Smart surveillance in cyberspace


To identify and explore the impact of smart surveillance technologies on privacy in cyberspace.

Task 9.1 Identifying and classifying relevant smart surveillance technologies in cyberspace

This task is designed to identify and classify:

  • The different smart surveillance technologies currently employed to monitor individual behaviour in cyberspace.
  • Foreseeable future trends in the deployment of smart surveillance technologies in cyberspace.

A group of experts comprising digital media industry representatives, key technology providers, digital forensic scientists, users representing industry and police and security services, privacy/IT lawyers and civil society organisations will map, describe and classify the way in which public and private operators currently use smart surveillance technologies within cyberspace.

Particular emphasis will be paid to:

  • Technologies that have undergone, or are currently undergoing, a transition from “private” to “public interest” use including deep-packet inspection, data mining and profiling.
  • The way in which the technical infrastructure of the internet and its governance both enables and hinders the development of MIMSI-type large scale integration of data from different sources.

Task 9.2 Identifying and classifying risk factors relating to the use of smart surveillance in cyberspace

An analysis of the risk inherent in the use of smart surveillance technologies in cyberspace will be carried out including:

  • A study of the purposes for which smart surveillance technologies are currently used (or proposed to be used) in an online environment by private and public operators.
  • An examination of the extent to which surveillance technologies that are currently employed for the monitoring of individual online behaviour for one purpose are, or may be, used for another purpose and the extend to which this may affect the privacy of individuals and data integrity.
  • An analysis of alternative technologies which are currently available or are being developed to achieve the same purposes in a less privacy-intrusive way (privacy enhancing technologies)

Task 9.3 Compliance assessment of smart surveillance in cyberspace

Identifying the extent to which the deployment of smart surveillance technologies in cyberspace is compliant with the legal framework governing surveillance, data protection, and data sharing identified in WPs6 and 7.

  • Providing suggestions on the way in which compliance with existing legislation can be achieved.
  • In conjunction with WPs 6 and 7, providing suggestions on how a better balance between the deployment of smart surveillance technologies for the purpose of public security on the one hand and privacy and data integrity on the other hand can be achieved.