Why? EU becomes a state with full own powers Shrinking of inner and outer security "Pooling" of authorities, secret services Data exchange more easy through programs "Proactive" policing and “border control” New institutions appear to serve EU purpose Social movements are considered as “threats” EU new institutions "Police agency" Europol "Border Agency" Frontex European Gendarmerie Force Police academy CEPOL "Juristic collaboration" Eurojust Security research institutions Security partners "Future Group" Minister Schäuble with former commissioner of "Justice and Home Affairs", Frattini, founded "Future Group" "Informal commitee" of ministers of interior Wrote wishlist for a five-year plan The 5 year plan Fight against "Terrorism“ Police collaboration Migration and asylum Border management Management of missions in "third states" Civil protection Information networks Merging of "internal and external security" Collaboration of inner and outer secret service Enlarging and standardization of police data bases The 5 year plan Cross border remote search Control of internet Satellite surveillance "Risk analysis" via Software "e-borders" Common deportation flights and planes Refugee camps in "third states“ The “Stockholm Programme” The Stockholm Programme Starting December 2009 Main target is collecting, processing and sharing data between agencies on EU level against migration and crime Creates legal premises for a high-tech “fortress Europe” Information is stored in internationalized data bases, accessible from both police and secret service agencies all over EU Internationalized data bases SIS I+, SIS II, SIReNE “Supplementary Information Request at the National Entry” and Schengen Informational System Network of national databases which are identical + central support unit in Strasbourg (updates all other national SIS systems on new entry) Search system for objects and persons (car, bank notes, weapons; persons, network analysis) On alert SIRENE network is contacted Aim to include as much law enforcement agents as possible Internationalized data bases EURODAC Mainly targeting migrants Fingerprinting of all migrants Prevent “asylum shopping” Shift to criminal records and (after Lisbon) opens to police access In 2008, EURODAC processed 219.557 sets of fingerprints of asylum seekers, 61.945 sets of fingerprints of people crossing the borders irregularly and 75.919 sets of fingerprints of people apprehended while illegally staying on the territory of a Member State Tech changes Digital surveillance Biometrics Satellites Drones Software for "data mining" Broadband networks for masses of data "non lethal weapons" Security Research Automatic Detection of Abnormal Behaviour and Threats in crowded Spaces Surveillance of Unattended Baggage and the Identification and Tracking of the Owner Suspicious and Abnormal behaviour Monitoring Using a Network of Cameras & sensors for Situation awareness enhancement Autonomous Maritime Surveillance System Border Control Extending Eurosur (border control system) and Frontex to more than Mediteranean Drones and air suport cameras, Satelites Detention centers within or out of EU bordersFlüchtlingsbekämpfung (Angela Merkel) BORDERPOL - international multidisciplinary border security organization, governed by its member border services and supported by industry. Created in 2003, it facilitates international border security co-operation, and supports all international organizations, national border authorities and services whose mission is to detect and deter border related crime. Training Days (Frontex) Continuous growth in numbers: Operational Days (Frontex) Continuous growth in numbers: Prevention logic of EU Fight against terrorism also with Swift Crime Informational System ECRIS Crime Prevention Network EUCPN EU-wide legal premises to make all informational channels (internet, social networks, e-mail, phone, mobile etc.) recordable and usable by police and intelligence services What can be done? Comprehensive approach of social movements Intervene in discussion about "balancing freedom and security“ Adressing police databases of the EU (Their targets: migrants, summit protestors, "Hooligans", crime suspects and their friends) and encouraging to exercise right to access (Reclaim your data!) Anonymous / encripted usage of IT&C Freiburg Programme A five year plan on deviant behaviour, creating a European space of freedom, anti-capitalism and rebellion European wide network „out of control“ created in 2009 with the purpose of a cross-border collaboration of activists against a European security architecture focus on police collaboration and databases, policing crowds at large events such as summit protests, the security industry and security research as well as EU- wide treaties which endanger civil liberties all over the world Freiburg Programme we reviewed European level actors, such as the European Commission, its agencies Frontex, Europol and the European Gendarmerie Force EUROGENDFOR, and looked at strategies like the „Stockholm Programme“, the Lisbon Treaty, the scheduled „internal security strategy“ and the merging of police, military and intelligence. we also focused on various European companies that provide this apparatus with ever new technical gadgets we discussed the radical changes which accompany the merging of internal and external security and its forces, shifting towards a database society, whilst also pushing the will to enhance surveillance and improve control by technical means Freiburg Programme long-term analysis and collaboration in various forms of protest and resistance The idea of the five year “Freiburg Programme” was born. Decisions on a European level need some time for their national implementation in the 27 member states, we want to be prepared and launch actions as early as possible Network „out of control“ http://outofcontrol.noblogs.org Securing your Phone Communications Open Mobile Technologies (Linux and android phones) and Open Source programs CryptoSMS.org is a GPL (general public license) open source application for cell phones running J2ME (Java for mobiles). CryptoSMS provides public/private key encryption, key generation and key management. It sends and receives encrypted SMS and public keys, encrypts and de-encrypts files, offers key verification via fingerprints and provides a secure login. It encrypts only the contents of the messages, but does not in any way encrypt or scramble the identities of the sender or recipients Securing your Internet Communications Usage of Proxy-servers MAC changers (like MadMAC) Pre-paid internet cards, mobile internet Encripted e-mails: Thunderbird Enigmail , Freenigma.com - PGP Encripted files and folders on your computer Manage browsers NOT to store information SSD.eff.org - Survaillance Self Defence Page