SlideShare uma empresa Scribd logo
1 de 17
Baixar para ler offline
Surveillance of communication
by the National Defence Radio
Establishment (FRA)



  Mark Klamberg, doctoral candidate

                                      1
Summary of the legislation
adopted 18 June 2008:

IT- and telecom operators are obligated to transfer all
communication in cables crossing Swedish borders to
nodes controlled by the State

The Defence Radio Establishment will intercept
communication and collect data at the nodes (signal
intelligence)

                                                      2
Similar organizations, laws
and programs
USA
Organization:        National Security Agency (NSA)
Legislation:         FISA
Programmes:          “Echelon”,”Trailblazer”, “Stellar Wind”

United Kingdom
Organization:        Government Communications Headquarters
                     (GCHQ)
Legislation:         RIPA
Programmes:          “Echelon”, “Mastering the Internet”,
                     “Interception Modernisation Programme”
Case:                Liberty et al. v. The United Kingdom

N.B. The names of the abovementioned programmes have not all
                                                                3
been officially disclosed but rather through leaks to the media
Similar organizations,
laws and programs
France
Organization:   Direction Générale de la Sécurité Extérieure
                (DGSE)

Germany
Organization:   Bundesnachrichtendienst (BND)
Legislation:    G 10-law (Gesetz zur Beschränkung des
                Brief-, Post- und Fernmeldegeheimnisses)
Case:           Weber and Saravia v. Germany

Denmark
Organization:   Forsvarets Efterretningstjeneste (FE)
Legislation:    17 § forsvarsloven                         4
Why is there a debate now?
Technological change
Until the end of the 1990s satellites were the main
medium for international communication. Now it is
fiber optics in cables controlled by private companies.

Shift in Threats Relevant for National Security
The perceived threat from the Soviet Union has been replaced
with vague threats such as terrorism, international criminality,
migration, environmental threats and financial imbalances

New Legal Demands
The European Convention on Human Rights was incorporated in
Swedish Law 1994, which requires that interferences in the private
life and family has a legal basis (article 8)

Privatization
Telecom operators were previously state-owned and controlled.
Now they are private companies whose priority is to safeguard 5the
interests of their customers, not the interests of the state
Why new legislation?
Considering the changes in the 1990s:

The technological change and privatization creates a need to
adopt legislation or other binding measures that obligates the
private operators to surrender communication to the State. This
makes the existence of previously top secret surveillance public
knowledge

The shift in perceived threats creates a need to expand the
mandate or codify an already expanded mandate of signal
intelligence organizations

The public knowledge about this surveillance and new legal
demands creates a need for legislation protecting privacy     6
Key Features of the Swedish law
and the operations of the
Defence Radio Establishment

1. Mandate for Surveillance by the Defence Radio Establishment

2. Clients

3. Review Mechanisms

4. Method – what is signal intelligence?
   • Traffic analysis and social network analysis

5. Scope of Surveillance                                  7
1. Mandate of the Defence
    Radio Establishment
Mandate to monitor

1. external military threats,
2. factors relevant for peacekeeping operations,
3. international terrorism and international organized crime
4. the development and proliferation of weapons of mass destruction and
    arms control,
5. external threats against infrastructure (for example information and
    communication technology)
6. conflicts outside of Sweden that effect international peace and security and
7. international phenomena relevant for Swedish foreign-, security-, and
    defence policy (Government and diplomatic correspondence?)

                                                                            8
2. Clients (known)

1.   The Government
2.   The Government office
3.   The Defence Forces
4.   The Police, including the Security Service (SÄPO)
5.   National Inspectorate of Strategic Products
6.   Swedish Customs Service                                May be excluded
7.   Defence Materiel Administration Agency                 in Autumn 2009
8.   Defence Research Agency
9.   Civil Contingencies Agency

International Partners exist but unknown which those are.
Could include NSA, GCHQ, BND, DGSE and FE
                                                                                9

                                                               12 August 2009
3. Review Mechanisms
1. Defence Intelligence Court
    • Reviews applications for surveillance missions in advance
    • Professional judge and politically appointed lay-members
        representing the majority and the opposition in Parliament
2. Defence Intelligence Committee
    • Reviews, inter alia, the integrity and use of the databases held by
        the Defence Radio Establishment
    • Composed of a legal professional and politically appointed lay-members
        representing the majority and the opposition in Parliament
    • Reports to the Government
3. Internal oversight board inside the Defence Radio Establishment
4. Ombudsman who report cases of misuse to the Parliamentary Ombudsman
   (JO) or the Chancellor of Justice (JK), (proposal)
5. Extraordinary review to be presented 2011 by the Data Protection
    Authority and a parliamentary committee
                                                                       10
4. Method – what is
   signal intelligence?
Information life cycle

1. Interception of messages and communications data (meta data)

2. Processing
    1. Traffic analysis of communications data (who is communicating with who)

    2. Cryptanalysis

    3. Analysis of the content of messages

3. Analysis with the use of other sources, for example Open Source Intelligence
   (OSINT)
                                                                         11
4. Report to client
4.1 Traffic analysis and social
network analysis
We humans leave electronic footprints after us, in the form of
credit card payments, visits to websites, records of phone calls
and e-mail (communication data). Imagine that somebody could
collect everything and process it through a powerful computer.
With the right tools one could find patterns that in detail describe
what groups and networks you belong to. Such techniques are
referred to as traffic analysis and social network analysis




                                                                12
5. Scope of Surveillance
1. Fairly small amounts of messages are intercepted and processed
    Example from Germany, judgement of the First Senate of 14 July 1999, para. 89 :

    The capacity of the Federal Intelligence Service (BND) permits the screening
    of approximately 15,000 acts of telecommunication per day out of a total of
    approximately 8 million telecommunications contacts between Germany
    and foreign countries. The material and personal resources of the Federal
    Intelligence Service, however, are not sufficient to evaluate all contacts.

    Approximately 700 fall under the area of application of the G 10 Act. Only
    these acts are selected with the help of the search concepts.

    About 70 of them are examined more closely by employees of the Federal
    Intelligence Service.

2. Communications data (meta data) relating to all or large amounts of commun-
    ication is stored by the Defence Radio Establishment in a database (Titan)
    Example from the USA: The NSA Call database contains 1,9 trillion records which
                                                                               13
    include the records of tens of millions of Americans
A critical remark

Is this kind of data collection and surveillance…

• Consistent with the right to privacy? This is both a
human right and a constitutional right.

• Efficient?

• Proportional?

• Confident and reliable in the sense that it provide
accurate intelligence and not false alarms?
                                                         14
Further reading

Protecting Individual Privacy in the Struggle
Against Terrorists: A Framework for Program
Assessment
National Research Council, Washington D.C.,
National Academy of Sciences, 2008

FRA:s signalspaning ur ett rättsligt perspektiv
Mark Klamberg, Svensk Juristtidning 2009/04 p. 519

The Shadow Factory: The Ultra-Secret NSA from
9/11 to the Eavesdropping on America
James Bamford, 2008
                                                     15
Questions?




             16
Thanks!




Contact:
mark.klamberg@juridicum.su.se
+46 8 16 11 90
                                17

Mais conteúdo relacionado

Destaque

Field Lesson 6th Grade
Field Lesson 6th GradeField Lesson 6th Grade
Field Lesson 6th Gradempena2015
 
Social media and lawyers
Social media and lawyersSocial media and lawyers
Social media and lawyersKlamberg
 
Field Lesson 6th Grade
Field Lesson 6th GradeField Lesson 6th Grade
Field Lesson 6th Gradempena2015
 
Electronic Surveillance of Communications 100225
Electronic Surveillance of Communications 100225Electronic Surveillance of Communications 100225
Electronic Surveillance of Communications 100225Klamberg
 
PETE&C 2011 morriston reading technology
PETE&C 2011 morriston reading technologyPETE&C 2011 morriston reading technology
PETE&C 2011 morriston reading technologymorristont
 
milieuproblematiek
milieuproblematiekmilieuproblematiek
milieuproblematiekkrikke90
 

Destaque (7)

Field Lesson 6th Grade
Field Lesson 6th GradeField Lesson 6th Grade
Field Lesson 6th Grade
 
Social media and lawyers
Social media and lawyersSocial media and lawyers
Social media and lawyers
 
Field Lesson 6th Grade
Field Lesson 6th GradeField Lesson 6th Grade
Field Lesson 6th Grade
 
Electronic Surveillance of Communications 100225
Electronic Surveillance of Communications 100225Electronic Surveillance of Communications 100225
Electronic Surveillance of Communications 100225
 
PETE&C 2011 morriston reading technology
PETE&C 2011 morriston reading technologyPETE&C 2011 morriston reading technology
PETE&C 2011 morriston reading technology
 
milieuproblematiek
milieuproblematiekmilieuproblematiek
milieuproblematiek
 
Bit Rememberance
Bit RememberanceBit Rememberance
Bit Rememberance
 

Semelhante a Surveillance of communication by the National Defence Radio Establishment (FRA)

Electronic Surveillance Of Communications 100225
Electronic Surveillance Of Communications 100225Electronic Surveillance Of Communications 100225
Electronic Surveillance Of Communications 100225Klamberg
 
Electronic surveillance and privacy 130916
Electronic surveillance and privacy 130916Electronic surveillance and privacy 130916
Electronic surveillance and privacy 130916Klamberg
 
Cyber crime legislation part 1
Cyber crime legislation part 1Cyber crime legislation part 1
Cyber crime legislation part 1MohsinMughal28
 
A question of trust - uk spying review
A question of trust  - uk spying reviewA question of trust  - uk spying review
A question of trust - uk spying reviewRepentSinner
 
International Cybercrime (Part 1)
International Cybercrime (Part 1)International Cybercrime (Part 1)
International Cybercrime (Part 1)GrittyCC
 
Monitoring and controlling the Internet
Monitoring and controlling the InternetMonitoring and controlling the Internet
Monitoring and controlling the Internetblogzilla
 
Raduenzel - INTL621 Assignment 2
Raduenzel - INTL621 Assignment 2Raduenzel - INTL621 Assignment 2
Raduenzel - INTL621 Assignment 2Mark Raduenzel
 
Alex Haw Lecture - 090130 - Edinburgh School of Architecture - Vigilant Urban...
Alex Haw Lecture - 090130 - Edinburgh School of Architecture - Vigilant Urban...Alex Haw Lecture - 090130 - Edinburgh School of Architecture - Vigilant Urban...
Alex Haw Lecture - 090130 - Edinburgh School of Architecture - Vigilant Urban...Atmos
 
Alex Haw Lecture - 081101 - Kiss: Castlefield Gallery, Manchester - Surveying...
Alex Haw Lecture - 081101 - Kiss: Castlefield Gallery, Manchester - Surveying...Alex Haw Lecture - 081101 - Kiss: Castlefield Gallery, Manchester - Surveying...
Alex Haw Lecture - 081101 - Kiss: Castlefield Gallery, Manchester - Surveying...Atmos
 
tftp_brochure_05062014
tftp_brochure_05062014tftp_brochure_05062014
tftp_brochure_05062014A O
 
Presentation_on_protection_of_reporting_persons_UNCAC_LP.ppt
Presentation_on_protection_of_reporting_persons_UNCAC_LP.pptPresentation_on_protection_of_reporting_persons_UNCAC_LP.ppt
Presentation_on_protection_of_reporting_persons_UNCAC_LP.pptFranciscoJoaoVitug
 
DRAFT 2 - The Internet has effectively rendered privacy as a thing of the past
DRAFT 2 - The Internet has effectively rendered privacy as a thing of the pastDRAFT 2 - The Internet has effectively rendered privacy as a thing of the past
DRAFT 2 - The Internet has effectively rendered privacy as a thing of the pastMichael Owen
 
Encryption & interception of communication
Encryption & interception of communicationEncryption & interception of communication
Encryption & interception of communicationUc Man
 
Encryption & interception of communication
Encryption & interception of communicationEncryption & interception of communication
Encryption & interception of communicationUc Man
 
Dataistheborder
DataistheborderDataistheborder
Dataistheborderburmaball
 
TSCM Overview for Stakeholders
TSCM Overview for StakeholdersTSCM Overview for Stakeholders
TSCM Overview for Stakeholderskevinwetzel
 
Police surveillance of social media - do you have a reasonable expectation of...
Police surveillance of social media - do you have a reasonable expectation of...Police surveillance of social media - do you have a reasonable expectation of...
Police surveillance of social media - do you have a reasonable expectation of...Lilian Edwards
 

Semelhante a Surveillance of communication by the National Defence Radio Establishment (FRA) (20)

Electronic Surveillance Of Communications 100225
Electronic Surveillance Of Communications 100225Electronic Surveillance Of Communications 100225
Electronic Surveillance Of Communications 100225
 
Electronic surveillance and privacy 130916
Electronic surveillance and privacy 130916Electronic surveillance and privacy 130916
Electronic surveillance and privacy 130916
 
Cyber crime legislation part 1
Cyber crime legislation part 1Cyber crime legislation part 1
Cyber crime legislation part 1
 
A question of trust - uk spying review
A question of trust  - uk spying reviewA question of trust  - uk spying review
A question of trust - uk spying review
 
International Cybercrime (Part 1)
International Cybercrime (Part 1)International Cybercrime (Part 1)
International Cybercrime (Part 1)
 
Monitoring and controlling the Internet
Monitoring and controlling the InternetMonitoring and controlling the Internet
Monitoring and controlling the Internet
 
Un may 28, 2019
Un may 28, 2019Un may 28, 2019
Un may 28, 2019
 
Raduenzel - INTL621 Assignment 2
Raduenzel - INTL621 Assignment 2Raduenzel - INTL621 Assignment 2
Raduenzel - INTL621 Assignment 2
 
Alex Haw Lecture - 090130 - Edinburgh School of Architecture - Vigilant Urban...
Alex Haw Lecture - 090130 - Edinburgh School of Architecture - Vigilant Urban...Alex Haw Lecture - 090130 - Edinburgh School of Architecture - Vigilant Urban...
Alex Haw Lecture - 090130 - Edinburgh School of Architecture - Vigilant Urban...
 
NS Civil Liberties & Security Supplement Sept 2014
NS Civil Liberties & Security Supplement Sept 2014NS Civil Liberties & Security Supplement Sept 2014
NS Civil Liberties & Security Supplement Sept 2014
 
Alex Haw Lecture - 081101 - Kiss: Castlefield Gallery, Manchester - Surveying...
Alex Haw Lecture - 081101 - Kiss: Castlefield Gallery, Manchester - Surveying...Alex Haw Lecture - 081101 - Kiss: Castlefield Gallery, Manchester - Surveying...
Alex Haw Lecture - 081101 - Kiss: Castlefield Gallery, Manchester - Surveying...
 
tftp_brochure_05062014
tftp_brochure_05062014tftp_brochure_05062014
tftp_brochure_05062014
 
Presentation_on_protection_of_reporting_persons_UNCAC_LP.ppt
Presentation_on_protection_of_reporting_persons_UNCAC_LP.pptPresentation_on_protection_of_reporting_persons_UNCAC_LP.ppt
Presentation_on_protection_of_reporting_persons_UNCAC_LP.ppt
 
DRAFT 2 - The Internet has effectively rendered privacy as a thing of the past
DRAFT 2 - The Internet has effectively rendered privacy as a thing of the pastDRAFT 2 - The Internet has effectively rendered privacy as a thing of the past
DRAFT 2 - The Internet has effectively rendered privacy as a thing of the past
 
Encryption & interception of communication
Encryption & interception of communicationEncryption & interception of communication
Encryption & interception of communication
 
Encryption & interception of communication
Encryption & interception of communicationEncryption & interception of communication
Encryption & interception of communication
 
Dataistheborder
DataistheborderDataistheborder
Dataistheborder
 
TSCM Overview for Stakeholders
TSCM Overview for StakeholdersTSCM Overview for Stakeholders
TSCM Overview for Stakeholders
 
Police surveillance of social media - do you have a reasonable expectation of...
Police surveillance of social media - do you have a reasonable expectation of...Police surveillance of social media - do you have a reasonable expectation of...
Police surveillance of social media - do you have a reasonable expectation of...
 
Governing Communications Online - German Perspective
Governing Communications Online - German PerspectiveGoverning Communications Online - German Perspective
Governing Communications Online - German Perspective
 

Último

Minto-Morley Reforms 1909 (constitution).pptx
Minto-Morley Reforms 1909 (constitution).pptxMinto-Morley Reforms 1909 (constitution).pptx
Minto-Morley Reforms 1909 (constitution).pptxAwaiskhalid96
 
Roberts Rules Cheat Sheet for LD4 Precinct Commiteemen
Roberts Rules Cheat Sheet for LD4 Precinct CommiteemenRoberts Rules Cheat Sheet for LD4 Precinct Commiteemen
Roberts Rules Cheat Sheet for LD4 Precinct Commiteemenkfjstone13
 
Enjoy Night⚡Call Girls Iffco Chowk Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Iffco Chowk Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Iffco Chowk Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Iffco Chowk Gurgaon >༒8448380779 Escort ServiceDelhi Call girls
 
How Europe Underdeveloped Africa_walter.pdf
How Europe Underdeveloped Africa_walter.pdfHow Europe Underdeveloped Africa_walter.pdf
How Europe Underdeveloped Africa_walter.pdfLorenzo Lemes
 
KAHULUGAN AT KAHALAGAHAN NG GAWAING PANSIBIKO.pptx
KAHULUGAN AT KAHALAGAHAN NG GAWAING PANSIBIKO.pptxKAHULUGAN AT KAHALAGAHAN NG GAWAING PANSIBIKO.pptx
KAHULUGAN AT KAHALAGAHAN NG GAWAING PANSIBIKO.pptxjohnandrewcarlos
 
AI as Research Assistant: Upscaling Content Analysis to Identify Patterns of ...
AI as Research Assistant: Upscaling Content Analysis to Identify Patterns of ...AI as Research Assistant: Upscaling Content Analysis to Identify Patterns of ...
AI as Research Assistant: Upscaling Content Analysis to Identify Patterns of ...Axel Bruns
 
HARNESSING AI FOR ENHANCED MEDIA ANALYSIS A CASE STUDY ON CHATGPT AT DRONE EM...
HARNESSING AI FOR ENHANCED MEDIA ANALYSIS A CASE STUDY ON CHATGPT AT DRONE EM...HARNESSING AI FOR ENHANCED MEDIA ANALYSIS A CASE STUDY ON CHATGPT AT DRONE EM...
HARNESSING AI FOR ENHANCED MEDIA ANALYSIS A CASE STUDY ON CHATGPT AT DRONE EM...Ismail Fahmi
 
Referendum Party 2024 Election Manifesto
Referendum Party 2024 Election ManifestoReferendum Party 2024 Election Manifesto
Referendum Party 2024 Election ManifestoSABC News
 
26042024_First India Newspaper Jaipur.pdf
26042024_First India Newspaper Jaipur.pdf26042024_First India Newspaper Jaipur.pdf
26042024_First India Newspaper Jaipur.pdfFIRST INDIA
 
29042024_First India Newspaper Jaipur.pdf
29042024_First India Newspaper Jaipur.pdf29042024_First India Newspaper Jaipur.pdf
29042024_First India Newspaper Jaipur.pdfFIRST INDIA
 
₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...
₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...
₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...Diya Sharma
 
Call Girls in Mira Road Mumbai ( Neha 09892124323 ) College Escorts Service i...
Call Girls in Mira Road Mumbai ( Neha 09892124323 ) College Escorts Service i...Call Girls in Mira Road Mumbai ( Neha 09892124323 ) College Escorts Service i...
Call Girls in Mira Road Mumbai ( Neha 09892124323 ) College Escorts Service i...Pooja Nehwal
 
TDP As the Party of Hope For AP Youth Under N Chandrababu Naidu’s Leadership
TDP As the Party of Hope For AP Youth Under N Chandrababu Naidu’s LeadershipTDP As the Party of Hope For AP Youth Under N Chandrababu Naidu’s Leadership
TDP As the Party of Hope For AP Youth Under N Chandrababu Naidu’s Leadershipanjanibaddipudi1
 
2024 02 15 AZ GOP LD4 Gen Meeting Minutes_FINAL_20240228.docx
2024 02 15 AZ GOP LD4 Gen Meeting Minutes_FINAL_20240228.docx2024 02 15 AZ GOP LD4 Gen Meeting Minutes_FINAL_20240228.docx
2024 02 15 AZ GOP LD4 Gen Meeting Minutes_FINAL_20240228.docxkfjstone13
 
Lorenzo D'Emidio_Lavoro sullaNorth Korea .pptx
Lorenzo D'Emidio_Lavoro sullaNorth Korea .pptxLorenzo D'Emidio_Lavoro sullaNorth Korea .pptx
Lorenzo D'Emidio_Lavoro sullaNorth Korea .pptxlorenzodemidio01
 
Israel Palestine Conflict, The issue and historical context!
Israel Palestine Conflict, The issue and historical context!Israel Palestine Conflict, The issue and historical context!
Israel Palestine Conflict, The issue and historical context!Krish109503
 
Different Frontiers of Social Media War in Indonesia Elections 2024
Different Frontiers of Social Media War in Indonesia Elections 2024Different Frontiers of Social Media War in Indonesia Elections 2024
Different Frontiers of Social Media War in Indonesia Elections 2024Ismail Fahmi
 
Nurturing Families, Empowering Lives: TDP's Vision for Family Welfare in Andh...
Nurturing Families, Empowering Lives: TDP's Vision for Family Welfare in Andh...Nurturing Families, Empowering Lives: TDP's Vision for Family Welfare in Andh...
Nurturing Families, Empowering Lives: TDP's Vision for Family Welfare in Andh...narsireddynannuri1
 
2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docx
2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docx2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docx
2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docxkfjstone13
 
Beyond Afrocentrism: Prerequisites for Somalia to lead African de-colonizatio...
Beyond Afrocentrism: Prerequisites for Somalia to lead African de-colonizatio...Beyond Afrocentrism: Prerequisites for Somalia to lead African de-colonizatio...
Beyond Afrocentrism: Prerequisites for Somalia to lead African de-colonizatio...Muhammad Shamsaddin Megalommatis
 

Último (20)

Minto-Morley Reforms 1909 (constitution).pptx
Minto-Morley Reforms 1909 (constitution).pptxMinto-Morley Reforms 1909 (constitution).pptx
Minto-Morley Reforms 1909 (constitution).pptx
 
Roberts Rules Cheat Sheet for LD4 Precinct Commiteemen
Roberts Rules Cheat Sheet for LD4 Precinct CommiteemenRoberts Rules Cheat Sheet for LD4 Precinct Commiteemen
Roberts Rules Cheat Sheet for LD4 Precinct Commiteemen
 
Enjoy Night⚡Call Girls Iffco Chowk Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Iffco Chowk Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Iffco Chowk Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Iffco Chowk Gurgaon >༒8448380779 Escort Service
 
How Europe Underdeveloped Africa_walter.pdf
How Europe Underdeveloped Africa_walter.pdfHow Europe Underdeveloped Africa_walter.pdf
How Europe Underdeveloped Africa_walter.pdf
 
KAHULUGAN AT KAHALAGAHAN NG GAWAING PANSIBIKO.pptx
KAHULUGAN AT KAHALAGAHAN NG GAWAING PANSIBIKO.pptxKAHULUGAN AT KAHALAGAHAN NG GAWAING PANSIBIKO.pptx
KAHULUGAN AT KAHALAGAHAN NG GAWAING PANSIBIKO.pptx
 
AI as Research Assistant: Upscaling Content Analysis to Identify Patterns of ...
AI as Research Assistant: Upscaling Content Analysis to Identify Patterns of ...AI as Research Assistant: Upscaling Content Analysis to Identify Patterns of ...
AI as Research Assistant: Upscaling Content Analysis to Identify Patterns of ...
 
HARNESSING AI FOR ENHANCED MEDIA ANALYSIS A CASE STUDY ON CHATGPT AT DRONE EM...
HARNESSING AI FOR ENHANCED MEDIA ANALYSIS A CASE STUDY ON CHATGPT AT DRONE EM...HARNESSING AI FOR ENHANCED MEDIA ANALYSIS A CASE STUDY ON CHATGPT AT DRONE EM...
HARNESSING AI FOR ENHANCED MEDIA ANALYSIS A CASE STUDY ON CHATGPT AT DRONE EM...
 
Referendum Party 2024 Election Manifesto
Referendum Party 2024 Election ManifestoReferendum Party 2024 Election Manifesto
Referendum Party 2024 Election Manifesto
 
26042024_First India Newspaper Jaipur.pdf
26042024_First India Newspaper Jaipur.pdf26042024_First India Newspaper Jaipur.pdf
26042024_First India Newspaper Jaipur.pdf
 
29042024_First India Newspaper Jaipur.pdf
29042024_First India Newspaper Jaipur.pdf29042024_First India Newspaper Jaipur.pdf
29042024_First India Newspaper Jaipur.pdf
 
₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...
₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...
₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...
 
Call Girls in Mira Road Mumbai ( Neha 09892124323 ) College Escorts Service i...
Call Girls in Mira Road Mumbai ( Neha 09892124323 ) College Escorts Service i...Call Girls in Mira Road Mumbai ( Neha 09892124323 ) College Escorts Service i...
Call Girls in Mira Road Mumbai ( Neha 09892124323 ) College Escorts Service i...
 
TDP As the Party of Hope For AP Youth Under N Chandrababu Naidu’s Leadership
TDP As the Party of Hope For AP Youth Under N Chandrababu Naidu’s LeadershipTDP As the Party of Hope For AP Youth Under N Chandrababu Naidu’s Leadership
TDP As the Party of Hope For AP Youth Under N Chandrababu Naidu’s Leadership
 
2024 02 15 AZ GOP LD4 Gen Meeting Minutes_FINAL_20240228.docx
2024 02 15 AZ GOP LD4 Gen Meeting Minutes_FINAL_20240228.docx2024 02 15 AZ GOP LD4 Gen Meeting Minutes_FINAL_20240228.docx
2024 02 15 AZ GOP LD4 Gen Meeting Minutes_FINAL_20240228.docx
 
Lorenzo D'Emidio_Lavoro sullaNorth Korea .pptx
Lorenzo D'Emidio_Lavoro sullaNorth Korea .pptxLorenzo D'Emidio_Lavoro sullaNorth Korea .pptx
Lorenzo D'Emidio_Lavoro sullaNorth Korea .pptx
 
Israel Palestine Conflict, The issue and historical context!
Israel Palestine Conflict, The issue and historical context!Israel Palestine Conflict, The issue and historical context!
Israel Palestine Conflict, The issue and historical context!
 
Different Frontiers of Social Media War in Indonesia Elections 2024
Different Frontiers of Social Media War in Indonesia Elections 2024Different Frontiers of Social Media War in Indonesia Elections 2024
Different Frontiers of Social Media War in Indonesia Elections 2024
 
Nurturing Families, Empowering Lives: TDP's Vision for Family Welfare in Andh...
Nurturing Families, Empowering Lives: TDP's Vision for Family Welfare in Andh...Nurturing Families, Empowering Lives: TDP's Vision for Family Welfare in Andh...
Nurturing Families, Empowering Lives: TDP's Vision for Family Welfare in Andh...
 
2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docx
2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docx2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docx
2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docx
 
Beyond Afrocentrism: Prerequisites for Somalia to lead African de-colonizatio...
Beyond Afrocentrism: Prerequisites for Somalia to lead African de-colonizatio...Beyond Afrocentrism: Prerequisites for Somalia to lead African de-colonizatio...
Beyond Afrocentrism: Prerequisites for Somalia to lead African de-colonizatio...
 

Surveillance of communication by the National Defence Radio Establishment (FRA)

  • 1. Surveillance of communication by the National Defence Radio Establishment (FRA) Mark Klamberg, doctoral candidate 1
  • 2. Summary of the legislation adopted 18 June 2008: IT- and telecom operators are obligated to transfer all communication in cables crossing Swedish borders to nodes controlled by the State The Defence Radio Establishment will intercept communication and collect data at the nodes (signal intelligence) 2
  • 3. Similar organizations, laws and programs USA Organization: National Security Agency (NSA) Legislation: FISA Programmes: “Echelon”,”Trailblazer”, “Stellar Wind” United Kingdom Organization: Government Communications Headquarters (GCHQ) Legislation: RIPA Programmes: “Echelon”, “Mastering the Internet”, “Interception Modernisation Programme” Case: Liberty et al. v. The United Kingdom N.B. The names of the abovementioned programmes have not all 3 been officially disclosed but rather through leaks to the media
  • 4. Similar organizations, laws and programs France Organization: Direction Générale de la Sécurité Extérieure (DGSE) Germany Organization: Bundesnachrichtendienst (BND) Legislation: G 10-law (Gesetz zur Beschränkung des Brief-, Post- und Fernmeldegeheimnisses) Case: Weber and Saravia v. Germany Denmark Organization: Forsvarets Efterretningstjeneste (FE) Legislation: 17 § forsvarsloven 4
  • 5. Why is there a debate now? Technological change Until the end of the 1990s satellites were the main medium for international communication. Now it is fiber optics in cables controlled by private companies. Shift in Threats Relevant for National Security The perceived threat from the Soviet Union has been replaced with vague threats such as terrorism, international criminality, migration, environmental threats and financial imbalances New Legal Demands The European Convention on Human Rights was incorporated in Swedish Law 1994, which requires that interferences in the private life and family has a legal basis (article 8) Privatization Telecom operators were previously state-owned and controlled. Now they are private companies whose priority is to safeguard 5the interests of their customers, not the interests of the state
  • 6. Why new legislation? Considering the changes in the 1990s: The technological change and privatization creates a need to adopt legislation or other binding measures that obligates the private operators to surrender communication to the State. This makes the existence of previously top secret surveillance public knowledge The shift in perceived threats creates a need to expand the mandate or codify an already expanded mandate of signal intelligence organizations The public knowledge about this surveillance and new legal demands creates a need for legislation protecting privacy 6
  • 7. Key Features of the Swedish law and the operations of the Defence Radio Establishment 1. Mandate for Surveillance by the Defence Radio Establishment 2. Clients 3. Review Mechanisms 4. Method – what is signal intelligence? • Traffic analysis and social network analysis 5. Scope of Surveillance 7
  • 8. 1. Mandate of the Defence Radio Establishment Mandate to monitor 1. external military threats, 2. factors relevant for peacekeeping operations, 3. international terrorism and international organized crime 4. the development and proliferation of weapons of mass destruction and arms control, 5. external threats against infrastructure (for example information and communication technology) 6. conflicts outside of Sweden that effect international peace and security and 7. international phenomena relevant for Swedish foreign-, security-, and defence policy (Government and diplomatic correspondence?) 8
  • 9. 2. Clients (known) 1. The Government 2. The Government office 3. The Defence Forces 4. The Police, including the Security Service (SÄPO) 5. National Inspectorate of Strategic Products 6. Swedish Customs Service May be excluded 7. Defence Materiel Administration Agency in Autumn 2009 8. Defence Research Agency 9. Civil Contingencies Agency International Partners exist but unknown which those are. Could include NSA, GCHQ, BND, DGSE and FE 9 12 August 2009
  • 10. 3. Review Mechanisms 1. Defence Intelligence Court • Reviews applications for surveillance missions in advance • Professional judge and politically appointed lay-members representing the majority and the opposition in Parliament 2. Defence Intelligence Committee • Reviews, inter alia, the integrity and use of the databases held by the Defence Radio Establishment • Composed of a legal professional and politically appointed lay-members representing the majority and the opposition in Parliament • Reports to the Government 3. Internal oversight board inside the Defence Radio Establishment 4. Ombudsman who report cases of misuse to the Parliamentary Ombudsman (JO) or the Chancellor of Justice (JK), (proposal) 5. Extraordinary review to be presented 2011 by the Data Protection Authority and a parliamentary committee 10
  • 11. 4. Method – what is signal intelligence? Information life cycle 1. Interception of messages and communications data (meta data) 2. Processing 1. Traffic analysis of communications data (who is communicating with who) 2. Cryptanalysis 3. Analysis of the content of messages 3. Analysis with the use of other sources, for example Open Source Intelligence (OSINT) 11 4. Report to client
  • 12. 4.1 Traffic analysis and social network analysis We humans leave electronic footprints after us, in the form of credit card payments, visits to websites, records of phone calls and e-mail (communication data). Imagine that somebody could collect everything and process it through a powerful computer. With the right tools one could find patterns that in detail describe what groups and networks you belong to. Such techniques are referred to as traffic analysis and social network analysis 12
  • 13. 5. Scope of Surveillance 1. Fairly small amounts of messages are intercepted and processed Example from Germany, judgement of the First Senate of 14 July 1999, para. 89 : The capacity of the Federal Intelligence Service (BND) permits the screening of approximately 15,000 acts of telecommunication per day out of a total of approximately 8 million telecommunications contacts between Germany and foreign countries. The material and personal resources of the Federal Intelligence Service, however, are not sufficient to evaluate all contacts. Approximately 700 fall under the area of application of the G 10 Act. Only these acts are selected with the help of the search concepts. About 70 of them are examined more closely by employees of the Federal Intelligence Service. 2. Communications data (meta data) relating to all or large amounts of commun- ication is stored by the Defence Radio Establishment in a database (Titan) Example from the USA: The NSA Call database contains 1,9 trillion records which 13 include the records of tens of millions of Americans
  • 14. A critical remark Is this kind of data collection and surveillance… • Consistent with the right to privacy? This is both a human right and a constitutional right. • Efficient? • Proportional? • Confident and reliable in the sense that it provide accurate intelligence and not false alarms? 14
  • 15. Further reading Protecting Individual Privacy in the Struggle Against Terrorists: A Framework for Program Assessment National Research Council, Washington D.C., National Academy of Sciences, 2008 FRA:s signalspaning ur ett rättsligt perspektiv Mark Klamberg, Svensk Juristtidning 2009/04 p. 519 The Shadow Factory: The Ultra-Secret NSA from 9/11 to the Eavesdropping on America James Bamford, 2008 15