Privacy and surveillance: Difference between revisions

From EuroDIG Wiki
Jump to navigation Jump to search
No edit summary
No edit summary
 
Line 9: Line 9:
| style="border: 1px solid #00000a;" align="LEFT"|'''Remarks'''
| style="border: 1px solid #00000a;" align="LEFT"|'''Remarks'''
|-
|-
| style="border: 1px solid #00000a;" align="RIGHT" height="253"|<span style="font-family: Calibri; font-size: xx-small;">7</span>
| style="border: 1px solid #00000a;" align="RIGHT" height="253"|<span style="font-family: Calibri;">7</span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; font-size: xx-small;">Matthias C. Kettemann</span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri;">Matthias C. Kettemann</span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; font-size: xx-small;">University Frankfurt, Germany</span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri;">University Frankfurt, Germany</span>
| style="border: 1px solid #00000a;" align="CENTER"|<span style="font-family: Calibri; font-size: xx-small;">Academia</span>
| style="border: 1px solid #00000a;" align="CENTER"|<span style="font-family: Calibri;">Academia</span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; font-size: xx-small;">Privacy, data protection and surveillance<br /></span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri;">Privacy, data protection and surveillance<br /></span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri;font-size: xx-small;">Data is the new currency. Countries collect it, companies store it ... but how can we ensure that transboundary data flows are regulated in a human rights consistent way -- Panel on issues related to jurisdiction, privacy and data protection. We\'ll look at questions like: Which entities are responsible? Who has jurisdiction? Do we need a new concept of jurisdiction and responsibility?</span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri;">Data is the new currency. Countries collect it, companies store it ... but how can we ensure that transboundary data flows are regulated in a human rights consistent way -- Panel on issues related to jurisdiction, privacy and data protection. We\'ll look at questions like: Which entities are responsible? Who has jurisdiction? Do we need a new concept of jurisdiction and responsibility?</span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; font-size: xx-small;"><br /></span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri;"><br /></span>
|-
|-
| style="border: 1px solid #00000a;" align="RIGHT" height="196"|<span style="font-family: Calibri; font-size: xx-small;">15</span>
| style="border: 1px solid #00000a;" align="RIGHT" height="196"|<span style="font-family: Calibri;">15</span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; font-size: xx-small;">Leonid Todorov</span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri;">Leonid Todorov</span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; font-size: xx-small;">Coordination Center for TLDs for Russia</span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri;">Coordination Center for TLDs for Russia</span>
| style="border: 1px solid #00000a;" align="CENTER"|<span style="font-family: Calibri; font-size: xx-small;">Technical community</span>
| style="border: 1px solid #00000a;" align="CENTER"|<span style="font-family: Calibri;">Technical community</span>
| style="border: 1px solid #00000a;" align="LEFT" |<span style="font-family: Calibri; font-size: xx-small;">Internet Governance - a Changing Landscape</span>
| style="border: 1px solid #00000a;" align="LEFT" |<span style="font-family: Calibri;">Internet Governance - a Changing Landscape</span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; font-size: xx-small;">Privacy: The Thick Red Line -- With recent disclosures and "revelations", the issue of privacy has been debated at all fora and on all levels. Can we hammer out a universal solution and make sure there is no Peeping Tom around? What kind of instrument could be crafted on the international level and how it could be made effective in preventing privacy breaches?</span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri;">Privacy: The Thick Red Line -- With recent disclosures and "revelations", the issue of privacy has been debated at all fora and on all levels. Can we hammer out a universal solution and make sure there is no Peeping Tom around? What kind of instrument could be crafted on the international level and how it could be made effective in preventing privacy breaches?</span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; font-size: xx-small;"><br /></span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri;"><br /></span>
|-
|-
| style="border: 1px solid #00000a;" align="RIGHT" height="141"|<span style="font-family: Calibri; font-size: xx-small;">21</span>
| style="border: 1px solid #00000a;" align="RIGHT" height="141"|<span style="font-family: Calibri;">21</span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; font-size: xx-small;">Matthias Flittner</span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri;">Matthias Flittner</span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; font-size: xx-small;">KIT / research assistant</span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri;">KIT / research assistant</span>
| style="border: 1px solid #00000a;" align="CENTER"|<span style="font-family: Calibri; font-size: xx-small;">Academia</span>
| style="border: 1px solid #00000a;" align="CENTER"|<span style="font-family: Calibri;">Academia</span>
| style="border: 1px solid #00000a;" align="LEFT" |<span style="font-family: Calibri; font-size: xx-small;">Secure Cloud Computing for critical infrastructure providers</span>
| style="border: 1px solid #00000a;" align="LEFT" |<span style="font-family: Calibri;">Secure Cloud Computing for critical infrastructure providers</span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; font-size: xx-small;">Legal and liability aspects of cloud computing Requirements of critical infrastructure. Risks and threats of cloud computing for critical infrastructures. How to make the cloud transparent to the user.</span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri;">Legal and liability aspects of cloud computing Requirements of critical infrastructure. Risks and threats of cloud computing for critical infrastructures. How to make the cloud transparent to the user.</span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; font-size: xx-small;"><br /></span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri;"><br /></span>
|-
|-
| style="border: 1px solid #00000a;" align="RIGHT" height="271"|<span style="font-family: Calibri; font-size: xx-small;">29</span>
| style="border: 1px solid #00000a;" align="RIGHT" height="271"|<span style="font-family: Calibri;">29</span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; font-size: xx-small;">Milton Mueller</span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri;">Milton Mueller</span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; font-size: xx-small;">Global Internet Governance Academic Network (GigaNet)</span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri;">Global Internet Governance Academic Network (GigaNet)</span>
| style="border: 1px solid #00000a;" align="CENTER"|<span style="font-family: Calibri; font-size: xx-small;">Academia</span>
| style="border: 1px solid #00000a;" align="CENTER"|<span style="font-family: Calibri;">Academia</span>
| style="border: 1px solid #00000a;" align="LEFT" |<span style="font-family: Calibri; font-size: xx-small;">State Surveillance on the Internet -- Internet technical standards and end user security</span>
| style="border: 1px solid #00000a;" align="LEFT" |<span style="font-family: Calibri;">State Surveillance on the Internet -- Internet technical standards and end user security</span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; font-size: xx-small;">Deep packet inspection (DPI) cooperation between ISPs and national security agencies.<br />Localization as a response to NSA surveillance.<br />Independent academic researchers and technical experts should explore how Internet governance processes have reacted to the Snowden revelations. The session should not debate whether the surveillance is good or bad, but describe the changes its explosure has provoked in several areas. Three areas of change need to be covered:<br />1. IETF moves to \"harden\" Internet technical standards. <br />2. DPI surveillance programs that involve cooperation between private Internet service providers and national security agencies <br />3. Proposed policies to localize or nationalize services, equipment or routing<br />GigaNet is able to provide experts in each of these areas.</span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri;">Deep packet inspection (DPI) cooperation between ISPs and national security agencies.<br />Localization as a response to NSA surveillance.<br />Independent academic researchers and technical experts should explore how Internet governance processes have reacted to the Snowden revelations. The session should not debate whether the surveillance is good or bad, but describe the changes its explosure has provoked in several areas. Three areas of change need to be covered:<br />1. IETF moves to \"harden\" Internet technical standards. <br />2. DPI surveillance programs that involve cooperation between private Internet service providers and national security agencies <br />3. Proposed policies to localize or nationalize services, equipment or routing<br />GigaNet is able to provide experts in each of these areas.</span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; font-size: xx-small;"><br /></span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri;"><br /></span>
|-
|-
| style="border: 1px solid #00000a;" align="RIGHT" height="231"|<span style="font-family: Calibri; font-size: xx-small;">51</span>
| style="border: 1px solid #00000a;" align="RIGHT" height="231"|<span style="font-family: Calibri;">51</span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; font-size: xx-small;">Tatiana Tropina</span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri;">Tatiana Tropina</span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; font-size: xx-small;">Max-Planck Institute for Foreign and International Criminal Law, Germany</span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri;">Max-Planck Institute for Foreign and International Criminal Law, Germany</span>
| style="border: 1px solid #00000a;" align="CENTER"|<span style="font-family: Calibri; font-size: xx-small;">Academia</span>
| style="border: 1px solid #00000a;" align="CENTER"|<span style="font-family: Calibri;">Academia</span>
| style="border: 1px solid #00000a;" align="LEFT" |<span style="font-family: Calibri; font-size: xx-small;">The blurring borders between criminal law, security and intelligence - how to implement proper safeguards for human rights and data protection?<br /></span>
| style="border: 1px solid #00000a;" align="LEFT" |<span style="font-family: Calibri;">The blurring borders between criminal law, security and intelligence - how to implement proper safeguards for human rights and data protection?<br /></span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; font-size: xx-small;">As many discussions these days, this proposal is related to the recent revelations concerning mass surveillance and data gathering by intelligence services. Procedural measures implemented by criminal law (such as interception. collection of data) are related to crime are usually strictly regulated by safeguards, warrants, data protection rules. However, the issues of security in terms of prevention goes beyond criminal law and creates a "grey" area when security agencies can gather and monitor data without proper safeguards. This proposal suggests to discuss the issue of safeguards (human rights, data protection, etc) which have to be implemented in this "grey area" and the way of implementing them.</span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri;">As many discussions these days, this proposal is related to the recent revelations concerning mass surveillance and data gathering by intelligence services. Procedural measures implemented by criminal law (such as interception. collection of data) are related to crime are usually strictly regulated by safeguards, warrants, data protection rules. However, the issues of security in terms of prevention goes beyond criminal law and creates a "grey" area when security agencies can gather and monitor data without proper safeguards. This proposal suggests to discuss the issue of safeguards (human rights, data protection, etc) which have to be implemented in this "grey area" and the way of implementing them.</span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; font-size: xx-small;"><br /></span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri;"><br /></span>
|-
|-
| style="border: 1px solid #00000a;" align="RIGHT" height="261"|<span style="font-family: Calibri; font-size: xx-small;">62</span>
| style="border: 1px solid #00000a;" align="RIGHT" height="261"|<span style="font-family: Calibri;">62</span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; font-size: xx-small;">Annnette Mühlberg</span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri;">Annnette Mühlberg</span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; font-size: xx-small;">ver.di and EURALO, support by ISOC chapter Belgrade, FIfF, Afilias, Open Rights Group</span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri;">ver.di and EURALO, support by ISOC chapter Belgrade, FIfF, Afilias, Open Rights Group</span>
| style="border: 1px solid #00000a;" align="CENTER"|<span style="font-family: Calibri; font-size: xx-small;">Civil society and MS</span>
| style="border: 1px solid #00000a;" align="CENTER"|<span style="font-family: Calibri;">Civil society and MS</span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; font-size: xx-small;">Surveillance: Democracy at stake!</span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri;">Surveillance: Democracy at stake!</span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; font-size: xx-small;">Surveillance by States and by Business creates monopolies of power which endanger democracy. Those new monopolies of information collection and automated evaluation endanger and undermine human rights. In order to preserve human rights and enhance their enforcement in the digital society, we need to strengthen the informational self-determination of citizens in all spheres of society, particularly leisure and consumption, health, social security, work, media, politics. Which regulatory approaches and frames are needed to ensure such "informational self-determination" of citizens and Internet users and can prevent concentration of power and eroding of democracy and rule of law? How can respective provisions be effectively enforced?</span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri;">Surveillance by States and by Business creates monopolies of power which endanger democracy. Those new monopolies of information collection and automated evaluation endanger and undermine human rights. In order to preserve human rights and enhance their enforcement in the digital society, we need to strengthen the informational self-determination of citizens in all spheres of society, particularly leisure and consumption, health, social security, work, media, politics. Which regulatory approaches and frames are needed to ensure such "informational self-determination" of citizens and Internet users and can prevent concentration of power and eroding of democracy and rule of law? How can respective provisions be effectively enforced?</span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; font-size: xx-small;"><br /></span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri;"><br /></span>
|-
|-
| style="border: 1px solid #00000a;" align="RIGHT" height="58"|<span style="font-family: Calibri; font-size: xx-small;">81</span>
| style="border: 1px solid #00000a;" align="RIGHT" height="58"|<span style="font-family: Calibri;">81</span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; font-size: xx-small;">Lee Hibbard</span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri;">Lee Hibbard</span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; font-size: xx-small;">Council of Europe</span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri;">Council of Europe</span>
| style="border: 1px solid #00000a;" align="CENTER"|<span style="font-family: Calibri; font-size: xx-small;">Europ. Org.</span>
| style="border: 1px solid #00000a;" align="CENTER"|<span style="font-family: Calibri;">Europ. Org.</span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; font-size: xx-small;">Mass surveillance and the right to privacy : how can our human rights be enforced and reinforced?</span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; ">Mass surveillance and the right to privacy : how can our human rights be enforced and reinforced?</span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="color: #262626; font-family: Calibri; font-size: xx-small;"><br /></span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="color: #262626; font-family: Calibri; "><br /></span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; font-size: xx-small;"><br /></span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; "><br /></span>
|-
|-
| style="border: 1px solid #00000a;" align="RIGHT" height="251"|<span style="font-family: Calibri; font-size: xx-small;">85</span>
| style="border: 1px solid #00000a;" align="RIGHT" height="251"|<span style="font-family: Calibri; ">85</span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; font-size: xx-small;">Christian Horchert</span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; ">Christian Horchert</span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; font-size: xx-small;">CCC e.V., Germany</span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; ">CCC e.V., Germany</span>
| style="border: 1px solid #00000a;" align="CENTER"|<span style="font-family: Calibri; font-size: xx-small;">Technical community</span>
| style="border: 1px solid #00000a;" align="CENTER"|<span style="font-family: Calibri; ">Technical community</span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; font-size: xx-small;">Securing civil society -- How can we get rid of insecurities by design which leave us vulnerable to attacks of all types? And what does it actually mean, if we are not able to fix the technical problems in the future?</span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; ">Securing civil society -- How can we get rid of insecurities by design which leave us vulnerable to attacks of all types? And what does it actually mean, if we are not able to fix the technical problems in the future?</span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; font-size: xx-small;">The base of our society depends on complex, networked technical systems - be it for communication in general, be it related to economy, politics or much of our everyday’s life. From the perspective of civil society we can\'t distinguish between attacks from organized crime, intelligence agencies, armies or scriptkiddies, so we need at least to agree on the fact that we have an issue here, especially if the continue to let backdoors and insecurities on purpose stay the way they do right now. There is hope, but only if we agree what is necessary to protect infrastructure, i.e. by having better liabilities for soft- and hardware as well as data and a massive intervention to actually fix many of the current problems. In order to get this done there must be a technical as well as a legal effort.</span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; ">The base of our society depends on complex, networked technical systems - be it for communication in general, be it related to economy, politics or much of our everyday’s life. From the perspective of civil society we can\'t distinguish between attacks from organized crime, intelligence agencies, armies or scriptkiddies, so we need at least to agree on the fact that we have an issue here, especially if the continue to let backdoors and insecurities on purpose stay the way they do right now. There is hope, but only if we agree what is necessary to protect infrastructure, i.e. by having better liabilities for soft- and hardware as well as data and a massive intervention to actually fix many of the current problems. In order to get this done there must be a technical as well as a legal effort.</span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; font-size: xx-small;"><br /></span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; "><br /></span>
|-
|-
|}
|}

Latest revision as of 11:34, 11 February 2014

No Name Affil./Org. SH-group Topic and sub-issues Description Remarks
7 Matthias C. Kettemann University Frankfurt, Germany Academia Privacy, data protection and surveillance
Data is the new currency. Countries collect it, companies store it ... but how can we ensure that transboundary data flows are regulated in a human rights consistent way -- Panel on issues related to jurisdiction, privacy and data protection. We\'ll look at questions like: Which entities are responsible? Who has jurisdiction? Do we need a new concept of jurisdiction and responsibility?
15 Leonid Todorov Coordination Center for TLDs for Russia Technical community Internet Governance - a Changing Landscape Privacy: The Thick Red Line -- With recent disclosures and "revelations", the issue of privacy has been debated at all fora and on all levels. Can we hammer out a universal solution and make sure there is no Peeping Tom around? What kind of instrument could be crafted on the international level and how it could be made effective in preventing privacy breaches?
21 Matthias Flittner KIT / research assistant Academia Secure Cloud Computing for critical infrastructure providers Legal and liability aspects of cloud computing Requirements of critical infrastructure. Risks and threats of cloud computing for critical infrastructures. How to make the cloud transparent to the user.
29 Milton Mueller Global Internet Governance Academic Network (GigaNet) Academia State Surveillance on the Internet -- Internet technical standards and end user security Deep packet inspection (DPI) cooperation between ISPs and national security agencies.
Localization as a response to NSA surveillance.
Independent academic researchers and technical experts should explore how Internet governance processes have reacted to the Snowden revelations. The session should not debate whether the surveillance is good or bad, but describe the changes its explosure has provoked in several areas. Three areas of change need to be covered:
1. IETF moves to \"harden\" Internet technical standards.
2. DPI surveillance programs that involve cooperation between private Internet service providers and national security agencies
3. Proposed policies to localize or nationalize services, equipment or routing
GigaNet is able to provide experts in each of these areas.

51 Tatiana Tropina Max-Planck Institute for Foreign and International Criminal Law, Germany Academia The blurring borders between criminal law, security and intelligence - how to implement proper safeguards for human rights and data protection?
As many discussions these days, this proposal is related to the recent revelations concerning mass surveillance and data gathering by intelligence services. Procedural measures implemented by criminal law (such as interception. collection of data) are related to crime are usually strictly regulated by safeguards, warrants, data protection rules. However, the issues of security in terms of prevention goes beyond criminal law and creates a "grey" area when security agencies can gather and monitor data without proper safeguards. This proposal suggests to discuss the issue of safeguards (human rights, data protection, etc) which have to be implemented in this "grey area" and the way of implementing them.
62 Annnette Mühlberg ver.di and EURALO, support by ISOC chapter Belgrade, FIfF, Afilias, Open Rights Group Civil society and MS Surveillance: Democracy at stake! Surveillance by States and by Business creates monopolies of power which endanger democracy. Those new monopolies of information collection and automated evaluation endanger and undermine human rights. In order to preserve human rights and enhance their enforcement in the digital society, we need to strengthen the informational self-determination of citizens in all spheres of society, particularly leisure and consumption, health, social security, work, media, politics. Which regulatory approaches and frames are needed to ensure such "informational self-determination" of citizens and Internet users and can prevent concentration of power and eroding of democracy and rule of law? How can respective provisions be effectively enforced?
81 Lee Hibbard Council of Europe Europ. Org. Mass surveillance and the right to privacy : how can our human rights be enforced and reinforced?

85 Christian Horchert CCC e.V., Germany Technical community Securing civil society -- How can we get rid of insecurities by design which leave us vulnerable to attacks of all types? And what does it actually mean, if we are not able to fix the technical problems in the future? The base of our society depends on complex, networked technical systems - be it for communication in general, be it related to economy, politics or much of our everyday’s life. From the perspective of civil society we can\'t distinguish between attacks from organized crime, intelligence agencies, armies or scriptkiddies, so we need at least to agree on the fact that we have an issue here, especially if the continue to let backdoors and insecurities on purpose stay the way they do right now. There is hope, but only if we agree what is necessary to protect infrastructure, i.e. by having better liabilities for soft- and hardware as well as data and a massive intervention to actually fix many of the current problems. In order to get this done there must be a technical as well as a legal effort.