The anticipatory turn in managing security and safety relies not only on innovative technological tools, but also on social practice. New information and communication technology, for instance, facilitates digital security governance which entails the collection, processing, storage, and sharing of digital personal data for risk profiling, but little is known about the role of security officials in preemptive security. Although people, or “data subjects,” are categorized according to a (predefined) level of potential threat on the basis of digital data, it is often unclear which actor or agency was responsible for this categorization. This is especially unclear when information was shared across the globe between several security agencies and/or private companies. Nonetheless, as the assessment of risk or dangerousness affects someone's real-life opportunities, privacy rights or claims to something or someone are likely to be evoked. Thus, ethical dilemmas arise in relation to preemptive surveillance. Consider, for example, the basis on which algorithms of risk profiles for travelers are constructed? Or, how state actors deal with the outcome of (semi-)automated risk profiles? As Mitsilegas argues, one of the features of preemptive surveillance is that its privatization has allowed state actors considerable access to databases. How does this affect privacy? What happens if someone is erroneously labeled as a high risk or a dangerous person on the basis of incorrect personal information, which has been automatically generated by a private company? Even if the potential suspect knew the cause of the digital error, does he or she have the right to correct the information that led to, for example, a travel restriction? Will a security official or a state agency inform the potential suspect of a right to seek redress (Gaugnin et al. 2012)? Or should these data subject turn to the private company? While digital security governance is currently a hot issue, there is still a gap in research about how, in reality, security officials apply risk knowledge and protect privacy. Therefore, this contribution focuses on the role of security officials who implement preemptive surveillance and how they should protect privacy.
Read full abstract