Page 1
Copyright2007-12
1
Roger ClarkeXamax Consultancy, Canberra
Visiting Professor in Cyberspace Law & Policy, UNSWand in Computer Science, ANU
Chair, Australian Privacy Foundation
http://www.anu.edu.au/Roger.Clarke/......../DV/MSR {.html, .ppt}
Surveillance Conference – Uni Sydney – 20 February 2012
Surveillance by the Media – and Its
Regulation
Page 2
Copyright2007-12
2
Surveillance by the Media – and Its Regulation
AGENDA
• Media Surveillance Practices
• Empirical• Analytical
• Regulation of Media Surveillance
• Contemporary • Prospective
Page 3
Copyright2007-12
3
Kidman – January 2005
QuickTime™ and aTIFF (LZW) decompressor
are needed to see this picture.
Page 4
Copyright2007-12
4
Kidman – January 2005
Stake-out, listening device, still-image photography, car pursuit, AVOs granted
QuickTime™ and aTIFF (LZW) decompressor
are needed to see this picture.
Page 5
Copyright2007-12
5
Falzon & Williams – April 2007
QuickTime™ and aTIFF (Uncompressed) decompressor
are needed to see this picture.
Visual recording, non-public place, covert, unconsented, unofficial media
Page 6
Copyright2007-12
6
Elliott – May 2008
Visual recording, public place, vulnerable person, overt, persistent, consent denied
QuickTime™ and aTIFF (LZW) decompressor
are needed to see this picture.
•
Page 7
Copyright2007-12
7
Elliott – At the Inquest
QuickTime™ and aTIFF (LZW) decompressor
are needed to see this picture.
Page 8
Copyright2007-12
8
14yo Girl – July 2009
Coercion, vulnerable person, live-to-air
QuickTime™ and aTIFF (LZW) decompressor
are needed to see this picture.
Page 9
Copyright2007-12
9
Campbell – May 2010
Stake-out, covert, visual recording, unconsented, no public interest
QuickTime™ and aTIFF (LZW) decompressor
are needed to see this picture.
Page 10
Copyright2007-12
10
Campbell – May 2010
QuickTime™ and aTIFF (LZW) decompressor
are needed to see this picture.
Page 11
Copyright2007-12
11
Madaleine Pulver – Aug-Nov 2011
Stake-out, visual recording, persistent, overt, consent denied
QuickTime™ and aTIFF (LZW) decompressor
are needed to see this picture.
Page 12
Copyright2007-12
12
Madaleine Pulver – Aug-Nov 2011
Persistent, pursuit
QuickTime™ and aTIFF (LZW) decompressor
are needed to see this picture.
Page 13
Copyright2007-12
13
Madaleine Pulver – Aug-Nov 2011
Stake-out, visual recording, presistent, overt, consent denied, pursuit
QuickTime™ and aTIFF (LZW) decompressor
are needed to see this picture.
Page 14
Copyright2007-12
14
14yo Boy in Bali – October 2011
Stake-out, visual recording, consent denied, persistent, culturally risky
QuickTime™ and aTIFF (LZW) decompressor
are needed to see this picture.
Page 15
Copyright2007-12
15
14yo Boy in Bali – October 2011
QuickTime™ and aTIFF (LZW) decompressor
are needed to see this picture.
QuickTime™ and aTIFF (LZW) decompressor
are needed to see this picture.
Page 16
Copyright2007-12
16
Forms of Surveillance
1. Physical Surveillance
2. Communications Surveillance
3. Dataveillance
4. Location and Tracking Surveillance
5. Body Surveillance ['Überveillance' Type 1]
6. Omnipresent and/or Omniscient Surveillance ['Überveillance' Type 2]
Page 17
Copyright2007-12
17
Dimensions of Surveillance
1. Of What?
2. For Whom?
3. By Whom?
4. Why?
5. How?
6. Where?
7. When?
Page 18
Copyright2007-12
18
Forms of Media Surveillance
1. Physical Surveillance• Unaided watching and
listening with eyes and ears
• Aids, incl. telescopic lenses, directional microphones, recording devices, triggering devices
2. Comms Surveillance• Unauthorised access to
voicemails /'mailbox hacking'), telephone, email or chat/IM traffic
3. Dataveillance• Acquired login/passwd pairs• Hacking• Social Eng'g – pretexting /
blagging, masquerade
4. Loc, Track Surveillance
• Stake-out, pursuit, ...• More sophisticated tools
5. Body Surveillance 6. Omnipresent and/or
Omniscient Surveillance
Page 19
Copyright2007-12
19
Contemporary Regulation of Media Surveillance
Tort• Interference with Real
Estate (Trespass, Nuisance)
• Interference with the Person (Trespass, Obstruction,False Imprisonment, Assault, AVOs / PSIOs)
• Interference with Emotional State (Stalking, Negligence)
• Deceitful Behaviour (Misrepresentation, Deceit, Passing-Off)
Surveillance Statutes• Telecomms (postal, TIAA,
computer offences)• Aural/Visual Surv Devices
(Clth, State, Territory)• Pornography, Anti-
Voyeurism
Other Statutes (Copyright,Trademarks, Media Law, Human Rights, Privacy)
Media Codes (APC, ACMA)
Direct Action (protecting the public, and the media)
Page 20
Copyright2007-12
20
The Regulation of Surveillance – General Principles
1. Justification2. Proportionality3. Openness4. Access Security5. Controlled Use6. Controlled Disclosure7. Controlled Publication8. Non-Retention and Rapid
Destruction9. Review10. Withdrawal
Page 21
Copyright2007-12
21
Media Use of Surveillance – Specific Principle
• DO NOT, unless a clear justification exists:• seek or gather personal data• observe or record personal behaviour
• Base justification only on:• consent by the person to whom the data relates• express legal authority; or• an over-riding public interest
• The nature of the activities, and their degree of intrusiveness:• must reflect the nature and extent of any consent
provided• must reflect the nature and extent of any express legal
authority; and• must be proportionate to the nature and significance of
the public interest arising in the particular circumstances
Page 22
Copyright2007-12
22
The Public Interest
Relevance to:• the performance of:
• a public office• a significant corporate or civil society
function• the credibility of public statements
('hypocrisy')• arguably illegal, immoral or
seriously anti-social behaviour• public health or safety• a significant event
Page 23
Copyright2007-12
23
Media Use of Surveillance – Controlled Activities
1. activities that intrude into the person's private space
2. activities that intrude into the person's reasonable expectations, even though they are in a public space
3. deceit, such as:• masquerade
• misrepresentation or subterfuge pretexting / blagging, masquerade
• unexpected observation or recording
4. exploitation of vulnerability, naiveté or ignorance, esp. children, limited mental capacity, etc.
5. intrusions into private space of people in sensitive situations
6. coercion, incl. implication of a legal or moral obligation, intimidation, excessive persistence
7. perceived trespass, nuisance, obstruction, pursuit, harassment or stalking
Page 24
Copyright2007-12
24
Roger ClarkeXamax Consultancy, Canberra
Visiting Professor in Cyberspace Law & Policy, UNSWand in Computer Science, ANU
Chair, Australian Privacy Foundation
http://www.anu.edu.au/Roger.Clarke/......../DV/MSR {.html, .ppt}
Surveillance Conference – Uni Sydney – 20 February 2012
Surveillance by the Media – and Its
Regulation