surveying...
Alex Haw Lecture - 081101 - Kiss: Castlefield Gallery, Manchester - Surveying...Alex Haw Lecture - 081101 - Kiss: Castlefield Gallery, Manchester - Surveying...
Alex Haw Lecture - 081101 - Kiss: Castlefield Gallery, Manchester - Surveying...Atmos
 
tftp_brochure_05062014
tftp_brochure_05062014tftp_brochure_05062014
tftp_brochure_05062014A O
 
Presentation_on_protection_of_reporting_persons_UNCAC_LP.ppt
Presentation_on_protection_of_reporting_persons_UNCAC_LP.pptPresentation_on_protection_of_reporting_persons_UNCAC_LP.ppt
Presentation_on_protection_of_reporting_persons_UNCAC_LP.pptFranciscoJoaoVitug
 
DRAFT 2 - The Internet has effectively rendered privacy as a thing of the past
DRAFT 2 - The Internet has effectively rendered privacy as a thing of the pastDRAFT 2 - The Internet has effectively rendered privacy as a thing of the past
DRAFT 2 - The Internet has effectively rendered privacy as a thing of the pastMichael Owen
 
Encryption & interception of communication
Encryption & interception of communicationEncryption & interception of communication
Encryption & interception of communicationUc Man
 
Encryption & interception of communication
Encryption & interception of communicationEncryption & interception of communication
Encryption & interception of communicationUc Man
 
Dataistheborder
DataistheborderDataistheborder
Dataistheborderburmaball
 
TSCM Overview for Stakeholders
TSCM Overview for StakeholdersTSCM Overview for Stakeholders
TSCM Overview for Stakeholderskevinwetzel
 
Police surveillance of social media - do you have a reasonable expectation of...
Police surveillance of social media - do you have a reasonable expectation of...Police surveillance of social media - do you have a reasonable expectation of...
Police surveillance of social media - do you have a reasonable expectation of...Lilian Edwards
 

Similaire à Surveillance of communication by the National Defence Radio Establishment (FRA) (20)

Electronic Surveillance Of Communications 100225
Electronic Surveillance Of Communications 100225Electronic Surveillance Of Communications 100225
Electronic Surveillance Of Communications 100225
 
Electronic surveillance and privacy 130916
Electronic surveillance and privacy 130916Electronic surveillance and privacy 130916
Electronic surveillance and privacy 130916
 
Cyber crime legislation part 1
Cyber crime legislation part 1Cyber crime legislation part 1
Cyber crime legislation part 1
 
A question of trust - uk spying review
A question of trust  - uk spying reviewA question of trust  - uk spying review
A question of trust - uk spying review
 
International Cybercrime (Part 1)
International Cybercrime (Part 1)International Cybercrime (Part 1)
International Cybercrime (Part 1)
 
Monitoring and controlling the Internet
Monitoring and controlling the InternetMonitoring and controlling the Internet
Monitoring and controlling the Internet
 
Un may 28, 2019
Un may 28, 2019Un may 28, 2019
Un may 28, 2019
 
Raduenzel - INTL621 Assignment 2
Raduenzel - INTL621 Assignment 2Raduenzel - INTL621 Assignment 2
Raduenzel - INTL621 Assignment 2
 
Alex Haw Lecture - 090130 - Edinburgh School of Architecture - Vigilant Urban...
Alex Haw Lecture - 090130 - Edinburgh School of Architecture - Vigilant Urban...Alex Haw Lecture - 090130 - Edinburgh School of Architecture - Vigilant Urban...
Alex Haw Lecture - 090130 - Edinburgh School of Architecture - Vigilant Urban...
 
NS Civil Liberties & Security Supplement Sept 2014
NS Civil Liberties & Security Supplement Sept 2014NS Civil Liberties & Security Supplement Sept 2014
NS Civil Liberties & Security Supplement Sept 2014
 
Alex Haw Lecture - 081101 - Kiss: Castlefield Gallery, Manchester - Surveying...
Alex Haw Lecture - 081101 - Kiss: Castlefield Gallery, Manchester - Surveying...Alex Haw Lecture - 081101 - Kiss: Castlefield Gallery, Manchester - Surveying...
Alex Haw Lecture - 081101 - Kiss: Castlefield Gallery, Manchester - Surveying...
 
tftp_brochure_05062014
tftp_brochure_05062014tftp_brochure_05062014
tftp_brochure_05062014
 
Presentation_on_protection_of_reporting_persons_UNCAC_LP.ppt
Presentation_on_protection_of_reporting_persons_UNCAC_LP.pptPresentation_on_protection_of_reporting_persons_UNCAC_LP.ppt
Presentation_on_protection_of_reporting_persons_UNCAC_LP.ppt
 
DRAFT 2 - The Internet has effectively rendered privacy as a thing of the past
DRAFT 2 - The Internet has effectively rendered privacy as a thing of the pastDRAFT 2 - The Internet has effectively rendered privacy as a thing of the past
DRAFT 2 - The Internet has effectively rendered privacy as a thing of the past
 
Encryption & interception of communication
Encryption & interception of communicationEncryption & interception of communication
Encryption & interception of communication
 
Encryption & interception of communication
Encryption & interception of communicationEncryption & interception of communication
Encryption & interception of communication
 
Dataistheborder
DataistheborderDataistheborder
Dataistheborder
 
TSCM Overview for Stakeholders
TSCM Overview for StakeholdersTSCM Overview for Stakeholders
TSCM Overview for Stakeholders
 
Police surveillance of social media - do you have a reasonable expectation of...
Police surveillance of social media - do you have a reasonable expectation of...Police surveillance of social media - do you have a reasonable expectation of...
Police surveillance of social media - do you have a reasonable expectation of...
 
Governing Communications Online - German Perspective
Governing Communications Online - German PerspectiveGoverning Communications Online - German Perspective
Governing Communications Online - German Perspective
 

Dernier

Power in International Relations (Pol 5)
Power in International Relations (Pol 5)Power in International Relations (Pol 5)
Power in International Relations (Pol 5)ssuser583c35
 
16042024_First India Newspaper Jaipur.pdf
16042024_First India Newspaper Jaipur.pdf16042024_First India Newspaper Jaipur.pdf
16042024_First India Newspaper Jaipur.pdfFIRST INDIA
 
11042024_First India Newspaper Jaipur.pdf
11042024_First India Newspaper Jaipur.pdf11042024_First India Newspaper Jaipur.pdf
11042024_First India Newspaper Jaipur.pdfFIRST INDIA
 
Geostrategic significance of South Asian countries.ppt
Geostrategic significance of South Asian countries.pptGeostrategic significance of South Asian countries.ppt
Geostrategic significance of South Asian countries.pptUsmanKaran
 
13042024_First India Newspaper Jaipur.pdf
13042024_First India Newspaper Jaipur.pdf13042024_First India Newspaper Jaipur.pdf
13042024_First India Newspaper Jaipur.pdfFIRST INDIA
 
Mitochondrial Fusion Vital for Adult Brain Function and Disease Understanding...
Mitochondrial Fusion Vital for Adult Brain Function and Disease Understanding...Mitochondrial Fusion Vital for Adult Brain Function and Disease Understanding...
Mitochondrial Fusion Vital for Adult Brain Function and Disease Understanding...The Lifesciences Magazine
 
Political-Ideologies-and-The-Movements.pptx
Political-Ideologies-and-The-Movements.pptxPolitical-Ideologies-and-The-Movements.pptx
Political-Ideologies-and-The-Movements.pptxSasikiranMarri
 
Emerging issues in migration policies.ppt
Emerging issues in migration policies.pptEmerging issues in migration policies.ppt
Emerging issues in migration policies.pptNandinituteja1
 
15042024_First India Newspaper Jaipur.pdf
15042024_First India Newspaper Jaipur.pdf15042024_First India Newspaper Jaipur.pdf
15042024_First India Newspaper Jaipur.pdfFIRST INDIA
 
lok sabha Elections in india- 2024 .pptx
lok sabha Elections in india- 2024 .pptxlok sabha Elections in india- 2024 .pptx
lok sabha Elections in india- 2024 .pptxdigiyvbmrkt
 
12042024_First India Newspaper Jaipur.pdf
12042024_First India Newspaper Jaipur.pdf12042024_First India Newspaper Jaipur.pdf
12042024_First India Newspaper Jaipur.pdfFIRST INDIA
 

Dernier (12)

Power in International Relations (Pol 5)
Power in International Relations (Pol 5)Power in International Relations (Pol 5)
Power in International Relations (Pol 5)
 
16042024_First India Newspaper Jaipur.pdf
16042024_First India Newspaper Jaipur.pdf16042024_First India Newspaper Jaipur.pdf
16042024_First India Newspaper Jaipur.pdf
 
11042024_First India Newspaper Jaipur.pdf
11042024_First India Newspaper Jaipur.pdf11042024_First India Newspaper Jaipur.pdf
11042024_First India Newspaper Jaipur.pdf
 
Geostrategic significance of South Asian countries.ppt
Geostrategic significance of South Asian countries.pptGeostrategic significance of South Asian countries.ppt
Geostrategic significance of South Asian countries.ppt
 
13042024_First India Newspaper Jaipur.pdf
13042024_First India Newspaper Jaipur.pdf13042024_First India Newspaper Jaipur.pdf
13042024_First India Newspaper Jaipur.pdf
 
Mitochondrial Fusion Vital for Adult Brain Function and Disease Understanding...
Mitochondrial Fusion Vital for Adult Brain Function and Disease Understanding...Mitochondrial Fusion Vital for Adult Brain Function and Disease Understanding...
Mitochondrial Fusion Vital for Adult Brain Function and Disease Understanding...
 
Political-Ideologies-and-The-Movements.pptx
Political-Ideologies-and-The-Movements.pptxPolitical-Ideologies-and-The-Movements.pptx
Political-Ideologies-and-The-Movements.pptx
 
Emerging issues in migration policies.ppt
Emerging issues in migration policies.pptEmerging issues in migration policies.ppt
Emerging issues in migration policies.ppt
 
World Economic Forum : The Global Risks Report 2024
World Economic Forum : The Global Risks Report 2024World Economic Forum : The Global Risks Report 2024
World Economic Forum : The Global Risks Report 2024
 
15042024_First India Newspaper Jaipur.pdf
15042024_First India Newspaper Jaipur.pdf15042024_First India Newspaper Jaipur.pdf
15042024_First India Newspaper Jaipur.pdf
 
lok sabha Elections in india- 2024 .pptx
lok sabha Elections in india- 2024 .pptxlok sabha Elections in india- 2024 .pptx
lok sabha Elections in india- 2024 .pptx
 
12042024_First India Newspaper Jaipur.pdf
12042024_First India Newspaper Jaipur.pdf12042024_First India Newspaper Jaipur.pdf
12042024_First India Newspaper Jaipur.pdf
 

Surveillance of communication by the National Defence Radio Establishment (FRA)

  • 1. Surveillance of communication by the National Defence Radio Establishment (FRA) Mark Klamberg, doctoral candidate 1
  • 2. Summary of the legislation adopted 18 June 2008: IT- and telecom operators are obligated to transfer all communication in cables crossing Swedish borders to nodes controlled by the State The Defence Radio Establishment will intercept communication and collect data at the nodes (signal intelligence) 2
  • 3. Similar organizations, laws and programs USA Organization: National Security Agency (NSA) Legislation: FISA Programmes: “Echelon”,”Trailblazer”, “Stellar Wind” United Kingdom Organization: Government Communications Headquarters (GCHQ) Legislation: RIPA Programmes: “Echelon”, “Mastering the Internet”, “Interception Modernisation Programme” Case: Liberty et al. v. The United Kingdom N.B. The names of the abovementioned programmes have not all 3 been officially disclosed but rather through leaks to the media
  • 4. Similar organizations, laws and programs France Organization: Direction Générale de la Sécurité Extérieure (DGSE) Germany Organization: Bundesnachrichtendienst (BND) Legislation: G 10-law (Gesetz zur Beschränkung des Brief-, Post- und Fernmeldegeheimnisses) Case: Weber and Saravia v. Germany Denmark Organization: Forsvarets Efterretningstjeneste (FE) Legislation: 17 § forsvarsloven 4
  • 5. Why is there a debate now? Technological change Until the end of the 1990s satellites were the main medium for international communication. Now it is fiber optics in cables controlled by private companies. Shift in Threats Relevant for National Security The perceived threat from the Soviet Union has been replaced with vague threats such as terrorism, international criminality, migration, environmental threats and financial imbalances New Legal Demands The European Convention on Human Rights was incorporated in Swedish Law 1994, which requires that interferences in the private life and family has a legal basis (article 8) Privatization Telecom operators were previously state-owned and controlled. Now they are private companies whose priority is to safeguard 5the interests of their customers, not the interests of the state
  • 6. Why new legislation? Considering the changes in the 1990s: The technological change and privatization creates a need to adopt legislation or other binding measures that obligates the private operators to surrender communication to the State. This makes the existence of previously top secret surveillance public knowledge The shift in perceived threats creates a need to expand the mandate or codify an already expanded mandate of signal intelligence organizations The public knowledge about this surveillance and new legal demands creates a need for legislation protecting privacy 6
  • 7. Key Features of the Swedish law and the operations of the Defence Radio Establishment 1. Mandate for Surveillance by the Defence Radio Establishment 2. Clients 3. Review Mechanisms 4. Method – what is signal intelligence? • Traffic analysis and social network analysis 5. Scope of Surveillance 7
  • 8. 1. Mandate of the Defence Radio Establishment Mandate to monitor 1. external military threats, 2. factors relevant for peacekeeping operations, 3. international terrorism and international organized crime 4. the development and proliferation of weapons of mass destruction and arms control, 5. external threats against infrastructure (for example information and communication technology) 6. conflicts outside of Sweden that effect international peace and security and 7. international phenomena relevant for Swedish foreign-, security-, and defence policy (Government and diplomatic correspondence?) 8
  • 9. 2. Clients (known) 1. The Government 2. The Government office 3. The Defence Forces 4. The Police, including the Security Service (SÄPO) 5. National Inspectorate of Strategic Products 6. Swedish Customs Service May be excluded 7. Defence Materiel Administration Agency in Autumn 2009 8. Defence Research Agency 9. Civil Contingencies Agency International Partners exist but unknown which those are. Could include NSA, GCHQ, BND, DGSE and FE 9 12 August 2009
  • 10. 3. Review Mechanisms 1. Defence Intelligence Court • Reviews applications for surveillance missions in advance • Professional judge and politically appointed lay-members representing the majority and the opposition in Parliament 2. Defence Intelligence Committee • Reviews, inter alia, the integrity and use of the databases held by the Defence Radio Establishment • Composed of a legal professional and politically appointed lay-members representing the majority and the opposition in Parliament • Reports to the Government 3. Internal oversight board inside the Defence Radio Establishment 4. Ombudsman who report cases of misuse to the Parliamentary Ombudsman (JO) or the Chancellor of Justice (JK), (proposal) 5. Extraordinary review to be presented 2011 by the Data Protection Authority and a parliamentary committee 10
  • 11. 4. Method – what is signal intelligence? Information life cycle 1. Interception of messages and communications data (meta data) 2. Processing 1. Traffic analysis of communications data (who is communicating with who) 2. Cryptanalysis 3. Analysis of the content of messages 3. Analysis with the use of other sources, for example Open Source Intelligence (OSINT) 11 4. Report to client
  • 12. 4.1 Traffic analysis and social network analysis We humans leave electronic footprints after us, in the form of credit card payments, visits to websites, records of phone calls and e-mail (communication data). Imagine that somebody could collect everything and process it through a powerful computer. With the right tools one could find patterns that in detail describe what groups and networks you belong to. Such techniques are referred to as traffic analysis and social network analysis 12
  • 13. 5. Scope of Surveillance 1. Fairly small amounts of messages are intercepted and processed Example from Germany, judgement of the First Senate of 14 July 1999, para. 89 : The capacity of the Federal Intelligence Service (BND) permits the screening of approximately 15,000 acts of telecommunication per day out of a total of approximately 8 million telecommunications contacts between Germany and foreign countries. The material and personal resources of the Federal Intelligence Service, however, are not sufficient to evaluate all contacts. Approximately 700 fall under the area of application of the G 10 Act. Only these acts are selected with the help of the search concepts. About 70 of them are examined more closely by employees of the Federal Intelligence Service. 2. Communications data (meta data) relating to all or large amounts of commun- ication is stored by the Defence Radio Establishment in a database (Titan) Example from the USA: The NSA Call database contains 1,9 trillion records which 13 include the records of tens of millions of Americans
  • 14. A critical remark Is this kind of data collection and surveillance… • Consistent with the right to privacy? This is both a human right and a constitutional right. • Efficient? • Proportional? • Confident and reliable in the sense that it provide accurate intelligence and not false alarms? 14
  • 15. Further reading Protecting Individual Privacy in the Struggle Against Terrorists: A Framework for Program Assessment National Research Council, Washington D.C., National Academy of Sciences, 2008 FRA:s signalspaning ur ett rättsligt perspektiv Mark Klamberg, Svensk Juristtidning 2009/04 p. 519 The Shadow Factory: The Ultra-Secret NSA from 9/11 to the Eavesdropping on America James Bamford, 2008 15