You are on page 1of 21

EXCESS OF SECURITY

EU versus your privacy


Why?
 EU becomes a state with full own powers
 Shrinking of inner and outer security
 "Pooling" of authorities, secret services
 Data exchange more easy through programs
 "Proactive" policing and “border control”
 New institutions appear to serve EU purpose
 Social movements are considered as “threats”
EU new institutions
 "Police agency" Europol
 "Border Agency" Frontex
 European Gendarmerie Force
 Police academy CEPOL
 "Juristic collaboration" Eurojust
 Security research institutions
 Security partners
"Future Group"
 Minister Schäuble with former commissioner of
"Justice and Home Affairs", Frattini, founded
"Future Group"
 "Informal commitee" of ministers of interior
 Wrote wishlist for a five-year plan
The 5 year plan
 Fight against "Terrorism“
 Police collaboration
 Migration and asylum
 Border management
 Management of missions in "third states"
 Civil protection
 Information networks
 Merging of "internal and external security"
 Collaboration of inner and outer secret service
 Enlarging and standardization of police data bases
The 5 year plan
 Cross border remote search
 Control of internet
 Satellite surveillance
 "Risk analysis" via Software
 "e-borders"
 Common deportation flights and planes
 Refugee camps in "third states“
 The “Stockholm Programme”
The Stockholm Programme
 Starting December 2009
 Main target is collecting, processing and
sharing data between agencies on EU level
against migration and crime
 Creates legal premises for a high-tech “fortress
Europe”
 Information is stored in internationalized data
bases, accessible from both police and secret
service agencies all over EU
Internationalized data bases
 SIS I+, SIS II, SIReNE
 “Supplementary Information Request at the National
Entry” and Schengen Informational System
 Network of national databases which are identical +
central support unit in Strasbourg (updates all other
national SIS systems on new entry)
 Search system for objects and persons (car, bank
notes, weapons; persons, network analysis)
 On alert SIRENE network is contacted
 Aim to include as much law enforcement agents as
possible
Internationalized data bases
 EURODAC
 Mainly targeting migrants
 Fingerprinting of all migrants
 Prevent “asylum shopping”
 Shift to criminal records and (after Lisbon) opens to
police access
 In 2008, EURODAC processed 219.557 sets of
fingerprints of asylum seekers, 61.945 sets of
fingerprints of people crossing the borders irregularly
and 75.919 sets of fingerprints of people apprehended
while illegally staying on the territory of a Member
State
Tech changes
 Digital surveillance
 Biometrics
 Satellites
 Drones
 Software for "data mining"
 Broadband networks for masses of data
 "non lethal weapons"
Security Research
 Automatic Detection of Abnormal Behaviour
and Threats in crowded Spaces
 Surveillance of Unattended Baggage and the
Identification and Tracking of the Owner
 Suspicious and Abnormal behaviour
Monitoring Using a Network of Cameras &
sensors for Situation awareness enhancement
 Autonomous Maritime Surveillance System
Border Control
 Extending Eurosur (border control system) and Frontex
to more than Mediteranean
 Drones and air suport cameras, Satelites
 Detention centers within or out of EU
bordersFlüchtlingsbekämpfung (Angela Merkel)
 BORDERPOL - international multidisciplinary border
security organization, governed by its member border
services and supported by industry. Created in 2003, it
facilitates international border security co-operation,
and supports all international organizations, national
border authorities and services whose mission is to
detect and deter border related crime.
Training Days (Frontex)
 Continuous growth in numbers:
Operational Days (Frontex)
 Continuous growth in numbers:
Prevention logic of EU
 Fight against terrorism also with Swift
 Crime Informational System ECRIS
 Crime Prevention Network EUCPN
 EU-wide legal premises to make all
informational channels (internet, social
networks, e-mail, phone, mobile etc.)
recordable and usable by police and
intelligence services
What can be done?
 Comprehensive approach of social movements
 Intervene in discussion about "balancing
freedom and security“
 Adressing police databases of the EU (Their
targets: migrants, summit protestors,
"Hooligans", crime suspects and their friends)
and encouraging to exercise right to access
(Reclaim your data!)
 Anonymous / encripted usage of IT&C
Freiburg Programme
 A five year plan on deviant behaviour, creating a
European space of freedom, anti-capitalism and
rebellion
 European wide network „out of control“ created in
2009 with the purpose of a cross-border collaboration
of activists against a European security architecture
 focus on police collaboration and databases, policing
crowds at large events such as summit protests, the
security industry and security research as well as EU-
wide treaties which endanger civil liberties all over the
world
Freiburg Programme
 we reviewed European level actors, such as the European
Commission, its agencies Frontex, Europol and the European
Gendarmerie Force EUROGENDFOR, and looked at strategies
like the „Stockholm Programme“, the Lisbon Treaty, the
scheduled „internal security strategy“ and the merging of
police, military and intelligence.
 we also focused on various European companies that provide
this apparatus with ever new technical gadgets
 we discussed the radical changes which accompany the
merging of internal and external security and its forces, shifting
towards a database society, whilst also pushing the will to
enhance surveillance and improve control by technical means
Freiburg Programme
 long-term analysis and collaboration in various
forms of protest and resistance
 The idea of the five year “Freiburg
Programme” was born.
 Decisions on a European level need some time
for their national implementation in the 27
member states, we want to be prepared and
launch actions as early as possible
 Network „out of control“
http://outofcontrol.noblogs.org
Securing your Phone Communications
 Open Mobile Technologies (Linux and android phones)
and Open Source programs
 CryptoSMS.org is a GPL (general public license) open
source application for cell phones running J2ME (Java for
mobiles). CryptoSMS provides public/private key
encryption, key generation
and key management. It sends and receives encrypted SMS
and public keys, encrypts and de-encrypts files, offers key
verification via fingerprints and provides a secure login.
 It encrypts only the contents of the messages, but does not
in any way encrypt or scramble the identities of the sender
or recipients
Securing your Internet Communications
 Usage of Proxy-servers
 MAC changers (like MadMAC)
 Pre-paid internet cards, mobile internet
 Encripted e-mails:
 Thunderbird Enigmail , Freenigma.com - PGP
 Encripted files and folders on your computer
 Manage browsers NOT to store information
 SSD.eff.org - Survaillance Self Defence Page

You might also like