Criminal law & procedure Criminology Law, criminology & political science: Multidisciplinary, general & others
Author, co-author :
Gerry Qc, Felicity; School of Law, Charles Darwin University, Darwin, Australia
Muraszkiewicz, Julia ; Vrije Universiteit Brussel, Belgium
VAVOULA, Niovi ; University of Luxembourg > Faculty of Law, Economics and Finance (FDEF) > Department of Law (DL) ; Queen Mary, University of London, United Kingdom
External co-authors :
yes
Language :
English
Title :
The role of technology in the fight against human trafficking: Reflections on privacy and data protection concerns
M. Latonero, G. Berhane, A. Hernandez, T. Mohebi, L. Movius, Human Trafficking Online: The Role of Social Networking Sites and Online Classifieds (Technology and human trafficking, 2011) https://technologyandtrafficking.usc.edu/report/ accessed 15 October 2015
M. Latonero, J. Musto, Z. Boyd, E. Boyle, A. Bissel, K.Gibson, and J. Kim, The rise of mobile and the diffusion of technology-facilitated trafficking (USC Annenberg Center on Communication Leadership and Policy, 2012) http://technologyandtrafficking.usc.edu/2012 -report/#.VbtgbHt5efQ accessed 15 October 2015
J. Musto, The posthuman anti-trafficking turn: Technology, domestic minor sex trafficking, and augmented human-machine alliances in K. K. Hoang and R. Salazar Parreñas (eds), Human trafficking reconsidered: Rethinking the problem, envisioning new solutions (International Debate Education Association, 2014).
Mitali Thakor and D. Boyd, Networked trafficking: Reflections on technology and the anti-trafficking movement Dialectical Anthropology (2013) Vol. 37, 277-90.
The aim of datACT is to promote the rights of trafficked persons to privacy and autonomy and to protect their personal data: DATACT Data Protection In Anti-Trafficking Action, DatAct, accessed 15 October 25 2015.
United Nations Office on Drugs and Crime, Human Trafficking frequently asked questions accessed 15 October 2015.
Latonero, Mark, Jennifer Musto, Zhaleh Boyd, and Ev Boyle, op. cit., pp. 9-10.
Raymond Wacks, Law, Morality, and the Private Domain (Hong Kong University Press, 2000) p. 222.
C.J. Bennett, Regulating Privacy Data Protection and Public Policy in Europe and the United States (Cornell University Press, 1992) p.13.
James Q. Whitman, The Two Western Cultures of Privacy: Dignity versus Liberty, The Yale Law Journal (2004) Vol. 113, pp.1153-4.
Daniel Solove, Understanding privacy (Harvard University Press, 2008) p.12.
X v Iceland (1976) 5 D. & R. 86 at 87.
Peck v United Kingdom (2003) 36 E.H.R.R. 41 at 57.
Pretty v United Kingdom (2002) 35 E.H.R.R. 1 at 61.
C. Roger, Whats "privacy"? (Australian Law Reform Commission workshop, 28 July 2006) accessed 15 October 2015.
Rachel L. Finn, David Wright and Michael Friedewald, Seven Types of Privacy, in Serge Gutwirth et al. (eds.), European Data Protection: Coming of Age (Springer, 2013) pp. 4-5.
Directive 95/46/EC on the protection of individuals with regard to the processing of personal data and on the free movement of such data, OJ L 281/30, 23.11.1995.
Y. Poullet, The Directive 95/46/EC: Ten years after; Computer Law & Security Review (2006) Vol. 22, 206-217.
Framework Decision 2008/977/JHA of 27 November 2008 on the protection of personal data processed in the framework of police and judicial co-operation in criminal matters, OJ L 350/60, 30.12.2008.
P. de Hert and V. Papakonstantinou, The data protection framework decision of 27 November 2008 regarding police and judicial cooperation in criminal matters - A modest achievement however not the improvement some have hoped for, Computer Law & Security Review (2009) Vol. 25, 403-414.
P. de Hert and V. Papakontantinou, The proposed data protection Regulation replacing Directive 95/46/EC: A sound system for the protection of individuals, Computer Law & Security Review (2012) Vol. 28, 130-142
A. Mantelero, The EU Proposal for a General Data Protection Regulation and the roots of the "right to be forgotten", Computer Law & Security Review (2013) Vol. 29, 229-235
B. Koops, The Trouble with European Data Protection Law, International Data Privacy Law (2014) Vol. 4, 250-261.
P. Hert and V. Papakonstantinou, The Police and Criminal Justice Directive: Comment and Analysis Computer & Law Magazine of SCL Forum (2012) Vol. 22(6) accessed 15 October 2015.
P. De Hert and S. Gutwirth, Privacy, Data Protection and Law Enforcement. Opacity of the Individual and Transparency of Power in E. Claes, A. Duff and S. Gutwirth (eds.) Privacy and the Criminal Law (Intersentia, 2006) 61-104
A. Rouvroy and Y. Poullet, The Right to Informational Self-Determination and the Value of Self- Development: Reassessing the Importance of Privacy for Democracy, in S. Gutwirth et al. (eds.) Reinventing Data Protection (Springer, 2009) 45-76
M. Tzanou, The Added Value of Data Protection as a Fundamental Right in the EU Legal Order in the Context of Law Enforcement (Ph.D. Thesis, EUI, 2012).
S. Gutwirth et al., Preface in Reinventing Data Protection? (Springer, 2009).
Joined Cases C-92/09 and C-93/09, Volker und Markus Schecke GbR (C-92/09), Hartmut Eifert (C-93/09) v Land Hessen, Judgment of the Court (Grand Chamber) of 9 November 2010
Joined Cases C-293/12 and C-495/12, Digital Rights Ireland Ltd (C-293/12) v Minister for Communications, Marine and Natural Resources and others, and Kärntner Landesregierung, and others (C-594/12), Judgment of the Court (Grand Chamber) of 8 April 2014.
Council of Europe, Explanatory Report on the Convention on Action againstTrafficking in Human Beings, ETS 197, 16.V.2005, para. 141.
Directive 2011/36/EU of the European Parliament and of the Council of 5 April 2011 on preventing and combating trafficking in human beings and protecting its victims, and replacing Council Framework Decision 2002/629/JHA, 15 April 2011, OJ L 101/1, 15.4.2011.
Directive 2012/29/EU of the European Parliament and of the Council of 25 October 2012 establishing minimum standards on the rights, support and protection of victims of crime, and replacing Council Framework Decision 2001/220/JHA, OJ L 315/57, 14.11.2012.
United Nations Office on Drugs and Crime, Toolkit to Combat Trafficking in Persons (United Nations Office on Drugs and Crime, date unknown), accessed 15 October 2015.
United Nations, Guide to ethics and human rights in counter trafficking, (United Nations Inter-Agency Project on Human Trafficking, 2008) accessed 15 October 2015.
C. Raab and D. Wright, Surveillance: Extending the Limits of Privacy Impact Assessment in D. Wright and P. de Hert (eds.) Privacy Impact Assessment (Springer, 2012) pp. 370-371.
A. S.U. Cheung, Location privacy: The challenges of mobile service devices, Computer Law & Security Review (2014) Vol. 30, 46.
WESNET in Australia has identified these issues and provides training on the misuse of technology to target, track, stalk, harass and commit other acts of violence against women < http://wesnet .org.au/2015/10/safetynet-training-canberra-3/>.
Directive 2002/58/EC of the European Parliament and of the Council of 12 July 2002 concerning the processing of personal data and the protection of privacy in the electronic communications sector (Directive on privacy and electronic communications), OJ L 201/37, 31.7.2002
as amended by Directive 2009/136/EC of the European Parliament and of the Council of 25 November 2009 amending Directive 2002/22/EC on universal service and users rights relating to electronic communications networks and services, Directive 2002/58/EC concerning the processing of personal data and the protection of privacy in the electronic communications sector and Regulation (EC) No 2006/2004 on cooperation between national authorities responsible for the enforcement of consumer protection laws, OJ L 337/11, 18.11.2009.
See for example WESNET, Internet Safety, accessed 24 February 2015.
R. A. Butler, Discarded cell phones help fight rainforest poachers (Mongbay, 24 June 2014), accessed 15 October 2015.
United States Department of State, 2014 Trafficking in Persons Report Bahrain (20 June 2014), accessed 15 October 2015.
M.G. M. and K. Michael, Toward a State of Überveillance IEEE Technology and Society Magazine (2010) Vol. 29(2), 9.
K. Michael and M. G. M., The Social and Behavioural Implications of Location-Based Services Journal of Location Based Services (2011) Vol. 5, 121
A. S.Y. Cheung, Location privacy: The challenges of mobile service devices Computer Law & Security Review (2014) Vol. 30, 41-54.
J. Hughes and S. Louw, Electronic tagging of people with dementia who wander, British Medical Journal (2002) Vol. 325, 847-848.
Raab and Wright, op. cit.
F. Laczko, Data and Research on Human Trafficking, International Migration (2005) Vol. 43 5-16.
United Nations Office on Drugs and Crime, Transnational Organised Crime in East Asia and the Pacific: A threat Assessment (UNODC, 2013), accessed 15 October 2015.
N. Kinsella and G. Rankin, Human Trafficking - The Importance of Knowledge Information Exchange, in B. Akhgar and S.Yates (eds) Intelligence Management, (Springer, 2011), 172.
C. Aradau, Human trafficking between data and knowledge (paper presented at the datACT - Conference on data protection and trafficking, Berlin, 25-27 September 2013).
European Commission, Communication from the European Commission to the European Parliament, the Council, the European Economic and Social Committee and the Committee of the Regions EU Strategy towards the Eradication of Trafficking in Human Beings 2012-2016 COM(2012) 286final, 19.6.2012, 2.
Marjan Wijers, Where do all the data go? European data protection law and the protection of personal data of trafficked persons (paper presented at the datACT - Conference on data protection and trafficking, Berlin, 25-27 September 2013).
National Crime Agency, National Referral Mechanism, accessed 15 October 2015.
The European Data Protection Supervisor (EDPS) was established in 2001 by Regulation 45/2001 OJ 2001, L 8/01. The EDPS is the independent supervisory authority responsible for monitoring all data processing operations carried out by Community institutions or bodies (Art. 1).
European Data Protection Supervisor, EDPS comments on the Communication from the Commission to the European Parliament, the Council, the European Economic and Social Committee and the Committee of the Regions - "The EU Strategy towards the Eradication of Trafficking in Human Beings 20122016,"
Council of Europe, Explanatory Report on the Convention on Action against Trafficking in Human Beings, ETS 197, 16.V.2005, para.138.
Ann Gallagher, The International Law of Human Trafficking (New York: Cambridge University Press, 2010), p.303.
B. Hayes, C. Jones and E. Töpfer, Eurodrones Inc. (Statewatch, 2014) 7, accessed 25 July 2015
P. McBride, Beyond Orwell: the application of unmanned aircraft systems in domestic surveillance operations Journal of Air Law and Commerce (2009) Vol. 74(3), 628.
R. Clarke, Understanding the Drone Epidemic Computer Law & Security Review (2014) Vol. 30(3), 230-246.
E. Bone and C. Bolkcom, Unmanned Aerial Vehicles: Background and Issues for Congress (Washington D.C., 2003) 1, accessed 15 October 2015.
EPDS, Opinion of the European Data Protection Supervisor on the Communication from the Commission to the European Parliament and the Council on "A new era for aviation - Opening the aviation market to the civil use of remotely piloted aircraft systems in a safe and sustainable manner", accessed 15 October 2015.
A. Brecher et al., Roadmap to near-term deployment of unmanned aerial vehicles (UAV) for transportation applications charge to participants (UAV 2003: A roadmap for deploying UAVs in transportation specialist workshop, Santa Barbara, 2003)
P. C. Nolin, Unmanned Aerial Vehicles: Opportunities and Challenges for the Alliance Special Report (NATO Parliamentary Assembly, Canada, 2012).
R. L. Finn and D. Wright, Unmanned aircraft systems: Surveillance, ethics and privacy in civil applications, Computer Law & Security Review (2012) Vol. 28, 185.
European Parliament, Directorate General for Internal Policies, Privacy and Data Protection Implications of the Civil Use of Drones (PE 519.221, June 2015), 11.
D. Bigo, Migration and Security inVirginie Guiraudon and Christian Joppke (eds.) Controlling a New MigrationWorld (Routledge, 2001) 121-149.
Jørgen Carling and María Hernández-Carretero, Protecting Europe and Protecting Migrants? Strategies for Managing Unauthorised Migration from Africa, The British Journal of Politics and International Relations (2011) Vol. 13, 42-58
Ben Hays and MathiasVermeulen, Borderline. EUBorder Surveillance Initiatives.AnAssessment of the Costs and Its Impact on Fundamental Rights (Heinrich-Böll-Stiftung, 2012).
Luisa Marin and Kamila Krajčíková, Deploying drones in policing European borders: constraints and challenges for data protection and human rights, in Aleš Završnik, (ed.) Drones and Unmanned Aerial Systems: Legal and Social Implications for Security and Surveillance (Springer, 2016 forthcoming).
Amnesty International, Lives Adrift: Refugees and Migrants in Peril in the Central Mediterranean (30 September 2014) accessed 15 October 2015.
ANSA, Alfano hails human trafficker arrests (ANSA, 29 August 2014) accessed 15 October 2015.
Carlton Purvis, Spain Considering UAVs to Supplement its Maritime Border Security Lineup (Security Management, 19 August 2011) accessed 15 October 2015.
José Luis Lorente Howell, Spain: Authorities working on future unmanned aerial vehicle (UAV) regulation (Bird&Bird, 25 April 2014) accessed 15 October 2015.
Y. Souliotis, (20 June 2014) accessed 25 July 2015
D. Kyprianou, (Protothema, 11 January 2015) http://www.protothema.gr/politics/article/441410/me-mi -epandromena-aeroskafi-kai-ploia-exoplizetai-i-leukosia/accessed 15 October 2015.
FRONTEX, Border Surveillance (FRONTEX) accessed 15 October 2015.
Statewatch, EU:FRONTEX: "optionally-piloted" aircraft tests, but no drones. . .yet (Statewatch, 29 May 2013) accessed 25 July 2015.
Regulation (EU) 1052/13 of the European Parliament and of the Council of 22 October 2013 establishing the European Border Surveillance System (EUROSUR), OJ L 295/11 6.11.2013.
J. G. Neuger, EU to Deploy Drones, Warships against Human Traffickers (Bloomberd Business 22 June 2015) accessed 15 October 2015.
Council of the European Union, Press Release, accessed 15 October 2015.
J. I. Ross, Drones Are Different (Baltimore Sun, 19 June 2012) accessed 15 October 2015.
M. Webster, U.S. ABP & U.S. Drones Flying Over Mexico Detecting Military Drug/Human Trafficking Camps (Renew America, 1 April 2011), accessed 15 October 2015.
A. Withnall, Criminals "Using Unmanned Drones and Infrared Cameras To Find Illegal Cannabis Farms" - and Then Steal From The Growers (The Independent, 17 April 2014) accessed 15 October 2015.
Applications nos. 40660/08 and 60641/08, Case of Von Hannover v. Germany (n. 2), Judgment of the European Court of Human Rights of 7 February 2012.
US Supreme Court, California v. Ciraolo (1986).
R. L. Finn, D. Wright and A. Donovan (Trilateral Research & Consulting, LLP), L. Jacques and P. De Hert (Vrije Universiteit Brussel), Privacy, data protection and ethical risks in civil RPAS operations (7 November 2014), 28, accessed 25 July 2015
Roger Clarke, The Regulation of Civilian Drones Impacts on Behavioural Privacy, Computer Law & Security Review (2014) Vol. 30(3) 286-305.
Microsoft, The Role of Technology in Human Trafficking RFP (Microsoft Research) accessed 25 July 2015.