Sie sind auf Seite 1von 78
International Campaign Against Mass Surveillance THE EMERGENCE OF A GLOBAL INFRASTRUCTURE FOR MASS REGISTRATION AND
International Campaign Against Mass Surveillance THE EMERGENCE OF A GLOBAL INFRASTRUCTURE FOR MASS REGISTRATION AND
International Campaign Against Mass Surveillance THE EMERGENCE OF A GLOBAL INFRASTRUCTURE FOR MASS REGISTRATION AND

International Campaign Against Mass Surveillance

International Campaign Against Mass Surveillance

THE EMERGENCE OF A GLOBAL INFRASTRUCTURE FOR MASS REGISTRATION AND SURVEILLANCE

Campaign Against Mass Surveillance THE EMERGENCE OF A GLOBAL INFRASTRUCTURE FOR MASS REGISTRATION AND SURVEILLANCE
Campaign Against Mass Surveillance THE EMERGENCE OF A GLOBAL INFRASTRUCTURE FOR MASS REGISTRATION AND SURVEILLANCE
Campaign Against Mass Surveillance THE EMERGENCE OF A GLOBAL INFRASTRUCTURE FOR MASS REGISTRATION AND SURVEILLANCE
Campaign Against Mass Surveillance THE EMERGENCE OF A GLOBAL INFRASTRUCTURE FOR MASS REGISTRATION AND SURVEILLANCE

THE EMERGENCE OF A GLOBAL INFRASTRUCTURE FOR MASS REGISTRATION AND SURVEILLANCE

International Campaign Against Mass Surveillance

THE EMERGENCE OF A GLOBAL INFRASTRUCTURE FOR MASS REGISTRATION AND SURVEILLANCE

Published April 2005

For more information, contact: info@i-cams.org

Table of Contents

THE ROAD WE ARE HEADING DOWN

International Campaign Against Mass Surveillance

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

1

Myth #1:We are merely being asked to sacrifice some of our privacy and convenience for

greater security.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

2

1st SIGNPOST: THE REGISTRATION OF POPULATIONS

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

5

1. Mass Detentions of Muslim Immigrants and Registration through NSEERS

 

5

2. US-VISIT and the E.U. Visa Information System

 

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

5

 

a) Biometric Visas

 

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

5

b) Linkage of Biometric Information to a Global Web of Databases

.

.

.

.

.

.

.

.

.

.

.

.

6

c) U.S. Acquisition of Domestic and Foreign Databases

 

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

6

d) The Template for the Global System of Mass Registration and Surveillance

.

.

8

2nd SIGNPOST: THE CREATION OF A GLOBAL REGISTRATION SYSTEM

 

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

8

1.

Biometric Passports

 

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

8

 

a) Policy Laundering – Referral to ICAO

 

9

b) The Model: Carte Blanche

 

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

9

RFID Chips

c) .

.

 

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.10

d) Biometric Passports and the Democratic Deficit

 

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.10

e) Flawed Technology and Assumptions

 

.11

f) Expansion to Other Transportation Systems

 

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.12

g)

Institutionalizing “Non-Personhood”

 

.12

3rd SIGNPOST: THE CREATION OF AN INFRASTRUCTURE FOR THE GLOBAL SURVEILLANCE OF

MOVEMENT

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.12

1. U.S. Demands for Sharing Passenger Name Records

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.12

2. The Deals Made

 

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.13

3. PNR and the Democratic Deficit – Another Referral to ICAO

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.13

4. Expansion to Other Transportation Systems

 

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.14

Myth #2: These initiatives facilitate travel.

 

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.14

4th SIGNPOST: THE CREATION OF AN INFRASTRUCTURE FOR THE GLOBAL SURVEILLANCE OF

ELECTRONIC COMMUNICATIONS AND FINANCIAL TRANSACTIONS

 

.14

1. “Building in Surveillance” and the Convention on Cybercrime

 

.

.

.

.

.

.

.

.

.

.

.

.

.

.15

2. Mandatory Data Retention

 

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.16

3. Expansion of ECHELON

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.16

4. Mandatory Information-Gathering and Reporting for Financial Transactions

 

.17

5th SIGNPOST: THE CONVERGENCE OF NATIONAL AND INTERNATIONAL DATABASES

 

.18

1. Radical Acceleration of Convergence Since 9/11

 

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.18

2. The “Black Box” of Information

 

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.20

THE EMERGENCE OF A GLOBAL INFRASTRUCTURE FOR MASS REGISTRATION AND SURVEILLANCE

6th SIGNPOST: THE DANGERS OF A RISK ASSESSMENT MODEL – A WORLD THAT IS BOTH

ORWELLIAN AND KAFKAESQUE

 

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.20

1.

Data Mining: The High-Tech “Solution” to Risk Assessment

 

.20

a)

Orwell Revisited

.

.

 

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.20

Myth #3: If one has nothing to hide, one has nothing to worry about.

.

.

.

.

.

.

.

.

.

.20

 

b) TIA, MATRIX and Other Data Mining Projects in Implementation or Development

 

.21

c) CAPPS II

.

.

.

.

.

.

.

.

.

 

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.22

d) Canadian Risk Assessment Centre

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.23

e) German “Trawling”

 

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.23

f) Data Mining and the Democratic Deficit

 

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.23

g) Flawed Facts, Dirty Information, Guilt by Google, Ethnic Profiling

 

.24

Myth #4: The technology being used objective and reliable.

 

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.24

2.

Low-Tech “Solutions” to Risk Assessment

 

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.24

a) Guilt by Association and Indiscriminate Sharing of Information:

 

The Story of Maher Arar

 

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.24

b) Using Information Obtained by Torture and Tipping Off Torturers

 

.26

c) Sloppy Mistakes: The Madrid Investigation

 

.27

d) Getting People Off the Street: Arbitrary Detentions

 

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.27

e) Broad Strokes: The U.N. list

 

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.29

f) Disciplining Dissent

.

.

.

.

.

.

.

. i) Targeting the “Unpatriotic” in the U.S.

.

.

.

.

.

.

.

.

.

.

.

 

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.29

.29

 

ii) The U.S. No Fly List

 

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.30

iii) Open Season on Individuals and Groups Challenging

 

Repressive Regimes

 

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.31

 

g) A Plethora of Ballooning Watch Lists

 

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.32

Myth #5: Terrorist watch lists are a reliable product of international intelligence

 

cooperation and consensus.

 

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.32

3. Kafka

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

33

7th SIGNPOST: DEEP INTEGRATION AND THE LOSS OF SOVEREIGN

 

CHECKS AND BALANCES

.

.

.

.

.

.

 

.

.

.