To determine the state of the art of smart surveillance and likely future trends in a key application area – Border Control
Description of work
Task 2.1 Identifying and classifying relevant smart surveillance technologies in border control applications
WP2 will involve a thorough study of the different smart surveillance technologies including FRT (face recognition technologies) and risk category identification currently available to police and security services in border control applications as well as foreseeable future offerings in this area.
It combines extensive in-house expertise with desktop research and peer-referral through input from members of the External Advisory Group. A group of experts comprising key technology providers, digital forensic scientists, privacy/IT lawyers and users with police and border control expertise will map, describe and classify existing smart surveillance technologies according to their current and likely future applications within the key application area of border control. This will constitute a good foundation for the tasks of:
- Identifying the purposes for which smart surveillance technologies are being employed/considered to be employed in border control applications;
- Identifying the extent to which smart surveillance technologies in this area may be usefully stand-alone or else susceptible to integration with other areas of application and especially with existing or future repositories of personal data;
Task 2.2 Identifying proportionality issues in smart surveillance technologies in border control applications
- Identifying the extent to which smart surveillance technologies are suitable, appropriate and necessary to achieve those purposes;
Task 2.3 Impact Assessment – smart surveillance in border control
- Identifying the extent to which the deployment of smart surveillance technologies in this area of application may affect privacy and data protection;
- Identifying the technical features and options for safeguards in this area of application and providing suggestions as to the methods that may be used to
- o preserve privacy and data integrity while enhancing security; and
- o assist in the elimination of contractual provision, technical features and operational practices which may prejudice those objectives.