overview 
                         
                        studies 
                         
                        passports  
                         
                        visas  
                         
                        issues 
                         
                        travel 
                         
                        profiling  
                         
                        watch lists 
                         
                        ticketing 
                         
                        searches  
                         
                        Aust travel 
                         
                        abduction 
                         
                        refugees  
                         
                        deportation 
                         
                        borders 
                         
                        landmarks 
                         
                         
                         
                         
                         
                         
                         
                         
                       
                         
                         
                         
                         
                         
                          
                        related 
                        Guides: 
                         
                        Privacy 
                         
                        Secrecy 
                         
                        Security 
                        & Infocrime 
                         
                         
                         
                         
                          
                        related 
                        Profiles: 
                         
                        Surveillance  
                         
                        Forgery & 
                        Forensics 
                         
                        Identity 
                        Theft  
                         
                        Australia 
                         
                        Card   
                         
                        RFIDs  
                         
                        Biometrics   | 
                            
                        watch lists 
                         
                        This page considers watchlists and networks for the surveillance 
                        of domestic and international travellers, such as the 
                        US CAPPS II and Secure Flight schemes. 
                         
                        It covers - 
                      
                        - introduction
 
                        - digital 
                          issues - key issues at a glance 
                          and some questions about their significance
 
                        - from 
                          CAPPS II to Secure Flight - the 
                          evolution of contemporary 'total information awareness' 
                          schemes in the US and other countries
 
                        - listing 
                          
 
                       
                            
                        introduction 
                         
                        One aspect of the 'digital revolution' has been a 
                        substantial increase in the capacity of governments to 
                        monitor travel by their nationals and foreigners, in particular 
                        travel across borders and using commercial airlines.  
                         
                        In contrast to past regimes, which were predicated on 
                        official authorisation to move between jurisdictions and 
                        on registration of the traveler's presence (whether by 
                        a bureaucrat or by an agent such as an innkeeper), much 
                        of that monitoring is 'non-invasive'. It relies on government 
                        agencies accessing information held on private sector 
                        databases (eg the computerised reservation systems noted 
                        on preceding pages of this note) and information extracted 
                        from travellers as the price of passage (eg drawn by migration 
                        officers from their passports or from passenger manifests 
                        and flight cards). 
                         
                        Readers of Victorian and Edwardian fiction will be aware 
                        that it was possible to thwart pre-1914 monitoring schemes 
                        through ingenuity, adoption of false moustaches or other 
                        disguises and provision of bogus personal particulars 
                        - whether for a romantic assignation in a railway hotel 
                        or to evade the attention of the Okhrana and Sureté. 
                         
                         
                        Undermining those schemes was possible because of  
                      
                        - delays 
                          in collecting, transmitting and collating information
 
                        - problems 
                          in interpreting information 
 
                        - the 
                          absence of effective personal identification documentation. 
                          
 
                       
                      As 
                        we enter the age of biometrics 
                        unique identification should, in principle, be more achievable 
                        and the mining of travel information from comprehensive 
                        CRS and payment systems should enable what one enthusiast 
                        characterises as 'surveillance at a distance', detecting 
                        malefactors while freeing the innocent traveller from 
                        the whiff of garlic as an official or hotel clerk peers 
                        over his/her shoulder.  
                         
                        In practice some claims for 'total information awareness' 
                        seem fantastic, given theft or corruption of official 
                        documentation, problems with the disambiguation of information, 
                        concerns about privacy principles and administration, 
                        the very patchy nature of data sources and difficulties 
                        with integration of systems across jurisdictions and agencies. 
                        Some criminals - or would-be criminals - are for example 
                        in possession of legitimate identity documents. Monitoring 
                        travel payments tracks payments; in an environment of 
                        credit card fraud that is not necessarily the same as 
                        tracking people. 
                         
                              
                        digital issues 
                         
                        In the digital environment issues include - 
                      
                        - low 
                          awareness among government agencies, businesses and 
                          travellers about privacy-related aspects of domestic 
                          and international travel
 
                        - perceptions 
                          that data mining and other technologies will allow government 
                          agencies to accurately identify substantive threats 
                          or build effective electronic borders by using information 
                          about who is travelling, where they have been, where 
                          they are going and even what they are doing
 
                        - consequent 
                          government demands for systematic access to commercial 
                          travel-related information (including airline reservations, 
                          accommodation and restaurant payments), with and exemption 
                          of that data and associated analysis from existing privacy 
                          protection regimes
 
                        - associated 
                          comprehensive profiling of travelers, reflected in restrictions 
                          on freedom of travel (eg Do Not Fly lists), differential 
                          treatment of travellers on the basis of Recognised Flyer 
                          lists and intrusive searches
 
                        - compulsory 
                          provision by travellers of a range of information during 
                          reservations and by financial institutions or other 
                          entities
 
                        - mandatory 
                          identification of travellers, including carrying/display 
                          of identity documents and use of biometric identifiers
 
                        - integration 
                          of commercial and government databases about travellers, 
                          with what critic Edward Hasbrouck condemns as "integration 
                          and conversion of travel industry infrastructure into 
                          an infrastructure of surveillance"
 
                       
                      In 
                        some jurisdictions activists have warned about - 
                      
                        -  
                          use of RFID tags on a 
                          secure or unsecure basis, with for example claims that 
                          tagging will facilitate identity theft or convert the 
                          bearer of a tag into a target
 
                        - corporate 
                          and government construction of "lifetime personal 
                          travel dossiers" from travel bookings and payments, 
                          with that information potentially being accessed by 
                          or even sold to third parties without the consent or 
                          awareness of the traveller
 
                        - inadequate 
                          legal protection for travel information, particularly 
                          for travel across borders and for information that is 
                          silently shared by governments and businesses
 
                       
                      Perceptions 
                        of those issues differ widely, depending on factors such 
                        as occupation, cultural background, personal experience 
                        and even position in a queue for security screening at 
                        an airport. Gilmore's lament about provision of ID would, 
                        we suspect thus appear misplaced to many Australians, 
                        who have become accustomed to providing photo ID for entry 
                        to a domestic flight.  
                         
                        Tensions among privacy advocacy organisations are reflected 
                        in comments that not all concerns are equal: producing 
                        ID to board a flight is less offensive than being mauled 
                        by an unskilled security contractor during an intimate 
                        search, particularly if the passenger is confidence that 
                        information in that ID will be safeguarded. 
                         
                        Some concerns may be displaced, with regulatory issues 
                        being addressed through a strengthening and systematisation 
                        of data protection legislation underpinned by effective 
                        industry protocols and greater awareness about the commoditisation 
                        of personal information. 
                         
                              
                        from CAPPS II to Secure Flight 
                         
                        The Computer Assisted Passenger Pre-Screening System (CAPPS 
                        II) was proposed by the federal Transportation Security 
                        Administration (TSA) in the US following 9/11 but tacitly 
                        abandoned in the face of legal and technical criticisms, 
                        being replaced by plans for a Secure Flight scheme.  
                         
                        The new scheme has been promoted as complementary to the 
                        Defense Department's Total Information Awareness (TIA) 
                        - later Terrorism Information Awareness - program, criticised 
                        as a successor of the unfocussed, wildly ambitious and 
                        horrendously expensive Reagan-era starwars program. 
                         
                        Predecessors of CAPPS II sought to match the names of 
                        intending passengers with one or more government watchlists, 
                        in particular a list of names of terrorists. That matching 
                        proved problematical, as many names are not unique, the 
                        names of terrorists and others may have been incorrectly 
                        captured (particularly if they were expressed in Arabic, 
                        Chinese or other non-Roman characters) and those on watchlist 
                        might choose to use an invented name or assume someone 
                        else's name. Presumably Osama Bin Laden would not take 
                        a US commercial flight under his own name. US senator 
                        Ted Kennedy - who shares a surname with someone on a wanted 
                        list - was recurrently stopped because of that disambiguation 
                        problem.  
                         
                        Enthusiasts for CAPPS II justified the scheme as a mechanism 
                        for combatting terrorism, in particular by preventing 
                        hijacking of large civilian aircraft. It has been characterised 
                        as a model for travel databases in other jurisdictions 
                        and for screening rail or other modes of transport.  
                         
                        It was envisaged that CAPPS II would draw on information 
                        from government and commercial databases, including 'life 
                        data' such as age and place of birth and activity data 
                        such as information about the frequency and departure/destination 
                        points of past travel. A 2004 Australian parliamentary 
                        committee report on aviation safety sagely comments that 
                        "hijackers have tended not to be frequent fliers". 
                         
                         
                        That data would be used to assign each passenger a color-coded 
                        score - 
                      
                        - 'Green' 
                          flags that the passenger does not appear to pose a threat 
                          to safety and is free to board the plane
 
                        - 'Yellow' 
                          flags that the passenger appears to pose a potential 
                          threat and should accordingly undergo further security 
                          checks before being allowed to board
 
                        - 'Red' 
                          flags that the passenger is likely to pose an "imminent 
                          threat" and will thus not be allowed to board the 
                          flight, with some likelihood that the person will be 
                          required to undergo official questioning.
 
                       
                      Statistics 
                        about the number of people whose profiles have resulted 
                        in a red or yellow score are contentious, as is the effectiveness 
                        of models used in generation of those profiles.  
                         
                        Concerns identified by privacy and consumer advocacy groups 
                        include - 
                      
                        - data 
                          accuracy, with questions about the validity of information 
                          in some government and industry databases (particular 
                          those maintained by credit 
                          reference services) and about updating those databases 
                          in the event that an inaccuracy is detected
 
                        - sharing 
                          of source data or individual profiles with federal/state 
                          agencies and with other governments
 
                        - inappropriate 
                          use of data sources, in particular financial and medical 
                          records
 
                        - network 
                          integrity, in particular fears that personal information 
                          collected by the TSA will be improperly accessed (eg 
                          for identity theft)
 
                        - uncertain 
                          or ineffective mechanisms for public access and redress, 
                          with US politicians, ordinary citizens and foreign nationals 
                          complaining that they had been improperly prevented 
                          from flying, couldn't find out why they had been prevented 
                          and weren't able to ensure that faulty data was corrected
 
                        - mission 
                          creep, with inappropriate sharing of information collected 
                          by the TSA
 
                        - comments 
                          that screening could be circumvented by 'borrowing' 
                          an impeccable life/activity history and using forged 
                          identity documents to get past undertrained, demotivated 
                          and harried security staff
 
                       
                      In 
                        response to those criticisms the TSA has sought to expand 
                        its data collection, leading critics to comment that it 
                        is 'solving' the problem of muddy data by doubling the 
                        amount of muddy data. The Secure Flight scheme will apparently 
                        receive the entire Passenger Name Record (PNR) from airline 
                        reservation systems encompassing name, address, phone 
                        number, email address, credit card details and special 
                        medical or religious dietary requirements. Subject to 
                        meeting EU data protection requirements, Secure Flight 
                        will also draw on PNR data from EU-based airlines. 
                         
                        Another response has been to buttress the system by requiring 
                        use of biometric identifiers, with passengers for example 
                        undergoing retina scans or palm scans. 
                         
                        The TSA is also exploring 'trusted traveller' schemes. 
                         
                        Those schemes typically involve frequent travellers gaining 
                        a smart card after undergoing a background check. Information 
                        on the card would include the traveller's flight booking 
                        history (their PNR) and print patterns from two fingers 
                        as a biometric identifier. Security personnel at a screening 
                        point would receive information about 
                        the passenger as the card was read, subject to a match 
                        between the biometric data on the card and the traveller's 
                        fingerprint patterns. If the system indicated that the 
                        person represented a "lower security risk" that 
                        individual would be fast tracked for 
                        boarding.  
                         
                        Privacy issues are supposedly addressed by the traveller 
                        retaining the card "and therefore the personal information 
                        it contained", with personal and flight information 
                        on the system becoming unreadable after 24 hours "unless 
                        needed for government investigations" and deleted 
                        after 30 days. US proponents envisage use of kiosks for 
                        self-check-in by passengers, with a staff member "always 
                        in attendance ... to watch for signs of nervousness indicating 
                        whether a particular passenger posed a security risk". 
                         
                        In May 2006 the European Court of Justice threw out the 
                        2004 agreement between the European Union and the US government 
                        that had allowed the US to access to European airline 
                        passenger data.  The Court ruled that the Council 
                        of Europe could not declare that the US government's promises 
                        provided "adequate" privacy, as the Council 
                        had no legal authority under the EU data protection directive 
                        to address public security matters. The Court allowed 
                        the PNR transfers to continue until October 2006 on a 
                        transitional basis. 
                         
                        The Canadian national government announced plans for a 
                        'Specified Persons List' in 2006, to come into effect 
                        in mid-2007. 
                         
                        That list, expected to cover around 1,000 people, is to 
                        be provided to all airlines that fly within or in/out 
                        of Canada. It includes the name, birth date and gender 
                        of anyone who "might pose an immediate threat to 
                        aviation security" should they board a flight. 
                         
                        The airlines will be required to screen each person's 
                        name against the list before issuing a boarding pass. 
                        They will be required to ensure that every passenger who 
                        appears to be 18 years of age or older carries valid government-issued 
                        photo ID or two identity documents without a photograph. 
                        From the end of 2007 anyone appearing to be older than 
                        12 years of age must carry one or more identity documents, 
                        including a health card, a birth certificate, a driver's 
                        licence or a social insurance card.  
                         
                        As noted elsewhere on this site, it is likely that a substantial 
                        number of bogus documents are in circulation in Australia, 
                        Canada and elsewhere, with few scrutineers having forensic 
                        training to determine whether a card or certificate is 
                        what it purports to be and that it has been properly obtained. 
                         
                              
                         listing 
                         
                         
                        In 2006 the UK Home Office was revealed to have compiled 
                        a 'hit list' of 45,000 "undesirable" Hungarians 
                        and Romanians prior to admission of those nations to the 
                        European Union. 
                         
                        The secret "warnings index" of alleged criminals 
                        and possible security risks is intended to alert officials 
                        to the identity of people who will be given the legal 
                        right to live in the UK after the two countries join the 
                        EU. One government forecast is that up to 140,000 Bulgarians 
                        and Hungarians may move to the UK. Junior Home Office 
                        minister Joan Ryan claimed that EU freedom of movement 
                        rules mean they cannot be barred from the UK; police accordingly 
                        need to be warned about their identities.  
                       
                        In October 2006 it was revealed that there were over 12,000 
                        'Robert Johnson's on the US list, leading one critic to 
                        comment that 
                      
                         
                          It would seem that the next step will be terrorists 
                          polluting of the 'No Fly' list with bogus traffic. How 
                          many thousands of people with the names John Smith, 
                          Jane Smith, Robert Smith, and so on will it take to 
                          overload the system and make it impossible to travel 
                          effectively? 
                       
                        
                       
                         
                         
                         
                            
                        next page (searches)  
                         
                         
                         
                         
  | 
                    
 
                       
                      
                        
                       
                        |