Securing Against Future Events (SaFE): Pre-emption, Protocols, and Publics

Lead Research Organisation: Durham University
Department Name: Geography

Abstract

In the decade following the events of September 11 2001, security against potential terrorist attack has significantly changed in its form and emphasis. Put simply, in many of the post-event analyses following the attacks, as well as those in Bali, Madrid, London and Mumbai, the security problem is understood to be how to take action on the basis of uncertain, unforeseen and unanticipated events. For example, the 9/11 hijackers did not fit the known and established risk profiles for airport security screening - and so, in effect, the absence of a match to profile resulted in a failure to intervene or act. Today, the known and established characteristics of who or what may pose a terrorism risk is considered something of a risk in itself. That is to say, what is sought is an adaptive and responsive means of securing against future threat events, whatever their characteristics may prove to be. In short, the conventional security practice of preventing future attacks through verification against profiles, names and watchlists is beginning to be superceded by the pre-emption of future events through horizon-scanning, data gathering and projection, mobile profiles, and threat imagination. Uncertainty about the future is no longer posed as an impediment to action, but precisely as a spur to new forms of security calculation and decision that make uncertainty the very basis of action.

The SaFE fellowship will advance knowledge and understanding of these futures-oriented and pre-emptive security techniques, helping to achieve further focus within the terrorism core area of the Global Uncertainties Programme, and with significant implications for the cyber security and threats to infrastructures core areas. The fellowship will convene and deliver a programme of activities designed to identify and nurture productive relationships among GU researchers and practitioners. The programme is organised around three thematic streams that have resonance and significance across discplines and across the public and private sectors: inferred futures, or how future threats can be inferred in advance; enacting decision, or how action can be taken even where information is partial or fragmentary; and publics and proportionality, or how judgements can be reached on what is a proportionate pre-emptive security measure. The activities are convened on the principle of opening spaces for dialogue, collaboration and the advancement of ideas and knowledge - from the on-site seminar planned for St Pancras International station, to knowledge exchange residencies for early career researchers, to the 'Security's Futures' public report.

Within the fellowship, a programme of personal research will focus specifically on the deployment of digital data and analytics within border security programmes. For border security, the shift to pre-empting future threat events has meant 'stretching' the geography of the border itself, such that it reaches into the background, behaviour and associates of people. As one leading supplier of border control software has put it, "the future of border management lies in the convergence of the biometric key with the system of integrated risk data that it unlocks". Social science has yet to develop conceptual and empirical knowledge of how potential future border threats are imagined and acted upon within such systems. Within the European Union's directive on Passenger Name Record (PNR) data, for example, all EU countries are required to devise compliant risk data systems, and to establish passenger information units for the assessment of the data. The SaFE research will analyse the relationships between software systems and risk decisions within the PIUs in the UK and Netherlands. The findings will be compared and contrasted with two areas in which important new innovations in system and decision have taken place: identifying flood risk, and identifying anomalous financial transactions.

Planned Impact

The ESRC's delivery plan (2011-15) identifies a key strategic priority to "create a better understanding of how and why people and organisations make decisions, and how these can be managed and influenced" (page 5). This priority intersects with the cross-council Global Uncertainties priority to "realise greater security for all in a changing world", precisely because current understandings of how and why people and organisations make security decisions lack attention to the technological intersection of commercial, governmental, political, and public decisions about risk and threat. For example, in data from my past projects, the commercial designers of algorithms for crowded place security have reported in interviews that they are unsure how their "model designed to detect insurance fraud" is different from "the mathematically similar model used for border controls" in the eyes of the public. From a different perspective, government agencies charged with securing the border report that they want commercial suppliers to "automate the kinds of decisions our experienced staff are making every day".
The SaFE fellowship responds directly to the need for better understanding of security decisions made under conditions of profound uncertainty about future threats, with specific emphasis on engaging commercial, governmental and 'third sector' beneficiaries.
Who will benefit from this research? - the beneficiaries of the SaFE fellowship include: commercial bodies with interest in the development and application of technologies that pre-empt future threat events (e.g. IBM; SITA; CapGemini; Thales; Augmentiq); governmental and policy making authorities with a remit to consider and to deploy new forms of 'future risk' oriented security (e.g. UKBA; Koninklijke Marechaussee; European Commission; European Parliamentary Committee on Civil Liberties, Justice and Home Affairs); and 'third sector' and public bodies with a stake in deliberating the societal effects of new security measures (e.g. UK Information Commissioner; European Data Protection Supervisor, Peter Hustinx; UK and European legal advocates who confront a new 'vocabulary' of risk in national security cases; representatives of charitable sector, such as National Council for Voluntary Organisations, NCVO, and Islamic Relief).
How will they benefit from this research? - With regard to the commercial and industrial stakeholders across the GU programme, they will benefit from the programme of leadership activities because it will afford opportunities to share their applications and systems 'problem spaces' and to devise new approaches from other sectors (e.g. partnerships, future leaders residencies, knowledge exchange workshops). Within the border security domain that is the focus of the personal research, the commercial beneficiaries will gain greater understanding of what happens to their algorithmic models when the system is 'retuned' by governement priorities or adapted within the PIU. This matters because the commercial suppliers tell us they have little feedback knowledge on the experiential and onward life of their systems in situ, and that there may be ways to 'design in' adaptation.
With respect to the governmental authorities, the primary beneficiary will be the UKBA, whose 'in kind' partnership will ensure that the insights from pre-emptive techniques used in other threat domains can be used to the full. The Fellow is also involved in the ongoing negotiations between EU and US on PNR sharing - the research will be crucial to ensuring that attention is paid to the public and democratic effects between data gathering and risk analytics.
Finally, the SaFE fellowship will develop ongoing engagement with a wide range of bodies whose advocacy work is transformed by new security practices - for example, charities whose compliance with new border security practices demands new ways of working.

Publications

10 25 50
publication icon
Amoore L (2014) Security and the incalculable in Security Dialogue

publication icon
Amoore L (2016) Securing with algorithms: Knowledge, decision, sovereignty in Security Dialogue

publication icon
Amoore L (2019) Doubt and the Algorithm: On the Partial Accounts of Machine Learning in Theory, Culture & Society

publication icon
Amoore L (2015) Life beyond big data: governing with little analytics in Economy and Society

publication icon
Amoore L (2014) Security and the Claim to Privacy in International Political Sociology

publication icon
L. Amoore (2017) What does it mean to govern with algorithms? in Antipode

 
Description The research funded through the Global Uncertainties Fellowship, 'Securing Against Future Events' (SaFE) has involved a range of research and engagement activities.
With regard to the research, the team conducted more than 100 interviews with, and non-participant observations of, the different actors involved in collecting, preparing, analysing and actioning data for security decisions. These ranged from national and European borders authorities, to software designers, regulators, security analysts, and aviation and transport security authorities. The analysis of this unique dataset has produced the following overall project findings:
1. The use of statistical and probabilistic methods of data analysis for securing against uncertainty has transformed dramatically in the period after 2001. Where traditional methods used historical data to extract fixed profiles of risk, extrapolating past patterns into the future, the emerging methods have a different relationship to past and future. The availability of real-time data streams from the Internet has supplied data that is not strictly 'historical' in the conventional sense. This new approach visualises uncertainty and risk through correlative links and associations rather than through causality or probability.
2. If the securing of future events such as terrorist attacks has moved to more mobile and flexible forms of data analysis, the evidence points overwhelmingly to a dramatic shift in what is meant by 'data collection', 'analysis' and 'decision'. The collection of specific security-related data in structured databases and lists is no longer as significant as the use of large volumes of 'bulk' data, from which patterns and anomalies are detected.
3. The new spaces of 'securing against future events' include technical and computational architectures such as cloud computing, algorithmic and automated filtering, and distributed databases. These spaces involve novel combinations of human and machine decision-making, where the "human in the loop" is often required to validate an algorithmic security decision. For many practitioners and analysts, it remains an extraordinarily complex architecture for which they are required to take responsibility. However, in the instances where the steps of a security decision are to be re-traced and checked, the algorithmic methods are not meaningfully within the visible threshold of human oversight.
Exploitation Route There are a number of ways in which the findings will be taken forward/put to use.

1. Investigations of futurity and the claim upon the future made by security decisions, particularly where these are made by composites of humans and algorithms.
2. Empirical work on cloud computing and the implications of cloud space for security practice. This remains a critical problem for practitioners, for whom cloud data appears to offer new possibilities for data gathering and analysis.
3. A revisiting of the principles of oversight, integrity, accountability, and privacy on which public relationships to the security decision are based. These principles relate to the prior forms of statistical and profile-based data analysis and, as yet, they have not been revisited to assess their adequacy for algorithmic forms of security.
Sectors Aerospace, Defence and Marine,Digital/Communication/Information Technologies (including Software),Government, Democracy and Justice,Security and Diplomacy,Transport

 
Description The research findings have been used by authorities whose public role is to collect and analyse data in order to implement risk-based security, or 'smart security'. The practitioners shared with our research team their blueprint model for smart security. Our input into the blueprint was followed by a knowledge exchange internship (PDRA extended visit to the agency); resulting in a final 10,000 word report. Following the presentation of the final report to the international organisation, our research team was invited to present the report to an invited audience of government and industry practitioners. This has led to further engagement with the Australian borders projects, including a knowledge exchange visit in the summer of 2016. Prof Amoore is now also on a permanent advisory committee relating to biometrics and smart border security.
First Year Of Impact 2015
Sector Security and Diplomacy,Transport
Impact Types Societal,Policy & public services

 
Description Algorithms and Decision Making
Geographic Reach National 
Policy Influence Type Contribution to a national consultation/review
URL https://www.parliament.uk/business/committees/committees-a-z/commons-select/science-and-technology-c...
 
Description Testimony before UK Parliamentary Science and Technology Select Committee on Biometric Technologies
Geographic Reach National 
Policy Influence Type Citation in other policy documents
Impact The contribution to the inquiry focused specifically on the new techniques through which biometric data can be linked to other internet data (structured and unstructured data). The evidence from our research findings, reported extensively in the report and in the follow-up response to the report, is unique to our project.
URL http://www.parliament.uk/business/committees/committees-a-z/commons-select/science-and-technology/ne...
 
Description Leverhulme Major Research Fellowship
Amount £86,000 (GBP)
Organisation The Leverhulme Trust 
Sector Charity/Non Profit
Country United Kingdom
Start 10/2016 
End 09/2018
 
Description Collaboration with International Air Transport Association (IATA) 
Organisation ITS United Kingdom
Country United Kingdom 
Sector Private 
PI Contribution 1. Durham research team input into smart security blueprint. 2. Knowledge exchange at IATA HQ in Geneva (June - July 2015) 3. Submission of 10,000 word report on data and smart security (December 2015).
Collaborator Contribution Hosting of PDRA; sharing of data; invited our team to participate in AvSec meeting, Dublin 2015.
Impact Confidential output - 10,000 word report.
Start Year 2015
 
Description Algorithms in decision making - appearance before Science and technology select committee 
Form Of Engagement Activity A broadcast e.g. TV/radio/film/podcast (other than news/press)
Part Of Official Scheme? No
Geographic Reach National
Primary Audience Policymakers/politicians
Results and Impact Prof Amoore gave written and oral testimony before the UK House of Commons Select Committee for their inquiry on Algorithms in decision making.
Year(s) Of Engagement Activity 2017
URL http://data.parliament.uk/writtenevidence/committeeevidence.svc/evidencedocument/science-and-technol...
 
Description Appearance before Parliamentary Science and technology select committee 
Form Of Engagement Activity A broadcast e.g. TV/radio/film/podcast (other than news/press)
Part Of Official Scheme? No
Geographic Reach National
Primary Audience Policymakers/politicians
Results and Impact Prof Amoore provided written and oral testimony before the UK House of Commons Science and Technology Select Committee. The inquiry, on current and future uses of biometric technologies, was focused on the likely impacts of biometrics on the public. Please see linked outputs for publications from this activity.
Year(s) Of Engagement Activity 2014
URL http://www.parliament.uk/business/committees/committees-a-z/commons-select/science-and-technology-co...
 
Description Aviation Security International 
Form Of Engagement Activity A talk or presentation
Part Of Official Scheme? No
Geographic Reach International
Primary Audience Industry/Business
Results and Impact Presented keynote lecture on data and risk-based security, followed by discussion and questions. Has a resulted in follow-up invitations to discuss our research findings.
Year(s) Of Engagement Activity 2015
 
Description Big data and security in Europe 
Form Of Engagement Activity Participation in an activity, workshop or similar
Part Of Official Scheme? No
Geographic Reach International
Primary Audience Policymakers/politicians
Results and Impact Hosted a workshop in Brussels, geared to interven in the debates on securing against future events using data and big data analytics. Participants included members of the European Commission, MEPs, border security authorities, finance and banking authorities.
Year(s) Of Engagement Activity 2014
URL http://www.securitysfutures.org.
 
Description Risk and Calculative Devices in a Digital Age 
Form Of Engagement Activity Participation in an activity, workshop or similar
Part Of Official Scheme? No
Geographic Reach International
Primary Audience Professional Practitioners
Results and Impact Hosted Durham workshop of knowledge exchange among practitioners - including IMF, IBM, border security authorities, biometrics designers, software analysts, financial analysts, and users of automated and algorithmic security software.
Year(s) Of Engagement Activity 2013
URL http://www.securitysfutures.org
 
Description Thinking with algorithms 
Form Of Engagement Activity Participation in an activity, workshop or similar
Part Of Official Scheme? No
Geographic Reach International
Primary Audience Professional Practitioners
Results and Impact 50 delegates attended a Durham conference looking at algorithms from interdisciplinary perspectives, with specific focus on how algorithms act upon uncertain futures.
Year(s) Of Engagement Activity 2015
URL http://www.securitysfutures.org