Transcript berlin0440
E-Government to Protect Citizens
from Climate Change and
Terrorists
Technology and Society
Laboratory, EMPA, St.Gallen,
Switzerland
[email protected]
1
Introduction
• I am an American who lives in Switzerland,
working at the Technology and Society Lab.
of EMPA Swiss Federal Laboratories for
Materials Testing and Research.
• Disclaimer: These opinions are my own
and do not necessarily reflect those of my
employer, who is primarily concerned with
researching technological change.
[email protected]
2
Overview
• Part 1: The proposed use of RadioFrequency Identifier (RFID) technology
by the UK to combat climate change
• Part 2: The planned use of RFID
technology by the US and EU to filter
terrorists out of cross-border flows
[email protected]
3
Problem: risks to citizen privacy
• UK proposal requires a card for each citizen,
but holds great environmental benefit.
• But the climate card would not require RFID
functionality with its risks to citizen privacy.
Hillman, Mayer/ Tina Fawcett: How We Can Save the
Planet, Penguin Books, 2004
Hillman, Mayer: A Modest Proposal to Save the Planet.
In: The Independent, 28 May 2004,
http://www.mng.org.uk/green_house/mechanisms/mayer
_hillman_independent.htm
[email protected]
4
Personal data on Malaysia’s smart card
chips are stored in isolated files
• MIT’s Technology Review calls it “A Smart Way to
Protect Privacy”, as seen on next slide…..
• But is it really?
• Danish privacy technologist Stephen Engberg
objects that data are centralized (personal
communication)
• Perhaps multiple identities of German / EU project
are a better solution, as seen on slide after next…..
[email protected]
5
IDENTIFICATION
ID number, PIN, address,
photograph, birth date, and
digitized thumbprint.
AT A BAR
Bartender can check date of
birth without seeing patron’s
name or address.
AT A TRAFFIC STOP
Police can check name and date
of birth. If PIN or thumbprint is
provided, other data are
unlocked.
AT A TICKET COUNTER
Agent can check passport
number; during periods of high
alert, traveler’s thumbprint is
required.
PASSPORT
Passport serial number and
expiration date.
E-CASH
Encrypted code for electronic
account balance verification.
HEALTH
Medical history, drug allergies,
and blood type.
Source: T E C H N O L O G Y R E V I E W,
May 2003, www. t e c h n o l o g y r e v i ew.
com, p. 48
[email protected]
6
Multiple identities
Source:
http://www.primeproject.eu.org/
[email protected]
7
Part 1: The proposed use of
Radio-Frequency Identifier
(RFID) technology by the UK to
combat climate change
[email protected]
8
World under Kyoto:
If >55% of emission sources ratify,
then in force.
5.2 %
reduction in
1990 CO2
emissions by
2008-2012
[email protected]
9
Europe‘s bubble of emissions
EU states collectively
must reduce their
emissions of some
greenhouse gases by
8 % compared to the
year 1990.
EU “burden-sharing“
1000
900
800
700
600
500
400
300
200
100
0
1990 levels
2000 levels
2010 levels
required
France
Germany
[email protected]
(gigagrams of CO2)
per UNFCCC GHG
Inventory,
http://ghg.unfccc.int
http://www.hwwa.de/Publikat
ionen/Discussion_Paper/200
4/265.pdf
10
UK emissions under DTQs
• Targeted emissions reduction is divided
among all UK subjects, each getting an
entitlement to emit, which is recorded on
climate cards
• National database and trading exchange
[email protected]
11
“That'll be £17…
and 10 carbon points.”
The Guardian, April 29, 2004
[email protected]
12
Political aspects
• Russia set to ratify the Kyoto Protocol
• Domestic Tradable Quotas (DTQs)
research at the Tyndall Climate Research
Centre
• Bill before UK Parliament
• Blair to make climate change mitigation a
priority next year during the G-8 summit
and the UK‘s turn at the EU Presidency
[email protected]
13
Source: www.dtqs.org
[email protected]
14
Turning from the UK to the
European Continent
• On the Continent ID cards are common for
police registration, health care
• A look at other experiences gained with egovernment on the Continent…
[email protected]
15
German e-government
• Failures: Autobahn tolls for trucks,
computer systems for the police, army,
internal revenue collection and
unemployment insurance (“the largest
e-government application in all Europe“)
• Success: Postbank application
Source: „Absturz von Amts wegen: Nach dem MautDesaster kommt das Fiscus-Fiasko: Das Computerprogramm für die Finanzämter ist gescheitert. Beim
Arbeitslosengeld droht die nächste Software-Pleite“ by
Dirk Asendorpf in: DIE ZEIT, 15 July 2004, No.30,
http://www.zeit.de/2004/30/T-Datensysteme
[email protected]
16
Part 2: The use of RFID
technology by governments to
filter terrorists out of crossborder flows
[email protected]
17
Economic globalization was a trend
typical of the Nineties…
economic liberalization of trade and investment
..but after 2001 it was hampered by the
classical political priority security.
Political
Entity 1
Political
Entity 2
International
border
[email protected]
18
The airline terrorism debate
Continuing borderless
globalization will
require that a technical
fix be found to the
problem of crossborder terrorism, such
as using RFID
technology to store
biometric data about
incoming airline
passengers on their
passports.
[email protected]
19
US acting internationally,
but not multilaterally
• Urged Int. Civil Aviation
Org. (ICAO) to issue
int. standard for
biometric passports (a
UN agency) -- more
from my colleague Gus
Hosein on this.
• Mandated operators of
incoming ships to give
24-hour warning about
contents of containers.
[email protected]
20
The Internet consumer
travels to a foreign land.
The Internet
Consumer
Mother Country
issues passport
Places airline reservation
with his / her travel agent
Database of
passport
holders
IPv6
E-government
involving RFID
Firewall
Travel agent
inputs personal
data into airline’s
Database of
database
Passenger
Name
Records
(PNR)
Next host country
receives
applicant’s data
assembling
history of
applicant’s life
travels
Database of
foreign
divitors
“The Internet of Things”
Data are passed on indefinitely to
other parties...
Firewall
Passport with biometric
data stored in RFID chip
Host country
alerted by PNR
compares
applicant with
biometric data
Database of
foreign
divitors
Firewall
Firewall
[email protected]
21
Wrap-up
• Observing technological changes in the
field of international relations reveals that
abuses are possible – or even likely – by
both business and government.
• Civil society must speak in the interest of
citizens.
• The result should probably combine:
– a technological solution with a
– contractual solution on the multilateral level.
[email protected]
22