34C3 preroll music
Herald angel: Today two people from privacy
international, one is Eva Blum--Dumontet
she's a research officer working on data
exploitation especially in the global
south and Millie Wood who's a lawyer and
is fighting against spy agencies and
before that she fought seven years against
police cases and they're gonna be talking
about policing in the the age of data
exploitation. Give them a warm welcome.
Applause
Millie Wood: Hi I'm Millie as was just said I've been
at privacy international for two years
working as a lawyer before that I spent
seven years bringing cases against the
police and what increasingly concerns me
based on these experiences is a lack of
understanding of what tactics are being
used by the police today and what legal
basis they are doing this on. The lack of
transparency undermines the ability of
activists lawyers and technologists to
challenge the police tactics and whilst
I'm sure a lot of you have a broad
awareness of the technology that the
police can use I don't think this is
enough and we need to know what specific
police forces are using against
individuals. The reason why is that when
you're arrested you need to know what
disclosure to ask for in order to prove
your innocence. Your lawyers need to know
what expert evidence to ask for in order
to defend their client. And increasingly
as there are invisible ways or seemingly
invisible for the police to monitor a scale
we need to know that there are effective
legal safeguards. Now those who are
affected are not just the guilty or those
who understand technology they include
pensioners such as John Cat a 90 year old
man who's a peace protester and he's a
law-abiding citizen no criminal record and
yet he is on the UK domestic extremism
database and listed here are some of the
entries: He took his sketchpad and made
drawings, he's clean shaven, and he was
holding a board with orange people on it.
So this is the kind of people that they
are surveilling. John's case exposes
unlawful actions by the police but these
actions date back to 2005 to 2009 as far
as I'm aware there are no cases
challenging modern police tactics and
privacy international in the UK and with
our partners throughout the world are
increasingly concerned at the pace this is
developing unobstructed because people
don't know what's going on, and so we've
started in the UK to try and uncover some
of the police tactics using Freedom of
Information requests. These laws should be
available throughout Europe and we want to
make similar requests in other countries
hopefully with some of you. So now I'm
going to hand over to my colleague Eva who
will talk a bit about privacy
international, some of the tactics we know
the police are using, and then we'll speak
about some of the things that we found out
through our initial research.
Applause
Thank you so, I'm just going to tell you a
little bit more about Privacy
International for those of you who don't
know this organization. We are based in
London and we fight against surveillance
and defend the right to privacy across the
world. Basically, essentially what we're
doing is that we do litigation, we conduct
research, and we carry out advocacy
including at the United Nations, we
develop policies on issues that are
defining modern rights. Now, our work
ranges from litigations against
intelligence services to a wide range of
reports on issues such as connected cars,
smart cities, and FinTech. We've recently
published an investigation on the role of
companies like Cambridge Analytica and
Harris Media and their role in the latest
Kenyan elections. With our network of
partner organisations across the world we
advocate for stronger privacy protection
in the law and technology and stronger
safeguards against surveillance. Now we
talk about data exploitation and it's
actually the title of the talk so what do
we mean by that? The concept of data
exploitation emerges from our concerns
that the industry and governments are
building a world that prioritize the
exploitation of all data. We observe three
prevailing trends in data exploitation.
One is the excessive data that's generated
beyond our control. The second one is the
fact that this data is processed in a way
we cannot understand or influence and the
lack of transparency around it. The last
one is, that at the moment this data is
used to disadvantage us the ones who are
producing this data and it's further
empowering the already powerful. We hardly
control the data anymore that's generated
from phones or in our computers, but now
in the world we live in data just don't
come just from our phones or computers. It
comes from the cars we're driving, it
comes from our payment systems, from the
cities we live in. This is all generating
data and this data is used by other
entities to make assumptions about us and
take decisions that eventually influence
our lives. Are we entitled to a loan? Do
we qualify for affordable insurance?
Should we be sent to jail or set free? Who
should be arrested? This is at the core of
the world that we're building around data
exploitation. The question of power
imbalance between those who have the data
and who gets to make decisions based on
this data and those who are producing the
data and losing control over it. Now what
is policing have to do with data, what
does data exploitation have to do with
policing? The police has always been
actually using data in the past. To give
you one example in 1980 a transit police
officer named Jack Maple, developed a
project called chart of the future, this
is how he described it: "I call them the
chart of the future. On 55 feet of wall
space, I mapped every train station in New
York City and every train. Then I used
crayons to mark every violent crime,
robbery, and grand larceny that occurred.
I mapped the solved versus the unsolved".
Now the system was used by the Transit
Police and it was credited with reducing
felonies by 27% and robberies by 1/3
between 1990 and 1992. So this generated a
lot of interest in his projects and former
New York Mayor Rudolph Giuliani asked the
New York police department to essentially
take up chart of the future and develop
their own project. It became CompStat.
CompStat was again essentially about
mapping crime to try and make assumptions
about where crime wars are happening. So
this kind of shows the building of this
narrative around this idea that the more
data you have, the more data you generate,
the better you will be at reducing crime.
Now it becomes interesting in the world we
live in that we describe, where we are
constantly generating data, often without
the consent or even the knowledge of those
who are producing this data. So there are
new questions to be asked: What data is
the police entitled to access? What can
they do with it? Are we all becoming
suspects by default? One of the key
elements of the intersection between data
exploitation and policing is the question
of smart cities. It's worth bearing in
mind that data-driven policing is often
referred to as smart policing, so obviously
the word smart has been used generally in
a generic manner by various industry to
kind of describe this trend of using mass
data collection in order to provide new
services. But there is actually a real and
genuine connection between smart cities
and data-driven policing. The first reason
for that is that actually one of the main
reasons for cities to invest in smart city
infrastructure is actually the question of
security. This is something we've explored
in our latest report on smart cities and
this is emerging also from the work we're
doing other organizations including coding
rights in Brazil and DRF in Pakistan. So
actually Brazil is an interesting example,
because before the mega events they
started organizing like the football
World Cup and the Olympics they invested
massively in smart city infrastructure.
Including projects with IBM and precisely
the purpose of what they were trying to
achieve with their smart city
infrastructure, was making the city safer
so it was extremely strongly connected
with the police. So this is a picture for
example of the control room that
was built to control CCTV cameras and to
create graphs in order to showcase where
crime was happening and also in a way the
likeliness of natural disasters in some
areas. In Pakistan there is a whole new
program on investment of smart cities,
which is actually referred to as the safe
city project. Now companies understand
that very well and this is actually an
image from an IBM presentation describing
their vision of smart cities. And as you
see like policing that is very much
integrated into their vision, their
heavily centralized vision of what smart
cities are. So that's no wonder that
companies that offer smart city
infrastructure are actually now also
offering a platform for policing. So those
companies include IBM as I mentioned but
also Oracle and Microsoft. We see in many
countries including the UK where we based
some pressure on budgets and budget
reductions for the police and so there is
a very strong appeal with this narrative,
that you can purchase platform you can
gather more data that will help you do
policing in less time and do it more
efficiently. But little thought is given
to the impact on society, or right to
privacy and what happens if someone
unexpected take the reins of power. Now
we're gonna briefly explain what data-
driven policing looks like, and eventually
Millie will look at our findings. So
the first thing I wanted to discuss is
actually predictive policing, because
that's often something we think of and
talked about when we think about data-
driven policing. I mentioned CompStat
before and essentially predictive policing
works on a similar premise. The idea is
that if you map where crime happens you
can eventually guess where the next crime
will happen. So the key player in
predictive policing is this company called
PREDPOL, I mean I think they describe
pretty much what they do, they use
artificial intelligence to help you
prevent crime, right, predicting when and
where crime will most likely occur. Now
PREDPOL and other companies using
something called a Hawkes process that's
used normally for the prediction of
earthquake tremors, so what Hawkes
originally did is that he was analyzing
how after an earthquake you have after
shakes and usually the after shakes tend
to happen where the original earthquake
happened and in a short period of time
after that. So the Hawkes process basically
is described as when a certain event
happens, other events of the same kind will
happen shortly after in the same in the
same location. Now obviously it actually
works quite well for earthquakes, whether
it works for crime is a lot more
questionable. But that's actually the
premise on which companies that
are offering predictive policing services
are relying. So basically applied to
predictive policing the mantra is
monitoring data on places where crime is
happening you can identify geographic
hotspots where crime will most likely
happen again. Now other companies than
PREDPOL are joining in and they are adding
more data than just simply location of
past crimes. So this data has included
open source intelligence and we talked a
little bit more about this later on.
Weather report, census data, the location
of key landmarks like bars, churches,
schools, data sporting events, and moon
phases. I'm not quite sure what they're
doing with moon phases but somehow that's
something they're using. When predictive
policing first sort of emerged one of the
the key concerns was whether our world was
going to be turning into a Minority Report
kind of scenario where people are arrested
before a crime is even committed and
companies like PREDPOL were quick to
reassure people and say that do not
concern about who will commit crime but
where crimes are happening. Now that's not
actually true because in fact at the
moment we see several programs emerging
especially in the US, where police
departments are concerned not so much with
where crimes are happening, but who's
committing it.,So I'm gonna talk about two
example of this: One is the Kansas City No
Violence Alliance, which is a program laid
by the local police to identify who will
become the next criminal - basically - and
they're using an algorithm that combines
data from traditional policing as well as
social media intelligence and information
that they have on drug use, based on this
they create graphics generated using
predictive policing to show how certain
people are connected to already convicted
criminals and gang members. Once they've
identified these people they request
meeting with them whether they've
committed crimes or not in the past. And
they would have a discussion about their
connection to those convicted criminals
and gang members and what they tell them
is that they are warned that if a crime
next happened within their network of
people every person connected to this
network will be arrested whether or not
they were actually involved in the crime
being committed. Now there are actually
dozens of police departments that are
using similar programs. The Chicago Police
Department has an index of the 400 people
most likely to be involved in violent
crimes. That sounds like a BuzzFeed
article but actually there is a reality
which is extremely concerning, because
those people who are in this list are for
the most part not actual criminals, they
are purely seen to be connected to people
who've committed crime. So if your next-
door neighbor is a criminal then you may
well find your name on that list. Now
predictive policing is deceptive and
problematic for several reasons: First of
all there's the question of the
presumption of innocence. In a world where
even before you commit a crime you can
find your name on that list or be called
by the police - you know - what happens to
this very basis of democracy which is the
presumption of the of innocence. But also
there's the other question of like can we
really use the math that was originally
designed for earthquakes and apply to
human beings because human beings don't
work like earthquakes. They have their own
set of biases and the biases
start with how we collect the data. For
example, if the police is more likely to
police areas where there is minorities,
people of color, then obviously the data
they will have will be disproportionately
higher on persons of color. Likewise if
they are unlikely to investigate white-
collar crime they will be unlikely to have
data that are reflecting a reality where
crime also happens in wealthier areas. So
basically we are inputting biased datasets
that obviously will lead to biased
results. And what these biased results
mean is that it will continue the already
existing trend of over policing
communities of color and low-income
communities. I'll leave it to Millie for
the next box. So, one of the increasingly
popular technologies we're seeing in the
UK, and is no doubt used around the world
and probably at border points, although we
need more help with the reasearch to prove
this, is mobile phone extraction. The
police can extract data from your phone,
your laptop, and other devices which
results in a memory dump of the extracted
data taken from your device and now held
in an agency database. So for example all
your photos, all your messages, and all
those of people who had no idea they would
end up in a police database because
they're associated with you retained for
as long as the police wish. Now these
devices are pretty user friendly for the
police and if you're interested you can
look on YouTube where Cellebrite one of
the big players has lots of videos about
how you can use them, and so depending on
the device and the operating system some
of the data this is from a police document
but it lists what they can extract using a
Cellebrite UFED is what you might expect:
device information, calls, messages,
emails, social media, and Wi-Fi networks.
But if you look at their website and here
are a few examples they can also collect:
system and deleted data, they can access
cloud storage, and inaccessible partitions
of the device. Now this is data that is
clearly beyond the average users control,
and as the volume of data we hold on our
phones increases so will this list. And
the companies we know the UK police are
using, which includes: Cellebrite, Acceso,
Radio Tactics, MSAB, are all aware of how
valuable this is and as one of them have
stated: "if you've got access to a person
SIM card, you've got access to the whole
of a person's life". They also go on to
note: "the sheer amount of data stored on
mobile phones is significantly greater
today than ever before." There are also no
temporal limits to the extraction of data,
this is from another police document we
obtained and it shows that if you choose
to extract to certain data type you will
obtain all data of a particular type, not
just the data relevant to an
investigation. So all that data on a
police database, indefinitely and even if
you were asked whether you were happy for
your data to be extracted during an
investigation I think it's highly unlikely
you would realize the volume that the
police were going to take. Other targets
for the police that we know about are:
infotainment systems in cars, Smart TVs,
and connected devices in the home. This is
an extract from a tech UK report, where
Mark Stokes head of digital forensics at
the Met Police which the police in London
stated in January, that the crime scene of
tomorrow will be the Internet of Things
and detectors of the future will carry a
digital forensics toolkit that will help
them analyze microchips and download data
at the scene rather than removing devices
for testing. Now I can imagine that the
evidence storage room is going to get a
bit full if they start dragging in
connected fridges, hair dryers, hair
brushes, your Google home, Amazon echo and
whatever else you have. However, their
plans to walk into your home and download
everything, make no mention of needing a
specific warrant and so the only
limitations at the moment are the
protections that may exist on the devices.
The law does not protect us and this needs
to change. So I'm going to be talking a
little bit about open source intelligence
and in particular social media
intelligence, because when I talked about
predictive policing I identified those two
sources as some of the data that's being
used for predictive policing. Now, open
source intelligence is often thought as,
or often assumed to be innocuous, and
there is the understanding that if
information is publicly available then it
should be fair for the police to use. Now
the problem is that among open source
intelligence there's often social media
intelligence that we refer to as
documents. Now there are many ways to
conduct document and it can range from
like the single police officer, who is
just you know using Facebook or Twitter to
look up the accounts of victims or
suspected criminals, but there was also
companies that are scrapping the likes of
Facebook and Twitter to allow the police
to monitor social media. Now social medias
have like blurred the lines between public
and private, because obviously we are
broadcasting our views on this platform
and at the moment the police has been
exploiting this kind of unique space, this
blured line, ithey are accessing this
content in a completely unregulated
manner, as long as the content is publicly
available like for example you don't need
to be friend or to have any already
established connection with the suspected
criminal or the police or the victim
anything that's available to you it's
completely unregulated there are no rules
and I mentioned earlier the question of a
budget restriction and so the police is
benefiting hugely from this because it
doesn't really cost anything to use social
media so at the moment SOCMINT is kind of
like the first and easy step in a police
investigation because there is no cost and
because there is no oversight. Now,
SOCMINT actually isn't so innocent in the
sense that it allows the police to
identify the locations of people based on
their post, it allows them to establish
people's connection, their relationships,
their association, it allows the
monitoring of protest and also to identify
the leaders of various movement, and to
measure a person's influence. Now, in the
UK what we know is that the police is
largely using marketing products, so this
is an anonymous quote from a report by
academics that have been doing research on
SOCMINT and what someone said was that: "A
lot of stuff came out of marketing because
marketing were using social media to
understand what people were saying about
their product... We wanted to understand
what people were saying so it's almost
using it in reverse". Now again, this is
not considered like surveillance device
this is purely a marketing project that
they're using and for that reason law
enforcement agencies and security agencies
are often arguing that SOCMINT has
basically no impact on privacy. But
actually when your post reveals your
location or when the content of your post
reveal what used to be considered and is
still considered actually as sensitive
private information like details about
your sexual life, about your health, about
your politics, can we really minimize the
impact of the police accessing this
information. Now obviously we may not have
a problem with the average twitter user or
with a friend reading this information but
when the ones who are reading the
information and taking actions on this
information have power over us like the
police does, you know, what does it
actually mean for our right to privacy?
That's not to say that people should stop
using social media but rather what kind of
regulation can we put in place so that
it's not so easy for the police to access.
The absence of regulations on SOCMINT has
actually already led to abuse in two cases
both in the US that we've identified: One
is Raza v. the City of New York which is a
case from the ACLU where we knew that we
found out that the city of New York,
sorry, the New York Police Department was
systematically gathering intelligence on
Muslim communities, and one of the ways
they were gathering this intelligence was
essentially by surveilling social media
accounts of Muslims in New York. The
second case is a company called ZeroFOX.
So what ZeroFox does is social media
monitoring. Now, during the the riots that
followed the funeral of Freddie Gray,
Freddie Gray was a 25 year old black man
who had been shot by the police, so after
his funeral there had been a series of
riots in the UK and ZeroFOX produced a
report that they shared with the Baltimore
Police to essentially advertise for their
social social media monitoring tool and
what the company was doing was again like
browsing social media and trying to
establish who were the threat actors in
these riots and among the 19 threat
actors that they identified two of them
were actually leaders of the black lives
matter movement. Actually at least one of
them was a woman definitely not a physical
threat but this is how they were
essentially labeled. So these two examples
actually show that again it's still sort
of the same targets, it's people of
colors, it's activists, it's people from
poor income backgrounds, that are singled
out as likely criminals. And it's very
telling when we realize that SOCMINT is
actually one of the sources of data that's
eventually used for predictive policing
and then again predictive policing leading
to people being more surveiled and
potentially exposed to more police
surveillance based on the fact that they
all singled out as as likely criminal. Now
social media is a fascinating place
because it's a mix between a private and a
public space as I said we are broadcasting
our views publicly but then again it's a
privately owned space where we follow the
rules that is set up by private companies.
Now, if we want to protect this space and
ensure that like free expression and
political organization can still happen on
the spaces we need to fully understand how
much the police have been exploiting the
spaces and how we can limit and regulate
the use of it. Now, I'll talk to Millie
about what we can do next. So I'm going to
briefly look at some of our initial
findings we've made using Freedom of
Information requests, broadly: the lack of
awareness by the public, weak legal basis,
and a lack of oversight. Now, sometimes
the lack of awareness appears intentional
- we asked the police about their plans to
extract data from connected devices in the
home and they replied neither confirm nor
deny. Now this is kind of a bizarre
response given that Mark Stokes who's a
member of the police had already said that
they plan to do this, in addition the UK
government Home Office replied to us
saying the Home Office plans to develop
skills and capacity to exploit the
Internet of Things as part of criminal
investigations. They also said that police
officers will receive training in relation
to extracting, obtaining, retrieving, data
from or generated by connected devices. So
we wrote back to every police force in the
UK had refused to reply to us and
presented the evidence but they maintained
their stance so we will be bringing a
challenge against them under the Freedom
of Information Act. Now, Eva has also
identified the huge risks associated with
predictive policing yet in the UK we've
found out this is set to increase with
forces either using commercial tools or
in-house ones they've developed or
planning trials for 2018. There has been
no public consultation, there are no
safeguards, and there is no oversight. So
when we ask them more questions about the
plans we were told we were 'vexatious' and
they won't respond to more requests so it
seems like we have yet another challenge,
and what about mobile phone extraction
tools here are some of the stats that have
been found out and I would say these
aren't completely accurate because it
depends on how reliable the police force
are in responding but roughly I'd say it's
probably more than 93 percent now of UK
police forces throughout the country are
extracting data from digital devices. We
know they plan to increase, we've seen in
their documents they plan to train more
officers, to buy more equipment, and to
see extraction as a standard part of
arrest, even if the devices had absolutely
nothing to do with the offense and so
these figures are likely to increase
exponentially, but in the UK not only to
the police not need a warrant in documents
we've read they do not even need to notify
the individual that they have extracted
data, for example, from their mobile phone
or that they're storing it. If this is
being done without people's knowledge how
on earth can people challenge it, how can
they ask for their data to be removed if
they're found innocent? Turning to social
media monitoring which the police refer to
as open source research. This is Jenny
Jones she's a member of the House of Lords
in the Green Party and next to her photo
is a quote from her entry on the domestic
extremism database, and so, if a member of
the House of Lords is being subject to
social media monitoring for attending a
bike ride then I think it's highly likely
that a large number of people who
legitimately exercise their right to
protest are being subject to social media
monitoring. Now, this hasn't gone
unnoticed completely although they're
slightly old these are quotes from two
officials: the first the UK independent
reviewer of terrorism who notes that the
extent of the use of social media
monitoring is not public known, and the
second is the chief surveillance
commissioner who is and this is a very
strong statement for a commissioner is
saying that basically social media should
not be treated as fair game by the police.
So now I'll move on to a weak or outdated
legal basis. For most of the technologies
we've looked at it's very unclear what
legal basis the police are using even when
we've asked them. This relates to mobile
phone extraction - so the legislation
they're relying on is over 30 years old
and is wholly inappropriate for mobile
phone extraction this law was developed to
deal with standard traditional searches,
the search of a phone can in no way be
equated to the search of a person, or the
search of a house, and despite the fact
that we have repeatedly asked for a
warrant this is not the case and we
believe that there should be a warrant in
place not only in the UK but in the rest
of the world. So if you think that either
you or your friends have had their data
extracted when they're arrested or your
phone has been in the possession of the
authorities you should be asking
questions, and very briefly something on
lack of oversight, so we reported in
January this year about documents that
were obtained by The Bristol Cable's
investigation into Cellebrite and one
report said that in half of the cases
sampled the police noted the police had
failed to receive authorization internally
for the use of extraction tools. Poor
training undermined investigations into
serious offences such as murder, and
inadequate security practices meant that
encryption was not taking place even when
it was easy to do and they were losing
files containing intimate personal data.
So why does this matter? Here are some key
points: In relation to information
asymmetry - it's clear as Eva has
explained that the police can now access
far more data on our devices than the
average user. In relation to imbalance of
power - it's clear they can collect and
analyze sources that are beyond our
control whether it's publicly placed
sensors, cameras, and other devices. There
is also unequal access and if lawyers
don't know what's being gathered they
don't know what to ask for from the
police. All in all this puts the
individual at a huge disadvantage. Another
impact is the chilling effect on political
expression now I'm sure many of you maybe
think that the police monitor your social
media but the average person is unlikely
to, and so if they start to know about
this are they going to think twice about
joining in protesting either physically or
using a hashtag, and what about who your
friends are? If they know you attend
protests are they really want to have
their data on your phone if they know that
potentially that could be extracted and
end up on a police database? It's far
easier to be anonymous face among many
people than a single isolated person
standing up to power but these new forms
of policing we have been discussing
redefine the very act of protesting by
singling out each and every one of us from
the crowd. So, what can we do? Many of you
will be familiar with these technologies,
but do you know how to find out what the
police are doing? In the UK we've been
using Freedom of Information requests, we
want to do this with people throughout
Europe and you don't need to be a lawyer
so please get in touch. We also want to
dig into the technology a bit more, I want
someone to use a Cellebrite UFED on my
phone and show me exactly what can come
out of it, and we want to tell lawyers and
activists about these new techniques. Many
lawyers I speak to who are experts in
actions against the police do not know the
police are using these tools. This means
they don't know the right questions to ask
and so it's fundamental you speak to
people who are bringing these cases and
tell them about what they can do or what
questions they should be asking, and
finally we want you to also raise the
debate, to share our research, and to
critique it, thank you.
Herald: So we've got ample enough time for
Q&A are there any questions in the hall,
yes, there's one over there.
Question: You mentioned the problem of
when they do physical extraction from the
Celebrite device it's going to get all of
the photos, all of the emails, or whatever
maybe rather than just what the
investigator needs. What is the solution
to that from your eyes is there a
technical one that these companies are
gonna have to implement - which they're
not going to - or a legal one, because on
the other side a mobile phone is a crucial
part in a any criminal investigation in
2017. So what's the workaround or the
solution to that?
Answer: I think it's both, I think the
fact that there isn't any law looking at
this and no one's discussing can there be
a technical solution or does it need to be
one where there's better regulation and
oversight so you extract everything, can
you keep it for a certain period to see
what's relevant then do you have to delete
it? The trouble is we don't see any
deletion practices and the police have
publicly stated in the media that they can
just keep everything as long as they like.
They like data you can kind of see why but
that doesn't mean they should keep
everyone's data indefinitely just in case
it's useful so I think there may be tech
solutions there may be legal ones and I
think perhaps both together as is one of
the answers. Herald: The next question
from microphone one please.
Q: I'm just wondering how those laws on
action and power given to the cops are
being sold to the UK people is it because
to fight terrorism as I said or to fight
drugs or this kind of stuff, what's the
argument used by the government to sold
that to the people.
A: I think actually one thing that's
important is to bear in mind is that I'm
not sure most of the of the public in the
UK is even aware of it, so I think unlike
the work of intelligence services an
agency where terrorism is used as the
excuse for ever more power and especially
laws that have become increasingly
invasive, actually with policing we don't
even fall in that kind of discourse
because it's actually hardly talked about
in UK. Yeah, and the mobile phone
extraction stuff we've been looking at is
low-level crimes, so that's like you
have, it could be you know a pub fight,
it could be a robbery, which that's more
serious, it could be an assault, so they
want to use it in every case. For all the
other techniques we have no idea what
they're using for that's one of the
problems.
Herald: The next question from the
internet please.
Q: When you say that there's a lack of
laws and regulations for police concerning
us in extraction and data from devices are
you talking just about UK and/or USA or do
you have any examples of other countries
who do better or worse?
A: I don't know of any country that has a
regulation on publicly available
information on social media.
Herald: Microphone number four.
Q: Thank you again for a great talk. In
terms of data exploitation an element that
I didn't hear you talk about that I'd like
to hear a little bit more is when there
are questions around who is doing the
exploitation, I know in the U.S. some FOIA
researchers get around how difficult it is
to get data from the feds by going after
local and state police departments, is
that something that you're doing or do you
have a way of addressing confusion when
people don't know what agency has the
data?
A: Yeah, I think actually what one of the
things the data exploitation program at
Privacy International is doing is actually
looking into the connection between the
private sector and governments because
obviously at the moment there's the whole
question of data brokers which is an
industry that's hardly regulated at all,
that people don't necessarily know about,
we don't, the companies that are doing it
are familiar household name. I'll let
Millie talk a lot more about the
government aspects of it. I guess the
question is again a country-by-country
basis, we work in many countries that
don't have any data protection regulations
at all so there is this first difficulty
as how do we regulate, how do we limit the
power of the state when you don't even
have the basic legislation around
data protection? One thing to bear in mind
is like the problem with companies is like
how do you also hold companies accountable
whereas with the state there is the whole
challenge of finding the right legal
framework to limit their power, but maybe
I'll let Millie talk a little bit more
about this. Yeah, with our with our FOIA
request we tend to go after everyone so
with the example of the Home Office saying
something that the other police didn't
that was because we went to all the
different state bodies and I think that
there's a good example in in the states
where there's far more research done on
what the police are doing, but they're
using the same product in the UK I think
it's axiom and they're a storage device
for body-worn camera videos, and a lawyer
in the states said that in order to access
the video containing his client he had to
agree to the terms and condition on Axioms
website which basically gave them full use
of his clients video about a crime scene.
So that's a private company having use of
this video so given that we found they're
using it in the UK we don't know if those
kind of terms and conditions exist but
it's a very real problem as they rely
increasingly on private companies.
Herald: Number two please.
Q: Thank you for your work perhaps you've
already answered this partially from other
people's questions but it looks like we
have a great way to start the process and
kind of taking the power back but you know
the state and the system certainly doesn't
want to give up this much power, how do we
actually directly, what's kind of the
endgame, what's the strategies for making
the police or the government's give up and
restore balance, is it a suit, is it
challenging through Parliament and in the
slow process of democracy, or what do you
think is the right way of doing it?
A: I never think one works on its own,
even though I'm a litigator I often think
litigation is quite a weak tactic,
particularly if you don't have the public
on side, and then again if you don't have
Parliament. So we need all of them and
they can all come through different means
so we wouldn't just focus on one of the
different countries it might be that you
go down the legal route or the down the
parliamentary route but in the UK we're
trying all different routes so for example
on mobile phone extraction in the
beginning of next year we're going to be
doing a video we're going to be doing
interviewing the public and speaking to
them about it, we're going to be going to
Parliament, and I've also been speaking to
a lot of lawyers so I'm hoping some cases
will start because those individual cases
brought by local lawyers are where also
you see a lot of change like the John Cat
case, that's one lawyer, so I think we
need all different things to see what
works and what sticks.
Herald: We haven't had number three yet.
Q: Hi, thanks for the talk, so I have a
question regarding concerning the solution
side of things because one aspect I was
missing in your talk was the economics of
the game actually because like you are
from the UK and the private sector has
like stepped in also and another public
domain the NHS to help out because funds
are missing and I would like to ask you
whether or not you think first of all the
logic is the same within the police
departments because it might also be like
cost driven aspect to limit the salaries
or because you have the problem with
police force coming in because you have to
pay their rents and automated things
especially when I'm given to the private
sector which has another whole logic of
thinking about this stuff is cost saving
and so maybe it would be a nice thing
whether if you could talk a bit about the,
I'm sorry, the attempt to maybe like get
economics a bit more into the picture when
it comes to solutions of the whole thing.
A: So I think yeah, your very right in
pointing actually the relation, well that
you compare what's happening with the NHS
and what's happening with the police
because in both the economics of
companies offering policing services arise
from the same situation there's a need of
doing more efficient policing because of
budget cuts, so the same way the NHS is
being essentially privatized due to the
budget cuts and due to the to the needs
that arise from being limited in your
finance, again there's a similar thing
with the police when you when you're
understaffed then you're more likely to
rely on on technologies to help you do
your work more efficiently because
essentially with predictive policing the
idea behind this is that if you know where
and when crime will happen then you can
focus the limited resources you have there
and not sort of look at a more global
larger picture. So I mean I'm not gonna be
here on stage advocating for more funds
for the police, I'm not gonna do that, but
I think that there is there is a desperate
need to reframe actually the narrative
around how we do policing actually and
then definitely also look at a different
perspective and a different approach to
policing because as I've tried to show
it's been a really long time since this
narrative has developed of more data leads
to crime resolution but actually what I
didn't have the time to get into in this
talk is actually all the research that are
showing that those product actually don't
work like PREDPOL is actually basically
gaslighting a lot of police officers with
their figures, the kind of figures that
are pushing and suggesting are just like
plain inaccurate, it's not accurate to
compare a city on the one year to what a
city is becoming in another year so it's
not even clear that a lot of this
project are even like properly functioning
and in a sense I don't want them to
function I'm not gonna say if we had
better predictive policing then the
problem will be solved no that is not the
question, the question is how do we have
regulation that force the police to look
differently into the way they are
conducting policing.
Herald: Number four please.
Q: So, thank you for your presentation I
have a question about SOCMINT, my opinion
SOCMINT might violate the terms of
services of for example Twitter and
Facebook have you tried to cooperate with
these companies to make them actually
enforce their TOS?
A: So actually there is two things as I
said like all companies that are doing
scraping of data and you're right in this
case they violate the terms of services of
Facebook and Twitter. Now, the other
problem is that there is already a loop to
this and actually the marketing company I
was talking about that's being used by the
UK police what they essentially do is that
they purchase the data from Facebook and
Twitter, so this is why it's interesting
because when Facebook's say we don't sell
your data, well essentially actually with
marketing tools that are there to monitor
what people say about products essentially
what you're doing is selling your data,
they're not selling necessarily like your
name or your location or things like that
but whatever you're going to be posting
publicly for example in like groups or
public pages is something that they are
going to be trying to sell to those
companies. So I think you're right and
maybe Millie will have more to say about
this. I think those companies have a role
to play but at the moment I think the
challenge we face is actually this loop
that we're facing where by purchasing the
data directly from the company they don't
face any they don't violate the terms of
services. Yeah, we've spoken a bit to the
some of the social media companies, we've
been told that one of their big focuses is
the problems of the social media
monitoring at the U.S. border and so
because there's a lot known about that
they're looking at those issues so I think
once we show more and more the problems
say in the UK or in other countries I
think it would be very interesting to look
at what's happened over the Catalan
independence vote period to see how social
media was used then. I think the companies
aren't going to react until we make them
although they probably will meet with us.
A slightly different aspect we revealed in
a different part of our work that the
intelligence agencies were gathering
social media that's probably not
groundbreaking news but it was it was
there in plain fact and so they all got a
bit concerned about how that was
happening, whether some of them knew or
some of them didn't, so the better our
research the more people speaking about it
I think they will engage, or we'll find
out are they are the police getting it
lawfully or unlawfully.
Herald: Number one please.
Q: Thanks for your talk, I have a question
on predictive policing because German
authorities in the last two years piloted pre-cops
PREDPOL projects in three states I think
and they claimed that they would never use
these techniques with data on individuals
but only aggregate data like the new
repeat stuff you presented and they
presented as just an additional tool in
their toolbox and that if use responsibly
can lead to more cost effective policing,
do you buy this argument or would you say
that there's inevitably slippery slope or
kind of like a path dependency to more
granular data assessment or evaluation
that would inevitably infringe on privacy
rights?
A: I think this goes back to the question
of like you know are we using per
listening to identify where crime is
happening or who it is who's committing a
crime but actually I think even if we if
we stick to this even if we stick to
identifying where crime is happening we
still run into problems we still run into
the fundamental problem of predictive
policing which is we only have data on
crime that have already been reported ever
or already been addressed by the police,
and that's by essence already biased data.
If we have police in some areas then we're
more likely to, you know, further police
because the solution of those companies of
those algorithm will be leading to more
suggestions that crime is is happening
more predominantly in those areas. So, as
we've seen so far is that we fall into
these fundamental problems of just
overpolicing communities that are already
overpoliced. So in a sense in terms of
well the right to privacy but also the
question of the presumption of innocence I
think purely just having trying to
cultivate data on the where crime is
happening it's not efficient policing
first of all but it's also causing
challenges for fundamental rights as well.
Yeah, I guess it's not a great comparison
but what a lot of what they're bringing in
now is a program to assist you with the
charging decision, so you've got someone
you've arrested do you charge them or not?
The police say oh well of course it's only
advisory you only have to look at how busy
a police station is to know how advisory
is that going to be and how much is it
going to sway your opinion. So the more
you use these tools the more it makes your
job easier because rather than thinking,
where are we going to go, what areas
things going to happen, who are we going
to arrest, well the computer told us to do
this so let's just do that.
Herald: Thank you and microphone number
three please.
Q: Thank you, do you think that there are
any credible arguments to be made for
limiting the police's abilities under acts
in the UK that incorporate EU level
restrictions on privacy data protection
human rights or fundamental rights and if
so do you anticipate that those arguments
might change after brexit?
A: Well they they're bringing in GDPR and
the Law Enforcement Directive now and
they're not going to scrap those once
brexit comes in. We'll still be part,
hopefully, of the European Court of Human
Rights, but not the European Court of
Justice. I think there are going to be
implications it's going to be very
interesting how they play it out they're
still going to want the data from Europol,
they want to be part of Interpol, policing
operates at a different level and I think
if they have to comply with certain laws
so that they can play with the big boys
then they probably will, but they may do
things behind the scenes, so it depends
where it works for them, but certainly the
politicians and definitely the police
wanna be part of those groups. So we'll
have to see, but we will still use them
and we'll still rely on European judgments
the force they have in a court of law may
be more difficult.
Herald: Does the internet have any
questions, nope, well then number two
please.
Q: So you've mentioned that they don't
have really good operational security and
sometimes some stuff that should not leak
leaked now within the last year we had
major data leaks all across the world like
Philippines, South Africa, just to mention
a few, now if the, security, OPSEC is so
bad in the police in Great Britain it's
not unlikely that something will happen
in Europe of a similar kind what kind of
impact do you think such a huge data leak
of private information which the police
legally stored has even if it was not
leaked by the police and it would be leaked
by a private company that had some way
access to it?
A: I I guess it depends what it what it
is, if it's a database with serious
criminals and only the bad people, then
people will think when it's
good they have that information but they
need to make it more secure. If
somehow databases which held all sorts of
information say from people's mobile
phones, innocent people's pictures, all
that kind of thing then we might see a
much wider public reaction to the tools
that are used and the safeguards, the
legal safeguards, will come a lot quicker
than probably we will achieve in the way
we're trying to go now because there'll be
a bigger public outrage.
Herald: Okay one last and hopefully short
question from microphone one.
Q: Hi, thanks for the talk was really
interesting, it's actually quite a short
question how much is a Cellebrite, and can
we buy one?
A: I did look to buy one, I think there
were some on eBay but I'm sure if they
were like the right things but a couple of
thousand pounds, but I think you have to
actually be a police force to get those
ones, maybe there are other types but
it's expensive but not unobtainable, but
I'm trying to find universities that might
have them because I think that a lot of
forensic schools I'm hoping that they
will, I know they do extractions of
laptops but I haven't found one yet that
does phones but I probably haven't asked
enough people.
Herald: So thank you very much.
34C3 Music
subtitles created by c3subtitles.de
in the year 2020. Join, and help us!