"After the game is before the game" - this quote is attributed to the German football coach Sepp Herberger. We learn on a daily basis how the assessment of the use of safety-and security-oriented technology changes before and after the assassination, attack or criminal act. After the event, rapid and sometimes profound individual measures are demanded and advocated, which are regularly questioned or forgotten after a certain period of time.
The duration of development cycles generally exceeds the time between events relevant to security. Processes for the provision of technical and organizational measures and resources must therefore not be determined by the sequence of events. Rather, long-term plans, concepts, and their safeguards as well as implementation are necessary.
Technical measures affect the privacy of the parties involved. This is typically not perceived by the target persons. Each of these forensic and security-oriented measures must be subject to review and assessment in accordance with human rights, the national legal order and the natural sense of the law. In addition to the necessity of the legal assessment of all measures, moral questions arise for the personnel involved as well as for the developers and providers of the technology. What is right, good, and fair is concerned with the parties involved as well as those affected and requires answers.
The social ethical doctrine deals with the aspects of moral behavior. In the context of technical measures and systems, a derived comprehensive ethics has so far been little dealt with. The aim of research is to address these issues and to derive appropriate statements and findings which can be helpful and effective for the parties involved.
The discussion of the questions raised requires a variety of knowledge, skills and insights into the details:
- Technology and its actual possibilities and limitations
- communication and video surveillance
- additional sensors for the detection of safety-relevant processes
- combining data and fusion of information
- operational aspects
- obligations of public authorities against society
- Human Rights
- valid national law
- public perception
- political aspects, objectives, reporting paths
- moral, social ethics.
The risk of violation of personality rights depends to a large extent on whether the use is carried out taking into account all directives and obligations, or whether unwanted side effects arise due to misconduct, incorrect use or inadequate securing of the technical means. The analysis should therefore take place in a differentiated manner. References to quality assurance processes and their support with the technology itself are valuable.
The discussion must be based on concrete results and recommendations for action. The operational forces in operation, as well as the suppliers and developers for technical products, must recognize from the results a framework of action, which can be implemented practically and can work. The non-directly involved environment should be able to know that the range of measures and their use to ensure security in society is necessary and unavoidable, and appropriate measures to safeguard personality rights are taken into account.
|Title||EthicSec - Ethics and security|
|Short description||Forensic and security-oriented measures are always directed against perpetrators, suspects and their environment. Legal regulations and also the natural legal sense determine the basic conditions. "Success does not justify all means" is a thesis that requires careful analysis and discussion.|
|Technology||communication and video surveillance, other sensors, generation of metadata from sensor data, information processing and fusion.|
|Law||Human Rights, national law, global scenarios, export regulations.|
|political aspects||internal affairs and global aspects, order scenarios for the security bodies, framework for industry and its organs.|
Links and downloads
- DITS Projekte [pdf]
- DITS Projects [pdf]
- EthicSec Informationsblatt [pdf]
- EthicSec Information flyer [pdf]
- W. Koch: Towards Cognitive Tools, IEEE AuE Systems Magazine, September 2014 [pdf]
- W. Koch: Braucht die Bundeswehr bewaffnete Drohnen, epd-Dokumentation, Nr. 49-2014, S. 14-21 [pdf]
- Deutscher Bundestag - Wissenschaftliche Dienste: Zum Grundrecht auf Sicherheit [pdf]
- A. Braun, H. Künzel: Is forensic speaker identification unethical or can it be unethical not to do it? [pdf]
- Wiki: Ethics