scispace - formally typeset
Search or ask a question
Journal ArticleDOI

Beyond the security paradox: Ten criteria for a socially informed security policy:

TL;DR: The analysis identifies 10 criteria, generated by citizens themselves, for a socially informed security policy that reveal the conditions, purposes and operation rules that would make current European security policies and technologies more consistent with citizens’ priorities.
Abstract: This article investigates the normative and procedural criteria adopted by European citizens to assess the acceptability of surveillance-oriented security technologies. It draws on qualitative data...

Summary (4 min read)

Introduction

  • Over the past twenty years, but especially since 9/11, security policies in western societies have increasingly adopted pre-emptive measures which are reliant on SurveillanceOriented Security Technologies .
  • The present article tries to overcome these shortcomings by applying an adapted version of a specific type of public engagement method, the citizen summit (Bedsted et al. 2011).
  • Furthermore, in spite of producing more evidence of a security paradox (Eurobarometer 2015) the qualitative methods deployed by the paper demonstrate that there is more to be understood in relation to citizen assessments of SOSTs.
  • From the analysis of the qualitative data gathered across the twelve citizen summits, a set of common criteria emerged.

Normative criteria

  • The acceptability of SOSTs was often linked to the normative context in which the technologies are operated.
  • National and international regulations, transparency and private-public separation were fundamental criteria used by the large majority of participants to say how SOSTs should be managed.

Transparency and accountability

  • Many participants perceived that SOSTs are used in situations in which information, transparency and responsibility are poor or missing.
  • They suggested that SOSTs should only be introduced after providing detailed and accessible information about operation modes, operators, rules, domains and purposes to the public: “the use of SOSTs is opaque, responsible authorities are not known to the public.
  • Several groups made a concrete suggestion to create a “My page”, where one can see a list of everyone who have stored your personal data, and a log of when it is used.
  • Such action would help ensure that clear responsibilities could be identified when things go wrong: “Transparency here is absolutely essential: people want to know what data are being collected, who is responsible for them and what purposes they are intended for” [Swiss National Report, p. 36].
  • Furthermore, surveillance technologies should only be used when it is necessary: “evidence is needed before initiating surveillance and greater transparency from companies and authorities on what the surveillance is used for” [Recommendation, Danish Citizen Summit].

Public-private separation

  • Transparency of operations and international regulations were deemed crucial but not sufficient requirements.
  • The involvement of private actors in security operations and in the management and use of SOSTs generated particular anxiety (Zedner, 2006).
  • They suggested the establishment of such bodies on an international or European level 8 [Norwegian National Report, p. 26].
  • The outsourcing of the security function to private firms was considered especially problematic: “No security services should be outsourced to private companies!” [Postcard, UK Citizen Summit].
  • In circumstances where the involvement of private actors is absolutely necessary, stricter requirements were considered necessary to ensure transparency and accountability.

Data protection criteria

  • Characterised by high 8 Effectively, European and National security agencies have to comply with the new European Directive on Data Protection (2016).
  • Level of secrecy, they considered necessary to inform the public about how security agencies operate and respect people’s rights.
  • Information on how data protection rights, for instance, are safeguarded during police investigation can help diminish citizens’ concerns about the data privacy.
  • The purpose and conditions under which people’s data were processed in security investigations represented a very relevant and controversial theme.
  • Blanket surveillance was especially criticised not only for its impact on privacy and human rights, but also for its effectiveness.

Purpose limitation

  • SOSTs should not be used for operating mass government surveillance, but only for targeting clearly defined threats and within the scope of specific investigations.
  • “Participants argued towards more control of surveillance activities and the demand for justified reasons for surveillance in order to target real suspects and criminals instead of the general public” [Austria National Report, p.33].
  • Mass surveillance was considered detrimental as it undermines citizens’ perceived safety and their trust in security operators.
  • “By vast dragnet surveillance activities of governmental institutions, the trust in the state would get undermined because citizens perceive themselves subjected to a blanket suspicion.
  • Broad surveillance measures involving large parts of the population are seen as disproportionate function or mission creep” [German National Report, p.31].

Data collection limitation

  • Concerns were expressed on the type of data gathered.
  • Some types of data, such as those related to location or bodily appearance, were considered less sensitive than others, such as those related to personal communication.
  • Whenever possible, it was argued, security actions should target the least sensitive data in the least sensitive spaces, as this comment reveals: “[a]t some tables participants expressed that they found location as a less sensitive type of data than for example the content of their communication, which can be accessed through deep packet inspection” [Norway National Report p. 28].
  • Thus, the implementation of basic data management norms, such as EU data protection principles, was recognised by citizens as an important criterium determining the acceptability of SOSTs.
  • “We need clear rules concerning the limits on use and collection of personal data by technological means.the authors.

Technology deployment criteria

  • Concerns about the ways in which technologies are designed and deployed were also addressed by citizens.
  • The cost of developing and implementing new surveillance devices was a highly relevant issue, which was discussed in conjunction with themes related to alternative security measures and solutions to complement or improve SOSTs, such as the adoption of privacy-by-design principles in the design phase.

Cost-effectiveness

  • Since tax payers’ money is involved in the acquisition and deployment of SOSTs, it is not surprising that participants wanted to receive more information about the appropriateness, costs and impact of SOSTs: “I have no problems with smart CCTV but the use of it, the running costs, the legitimacy and the effectiveness of it needs to be carefully monitored.
  • And the watchers made accountable” [Postcard, UK Citizen Summit].
  • As most of these technologies are developed, implemented and operated by public institutions, the presentation of exhaustive cost-benefit analyses was considered absolutely necessary—.
  • Very concerned about the future” (UK postcard).
  • Others pointed out that SOSTs need to be supervised and operated by qualified staff—“maintaining the human factor, that is to say, not replacing humans for robots in processes and their uses” (Spanish recommendation).

Alternative security approaches

  • In designing new security solutions, social, cultural and economic causes of crime and terrorism should never be forgotten (UN, 2007), and humans should be considered part of the solutions, not only part of the problem—in terms of, for example, criminals or suspects.
  • Participants also suggested that SOSTs should be used to support, not to replace, the work of human operators.
  • Right to access, modify and delete data … they allow monitored individuals to access, modify and remove their own data.
  • Whilst their purposes may change, these changes need to be explicitly discussed and publicly approved.
  • Non-technological alternatives and security measures not based on surveillance … they work and operate in combination with non-technological measures and social strategies addressing the social and economic causes of insecurity.

5. Conclusion

  • Increasing reliance on security policies that use SOSTs has sparked lively debate about their acceptance.
  • DREWER, D. Europol’s data protection framework as an asset in the fight against cybercrime.
  • Engaging with science and technology in contemporary Europe, also known as Public deliberation and governance.
  • The European Union and the securitization of migration.

Did you find this useful? Give us your feedback

Content maybe subject to copyright    Report

1
INDICATIVE VERSION: DO NOT CITE WITHOUT PERMISSION
FROM THE AUTHORS
Beyond the security paradox: ten criteria for a socially informed
security policy
Abstract
This paper investigates the normative and procedural criteria adopted by European
citizens to assess the acceptability of surveillance technologies. It draws on qualitative
data gathered at twelve citizen summits in nine European countries. The analysis
identifies ten criteria, generated by citizens themselves, for a socially informed security
policy. These criteria not only reveal the conditions, purposes and operation rules that
would make current European security policies and technologies more consistent with
citizens’ priorities. They also cast light on an interesting paradox: although people feel
safe in their daily lives, they believe security could, and should, be improved.
Keywords
Public engagement, surveillance technology, security, privacy preference

2
Introduction
Over the past twenty years, but especially since 9/11, security policies in western societies
have increasingly adopted pre-emptive measures which are reliant on Surveillance-
Oriented Security Technologies (SOSTs). This shift has had controversial consequences,
with scholars highlighting a variety of concerns they associate with pre-emptive security
and surveillance practices (Hoijtink, 2014, De Goede, 2014, De Goede and Randalls,
2009). As new SOSTs facilitate the collection, storage, processing and combination of
personal data by security agencies and commercial organizations, their impact on
established civil and political rights (Friedewald et al., 2010), social sorting (Strauß and
Nentwich, 2013, Lyon, 2007a), and on individual privacy (Lyon, 2002)
1
has been
criticized.
With so many concerns raised by technologies over which citizens have little
control, it would be reasonable to expect Public Engagement with Science (PES) studies
to have scrutinised how people assess these technologies and their implementation.
However, SOSTs have so far received relatively little attention (Martin and Donovan,
2014, Pavone and Degli Esposti, 2012). Inspired by an unquestioned acceptance of the
trade-off between privacy and security, early studies tend instead to consider the extent
to which citizens are willing to trade their privacy in exchange for greater security
(Bowyer, 2004, Jain et al., 2005, Strickland and Hunt, 2005). More recent studies have
focused on the decision-making process involved in the development and implementation
1
Many of these concerns have been recently confirmed by the scandals and abuses revealed by
whistleblowers like Assange, Snowden and Manning in LANDAU, S. 2013. Making sense from
Snowden: What's significant in the NSA surveillance revelations. IEEE Security & Privacy, 54-63,
LYON, D. 2014. Surveillance, snowden, and big data: capacities, consequences, critique. Big Data &
Society, 1, 2053951714541861, BAUMAN, Z., BIGO, D., ESTEVES, P., GUILD, E., JABRI, V.,
LYON, D. & WALKER, R. B. 2014. After Snowden: Rethinking the impact of surveillance.
International political sociology, 8, 121-144.

3
of SOSTs (Hempel et al., 2013, van Lieshout et al., 2013, Wright and Friedewald, 2013,
Wright et al., 2014, Michael Friedewald et al., 2017).
The present study hopes to contribute to this line of inquiry by focusing on an
interesting paradox: although people feel safe in their daily lives, they believe security
could, and should, be improved. Evidence of this paradox can be found in Eurobarometer
432Europeans’ attitudes towards security (EC, 2015). The report indicates that,
although the large majority of respondents consider their countries secure places (89
percent; n = 28,082), and agree on saying that their immediate neighbourhood, city, town
or village are safe places to live in (82 percent), a large percentage of them think that
security agencies are not doing enough to fight crimes such as corruption (52 percent),
human trafficking (47 percent), money laundering (46 percent), drug trafficking (41
percent), or cybercrime (40 percent), and that citizens (79 percent) and citizens
associations (64 percent) could also help and play a role in safeguarding public security.
Furthermore, the majority of European citizens (55 percent) consider that fundamental
rights and freedoms have been restricted as a result of current security policies. This
negative perception of the effect of security policies on individual freedoms seems to be
worse in 2015 than it was in 2011, when only 48 percent considered their liberties to have
been restricted for reasons related to the fight of crime and terrorism (EC, 2014). These
findings seem to suggest that current security policies and solutions are somehow
perceived as inadequate by citizens, whose demands, opinions and perceptions need to be
further explored and included in future security policies. In pursuing this objective, PES
studies can stimulate productive and insightful discussion about the politics and purposes
of science and technology (Stirling, 2008). They also have a role in producing new and
socially responsible knowledge that can underpin innovation (Owen et al., 2012),

4
governance (Macnaghten and Chilvers, 2014) and policy-making (Jasanoff, 2003,
Hagendijk and Irwin, 2006).
Through the adoption of an adapted version of the citizen summit methodology,
this paper analyses the multiple ways in which citizens interpret security and privacy and
assess and evaluate SOSTs. Drawing from qualitative data gathered at twelve citizen
summits in nine European countries, this article presents ten general criteria used by
citizens to assess the adequacy of SOSTs. On the one hand, the analysis confirms the
appropriateness of policy actions undertaken in the area of data protection; on the other
hand, it also suggests alternative normative and procedural principles, which could be
adopted in the design, deployment and management of security technologies and that can
increase the acceptability of future security solutions.
Exploring SOSTs from a public engagement perspective
Over the past twenty years, the concept of security has undergone multiple
reformulations. It has shifted from territorial integrity and national sovereignty to human
security and, after 9/11, to a new concept of homeland security. New security policies
have particularly encouraged pre-emptive security measures, enacted through the
development of data-intensive security technologies and public-private security
collaboration. These measures have been introduced within policy frameworks which
justify the restriction of individual privacy and freedom; a matter of political concern
(Beck and Lau, 2005, Richards, 2012, Cohen, 2014, Lyon, 2007b, Lyon, 2013,
Friedewald et al., 2010). Some scholars argue that new holistic security policies suffer
from a democratic deficit (Zwolski, 2012, Eriksen et al., 2003, Tonra, 2011); they aslo
tend to reduce democratic scrutiny in other policy domains by framing social problems

5
as security problems (Huysmans, 2006, Huysmans, 2000, Loader, 2002, Balzacq, 2010,
Balzacq, 2008). Several studies have shown how the security agenda increasingly
constructs migration, crime and social integration as existential threats, addressing them
in very narrow security terms and shifting attention away from the role played by social,
political and economic factors (Léonard, 2010, Karyotis, 2011, Boswell, 2007, Dover,
2008).
Security solutions which rely heavily on digital surveillance have been especially
criticized for different reasons. First, they privilege pre-emptive approaches based on
pattern discovery over forms of targeted and historically motivated tracking (Lyon, 2014).
Furthermore, their impact on crime reduction is contested (Welsh et al., 2015) and can
encourage crime displacement (Johnson et al., 2012). Finally, more recent studies of
privacy concerns demonstrate that most people feel resigned and powerless when
confronted with the current reality of mass dataveillance (Degli Esposti, 2014, Turow et
al., 2015).
Despite the relevancy of the topic and the need to investigate public perceptions of
security technologies, most studies in the area suffer the limitations of having replicated
policymaker discourses concerning the existence of a trade-off between privacy and
security (Strickland and Hunt, 2005). In framing security and privacy as interchangeable
goods, these studies have not explored, for instance, whether security technologies
actually address citizens’ security needs and priorities (Jain et al., 2005), how privacy is
conceptualized, or whether citizens actually frame the latter in opposition to security
(Strickland and Hunt, 2005). Furthermore, these studies have contributed to perpetuate
security policies that considerably reduce privacy without offering significant gains in
security (Mitchener-Nissen, 2014, Pavone et al., 2016). In fact, studies based on the

Citations
More filters
01 Jan 2018
TL;DR: The conferencia "Les politiques d'Open Data / Open Acces: Implicacions a la recerca" orientada a investigadors i gestors de projectes europeus que va tenir lloc el 20 de setembre de 2018 a la Universitat Autonoma de Barcelona.
Abstract: Presentacio sobre l'Oficina de Proteccio de Dades Personals de la UAB i la politica Open Science. Va formar part de la conferencia "Les politiques d'Open Data / Open Acces: Implicacions a la recerca" orientada a investigadors i gestors de projectes europeus que va tenir lloc el 20 de setembre de 2018 a la Universitat Autonoma de Barcelona

665 citations

Journal ArticleDOI
TL;DR: In this article, the authors provide empirical research about the perspectives of citizens of Rotterdam, the Netherlands, on the emergent phenomenon of smart urban safety, which advocates advanced uses of digital technologies and data for urban safety management, and is gaining currency in thinking about urban futures.

15 citations

Journal ArticleDOI
TL;DR: Analyzing the recent investigation of public views on biobanking in the form of citizen-expert panels in the Austrian infrastructure of biobanks (BBMRI), this article traces this dynamic through citizens’ recurrent concerns that the research and consent practices related to biobank should be “appropriate.”
Abstract: While there is consensus on the essential importance of public engagement in further developments of biobanking, the related investigation of public views predominantly focused on the concerns expressed by the publics, and the concrete format of public engagement, without delving into the ways these concerns are constituted. In this paper, we synthetize recent research on public engagement in order to describe the constitution of respective concerns as ‘engagement of knowledges’. By shifting from ‘publics’ to ‘knowledges’, we draw attention to the interaction dynamic through which citizens embed the new knowledge they receive during expert interactions into the stock of knowledge they already possess. Analyzing our recent investigation of public views on biobanking in the form of citizen-expert panels (CEPs) in the Austrian infrastructure of biobanks (BBMRI.at), we trace this dynamic through citizens’ recurrent concerns that the research and consent practices related to biobanking should be “appropriate”.

15 citations


Cites background from "Beyond the security paradox: Ten cr..."

  • ...…for informed consent procedures, such an approach can help us follow the process of production of knowledge and its being sustained in a particular set of attitudes within a collective (as show Veenstra and Burnett (2014) for health practices, Pavone et al. (2017) for security practices)....

    [...]

  • ...On the other hand, the demand for security necessarily enhances the role of trust in the experts (as shown also by Pavone et al., 2017)....

    [...]

Journal ArticleDOI
TL;DR: Lazaridis et al. as discussed by the authors described the security, insecurity, and migration in Europe as a result of an international conference hosted by the Unesco.
Abstract: Gabriella Lazaridis (ed.), SECURITY, INSECURITY AND MIGRATION IN EUROPE, Farnham: Ashgate, 2011, 328 pp., £65.00 (hard) This book emerged as a result of an international conference hosted by the Un...

11 citations

References
More filters
Book
01 Jan 2006
TL;DR: The book critically engages with theoretical developments in international relations and security studies to develop a fresh conceptual framework for studying security.
Abstract: The book critically engages with theoretical developments in international relations and security studies to develop a fresh conceptual framework for studying security. Contents 1. Politics of insecurity, technology and the political 2. Security framing: the question of the meaning of security 3. Displacing the spectre of the state in security studies: From referent objects to techniques of government 4. Securitizing migration: Freedom from existential threats and the constitution of insecure communities 5. European integration and societal insecurity 6. Freedom and security in the EU: A Foucaultian view on spill-over 7. Migration, securitization and the question of political community in the EU 8. De-securitizing migration: Security knowledge and concepts of the political 9. Conclusion: the politics of framing insecurity

921 citations


"Beyond the security paradox: Ten cr..." refers background in this paper

  • ...…that new holistic security policies suffer from a democratic deficit (Eriksen et al., 2003; Tonra, 2011; Zwolski, 2012); they also tend to reduce democratic scrutiny in other policy domains by framing social problems as security problems (Balzacq, 2008, 2010; Huysmans, 2000, 2006; Loader, 2002)....

    [...]

Book
16 Dec 1993
TL;DR: In this paper, the authors present a survey of surveillance in modern society, focusing on body, soul, and credit card, and discuss counter-surveillance, privacy, power, and persons.
Abstract: Preface and Acknowledgements. Part I: Situating Surveillance:. 1. Introduction: Body, Soul and Credit Card. 2. Surveillance in Modern Society. 3. New Surveillance Technologies. 4. From Big Brother to the Electronic Panopticon. Part II: Surveillance Trends:. 5. The Surveillance State: Keeping Tabs on You. 6. The Surveillance State: From Tabs to Tags. 7. The Transparent Worker. 8. The Targetted Consumer. Part III: Counter--Surveillance:. 9. Challenging Surveillance. 10. Privacy, Power, Persons. 11. Against Dystopia, Distance, Division. 12. Beyond Postmodern Paranoia. Bibliography. Index.

873 citations


"Beyond the security paradox: Ten cr..." refers background in this paper

  • ...These measures have been introduced within policy frameworks which justify the restriction of individual privacy and freedom – a matter of political concern (Beck and Lau, 2005; Cohen, 2014; Friedewald et al., 2010; Lyon, 1994, 2007a; Richards, 2012)....

    [...]

Book
30 Jul 2007
TL;DR: The Watched World Today as discussed by the authors is a collection of articles about the surveillance of people in the world, including the following: 1. The Watched world today; 2. Spreading Surveillance Sites; 3. Explaining Surveillance; 4. Information, Identification, Inventory; 5. Security, Suspicion, Social Sorting; 6. Bodies, Borders, Biometrics; 7. Visibility; 8. Struggles over Surveillance; 9. Data, Discrimination, Dignity; 10.
Abstract: * Contents * Preface and Acknowledgments * Introduction * Part I Viewpoints *1. The Watched World Today *2. Spreading Surveillance Sites *3. Explaining Surveillance * Part II Vision *4. Information, Identification, Inventory *5. Security, Suspicion, Social Sorting *6. Bodies, Borders, Biometrics * Part III Visibility *7. Surveillance, Visibility and Popular Culture *8. Struggles over Surveillance *9. Data, Discrimination, Dignity * Glossary * Further Reading * Bibliography * Index

821 citations


"Beyond the security paradox: Ten cr..." refers background in this paper

  • ...…processing and combination of personal data by security agencies and commercial organisations, their impact on established civil and political rights (Friedewald et al., 2010), social sorting (Lyon, 2007b; Strauss and Nentwich, 2013) and individual privacy (Lyon, 2002)1 has been criticised....

    [...]

  • ...These measures have been introduced within policy frameworks which justify the restriction of individual privacy and freedom – a matter of political concern (Beck and Lau, 2005; Cohen, 2014; Friedewald et al., 2010; Lyon, 1994, 2007a; Richards, 2012)....

    [...]

01 Jan 2018
TL;DR: The conferencia "Les politiques d'Open Data / Open Acces: Implicacions a la recerca" orientada a investigadors i gestors de projectes europeus que va tenir lloc el 20 de setembre de 2018 a la Universitat Autonoma de Barcelona.
Abstract: Presentacio sobre l'Oficina de Proteccio de Dades Personals de la UAB i la politica Open Science. Va formar part de la conferencia "Les politiques d'Open Data / Open Acces: Implicacions a la recerca" orientada a investigadors i gestors de projectes europeus que va tenir lloc el 20 de setembre de 2018 a la Universitat Autonoma de Barcelona

665 citations

Journal ArticleDOI
David Lyon1
TL;DR: Big Data intensifies certain surveillance trends associated with information technology and networks, and is thus implicated in fresh but fluid configurations, and the ethical turn becomes more urgent as a mode of critique.
Abstract: The Snowden revelations about National Security Agency surveillance, starting in 2013, along with the ambiguous complicity of internet companies and the international controversies that followed pr...

513 citations


"Beyond the security paradox: Ten cr..." refers background in this paper

  • ...Many of these concerns have been recently confirmed by the scandals and abuses revealed by whistleblowers such as Assange, Snowden and Manning in Landau (2013), Lyon (2014) and Bauman et al. (2014)....

    [...]

  • ...First, they privilege pre-emptive approaches based on pattern discovery over forms of targeted and historically motivated tracking (Lyon, 2014)....

    [...]

Frequently Asked Questions (12)
Q1. What are the contributions in "Indicative version: do not cite without permission from the authors beyond the security paradox: ten criteria for a socially informed security policy" ?

This paper investigates the normative and procedural criteria adopted by European citizens to assess the acceptability of surveillance technologies. 

The future of science governance: publics, policies, practices. Failure to collectively assess surveillance-oriented security technologies will inevitably lead to an absolute surveillance society. The potential of public participation to facilitate infrastructure decision-making: Lessons from the German and European legal planning system for electricity grid expansion. 

National and international regulations, transparency and private-public separation were fundamental criteria used by the large majority of participants to say how SOSTs should be managed. 

New security policies have particularly encouraged pre-emptive security measures, enacted through the development of data-intensive security technologies and public-private security collaboration. 

As a result of the increasing surveillance and of the progressive restriction of civil rights triggered by pre-emptive security polices based on SOSTs, several scholars have warned about the implications for democracy and for personal privacy. 

the majority of European citizens (55 percent) consider that fundamental rights and freedoms have been restricted as a result of current security policies. 

Utilities Policy, 42, 64-73.STIRLING, A. 2008. “Opening up” and “closing down” power, participation, and pluralism in the social appraisal of technology. 

Participants in Switzerland, Germany and Austria tended to frame privacy as a right to be left alone, as expressed by a note-taker in Germany: “citizens feel a chilling effect on their behaviour, deriving from the wish to be left alone. 

The idea of privacy-by-design (Cavoukian, 2011) was mentioned as a possible solution to design privacy-preserving SOSTs and, thus, protect citizens’ privacy: “the concept of “privacy by design” was mentioned, hoping that future technology developers would use their knowledge to increase privacy, instead of increasing surveillance” [Norway National Report, p. 23]. 

Through the adoption of an adapted version of the citizen summit methodology,this paper analyses the multiple ways in which citizens interpret security and privacy and assess and evaluate SOSTs. 

As new SOSTs facilitate the collection, storage, processing and combination of personal data by security agencies and commercial organizations, their impact on established civil and political rights (Friedewald et al., 2010), social sorting (Strauß and Nentwich, 2013, Lyon, 2007a), and on individual privacy (Lyon, 2002) 1 has been criticized. 

Despite these limitations, their study makes an important contribution to shed light on citizens’ perceptions of SOSTs and confirms the important role that participative exercises can play in increasing their understanding of how people frame complex policy issues.