8/7/2019 Excess of Security
1/21
EU versus your privacy
8/7/2019 Excess of Security
2/21
EU becomes a state with full own powers
Shrinking of inner and outer security
"Pooling" of authorities, secret services Data exchange more easy through programs
"Proactive" policing and border control
New institutions appear to serve EU purpose
Social movements are considered as threats
8/7/2019 Excess of Security
3/21
"Police agency" Europol
"Border Agency" Frontex
European Gendarmerie Force Police academy CEPOL
"Juristic collaboration" Eurojust
Security research institutions
Security partners
8/7/2019 Excess of Security
4/21
Minister Schuble with former commissioner of"Justice and Home Affairs", Frattini, founded"Future Group"
"Informal commitee" of ministers of interior
Wrote wishlist for a five-year plan
8/7/2019 Excess of Security
5/21
Fight against "Terrorism
Police collaboration
Migration and asylum
Border management Management of missions in "third states"
Civil protection
Information networks
Merging of "internal and external security" Collaboration of inner and outer secret service
Enlarging and standardization of police data bases
8/7/2019 Excess of Security
6/21
Cross border remote search
Control of internet
Satellite surveillance
"Risk analysis" via Software
"e-borders"
Common deportation flights and planes
Refugee camps in "third states
The Stockholm Programme
8/7/2019 Excess of Security
7/21
Starting December 2009
Main target is collecting, processing andsharing data between agencies on EU levelagainst migration and crime
Creates legal premises for a high-tech fortressEurope
Information is stored in internationalized databases, accessible from both police and secretservice agencies all over EU
8/7/2019 Excess of Security
8/21
SIS I+, SIS II, SIReNE
Supplementary Information Request at theNational Entry and Schengen Informational System
Network of national databases which are identical +central support unit in Strasbourg (updates all othernational SIS systems on new entry)
Search system for objects and persons (car, bank
notes, weapons; persons, network analysis) On alert SIRENE network is contacted
Aim to include as much law enforcement agents aspossible
8/7/2019 Excess of Security
9/21
EURODAC Mainly targeting migrants
Fingerprinting of all migrants
Prevent asylum shopping Shift to criminal records and (after Lisbon) opens to
police access
In 2008, EURODAC processed 219.557 sets offingerprints of asylum seekers, 61.945 sets of
fingerprints of people crossing the bordersirregularly and 75.919 sets of fingerprints of peopleapprehended while illegally staying on the territoryof aMember State
8/7/2019 Excess of Security
10/21
Digital surveillance
Biometrics
Satellites
Drones
Software for "data mining"
Broadband networks for masses of data
"non lethal weapons"
8/7/2019 Excess of Security
11/21
Automatic Detection of Abnormal Behaviourand Threats in crowded Spaces
Surveillance of Unattended Baggage and the
Identification and Tracking of the Owner
Suspicious and Abnormal behaviourMonitoring Using a Network of Cameras &
sensors for Situation awareness enhancement AutonomousMaritime Surveillance System
8/7/2019 Excess of Security
12/21
Extending Eurosur (border control system) andFrontex to more thanMediteranean
Drones and air suport cameras, Satelites
Detention centers within or out of EUbordersFlchtlingsbekmpfung (AngelaMerkel)
BORDERPOL - international multidisciplinary bordersecurity organization, governed by its member borderservices and supported by industry. Created in 2003, itfacilitates international border security co-operation,and supports all international organizations, nationalborder authorities and services whose mission is todetect and deter border related crime.
8/7/2019 Excess of Security
13/21
Continuous growth in numbers:
8/7/2019 Excess of Security
14/21
Continuous growth in numbers:
8/7/2019 Excess of Security
15/21
Fight against terrorism also with Swift
Crime Informational System ECRIS
Crime Prevention Network EUCPN
EU-wide legal premises to make allinformational channels (internet, socialnetworks, e-mail, phone, mobile etc.)
recordable and usable by police andintelligence services
8/7/2019 Excess of Security
16/21
Comprehensive approach of social movements
Intervene in discussion about "balancingfreedom and security
Adressing police databases of the EU (Theirtargets: migrants, summit protestors,"Hooligans", crime suspects and their friends)
and encouraging to exercise right to access(Reclaim your data!)
Anonymous / encripted usage of IT&C
8/7/2019 Excess of Security
17/21
A five year plan on deviant behaviour,creating a European space of freedom, anti-capitalism and rebellion
European wide network out of control
created in 2009 with the purpose of a cross-border collaboration of activists against aEuropean security architecture
focus on police collaboration and databases,policing crowds at large events such as
summit protests, the security industry andsecurity research as well as EU-wide treatieswhich endanger civil liberties all over theworld
8/7/2019 Excess of Security
18/21
we reviewed European level actors, such as theEuropean Commission, its agencies Frontex, Europoland the European Gendarmerie Force EUROGENDFOR,and looked at strategies like the StockholmProgramme, the Lisbon Treaty, the scheduled
internal security strategy and the merging of police,military and intelligence. we also focused on various European companies that
provide this apparatus with ever new technical gadgets we discussed the radical changes which accompany
the merging of internal and external security and its
forces, shifting towards a database society, whilst alsopushing the will to enhance surveillance and improvecontrol by technical means
8/7/2019 Excess of Security
19/21
long-term analysis and collaboration in variousforms of protest and resistance
The idea of the five year Freiburg
Programme was born.
Decisions on a European level need some timefor their national implementation in the 27member states, we want to be prepared andlaunch actions as early as possible
Network out of controlhttp://outofcontrol.noblogs.org
8/7/2019 Excess of Security
20/21
OpenMobile Technologies (Linux and androidphones) and Open Source programs
CryptoSMS.org is a GPL (general public license)open source application for cell phones running
J2ME (Java for mobiles). CryptoSMS providespublic/private key encryption, key generationand key management. It sends and receivesencrypted SMS and public keys, encrypts and de-encrypts files, offers key verification via
fingerprints and provides a secure login. It encrypts only the contents of the messages, but
does not in any way encrypt or scramble theidentities of the sender or recipients
8/7/2019 Excess of Security
21/21
Usage of Proxy-servers
MAC changers (likeMadMAC)
Pre-paid internet cards, mobile internet
Encripted e-mails:
Thunderbird Enigmail , Freenigma.com - PGP
Encripted files and folders on your computer
Manage browsers NOT to store information SSD.eff.org - Survaillance Self Defence Page