cover image: Introducing privacy-protective surveillance

Premium

20.500.12592/sz0rtw

Introducing privacy-protective surveillance

31 Dec 2013

Above all, privacy – as the ability of individuals to control the collection, use, and disclosure of information about themselves – deserves the strongest protection, since it forms the basis of many of our freedoms. [...] In the Canadian context, the Commissioner noted that in giving such sweeping power to the state, “… the public risk[s] being le out of the decision- making process, and Canadians risk seeing TSPs transformed into agents of the state. [...] It is this probability inference that will, in part, be used by the court to decide whether or not to issue the encryption key to decipher the identity of the individual in question. [...] Furthermore, the detection of a single feature may not, in and of itself, be su cient to justify the disclosure of an individual’s personal information to the authorities on the grounds of counter-terrorism. [...] With these, one can at least here that analysis and linking of the data and test not only the fact, but the strength of the the resulting inferred probability and decisions encryption used by PPS agents.
government politics internet crime science and technology terrorism computer security counter-terrorism electronic surveillance law mathematics national security database cryptography surveillance network computing and information technology computing technology and engineering cyberwarfare privacy, right of analytics encryption data mining bill c-30 key public key homomorphic encryption espionage techniques

Authors

Cavoukian, Ann, El Emam, Khaled

Pages
32
Published in
Ottawa, Ontario

Related Topics

All